--- Day changed Fri Jan 01 2010 00:37 < pekster> You shouldn't need any as modules should be dynamically loaded 00:56 -!- Ceil [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has quit [] 01:21 < mithridates> why Iptables -L doesn't show rules? 02:15 < hyper_ch> !howto 02:15 < vpnHelper> hyper_ch: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 02:15 < mithridates> hey guys I'm really in trouble 02:15 < mithridates> plz help me about iptables 02:15 < mithridates> I wrote rule for NAT 02:15 < mithridates> but when I run iptables -L it doesn't show anything 02:16 < mithridates> but I can see it in /etc/sysconfig/iptables 02:29 -!- grub_booter_ [n=charlie@d54C519D5.access.telenet.be] has quit [Read error: 60 (Operation timed out)] 02:44 < Bushmills> iptables -L -t nat 02:45 < Bushmills> iptables comes with a man page, btw, which tells about those things 02:45 < Bushmills> http://doc.verhau.de/cgi-bin/dwww/usr/share/man/man8/iptables.8.gz?type=man 02:46 < vpnHelper> Title: iptables(8) (at doc.verhau.de) 02:46 < mithridates> yes I found it thank you 02:47 -!- grub_booter [n=charlie@d54C519D5.access.telenet.be] has joined ##openvpn 03:06 -!- master_of_master [i=master_o@p57B54BFE.dip.t-dialin.net] has joined ##openvpn 03:18 < mithridates> hey guys 03:18 < mithridates> openvpn[5103]: Options error: Unrecognized option or missing parameter(s) in server.conf:25: 45.34.11.203 (2.1_rc15) 03:18 < mithridates> what's wrong with me? 03:19 < mithridates> not with me 03:19 < mithridates> with my configuration :D 03:19 < mithridates> line 25 : local 45.34.11.203 03:20 < Bushmills> your problem is "Unrecognized option" 03:20 < mithridates> what does it mean? 03:24 < Bushmills> http://scarydevilmonastery.net/dict.cgi?unrecognized, http://scarydevilmonastery.net/dict.cgi?option 03:24 < mithridates> :( 03:26 -!- master_o1_master [n=master_o@p57B551DE.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:31 < Bushmills> make sure the interface with that ip address is actually up 03:32 < Bushmills> (on the vpn server) 03:32 < mithridates> I used --local and it worked 03:32 < mithridates> do I need to set any ip address for tun0? 03:33 < Bushmills> openvpn does, according your config 03:33 < hyper_ch> Bushmills: I did not neatly sum up the problem I have with all the necessary info (I think): http://www.ovpnforum.com/viewtopic.php?f=6&t=2389& 03:33 < vpnHelper> Title: OpenVPN Forum View topic - Can't SSH into a open-vpned client anymore (at www.ovpnforum.com) 03:36 < Bushmills> hyper_ch: without reading all that, I think I understood your problem. My problem was that I had to repeat what I had repeated already, and found me in the situation that I had to repeat what I had repeatedly repeated already 03:36 < hyper_ch> and I think you did not understand the problem 03:36 < Bushmills> without doing so again now, I'm afraid I don't know how to help you 03:37 < Bushmills> well, you connect from ssh client to openvpn client, start openvpn there, then route on openvpn client is changed to redirect default through openvpn server, and your ssh connection drops dead 03:38 < Bushmills> and you don't understand how and why openvpn server could possibly be involved in your ssh traffic 03:39 < hyper_ch> that's right 03:39 < hyper_ch> why doesn't that happen on the lan then? 03:39 < Bushmills> what part do you think did i not understand? 03:39 < hyper_ch> you seem to understand now but you were not phrasing it in a such a way that it seemed you did undestand 03:40 < Bushmills> see? about why that doesn't happen on your lan, i also already speculated, and gave you a possible reason, twice already 03:40 < Bushmills> to which you said something along the line of that that doesn't make sense 03:41 < Bushmills> so i think you should read a bit about routing before attempting to understand or solve your problem 03:42 < Bushmills> as i can't read it on your behalf, my options to help are rather limited. 03:43 < hyper_ch> I don't even know where to start to read 03:46 < Bushmills> mithridates: make sure your editor didn't add any strange chars, like control chars, which don't show, into your ip address 03:47 < Bushmills> for example, delete the whole line, and retype it 03:55 -!- baz [n=baz@c-67-183-155-189.hsd1.wa.comcast.net] has quit [Read error: 104 (Connection reset by peer)] 04:40 < krzee> [05:18] openvpn[5103]: Options error: Unrecognized option or missing parameter(s) in server.conf:25: 45.34.11.203 (2.1_rc15) 04:40 < krzee> you must have: 04:40 < krzee> local 04:40 < krzee> 45.34.11.203 04:40 < krzee> with a line break or something to make the app think the line ended 05:40 < Hetman> Hello, can i set somehow default user, and default pass in my vpn.conf ? i don`t want to type it all time 05:59 < Bushmills> Hetman: use key authentication 06:00 < Bushmills> moiners krzee 06:09 < krzee> moinmoin 06:09 < Bushmills> indeed 06:09 < krzee> Hetman, do you run the server and client? 06:10 < krzee> (is the pass for the key file or the vpn) 06:10 < krzee> because keyfiles dont need passes (but do support them), servers dont need to ask for passwords (but it is supported) 06:10 < krzee> but if you dont control the server and it requires a pass, yes there is a way 06:11 < krzee> !pwfile 06:11 < vpnHelper> krzee: "pwfile" is (#1) OpenVPN will only read passwords from a file if it has been built with the --enable-password-save configure option, or on Windows by defining ENABLE_PASSWORD_SAVE in config-win32.h, or (#2) see --auth-user-pass in the manual (!man) for more info 06:36 -!- hyper_ch [n=hyper@adsl-84-227-58-130.adslplus.ch] has left ##openvpn ["Konversation terminated!"] 07:14 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 07:17 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 07:21 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 08:07 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 113 (No route to host)] 08:13 -!- pa [n=pa@unaffiliated/pa] has quit ["Sto andando via"] 08:24 < ecrist> good morning. 08:25 < ecrist> Happy New Year 08:30 < Holistah> yippie 08:31 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 08:31 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 08:33 < Holistah> I can't believe I'm up....I went to sleep 5 hours ago.... 08:33 < Holistah> should I make pancakes, or eggs? and don't say both. 08:33 < ecrist> both, with bacon 08:37 < Holistah> ugh...I wish there was something on tv....so bored 08:38 < ecrist> netflix + xbox FTW 08:39 < Holistah> not even 08:46 -!- Holister [n=ryan@static-151-204-189-39.pskn.east.verizon.net] has joined ##openvpn 08:49 -!- Holistah [n=holister@c-71-230-216-184.hsd1.nj.comcast.net] has quit [Remote closed the connection] 08:49 -!- Holistah [n=holister@c-71-230-216-184.hsd1.nj.comcast.net] has joined ##openvpn 08:50 -!- Pietjepuk [n=peter@89.200.78.148] has joined ##openvpn 08:50 -!- Holistah [n=holister@c-71-230-216-184.hsd1.nj.comcast.net] has quit [Remote closed the connection] 08:51 -!- Holistah [n=holister@c-71-230-216-184.hsd1.nj.comcast.net] has joined ##openvpn 08:51 < Holistah> ARGH! apparantly my irc client doesn't like high-ascii.... 08:52 < Holistah> Bruno, or the hangover? right now neither really appeal to me very much.... 09:13 < Pietjepuk> Happy newyear you all ... I've got an "assertion failed" error.. and really know idear what's wrong .. does someone care to take a look ?? http://pastebin.com/m634e9172 09:22 < Holistah> unfortunately, I suspect the problem is in your server config. it's not in /etc/openvpn? 09:24 < Pietjepuk> Holistah: .. Let me check.. 09:26 < Pietjepuk> Holistah: You where right.. It's here -->> http://pastebin.com/m1c426abb 09:35 < Holistah> set "verb 9" in both configs....it's suppressing the message that would describe the actual problem... 09:41 < Pietjepuk> .. ok.. .. I've posted the new .. ( huge ! ) logs here .. http://pastebin.com/m3f9e2b0c 09:41 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 09:42 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 09:42 -!- pa [n=pa@unaffiliated/pa] has joined ##openvpn 09:53 < Holistah> It's not jumping out at me.... have you read this http://ubuntuforums.org/showthread.php?t=845021 by any chance? 09:53 < vpnHelper> Title: [ubuntu] OpenVPN: Assertion failed at crypto.c:168 - Ubuntu Forums (at ubuntuforums.org) 09:56 -!- Pietjepuk_ [n=peter@89.200.78.148] has joined ##openvpn 09:56 < Pietjepuk_> Holistah: I'm getting the same errors using a diffrent client from a different ip .. So the client is not the problem I guess.. .. and I got disconnected.. did I miss something ? 09:56 -!- Pietjepuk [n=peter@89.200.78.148] has quit [Read error: 54 (Connection reset by peer)] 09:56 -!- Pietjepuk_ is now known as Pietjepuk 09:59 < Holistah> have your read http://ubuntuforums.org/showthread.php?t=845021 09:59 < vpnHelper> Title: [ubuntu] OpenVPN: Assertion failed at crypto.c:168 - Ubuntu Forums (at ubuntuforums.org) 10:01 < Pietjepuk> Holistah: I had allready found and tryed that.. but let me try again... (client says the cipher I am using is supported allso..) 10:04 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 10:07 < Holistah> ugh....I hate mathematicians.... http://www.cs.utk.edu/~plank/plank/papers/CS-96-332.html even when they're trying to explain something specifically so that someone can understand it without knowing a zillion other things, they still make it overly complicated 10:07 < vpnHelper> Title: ``A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems'' (at www.cs.utk.edu) 10:09 < Pietjepuk> Holistah: ... sorry .. doesn't work using AES-256 CBC-256 either... It gives the same error message .. I do notice all the time there is a difference between local options hash and expected remote options hash ... has that something to do with it maybe ? 10:14 < Holistah> nah...they'll always be different... 10:14 < Pietjepuk> ... I saw them the same in a lot of posts while googling for this error ... 10:15 < Holistah> Only thing that keeps staring me in the face is the redirect-gateway failing....everything else is unfamiliar to me 10:16 < Pietjepuk> Holistah: .. Ill take it out.. and see.. 10:23 < Pietjepuk> Holistah: ... That solved it... unbeleivably stupid that I didn't try it.... I thought it wouldn't couse a fail.... Thank a lot for your assistence !!!!!! 10:24 -!- slol [n=john@c-76-108-239-149.hsd1.fl.comcast.net] has joined ##openvpn 10:24 < slol> krzee, krzie : ping 10:28 -!- Pietjepuk [n=peter@89.200.78.148] has quit [Read error: 104 (Connection reset by peer)] 10:30 -!- Pietjepuk [n=peter@89.200.78.148] has joined ##openvpn 10:37 < krzee> ? 10:45 -!- Optic [n=Optic@miso.capybara.org] has left ##openvpn [] 10:46 -!- Pietjepuk [n=peter@89.200.78.148] has left ##openvpn [] 11:39 -!- corretico__ [n=laguilar@201.201.46.106] has joined ##openvpn 11:47 < Holistah> haha....ok... bruno was actually funny.... i'm pleasantly surprised 11:57 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Connection timed out] 12:38 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 12:44 -!- corretico__ [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 13:02 -!- zamba [i=marius@flage.org] has joined ##openvpn 13:02 < zamba> i have a openvpn server with several local networks behind it.. 13:02 < zamba> the openvpn server is the only machine with a public ip 13:03 < zamba> now i want to forward one of the internal machines' ssh service to the outside world 13:03 < zamba> i've tried using iptables -t nat -A PREROUTING -p tcp --dport -j DNAT --to-destination :22 13:03 < zamba> and then making sure that ip forwarding is activated by issuing echo 1 > /proc/sys/net/ipv4/ip_forward 13:03 < zamba> but i'm still not able to connect to the inside machine from the outside.. what am i missing? 13:04 < zamba> the openvpn server isn't a NAT router for any other networks.. could that be the problem here? 13:14 < zamba> anyone have any idea? 13:16 < Holister> zamba: I may be able to help....but your description is lacking 13:17 < zamba> Holister: what do you lack? 13:17 < zamba> i believe i have to do something with SNAT to make the connection go back the right way 13:17 < Holister> your openvpn involvement for one 13:17 < zamba> please let me know what else you need 13:17 < zamba> hm? 13:18 < zamba> what do you mean? 13:18 < Holister> what are the subnets and where are you trying to get to from where 13:18 < zamba> well.. i have one subnet 192.168.4.0/24 13:18 < zamba> i have a network that's located well behind NAT (not public ip addresses at all).. 13:18 < zamba> not = no 13:19 < zamba> and from my router inside there i have established a vpn tunnel to a server located on the public internet (with a routable ip address) 13:21 < zamba> wow, think i actually got it working 13:21 < zamba> i lacked the SNAT :) 13:21 < Holister> oooooook 13:22 < zamba> wow, perfect 13:22 < zamba> can't believe i remembered this stuff :) 13:22 < zamba> thanks anyway :) 13:23 < zamba> iptables -t nat -A PREROUTING -p tcp --dport 8080 -j DNAT --to-destination 192.168.4.223 13:23 < zamba> iptables -t nat -A POSTROUTING -p tcp --dport 8080 -d 192.168.4.223 -j SNAT --to-source 10.8.0.1 13:23 < zamba> that did the trick 13:24 < Holister> oh....right.... I never did a setup like that...whenever a box was forwarding a port it was always masq'ing also.....I should probably actually copy that down in case someone else asks later 13:25 -!- slol [n=john@c-76-108-239-149.hsd1.fl.comcast.net] has quit [Read error: 104 (Connection reset by peer)] 13:26 < zamba> very neat 13:26 < zamba> i can now watch tv from outside the network.. dreambox rocks :) 14:22 -!- jhp [n=jhp@zeus.jhprins.org] has quit ["leaving"] 14:32 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] 15:04 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 15:33 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 15:33 < mithridates> !factoids tls 15:33 < vpnHelper> mithridates: Error: The "Factoids" plugin is loaded, but there is no command named "tls" in it. Try "list Factoids" to see the commands in the "Factoids" plugin. 15:33 < mithridates> !factoids search tls 15:33 < vpnHelper> mithridates: 'tls-verify', 'tls-cipher', and 'tls-auth' 15:33 < mithridates> !factoids search handshake 15:33 < vpnHelper> mithridates: No keys matched that query. 15:34 < mithridates> VERIFY ERROR: depth=1, error=certificate is not yet valid: /C=... 15:34 < mithridates> what's the problem guys 15:34 < mithridates> ? 15:34 < mithridates> VERIFY ERROR: depth=1, error=certificate is not yet valid: /C= 15:35 < mithridates> TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 15:37 < |Mike|> QUIT PASTING ERROR MESSAGES 15:38 < |Mike|> USE PASTEBIN ! 15:38 < |Mike|> your CERT isn't valid mithridates 15:38 < |Mike|> read the friggin error! 15:39 < mithridates> how can I validate it? 15:40 < mithridates> how can I make it valid? 15:40 < mithridates> :( 15:48 < |Mike|> ask your system admin ? 15:48 < |Mike|> he has to sign a new cert. for you 15:56 < mithridates> I'm the admin 15:56 < mithridates> I signed the cert by openssl verify -CAfile ca.crt -purpose sslclient ca.crt 15:56 < mithridates> ca.crt: OK 15:57 < |Mike|> and what dates ? :) 15:58 < mithridates> I don't know 15:58 < mithridates> how can I set that? 16:00 < |Mike|> use the pki tools ? :p 16:00 < |Mike|> or ssl config... 16:01 < mithridates> :D ok |Mike| 16:01 < mithridates> thnx 16:05 < mithridates> |Mike|: plz tell me, I couldn't find it :( 16:05 < |Mike|> find . | grep build ? 16:06 < mithridates> nothing 16:06 < mithridates> w8 16:06 < |Mike|> or easy-rsa 16:06 < mithridates> http://pastebin.ca/1734436 16:07 < |Mike|> :-) 16:07 < |Mike|> !howto 16:07 < vpnHelper> |Mike|: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 16:08 < mithridates> I did it :( 16:08 < |Mike|> ./build-ca 16:08 < |Mike|> err 16:08 < |Mike|> ./build-key client 16:09 < mithridates> ok ok I saw it 16:12 < mithridates> TLS Error: Unroutable control packet received from 16:12 < |Mike|> heh 16:13 < mithridates> why? 16:15 < mithridates> I also disabled firewall in windows 16:15 < |Mike|> what error do you get (verb 6 ) (and paste it @ pastebin hehe) 16:16 < mithridates> http://pastebin.ca/1734444 16:20 < |Mike|> WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm 16:29 < mithridates> |Mike|: I have different build-key-server script 16:29 < mithridates> http://svn.openvpn.net/projects/openvpn/trunk/openvpn/easy-rsa/build-key-server 16:31 < mithridates> http://pastebin.ca/1734460 16:32 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit ["( www.nnscript.com :: NoNameScript 4.22 :: www.esnation.com )"] 16:34 -!- _numbers [n=x@unaffiliated/numbers/x-253875] has joined ##openvpn 16:35 < _numbers> how is pptp related to openvpn? 16:36 < Bushmills> it has three p in its name, openvpn has two 16:38 < mithridates> =))))))) 16:38 < mithridates> heheee 16:38 < _numbers> that is incredibly insightful 16:39 < |Mike|> mithridates: no idea 16:40 < mithridates> I followed some crazy guideline for openssl config and now I should do all again 16:41 < |Mike|> Yes 17:00 -!- _numbers [n=x@unaffiliated/numbers/x-253875] has quit [Remote closed the connection] 17:08 -!- _numbers [n=x@unaffiliated/numbers/x-253875] has joined ##openvpn 17:31 -!- cityLights [n=cityLigh@bzq-84-111-46-151.red.bezeqint.net] has quit [Remote closed the connection] 17:32 < krzee> !notcompat 17:32 < vpnHelper> krzee: "notcompat" is (#1) ipsec and pptp are NOT compatibile with openvpn... openvpn is uses SSL, pptp and ipsec both use proprietary protocols, and therefor CAN NOT be compatible, or (#2) openvpn only connects to openvpn 17:32 < krzee> !pptp 17:32 < vpnHelper> krzee: "pptp" is PPTP is known to be a faulty protocol. The designers of the protocol, Microsoft, recommend not to use it due to the inherent risks. Lots of people use PPTP anyway due to ease of use, but that doesn't mean it is any less hazardous. The maintainers of PPTP Client and Poptop recommend using OpenVPN (SSL based) or IPSec instead. http://pptpclient.sourceforge.net/protocol-security.phtml to 17:32 < vpnHelper> krzee: read about why to not use pptp 17:38 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 104 (Connection reset by peer)] 17:43 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 17:55 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 60 (Operation timed out)] 17:55 -!- lt83850 [n=your@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 18:20 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 54 (Connection reset by peer)] 18:59 < crazygir> is it possible to setup a vpn via routing whereby the client doesn't send the server *all* of their traffic, but only what's relevant? 18:59 < krzee> crazygir, if you can define whats relevant based on subnets, sure 19:00 < crazygir> I would only want rdp and smtp traffic to pass 19:00 < krzee> there actually is a way 19:00 < crazygir> isn't that fantastic ;) 19:00 < krzee> lemme type it out 19:00 < crazygir> what should I go read? 19:01 < crazygir> hah, ok 19:02 < krzee> !learn routebyapp as if you want to send only certain apps over the VPN you need to run a socks server on the internal VPN subnet (see !sockd) then get an app like proxifier (google it) to selectively route traffic over the socks proxy based on port/app/subnet or any combination. 19:02 < vpnHelper> krzee: Joo got it. 19:02 < krzee> !sockd 19:02 < vpnHelper> krzee: Error: "sockd" is not a valid command. 19:03 < crazygir> !socks 19:03 < vpnHelper> crazygir: Error: "socks" is not a valid command. 19:04 < krzee> !learn sockd as if you want !routebyapp you can use this dante config www.ircpimps.org/sockd.conf but BE SURE TO ONLY RUN THIS ON THE INTERNAL VPN IP! otherwise you will be an open proxy. that config has no security because its expected to run inside openvpn 19:04 < vpnHelper> krzee: Joo got it. 19:04 < krzee> (i personally use that method) 19:04 < crazygir> sounds risky 19:05 < krzee> so i can route only certain apps (then i exclude certain subnets from that) 19:05 < krzee> risky how? 19:05 < crazygir> like a slight mishap might really screw you 19:05 < krzee> mishap like that? 19:05 < crazygir> no, like on the fw/filtering rules on your vpn server working out the route 19:06 < krzee> that wont happen 19:06 < krzee> openvpn is only route based 19:06 -!- craver_ [n=craver@208.53.57.220] has quit [Read error: 110 (Connection timed out)] 19:06 < crazygir> I guess I could just send all of the client's traffic thru 19:06 < krzee> if you can define what you want in subnets you can do it without openvpn 19:06 < krzee> err 19:06 < krzee> if you can define what you want in subnets you can do it within openvpn 19:06 < crazygir> i just didn't like the idea at first 19:06 < krzee> otherwise you need what i do 19:06 < krzee> theres nothing "risky" about it 19:06 < krzee> just run it on the internal vpn subnet ip 19:07 < crazygir> what do you mean byt define what you want in subnets? 19:07 -!- craver_ [n=craver@208.53.57.220] has joined ##openvpn 19:07 < krzee> if thats risky dont go crossing any streets 19:07 < crazygir> heh 19:07 < krzee> you dunno what a subnet is? 19:07 < krzee> like ip netmask 19:08 < krzee> for example only a certain smtp server, not a problem 19:08 < krzee> but ALL port 25 traffic, not gunna happen without my method 19:08 < crazygir> I know what a subnet is, just didn't really understand what you were suggesting 19:09 < crazygir> are you referring to being able to filter traffic between the subnets? 19:13 < krzee> with openvpn you can push routes 19:13 < krzee> thats how it knows what to send over the vpn 19:13 < krzee> to send all you change the default route, but you can also do specific routes 19:13 < krzee> so if its only certain subnets you want over the vpn, no problem, just push a route to the client 19:13 < krzee> like: 19:13 < krzee> in server config: push "route " 19:14 < krzee> however, you said: ALL rdp and ALL smtp 19:15 < krzee> which to me means either your mail and rdp apps, or the mail and rdp ports 19:15 < krzee> which i personally am able to do with my setup 19:16 < crazygir> yes, I guess I'm not sure which setup would be better at this point 19:17 < krzee> welp those are the options =] 19:17 < crazygir> simpler configuration is better, but right now I'd only really want to allow filtered access (based on port) 19:17 < krzee> both are simple 19:17 < krzee> depends on needs 19:18 < krzee> if you know the exact subnets and there arent too many, use the push route 19:18 < krzee> if you need ALL for an app or port, use the !routebyapp method 19:18 < krzee> you need to decide what you want, then you know what you need 19:20 < crazygir> I think our terms and definitions are slightly mismatched, but that is ok. I think I understand what you are saying. I don't want ALL rdp traffic, just rdp traffic to a specific IP/hostname 19:20 < crazygir> the hostname part I think will be an issue 19:20 < crazygir> as wins wants broadcast.. 