Aktuelles
Digital Eliteboard - Das Digitale Technik Forum

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

OpenVPN einrichten

    Nobody is reading this thread right now.
Doch, wenn du die Syntax in der Config abänderst.

Ist genau das gleiche wie vorhin schon mit dem Login/Auth, deine Version hat die Syntax nicht Verstanden.
 
Bisher hast du die Config ja noch nicht gepostet, deshalb kann man nur raten was fehlt oder falsch ist. Schau mal ob du
Code:
remote-cert-tls server
drin hast, falls nicht füge es hinzu.

-supraracer
 
remote-cert-tls server ---> so einfügen oder muss unter "server" etwas anderes rein ?

Anbei die conf:
client
dev tun
proto udp
remote xxipxx xxportxx
resolv-retry infinite
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1300
persist-key
persist-tun
ping 15
ping-restart 45
ping-timer-rem
key-direction 1
mute 10
auth-user-pass /etc/openvpn/login.txt
comp-lzo
verb 3
pull
fast-io
cipher AES-256-CBC
<ca>
-----BEGIN CERTIFICATE-----
xxxxxxxxxxxxxxxxxxxxxxxxxx
-----END CERTIFICATE-----
</ca>
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
xxxxxxxxxxxxxxxxxxxxxxxxxxx
-----END OpenVPN Static key V1-----
</tls-auth>
 
Zuletzt bearbeitet:
Einfach exakt so einfügen, nichts ändern:
remote-cert-tls server

-supraracer
 
Der Zusatz "remote-cert-tls server" hat leider keine Veränderung gebracht
 
Nach jeder Änderung das Log posten, kann ja noch ein weiteres Problem sein.

-supraracer
 
Da fehlt auch die Verlinkung auf die Certs

Ungefähr so...


Code:
ca /../Certs/ca.crt
cert /..Verts/Client.crt
key /.../Certs/Client.key
tls-auth /.../Certs/ta.key 1
 
Wie wird die Verlinkung erstellt ?
ca /../Certs/ca.crt
cert /..Verts/Client.crt
key /.../Certs/Client.key
tls-auth /.../Certs/ta.key 1


Anbei erneut ein log
root@box:~# openvpn --config /etc/openvpn/client.conf

2023-04-23 19:56:52 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.

2023-04-23 19:56:52 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.

2023-04-23 19:56:52 WARNING: file '/etc/openvpn/login.txt' is group or others accessible

2023-04-23 19:56:52 OpenVPN 2.5.8 arm-oe-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ 4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 28 2022

2023-04-23 19:56:52 library versions: OpenSSL 3.0.7 1 Nov 2022, LZO 2.10

2023-04-23 19:56:52 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 19:56:52 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 19:56:52 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxxx:xxx

2023-04-23 19:56:52 Socket Buffers: R=[xxx->xxx] S=[xxx->xxx]

2023-04-23 19:56:52 UDP link local: (not bound)

2023-04-23 19:56:52 UDP link remote: [AF_INET]xxx

2023-04-23 19:57:37 [UNDEF] Inactivity timeout (--ping-restart), restarting

2023-04-23 19:57:37 SIGUSR1[soft,ping-restart] received, process restarting

2023-04-23 19:57:37 Restart pause, 5 second(s)

2023-04-23 19:57:42 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 19:57:42 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 19:57:42 TCP/UDP: Preserving recently used remote address: [AF_INET]xxx

2023-04-23 19:57:42 Socket Buffers: R=[xxx->xxx] S=[xxx->xxx]

2023-04-23 19:57:42 UDP link local: (not bound)

2023-04-23 19:57:42 UDP link remote: [AF_INET]xxx

2023-04-23 19:57:58 event_wait : Interrupted system call (code=4)

2023-04-23 19:57:58 SIGINT[hard,] received, process exiting
 
Auch hier Schreibt er was du zu ändern hast.


