Experimental Gargoyle 1.15.x (released as 1.14) beta 20230124

Want to share your OpenWrt / Gargoyle knowledge? Implemented a new feature? Let us know here.

Moderator: Moderators

ektus
Posts: 243
Joined: Sun Aug 11, 2013 2:26 am
Location: Germany

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by ektus »

Performed yet another try, this time with "AES-CBC 256bit" unticked and only "AES-GCM 256bit" active. Seems to have worked this time, after only 57 seconds I got a running and connected OpenVPN Server. Seems like the "CBC" config is troublesome.

Code: Select all

Fri Apr  7 09:34:05 2023 daemon.err uhttpd[2825]: Generating DH parameters, 1024 bit long safe prime, generator 2
Fri Apr  7 09:34:05 2023 daemon.err uhttpd[2825]: This is going to take a long time
Fri Apr  7 09:34:13 2023 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  7 09:34:29 2023 daemon.err uhttpd[2825]: .........................................+..........................+.......................+.........................................+......................................................+..........+...........................................+........................................................+.............+..+....................................................................................+..........+......................................+.....+...................................................................................++*++*++*++*++*
Fri Apr  7 09:34:30 2023 daemon.err uhttpd[2825]: Generating RSA private key, 1024 bit long modulus (2 primes)
Fri Apr  7 09:34:30 2023 daemon.err uhttpd[2825]: .....+++++
Fri Apr  7 09:34:30 2023 daemon.err uhttpd[2825]: ............+++++
Fri Apr  7 09:34:30 2023 daemon.err uhttpd[2825]: e is 65537 (0x010001)
Fri Apr  7 09:34:30 2023 daemon.err uhttpd[2825]: Generating a RSA private key
Fri Apr  7 09:34:31 2023 daemon.err uhttpd[2825]: ..................................................+++++
Fri Apr  7 09:34:31 2023 daemon.err uhttpd[2825]: ......+++++
Fri Apr  7 09:34:31 2023 daemon.err uhttpd[2825]: writing new private key to '/tmp/ovpn-client-nkhcycaffovdabl/keys/easy-rsa-4359.gIEgFF/tmp.aidcGo'
Fri Apr  7 09:34:31 2023 daemon.err uhttpd[2825]: -----
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: Using configuration from /tmp/ovpn-client-nkhcycaffovdabl/keys/easy-rsa-4359.gIEgFF/tmp.DoFkGo
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: Check that the request matches the signature
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: Signature ok
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: The Subject's Distinguished Name is as follows
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: countryName           :PRINTABLE:'??'
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: stateOrProvinceName   :ASN.1 12:'UnknownProvince'
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: localityName          :ASN.1 12:'UnknownCity'
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: organizationName      :ASN.1 12:'UnknownOrg'
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: organizationalUnitName:ASN.1 12:'UnknownOrgUnit'
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: commonName            :ASN.1 12:'server'
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: emailAddress          :IA5STRING:'mxztxiognopbgmg@buktgschscbnlhi.com'
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: Certificate is to be certified until Dec 27 07:34:32 2037 GMT (5378 days)
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]:
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: Write out database with 1 new entries
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: Data Base Updated
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: tr: write error: Broken pipe
Fri Apr  7 09:34:32 2023 daemon.err uhttpd[2825]: tr: write error: Broken pipe
Fri Apr  7 09:34:33 2023 daemon.err uhttpd[2825]: Generating a RSA private key
Fri Apr  7 09:34:33 2023 daemon.err uhttpd[2825]: ..........................+++++
Fri Apr  7 09:34:33 2023 daemon.err uhttpd[2825]: ..............+++++
Fri Apr  7 09:34:33 2023 daemon.err uhttpd[2825]: writing new private key to '/tmp/ovpn-client-mizjmopajkdtwgy/keys/easy-rsa-4490.iFHoBk/tmp.IccbCJ'
Fri Apr  7 09:34:33 2023 daemon.err uhttpd[2825]: -----
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: Using configuration from /tmp/ovpn-client-mizjmopajkdtwgy/keys/easy-rsa-4490.iFHoBk/tmp.hmBpOL
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: Check that the request matches the signature
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: Signature ok
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: The Subject's Distinguished Name is as follows
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: countryName           :PRINTABLE:'??'
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: stateOrProvinceName   :ASN.1 12:'UnknownProvince'
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: localityName          :ASN.1 12:'UnknownCity'
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: organizationName      :ASN.1 12:'UnknownOrg'
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: organizationalUnitName:ASN.1 12:'UnknownOrgUnit'
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: commonName            :ASN.1 12:'client1'
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: emailAddress          :IA5STRING:'client1@hjubltdxqtqymmw.com'
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: Certificate is to be certified until Dec 27 07:34:34 2037 GMT (5378 days)
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]:
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: Write out database with 1 new entries
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: Data Base Updated