19:22 < krzee> ok than thats simple 19:24 < crazygir> supposedly bridging isn't scalable though 19:24 < krzee> wins does NOT want want broadcast 19:24 < krzee> it actually replaces it for NETBIOS translation 19:24 < krzee> !wins 19:24 < vpnHelper> krzee: "wins" is http://oreilly.com/catalog/samba/chapter/book/ch07_03.html is a good link for seeing how to run WINS on samba 19:27 < |Mike|> cows say moo ? 19:28 < krzee> plus you dont even need NETBIOS translation, anything you can do by netbios name you can do by the ip 19:29 < crazygir> my users know their hostname, not ip 19:30 < crazygir> krzee: ideally, a user should be able to initiate the vpn and then rdp to their workstation 19:30 < crazygir> windows to windows, via openvpn on openbsd, with a little help from the windows dc on the internalnetwork 19:30 < krzee> thats not a problem 19:30 < krzee> with wins they can do it by netbios name 19:31 < crazygir> can you point me in a configuration direction? I'm finding myself lost in all the possibilities 19:31 < krzee> without they can do it by ip 19:31 < krzee> !sample 19:31 < krzee> !man 19:31 < vpnHelper> krzee: "sample" is (#1) http://www.ircpimps.org/openvpn.configs for a working sample config, or (#2) DO NOT use these configs until you understand the commands in them, read up on each first column of the configs in the manpage (see !man) 19:31 < vpnHelper> krzee: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 19:31 < krzee> !route 19:31 < vpnHelper> krzee: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 19:31 * |Mike| stumbles something about donations :p 19:32 < krzee> if you only need the lan behind the server shared: you only push its route to clients, and skip to "ROUTES BEHIND OPENVPN" 19:33 < crazygir> k 19:33 * crazygir reading 19:33 < krzee> cool im outta here 19:33 < krzee> time to shower eat and party 19:34 < crazygir> ty 19:35 -!- caimlas [n=caimlas@DHCP-26.64-179-155.iw.net] has left ##openvpn ["Leaving"] 19:53 < krzee> np 20:36 < _numbers> which is more secure--RSA, DSA, or DH? 20:37 < crazygir> which points are you considering? 20:37 < _numbers> longest time to decrypt using brute force :) 20:40 < crazygir> which length/ they all have different bitrates 20:41 < _numbers> highest 20:46 -!- corretico__ [n=laguilar@201.201.46.106] has joined ##openvpn 20:47 < crazygir> what about performance? 20:47 < crazygir> do you have crypto hardware? 20:49 < _numbers> lol good q but no lets assume i dont care about performance 20:50 < _numbers> also, which is most secure out of: base64 blowfish cast des idea rc5 20:50 < _numbers> actually just: blowfish cast5 des3 idea rc5 20:58 < _numbers> idea 1991, blowfish 1993, rc5 1994, cast-128 1996, triple des 1998 21:00 -!- corretico__ [n=laguilar@201.201.46.106] has quit ["Leaving"] 21:00 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 21:01 < _numbers> simulation results showed that Blowfish has a better performance than other common encryption algorithms use. AES showed poor performance results compared to other algorithms since it requires more processing power. 21:03 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 21:04 < _numbers> in order of speed: rc4-256, blowfish-256, aes-128, aes-256, DES, with Triple DES the slowest by far. http://www.javamex.com/tutorials/cryptography/ciphers.shtml 21:04 < vpnHelper> Title: Comparison of encryption ciphers in Java (at www.javamex.com) 21:06 < _numbers> DES is labeled insecure and an RFC actually says not to use it. wonder why it is even an option. even Triple DES is only considered moderately secure 21:07 < _numbers> AES is the most secure, then blowfish but recently superseded by twofish 21:07 < _numbers> In cryptography, the Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. originally published as Rijndael. 21:08 < _numbers> so DSA + AES-256 it is 21:08 < _numbers> now to figure out message authentication codes (MAC) 21:10 < crazygir> AES is proprietary 21:10 < crazygir> twofish is the open equivalent.. I believe 21:11 -!- HotMama [n=Rachu@cpe-24-95-54-134.columbus.res.rr.com] has quit ["Goodbye"] 21:23 < _numbers> ah crap AES not an option in openssl then eh 21:23 < _numbers> i wonder how php mcrypt can do it 21:23 < _numbers> twofish not supported either -- too new? 21:23 < _numbers> so i guess that means blowfish for openssl 21:28 < _numbers> bf bf-cbc bf-cfb bf-ecb bf-ofb -- which is best? 21:28 < _numbers> cbc? 21:33 < _numbers> definitely not ecb 21:33 < _numbers> http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation 21:33 < vpnHelper> Title: Block cipher modes of operation - Wikipedia, the free encyclopedia (at en.wikipedia.org) 21:34 < krzee> the certs cant be AES 21:34 < krzee> but the cipher can 21:34 < krzee> and dh is entirely different 21:34 < krzee> !dh 21:34 < vpnHelper> krzee: "dh" is build-dh from easy-rsa and option dh in ssl-admin, creates a file which is a prime number the size of bits you defined (1024 default) which is used in the diffie-hellman algorithm to provide a method to negotiate a secure connection over an insecure channel. just one of the layers of encryption available to you in your VPN 21:34 < _numbers> !cbc 21:35 < vpnHelper> _numbers: Error: "cbc" is not a valid command. 21:38 < _numbers> "CBC has been the most commonly used mode of operation." 21:40 < _numbers> why is it necessary to gendsa dif. than genrsa (e.g. with a dsaparam-file) ? 22:13 < mithridates> how can I disable CA for security in client section? 22:24 < krzee> mithridates, huh? 22:29 < mithridates> oh sorry I was not 22:30 < mithridates> I wanted to test vpn whitout authorization 22:37 < krzee> !noauth 22:37 < vpnHelper> krzee: Error: "noauth" is not a valid command. 22:37 < krzee> !authpass 22:37 < vpnHelper> krzee: "authpass" is (#1) please see --auth-user-pass-verify in the manual to learn how to force clients to use passwords in addition to certs, or (#2) or to ONLY use passwords (no certs, highly NOT recommended) also use --client-cert-not-required, or (#3) and if you want the login name to be used as the common-name for things like ccd entries, use --username-as-common-name 22:37 < krzee> client-cert-not-required is 1 way 22:37 < krzee> or just dont use --ca and friends 22:38 < krzee> read about those in the manual 22:45 < mithridates> tnx 22:55 -!- robert_ [n=hellspaw@objectx/robert] has left ##openvpn ["Leaving"] 23:54 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] --- Day changed Sat Jan 02 2010 00:25 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 00:25 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 00:50 -!- alan` [n=alan@rrcs-67-52-47-64.west.biz.rr.com] has joined ##openvpn 00:51 < alan`> hey you guys quick question about installing openvpn on a debian server 00:51 < alan`> after apt-get installing the packages i already had the keys and such set out, can i just deploy those keys or is there something more to do? 00:52 < _numbers> `openssl verify -CAfile ca.crt client.crt` says error 18 at 0 depth lookup:self signed certificate 00:52 < _numbers> wtf is that a problem for 00:53 < _numbers> Installing CA Certificates into the OpenSSL framework 01:06 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 01:11 -!- Optic [n=Optic@miso.capybara.org] has joined ##openvpn 01:12 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 01:31 -!- Intensity [i=[9wZk4yy@unaffiliated/intensity] has quit [Excess Flood] 01:36 -!- Intensity [i=[lRD75M9@unaffiliated/intensity] has joined ##openvpn 01:49 < magic_1> well alan`, if its not your main server, than yes you should be able to use the keys 02:51 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 03:00 -!- teddymills [n=teddy@208.92.235.227] has quit [Read error: 54 (Connection reset by peer)] 03:00 -!- teddymills [n=teddy@208.92.235.227] has joined ##openvpn 03:03 -!- Ceil [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has joined ##openvpn 03:04 < Ceil> !redirect 03:04 < vpnHelper> Ceil: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 03:05 -!- krzy [i=nobody@hemp.ircpimps.org] has joined ##openvpn 03:05 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 03:07 -!- master_o1_master [n=master_o@p57B565EE.dip.t-dialin.net] has joined ##openvpn 03:18 -!- master_of_master [i=master_o@p57B54BFE.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:24 -!- krzy [i=nobody@hemp.ircpimps.org] has quit [Client Quit] 03:24 -!- krzy [i=nobody@hemp.ircpimps.org] has joined ##openvpn 03:44 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has joined ##openvpn 03:46 < Ceil> So I've got two senarios where I am going to use my VPN: 03:46 < Ceil> [WIFI_MACHINE]----(WIFI)---->[WIRELESS_ACCESS_POINT]----(LAN)---->[VPN_SERVER]----->INTERNET 03:47 < Ceil> woops 03:47 < Ceil> should be 03:47 < Ceil> [LAPTOP]----(WIFI)---->[WIRELESS_ACCESS_POINT]----(LAN)---->[VPN_SERVER]----->INTERNET 03:47 < Ceil> and there is also 03:48 < Ceil> [LAPTOP]----(WIFI)---->[PUBLIC_WIRELESS_ACCESS_POINT]----(LAN)----->INTERNET----->[HOME_ROUTER]----(LAN)----->[VPN_SERVER] 03:48 < Ceil> I've been reading up 03:48 < Ceil> oh, and I want to tunnel all traffic through the vpn 03:49 < Ceil> aparently in the redirect-gatway directive you need to put "local" for the first senario but some people say you don't 03:49 < reiffert> proceed. 03:50 < Ceil> Also I'm having troubles wrapping my head around natting/routing/ip masquarading 03:50 < Ceil> I'm running the client 03:50 < Ceil> Windows Vista 03:50 < Ceil> and teh server is Ubuntu 03:51 < reiffert> And your question is? 03:51 < Ceil> I've printed out many guides but I still can't seem to write a config for my needs 03:51 < Ceil> basically I need some help starting from scratch 03:51 < Ceil> I've got openvpn installed 03:51 < reiffert> !howto 03:51 < vpnHelper> reiffert: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 03:51 < Ceil> I've read that 03:51 < Bushmills> Ceil: http://scarydevilmonastery.net/masq 03:51 < reiffert> sample config inclusive. 03:52 < reiffert> moin MushBills 03:52 < Ceil> All the guides use PKI but I rather use a static key. 03:52 < Bushmills> moiners reiffert 03:53 < Ceil> and what is the difference between tun an tap 03:53 < Ceil> do I need tun if I want to tunnel all traffic through my vpn? 03:54 < Bushmills> !tunortap 03:54 < vpnHelper> Bushmills: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 03:54 < vpnHelper> Bushmills: against you over the vpn 03:55 < Ceil> ok, so let me get up sample.ovn and I'll try configure it 03:55 < Bushmills> ok, we let you do that 03:56 < Ceil> where are the default config files stored on linux? 03:57 < Ceil> vpn@securevpn:/etc/openvpn$ cd /usr/share/doc/packages/openvpn 03:57 < Ceil> -bash: cd: /usr/share/doc/packages/openvpn: No such file or directory 03:57 < Ceil> vpn@gsecurevpn:/etc/openvpn$ cd /usr/share/doc/openvpn-2.0 03:57 < Ceil> -bash: cd: /usr/share/doc/openvpn-2.0: No such file or directory 03:59 < Ceil> ok I found it on a windows system 04:00 < Ceil> http://pastebin.org/70465 04:00 < Ceil> is that ok for a server side 04:00 < Ceil> with a static key 04:00 < Ceil> given my requirments 04:02 < reiffert> vpn functionality independend from authentication method. 04:02 < Ceil> what? 04:02 < Ceil> it is using a static key? 04:02 < reiffert> i recommend to use PKI first, like the howto, change to static keya fterwards 04:03 < Ceil> but generating a key takes ages 04:04 < reiffert> something between 2 to 5 minutes != ages. 04:05 < reiffert> Ceil: default config files (linux) 04:05 < reiffert> cd /usr/share/doc 04:05 < reiffert> ls -ald *openvpn* 04:06 < Ceil> $ cd /usr/share/doc/packages/openvpn 04:06 < Ceil> -bash: cd: /usr/share/doc/packages/openvpn: No such file or directory 04:06 < reiffert> 11:05 < reiffert> cd /usr/share/doc 04:06 < reiffert> 11:05 < reiffert> ls -ald *openvpn* 04:07 < Ceil> cheers 04:07 < Ceil> where is easy rsa though 04:08 < reiffert> examples directory. 