Tried with the vpn_gateway option , seems that nothing change
client log NO vpn_gateway
Code: Select all
Mon Sep 16 15:13:51 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Mon Sep 16 15:13:51 2019 Windows version 6.2 (Windows 8 or greater) 64bit
Mon Sep 16 15:13:51 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
Enter Management Password:
Mon Sep 16 15:13:51 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Mon Sep 16 15:13:51 2019 Need hold release from management interface, waiting...
Mon Sep 16 15:13:52 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'state on'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'log all on'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'echo all on'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'bytecount 5'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'hold off'
Mon Sep 16 15:13:52 2019 MANAGEMENT: CMD 'hold release'
Mon Sep 16 15:13:52 2019 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 16 15:13:52 2019 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 16 15:13:52 2019 MANAGEMENT: >STATE:1568639632,RESOLVE,,,,,,
Mon Sep 16 15:13:52 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]87.*.*.*:1194
Mon Sep 16 15:13:52 2019 Socket Buffers: R=[65536->65536] S=[64512->64512]
Mon Sep 16 15:13:52 2019 UDP link local: (not bound)
Mon Sep 16 15:13:52 2019 UDP link remote: [AF_INET]87.*.*.*:1194
Mon Sep 16 15:13:52 2019 MANAGEMENT: >STATE:1568639632,WAIT,,,,,,
Mon Sep 16 15:13:52 2019 MANAGEMENT: >STATE:1568639632,AUTH,,,,,,
Mon Sep 16 15:13:52 2019 TLS: Initial packet from [AF_INET]87.*.*.*:1194, sid=f503cd72 7bf57e89
Mon Sep 16 15:13:52 2019 VERIFY OK: depth=1, C=??, ST=UnknownProvince, L=UnknownCity, O=UnknownOrg, OU=UnknownOrgUnit, CN=fvgekhthfgnwynx, name=fvgekhthfgnwynx, emailAddress=fvgekhthfgnwynx@dpjmhqobcpfrhvn.com
Mon Sep 16 15:13:52 2019 VERIFY KU OK
Mon Sep 16 15:13:52 2019 Validating certificate extended key usage
Mon Sep 16 15:13:52 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 16 15:13:52 2019 VERIFY EKU OK
Mon Sep 16 15:13:52 2019 VERIFY OK: depth=0, C=??, ST=UnknownProvince, L=UnknownCity, O=UnknownOrg, OU=UnknownOrgUnit, CN=fvgekhthfgnwynx, name=fvgekhthfgnwynx, emailAddress=fvgekhthfgnwynx@dpjmhqobcpfrhvn.com
Mon Sep 16 15:13:52 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon Sep 16 15:13:52 2019 [fvgekhthfgnwynx] Peer Connection Initiated with [AF_INET]87.*.*.*:1194
Mon Sep 16 15:13:53 2019 MANAGEMENT: >STATE:1568639633,GET_CONFIG,,,,,,
Mon Sep 16 15:13:53 2019 SENT CONTROL [fvgekhthfgnwynx]: 'PUSH_REQUEST' (status=1)
Mon Sep 16 15:13:55 2019 PUSH: Received control message: 'PUSH_REPLY,topology subnet,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.10.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: route options modified
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: route-related options modified
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: peer-id set
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: adjusting link_mtu to 1625
Mon Sep 16 15:13:55 2019 OPTIONS IMPORT: data channel crypto options modified
Mon Sep 16 15:13:55 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Sep 16 15:13:55 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 16 15:13:55 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 16 15:13:55 2019 interactive service msg_channel=1016