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: Using configuration from /tmp/ovpn-client-mizjmopajkdtwgy/keys/easy-rsa-4546.cEaKFL/tmp.fcJDEM
Fri Apr  7 09:34:34 2023 daemon.err uhttpd[2825]: tr: write error: Broken pipe
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Interface 'lan' is now down
Fri Apr  7 09:34:38 2023 kern.info kernel: [59395.775308] br-lan: port 1(eth0.1) entered disabled state
Fri Apr  7 09:34:38 2023 kern.info kernel: [59395.807400] device eth0.1 left promiscuous mode
Fri Apr  7 09:34:38 2023 kern.info kernel: [59395.812243] br-lan: port 1(eth0.1) entered disabled state
Fri Apr  7 09:34:38 2023 kern.info kernel: [59395.858055] device wlan1-1 left promiscuous mode
Fri Apr  7 09:34:38 2023 kern.info kernel: [59395.862960] br-lan: port 2(wlan1-1) entered disabled state
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Interface 'lan' is disabled
Fri Apr  7 09:34:38 2023 daemon.notice netifd: VLAN 'eth0.1' link is down
Fri Apr  7 09:34:38 2023 daemon.notice netifd: bridge 'br-lan' link is down
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Interface 'lan' has link connectivity loss
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Interface 'loopback' is now down
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Interface 'loopback' is disabled
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Network device 'lo' link is down
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Interface 'loopback' has link connectivity loss
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Interface 'wan6' is now down
Fri Apr  7 09:34:38 2023 kern.info kernel: [59396.533921] device eth0 left promiscuous mode
Fri Apr  7 09:34:38 2023 kern.info kernel: [59396.563983] eth0: link down
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Interface 'wan6' is disabled
Fri Apr  7 09:34:38 2023 daemon.notice netifd: VLAN 'eth0.2' link is down
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Fri Apr  7 09:34:38 2023 daemon.notice netifd: wwan (2696): udhcpc: received SIGTERM
Fri Apr  7 09:34:38 2023 daemon.notice netifd: wwan (2696): udhcpc: unicasting a release of 192.168.0.34 to 192.168.0.180
Fri Apr  7 09:34:38 2023 daemon.notice netifd: wwan (2696): udhcpc: sending release
Fri Apr  7 09:34:38 2023 daemon.notice netifd: wwan (2696): udhcpc: entering released state
Fri Apr  7 09:34:38 2023 daemon.notice netifd: Network device 'eth0' link is down
Fri Apr  7 09:34:39 2023 daemon.notice netifd: Wireless device 'radio0' is now down
Fri Apr  7 09:34:39 2023 daemon.notice hostapd: Remove interface 'wlan1-1'
Fri Apr  7 09:34:39 2023 daemon.notice hostapd: wlan1-1: interface state ENABLED->DISABLED
Fri Apr  7 09:34:39 2023 daemon.notice hostapd: wlan1-1: AP-DISABLED
Fri Apr  7 09:34:39 2023 daemon.notice hostapd: wlan1-1: CTRL-EVENT-TERMINATING
Fri Apr  7 09:34:39 2023 daemon.notice hostapd: nl80211: deinit ifname=wlan1-1 disabled_11b_rates=0
Fri Apr  7 09:34:39 2023 daemon.notice netifd: wwan (2696): Command failed: ubus call network.interface notify_proto { "action": 0, "link-up": false, "keep": false, "interface": "wwan" } (Permission denied)
Fri Apr  7 09:34:39 2023 daemon.notice netifd: Interface 'wwan' is now down
Fri Apr  7 09:34:39 2023 daemon.notice netifd: Interface 'wwan' is disabled
Fri Apr  7 09:34:39 2023 daemon.notice hostapd: nl80211: Failed to remove interface wlan1-1 from bridge br-lan: No such device
Fri Apr  7 09:34:42 2023 user.notice : Added device handler type: bonding
Fri Apr  7 09:34:42 2023 user.notice : Added device handler type: 8021ad
Fri Apr  7 09:34:42 2023 user.notice : Added device handler type: 8021q
Fri Apr  7 09:34:42 2023 user.notice : Added device handler type: macvlan
Fri Apr  7 09:34:42 2023 user.notice : Added device handler type: veth
Fri Apr  7 09:34:42 2023 user.notice : Added device handler type: bridge
Fri Apr  7 09:34:42 2023 user.notice : Added device handler type: Network device
Fri Apr  7 09:34:42 2023 user.notice : Added device handler type: tunnel
Fri Apr  7 09:34:47 2023 kern.info kernel: [59405.247011] eth0: link up (1000Mbps/Full duplex)
Fri Apr  7 09:34:47 2023 kern.info kernel: [59405.251816] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Fri Apr  7 09:34:47 2023 kern.info kernel: [59405.265514] br-lan: port 1(eth0.1) entered blocking state
Fri Apr  7 09:34:47 2023 kern.info kernel: [59405.271103] br-lan: port 1(eth0.1) entered disabled state
Fri Apr  7 09:34:47 2023 kern.info kernel: [59405.276993] device eth0.1 entered promiscuous mode
Fri Apr  7 09:34:47 2023 kern.info kernel: [59405.282154] device eth0 entered promiscuous mode
Fri Apr  7 09:34:47 2023 kern.info kernel: [59405.315228] br-lan: port 1(eth0.1) entered blocking state
Fri Apr  7 09:34:47 2023 kern.info kernel: [59405.320815] br-lan: port 1(eth0.1) entered forwarding state
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'lan' is enabled
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'lan' is setting up now
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'lan' is now up
Fri Apr  7 09:34:47 2023 daemon.notice netifd: bridge 'br-lan' link is up
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'lan' has link connectivity
Fri Apr  7 09:34:47 2023 daemon.notice netifd: VLAN 'eth0.1' link is up
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'loopback' is enabled
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'loopback' is setting up now
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'loopback' is now up
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'wan6' is enabled
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Network device 'eth0' link is up
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Network device 'lo' link is up
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'loopback' has link connectivity