04:08 < Ceil> ah kk 04:09 < Ceil> I don't trust a 1024 bit key and 4096 takes way too long to generate 04:09 < Ceil> don't you know enough about static keys to help me? 04:15 < reiffert> you really should read that howto. It also covers static key stuff. 04:19 < Ceil> oh, http://www.openvpn.net/index.php/open-source/documentation/miscellaneous/78-static-key-mini-howto.html 04:19 < vpnHelper> Title: Static Key Mini-HOWTO (at www.openvpn.net) 04:19 < Ceil> I found that 04:20 < Ceil> thanks for your help 04:20 < Ceil> night 04:21 -!- Ceil [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has quit [] 04:27 -!- rawDawg2 [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 04:27 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit [Read error: 54 (Connection reset by peer)] 04:34 < reiffert> I'm afraid he will come back/ 04:43 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 04:43 -!- rawDawg2 [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit [Read error: 113 (No route to host)] 04:57 < Bushmills> ubuntu says it all 05:19 -!- lt83850 [n=your@c-24-127-180-91.hsd1.pa.comcast.net] has quit [] 06:26 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has joined ##openvpn 06:26 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 06:27 -!- Lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 06:27 -!- Lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Client Quit] 06:49 -!- itguru [n=The@5ac461b7.bb.sky.com] has joined ##openvpn 06:53 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has joined ##openvpn 06:56 < Danskmand> Howdy :-) - Does ovpn run on windows 7, 64bit ? (got a error when installing "TAP-Win32 has known incompabilities") 06:56 < Danskmand> Or is it just a stupid eror-message and everyting just runs fine ? 06:59 -!- itguru [n=The@5ac461b7.bb.sky.com] has quit ["Leaving"] 07:28 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has quit ["Leaving."] 08:03 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 54 (Connection reset by peer)] 08:47 -!- kala [n=kala@83.151.191.90.dyn.estpak.ee] has quit [Read error: 104 (Connection reset by peer)] 08:51 -!- kala [n=kala@83.151.191.90.dyn.estpak.ee] has joined ##openvpn 09:17 -!- hyper_ch [n=hyper@adsl-84-227-58-130.adslplus.ch] has joined ##openvpn 09:18 < hyper_ch> hmmm, in order to make all traffic go through openvpn I can put this into the server.conf: push "redirect-gateway def1" --> however if I don't want to have that for all clients, how would I put that into the according ccd? 09:27 < _numbers> how do i install my self-signed cert 09:27 < _numbers> on ubuntu w/ openvpn 09:27 < _numbers> trying to connect as a client. i copied the ca to /etc/ssl. now the ca.crt -validates with openssl. but not the client.key. 09:29 < _numbers> http://pastebin.com/d6bab546 09:29 < _numbers> my openvpn client log 09:29 < hyper_ch> _numbers: http://openvpn.net/index.php/open-source/documentation/howto.html#pki 09:29 < vpnHelper> Title: HOWTO (at openvpn.net) 09:33 < _numbers> i am trying to do this without easy-rsa. i do not want its hand-holding. i want to learn the openssl commands. so i have done that but just need to get my client.key to -validate 09:35 < _numbers> i moved the ca.crt to /etc/ssl and now it will validate but not client.key. hmm.. 09:39 < Bushmills> hyper_ch: 09:40 < Bushmills> !ccd 09:40 < vpnHelper> Bushmills: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 09:42 < Bushmills> oh, "how". you have the choice between typing it in, by pushing the keys on your keyboard, or, after having typed it once, copy it, then paste it for each client's config file 09:43 < _numbers> i already installed the ca.crt and configured the openvpn client 09:44 < _numbers> why would openvpn -validate client.crt fail when it has been self-signed by ca.crt and ca.crt is trusted in /etc/ssl/certs 09:44 < _numbers> on the client 09:45 < _numbers> i mean why would `openssl validate client.crt` fail when it has been self-signed by ca.crt and ca.crt is trusted in /etc/ssl/certs 10:00 < |Mike|> !linnat 10:00 < vpnHelper> |Mike|: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 10:12 < hyper_ch> hmmmm, why can I ping the openvpn server but none of the other openvpn clients with this client config: http://www.pastebin.org/70517 ? 10:13 < Bushmills> !route 10:13 < vpnHelper> Bushmills: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 10:13 < Bushmills> !iroute 10:13 < vpnHelper> Bushmills: "iroute" is does not bypass or alter the kernel's routing table, it allows openvpn to know it should handle the routing when the kernel points to it but the network is not one that openvpn knows about. This is only needed when connecting a LAN which is behind a client, and therefor belongs in a ccd entry. Also see !route and !ccd 10:13 < Bushmills> !lan 10:13 < vpnHelper> Bushmills: Error: "lan" is not a valid command. 10:14 < hyper_ch> ah ok :) 10:15 < Bushmills> !client-to-client 10:15 < vpnHelper> Bushmills: "client-to-client" is with this option packets from 1 client to another are routed inside the server process. without it packets leave the server process, hit the kernel (firewall, routing table) and if allowed by firewall and routed back to server process, they go to the client. you use this option when you do not want to use selective firewall rules on what clients can access things 10:15 < vpnHelper> Bushmills: behind other clients 10:15 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has joined ##openvpn 10:16 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 10:21 < hyper_ch> Bushmills: but if all clients are in the server subnet 10.8.0.x shouldn't it work automatically? 10:24 < _numbers> i was able to get the client.crt to be signed by the ca.crt which is now trusted so they both `openssl validate` with OK. however strangely enough I still receive an error trying to use the client.key to connect my openvpn client http://pastebin.com/d6d1c665c 10:28 < Bushmills> no 10:28 < Bushmills> "automatically" is between client and server 10:28 < Bushmills> that's the part which works on your side 10:30 -!- hid3nax [n=tst@lan-78-157-71-116.vln.skynet.lt] has joined ##openvpn 10:32 < hid3nax> !howto 10:32 < vpnHelper> hid3nax: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 10:34 < hyper_ch> Bushmills: ok, I fixed it 10:34 < hid3nax> Hello everyone. Is the server sample config in the openvpn.net a PPTP server type example or not? 10:34 < hyper_ch> Bushmills: adding push "route 10.8.0.0 255.255.255.0" to the according ccd 10:35 < hid3nax> Need to set up a PPTP server to allow Windows clients to conenct to it. Did some config but client is getting the 800 error. Not sure where to look further... 10:35 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 104 (Connection reset by peer)] 10:36 < hid3nax> !configs 10:36 < vpnHelper> hid3nax: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 10:36 < hyper_ch> but there's still one important question left - but unrelated to openvpn: What to have for supper tonight 10:37 < hid3nax> My godness... I'm starting to think that OpenVPN is just working with itself's client only... 10:37 < |Mike|> don't think. 10:38 < |Mike|> assumption is the mother of all fuckups ;) 10:38 < hid3nax> F-u-c-ked up enought tonight.. (already) :D 10:39 < |Mike|> as i said. 10:45 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 10:53 < _numbers> ok got my errors down to just this http://pastebin.com/d1721b266 10:54 < _numbers> incoming plaintext read error? 11:02 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has quit ["Leaving."] 11:06 < |Mike|> certificate verify failed 11:06 < |Mike|> can the openvpn daemon read the certs _numbers ? 11:10 < _numbers> |Mike| using pfsense as the openvpn server. it just has a gui where you paste in the certs. i imagine it can 11:10 < _numbers> unless you mean the client? 11:10 < |Mike|> client yes. 11:11 < _numbers> |Mike|: i think so but how can i be sure? 11:11 < |Mike|> ssh to it and check? 11:11 < |Mike|> i've no clue what pfsense is imho :P 11:13 < _numbers> the client is my desktop machine so no need to ssh. it is saved in /etc/ssl with chmod 777 11:13 < _numbers> thats for the ca.crt 11:14 < |Mike|> don't use 777 11:14 < |Mike|> 644 is more than enough 11:15 < |Mike|> or 640 even. 11:15 < _numbers> thats what all the others are in /etc/ssl but the ones the openvpn client uses are under /etc/openvpn and they are chmod 600 11:15 < _numbers> i just tried 777 on them tho to be sure and same result 11:16 < |Mike|> you're a developer ? :P 11:16 < |Mike|> ok, but did you restart the client ? 11:21 -!- hid3nax [n=tst@lan-78-157-71-116.vln.skynet.lt] has quit [Read error: 54 (Connection reset by peer)] 11:21 -!- hid3nax [n=tst@lan-78-157-71-116.vln.skynet.lt] has joined ##openvpn 11:24 < _numbers> i think it may be that the common name CN is not matching the host name 11:24 < _numbers> i just put asdf for the CN lol 11:24 < _numbers> does it have to match the actual hostname to work? 11:26 < |Mike|> it must be FQDN yes. 11:26 < Bushmills> oh, just to make sure that if openvpn wants to execute the certs, that they're actually executable :) 11:26 < Bushmills> good thinking 11:26 < _numbers> |Mike|: does the client need a hostname then? 11:27 < |Mike|> Bushmills: lol :-P 11:27 < _numbers> the server is the pfsense box router app based on freebsd 11:27 < _numbers> i can get that a hostname 11:27 < _numbers> the client's hostname can change tho 11:27 < |Mike|> _numbers: hmz, you could try that. I'm not 100% sure if it needs to be a fqdn 11:34 < _numbers> i fixed it 11:34 < _numbers> removed this from client config: ns-cert-type server 11:34 < _numbers> what is that? "Require that peer certificate was signed with an explicit nsCertType designation of "client" or "server"." 11:34 < _numbers> i wonder how i sign with that type 11:39 < |Mike|> why don't you use the easy-rsa tools ? ;) 11:39 < _numbers> well i will once i understand what they are doing :) 11:40 < |Mike|> it's bash... 11:40 < _numbers> ya i'm looking for them now so i can read the bash scripting 11:40 < _numbers> to see how it builds keys with server as nsCertType 11:40 < _numbers> where do i find them 11:40 < _numbers> the easy-rsa tools 11:41 < _numbers> /usr/share/doc/openvpn/examples/easy-rsa/2.0 11:48 -!- hid3nax [n=tst@lan-78-157-71-116.vln.skynet.lt] has quit [] 11:53 < _numbers> next q 11:53 < _numbers> is there a way to hook up openvpn to a socks5 proxy like tor 11:53 < _numbers> basically i am trying to tunnel all my traffic thru tor using a router 11:54 < _numbers> not just a few ports, but all 11:54 < _numbers> all traffic on the LAN must exit thru router (gateway) and i want router tunneling all traffic thru tor 12:23 -!- Holistah [n=holister@c-71-230-216-184.hsd1.nj.comcast.net] has quit [Remote closed the connection] 12:26 -!- Holistah [n=holister@c-71-230-216-184.hsd1.nj.comcast.net] has joined ##openvpn 12:32 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit ["( www.nnscript.com :: NoNameScript 4.22 :: www.esnation.com )"] 12:39 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 12:41 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit [Client Quit] 12:51 < Bushmills> so what do you need openvpn for then? 13:13 < krzy> lol 13:16 -!