NL99 5 Posted ... I am trying to get airvpn running on my new opnsense install but no success so far. This is the guide i followed and quite some options in the setup menu are not in the guide. Maybe because this was written for an older opnsense version. I did exactly what was in the guide and nothing more. Maybe the point is that i`m behind a non-bridged modemrouter? I forwarded port 443 udp and tcp to the opnsense wan (192.168.0.20). Everything after the modemrouter is 192.168.0.x and the lan behind the opnsense system gets 192.168.1.x The guide says, at step 5 the status should be up. This is the log i get: Feb 25 02:40:45 openvpn[86654]: MANAGEMENT: Client disconnectedFeb 25 02:40:45 openvpn[86654]: MANAGEMENT: CMD 'state 1'Feb 25 02:40:45 openvpn[86654]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sockFeb 25 02:40:15 openvpn[86654]: MANAGEMENT: Client disconnectedFeb 25 02:40:15 openvpn[86654]: MANAGEMENT: CMD 'state 1'Feb 25 02:40:15 openvpn[86654]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sockFeb 25 02:40:14 openvpn[86654]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgFeb 25 02:40:14 openvpn[86654]: VERIFY EKU OKFeb 25 02:40:14 openvpn[86654]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationFeb 25 02:40:14 openvpn[86654]: Validating certificate extended key usageFeb 25 02:40:14 openvpn[86654]: VERIFY KU OKFeb 25 02:40:14 openvpn[86654]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgFeb 25 02:40:14 openvpn[86654]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=c0b00d21 453258cbFeb 25 02:40:14 openvpn[86654]: UDP link remote: [AF_INET]194.187.251.154:443Feb 25 02:40:14 openvpn[86654]: UDP link local (bound): [AF_INET]192.168.0.20:0Feb 25 02:40:14 openvpn[86654]: Socket Buffers: R=[42080->42080] S=[57344->57344]Feb 25 02:40:14 openvpn[86654]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443Feb 25 02:40:14 openvpn[86654]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationFeb 25 02:40:14 openvpn[86654]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationFeb 25 02:40:14 openvpn[86654]: NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsFeb 25 02:40:14 openvpn[86654]: MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1.sockFeb 25 02:40:14 openvpn[86616]: library versions: OpenSSL 1.0.2n 7 Dec 2017, LZO 2.10Feb 25 02:40:14 openvpn[86616]: OpenVPN 2.4.4 amd64-portbld-freebsd11.1 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jan 22 2018Feb 25 02:38:49 openvpn[68218]: SIGTERM[hard,] received, process exitingFeb 25 02:38:49 openvpn[68218]: event_wait : Interrupted system call (code=4)Feb 25 02:38:47 openvpn[68218]: MANAGEMENT: Client disconnectedFeb 25 02:38:47 openvpn[68218]: MANAGEMENT: CMD 'state 1'Feb 25 02:38:47 openvpn[68218]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sockFeb 25 02:37:59 openvpn[68218]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgFeb 25 02:37:59 openvpn[68218]: VERIFY EKU OKFeb 25 02:37:59 openvpn[68218]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationFeb 25 02:37:59 openvpn[68218]: Validating certificate extended key usageFeb 25 02:37:59 openvpn[68218]: VERIFY KU OKFeb 25 02:37:59 openvpn[68218]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgFeb 25 02:37:59 openvpn[68218]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=37214535 dc5a7495Feb 25 02:37:59 openvpn[68218]: UDP link remote: [AF_INET]194.187.251.154:443Feb 25 02:37:59 openvpn[68218]: UDP link local (bound): [AF_INET]192.168.0.20:0Feb 25 02:37:59 openvpn[68218]: Socket Buffers: R=[42080->42080] S=[57344->57344]Feb 25 02:37:59 openvpn[68218]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443Feb 25 02:37:59 openvpn[68218]: NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsFeb 25 02:37:49 openvpn[68218]: Restart pause, 10 second(s)Feb 25 02:37:49 openvpn[68218]: SIGUSR1[soft,tls-error] received, process restartingFeb 25 02:37:49 openvpn[68218]: TLS Error: TLS handshake failedFeb 25 02:37:49 openvpn[68218]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)Feb 25 02:37:35 openvpn[68218]: MANAGEMENT: Client disconnectedFeb 25 02:37:35 openvpn[68218]: MANAGEMENT: CMD 'state 1'Feb 25 02:37:35 openvpn[68218]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sockFeb 25 02:36:49 openvpn[68218]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgFeb 25 02:36:49 openvpn[68218]: VERIFY EKU OKFeb 25 02:36:49 openvpn[68218]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Little later: Feb 25 03:00:12 openvpn[86654]: MANAGEMENT: Client disconnectedFeb 25 03:00:12 openvpn[86654]: MANAGEMENT: CMD 'state 1'Feb 25 03:00:12 openvpn[86654]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sockFeb 25 02:55:44 openvpn[86654]: Restart pause, 300 second(s)Feb 25 02:55:44 openvpn[86654]: SIGUSR1[soft,ping-restart] received, process restartingFeb 25 02:55:44 openvpn[86654]: [server] Inactivity timeout (--ping-restart), restartingFeb 25 02:54:44 openvpn[86654]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgFeb 25 02:54:44 openvpn[86654]: VERIFY EKU OKFeb 25 02:54:44 openvpn[86654]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationFeb 25 02:54:44 openvpn[86654]: Validating certificate extended key usageFeb 25 02:54:44 openvpn[86654]: VERIFY KU OKFeb 25 02:54:44 openvpn[86654]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgFeb 25 02:54:44 openvpn[86654]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=263f3cd0 cd08c14bFeb 25 02:54:44 openvpn[86654]: UDP link remote: [AF_INET]194.187.251.154:443Feb 25 02:54:44 openvpn[86654]: UDP link local (bound): [AF_INET]192.168.0.20:0Feb 25 02:54:44 openvpn[86654]: Socket Buffers: R=[42080->42080] S=[57344->57344]Feb 25 02:54:44 openvpn[86654]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443Feb 25 02:54:44 openvpn[86654]: NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsFeb 25 02:52:04 openvpn[86654]: Restart pause, 160 second(s)Feb 25 02:52:04 openvpn[86654]: SIGUSR1[soft,ping-restart] received, process restartingFeb 25 02:52:04 openvpn[86654]: [server] Inactivity timeout (--ping-restart), restartingFeb 25 02:51:04 openvpn[86654]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgFeb 25 02:51:04 openvpn[86654]: VERIFY EKU OKFeb 25 02:51:04 openvpn[86654]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationFeb 25 02:51:04 openvpn[86654]: Validating certificate extended key usageFeb 25 02:51:04 openvpn[86654]: VERIFY KU OKFeb 25 02:51:04 openvpn[86654]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgFeb 25 02:51:04 openvpn[86654]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=c6a2dfeb 08c736d9Feb 25 02:51:04 openvpn[86654]: UDP link remote: [AF_INET]194.187.251.154:443Feb 25 02:51:04 openvpn[86654]: UDP link local (bound): [AF_INET]192.168.0.20:0Feb 25 02:51:04 openvpn[86654]: Socket Buffers: R=[42080->42080] S=[57344->57344]Feb 25 02:51:04 openvpn[86654]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443Feb 25 02:51:04 openvpn[86654]: NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsFeb 25 02:49:44 openvpn[86654]: Restart pause, 80 second(s)Feb 25 02:49:44 openvpn[86654]: SIGUSR1[soft,ping-restart] received, process restartingFeb 25 02:49:44 openvpn[86654]: [server] Inactivity timeout (--ping-restart), restartingFeb 25 02:48:44 openvpn[86654]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgFeb 25 02:48:44 openvpn[86654]: VERIFY EKU OKFeb 25 02:48:44 openvpn[86654]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationFeb 25 02:48:44 openvpn[86654]: Validating certificate extended key usageFeb 25 02:48:44 openvpn[86654]: VERIFY KU OKFeb 25 02:48:44 openvpn[86654]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgFeb 25 02:48:44 openvpn[86654]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=7f656fd8 bb527714Feb 25 02:48:44 openvpn[86654]: UDP link remote: [AF_INET]194.187.251.154:443Feb 25 02:48:44 openvpn[86654]: UDP link local (bound): [AF_INET]192.168.0.20:0Feb 25 02:48:44 openvpn[86654]: Socket Buffers: R=[42080->42080] S=[57344->57344]Feb 25 02:48:44 openvpn[86654]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443Feb 25 02:48:44 openvpn[86654]: NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsFeb 25 02:48:04 openvpn[86654]: Restart pause, 40 second(s)Feb 25 02:48:04 openvpn[86654]: SIGUSR1[soft,ping-restart] received, process restarting Quote Share this post Link to post