Fri Apr  7 09:34:47 2023 daemon.notice netifd: VLAN 'eth0.2' link is up
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'wan6' has link connectivity
Fri Apr  7 09:34:47 2023 daemon.notice netifd: Interface 'wan6' is setting up now
Fri Apr  7 09:34:48 2023 kern.info kernel: [59406.264959] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Fri Apr  7 09:34:48 2023 daemon.err odhcp6c[5527]: Failed to send RS (Address not available)
Fri Apr  7 09:34:49 2023 daemon.err odhcp6c[5527]: Failed to send SOLICIT message to ff02::1:2 (Address not available)
Fri Apr  7 09:34:51 2023 daemon.notice netifd: Wireless device 'radio0' is now up
Fri Apr  7 09:34:52 2023 daemon.notice netifd: radio1 (5459): RTNETLINK answers: Resource busy
Fri Apr  7 09:34:54 2023 daemon.err uhttpd[2825]: Error: There is no such init script like 'miniupnpd'.
Fri Apr  7 09:34:54 2023 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Fri Apr  7 09:34:54 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1-1) --> new PHY
Fri Apr  7 09:34:54 2023 kern.info kernel: [59412.361516] br-lan: port 2(wlan1-1) entered blocking state
Fri Apr  7 09:34:54 2023 kern.info kernel: [59412.367269] br-lan: port 2(wlan1-1) entered disabled state
Fri Apr  7 09:34:54 2023 kern.info kernel: [59412.373213] device wlan1-1 entered promiscuous mode
Fri Apr  7 09:34:54 2023 daemon.notice hostapd: wlan1-1: interface state UNINITIALIZED->COUNTRY_UPDATE
Fri Apr  7 09:34:54 2023 user.info usteer: Creating local node hostapd.wlan1-1
Fri Apr  7 09:34:55 2023 daemon.notice hostapd: wlan1-1: interface state COUNTRY_UPDATE->ENABLED
Fri Apr  7 09:34:55 2023 daemon.notice hostapd: wlan1-1: AP-ENABLED
Fri Apr  7 09:34:55 2023 user.info usteer: Found nl80211 phy on wdev hostapd.wlan1-1, ssid=
Fri Apr  7 09:34:55 2023 user.info usteer: Connecting to local node hostapd.wlan1-1
Fri Apr  7 09:34:56 2023 daemon.notice netifd: radio1 (5459): sh: out of range
Fri Apr  7 09:34:56 2023 daemon.notice netifd: Wireless device 'radio1' is now up
Fri Apr  7 09:34:56 2023 daemon.notice netifd: Network device 'wlan1' link is up
Fri Apr  7 09:34:56 2023 daemon.notice netifd: Interface 'wwan' is enabled
Fri Apr  7 09:34:56 2023 daemon.notice netifd: Interface 'wwan' has link connectivity
Fri Apr  7 09:34:56 2023 daemon.notice netifd: Interface 'wwan' is setting up now
Fri Apr  7 09:34:56 2023 daemon.notice netifd: wwan (6249): udhcpc: started, v1.35.0
Fri Apr  7 09:34:56 2023 daemon.err uhttpd[2825]: ping: sendto: Network unreachable
Fri Apr  7 09:34:56 2023 daemon.notice netifd: wwan (6249): udhcpc: broadcasting discover
Fri Apr  7 09:34:56 2023 daemon.notice netifd: wwan (6249): udhcpc: broadcasting select for 192.168.0.34, server 192.168.0.180
Fri Apr  7 09:34:57 2023 daemon.notice netifd: wwan (6249): udhcpc: lease of 192.168.0.34 obtained from 192.168.0.180, lease time 43200
Fri Apr  7 09:34:57 2023 daemon.err uhttpd[2825]: Command failed: ubus call service delete { "name": "openvpn" } (Not found)
Fri Apr  7 09:34:57 2023 daemon.notice netifd: Interface 'wwan' is now up
Fri Apr  7 09:34:57 2023 daemon.warn openvpn(custom_config)[6344]: --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: OpenVPN 2.5.3 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: net_route_v4_best_gw query: dst 0.0.0.0
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: net_route_v4_best_gw result: via 192.168.0.180 dev wlan1
Fri Apr  7 09:34:57 2023 daemon.warn openvpn(custom_config)[6344]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Fri Apr  7 09:34:57 2023 daemon.warn openvpn(custom_config)[6344]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: Diffie-Hellman initialized with 1024 bit key
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: CRL: loaded 1 CRLs from file /etc/openvpn/crl.pem
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: TUN/TAP device tun0 opened
Fri Apr  7 09:34:57 2023 daemon.notice openvpn(custom_config)[6344]: net_iface_mtu_set: mtu 1500 for tun0
Fri Apr  7 09:34:58 2023 daemon.notice openvpn(custom_config)[6344]: net_iface_up: set tun0 up
Fri Apr  7 09:34:58 2023 daemon.notice openvpn(custom_config)[6344]: net_addr_v4_add: 10.8.0.1/24 dev tun0
Fri Apr  7 09:34:58 2023 daemon.notice openvpn(custom_config)[6344]: /usr/libexec/openvpn-hotplug up custom_config tun0 1500 1621 10.8.0.1 255.255.255.0 init
Fri Apr  7 09:34:59 2023 user.notice root: openvpn up script called
Fri Apr  7 09:34:59 2023 daemon.warn openvpn(custom_config)[6344]: Could not determine IPv4/IPv6 protocol. Using AF_INET
Fri Apr  7 09:34:59 2023 daemon.notice openvpn(custom_config)[6344]: Socket Buffers: R=[180224->180224] S=[180224->180224]
Fri Apr  7 09:34:59 2023 daemon.notice openvpn(custom_config)[6344]: UDPv4 link local (bound): [AF_INET][undef]:1194
Fri Apr  7 09:34:59 2023 daemon.notice openvpn(custom_config)[6344]: UDPv4 link remote: [AF_UNSPEC]
Fri Apr  7 09:34:59 2023 daemon.notice openvpn(custom_config)[6344]: MULTI: multi_init called, r=256 v=256
Fri Apr  7 09:34:59 2023 daemon.notice openvpn(custom_config)[6344]: Initialization Sequence Completed
Fri Apr  7 09:35:00 2023 daemon.err uhttpd[2825]: sh: write error: Broken pipe
Fri Apr  7 09:35:13 2023 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  7 09:35:51 2023 user.notice firewall: Reloading firewall due to ifup of wwan (wlan1)
Fri Apr  7 09:35:54 2023 user.notice relayd: Assigning 192.168.0.34 to bridge interface
Fri Apr  7 09:35:54 2023 user.notice relayd: Reloading relayd due to ifup of wwan (wlan1)
Fri Apr  7 09:36:13 2023 daemon.notice hostapd: handle_probe_req: send failed
Fri Apr  7 09:36:53 2023 authpriv.info dropbear[7643]: Exit (root) from <192.168.0.22:56822>: Keepalive timeout
Fri Apr  7 09:37:13 2023 daemon.notice hostapd: handle_probe_req: send failed