Code:
2023-04-23 19:56:52 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
 
Ist angepasst
client
dev tun
proto udp
remote xxxipxxx xxxportxxx
resolv-retry infinite
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1300
persist-key
persist-tun
ping 15
ping-restart 45
ping-timer-rem
key-direction 1
remote-cert-tls server
mute 10
auth-user-pass /etc/openvpn/login.txt
comp-lzo
verb 3
pull
fast-io
data-ciphers-fallback AES-256-CBC
<ca>
-----BEGIN CERTIFICATE-----
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
-----END CERTIFICATE-----
</ca>
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
-----END OpenVPN Static key V1-----
</tls-auth>


Logfile
root@box:~# openvpn --config /etc/openvpn/client.conf

2023-04-23 20:09:24 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unles s "allow-compression yes" is also set.

2023-04-23 20:09:24 WARNING: file '/etc/openvpn/login.txt' is group or others accessible

2023-04-23 20:09:24 OpenVPN 2.5.8 arm-oe-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 28 2022

2023-04-23 20:09:24 library versions: OpenSSL 3.0.7 1 Nov 2022, LZO 2.10

2023-04-23 20:09:24 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 20:09:24 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 20:09:24 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-23 20:09:24 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-23 20:09:24 UDP link local: (not bound)

2023-04-23 20:09:24 UDP link remote: [AF_INET]xxxxxx:xx

2023-04-23 20:10:09 [UNDEF] Inactivity timeout (--ping-restart), restarting

2023-04-23 20:10:09 SIGUSR1[soft,ping-restart] received, process restarting

2023-04-23 20:10:09 Restart pause, 5 second(s)

2023-04-23 20:10:14 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 20:10:14 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 20:10:14 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-23 20:10:14 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-23 20:10:14 UDP link local: (not bound)

2023-04-23 20:10:14 UDP link remote: [AF_INET]xxxxxx:xx

2023-04-23 20:10:59 [UNDEF] Inactivity timeout (--ping-restart), restarting

2023-04-23 20:10:59 SIGUSR1[soft,ping-restart] received, process restarting

2023-04-23 20:10:59 Restart pause, 5 second(s)

2023-04-23 20:11:04 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 20:11:04 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 20:11:04 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-23 20:11:04 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-23 20:11:04 UDP link local: (not bound)

2023-04-23 20:11:04 UDP link remote: [AF_INET]xxxxxx:xx

2023-04-23 20:11:50 [UNDEF] Inactivity timeout (--ping-restart), restarting

2023-04-23 20:11:50 SIGUSR1[soft,ping-restart] received, process restarting

2023-04-23 20:11:50 Restart pause, 5 second(s)

2023-04-23 20:11:55 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 20:11:55 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-23 20:11:55 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-23 20:11:55 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-23 20:11:55 UDP link local: (not bound)

2023-04-23 20:11:55 UDP link remote: [AF_INET]xxxxxx:xx

^C2023-04-23 20:12:18 event_wait : Interrupted system call (code=4)

2023-04-23 20:12:18 SIGINT[hard,] received, process exiting

Keine Veränderung


Was wählt ihr hier aus ? Vielleicht ist das auch der Fehler
 
Zuletzt bearbeitet:
Versuch mal noch mit
chmod 600 /etc/openvpn/login.txt
das "is group or others accessible" Warning wegzubekommen.

-supraracer
 
Anbei neues log
root@box:~# chmod 600 /etc/openvpn/login.txt

root@box:~# openvpn --config /etc/openvpn/client.conf

2023-04-24 11:06:04 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unles s "allow-compression yes" is also set.

2023-04-24 11:06:04 OpenVPN 2.5.8 arm-oe-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 28 2022

2023-04-24 11:06:04 library versions: OpenSSL 3.0.7 1 Nov 2022, LZO 2.10

2023-04-24 11:06:04 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:06:04 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:06:04 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-24 11:06:04 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-24 11:06:04 UDP link local: (not bound)

2023-04-24 11:06:04 UDP link remote: [AF_INET]xxxxxx:xx

2023-04-24 11:06:50 [UNDEF] Inactivity timeout (--ping-restart), restarting

2023-04-24 11:06:50 SIGUSR1[soft,ping-restart] received, process restarting

2023-04-24 11:06:50 Restart pause, 5 second(s)

2023-04-24 11:06:55 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:06:55 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:06:55 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-24 11:06:55 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-24 11:06:55 UDP link local: (not bound)