Mon Sep 16 15:13:55 2019 ROUTE_GATEWAY 192.168.105.254/255.255.255.0 I=7 HWADDR=6c:f0:49:0f:14:a9
Mon Sep 16 15:13:55 2019 open_tun
Mon Sep 16 15:13:55 2019 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{10139D65-514C-40BF-8368-500F381555D8}.tap
Mon Sep 16 15:13:55 2019 TAP-Windows Driver Version 9.21
Mon Sep 16 15:13:55 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Mon Sep 16 15:13:55 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {10139D65-514C-40BF-8368-500F381555D8} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Mon Sep 16 15:13:55 2019 Successful ARP Flush on interface [3] {10139D65-514C-40BF-8368-500F381555D8}
Mon Sep 16 15:13:55 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Mon Sep 16 15:13:55 2019 MANAGEMENT: >STATE:1568639635,ASSIGN_IP,,10.8.0.2,,,,
Mon Sep 16 15:14:00 2019 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Mon Sep 16 15:14:00 2019 C:\WINDOWS\system32\route.exe ADD 87.*.*.* MASK 255.255.255.255 192.168.105.254
Mon Sep 16 15:14:00 2019 Route addition via service succeeded
Mon Sep 16 15:14:00 2019 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:14:00 2019 Route addition via service succeeded
Mon Sep 16 15:14:00 2019 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:14:00 2019 Route addition via service succeeded
Mon Sep 16 15:14:00 2019 MANAGEMENT: >STATE:1568639640,ADD_ROUTES,,,,,,
Mon Sep 16 15:14:00 2019 C:\WINDOWS\system32\route.exe ADD 192.168.10.0 MASK 255.255.255.0 10.8.0.1
Mon Sep 16 15:14:00 2019 Route addition via service succeeded
Mon Sep 16 15:14:00 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Sep 16 15:14:00 2019 Initialization Sequence Completed
Mon Sep 16 15:14:00 2019 MANAGEMENT: >STATE:1568639640,CONNECTED,SUCCESS,10.8.0.2,87.*.*.*,1194,,
Mon Sep 16 15:18:32 2019 C:\WINDOWS\system32\route.exe DELETE 192.168.10.0 MASK 255.255.255.0 10.8.0.1
Mon Sep 16 15:18:32 2019 Route deletion via service succeeded
Mon Sep 16 15:18:32 2019 C:\WINDOWS\system32\route.exe DELETE 87.*.*.* MASK 255.255.255.255 192.168.105.254
Mon Sep 16 15:18:32 2019 Route deletion via service succeeded
Mon Sep 16 15:18:32 2019 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:18:32 2019 Route deletion via service succeeded
Mon Sep 16 15:18:32 2019 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:18:32 2019 Route deletion via service succeeded
Mon Sep 16 15:18:32 2019 Closing TUN/TAP interface
Mon Sep 16 15:18:32 2019 TAP: DHCP address released
Mon Sep 16 15:18:32 2019 SIGTERM[hard,] received, process exiting
Mon Sep 16 15:18:32 2019 MANAGEMENT: >STATE:1568639912,EXITING,SIGTERM,,,,,
client log WITH vpn_gateway
Code: Select all
Mon Sep 16 15:56:03 2019 UDP link local: (not bound)
Mon Sep 16 15:56:03 2019 UDP link remote: [AF_INET]87.x.x.x:1194
Mon Sep 16 15:56:03 2019 MANAGEMENT: >STATE:1568642163,WAIT,,,,,,
Mon Sep 16 15:56:03 2019 MANAGEMENT: >STATE:1568642163,AUTH,,,,,,
Mon Sep 16 15:56:03 2019 TLS: Initial packet from [AF_INET]87.x.x.x:1194, sid=ce673443 adc1715c
Mon Sep 16 15:56:03 2019 VERIFY OK: depth=1, C=??, ST=UnknownProvince, L=UnknownCity, O=UnknownOrg, OU=UnknownOrgUnit, CN=fvgekhthfgnwynx, name=fvgekhthfgnwynx, emailAddress=fvgekhthfgnwynx@dpjmhqobcpfrhvn.com
Mon Sep 16 15:56:03 2019 VERIFY KU OK
Mon Sep 16 15:56:03 2019 Validating certificate extended key usage
Mon Sep 16 15:56:03 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 16 15:56:03 2019 VERIFY EKU OK