Lantis
Moderator
Posts: 6753
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by Lantis »

Ok that helps thanks.
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

Lantis
Moderator
Posts: 6753
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by Lantis »

I've pushed a fix for the server generation with no clients specified.
Also found another bug with certificate revoking which i squashed.
Did not have time to look at the bug you saw with both ciphers, will check that tomorrow.
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

Lantis
Moderator
Posts: 6753
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by Lantis »

ektus wrote:
Fri Apr 07, 2023 3:46 am
Performed yet another try, this time with "AES-CBC 256bit" unticked and only "AES-GCM 256bit" active. Seems to have worked this time, after only 57 seconds I got a running and connected OpenVPN Server. Seems like the "CBC" config is troublesome.
With further testing, i found no trouble with CBC, or with having more than 1 cipher selected.
I would suggest clearing your browser cache to make sure that the JS that handles the new cipher selection is doing the right thing.

Unless you can provide more information, it is either related to cached scripts or a different error that I can't reproduce.
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

ektus
Posts: 243
Joined: Sun Aug 11, 2013 2:26 am
Location: Germany

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by ektus »

I don't know what's happening here, but was able to reproduce the error with both CBC-256 and GCM-256 ticked. Stop Server, delete keys and try again with CBC-256 alone: Success.

Stop server again, delete keys, tick both, save: errors out. There's no way to clear the cache, and I didn't change the location either. Just staying on the OpenVPN config page. Browser in use: Firefox 111.0.1 (64-Bit).

