A trick to single ovpn in 1.12.0?
Posted: Tue Dec 24, 2019 5:05 pm
Disclaimer: I'm just now testing OpenVPN in anything later than 1.10 (1.12 is a clean install though), so I'm 95% sure this is something I'm doing, but I couldn't find anything about it.
I setup 1.12 VPN as so:
https://i.imgur.com/mEJb4Pa.png
And the client config is standard (+vpn_gateway).
Testing from Win10 with the latest portable OpenVPN client using "Credentials & Config Files (Multiple)," it connects fine.
But Single ovpn (not that that's critical to have, but I'm curious) instead doesn't get very far at all:
I setup 1.12 VPN as so:
https://i.imgur.com/mEJb4Pa.png
And the client config is standard (+vpn_gateway).
Testing from Win10 with the latest portable OpenVPN client using "Credentials & Config Files (Multiple)," it connects fine.
But Single ovpn (not that that's critical to have, but I'm curious) instead doesn't get very far at all:
For context, this is a snippet of how the log should pick up after "MANAGEMENT: CMD 'hold release'":Tue Dec 24 15:49:22 2019 OpenVPN 2.4.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
Tue Dec 24 15:49:22 2019 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Dec 24 15:49:22 2019 library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10
Enter Management Password:
Tue Dec 24 15:49:22 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Tue Dec 24 15:49:22 2019 Need hold release from management interface, waiting...
Tue Dec 24 15:49:22 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Tue Dec 24 15:49:23 2019 MANAGEMENT: CMD 'state on'
Tue Dec 24 15:49:23 2019 MANAGEMENT: CMD 'log all on'
Tue Dec 24 15:49:23 2019 MANAGEMENT: CMD 'echo all on'
Tue Dec 24 15:49:23 2019 MANAGEMENT: CMD 'bytecount 5'
Tue Dec 24 15:49:23 2019 MANAGEMENT: CMD 'hold off'
Tue Dec 24 15:49:23 2019 MANAGEMENT: CMD 'hold release'
Tue Dec 24 15:49:23 2019 MANAGEMENT: Client disconnected
Tue Dec 24 15:49:23 2019 File '[[INLINE]]' does not have OpenVPN Static Key format. Using free-form passphrase file is not supported anymore.: Unknown error (errno=-2146893799)
Tue Dec 24 15:49:23 2019 Exiting due to fatal error
ThanksTue Dec 24 15:43:56 2019 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Dec 24 15:43:56 2019 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Dec 24 15:43:56 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]myiphere:11940
Tue Dec 24 15:43:56 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Dec 24 15:43:56 2019 UDP link local: (not bound)
Tue Dec 24 15:43:56 2019 UDP link remote: [AF_INET]myiphere:11940
Tue Dec 24 15:43:56 2019 MANAGEMENT: >STATE:1577220236,WAIT,,,,,,
Tue Dec 24 15:43:56 2019 MANAGEMENT: >STATE:1577220236,AUTH,,,,,,