- krzy [i=nobody@hemp.ircpimps.org] has quit [Client Quit] 13:27 < |Mike|> _numbers: search on (ctrl f) on http-proxy 13:28 < |Mike|> !howto 13:28 < vpnHelper> |Mike|: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 13:28 < |Mike|> @ howto ^ 13:28 < _numbers> thats just one port. i want all tcp/udp traffic 13:28 < |Mike|> !tcp? 13:28 < vpnHelper> |Mike|: Error: "tcp?" is not a valid command. 13:28 < |Mike|> !tcp 13:28 < vpnHelper> |Mike|: "tcp" is Sometimes you cannot avoid tunneling over tcp, but if you can avoid it, DO. Why TCP Over TCP Is A Bad Idea: http://sites.inka.de/~bigred/devel/tcp-tcp.html 13:37 -!- krzy [i=nobody@hemp.ircpimps.org] has joined ##openvpn 13:41 -!- krzy [i=nobody@hemp.ircpimps.org] has quit [Client Quit] 13:41 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 13:48 -!- Kaatje [n=Kaatje@unaffiliated/kaatje] has joined ##openvpn 14:01 -!- agagag [n=anton@158.37.56.5] has joined ##openvpn 14:47 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 14:59 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has joined ##openvpn 15:08 -!- MJD [n=quassel@dhcp-0-18-e7-4-f8-c7.cpe.mountaincable.net] has joined ##openvpn 15:10 -!- SupertrunksS [n=Supertru@f055161029.adsl.alicedsl.de] has joined ##openvpn 15:11 -!- Kaatje [n=Kaatje@unaffiliated/kaatje] has quit [K-lined] 15:12 -!- Kaatje [n=Kaatje@unaffiliated/kaatje] has joined ##openvpn 15:12 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 15:13 -!- Kaatje [n=Kaatje@unaffiliated/kaatje] has quit [K-lined] 15:14 < SupertrunksS> Hi, I need to reach a subnet (non-private) at the server side through the tunnel. the tunnel is working proberly, i can ping both sides, but cant ping the subnet through the tunnel. the route at the client side is set correctly, set up a nat rule at the server side but still no success. may someone can help? 15:17 < krzie> ip forwarding is on at the server? 15:17 < SupertrunksS> yes 15:17 < krzie> what os? 15:18 < SupertrunksS> ubuntu 9.04 x64 15:18 < hyper_ch> that's old 15:18 < SupertrunksS> vserver :) 15:18 < krzie> lets see the routing table of client and nat rule on server (pastebin or similar site) 15:18 < SupertrunksS> ok 15:18 < krzie> should be like: 15:18 < krzie> !linnat 15:18 < vpnHelper> krzie: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 15:18 < krzie> !linipforward 15:18 < vpnHelper> krzie: "linipforward" is echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution (til reboot) or set net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 15:19 < krzie> show me cat /proc/sys/net/ipv4/ip_forward as well 15:21 < SupertrunksS> http://pastebin.com/m4c90a7f0 15:22 < SupertrunksS> I need to reach 194.25.134.0/24 15:22 -!- _numbers [n=x@unaffiliated/numbers/x-253875] has left ##openvpn ["Leaving."] 15:23 < krzie> when you tcpdump tun you see that packets leave via the tun (on client) 15:23 < SupertrunksS> http://pastebin.com/m790c4edc 15:23 < krzie> same on server, you see the packets arrive? 15:23 < SupertrunksS> tcpduump crashes when I start pinging from the client 15:23 < krzie> lol 15:23 < krzie> how are you starting tcpdump 15:24 < SupertrunksS> tcpdump -n -i tun0 15:24 < SupertrunksS> as root 15:24 < |Mike|> use sudo ;) 15:24 < krzie> you can recreate the tcpdump crash every time? 15:24 < SupertrunksS> sure that this does matter sudo or root? 15:24 < SupertrunksS> yes 15:24 < krzie> why sudo if hes already root mike 15:25 < krzie> SupertrunksS well then you have bigger problems 15:25 < krzie> and your problem might have nothing to do with openvpn 15:25 < krzie> the tcpdump crash for sure has nothing to do with openvpn 15:26 < krzie> tried tracing it to see why it crashes? 15:26 < SupertrunksS> It crashes only if i ping the the subnet I want to reach, if i ping the vpn network, its working fine 15:27 < SupertrunksS> http://pastebin.com/m681f4ed0 15:27 < krzie> ohhh 15:27 < krzie> show me server routing table 15:28 < SupertrunksS> http://pastebin.com/m2c3127af 15:29 < SupertrunksS> vserver :( 15:29 < krzie> ya i dunno but its not an openvpn problem 15:29 < krzie> you can paste configs to verify if you like 15:29 < SupertrunksS> ok 15:33 < SupertrunksS> http://pastebin.com/m2f37bb31 15:34 < |Mike|> !config 15:34 < vpnHelper> |Mike|: (config []) -- If is given, sets the value of to . Otherwise, returns the current value of . You may omit the leading "supybot." in the name if you so choose. 15:34 < krzie> SupertrunksS 15:34 < krzie> !configs 15:34 < vpnHelper> krzie: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 15:34 < krzie> please strip the comments 15:34 < SupertrunksS> ok sorry 15:35 < krzie> np, i didnt actually say to strip them so how could you know ;] 15:37 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has quit ["Leaving."] 15:37 < SupertrunksS> http://pastebin.com/m166fcfea 15:39 < krzie> you only need this once 15:39 < krzie> client-config-dir ccd 15:39 < krzie> tls-server can be dropped too, its part of --server 15:39 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has joined ##openvpn 15:41 < SupertrunksS> hm ok, but the rest should be ok? 15:50 < krzie> whoawhoawhoa 15:50 < krzie> # 15:50 < krzie> push "route 194.25.134.0 255.255.255.0" 15:50 < krzie> # 15:50 < krzie> route 194.25.134.0 255.255.255.0 15:50 < krzie> both of those in your ccd? 15:50 < krzie> why? 15:50 < krzie> who do you actually want to route that over the vpn? 15:50 < krzie> the client, right? 15:51 < krzie> also, who is 192.168.100.240 255.255.255.240 behind? 15:51 < krzie> client or server? 15:52 < SupertrunksS> yes, I want to access my isps mail server, and the vserver should be able to access it, so i want the client to route the traffic to the subnet through the tunnel and the server 15:52 < krzie> i think i was wrong that this wasnt openvpn related, i think you managed to create some weird looping 15:53 < krzie> remove this: 15:53 < krzie> route 194.25.134.0 255.255.255.0 15:53 < krzie> you do NOT need the server to route it over the vpn, which is what the route command does when on the server 15:53 < krzie> you just wanna push it to the client 15:53 < SupertrunksS> ok 15:53 < krzie> now also 15:54 < krzie> 192.168.100.240 255.255.255.240 15:54 < krzie> thats client lan? 15:54 < SupertrunksS> yes 15:54 < krzie> do thisL 15:54 < krzie> this line from ccd: 15:54 < krzie> push "route 192.168.100.240 255.255.255.240" 15:54 < krzie> goes to server.conf 15:55 < krzie> also add this to server.conf 15:55 < krzie> route 192.168.100.240 255.255.255.240 15:55 < krzie> oh wait thats there 15:55 < krzie> just move the push over 15:55 < krzie> read this doc for more understanding of route / push route, etc 15:55 < krzie> !route 15:55 < vpnHelper> krzie: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 15:56 < krzie> after you do all that tcpdump should stop crashing on you 15:56 < krzie> now you only want this exact client to route 194.25.134.0 255.255.255.0 over the vpn, right? 15:56 < krzie> because you could move tyhat push route to server.conf to have it apply to all clients 15:57 < krzie> or leave it there for only that client 15:57 < krzie> but this one: push "route 192.168.100.240 255.255.255.240" only makes sense in server.conf, it actually gets ignored for that client because of the matching iroute, as explained in my routing document linked to above 15:58 < SupertrunksS> ok, done, but tcp dump keep crashing 15:58 < krzie> !configs 15:58 < vpnHelper> krzie: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 15:58 < krzie> again 15:58 < krzie> =]] 15:58 < krzie> the new and improved ones 15:58 < krzie> i assume you restarted both the client and server as well.. 15:58 < SupertrunksS> removed the route 194.25.134.0 255.255.255.0 from my client ccd and added the push route to my lan to the server.conf, restarted ovpn dameon 15:59 < krzie> ok so repaste 15:59 < SupertrunksS> ok 15:59 < krzie> lemme see them again and know i didnt miss anything 15:59 < krzie> (dont edit, repaste) 16:01 < SupertrunksS> http://pastebin.com/m1c8ba744 16:02 < krzie> # 16:02 < krzie> push "route 192.168.100.240 255.255.255.240" 16:02 < krzie> not in ccd, in server.conf 16:02 < krzie> its in both right now 16:02 < krzie> so just remove it from ccd 16:03 < krzie> and just so you know: 16:03 < krzie> !ipp 16:03 < vpnHelper> krzie: "ipp" is (#1) the option --ifconfig-pool-persist ipp.txt does NOT create static ips, or (#2) Note that the entries in this file are treated by OpenVPN as suggestions only, based on past associations between a common name and IP address. They do not guarantee that the given common name will always receive the given IP address. If you want guaranteed assignment, see !iporder and !static 16:05 < SupertrunksS> ok, im not going to use ipp, theres no reason for me to use ipp, cause i dont need dnat or static ip related services 16:05 < krzie> and ipp wouldnt be the right choice for those anyways 16:06 < krzie> (which was the reason i wanted you to know it wasnt good for static assignment) 16:06 < SupertrunksS> removed the line from ccd, restarted daemon ut tcpdump still crashing 16:06 < krzie> # 16:06 < krzie> 17:22:40.1262467462 truncated-ip 0 16:06 < krzie> # 16:06 < krzie> tcpdump: pcap_loop: corrupted frame on kernel ring mac offset 80 + caplen 84 > frame len 160 16:06 < krzie> # 16:06 < krzie> 8 packets captured 16:06 < krzie> still getting that? 16:07 < SupertrunksS> yes 5 packets caputred, 6 packets received by filter... 0 dropped by kernel 16:07 < krzie> more talkin bout the first part of my paste 16:07 < krzie> first and second lines... 16:07 < SupertrunksS> yes the same error 16:09 < krzie> reboot the server and try again 16:10 < SupertrunksS> ok 16:13 < SupertrunksS> done, restarted and tunnel established 16:13 < SupertrunksS> same error 16:15 < SupertrunksS> os just installed few hours ago, should be clean 16:16 -!- Lt83850c [n=your@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 16:19 < krzie> well theres something wrong 16:19 < krzie> (in the OS) 16:19 < SupertrunksS> yes 16:19 < krzie> try disabling the NAT rule just for the hell of it, see if it continues to error on tcpdump 16:19 < SupertrunksS> i have some trouble with other network apps too, nmap for exmaple 16:20 -!- Lt83850c [n=your@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Client Quit] 16:20 -!- mdiehl [n=mdiehl@173-10-242-193-Albuquerque.hfc.comcastbusiness.net] has joined ##openvpn 16:21 < mdiehl> Hi, does anyone know where dd-wrt puts the config file for openvpn? 16:22 < SupertrunksS> mdiehl: no, try t find it with find / -name *.conf 16:22 < mdiehl> Oh man, why didn't I just think a bit. Thank you. 16:23 < SupertrunksS> krzie when i try to use nmap, this error appears, maybe ovpn is unable to find the right interface too? 16:23 < SupertrunksS> Failed to find device venet0 which was referenced in /proc/net/route 16:24 < mdiehl> TROL_V1) 16:24 < mdiehl> Sat Jan 2 23:23:40 2010 TLS Error: Unroutable control packet received from 10.0.1.1:1194 (si=3 op=P_CONTROL_V1) 16:24 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 113 (No route to host)] 16:24 < mdiehl> Any idea why I'd get this error? 10.0.1.1 is directly connected to the other device. 16:25 < mdiehl> I'm confuring the vpn on my lan before I deploy remotely. 