Code: Select all

Sat Apr  8 13:41:20 2023 daemon.err uhttpd[2825]: Generating DH parameters, 1024 bit long safe prime, generator 2
Sat Apr  8 13:41:20 2023 daemon.err uhttpd[2825]: This is going to take a long time
Sat Apr  8 13:41:43 2023 user.notice firewall: Reloading firewall due to ifup of wwan (wlan1)
Sat Apr  8 13:41:50 2023 user.notice relayd: Assigning 192.168.0.34 to bridge interface
Sat Apr  8 13:41:52 2023 user.notice relayd: Reloading relayd due to ifup of wwan (wlan1)
Sat Apr  8 13:42:00 2023 user.notice root: openvpn stopped, restarting
Sat Apr  8 13:42:01 2023 daemon.warn openvpn(custom_config)[12487]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:01 2023 daemon.err openvpn(custom_config)[12487]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:01 2023 daemon.warn openvpn(custom_config)[12487]: Use --help for more information.
Sat Apr  8 13:42:06 2023 daemon.warn openvpn(custom_config)[12513]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:06 2023 daemon.err openvpn(custom_config)[12513]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:06 2023 daemon.warn openvpn(custom_config)[12513]: Use --help for more information.
Sat Apr  8 13:42:11 2023 daemon.warn openvpn(custom_config)[12515]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:11 2023 daemon.err openvpn(custom_config)[12515]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:11 2023 daemon.warn openvpn(custom_config)[12515]: Use --help for more information.
Sat Apr  8 13:42:14 2023 daemon.notice hostapd: handle_probe_req: send failed
Sat Apr  8 13:42:16 2023 daemon.warn openvpn(custom_config)[12517]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:16 2023 daemon.err openvpn(custom_config)[12517]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:16 2023 daemon.warn openvpn(custom_config)[12517]: Use --help for more information.
Sat Apr  8 13:42:21 2023 daemon.warn openvpn(custom_config)[12518]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:21 2023 daemon.err openvpn(custom_config)[12518]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:21 2023 daemon.warn openvpn(custom_config)[12518]: Use --help for more information.
Sat Apr  8 13:42:26 2023 daemon.warn openvpn(custom_config)[12519]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:26 2023 daemon.err openvpn(custom_config)[12519]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:26 2023 daemon.warn openvpn(custom_config)[12519]: Use --help for more information.
Sat Apr  8 13:42:31 2023 daemon.warn openvpn(custom_config)[12521]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:31 2023 daemon.err openvpn(custom_config)[12521]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:31 2023 daemon.warn openvpn(custom_config)[12521]: Use --help for more information.
Sat Apr  8 13:42:36 2023 daemon.warn openvpn(custom_config)[12523]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:36 2023 daemon.err openvpn(custom_config)[12523]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:36 2023 daemon.warn openvpn(custom_config)[12523]: Use --help for more information.
Sat Apr  8 13:42:41 2023 daemon.warn openvpn(custom_config)[12526]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:41 2023 daemon.err openvpn(custom_config)[12526]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:41 2023 daemon.warn openvpn(custom_config)[12526]: Use --help for more information.
Sat Apr  8 13:42:46 2023 daemon.warn openvpn(custom_config)[12527]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:46 2023 daemon.err openvpn(custom_config)[12527]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:46 2023 daemon.warn openvpn(custom_config)[12527]: Use --help for more information.
Sat Apr  8 13:42:51 2023 daemon.warn openvpn(custom_config)[12528]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:51 2023 daemon.err openvpn(custom_config)[12528]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:51 2023 daemon.warn openvpn(custom_config)[12528]: Use --help for more information.
Sat Apr  8 13:42:56 2023 daemon.warn openvpn(custom_config)[12529]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:42:56 2023 daemon.err openvpn(custom_config)[12529]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:42:56 2023 daemon.warn openvpn(custom_config)[12529]: Use --help for more information.
Sat Apr  8 13:43:00 2023 user.notice root: openvpn stopped, restarting
Sat Apr  8 13:43:01 2023 daemon.warn openvpn(custom_config)[12585]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:43:01 2023 daemon.err openvpn(custom_config)[12585]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:43:01 2023 daemon.warn openvpn(custom_config)[12585]: Use --help for more information.
Sat Apr  8 13:43:06 2023 daemon.warn openvpn(custom_config)[12612]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:43:06 2023 daemon.err openvpn(custom_config)[12612]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:43:06 2023 daemon.warn openvpn(custom_config)[12612]: Use --help for more information.
Sat Apr  8 13:43:11 2023 daemon.warn openvpn(custom_config)[12613]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:43:11 2023 daemon.err openvpn(custom_config)[12613]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:43:11 2023 daemon.warn openvpn(custom_config)[12613]: Use --help for more information.
Sat Apr  8 13:43:14 2023 daemon.notice hostapd: handle_probe_req: send failed
Sat Apr  8 13:43:16 2023 daemon.warn openvpn(custom_config)[12615]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:43:16 2023 daemon.err openvpn(custom_config)[12615]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:43:16 2023 daemon.warn openvpn(custom_config)[12615]: Use --help for more information.
Sat Apr  8 13:43:21 2023 daemon.warn openvpn(custom_config)[12617]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:43:21 2023 daemon.err openvpn(custom_config)[12617]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:43:21 2023 daemon.warn openvpn(custom_config)[12617]: Use --help for more information.