2023-04-24 11:06:55 UDP link remote: [AF_INET]xxxxxx:xx

2023-04-24 11:07:40 [UNDEF] Inactivity timeout (--ping-restart), restarting

2023-04-24 11:07:40 SIGUSR1[soft,ping-restart] received, process restarting

2023-04-24 11:07:40 Restart pause, 5 second(s)

2023-04-24 11:07:45 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:07:45 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:07:45 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-24 11:07:45 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-24 11:07:45 UDP link local: (not bound)

2023-04-24 11:07:45 UDP link remote: [AF_INET]xxxxxx:xx

2023-04-24 11:08:30 [UNDEF] Inactivity timeout (--ping-restart), restarting

2023-04-24 11:08:30 SIGUSR1[soft,ping-restart] received, process restarting

2023-04-24 11:08:30 Restart pause, 5 second(s)

2023-04-24 11:08:35 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:08:35 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:08:35 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-24 11:08:35 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-24 11:08:35 UDP link local: (not bound)

2023-04-24 11:08:35 UDP link remote: [AF_INET]xxxxxx:xx

2023-04-24 11:09:20 [UNDEF] Inactivity timeout (--ping-restart), restarting

2023-04-24 11:09:20 SIGUSR1[soft,ping-restart] received, process restarting

2023-04-24 11:09:20 Restart pause, 5 second(s)

2023-04-24 11:09:25 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:09:25 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:09:25 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-24 11:09:25 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-24 11:09:25 UDP link local: (not bound)

2023-04-24 11:09:25 UDP link remote: [AF_INET]xxxxxx:xx

2023-04-24 11:10:10 [UNDEF] Inactivity timeout (--ping-restart), restarting

2023-04-24 11:10:10 SIGUSR1[soft,ping-restart] received, process restarting

2023-04-24 11:10:10 Restart pause, 10 second(s)

2023-04-24 11:10:20 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:10:20 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2023-04-24 11:10:20 TCP/UDP: Preserving recently used remote address: [AF_INET]xxxxxx:xx

2023-04-24 11:10:20 Socket Buffers: R=[123456->123456] S=[123456->123456]

2023-04-24 11:10:20 UDP link local: (not bound)

2023-04-24 11:10:20 UDP link remote: [AF_INET]xxxxxx:xx

2023-04-24 11:10:43 event_wait : Interrupted system call (code=4)

2023-04-24 11:10:43 SIGINT[hard,] received, process exiting
 
Setze mal verb 3 auf verb 9 damit man noch mehr sieht im Log.

-supraracer
 
Ich habe mir jetzt cyberghost zugelegt. Das scheint zu funktionieren.
eth0

Link encap:Ethernet HWaddr xx:xx:xx:xx:xx

inet addr:xxx.xxx.xxx.xxx Bcast:xxx.xxx.xxx.xx Mask:255.255.255.0

inet6 addr: xxxxxxxxxxx Scope:Link

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

RX packets:8871 errors:0 dropped:2914 overruns:0 frame:0

TX packets:3908 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

RX bytes:123456 (7 MiB) TX bytes:123456 (500 KiB)

Interrupt:32



lo

Link encap:Local Loopback

inet addr:127.0.0.1 Mask:255.0.0.0

inet6 addr: ::xxx Scope:Host

UP LOOPBACK RUNNING MTU:12345 Metric:1

RX packets:42 errors:0 dropped:0 overruns:0 frame:0

TX packets:42 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1

RX bytes:123456 (12 KiB) TX bytes:123456 (6 KiB)



tun0

Link encap:UNSPEC HWaddr xx-xx-xx-xx-xx

inet addr:xx.xx.xx.xx P-t-P:xx.xx.xx.xx Mask:255.255.255.0

UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1

RX packets:3669 errors:0 dropped:0 overruns:0 frame:0

TX packets:1986 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:500

RX bytes:3824841 (3.6 MiB) TX bytes:79987 (78.1 KiB)

In den Einstellungen --- OpenVPN ist "Autostart" auf "deaktiviert". Über die "gelbe" Taste Autostart ---> aktivieren ändern sich aber nichts. Wie bekomme ich das hin ?
 
Zuletzt bearbeitet:
Zurück
Oben