16:27 < SupertrunksS> i think theres something wrong with your certificates 16:27 < mdiehl> Sounds like I have a routing loop..... No? 16:28 < SupertrunksS> check your date on both machines 16:32 < krzie> mdiehl: 16:32 < krzie> !configs 16:32 < vpnHelper> krzie: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 16:32 < mdiehl> Off by a timezone or so... 16:32 < krzie> you're l;ikely doing something you can do with remote but not while local 16:32 -!- Nappy [n=nappy@123-247.97-97.tampabay.res.rr.com] has joined ##openvpn 16:33 < krzie> like pushing a lan route or redirecting gateway without local flag 16:37 < mdiehl> Well, accounting for UTC v. MST timezones, the clocks are synced. 16:37 < mdiehl> I'm not pushing anything fancy, but I am running ripd, so maybe packets are sidestepping my vpn and causing grief. 16:38 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has quit ["Leaving"] 16:41 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has quit ["Leaving."] 16:56 < SupertrunksS> krzie: i think ovpn is unable to find my default gw 16:57 < SupertrunksS> ..from the server venet0:0 16:58 < |Mike|> let me guess, OpenVZ ? 17:01 < SupertrunksS> yes :) 17:02 < SupertrunksS> it should work using SNAT rule but no success 17:03 < SupertrunksS> maybe i should try another os.. same as hosts system centos.. 17:05 < |Mike|> lol :p 17:05 < |Mike|> no, blame openvz 17:06 < krzie> agreed with mike 17:07 < krzie> !factoids search 17:07 < vpnHelper> krzie: (factoids search [] [--values] [--{regexp} ] [ ...]) -- Searches the keyspace for keys matching . If --regexp is given, it associated value is taken as a regexp and matched against the keys. If --values is given, search the value space instead of the keyspace. 17:07 < krzie> !factoids search --values dialup 17:07 < vpnHelper> krzie: No keys matched that query. 17:07 < krzie> !factoids search --values ppp 17:07 < vpnHelper> krzie: No keys matched that query. 17:07 < krzie> hrm, i know there was a thread about how linux finds default gateway, some dialups werent working with it 17:08 < |Mike|> !pptp 17:08 < vpnHelper> |Mike|: "pptp" is PPTP is known to be a faulty protocol. The designers of the protocol, Microsoft, recommend not to use it due to the inherent risks. Lots of people use PPTP anyway due to ease of use, but that doesn't mean it is any less hazardous. The maintainers of PPTP Client and Poptop recommend using OpenVPN (SSL based) or IPSec instead. http://pptpclient.sourceforge.net/protocol-security.phtml 17:08 < krzie> err about how openvpn finds default gateway in linux i mean 17:08 < vpnHelper> |Mike|: to read about why to not use pptp 17:08 < |Mike|> that one ? 17:08 < |Mike|> lol, drink another one mr krzie :p 17:08 < krzie> heh, pptp is another vpn solution, im talkin bout dialup (ppp) 17:08 < krzie> i must not have made a factoid bout it 17:09 < |Mike|> wtf, who uses that ? 17:12 < krzie> SupertrunksS 17:13 < krzie> here is the default gateway error: 17:13 < krzie> Sep 24 08:45:55 desktop ovpn-client.tun[6606]: NOTE: unable to redirect default gateway -- Cannot read current default gateway from system 17:13 < krzie> so thats not it 17:34 < SupertrunksS> krzie ok 17:34 < SupertrunksS> same err in centos :( 17:35 < krzie> <|Mike|> no, blame openvz 17:35 < krzie> agreed with mike 17:35 < SupertrunksS> hehe 17:36 < |Mike|> it's not the OS, it's the virtualisation layer. 17:36 < |Mike|> That's why i'm a xen / kvm fanboy 17:36 < krzie> i know it CAN work in openvz, but i know nothing about the poenvz config stuffs 17:36 < krzie> openvz* 17:38 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: deever, zykes-, mrnice1, zamba, |Mike|, ScriptFanix, ^scott^, Typone 17:42 -!- Netsplit over, joins: zamba, deever, ScriptFanix, |Mike|, zykes-, Typone, ^scott^, mrnice1 17:42 < SupertrunksS> ok, thanks for your support :) 17:43 < krzie> yw 17:44 < krzie> at least we did fix some stuff in your configs 17:44 < krzie> once the system can work right the configs will =] 18:00 -!- robert_ [n=hellspaw@objectx/robert] has joined ##openvpn 18:24 < SupertrunksS> krzie 18:24 < SupertrunksS> /sbin/iptables -A FORWARD -j ACCEPT -p all -s 0/0 -i tun0 18:24 < SupertrunksS> /sbin/iptables -A FORWARD -j ACCEPT -p all -s 0/0 -o tun0 18:24 < SupertrunksS> /sbin/iptables -t nat --flush 18:24 < SupertrunksS> /sbin/iptables -t nat -A POSTROUTING -s ! x.x.x.x -o venet0 -j SNAT --to-source x.x.x.x 18:25 < SupertrunksS> its working now :) 18:25 < SupertrunksS> tcpdump too 18:25 < SupertrunksS> x.x.x.x = ext. ip 18:26 < |Mike|> h00terz. 18:26 < |Mike|> why do you accept all ? 18:26 * |Mike| goes mitm supertrunk 18:27 < SupertrunksS> found this in forum, just applied this for testing, and its working :) 18:29 < SupertrunksS> maybe its the nat part who makes it working? will do some tests and fine tuning now 18:32 < SupertrunksS> hmm just flushed the forward table.. still working, seems that doing snat from all interfaces to ext ip does the trick?! 18:35 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has joined ##openvpn 18:35 < krzie> didnt i ask you to disable nat and try tcpdump? :-p 18:37 < krzie> also, thanx for reporting back your fix =] 18:39 < SupertrunksS> i don't understand why all interfaces have to snat to the ext ip... snat from tun0 -> ext ip didn't work 18:43 < krzie> your rule says nothing bout "all interfaces" 18:44 < krzie> only thing it says re: an interface is to go out venet0 18:47 < SupertrunksS> youre right sorry 18:47 < krzie> no appology needed, im still glad you shared your fix ;] 18:48 < krzie> a lot of people just say "it works" /quit 18:49 < SupertrunksS> yes unfortunately 18:51 < |Mike|> We should write more documentation. 18:53 < krzie> feel free mike 18:53 < krzie> the wiki is waiting for you 18:54 < krzie> i think im gunna make a !redirect document one of these days, but its a bitch cause every non-openvpn step will be done differently for osx/bsd/win/lin 18:55 < krzie> i think ill handle that by having seperate writeups for NAT / ip forwarding with each OS's method seperated in each writeup 18:55 < |Mike|> I rather write on wiki's than manpages ;) 18:55 < krzie> and keep the !redirect stuff openvpn dependant only with links to the os specific stuffs 18:56 < |Mike|> you think modular krzie 19:05 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has quit [Remote closed the connection] 19:06 < krzie> well if its done like that we'll have a good one for !nat and !ipforward 19:17 -!- supertrunks [n=Supertru@g227118207.adsl.alicedsl.de] has joined ##openvpn 19:17 -!- supertrunks [n=Supertru@g227118207.adsl.alicedsl.de] has quit [Read error: 104 (Connection reset by peer)] 19:17 -!- supertrunks [n=Supertru@g227118207.adsl.alicedsl.de] has joined ##openvpn 19:19 < Danskmand> Howdy :-) - Someone still alive in here ? 19:22 < krzie> sure 19:23 -!- dagobertduck [n=Supertru@g230088250.adsl.alicedsl.de] has joined ##openvpn 19:25 < Danskmand> Cool :-) - you know, its 2:23 am here :-) - Well, if I dial into my server that runs openvpn (newest version), I get the message "createfile failed on TAPI-device: \\.\Global\(whatever).tap" 19:26 < krzie> dial? 19:26 < Danskmand> And a "all TAP-win32 adapters on this system are currently in use"... 19:27 -!- MJD [n=quassel@dhcp-0-18-e7-4-f8-c7.cpe.mountaincable.net] has quit [Operation timed out] 19:34 -!- SupertrunksS [n=Supertru@f055161029.adsl.alicedsl.de] has quit [Read error: 110 (Connection timed out)] 19:36 < |Mike|> Danskmand: !all 19:36 < |Mike|> bite. 19:37 -!- supertrunks [n=Supertru@g227118207.adsl.alicedsl.de] has quit [Read error: 113 (No route to host)] 19:41 < Danskmand> Well, not really dial :-) - I have a desktop-pc and 2 firewall-pc's and a laptop and a DSL-router. The desktop is hidden behind the 2 firewalls. The laptop is in front of the 2 firewalls. There will be some times where I will be "somewhere else" in Germany - and I want to be able to connect to my local "network" - to do that I need to dial-in into my internal firewall (I forward port 1194 to the internal firewall), which work 19:41 < Danskmand> I have a dyndns account by the way.... 19:44 < Danskmand> Sorry it took so long for me to "shape my words" :-) 19:46 -!- robert_ [n=hellspaw@objectx/robert] has quit [Remote closed the connection] 19:55 -!- Ceil [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has joined ##openvpn 19:56 < Ceil> # /etc/init.d/openvpn restart 19:56 < Ceil> * Stopping virtual private network daemon(s)... * No VPN is running. 19:56 < Ceil> * Starting virtual private network daemon(s)... * Autostarting VPN 'openvpn' [fail] 19:56 < Ceil> config (server):http://pastebin.com/m416bb14f 19:56 < Ceil> Platform: Ubuntu 19:57 < endre> so what 19:57 < Ceil> Well as you can see openvpn failed at starting 19:57 < Ceil> I am asking for help to find out why 19:58 < krzie> Ceil that means nothing, look at your logs, try starting it manually and see whats wrong 19:58 < Ceil> where are the logs? 19:58 < krzie> whereever you told them to be in your config 19:58 < krzie> try syslog files 19:58 < Ceil> I'm new at linux, where do i find those 19:59 < endre> you have like nothing in that config file 19:59 < endre> ah yup, sorry, you have ifconfig and key 19:59 < Ceil> what do you mean? it's similar to the default static key config file 19:59 < endre> ok, i've just never used statis key thing 20:00 < Ceil> ah, I'm using it because my only secure trasport between the server and client is text-only 20:00 < Ceil> so I can't transfer the PKI stuff 20:01 < Ceil> btw how do I view the syslog? 20:01 < Ceil> man syslog 20:01 < Ceil> No manual entry for syslog 20:01 < endre> it's in the /var/log/ dir 20:02 -!- Danskmand1 [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has joined ##openvpn 20:03 < Ceil> ah cheers I found the problem I think 20:04 < Ceil> hm.. nope failed I'll post syslog 20:05 -!- Danskmand [n=Danskman@dslb-088-069-209-082.pools.arcor-ip.net] has quit [Read error: 60 (Operation timed out)] 20:05 < krzie> also post both configs, but like this: 20:05 < Ceil> ah fixed it 20:05 < krzie> !configs 20:05 < vpnHelper> krzie: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 20:05 < krzie> ahh ok nm then =] 20:06 < Ceil> ok time to test to see if it works, I have a few more questions in a sec 20:10 -!- Danskmand1 [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has quit ["Leaving."] 20:12 < Ceil> Server: http://pastebin.com/m6216f3fa 20:12 < Ceil> Client: http://pastebin.com/m659fc0ec 20:12 < Ceil> Sorry I couldn't remove the comments without leaving big gaps 20:12 < Ceil> do they look ok to you? 20:13 < Ceil> my worrie is: 20:14 < Ceil> *worry 20:14 < Ceil> http://pastebin.com/m136ec69b <- this part 20:14 < Ceil> do I need that on the client as well? 20:21 < Ceil> I got this error: Sun Jan 03 13:18:18 2010 us=281000 WARNING: 'ifconfig' is used inconsistently, local='ifconfig 10.3.0.1 10.3.0.2', remote='ifconfig 10.3.0.2 10.3.0.1' 20:23 < Ceil> as you can see in the configs they are the same 20:23 < Ceil> but why does that error say they are not 20:23 < Ceil> ah found it 20:24 < Ceil> I swapped it on the remote machine 20:25 < Ceil> So now to my real problem which after reading the howto and many tutorials I can only see that there are 100 different ways of doing this 20:25 < Ceil> How do I route traffic through the vpn 20:25 < Ceil> I'll annote the parts of teh howto I'm having trouble with 20:28 < Ceil> http://pastebin.com/mac19399 20:28 < krzie> !redirect 20:28 < vpnHelper> krzie: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 20:28 < krzie> (that was answered in the topic of this channel) 20:29 < Ceil> can you please read my pastebin 20:29 < Ceil> I read the howto and annoated the parts I have trouble with 20:29 < Ceil> !def1 20:29 < vpnHelper> Ceil: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 20:29 < krzie> !local 20:29 < vpnHelper> krzie: "local" is a flag for --redirect-gateway, Add the local flag if both OpenVPN machines are directly connected via a common subnet, such as with wireless. 