Mon Sep 16 15:56:03 2019 VERIFY OK: depth=0, C=??, ST=UnknownProvince, L=UnknownCity, O=UnknownOrg, OU=UnknownOrgUnit, CN=fvgekhthfgnwynx, name=fvgekhthfgnwynx, emailAddress=fvgekhthfgnwynx@dpjmhqobcpfrhvn.com
Mon Sep 16 15:56:03 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Mon Sep 16 15:56:03 2019 [fvgekhthfgnwynx] Peer Connection Initiated with [AF_INET]87.x.x.x:1194
Mon Sep 16 15:56:04 2019 MANAGEMENT: >STATE:1568642164,GET_CONFIG,,,,,,
Mon Sep 16 15:56:04 2019 SENT CONTROL [fvgekhthfgnwynx]: 'PUSH_REQUEST' (status=1)
Mon Sep 16 15:56:04 2019 PUSH: Received control message: 'PUSH_REPLY,topology subnet,route-gateway 10.8.0.1,redirect-gateway def1,ping 25,ping-restart 180,route 192.168.10.0 255.255.255.0 10.8.0.1,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: route options modified
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: route-related options modified
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: peer-id set
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: adjusting link_mtu to 1625
Mon Sep 16 15:56:04 2019 OPTIONS IMPORT: data channel crypto options modified
Mon Sep 16 15:56:04 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Sep 16 15:56:04 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 16 15:56:04 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 16 15:56:04 2019 interactive service msg_channel=684
Mon Sep 16 15:56:04 2019 ROUTE_GATEWAY 192.168.105.254/255.255.255.0 I=7 HWADDR=6c:f0:49:0f:14:a9
Mon Sep 16 15:56:04 2019 open_tun
Mon Sep 16 15:56:04 2019 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{10139D65-514C-40BF-8368-500F381555D8}.tap
Mon Sep 16 15:56:04 2019 TAP-Windows Driver Version 9.21
Mon Sep 16 15:56:04 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Mon Sep 16 15:56:04 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {10139D65-514C-40BF-8368-500F381555D8} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Mon Sep 16 15:56:04 2019 Successful ARP Flush on interface [3] {10139D65-514C-40BF-8368-500F381555D8}
Mon Sep 16 15:56:04 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Mon Sep 16 15:56:04 2019 MANAGEMENT: >STATE:1568642164,ASSIGN_IP,,10.8.0.2,,,,
Mon Sep 16 15:56:09 2019 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Mon Sep 16 15:56:09 2019 C:\WINDOWS\system32\route.exe ADD 87.x.x.x MASK 255.255.255.255 192.168.105.254
Mon Sep 16 15:56:09 2019 Route addition via service succeeded
Mon Sep 16 15:56:09 2019 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:56:09 2019 Route addition via service succeeded
Mon Sep 16 15:56:09 2019 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Mon Sep 16 15:56:09 2019 Route addition via service succeeded
Mon Sep 16 15:56:09 2019 MANAGEMENT: >STATE:1568642169,ADD_ROUTES,,,,,,
Mon Sep 16 15:56:09 2019 C:\WINDOWS\system32\route.exe ADD 192.168.10.0 MASK 255.255.255.0 10.8.0.1
Mon Sep 16 15:56:09 2019 Route addition via service succeeded
Mon Sep 16 15:56:09 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Sep 16 15:56:09 2019 Initialization Sequence Completed
Mon Sep 16 15:56:09 2019 MANAGEMENT: >STATE:1568642169,CONNECTED,SUCCESS,10.8.0.2,87.x.x.x,1194,,
client.config with vpn_gateway option
Code: Select all
client
remote 87.*.*.* 1194
dev tun
proto udp
status current_status
resolv-retry infinite
remote-cert-tls server
topology subnet
verb 3
cipher AES-256-CBC
ca ca.crt
cert client1.crt
key client1.key
tls-auth ta.key 1
nobind
persist-key
persist-tun
comp-lzo