Server details: OpenVPN 2.2.2 x86_64-suse-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] built on Dec 14 2011
Another three people are accessing the VPN so it’s unlikely to be a server configuration issue.
Here’s the server config file:
port 1194
proto udp
dev tap0
tls-server
ca /etc/openvpn/easy-rsa/keys/ca.crt
cert /etc/openvpn/easy-rsa/keys/server.crt
key /etc/openvpn/easy-rsa/keys/server.key
dh /etc/openvpn/easy-rsa/keys/dh1024.pem
server-bridge XXX.XXX.XXX.1 XXX.XXX.XXX.0 XXX.XXX.XXX.65 XXX.XXX.XXX.80
push «route XXX.XXX.XXX.0 XXX.XXX.XXX.0»
keepalive 10 120
comp-lzo
user nobody
group nobody
persist-key
persist-tun
status openvpn-status.log
log /var/log/openvpn.log
log-append /var/log/openvpn.log
verb 3
script-security 2
up «/etc/openvpn/cnxup.sh virbr0 tap0 1500»
down «/etc/openvpn/cnxdown.sh virbr0 tap0»
Here’s the client config info:
##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server. #
# #
# This configuration can be used by multiple #
# clients, however each client should have #
# its own cert and key files. #
# #
# On Windows, you might want to rename this #
# file so it has a .ovpn extension #
##############################################
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
dev tap0
#dev tun0
# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel
# if you have more than one. On XP SP2,
# you may need to disable the firewall
# for the TAP adapter.
;dev-node MyTap
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server.
;proto tcp
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote xxxxx.xxxxx.xx 1194
;remote my-server-2 1194
# Choose a random host from the remote
# list for load-balancing. Otherwise
# try hosts in the order specified.
;remote-random
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don’t need to bind to
# a specific local port number.
nobind
# Downgrade privileges after initialization (non-Windows only)
;user nobody
;group nobody
# Try to preserve some state across restarts.
persist-key
persist-tun
# If you are connecting through an
# HTTP proxy to reach the actual OpenVPN
# server, put the proxy server/IP and
# port number here. See the man page
# if your proxy server requires
# authentication.
;http-proxy-retry # retry on connection failures
;http-proxy [proxy server] [proxy port #]
# Wireless networks often produce a lot
# of duplicate packets. Set this flag
# to silence duplicate packet warnings.
;mute-replay-warnings
# SSL/TLS parms.
# See the server config file for more
# description. It’s best to use
# a separate .crt/.key file pair
# for each client. A single ca
# file can be used for all clients.
ca ca.crt
cert clientLB.crt
key clientLB.key
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to «server». This is an
# important precaution to protect against
# a potential attack discussed here:
# http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to «server». The build-key-server
# script in the easy-rsa folder will do this.
;ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
;tls-auth ta.key 1
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher x
# Enable compression on the VPN link.
# Don’t enable this unless it is also
# enabled in the server config file.
comp-lzo
# Set log file verbosity.
verb 3
# Silence repeating messages
;mute 20
Содержание
- OpenVPN Support Forum
- Hi. What am i doing wrong? netsh command failed
- Hi. What am i doing wrong? netsh command failed
- OpenVPN Support Forum
- Problem with 2.3.6 on windows
- Problem with 2.3.6 on windows
- OpenVPN Support Forum
- openvpn service stops working
- openvpn service stops working
- Re: openvpn service stops working
- Re: openvpn service stops working
- Re: openvpn service stops working
- Re: openvpn service stops working
- OpenVPN Support Forum
- Windows 10 Client using LAN Network TAP Bridge error code 1 .
- Windows 10 Client using LAN Network TAP Bridge error code 1 .
OpenVPN Support Forum
Community Support Forum
Hi. What am i doing wrong? netsh command failed
Hi. What am i doing wrong? netsh command failed
Post by AFX » Sat Apr 08, 2017 9:47 pm
Hi. What am i doing wrong?
Can’t connect right now to my VPN. And trying to look for a solution. I have renamed as tap0, and run as administrator. Still same error.
Log:
Enter Management Password:
Sat Apr 08 23:32:24 2017 us=143726 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Sat Apr 08 23:32:24 2017 us=143726 Need hold release from management interface, waiting.
Sat Apr 08 23:32:24 2017 us=642927 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Sat Apr 08 23:32:24 2017 us=752127 MANAGEMENT: CMD ‘state on’
Sat Apr 08 23:32:24 2017 us=752127 MANAGEMENT: CMD ‘log all on’
Sat Apr 08 23:32:25 2017 us=32928 MANAGEMENT: CMD ‘hold off’
Sat Apr 08 23:32:25 2017 us=32928 MANAGEMENT: CMD ‘hold release’
Sat Apr 08 23:32:30 2017 us=34937 MANAGEMENT: CMD ‘username «Auth» «***»‘
Sat Apr 08 23:32:30 2017 us=50537 MANAGEMENT: CMD ‘password [. ]’
Sat Apr 08 23:32:30 2017 us=222137 Control Channel Authentication: tls-auth using INLINE static key file
Sat Apr 08 23:32:30 2017 us=222137 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Apr 08 23:32:30 2017 us=222137 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Apr 08 23:32:30 2017 us=222137 LZO compression initialized
Sat Apr 08 23:32:30 2017 us=222137 Control Channel MTU parms [ L:1560 D:1182 EF:68 EB:0 ET:0 EL:3 ]
Sat Apr 08 23:32:30 2017 us=222137 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sat Apr 08 23:32:30 2017 us=222137 MANAGEMENT: >STATE:1491687150,RESOLVE.
Sat Apr 08 23:32:30 2017 us=222137 Data Channel MTU parms [ L:1560 D:1*:3 AF:3/1 ]
Sat Apr 08 23:32:30 2017 us=222137 Local Options String: ‘V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client’
Sat Apr 08 23:32:30 2017 us=222137 Expected Remote Options String: ‘V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server’
Sat Apr 08 23:32:30 2017 us=222137 Local Options hash (VER=V4): ‘2f2c6498’
Sat Apr 08 23:32:30 2017 us=222137 Expected Remote Options hash (VER=V4): ‘9915e4a2’
Sat Apr 08 23:32:30 2017 us=222137 Attempting to establish TCP connection with [AF_INET]46.*:443 [nonblock]
Sat Apr 08 23:32:30 2017 us=222137 MANAGEMENT: >STATE:1491687150,TCP_CONNECT.
Sat Apr 08 23:32:31 2017 us=222539 TCP connection established with [AF_INET]4*:443
Sat Apr 08 23:32:31 2017 us=222539 TCPv4_CLIENT link local: [undef]
Sat Apr 08 23:32:31 2017 us=222539 TCPv4_CLIENT link remote: [AF_INET]4*:443
Sat Apr 08 23:32:31 2017 us=222539 MANAGEMENT: >STATE:1491687151,WAIT.
Sat Apr 08 23:32:31 2017 us=222539 MANAGEMENT: >STATE:1491687151,AUTH.
Sat Apr 08 23:32:31 2017 us=222539 TLS: Initial packet from [AF_INET]4*:443, sid=66ede376 ff1adca8
Sat Apr 08 23:32:31 2017 us=222539 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
Sat Apr 08 23:32:31 2017 us=300539 VERIFY OK: de
Sat Apr 08 23:32:31 2017 us=300539 Validating certificate key usage
Sat Apr 08 23:32:31 2017 us=300539 ++ Certificate has key usage 00a0, expects 00a0
Sat Apr 08 23:32:31 2017 us=300539 VERIFY KU OK
Sat Apr 08 23:32:31 2017 us=300539 Validating certificate extended key usage
Sat Apr 08 23:32:31 2017 us=300539 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 08 23:32:31 2017 us=300539 VERIFY EKU
Sat Apr 08 23:32:32 2017 us=180141 Data Channel Encrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sat Apr 08 23:32:32 2017 us=180141 Data Channel Encrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Apr 08 23:32:32 2017 us=180141 Data Channel Decrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sat Apr 08 23:32:32 2017 us=180141 Data Channel Decrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sat Apr 08 23:32:32 2017 us=180141 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sat Apr 08 23:32:32 2017 us=180141 [ovpn.se] Peer Connection Initiated with [AF_INET]4*.140:443
Sat Apr 08 23:32:33 2017 us=359144 MANAGEMENT: >STATE:1491687153,GET_CONFIG.
Sat Apr 08 23:32:34 2017 us=531146 SENT CONTROL [ovpn.se]: ‘PUSH_REQUEST’ (status=1)
Sat Apr 08 23:32:34 2017 us=546746 PUSH: Received control message: ‘PUSH_REPLY,ifconfig-ipv6 a0*:1048:*5a9/64 *:1048::1,route-gateway *0.1,topology subnet,ping 10,ping-restart 60,persist-key,redirect-gateway def1,explicit-exit-notify 2,comp-lzo yes,tun-ipv6,route-ipv6 2000::/3,dhcp-option DNS a07:*::1,dhcp-option DNS 20*:cd45::1,dhcp-option DNS *67.13*,dhcp-option DNS 192.165.*8,peer-id 0,ifconfig *104 255.255.0.0’
Sat Apr 08 23:32:34 2017 us=546746 Options error: dhcp-option parameter DNS ‘*601:10f0:c*’ must be an IP address
Sat Apr 08 23:32:34 2017 us=546746 Options error: dhcp-option parameter DNS ‘*7c:750:*::1’ must be an IP address
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: —explicit-exit-notify can only be used with —proto udp
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: LZO parms modified
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: —persist options modified
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: —ifconfig/up options modified
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: route options modified
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: route-related options modified
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: —ip-win32 and/or —dhcp-option options modified
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: peer-id set
Sat Apr 08 23:32:34 2017 us=546746 OPTIONS IMPORT: adjusting link_mtu to 1563
Sat Apr 08 23:32:34 2017 us=546746 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=42:49
Sat Apr 08 23:32:34 2017 us=562346 ROUTE6: default_gateway=UNDEF
Sat Apr 08 23:32:34 2017 us=562346 do_ifconfig, tt->ipv6=1, tt->did_ifconfig_ipv6_setup=1
Sat Apr 08 23:32:34 2017 us=562346 MANAGEMENT: >STATE:1491687154,ASSIGN_IP,,10*,
Sat Apr 08 23:32:35 2017 us=564748 NETSH: C:Windowssystem32netsh.exe interface ipv6 set address interface=26 *a880:4601* c5a9 store=active
Sat Apr 08 23:32:35 2017 us=658348 ERROR: netsh command failed: returned error code 1
Sat Apr 08 23:32:40 2017 us=682359 NETSH: C:Windowssystem32netsh.exe interface ipv6 set address interface=26 *a880:4601* store=active
Sat Apr 08 23:32:40 2017 us=791559 ERROR: netsh command failed: returned error code 1
Sat Apr 08 23:32:45 2017 us=820173 NETSH: C:Windowssystem32netsh.exe interface ipv6 set address interface=26 *a880:4601* store=active
Sat Apr 08 23:32:45 2017 us=915773 ERROR: netsh command failed: returned error code 1
Sat Apr 08 23:32:50 2017 us=954384 NETSH: C:Windowssystem32netsh.exe interface ipv6 set address interface=26 *a880:4601* store=active
Sat Apr 08 23:32:51 2017 us=47984 ERROR: netsh command failed: returned error code 1
Sat Apr 08 23:32:55 2017 us=71192 MANAGEMENT: Client disconnected
Sat Apr 08 23:32:55 2017 us=71192 NETSH: command failed
Sat Apr 08 23:32:55 2017 us=71192 Exiting due to fatal error
.
Please point me in the right direction. How do i fix this?? (I could connect a week ago, but something happened to my computer. Thanks!
Источник
OpenVPN Support Forum
Community Support Forum
Problem with 2.3.6 on windows
Problem with 2.3.6 on windows
Post by alexs_yb » Tue Jan 06, 2015 12:13 am
I have openvpn setup as a service that runs on boot up.
This has been working fine for version 2.3.1 of the windows client 32 and 64b
When I tried to upgrade to 2.3.6, the client dies.
It works fine on startup, but once the laptop goes to sleep it attempts to restart but crashes and the client stops
this is the last bit of the logs
Tue Jan 06 10:44:21 2015 ERROR: Windows route delete ipv6 command failed: returned error code 1
Tue Jan 06 10:44:21 2015 Closing TUN/TAP interface
Tue Jan 06 10:44:21 2015 delete_route_ipv6(2002:ca4a:2000:acd2:4000::/66)
Tue Jan 06 10:44:21 2015 C:Windowssystem32netsh.exe interface ipv6 delete route 2002:ca4a:2000:acd2:4000::/66 Local Area Connection 3 fe80::8 store=active
Tue Jan 06 10:44:21 2015 ERROR: Windows route delete ipv6 command failed: returned error code 1
Tue Jan 06 10:44:22 2015 NETSH: C:Windowssystem32netsh.exe interface ipv6 delete address Local Area Connection 3 2002:ca4a:2000:acd2:4000::1016 store=active
Tue Jan 06 10:45:12 2015 ERROR: netsh command failed: returned error code 1
Tue Jan 06 10:45:16 2015 NETSH: command failed
Tue Jan 06 10:45:16 2015 Exiting due to fatal error
is this a bug or bad config on my side.
Источник
OpenVPN Support Forum
Community Support Forum
openvpn service stops working
openvpn service stops working
Post by alexs_yb » Fri Jun 05, 2015 4:22 am
when i move from local LAN to wireless. the local lan is via a USB ethernet.
i keep getting this
which means openvpn stops running. is there any way to have openvpn keep running. I am running it as a service, unfortunately the service is still marked as running.
I really want it to be an always on setup, keep trying until the service is stopped
Re: openvpn service stops working
Post by Traffic » Sat Jun 06, 2015 8:50 am
With — keepalive in the server and — client in the client configs, you will have — ping-restart set in the client and it will » keep running«.
The problem you have there is a failure to manage routes.
Set — verb 4 in your client and post complete log file.
I presume you run as administrator and not some other way ?
Re: openvpn service stops working
Post by alexs_yb » Thu Jun 11, 2015 4:10 am
No real difference.
so this was switching from lan to wireless.
I can understand it failing to set routes but to crash complete..
So the service is still running, so windows doesn’t restart the service.
seems like just opvn config crashes.
Re: openvpn service stops working
Post by Traffic » Thu Jun 11, 2015 9:40 am
How did you switch ?
It looks like the LAN interface is no longer available and that is the IP Address OpenVPN was bound to .. so it has no choice but to exit.
Re: openvpn service stops working
Post by KeyzerSuze » Thu Jun 11, 2015 10:56 am
yes, the eth port is via a USB connection.
But why does it need to fail hard. Why shouldn’t the removal of the USB eth dongle be the same as loss of carrier.
Источник
OpenVPN Support Forum
Community Support Forum
Windows 10 Client using LAN Network TAP Bridge error code 1 .
Windows 10 Client using LAN Network TAP Bridge error code 1 .
Post by seanvree » Sun Jul 24, 2016 8:54 pm
Netgear R7000 running DDWRT
Client:
Windows 10 Enterprise
2 1GB Intel NICs
Ethernet interface config:
Ethernet adapter S1219: (Static primary NIC)
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) Ethernet Connection (2) I219-V
Physical Address. . . . . . . . . : 40-8D-5C-B7-2C-7B
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2601:602:9a01:b5e:55e9:e78f:9fcc:e5d3(Preferred)
Temporary IPv6 Address. . . . . . : 2601:602:9a01:b5e:a846:dc4f:5ea4:11fa(Preferred)
Link-local IPv6 Address . . . . . : fe80::55e9:e78f:9fcc:e5d3%18(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.20(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : fe80::e6f4:c6ff:fe1d:885b%18
192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 155225436
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1E-BC-A1-67-40-8D-5C-B7-2C-7B
DNS Servers . . . . . . . . . . . : 192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
EthernetVPN: Bridge:
11. 00 ff 5d 3c 18 0f
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : TAP-Windows Adapter V9
Physical Address. . . . . . . . . : 00-FF-5D-3C-18-0F
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2606:ed00:4786:21::10ed(Preferred)
Link-local IPv6 Address . . . . . : fe80::5931:22b4:131e:f138%10(Preferred)
IPv4 Address. . . . . . . . . . . : 10.77.1.239(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Thursday, July 21, 2016 7:46:24 PM
Lease Expires . . . . . . . . . . : Friday, July 21, 2017 7:46:24 PM
Default Gateway . . . . . . . . . :
DHCP Server . . . . . . . . . . . : 10.77.1.254
DHCPv6 IAID . . . . . . . . . . . : 218169181
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1E-BC-A1-67-40-8D-5C-B7-2C-7B
DNS Servers . . . . . . . . . . . : 199.71.232.194
NetBIOS over Tcpip. . . . . . . . : Enabled
The two following NIC Interfaces make up the bridge:
Ethernet adapter V1211: (Bridged)
Connection-specific DNS Suffix . : vree
Description . . . . . . . . . . . : Intel(R) I211 Gigabit Network Connection
Physical Address. . . . . . . . . : 40-8D-5C-B7-2C-79
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2601:602:9a01:b5e:7c8b:c22d:7d66:a9d7(Preferred)
Temporary IPv6 Address. . . . . . : 2601:602:9a01:b5e:b5bc:c983:38fc:da26(Preferred)
Link-local IPv6 Address . . . . . : fe80::7c8b:c22d:7d66:a9d7%10(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.75(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Sunday, July 24, 2016 1:34:21 PM
Lease Expires . . . . . . . . . . : Monday, July 25, 2016 1:34:22 PM
Default Gateway . . . . . . . . . : fe80::e6f4:c6ff:fe1d:885b%10
192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 641764700
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1E-BC-A1-67-40-8D-5C-B7-2C-7B
DNS Servers . . . . . . . . . . . : 8.8.8.8
208.67.222.222
104.238.153.178
NetBIOS over Tcpip. . . . . . . . : Disabled
Ethernet adapter tapbridge: (Bridged)
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft Network Adapter Multiplexor Driver
Physical Address. . . . . . . . . : 00-FF-22-0C-AD-B5
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv6 Address. . . . . . . . . . . : 2601:602:9a01:b5e:4cee:2581:d18b:fead(Preferred)
IPv6 Address. . . . . . . . . . . : 2606:ed00:4786:21::10ed(Preferred)
Temporary IPv6 Address. . . . . . : 2601:602:9a01:b5e:dd7a:3ebc:c315:ea26(Preferred)
Link-local IPv6 Address . . . . . : fe80::4cee:2581:d18b:fead%25(Preferred)
IPv4 Address. . . . . . . . . . . : 10.77.1.239(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 2606:ed00:4786:21::1
fe80::e6f4:c6ff:fe1d:885b%25
10.77.1.0
DHCPv6 IAID . . . . . . . . . . . : 440438108
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1E-BC-A1-67-40-8D-5C-B7-2C-7B
DNS Servers . . . . . . . . . . . : 199.71.232.194
8.8.8.8
NetBIOS over Tcpip. . . . . . . . : Enabled
OpenVPN Client config:
client
dev tap
dev-node vpntap
proto udp
remote us.ovpn.azirevpn.net 1194
remote us.ovpn.azirevpn.net 443
remote-random
resolv-retry infinite
auth-user-pass auth.txt
nobind
persist-key
persist-tun
tun-ipv6
remote-cert-tls server
reneg-sec 0
keepalive 10 60
mute-replay-warnings
explicit-exit-notify 3
verb 3
cipher AES-256-CBC
auth SHA512
tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA
setenv CLIENT_CERT 0
Routing Table:
C:WINDOWSsystem32>route print
===========================================================================
Interface List
18. 40 8d 5c b7 2c 7b . Intel(R) Ethernet Connection (2) I219-V
33. 00 ff 22 0c ad b5 . Microsoft Network Adapter Multiplexor Driver
20. 00 50 56 c0 00 01 . VMware Virtual Ethernet Adapter for VMnet1
27. 00 50 56 c0 00 08 . VMware Virtual Ethernet Adapter for VMnet8
14. a4 34 d9 60 0e db . Bluetooth PAN HelpText
1. Software Loopback Interface 1
19. 00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
13. 00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2
7. 00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #4
6. 00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #5
8. 00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.20 258
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.24 266
0.0.0.0 0.0.0.0 10.77.1.0 192.168.1.24 266
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.20 258
192.168.1.0 255.255.255.0 On-link 192.168.1.24 266
192.168.1.20 255.255.255.255 On-link 192.168.1.20 258
192.168.1.24 255.255.255.255 On-link 192.168.1.24 266
192.168.1.255 255.255.255.255 On-link 192.168.1.20 258
192.168.1.255 255.255.255.255 On-link 192.168.1.24 266
192.168.26.0 255.255.255.0 On-link 192.168.26.1 276
192.168.26.1 255.255.255.255 On-link 192.168.26.1 276
192.168.26.255 255.255.255.255 On-link 192.168.26.1 276
192.168.64.0 255.255.255.0 On-link 192.168.64.1 276
192.168.64.1 255.255.255.255 On-link 192.168.64.1 276
192.168.64.255 255.255.255.255 On-link 192.168.64.1 276
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.26.1 276
224.0.0.0 240.0.0.0 On-link 192.168.64.1 276
224.0.0.0 240.0.0.0 On-link 192.168.1.20 258
224.0.0.0 240.0.0.0 On-link 192.168.1.24 266
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.26.1 276
255.255.255.255 255.255.255.255 On-link 192.168.64.1 276
255.255.255.255 255.255.255.255 On-link 192.168.1.20 258
255.255.255.255 255.255.255.255 On-link 192.168.1.24 266
===========================================================================
Persistent Routes:
Network Address Netmask Gateway Address Metric
0.0.0.0 0.0.0.0 192.168.1.1 Default
0.0.0.0 0.0.0.0 192.168.1.1 Default
0.0.0.0 0.0.0.0 10.77.1.0 Default
===========================================================================
IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
18 258 ::/0 fe80::e6f4:c6ff:fe1d:885b
33 266 ::/0 2606:ed00:4786:21::1
33 266 ::/0 fe80::e6f4:c6ff:fe1d:885b
1 306 ::1/128 On-link
18 258 2601:602:9a01:b5e::/64 On-link
33 266 2601:602:9a01:b5e::/64 On-link
18 258 2601:602:9a01:b5e:55e9:e78f:9fcc:e5d3/128
On-link
33 266 2601:602:9a01:b5e:7115:6f83:a7c5:95ce/128
On-link
33 266 2601:602:9a01:b5e:8ddb:cfc3:d889:c255/128
On-link
18 258 2601:602:9a01:b5e:a846:dc4f:5ea4:11fa/128
On-link
33 266 2606:ed00:4786:21::/64 On-link
33 266 2606:ed00:4786:21::10ed/128
On-link
20 276 fe80::/64 On-link
27 276 fe80::/64 On-link
18 258 fe80::/64 On-link
33 266 fe80::/64 On-link
18 258 fe80::55e9:e78f:9fcc:e5d3/128
On-link
33 266 fe80::7115:6f83:a7c5:95ce/128
On-link
27 276 fe80::94ad:4c9a:13c8:7b35/128
On-link
20 276 fe80::bc9c:8afc:db14:fc2e/128
On-link
1 306 ff00::/8 On-link
20 276 ff00::/8 On-link
27 276 ff00::/8 On-link
18 258 ff00::/8 On-link
33 266 ff00::/8 On-link
===========================================================================
Persistent Routes:
If Metric Network Destination Gateway
0 4294967295 ::/0 2606:ed00:4786:21::1
===========================================================================
I’m trying to direct all LAN traffic thru the 1st NIC and all internet traffic thru the VPN Bridge.
Problem:
When I connect via the Open VPN interface this is my log:
Sun Jul 24 13:46:38 2016 OpenVPN 2.3.11 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on May 10 2016
Sun Jul 24 13:46:38 2016 Windows version 6.2 (Windows 8 or greater) 64bit
Sun Jul 24 13:46:38 2016 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.09
Enter Management Password:
Sun Jul 24 13:46:38 2016 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Sun Jul 24 13:46:38 2016 Need hold release from management interface, waiting.
Sun Jul 24 13:46:38 2016 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Sun Jul 24 13:46:38 2016 MANAGEMENT: CMD ‘state on’
Sun Jul 24 13:46:38 2016 MANAGEMENT: CMD ‘log all on’
Sun Jul 24 13:46:38 2016 MANAGEMENT: CMD ‘hold off’
Sun Jul 24 13:46:38 2016 MANAGEMENT: CMD ‘hold release’
Sun Jul 24 13:46:38 2016 Control Channel Authentication: tls-auth using INLINE static key file
Sun Jul 24 13:46:38 2016 Outgoing Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
Sun Jul 24 13:46:38 2016 Incoming Control Channel Authentication: Using 512 bit message hash ‘SHA512’ for HMAC authentication
Sun Jul 24 13:46:38 2016 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Jul 24 13:46:38 2016 MANAGEMENT: >STATE:1469393198,RESOLVE.
Sun Jul 24 13:46:39 2016 UDPv4 link local: [undef]
Sun Jul 24 13:46:39 2016 UDPv4 link remote: [AF_INET]199.71.232.194:443
Sun Jul 24 13:46:39 2016 MANAGEMENT: >STATE:1469393199,WAIT.
Sun Jul 24 13:46:39 2016 MANAGEMENT: >STATE:1469393199,AUTH.
Sun Jul 24 13:46:39 2016 TLS: Initial packet from [AF_INET]199.71.232.194:443, sid=792f7b96 c4a6540b
Sun Jul 24 13:46:39 2016 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
Sun Jul 24 13:46:39 2016 VERIFY OK: depth=1, C=US, ST=Florida, L=Miami, O=AzireVPN, OU=AzireVPN, CN=us.ovpn.azirevpn.net, name=AzireVPN, emailAddress=info@azirevpn.com
Sun Jul 24 13:46:39 2016 Validating certificate key usage
Sun Jul 24 13:46:39 2016 ++ Certificate has key usage 00a0, expects 00a0
Sun Jul 24 13:46:39 2016 VERIFY KU OK
Sun Jul 24 13:46:39 2016 Validating certificate extended key usage
Sun Jul 24 13:46:39 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Jul 24 13:46:39 2016 VERIFY EKU OK
Sun Jul 24 13:46:39 2016 VERIFY OK: depth=0, C=US, ST=Florida, L=Miami, O=AzireVPN, OU=AzireVPN, CN=us.ovpn.azirevpn.net, name=AzireVPN, emailAddress=info@azirevpn.com
Sun Jul 24 13:46:39 2016 WARNING: ‘dev-type’ is used inconsistently, local=’dev-type tap’, remote=’dev-type tun’
Sun Jul 24 13:46:39 2016 WARNING: ‘link-mtu’ is used inconsistently, local=’link-mtu 1633′, remote=’link-mtu 1601′
Sun Jul 24 13:46:39 2016 WARNING: ‘tun-mtu’ is used inconsistently, local=’tun-mtu 1532′, remote=’tun-mtu 1500′
Sun Jul 24 13:46:39 2016 Data Channel Encrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sun Jul 24 13:46:39 2016 Data Channel Encrypt: Using 512 bit message hash ‘SHA512’ for HMAC authentication
Sun Jul 24 13:46:39 2016 Data Channel Decrypt: Cipher ‘AES-256-CBC’ initialized with 256 bit key
Sun Jul 24 13:46:39 2016 Data Channel Decrypt: Using 512 bit message hash ‘SHA512’ for HMAC authentication
Sun Jul 24 13:46:39 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sun Jul 24 13:46:39 2016 [us.ovpn.azirevpn.net] Peer Connection Initiated with [AF_INET]199.71.232.194:443
Sun Jul 24 13:46:40 2016 MANAGEMENT: >STATE:1469393200,GET_CONFIG.
Sun Jul 24 13:46:41 2016 SENT CONTROL [us.ovpn.azirevpn.net]: ‘PUSH_REQUEST’ (status=1)
Sun Jul 24 13:46:41 2016 PUSH: Received control message: ‘PUSH_REPLY,ifconfig-ipv6 2606:ed00:4786:21::10ed/64 2606:ed00:4786:21::1,dhcp-option DNS 199.71.232.194,redirect-gateway def1,redirect-gateway ipv6,route-ipv6 2000::/3,tun-ipv6,route-gateway 10.77.1.1,topology subnet,ping 3,ping-restart 15,ifconfig 10.77.1.239 255.255.255.0’
Sun Jul 24 13:46:41 2016 Options error: unknown —redirect-gateway flag: ipv6
Sun Jul 24 13:46:41 2016 OPTIONS IMPORT: timers and/or timeouts modified
Sun Jul 24 13:46:41 2016 OPTIONS IMPORT: —ifconfig/up options modified
Sun Jul 24 13:46:41 2016 OPTIONS IMPORT: route options modified
Sun Jul 24 13:46:41 2016 OPTIONS IMPORT: route-related options modified
Sun Jul 24 13:46:41 2016 OPTIONS IMPORT: —ip-win32 and/or —dhcp-option options modified
Sun Jul 24 13:46:41 2016 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=33 HWADDR=00:ff:22:0c:ad:b5
Sun Jul 24 13:46:41 2016 ROUTE6: default_gateway=UNDEF
Sun Jul 24 13:46:41 2016 do_ifconfig, tt->ipv6=1, tt->did_ifconfig_ipv6_setup=1
Sun Jul 24 13:46:41 2016 MANAGEMENT: >STATE:1469393201,ASSIGN_IP,,10.77.1.239,
Sun Jul 24 13:46:42 2016 NETSH: C:WINDOWSsystem32netsh.exe interface ipv6 set address interface=4 2606:ed00:4786:21::10ed store=active
Sun Jul 24 13:46:42 2016 ERROR: netsh command failed: returned error code 1
Sun Jul 24 13:46:47 2016 NETSH: C:WINDOWSsystem32netsh.exe interface ipv6 set address interface=4 2606:ed00:4786:21::10ed store=active
Sun Jul 24 13:46:47 2016 ERROR: netsh command failed: returned error code 1
Sun Jul 24 13:46:52 2016 NETSH: C:WINDOWSsystem32netsh.exe interface ipv6 set address interface=4 2606:ed00:4786:21::10ed store=active
Sun Jul 24 13:46:52 2016 ERROR: netsh command failed: returned error code 1
Sun Jul 24 13:46:57 2016 NETSH: C:WINDOWSsystem32netsh.exe interface ipv6 set address interface=4 2606:ed00:4786:21::10ed store=active
Sun Jul 24 13:46:57 2016 ERROR: netsh command failed: returned error code 1
Sun Jul 24 13:47:01 2016 MANAGEMENT: Client disconnected
Sun Jul 24 13:47:01 2016 NETSH: command failed
Sun Jul 24 13:47:01 2016 Exiting due to fatal error
Essentially, the software is trying to push the iPv6 config to the interface 4, which doesn’t exist!! That’s the main problem. Where is it getting interface=4? It should be pushing those setting to interface 33 (which is the VPN/TAP bridge, correct?) If I run the NET NETSH manually thru an elevated CMD prompt, I get the same error, however, if I use the same command but use interface 33, it’s fine! So why is it trying to push to interface 4?
If I disconnect the VPN bridge and use ONLY the VPN TAB device, it connects fine.
Things I’ve tried:
— Using different VPN software: FAI
— running NETSH command from elevated command prompt: FAIL
— Removing all NICs and reinstalling: Same error
Источник
OpenVPN might be the ultimate security platform and protocol out there. However, there are aspects to be mindful of, and Netsh command is one of them. Netsh allows the users to modify or display the network configuration of the computer.
On the contrary, the OpenVPN Netsh command failed has become an issue for some users. So, we are sharing how users can resolve this issue!
1. Administrator
To begin with, the users need to ensure OpenVPN is running on a suitable basis first. For instance, experts say that OpenVPN must be run as an administrator if they need to ensure zero errors and hurdles. So, right-click on the OpenVPN icon and choose the “run as administrator” option. As a result, the error is likely to be removed.
2. TAP-Windows Adapter V9
There are some settings that people need to be extremely mindful of while using OpenVPN, and one of them is TAP-Windows Adapter V9. In addition, you need to set the right name. So, open the network and internet tab in the control panel and tap on the network and sharing center.
Then, click on change settings for the network adapter and move down to TAP-Windows Adapter V9. You need to right-click on the icon and click on the “change name” option and write tap0.
3. Internet Protocol Version
When it comes down to the Netsh error, the users need to ensure that the internet protocol version is enabled. This is because the IPv6 must be enabled in TAP-Windows Adapter V9. You can follow the previously mentioned steps to access TAP-Windows Adapter V9 and check the box that says IPv6 from the properties. Once you check this option and hit the OK button, you will be good to go.
However, if this method doesn’t work for you, you can download and install the re-enable IPv6 option on the non-tunnel interfaces. As a result, you will be able to resolve the issue with IPv6.
4. Reboot
In some cases, all your computer is the refresh and reboot to make sure it starts working again. Before you restart the computer, we suggest that you exit OpenVPN as well as other files. Once the files and apps are exited, switch off the computer and restart it after some minutes. When the computer switches on, start OpenVPN again, and it’s likely to resolve the issue.
5. Privileges
Some people think that running OpenVPN as an administrator will be sufficient, but such errors demand correct privileges and configurations. This is because if the client is running on normal privileges, it will not allow interface setup. So, we suggest that you run OpenVPN as an administrator and set the highest privileges.
6. IP Address
When it comes down to OpenVPN, one needs to ensure that the IP address is set correctly. For instance, if the static IP address is set to 10.3.0.1, it is advised that you change the IP address to DHCP. Once the IP address is set to automatic or DHCP, the functionality will be smoother. However, the IP address is likely to return back to 10.3.0.1 automatically, so keep checking the settings after every few minutes!
Skip to forum content
Форум проекта FreeOpenVPN.Org
Бесплатный VPN-доступ без ограничений
You are not logged in. Please login or register.
Active topics Unanswered topics
Ошибка подключения
Pages 1
You must login or register to post a reply
1 24.01.2019 00:23:28
- Vasekorsha
- Member
- Offline
- Registered: 16.04.2017
- Posts: 11
Topic: Ошибка подключения
Здравствуйте! Не могу подключиться к серверу в Германии.
Wed Jan 23 23:19:22 2019 DEPRECATED OPTION: —max-routes option ignored.The number of routes is unlimited as of OpenVPN 2.4. This option will be removed in a future version, please remove it from your configuration.
Wed Jan 23 23:19:22 2019 OpenVPN 2.4.6 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Wed Jan 23 23:19:22 2019 Windows version 6.2 (Windows 8 or greater) 32bit
Wed Jan 23 23:19:22 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
Enter Management Password:
Wed Jan 23 23:19:38 2019 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Wed Jan 23 23:19:38 2019 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Wed Jan 23 23:19:38 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]80.82.222.122:16402
Wed Jan 23 23:19:38 2019 UDP link local: (not bound)
Wed Jan 23 23:19:38 2019 UDP link remote: [AF_INET]80.82.222.122:16402
Wed Jan 23 23:19:38 2019 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
Wed Jan 23 23:19:38 2019 VERIFY OK: depth=1, O=5b7ad644dfa4601549c2de30, CN=5b7ad644dfa4601549c2de40
Wed Jan 23 23:19:38 2019 VERIFY KU OK
Wed Jan 23 23:19:38 2019 Validating certificate extended key usage
Wed Jan 23 23:19:38 2019 NOTE: —mute triggered…
Wed Jan 23 23:19:39 2019 4 variation(s) on previous 3 message(s) suppressed by —mute
Wed Jan 23 23:19:39 2019 [5b7ad649dfa4601549c2de4e] Peer Connection Initiated with [AF_INET]80.82.222.122:16402
Wed Jan 23 23:19:45 2019 Outgoing Data Channel: Cipher ‘AES-128-CBC’ initialized with 128 bit key
Wed Jan 23 23:19:45 2019 Outgoing Data Channel: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Wed Jan 23 23:19:45 2019 Incoming Data Channel: Cipher ‘AES-128-CBC’ initialized with 128 bit key
Wed Jan 23 23:19:45 2019 NOTE: —mute triggered…
Wed Jan 23 23:19:45 2019 1 variation(s) on previous 3 message(s) suppressed by —mute
Wed Jan 23 23:19:45 2019 open_tun
Wed Jan 23 23:19:45 2019 TAP-WIN32 device [Ethernet 2] opened: \.Global{EA264166-614E-46F0-A523-96CAF910C9B4}.tap
Wed Jan 23 23:19:46 2019 NETSH: C:Windowssystem32netsh.exe interface ip set address Ethernet 2 dhcp
Wed Jan 23 23:19:46 2019 ERROR: netsh command failed: returned error code 1
Wed Jan 23 23:19:51 2019 NETSH: C:Windowssystem32netsh.exe interface ip set address Ethernet 2 dhcp
Wed Jan 23 23:19:52 2019 ERROR: netsh command failed: returned error code 1
Wed Jan 23 23:19:57 2019 NETSH: C:Windowssystem32netsh.exe interface ip set address Ethernet 2 dhcp
Wed Jan 23 23:19:57 2019 ERROR: netsh command failed: returned error code 1
Wed Jan 23 23:20:02 2019 NETSH: C:Windowssystem32netsh.exe interface ip set address Ethernet 2 dhcp
Wed Jan 23 23:20:02 2019 ERROR: netsh command failed: returned error code 1
Wed Jan 23 23:20:06 2019 NETSH: command failed
Wed Jan 23 23:20:06 2019 Exiting due to fatal error
2 Reply by Rino 24.01.2019 07:56:33
- Rino
- Moderator
- Offline
- Registered: 20.05.2016
- Posts: 518
Re: Ошибка подключения
Здравствуйте.