20:30 < krzie> you only use local not when on wireless, but on the same lan 20:30 < krzie> which happens to only have a purpose when securing your wireless 20:30 < Ceil> so when I'm at home I edit my config to have "local" in it 20:30 < krzie> the vpn server is at home? 20:30 < krzie> if so, why do you need to be on the vpn when at home? 20:30 < Ceil> yep 20:31 < Ceil> to secure wireless traffic 20:31 < krzie> then you need 2 configs 20:31 < krzie> 1 for when home 1 for when away 20:31 < Ceil> ah ok 20:31 < Ceil> but I still don't understand def1 20:32 < Ceil> so I just add: push "redirect-gateway def1" 20:32 < Ceil> I don't edit that line 20:32 < krzie> its explained in the manual, and in !def1 20:32 < Ceil> my vpn server is 192.168.22.2 20:32 < Ceil> and my gateway is 192.168.22.254 20:33 < Ceil> I've read the manual and !def1 20:33 < Ceil> I just don't understand what it is saying 20:34 < krzie> ok heres how it goes 20:34 < krzie> if you use def1 and then disconnect from the vpn, you still have a route to the internet 20:35 < krzie> if you dont use def1 and then disconnect, you have no route to the internet 20:35 < Ceil> ah, that helps :) cheers 20:35 < krzie> =] 20:37 < Ceil> ok probably the last question: 20:37 < Ceil> I just feel uncontable with linux atm, so I'm just asking 20:38 < Ceil> iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE 20:38 < Ceil> now "This command assumes that the VPN subnet is 10.8.0.0/24 (taken from the server directive in the OpenVPN " 20:38 < Ceil> but I don't have a server directive 20:38 < Ceil> I'm assuming I just need to use 10.3.0.0/24? 20:39 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has quit ["Leaving"] 20:40 < Ceil> seems to be working now all I need is some way to test if my net traffic is actually routed though the vpn 20:43 < Ceil> well it doesn't push out dns 20:43 < Ceil> So I'm assuming it isn't working :( 20:43 < Ceil> Client is Windows Vista 20:47 -!- Ceil-ME [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has joined ##openvpn 20:47 < Ceil-ME> woops back 20:48 < Ceil-ME> wait a second 20:48 < Ceil-ME> is there a way to do the local flag on the client side? 20:48 < Ceil-ME> that way I can change configs easily 21:04 -!- Ceil [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has quit [Read error: 110 (Connection timed out)] 21:06 < krzie> yes 21:07 < krzie> not just the local flag, the whole redirect-gateway command 21:07 < krzie> just dont push it ;] 21:11 < Ceil-ME> so I can just add in the config lines 21:11 < Ceil-ME> on the client 21:11 < Ceil-ME> redirect-gateway local def1 21:11 < Ceil-ME> and 21:12 < Ceil-ME> dhcp-option DNS 208.67.222.222 22:09 -!- a|3xx [i=18160ae5@gateway/web/freenode/x-mbtvernkitzntwdm] has joined ##openvpn 22:09 < a|3xx> hi 22:09 < a|3xx> i got openvpn access server question, anybody care to help? 22:18 < krzie> pls see topic and on-join message 22:20 < krzie> "NO SUPPORT FOR ACCESS SERVER" 22:20 < Ceil-ME> krzie: was my did I get it right when I said: 22:20 < Ceil-ME> so I can just add in the config lines 22:20 < Ceil-ME> on the client 22:20 < Ceil-ME> redirect-gateway local def1 22:20 < Ceil-ME> and 22:20 < Ceil-ME> dhcp-option DNS 208.67.222.222 22:20 < krzie> if it had normal openvpn configs in the backend and normal logs i know i personally wouldnt mind helping, but it doesnt 22:20 < krzie> !pushdns 22:20 < vpnHelper> krzie: "pushdns" is (#1) push "dhcp-option DNS a.b.c.d" to push dns to the client, or (#2) http://thread.gmane.org/gmane.network.openvpn.user/25139/focus=25147 see that mail archive for some info on pushing dns, or (#3) http://article.gmane.org/gmane.network.openvpn.user/25149 for a perm fix via regedit 22:21 < krzie> you dont have to push it tho 22:21 < krzie> but do read those threads on the mail list 22:22 < Ceil-ME> hm.. how about testing if the vpn is working 22:22 < Ceil-ME> I mean if I was doing it externally I could whatsmyip.org 22:22 < Ceil-ME> but I can't 22:22 < Ceil-ME> is there away to check 22:42 -!- a|3xx [i=18160ae5@gateway/web/freenode/x-mbtvernkitzntwdm] has quit [Ping timeout: 180 seconds] 23:01 -!- Nappy [n=nappy@123-247.97-97.tampabay.res.rr.com] has quit [Read error: 110 (Connection timed out)] 23:08 < krzee> tcpdump 23:09 < Ceil-ME> is that on Windows? 23:09 < Ceil-ME> and what does that command do 23:09 < krzee> google it 23:09 < krzee> wireshark on windows 23:09 < Ceil-ME> ah ok 23:10 -!- Nappy [n=nappy@123-247.97-97.tampabay.res.rr.com] has joined ##openvpn 23:12 -!- Nappy [n=nappy@123-247.97-97.tampabay.res.rr.com] has quit [Read error: 104 (Connection reset by peer)] 23:22 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 23:22 < mithridates> !factoids pre-shared 23:22 < vpnHelper> mithridates: Error: The "Factoids" plugin is loaded, but there is no command named "pre-shared" in it. Try "list Factoids" to see the commands in the "Factoids" plugin. 23:22 < mithridates> !factoids search pre-shared 23:22 < vpnHelper> mithridates: No keys matched that query. 23:22 < mithridates> !factoids search static 23:22 < vpnHelper> mithridates: "static" is (#1) use --ifconfig-push in a ccd entry for a static ip for the vpn client, or (#2) example: ifconfig-push 10.8.0.6 255.255.255.0, or (#3) also see !ccd and !iporder 23:24 < mithridates> hey guys 23:24 < mithridates> I wanna use static key instead of TLS 23:24 < mithridates> would u help me? 23:24 < mithridates> !howto 23:24 < vpnHelper> mithridates: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 23:25 < Ceil-ME> um... that's what I am trying to do 23:25 < Ceil-ME> so I'll give you what I have got so far 23:25 < Ceil-ME> use sample.ovpn 23:25 < Ceil-ME> that is it the windows distro 23:26 < Ceil-ME> it'll show you everything you need 23:26 < Ceil-ME> I'll pastebin mine for you 23:26 < Ceil-ME> can't say it is working fully yet 23:27 -!- rawDawg [n=raw@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 23:27 < Ceil-ME> http://pastebin.com/m35851d46 23:29 < Ceil-ME> and http://www.openvpn.net/index.php/open-source/documentation/miscellaneous/78-static-key-mini-howto.html 23:29 < vpnHelper> Title: Static Key Mini-HOWTO (at www.openvpn.net) 23:29 < Ceil-ME> and https://help.ubuntu.com/community/VPNServer 23:29 < vpnHelper> Title: VPNServer - Community Ubuntu Documentation (at help.ubuntu.com) 23:29 < Ceil-ME> are they guides I've found 23:34 -!- Nappy [n=nappy@123-247.97-97.tampabay.res.rr.com] has joined ##openvpn 23:34 < Ceil-ME> Aaron: traps are good watchin sometimes 23:34 < Ceil-ME> Steve: eewww.. the number of penises I like to see in my day besides my own is 9 23:34 < Ceil-ME> Steve: fuck 23:34 < Ceil-ME> Steve: ahahaha 23:34 < Ceil-ME> Steve: 0 23:42 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has quit [Read error: 110 (Connection timed out)] 23:44 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 23:44 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] 23:47 -!- dagobertduck [n=Supertru@g230088250.adsl.alicedsl.de] has quit [Read error: 110 (Connection timed out)] 23:59 -!- Holistah [n=holister@c-71-230-216-184.hsd1.nj.comcast.net] has quit [Read error: 110 (Connection timed out)] --- Day changed Sun Jan 03 2010 00:13 -!- SupertrunksS [n=Supertru@f055149056.adsl.alicedsl.de] has joined ##openvpn 00:13 < SupertrunksS> Is it possbile to use push routes with static keys? 00:14 < Ceil-ME> are you talking about OpenVPN? 00:14 < Ceil-ME> nevrmind 00:14 < SupertrunksS> yes 00:14 < Ceil-ME> I thought I was on a differnt channel 00:14 < Ceil-ME> Um.. I hope so 00:14 < Ceil-ME> although I'm not seeing it happen in my config 00:14 < Ceil-ME> I'm trying to do that too 00:15 < Ceil-ME> So far it doesn't seem to be redirect-gateway 00:15 < Ceil-ME> let me know if you find anythin 00:15 < Ceil-ME> g 00:16 < SupertrunksS> hm.. not tried it, I dont want to redirect all traffic through the tunnel, just a subnet 00:16 < SupertrunksS> actually trying to link my fritzbox with my dd-wrt 00:17 < Ceil-ME> ah ok 00:17 < SupertrunksS> but looks good 00:38 -!- dmarkey [n=dmarkey@dmarkey.xen.prgmr.com] has quit [Read error: 60 (Operation timed out)] 00:38 -!- SupertrunksS [n=Supertru@f055149056.adsl.alicedsl.de] has quit [Read error: 104 (Connection reset by peer)] 00:39 -!- SupertrunksS [n=Supertru@f055149056.adsl.alicedsl.de] has joined ##openvpn 00:59 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 01:07 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 01:31 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 113 (No route to host)] 01:35 -!- lt83850 [n=your@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 01:42 -!- supertrunks [n=Supertru@f055152116.adsl.alicedsl.de] has joined ##openvpn 01:46 -!- SupertrunksS [n=Supertru@f055149056.adsl.alicedsl.de] has quit [Read error: 60 (Operation timed out)] 01:52 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 01:54 -!- SupertrunksS [n=Supertru@f055200160.adsl.alicedsl.de] has joined ##openvpn 02:00 < Ceil-ME> Ok, I think I'm part of the way there 02:01 < Ceil-ME> now if I try browse the net it won't work 02:01 < Ceil-ME> So if I try visit http://69.163.159.132 it doesn't load 02:01 < vpnHelper> Title: Achromatic Labs (at 69.163.159.132) 02:02 < Ceil-ME> So I think that means that the traffic isn't being directed out on teh vpn server 02:02 < Ceil-ME> I followed the guide 02:02 < Ceil-ME> however it didn't say exactly what I needed to do 02:02 < Ceil-ME> http://www.openvpn.net/index.php/open-source/documentation/howto.html#redirect 02:02 < vpnHelper> Title: HOWTO (at www.openvpn.net) 02:02 < Ceil-ME> iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE 02:03 -!- SupertrunksS [n=Supertru@f055200160.adsl.alicedsl.de] has quit [Read error: 104 (Connection reset by peer)] 02:03 < Ceil-ME> I'll post my config and can someone please tell me what I need to change 10.8.0.0 to? 02:03 -!- SupertrunksS [n=Supertru@f055200160.adsl.alicedsl.de] has joined ##openvpn 02:03 -!- SupertrunksS [n=Supertru@f055200160.adsl.alicedsl.de] has quit [Remote closed the connection] 02:03 < Ceil-ME> http://pastebin.com/m643c5e7f 02:03 < Ceil-ME> the vpn connects and I can ping 10.3.0.1 02:05 < Ceil-ME> http://pastebin.com/m40c19559 is my ifconfig 02:05 < Ceil-ME> I'm using tun not tap fiy 02:07 < Ceil-ME> http://pastebin.com/m63c2652f is client config 02:08 -!- supertrunks [n=Supertru@f055152116.adsl.alicedsl.de] has quit [Read error: 110 (Connection timed out)] 02:13 -!- MJD [n=quassel@CPE0015ef4fc6af-CM001bd7cbfc8c.cpe.net.cable.rogers.com] has joined ##openvpn 02:15 < krzee> (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`) 02:16 < krzee> oh lol 02:16 < krzee> nm 02:16 < krzee> [04:02] iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE 02:16 < Bushmills> Ceil-ME: enabled ip fowarding on server? 02:16 < krzee> -s 10.3.0.0 02:16 < Ceil-ME> so just iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE 02:16 < Ceil-ME> hm.. I've done that already 02:17 < Ceil-ME> how do I check to make sure they are still there? 