Guten Abend,
habe den Formuler F1
HDF Image 6.2
OpenVPN über Menu/Netwerk/OpenVPN aktiviert und auch den automatischen Start
habe dann von meinem Anbieter eine .ovpn geladen (mehr gabs nicht dazu) und diese in
.conf umbenannt
dort habe ich zusätzlich
auth-user-pass /etc/openvpn/auth.txt
log /etc/openvpn/LOG.txt
eingefügt siehe Screenshot
diese .conf habe ich dann in /etc/openvpn eingefügt (Ordner war nicht vorhanden hab den selbst eingefügt)
eine auth.txt mit username/passwort ist ebendso erstellt
das ist nun auf etc/OpenVPN
die Log Datei sagt mir folgendes
wo ist der harken ?
habe den Formuler F1
HDF Image 6.2
OpenVPN über Menu/Netwerk/OpenVPN aktiviert und auch den automatischen Start
Sie müssen registriert sein, um Links zu sehen.
habe dann von meinem Anbieter eine .ovpn geladen (mehr gabs nicht dazu) und diese in
.conf umbenannt
dort habe ich zusätzlich
auth-user-pass /etc/openvpn/auth.txt
log /etc/openvpn/LOG.txt
eingefügt siehe Screenshot
Sie müssen registriert sein, um Links zu sehen.
diese .conf habe ich dann in /etc/openvpn eingefügt (Ordner war nicht vorhanden hab den selbst eingefügt)
eine auth.txt mit username/passwort ist ebendso erstellt
das ist nun auf etc/OpenVPN
die Log Datei sagt mir folgendes
Thu Jan 1 01:00:29 1970 WARNING: file '/etc/openvpn/auth.txt' is group or others accessible
Thu Jan 1 01:00:29 1970 OpenVPN 2.4.3 mipsel-oe-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Nov 4 2017
Thu Jan 1 01:00:29 1970 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
Thu Jan 1 01:00:30 1970 WARNING: Your certificate is not yet valid!
Thu Jan 1 01:00:30 1970 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 1 01:00:30 1970 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 1 01:00:30 1970 TCP/UDP: Preserving recently used remote address: [AF_INET]80.241.210.238:443
Thu Jan 1 01:00:30 1970 Socket Buffers: R=[196608->393216] S=[196608->393216]
Thu Jan 1 01:00:30 1970 UDP link local: (not bound)
Thu Jan 1 01:00:30 1970 UDP link remote: [AF_INET]80.241.210.238:443
Thu Jan 1 01:00:30 1970 TLS: Initial packet from [AF_INET]80.241.210.238:443, sid=83e3dde3 5e67aef5
Thu Jan 1 01:00:30 1970 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Jan 1 01:00:30 1970 VERIFY ERROR: depth=1, error=certificate is not yet valid: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Thu Jan 1 01:00:30 1970 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Thu Jan 1 01:00:30 1970 TLS_ERROR: BIO read tls_read_plaintext error
Thu Jan 1 01:00:30 1970 TLS Error: TLS object -> incoming plaintext read error
Thu Jan 1 01:00:30 1970 TLS Error: TLS handshake failed
Thu Jan 1 01:00:30 1970 SIGUSR1[soft,tls-error] received, process restarting
Thu Jan 1 01:00:30 1970 Restart pause, 5 second(s)
Thu Dec 14 17:40:37 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]80.241.210.238:443
Thu Dec 14 17:40:37 2017 Socket Buffers: R=[196608->393216] S=[196608->393216]
Thu Dec 14 17:40:37 2017 UDP link local: (not bound)
Thu Dec 14 17:40:37 2017 UDP link remote: [AF_INET]80.241.210.238:443
Thu Dec 14 17:40:37 2017 TLS: Initial packet from [AF_INET]80.241.210.238:443, sid=d0d21978 43369bdf
Thu Dec 14 17:40:37 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Thu Dec 14 17:40:37 2017 VERIFY KU OK
Thu Dec 14 17:40:37 2017 Validating certificate extended key usage
Thu Dec 14 17:40:37 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 14 17:40:37 2017 VERIFY EKU OK
Thu Dec 14 17:40:37 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Libertas, emailAddress=info@airvpn.org
Thu Dec 14 17:40:38 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Dec 14 17:40:38 2017 [Libertas] Peer Connection Initiated with [AF_INET]80.241.210.238:443
Thu Dec 14 17:40:39 2017 SENT CONTROL [Libertas]: 'PUSH_REQUEST' (status=1)
Thu Dec 14 17:40:39 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.16.127 255.255.0.0,peer-id 17,cipher AES-256-GCM'
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: compression parms modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: route options modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: route-related options modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: peer-id set
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: adjusting link_mtu to 1625
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: data channel crypto options modified
Thu Dec 14 17:40:39 2017 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 14 17:40:39 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 14 17:40:39 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 14 17:40:39 2017 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=eth0 HWADDR=0c:8c:8f:00:40:bd
Thu Dec 14 17:40:39 2017 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Thu Dec 14 17:40:39 2017 Exiting due to fatal error
Thu Jan 1 01:00:29 1970 OpenVPN 2.4.3 mipsel-oe-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Nov 4 2017
Thu Jan 1 01:00:29 1970 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
Thu Jan 1 01:00:30 1970 WARNING: Your certificate is not yet valid!