Blade Runner 4 Posted ... Perhaps syntax is not correct? Semi-colon should be at the end of each command. i.e. persist-key; persist-tun; remote-cert-tls server; auth-nocache; IIRC persist-key and persist-tun are not required. Delete auth-nocache. Check system log and troubleshoot. System log should not have any errors. Feb 24 19:58:37 openvpn 58371 VERIFY KU OK Feb 24 19:58:37 openvpn 58371 Validating certificate extended key usage Feb 24 19:58:37 openvpn 58371 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Feb 24 19:58:37 openvpn 58371 VERIFY EKU OK Feb 24 19:58:37 openvpn 58371 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pegasus, emailAddress=info@airvpn.org Feb 24 19:58:37 openvpn 58371 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Feb 24 19:58:37 openvpn 58371 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Feb 24 19:58:37 openvpn 58371 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Feb 24 19:59:38 openvpn 56307 TLS: soft reset sec=0 bytes=623920968/-1 pkts=733779/0 Feb 24 19:59:38 openvpn 56307 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Feb 24 19:59:38 openvpn 56307 VERIFY KU OK Feb 24 19:59:38 openvpn 56307 Validating certificate extended key usage Feb 24 19:59:38 openvpn 56307 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Feb 24 19:59:38 openvpn 56307 VERIFY EKU OK Feb 24 19:59:38 openvpn 56307 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Feb 24 19:59:38 openvpn 56307 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Feb 24 19:59:38 openvpn 56307 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Feb 24 19:59:38 openvpn 56307 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Feb 24 20:25:00 openvpn 56307 MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock Feb 24 20:25:00 openvpn 56307 MANAGEMENT: CMD 'state 1' Feb 24 20:25:00 openvpn 56307 MANAGEMENT: CMD 'status 2' Feb 24 20:25:00 openvpn 56307 MANAGEMENT: Client disconnected Feb 24 20:25:00 openvpn 57462 MANAGEMENT: Client connected from /var/etc/openvpn/client2.sock Feb 24 20:25:00 openvpn 57462 MANAGEMENT: CMD 'state 1' Feb 24 20:25:00 openvpn 57462 MANAGEMENT: CMD 'status 2' Feb 24 20:25:00 openvpn 57462 MANAGEMENT: Client disconnected Feb 24 20:25:00 openvpn 58371 MANAGEMENT: Client connected from /var/etc/openvpn/client3.sock Feb 24 20:25:00 openvpn 58371 MANAGEMENT: CMD 'state 1' Feb 24 20:25:00 openvpn 58371 MANAGEMENT: CMD 'status 2' Feb 24 20:25:00 openvpn 58371 MANAGEMENT: Client disconnected Feb 24 20:25:00 openvpn 59248 MANAGEMENT: Client connected from /var/etc/openvpn/client4.sock Feb 24 20:25:00 openvpn 59248 MANAGEMENT: CMD 'state 1' Feb 24 20:25:00 openvpn 59248 MANAGEMENT: CMD 'status 2' Feb 24 20:25:00 openvpn 59248 MANAGEMENT: Client disconnected Feb 24 20:25:35 openvpn 56307 MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock Feb 24 20:25:35 openvpn 56307 MANAGEMENT: CMD 'state 1' Feb 24 20:25:35 openvpn 56307 MANAGEMENT: CMD 'status 2' Feb 24 20:25:35 openvpn 56307 MANAGEMENT: Client disconnected Feb 24 20:25:35 openvpn 57462 MANAGEMENT: Client connected from /var/etc/openvpn/client2.sock Feb 24 20:25:35 openvpn 57462 MANAGEMENT: CMD 'state 1' Feb 24 20:25:35 openvpn 57462 MANAGEMENT: CMD 'status 2' Feb 24 20:25:35 openvpn 57462 MANAGEMENT: Client disconnected Feb 24 20:25:35 openvpn 58371 MANAGEMENT: Client connected from /var/etc/openvpn/client3.sock Feb 24 20:25:35 openvpn 58371 MANAGEMENT: CMD 'state 1' Feb 24 20:25:35 openvpn 58371 MANAGEMENT: CMD 'status 2' Feb 24 20:25:35 openvpn 58371 MANAGEMENT: Client disconnected Feb 24 20:25:35 openvpn 59248 MANAGEMENT: Client connected from /var/etc/openvpn/client4.sock Feb 24 20:25:35 openvpn 59248 MANAGEMENT: CMD 'state 1' Feb 24 20:25:35 openvpn 59248 MANAGEMENT: CMD 'status 2' Feb 24 20:25:35 openvpn 59248 MANAGEMENT: Client disconnected 1 NL99 reacted to this Quote Hide Blade Runner's signature Hide all signatures Do not be afraid to fail. Share this post Link to post
NL99 5 Posted ... I made an error with "Client Certificate: Select "Userkey CA:VPNCA *In Use""After i fixed that, i get a status "up" but when i refresh the status, its down already. But there is an "Initialization Sequence Completed". A refresh of the connection status gives "up" and there is a little data transfer ~100kb up and down and it stays like that. When i follow the guide to set up alliases and rules for wan and nat there is no connection on the clients. I default the opnsense-system again and there is internet again without changing anything on the dd-wrt router behind opnsense, so i dont think its the router and it must be tunnel that is not UP or i made another error with the firewall rules. Log: Feb 25 21:42:06 openvpn[48457]: MANAGEMENT: Client disconnectedFeb 25 21:42:06 openvpn[48457]: MANAGEMENT: CMD 'status 2'Feb 25 21:42:06 openvpn[48457]: MANAGEMENT: CMD 'state 1'Feb 25 21:42:06 openvpn[48457]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sockFeb 25 21:41:57 openvpn[48457]: MANAGEMENT: Client disconnectedFeb 25 21:41:57 openvpn[48457]: MANAGEMENT: CMD 'status 2'Feb 25 21:41:57 openvpn[48457]: MANAGEMENT: CMD 'state 1'Feb 25 21:41:57 openvpn[48457]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sockFeb 25 21:40:24 openvpn[48457]: MANAGEMENT: Client disconnectedFeb 25 21:40:24 openvpn[48457]: MANAGEMENT: CMD 'status 2'Feb 25 21:40:24 openvpn[48457]: MANAGEMENT: CMD 'state 1'Feb 25 21:40:24 openvpn[48457]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sockFeb 25 21:38:22 openvpn[48457]: MANAGEMENT: Client disconnectedFeb 25 21:38:22 openvpn[48457]: MANAGEMENT: CMD 'status 2'Feb 25 21:38:22 openvpn[48457]: MANAGEMENT: CMD 'state 1'Feb 25 21:38:22 openvpn[48457]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sockFeb 25 21:37:22 openvpn[48457]: Initialization Sequence CompletedFeb 25 21:37:22 openvpn[48457]: /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0Feb 25 21:37:22 openvpn[48457]: /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0Feb 25 21:37:22 openvpn[48457]: /sbin/route add -net 194.187.251.114 192.168.0.1 255.255.255.255Feb 25 21:37:20 openvpn[48457]: /usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkup ovpnc1 1500 1557 10.4.2.17 255.255.0.0 initFeb 25 21:37:20 openvpn[48457]: /sbin/route add -net 10.4.0.0 10.4.0.1 255.255.0.0Feb 25 21:37:20 openvpn[48457]: /sbin/ifconfig ovpnc1 10.4.2.17 10.4.0.1 mtu 1500 netmask 255.255.0.0 upFeb 25 21:37:20 openvpn[48457]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0Feb 25 21:37:20 openvpn[48457]: TUN/TAP device /dev/tun1 openedFeb 25 21:37:20 openvpn[48457]: TUN/TAP device ovpnc1 exists previously, keep at program endFeb 25 21:37:20 openvpn[48457]: ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=igb1 HWADDR=90:e2:ba:2b:26:adFeb 25 21:37:20 openvpn[48457]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authenticationFeb 25 21:37:20 openvpn[48457]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit keyFeb 25 21:37:20 openvpn[48457]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authenticationFeb 25 21:37:20 openvpn[48457]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit keyFeb 25 21:37:20 openvpn[48457]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedFeb 25 21:37:20 openvpn[48457]: OPTIONS IMPORT: route-related options modifiedFeb 25 21:37:20 openvpn[48457]: OPTIONS IMPORT: route options modifiedFeb 25 21:37:20 openvpn[48457]: OPTIONS IMPORT: --ifconfig/up options modifiedFeb 25 21:37:20 openvpn[48457]: OPTIONS IMPORT: compression parms modifiedFeb 25 21:37:20 openvpn[48457]: OPTIONS IMPORT: timers and/or timeouts modifiedFeb 25 21:37:20 openvpn[48457]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.17 255.255.0.0'Feb 25 21:37:20 openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)Feb 25 21:37:15 openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)Feb 25 21:37:09 openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)Feb 25 21:37:04 openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)Feb 25 21:36:59 openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)Feb 25 21:36:54 openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)Feb 25 21:36:53 openvpn[48457]: [Columba] Peer Connection Initiated with [AF_INET]194.187.251.114:443Feb 25 21:36:53 openvpn[48457]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSAFeb 25 21:36:53 openvpn[48457]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'Feb 25 21:36:53 openvpn[48457]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1557', remote='link-mtu 1558'Feb 25 21:36:53 openvpn[48457]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Columba, emailAddress=info@airvpn.orgFeb 25 21:36:53 openvpn[48457]: VERIFY EKU OK Quote Share this post Link to post
Blade Runner 4 Posted ... My Advance Configuration follows: client;remote-cert-tls server;keysize 256;key-method 2;key-direction 1;explicit-exit-notify 5;mlock;keepalive 5 30;prng sha512 64; I use pfSense. Perhaps the above commands will resolve issues. Quote Hide Blade Runner's signature Hide all signatures Do not be afraid to fail. Share this post Link to post