Sat Apr  8 13:43:26 2023 daemon.warn openvpn(custom_config)[12620]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:43:26 2023 daemon.err openvpn(custom_config)[12620]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:43:26 2023 daemon.warn openvpn(custom_config)[12620]: Use --help for more information.
Sat Apr  8 13:43:31 2023 daemon.warn openvpn(custom_config)[12621]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:43:31 2023 daemon.err openvpn(custom_config)[12621]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:43:31 2023 daemon.warn openvpn(custom_config)[12621]: Use --help for more information.
Sat Apr  8 13:43:34 2023 daemon.notice hostapd: handle_probe_req: send failed
Sat Apr  8 13:43:36 2023 daemon.warn openvpn(custom_config)[12622]: Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
Sat Apr  8 13:43:36 2023 daemon.err openvpn(custom_config)[12622]: Options error: You must define TUN/TAP device (--dev)
Sat Apr  8 13:43:36 2023 daemon.warn openvpn(custom_config)[12622]: Use --help for more information.
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: ....................................................................+.......................................................................................................+.....+....................................+.................+..............+............................................................+................................+.............................................................................................................................................+...................................+.+........................................+........................+.........................+..................................+......................................................................+......................+.......................................+...............+.............+...........+.....+....+....................................................+.........................................................................+.........................
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: .uci: Entry not found
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: .uci: Entry not found
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: .uci: Entry not found
Sat Apr  8 13:43:38 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:39 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:39 2023 daemon.err uhttpd[2825]: .uci: Entry not found
Sat Apr  8 13:43:39 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:39 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:39 2023 daemon.err uhttpd[2825]: .uci: Entry not found
Sat Apr  8 13:43:39 2023 daemon.err uhttpd[2825]: uci: Entry not found
Sat Apr  8 13:43:46 2023 daemon.notice netifd: Interface 'lan' is now down
Sat Apr  8 13:43:47 2023 kern.info kernel: [160745.010053] br-lan: port 1(eth0.1) entered disabled state
Sat Apr  8 13:43:47 2023 kern.info kernel: [160745.057598] device eth0.1 left promiscuous mode
Sat Apr  8 13:43:47 2023 kern.info kernel: [160745.062540] br-lan: port 1(eth0.1) entered disabled state
Sat Apr  8 13:43:47 2023 kern.info kernel: [160745.116812] device wlan1-1 left promiscuous mode
Sat Apr  8 13:43:47 2023 kern.info kernel: [160745.121800] br-lan: port 2(wlan1-1) entered disabled state
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Interface 'lan' is disabled
Sat Apr  8 13:43:47 2023 daemon.notice netifd: VLAN 'eth0.1' link is down
Sat Apr  8 13:43:47 2023 daemon.notice netifd: bridge 'br-lan' link is down
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Interface 'lan' has link connectivity loss
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Interface 'loopback' is now down
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Interface 'loopback' is disabled
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Network device 'lo' link is down
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Interface 'loopback' has link connectivity loss
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Interface 'wan6' is now down
Sat Apr  8 13:43:47 2023 kern.info kernel: [160745.866929] device eth0 left promiscuous mode
Sat Apr  8 13:43:47 2023 kern.info kernel: [160745.916447] eth0: link down
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Interface 'wan6' is disabled
Sat Apr  8 13:43:47 2023 daemon.notice netifd: VLAN 'eth0.2' link is down
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Sat Apr  8 13:43:47 2023 daemon.notice netifd: wwan (11051): udhcpc: received SIGTERM
Sat Apr  8 13:43:47 2023 daemon.notice netifd: wwan (11051): udhcpc: unicasting a release of 192.168.0.34 to 192.168.0.180
Sat Apr  8 13:43:47 2023 daemon.notice netifd: wwan (11051): udhcpc: sending release
Sat Apr  8 13:43:47 2023 daemon.notice netifd: wwan (11051): udhcpc: entering released state
Sat Apr  8 13:43:47 2023 daemon.notice netifd: Network device 'eth0' link is down
Sat Apr  8 13:43:48 2023 daemon.notice netifd: Wireless device 'radio0' is now down
Sat Apr  8 13:43:48 2023 daemon.notice netifd: wwan (11051): Command failed: ubus call network.interface notify_proto { "action": 0, "link-up": false, "keep": false, "interface": "wwan" } (Permission denied)
Sat Apr  8 13:43:48 2023 daemon.notice netifd: Interface 'wwan' is now down
Sat Apr  8 13:43:48 2023 daemon.notice netifd: Interface 'wwan' is disabled
Sat Apr  8 13:43:48 2023 daemon.notice hostapd: Remove interface 'wlan1-1'
Sat Apr  8 13:43:48 2023 daemon.notice hostapd: wlan1-1: interface state ENABLED->DISABLED
Sat Apr  8 13:43:48 2023 daemon.notice hostapd: wlan1-1: AP-DISABLED
Sat Apr  8 13:43:48 2023 daemon.notice hostapd: wlan1-1: CTRL-EVENT-TERMINATING
Sat Apr  8 13:43:48 2023 daemon.notice hostapd: nl80211: deinit ifname=wlan1-1 disabled_11b_rates=0
Sat Apr  8 13:43:49 2023 daemon.notice hostapd: nl80211: Failed to remove interface wlan1-1 from bridge br-lan: No such device
Sat Apr  8 13:43:52 2023 user.notice : Added device handler type: bonding
Sat Apr  8 13:43:52 2023 user.notice : Added device handler type: 8021ad
Sat Apr  8 13:43:52 2023 user.notice : Added device handler type: 8021q
Sat Apr  8 13:43:52 2023 user.notice : Added device handler type: macvlan
Sat Apr  8 13:43:52 2023 user.notice : Added device handler type: veth
Sat Apr  8 13:43:52 2023 user.notice : Added device handler type: bridge
Sat Apr  8 13:43:52 2023 user.notice : Added device handler type: Network device
Sat Apr  8 13:43:52 2023 user.notice : Added device handler type: tunnel
Sat Apr  8 13:44:00 2023 user.notice root: openvpn stopped, restarting
Sat Apr  8 13:44:00 2023 user.notice /usr/lib/gargoyle/ping_watchdog: Run custom script
Sat Apr  8 13:44:01 2023 kern.info kernel: [160759.541195] eth0: link up (1000Mbps/Full duplex)
Sat Apr  8 13:44:01 2023 kern.info kernel: [160759.570218] br-lan: port 1(eth0.1) entered blocking state
Sat Apr  8 13:44:01 2023 kern.info kernel: [160759.575944] br-lan: port 1(eth0.1) entered disabled state
Sat Apr  8 13:44:01 2023 kern.info kernel: [160759.581864] device eth0.1 entered promiscuous mode
Sat Apr  8 13:44:01 2023 kern.info kernel: [160759.586940] device eth0 entered promiscuous mode
Sat Apr  8 13:44:01 2023 kern.info kernel: [160759.610935] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Sat Apr  8 13:44:01 2023 kern.info kernel: [160759.685556] br-lan: port 1(eth0.1) entered blocking state
Sat Apr  8 13:44:01 2023 kern.info kernel: [160759.691236] br-lan: port 1(eth0.1) entered forwarding state
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'lan' is enabled
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'lan' is setting up now
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'lan' is now up
Sat Apr  8 13:44:01 2023 daemon.notice netifd: bridge 'br-lan' link is up
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'lan' has link connectivity
Sat Apr  8 13:44:01 2023 daemon.notice netifd: VLAN 'eth0.1' link is up
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'loopback' is enabled
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'loopback' is setting up now
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'loopback' is now up
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'wan6' is enabled
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Network device 'eth0' link is up
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Network device 'lo' link is up
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'loopback' has link connectivity
Sat Apr  8 13:44:01 2023 daemon.notice netifd: VLAN 'eth0.2' link is up
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'wan6' has link connectivity
Sat Apr  8 13:44:01 2023 daemon.notice netifd: Interface 'wan6' is setting up now
Sat Apr  8 13:44:02 2023 kern.info kernel: [160760.534663] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Sat Apr  8 13:44:02 2023 daemon.err odhcp6c[13659]: Failed to send RS (Address not available)
Sat Apr  8 13:44:07 2023 daemon.notice netifd: radio1 (13589): RTNETLINK answers: Resource busy
Sat Apr  8 13:44:09 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy wlan1-1) --> new PHY
Sat Apr  8 13:44:09 2023 kern.info kernel: [160767.898659] br-lan: port 2(wlan1-1) entered blocking state
Sat Apr  8 13:44:09 2023 kern.info kernel: [160767.904426] br-lan: port 2(wlan1-1) entered disabled state
Sat Apr  8 13:44:09 2023 kern.info kernel: [160767.910511] device wlan1-1 entered promiscuous mode
Sat Apr  8 13:44:09 2023 daemon.notice hostapd: wlan1-1: interface state UNINITIALIZED->COUNTRY_UPDATE
Sat Apr  8 13:44:10 2023 user.info usteer: Creating local node hostapd.wlan1-1
Sat Apr  8 13:44:10 2023 daemon.notice hostapd: wlan1-1: interface state COUNTRY_UPDATE->ENABLED
Sat Apr  8 13:44:10 2023 daemon.notice hostapd: wlan1-1: AP-ENABLED
Sat Apr  8 13:44:10 2023 user.info usteer: Found nl80211 phy on wdev hostapd.wlan1-1, ssid=
Sat Apr  8 13:44:10 2023 user.info usteer: Connecting to local node hostapd.wlan1-1
Sat Apr  8 13:44:10 2023 daemon.err uhttpd[2825]: .................................................................................................................+...........................................................+.............+...........+.......................+.....................Error: There is no such init script like 'miniupnpd'.
Sat Apr  8 13:44:10 2023 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Sat Apr  8 13:44:11 2023 daemon.notice netifd: radio1 (13589): sh: out of range
Sat Apr  8 13:44:11 2023 daemon.notice netifd: Wireless device 'radio1' is now down
Sat Apr  8 13:44:13 2023 daemon.err uhttpd[2825]: ....+..............ping: sendto: Network unreachable
Sat Apr  8 13:44:13 2023 daemon.err uhttpd[2825]: sh: write error: Broken pipe
Sat Apr  8 13:44:14 2023 daemon.notice hostapd: handle_probe_req: send failed
Sat Apr  8 13:44:15 2023 daemon.notice netifd: radio1 (14288): RTNETLINK answers: Resource busy
Sat Apr  8 13:44:16 2023 daemon.notice netifd: Wireless device 'radio0' is now down
Sat Apr  8 13:44:17 2023 daemon.notice netifd: radio1 (14288): sh: out of range
Sat Apr  8 13:44:18 2023 daemon.notice netifd: Wireless device 'radio1' is now up
Sat Apr  8 13:44:18 2023 daemon.notice netifd: Network device 'wlan1' link is up
Sat Apr  8 13:44:18 2023 daemon.notice netifd: Interface 'wwan' is enabled
Sat Apr  8 13:44:18 2023 daemon.notice netifd: Interface 'wwan' has link connectivity
Sat Apr  8 13:44:18 2023 daemon.notice netifd: Interface 'wwan' is setting up now
Sat Apr  8 13:44:18 2023 daemon.notice netifd: Wireless device 'radio0' is now up
Sat Apr  8 13:44:18 2023 daemon.notice netifd: wwan (14604): udhcpc: started, v1.35.0
Sat Apr  8 13:44:18 2023 daemon.notice netifd: wwan (14604): udhcpc: broadcasting discover
Sat Apr  8 13:44:18 2023 daemon.notice netifd: wwan (14604): udhcpc: broadcasting select for 192.168.0.34, server 192.168.0.180
Sat Apr  8 13:44:18 2023 daemon.notice netifd: wwan (14604): udhcpc: lease of 192.168.0.34 obtained from 192.168.0.180, lease time 43200
Sat Apr  8 13:44:19 2023 daemon.notice netifd: Interface 'wwan' is now up
Subsequent try with CBC alone did fail again. Reboot router, try CBC alone and fail. Stop defunct server, clear keys, try with GCM alone -> yet another success. Something's fishy here, but if you can't reproduce, there's little to be done. Let's see if I can get it up and running on the main router...

ektus
Posts: 243
Joined: Sun Aug 11, 2013 2:26 am
Location: Germany

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by ektus »

Even after stopping the server and clearing all keys, the list with the configured clients remains populated. On the test router with the server running, the IP displayed for Client1 was 10.0.8.3, but when editing it's settings it is shown as Client2 and 10.0.8.2 (server is default 10.0.8.1). Trying to delete the client and create a new one... no luck, key generation failed again. Trying to delete the client and then disable the server... Okay, now the client was gone. But creating new keys failed multiple times, even with just one cipher and one freshly created client.

Tried on the main router now, multiple times with just one cipher and one client, 100% failure rate :(

ektus
Posts: 243
Joined: Sun Aug 11, 2013 2:26 am
Location: Germany

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by ektus »

Okay, one walk and one hour later, I was successful in creating new keys on both routers (both GCM-256 only). The only thing I did differently: restart the browser, delete cookies. Seems there really is some JavaScript caching or whatnot in the running session messing up the creation, as simply reloading the page (with Shift+reload) didn't help. The latter I had done numerous times. Now to creating the clients and distributing the credentials.

ispyisail
Moderator
Posts: 5185
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by ispyisail »

Just installed on Raspberry Pi 3

Works out of the box

Built-in ethernet port = LAN
USB dongle = WAN

Image

Openwrt does not work out of the box with my USB dongle (suspect I would need a switch?)

Lantis
Moderator
Posts: 6753
Joined: Mon Jan 05, 2015 5:33 am
Location: Australia

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by Lantis »

Yes you have @pythonic to thank for that :)
http://lantisproject.com/downloads/gargoyle_ispyisail.php for the latest releases
Please be respectful when posting. I do this in my free time on a volunteer basis.

ispyisail
Moderator
Posts: 5185
Joined: Mon Apr 06, 2009 3:15 am
Location: New Zealand

Re: Experimental Gargoyle 1.15.x beta 20230124

Post by ispyisail »

Thanks @pythonic

Post Reply