Thu Jan 1 01:00:30 1970 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 1 01:00:30 1970 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 1 01:00:30 1970 TCP/UDP: Preserving recently used remote address: [AF_INET]80.241.210.238:443
Thu Jan 1 01:00:30 1970 Socket Buffers: R=[196608->393216] S=[196608->393216]
Thu Jan 1 01:00:30 1970 UDP link local: (not bound)
Thu Jan 1 01:00:30 1970 UDP link remote: [AF_INET]80.241.210.238:443
Thu Jan 1 01:00:30 1970 TLS: Initial packet from [AF_INET]80.241.210.238:443, sid=83e3dde3 5e67aef5
Thu Jan 1 01:00:30 1970 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Jan 1 01:00:30 1970 VERIFY ERROR: depth=1, error=certificate is not yet valid: C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Thu Jan 1 01:00:30 1970 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Thu Jan 1 01:00:30 1970 TLS_ERROR: BIO read tls_read_plaintext error
Thu Jan 1 01:00:30 1970 TLS Error: TLS object -> incoming plaintext read error
Thu Jan 1 01:00:30 1970 TLS Error: TLS handshake failed
Thu Jan 1 01:00:30 1970 SIGUSR1[soft,tls-error] received, process restarting
Thu Jan 1 01:00:30 1970 Restart pause, 5 second(s)
Thu Dec 14 17:40:37 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]80.241.210.238:443
Thu Dec 14 17:40:37 2017 Socket Buffers: R=[196608->393216] S=[196608->393216]
Thu Dec 14 17:40:37 2017 UDP link local: (not bound)
Thu Dec 14 17:40:37 2017 UDP link remote: [AF_INET]80.241.210.238:443
Thu Dec 14 17:40:37 2017 TLS: Initial packet from [AF_INET]80.241.210.238:443, sid=d0d21978 43369bdf
Thu Dec 14 17:40:37 2017 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Thu Dec 14 17:40:37 2017 VERIFY KU OK
Thu Dec 14 17:40:37 2017 Validating certificate extended key usage
Thu Dec 14 17:40:37 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 14 17:40:37 2017 VERIFY EKU OK
Thu Dec 14 17:40:37 2017 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Libertas, emailAddress=info@airvpn.org
Thu Dec 14 17:40:38 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Dec 14 17:40:38 2017 [Libertas] Peer Connection Initiated with [AF_INET]80.241.210.238:443
Thu Dec 14 17:40:39 2017 SENT CONTROL [Libertas]: 'PUSH_REQUEST' (status=1)
Thu Dec 14 17:40:39 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.16.127 255.255.0.0,peer-id 17,cipher AES-256-GCM'
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: compression parms modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: route options modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: route-related options modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: peer-id set
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: adjusting link_mtu to 1625
Thu Dec 14 17:40:39 2017 OPTIONS IMPORT: data channel crypto options modified
Thu Dec 14 17:40:39 2017 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 14 17:40:39 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 14 17:40:39 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 14 17:40:39 2017 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=eth0 HWADDR=0c:8c:8f:00:40:bd
Thu Dec 14 17:40:39 2017 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Thu Dec 14 17:40:39 2017 Exiting due to fatal error
wo ist der harken ?
Zuletzt bearbeitet: