View Single Post
Posts: 5 | Thanked: 0 times | Joined on Mar 2010
#7
My server conf is now like this:
Code:
#  OpenVPN 2.1 Config, Mon Mar 29 18:09:59 CEST 2010
proto udp
dev tap0
ca /tmp/flash/ca.crt
cert /tmp/flash/box.crt
key /tmp/flash/box.key
dh /tmp/flash/dh.pem
tls-server
port 443
mode server
ifconfig-pool 192.168.179.10 192.168.179.20
push "route 192.168.179.0 "
ifconfig 192.168.179.0 255.255.255.0
push "route-gateway 192.168.179.0"
max-clients 10
tun-mtu 1500
mssfix
verb 3
daemon
cipher AES-256-CBC
comp-lzo
keepalive 10 120
I dont know how to delete my push routes from that config because its made automaticly by a freetz GUI. But yes, seems i dont have that problem anymore. It doesnt say anmore that the Network is unreachable if i do it via wlan0 or gprs0. But well, is still like this that i cant use any IP of the VPN.

The script i already tried but didnt help.

Code:
Mon Mar 29 18:17:18 2010 OpenVPN 2.1_rc20 arm-unknown-linux-gnueabi [SSL] [LZO2] [EPOLL] [MH] [PF_INET6] built on Nov 29 2009
Mon Mar 29 18:17:18 2010 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Mon Mar 29 18:17:18 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Mon Mar 29 18:17:18 2010 WARNING: file '/home/user/MyDocs/client01.key' is group or others accessible
Mon Mar 29 18:17:18 2010 /usr/bin/openssl-vulnkey -q -b 1024 -m <modulus omitted>
Mon Mar 29 18:17:18 2010 ******* WARNING *******: '/home/user/MyDocs/client01.key' cannot be verified as a non-vulnerable key. See 'man openssl-vulnkey' for details.
Mon Mar 29 18:17:18 2010 LZO compression initialized
Mon Mar 29 18:17:18 2010 Control Channel MTU parms [ L:1590 D:138 EF:38 EB:0 ET:0 EL:0 ]
Mon Mar 29 18:17:18 2010 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Mon Mar 29 18:17:18 2010 Local Options hash (VER=V4): 'c6c7c21a'
Mon Mar 29 18:17:18 2010 Expected Remote Options hash (VER=V4): '1a6d5c5d'
Mon Mar 29 18:17:18 2010 Socket Buffers: R=[65536->131072] S=[16384->131072]
Mon Mar 29 18:17:18 2010 UDPv4 link local: [undef]
Mon Mar 29 18:17:18 2010 UDPv4 link remote: [AF_INET]85.177.145.128:443
Mon Mar 29 18:17:18 2010 TLS: Initial packet from [AF_INET]85.177.145.128:443, sid=2bef8764 02f530d7
Mon Mar 29 18:17:19 2010 VERIFY OK: depth=1, /C=DE/ST=Hamburg/L=Hamburg/O=Fort-Funston/CN=Fort-Funston_CA/emailAddress=me@myhost.mydomain
Mon Mar 29 18:17:19 2010 VERIFY OK: depth=0, /C=DE/ST=CA/L=Hamburg/O=Fort-Funston/CN=fritzbox/emailAddress=me@myhost.mydomain
Mon Mar 29 18:17:20 2010 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Mar 29 18:17:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Mar 29 18:17:20 2010 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Mar 29 18:17:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Mar 29 18:17:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Mar 29 18:17:20 2010 [fritzbox] Peer Connection Initiated with [AF_INET]85.177.145.128:443
Mon Mar 29 18:17:22 2010 SENT CONTROL [fritzbox]: 'PUSH_REQUEST' (status=1)
Mon Mar 29 18:17:23 2010 PUSH: Received control message: 'PUSH_REPLY,route 192.168.179.0 ,route-gateway 192.168.179.0,ping 10,ping-restart 120,ifconfig 192.168.179.10 255.255.255.0'
Mon Mar 29 18:17:23 2010 OPTIONS IMPORT: timers and/or timeouts modified
Mon Mar 29 18:17:23 2010 OPTIONS IMPORT: --ifconfig/up options modified
Mon Mar 29 18:17:23 2010 OPTIONS IMPORT: route options modified
Mon Mar 29 18:17:23 2010 OPTIONS IMPORT: route-related options modified
Mon Mar 29 18:17:23 2010 ROUTE default_gateway=192.168.178.1
Mon Mar 29 18:17:23 2010 TUN/TAP device tap0 opened
Mon Mar 29 18:17:23 2010 TUN/TAP TX queue length set to 100
Mon Mar 29 18:17:23 2010 /sbin/ifconfig tap0 192.168.179.10 netmask 255.255.255.0 mtu 1500 broadcast 192.168.179.255
Mon Mar 29 18:17:23 2010 OpenVPN ROUTE: omitted no-op route: 192.168.179.0/255.255.255.255 -> 192.168.179.0
Mon Mar 29 18:17:23 2010 Initialization Sequence Completed
If i do a ping to 192.168.179.0 it just returns nothing. And this while the VPN is in a different address range than my wlan. My wlan works in 192.168.178.10/255.255.255.0 while the VPN is in 192.168.179.10/255.255.255.0.

ifconfig returns
Code:
tap0      Link encap:Ethernet  HWaddr XX:XX:XX:XX:XX:XX  
          inet addr:192.168.179.10  Bcast:192.168.179.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:386 errors:0 dropped:0 overruns:0 frame:0
          TX packets:9 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100 
          RX bytes:20180 (19.7 KiB)  TX bytes:1341 (1.3 KiB)
Maybe there are already some guys out there who successfully set up an openvpn network on N900? Because like this its is quite useless and i cant imagine that it is not possible to acces my lan from outside via VPN.

Greetings,
pioupus

Last edited by pioupus; 2010-03-29 at 17:17.