Скорее всего вы запустили клиент OpenVPN НЕ от имени администратора.
Posts: 2
Pages 1
You must login or register to post a reply
I am trying to figure out what is going on here as I am unable to connect to a VPN most of the time. I am using FrootVPN on the OpenVPN protocol. I used this guide to set it up. It is entirely ran through software on my computer (running windows 7 64 bit) I have not made any changes to the router settings. I have been using it for about 4 or 5 days and at first it was working fine. Then it started needing 2 or 3 tries to connect and now it won’t connect most of the time. I ALWAYS run as admin. Today I turned off my antivirus/firewall and now it connects but my IP address stays the same.
Logs: Logs had to be uploaded because I met my maximum character count
Does Not Connect
IP address does not change
EDIT: If I was to add it to the whitelist in my firewall what would the address and port and all that information be?
Also Now I get an error dialogue saying «ERROR: Reconnecting to FrootVPN has failed
I forgot my credentials to my router so I did a factory reset. That hasn’t helped yet, I will try turning off the firewall just to test.
OK, With the firewall on the router turned off and the program ran as admin I get this:
Thu Jan 15 13:52:33 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Dec 1 2014
Thu Jan 15 13:52:33 2015 library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.08
Enter Management Password:
Thu Jan 15 13:52:33 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Thu Jan 15 13:52:33 2015 Need hold release from management interface, waiting...
Thu Jan 15 13:52:33 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Thu Jan 15 13:52:34 2015 MANAGEMENT: CMD 'state on'
Thu Jan 15 13:52:34 2015 MANAGEMENT: CMD 'log all on'
Thu Jan 15 13:52:34 2015 MANAGEMENT: CMD 'hold off'
Thu Jan 15 13:52:34 2015 MANAGEMENT: CMD 'hold release'
Thu Jan 15 13:52:40 2015 MANAGEMENT: CMD 'username "Auth" "dylan07"'
Thu Jan 15 13:52:40 2015 MANAGEMENT: CMD 'password [...]'
Thu Jan 15 13:52:40 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Jan 15 13:52:40 2015 MANAGEMENT: >STATE:1421358760,RESOLVE,,,
Thu Jan 15 13:52:40 2015 UDPv4 link local: [undef]
Thu Jan 15 13:52:40 2015 UDPv4 link remote: [AF_INET]178.73.212.194:1201
Thu Jan 15 13:52:40 2015 MANAGEMENT: >STATE:1421358760,WAIT,,,
Thu Jan 15 13:52:40 2015 MANAGEMENT: >STATE:1421358760,AUTH,,,
Thu Jan 15 13:52:40 2015 TLS: Initial packet from [AF_INET]178.73.212.194:1201, sid=3406ba47 85bdd4aa
Thu Jan 15 13:52:40 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Jan 15 13:52:41 2015 VERIFY OK: depth=1, C=SE, ST=QQ, L=FrootTown, O=FrootOrg, OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain
Thu Jan 15 13:52:41 2015 VERIFY OK: nsCertType=SERVER
Thu Jan 15 13:52:41 2015 VERIFY OK: depth=0, C=SE, ST=QQ, L=FrootTown, O=FrootOrg, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
Thu Jan 15 13:52:42 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Jan 15 13:52:42 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 15 13:52:42 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Jan 15 13:52:42 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 15 13:52:42 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Thu Jan 15 13:52:42 2015 [server] Peer Connection Initiated with [AF_INET]178.73.212.194:1201
Thu Jan 15 13:52:43 2015 MANAGEMENT: >STATE:1421358763,GET_CONFIG,,,
Thu Jan 15 13:52:44 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu Jan 15 13:52:45 2015 PUSH: Received control message: 'PUSH_REPLY,ifconfig-ipv6 2a00:1a28:1159:7::1004/64 2a00:1a28:1159:7::1,dhcp-option DNS 80.67.0.2,dhcp-option DNS 91.213.246.2,redirect-gateway def1,route-ipv6 2000::/3,tun-ipv6,route-gateway 46.246.9.225,topology subnet,ping 10,ping-restart 160,ifconfig 46.246.9.230 255.255.255.224'
Thu Jan 15 13:52:45 2015 OPTIONS IMPORT: timers and/or timeouts modified
Thu Jan 15 13:52:45 2015 OPTIONS IMPORT: --ifconfig/up options modified
Thu Jan 15 13:52:45 2015 OPTIONS IMPORT: route options modified
Thu Jan 15 13:52:45 2015 OPTIONS IMPORT: route-related options modified
Thu Jan 15 13:52:45 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Jan 15 13:52:45 2015 do_ifconfig, tt->ipv6=1, tt->did_ifconfig_ipv6_setup=1
Thu Jan 15 13:52:45 2015 MANAGEMENT: >STATE:1421358765,ASSIGN_IP,,46.246.9.230,
Thu Jan 15 13:52:46 2015 NETSH: C:Windowssystem32netsh.exe interface ipv6 set address Local Area Connection 3 2a00:1a28:1159:7::1004 store=active
Thu Jan 15 13:52:46 2015 ERROR: netsh command failed: returned error code 1
Thu Jan 15 13:52:51 2015 NETSH: C:Windowssystem32netsh.exe interface ipv6 set address Local Area Connection 3 2a00:1a28:1159:7::1004 store=active
Thu Jan 15 13:52:51 2015 ERROR: netsh command failed: returned error code 1
Thu Jan 15 13:52:56 2015 NETSH: C:Windowssystem32netsh.exe interface ipv6 set address Local Area Connection 3 2a00:1a28:1159:7::1004 store=active
Thu Jan 15 13:52:56 2015 ERROR: netsh command failed: returned error code 1
Thu Jan 15 13:53:01 2015 NETSH: C:Windowssystem32netsh.exe interface ipv6 set address Local Area Connection 3 2a00:1a28:1159:7::1004 store=active
Thu Jan 15 13:53:01 2015 ERROR: netsh command failed: returned error code 1
Thu Jan 15 13:53:05 2015 MANAGEMENT: Client disconnected
Thu Jan 15 13:53:05 2015 NETSH: command failed
Thu Jan 15 13:53:05 2015 Exiting due to fatal error
Hello,
I have been using Eddie 2.18.9 Windows 10 x64 with no problems connecting using TAP adapter. I decided to upgrade to the new Eddie 2.19.6 version with Wintun support after I read about the performance enhancements i.e faster speeds then using the TAP adapter but can’t seem to get it to work. Every time I attempt to connect to any server, I get the following error message on my logs: «OpenVPN > ERROR: netsh command failed: returned error code 1.» I can’t seem to figure out what I am doing wrong. I have uninstalled both Wintun driver and Eddie then did a clean re-install and still won’t connect. It is very frustrating. Someone please provide assistance. Thanks in advance.
Here are the logs from my failed connection attempt:
I 2020.12.02 04:42:39 — Session starting.
I 2020.12.02 04:42:39 — Checking authorization …
. 2020.12.02 04:42:40 — IPv6 disabled with packet filtering.
! 2020.12.02 04:42:40 — Connecting to Bootes (United States of America, Phoenix, Arizona)
. 2020.12.02 04:42:40 — OpenVPN > OpenVPN 2.5.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 28 2020
. 2020.12.02 04:42:40 — OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2020.12.02 04:42:40 — OpenVPN > library versions: OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10
. 2020.12.02 04:42:40 — OpenVPN > Outgoing Control Channel Encryption: Cipher ‘AES-256-CTR’ initialized with 256 bit key
. 2020.12.02 04:42:40 — OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash ‘SHA256’ for HMAC authentication
. 2020.12.02 04:42:40 — OpenVPN > Incoming Control Channel Encryption: Cipher ‘AES-256-CTR’ initialized with 256 bit key
. 2020.12.02 04:42:40 — OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash ‘SHA256’ for HMAC authentication
. 2020.12.02 04:42:40 — OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]193.37.254.6:2018
. 2020.12.02 04:42:40 — OpenVPN > Socket Buffers: R=[65536->524288] S=[65536->524288]
. 2020.12.02 04:42:40 — OpenVPN > UDP link local: (not bound)
. 2020.12.02 04:42:40 — OpenVPN > UDP link remote: [AF_INET]193.37.254.6:2018
. 2020.12.02 04:42:40 — OpenVPN > TLS: Initial packet from [AF_INET]193.37.254.6:2018, sid=87415253 00b5af41
. 2020.12.02 04:42:40 — OpenVPN > VERIFY KU OK
. 2020.12.02 04:42:40 — OpenVPN > Validating certificate extended key usage
. 2020.12.02 04:42:40 — OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.12.02 04:42:40 — OpenVPN > VERIFY EKU OK
. 2020.12.02 04:42:40 — OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Bootes, emailAddress=info@airvpn.org
. 2020.12.02 04:42:40 — OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2020.12.02 04:42:40 — OpenVPN > [Bootes] Peer Connection Initiated with [AF_INET]193.37.254.6:2018
. 2020.12.02 04:42:41 — OpenVPN > SENT CONTROL [Bootes]: ‘PUSH_REQUEST’ (status=1)
. 2020.12.02 04:42:41 — OpenVPN > PUSH: Received control message: ‘PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.26.154.1,dhcp-option DNS6 fde6:7a:7d20:169a::1,tun-ipv6,route-gateway 10.26.154.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:169a::100f/64 fde6:7a:7d20:169a::1,ifconfig 10.26.154.17 255.255.255.0,peer-id 2,cipher AES-256-GCM’
. 2020.12.02 04:42:41 — OpenVPN > Pushed option removed by filter: ‘redirect-gateway ipv6 def1 bypass-dhcp’
. 2020.12.02 04:42:41 — OpenVPN > Pushed option removed by filter: ‘dhcp-option DNS6 fde6:7a:7d20:169a::1’
. 2020.12.02 04:42:41 — OpenVPN > Pushed option removed by filter: ‘tun-ipv6’
. 2020.12.02 04:42:41 — OpenVPN > Pushed option removed by filter: ‘ifconfig-ipv6 fde6:7a:7d20:169a::100f/64 fde6:7a:7d20:169a::1’
. 2020.12.02 04:42:41 — OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2020.12.02 04:42:41 — OpenVPN > OPTIONS IMPORT: compression parms modified
. 2020.12.02 04:42:41 — OpenVPN > OPTIONS IMPORT: —ifconfig/up options modified
. 2020.12.02 04:42:41 — OpenVPN > OPTIONS IMPORT: route-related options modified
. 2020.12.02 04:42:41 — OpenVPN > OPTIONS IMPORT: —ip-win32 and/or —dhcp-option options modified
. 2020.12.02 04:42:41 — OpenVPN > OPTIONS IMPORT: peer-id set
. 2020.12.02 04:42:41 — OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2020.12.02 04:42:41 — OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2020.12.02 04:42:41 — OpenVPN > Data Channel: using negotiated cipher ‘AES-256-GCM’
. 2020.12.02 04:42:41 — OpenVPN > Outgoing Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
. 2020.12.02 04:42:41 — OpenVPN > Incoming Data Channel: Cipher ‘AES-256-GCM’ initialized with 256 bit key
. 2020.12.02 04:42:41 — OpenVPN > interactive service msg_channel=0
. 2020.12.02 04:42:41 — OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=6 HWADDR=ec:e2:fd:80:96:99
. 2020.12.02 04:42:41 — OpenVPN > open_tun
. 2020.12.02 04:42:41 — OpenVPN > wintun device [Local Area Connection] opened
. 2020.12.02 04:42:42 — OpenVPN > NETSH: C:Windowssystem32netsh.exe interface ip set address 9 static 10.26.154.17 255.255.255.0
. 2020.12.02 04:42:43 — OpenVPN > NETSH: C:Windowssystem32netsh.exe interface ip delete dns 9 all
E 2020.12.02 04:42:43 — OpenVPN > ERROR: netsh command failed: returned error code 1
. 2020.12.02 04:42:48 — OpenVPN > NETSH: C:Windowssystem32netsh.exe interface ip delete dns 9 all
E 2020.12.02 04:42:48 — OpenVPN > ERROR: netsh command failed: returned error code 1
. 2020.12.02 04:42:52 — OpenVPN > NETSH: command failed
. 2020.12.02 04:42:52 — OpenVPN > Exiting due to fatal error
! 2020.12.02 04:42:52 — Disconnecting
. 2020.12.02 04:42:52 — Connection terminated.
. 2020.12.02 04:42:52 — IPv6 restored with packet filtering.
I 2020.12.02 04:42:53 — Cancel requested.
! 2020.12.02 04:42:53 — Session terminated.
Edited … by OpenSourcerer
Apply LOG format to logs