02:17 < Ceil-ME> woops 02:17 < krzee> dude 02:17 < Ceil-ME> with the 10.3.0.0 02:17 < krzee> change 10.8.0.0 to 10.3.0.0 02:17 < krzee> yup 02:17 < Ceil-ME> yeah I've done that 02:17 < Ceil-ME> but is there a way to check if that setting is "set" 02:17 < Bushmills> cat instead of echo 02:18 < Ceil-ME> ? 02:18 < krzee> !linipforward 02:18 < vpnHelper> krzee: "linipforward" is echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution (til reboot) or set net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 02:18 < Bushmills> instead of echoing 1, use cat to display 02:18 < krzee> cat /proc/sys/net/ipv4/ip_forward 02:19 < krzee> grep -vE '^#|^;|^$' openvpn.conf 02:19 < Ceil-ME> echos 9 02:19 < Ceil-ME> 0 02:19 < krzee> then repost your configs 02:19 < Ceil-ME> I mean it says 0 02:19 < krzee> echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution 02:19 < krzee> heh 02:20 < Ceil-ME> ok I'm starting up my laptop to check if it works now 02:21 < Ceil-ME> So I need to: net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 02:21 < Ceil-ME> as well as iptables -t nat -A POSTROUTING -s 10.3.0.0/24 -o eth0 -j MASQUERADE 02:21 < Bushmills> "I think i did that but i don't know exactly" is usually a sign that it hadn't been executed 02:23 < Ceil-ME> ^ what are you talking about 02:23 < Ceil-ME> and I think it works now 02:23 < Ceil-ME> the internet is working and I'm testing in wireshark in just asec 02:25 < Ceil-ME> it works thanks for your help 02:25 < Ceil-ME> So just to clarify the mistake 02:26 < Ceil-ME> I need to: net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 02:26 < Ceil-ME> where is the sysct1.conf btw? 02:30 < Ceil-ME> and can http://www.openvpn.net/index.php/open-source/documentation/howto.html#security tls-auth work with TCP? 02:30 < vpnHelper> Title: HOWTO (at www.openvpn.net) 02:33 -!- rawDawg2 [n=raw@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 02:33 -!- rawDawg2 [n=raw@cpe-76-188-26-242.neo.res.rr.com] has quit [Client Quit] 02:50 < krzee> you dont want tcp 02:50 < krzee> !tcp 02:50 < vpnHelper> krzee: "tcp" is Sometimes you cannot avoid tunneling over tcp, but if you can avoid it, DO. Why TCP Over TCP Is A Bad Idea: http://sites.inka.de/~bigred/devel/tcp-tcp.html 02:51 -!- rawDawg [n=raw@cpe-76-188-26-242.neo.res.rr.com] has quit [Read error: 113 (No route to host)] 02:58 -!- dmarkey [n=dmarkey@dmarkey.xen.prgmr.com] has joined ##openvpn 03:00 -!- teddymills [n=teddy@208.92.235.227] has quit [Read error: 54 (Connection reset by peer)] 03:00 -!- teddymills [n=teddy@208.92.235.227] has joined ##openvpn 03:03 -!- master_o1_master [n=master_o@p57B565EE.dip.t-dialin.net] has quit [Read error: 60 (Operation timed out)] 03:03 < Ceil-ME> yeah I know why tcp is a bad idea because your making bigger packets 03:03 < Ceil-ME> so you need to spilt them etc 03:04 < Ceil-ME> but isn't HTTPS over TCP 03:06 -!- master_of_master [i=master_o@p57B57C1A.dip.t-dialin.net] has joined ##openvpn 03:07 < Bushmills> https relies on tcp for packet resending. tcp over tcp introduces the risk of competing error correction 03:08 < Bushmills> not just a matter of different packet sizes 03:08 < krzee> clearly didnt read the link 03:08 < Ceil-ME> So is tcp impossible to use? 03:08 < Ceil-ME> I might change to udp then 03:08 < krzee> read the link and understand what you accept when you use tcp 03:08 < krzee> then make your choice 03:09 < Bushmills> krzee: indeed. but why should he. after all, he says that he know why. 03:09 < krzee> or just listen to the bot and make the uneducated right choice 03:09 < krzee> !tcp 03:09 < vpnHelper> krzee: "tcp" is Sometimes you cannot avoid tunneling over tcp, but if you can avoid it, DO. Why TCP Over TCP Is A Bad Idea: http://sites.inka.de/~bigred/devel/tcp-tcp.html 03:09 < Bushmills> and moiners to you 03:09 < krzee> moinmoin bush 03:12 -!- mdiehl [n=mdiehl@173-10-242-193-Albuquerque.hfc.comcastbusiness.net] has left ##openvpn ["Konversation terminated!"] 03:13 < Bushmills> I just read in an article about 26C3 of a presentation which demonstrates how to compromise quantum key distribution 03:13 < Bushmills> (these systems were considered secure) 03:15 < Bushmills> the researchers report that the method has already been successfully tested on a real existing system 03:41 -!- Danskmand [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has joined ##openvpn 03:44 -!- Hetman [i=dnowak@gateway/shell/rootnode.net/x-xrzcbrwaovtvxvup] has quit ["leaving"] 04:11 -!- Ceil-ME [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has quit [] 04:14 -!- Danskmand [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has quit ["Leaving."] 06:01 -!- Danskmand [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has joined ##openvpn 06:31 -!- Robbin [n=Multi-X@mobile.web.surgery.at.fenihon.com] has joined ##openvpn 06:32 < Robbin> !route 06:32 < vpnHelper> Robbin: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 06:34 < Robbin> !redirect 06:34 < vpnHelper> Robbin: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 06:35 < Robbin> anyone knows if there is some help available against redirecting the gateway? 06:36 < Robbin> 0.o 06:37 -!- Robbin [n=Multi-X@mobile.web.surgery.at.fenihon.com] has left ##openvpn ["No matter how dark the night, somehow the Sun rises once again"] 06:37 -!- Robbin [n=Multi-X@mobile.web.surgery.at.fenihon.com] has joined ##openvpn 06:39 < Robbin> only idlers in the chan? :S 06:40 < Bushmills> help aginst redirecting? as in, removing from onfig? 06:40 < Bushmills> hm .. against .. config 06:40 < Robbin> it's weird problem really 06:40 < Robbin> I don't have redirect-gateway enabled 06:40 < Bushmills> open config file, remove the line. reload config 06:40 < Robbin> however, the clients gateway is changed 06:41 < Robbin> I don't have redirect-gateway enabled 06:42 < Robbin> tried both using tap or tun, tried adding or removing redirect gateway - the result is all the same 06:42 < Robbin> clients connecting can see the local net (if I push the right routes to them) but their routing table gets changed and their traffic comes through the vpn server 06:42 < Robbin> and the weirdest thing is that the redirect-gateway option doesn't really get involved in the whole thing 06:43 < Robbin> as if it doesn't work or is constantly enabled 06:43 < Bushmills> i don't understand your problem. are you wondering why your traffic isn't routed through gateway without redirect-gateway option? 06:43 < Robbin> no, it's the reverse 06:43 < Robbin> it gets routed 06:43 < Robbin> WITHOUT the option 06:44 < Bushmills> what is "it" in "it gets routed" 06:44 < Robbin> all the trafic 06:44 < Robbin> web, dns 06:44 < Robbin> etc 06:45 < Bushmills> connecting replaces your default route? 06:45 < Robbin> yup 06:45 < Robbin> on both linux and windows clients 06:45 < Bushmills> where don't you have redirect-gateway? in client or in server config? 06:45 < Robbin> in server 06:45 < Bushmills> so you have it in client config? 06:46 < Robbin> windows clients doesn't need that for what I know, plus in the linux client I think it uses just nm plugin 06:46 < Robbin> no no 06:46 < Robbin> both do not have it 06:46 < Bushmills> look into client logs 06:46 < Bushmills> if route is changed, you'll have log entries reporting that 06:47 < Robbin> well right now I am checking with the linux box only and the default route does get changed, but I wanna know why and how to stop it 06:47 < Robbin> I don't want all the traffic redirected through the server 06:48 < Robbin> and as I said - the weirdest thing is it does it without the option enabled 06:48 < Bushmills> you don''t give enough information to tell you why 06:48 < Robbin> OpenVPN 2.1_rc15 i386-redhat-linux-gnu [SSL] [LZO2] [EPOLL] built on Nov 30 2008 06:48 < Robbin> what you need? Confs? 06:48 < Bushmills> openvpn doesn't change default route without being asked to 06:48 < Bushmills> logs 06:48 < Robbin> client conf - can't provide it, as it uses nm-openvpn plugin 06:49 < Robbin> ah... well I will have to dig in the logs or get disconnected to show you current 06:49 < Robbin> hold on 06:49 < Bushmills> !factoids search network-manager 06:49 < vpnHelper> Bushmills: No keys matched that query. 06:49 < Bushmills> !factoids search nm 06:49 < vpnHelper> Bushmills: No keys matched that query. 06:49 < Bushmills> !factoids search networkmanager 06:49 < vpnHelper> Bushmills: No keys matched that query. 06:49 < Bushmills> grr 06:49 < Bushmills> !ubuntu 06:49 < vpnHelper> Bushmills: "ubuntu" is dont use network manager! 06:49 < Bushmills> !factoids search network manager 06:49 < vpnHelper> Bushmills: No keys matched that query. 06:49 < Bushmills> bleh 06:50 < Robbin> ;-) 06:50 < Robbin> here is how nm starts it 06:50 < Robbin> in my case 06:50 < Robbin> /usr/sbin/openvpn --remote fenihon.com --comp-lzo --nobind --dev tap --proto udp --port 1194 --cipher BF-CBC --auth SHA1 --auth-nocache --syslog nm-openvpn --script-security 2 --up /usr/libexec/nm-openvpn-service-openvpn-helper --up-restart --persist-key --persist-tun --management 127.0.0.1 1194 --management-query-passwords --route-noexec --client 06:50 < Robbin> followed by the declarations for the certificates 06:51 < Bushmills> stop network manager, start openvpn client, check whether default route still gets changed 06:51 < Bushmills> if it doesn't, !blame network manager 06:51 < Bushmills> !blame 06:51 < vpnHelper> Bushmills: Error: "blame" is not a valid command. 06:52 < Bushmills> vpnhelper, are we playing a bit stupid today? 06:52 < vpnHelper> Bushmills: Error: "are" is not a valid command. 06:52 < Robbin> lol 06:52 < Robbin> Bushmills, I guess you want to see this line in the logs 06:52 < Robbin> Jan 3 14:14:56 lonestar NetworkManager: Policy set 'Fenihon VPN' (tap0) as default for routing and DNS. 06:53 < Robbin> so - yeah, I guess network manager changes it 06:53 < Bushmills> so, !blame network manager 06:53 < Bushmills> configure it, or remove it. 06:53 < Robbin> hm 06:54 < Robbin> !blame 06:54 < vpnHelper> Robbin: Error: "blame" is not a valid command. 06:54 < Robbin> ;-) 06:54 < Robbin> well Bushmills, that doesn't answer however why it does the same in windows clients 06:55 < Bushmills> now that you know that it isn't openvpn changing default route, you probably know what to look at 06:56 < Robbin> can't bet on it 06:56 < Bushmills> probably some "try to make computer smarter than it should be" contraption 06:56 < Robbin> :D 06:57 < Robbin> is it possible two clients to fail in the same way with the same server? 06:57 < Robbin> while the server changes to either using tap or tun 06:57 < Bushmills> they don't fail. they just act according their configuration or programming 06:58 < Bushmills> the fact that you're not content with the result doesn't represent failure 06:58 < Robbin> sure, nothing unusual, but there is no additional software installed or routes pushed then the minimum which is needed 06:58 < Bushmills> then, !blame windows 06:59 < Robbin> well.... agreed, but for me it looks like it has redirect-gateway auto enabled 06:59 < Robbin> I blame windows long a go Bushmills 06:59 < Robbin> too bad it will last even if pull out all my hair 06:59 < Bushmills> solution could be to !remove windows 07:00 < Robbin> not an option, the one using the windows machine knows nothing but "pretty windows" :D 07:00 < Bushmills> matter of priorities. sanity, hair, or fancy screen 07:01 < Robbin> even after I showed what gnome + compiz + awn does :D 07:01 < Bushmills> i can't tell you anything about openvpn under windows. except parroting opinions of others 07:02 < Robbin> =/ 07:03 < Robbin> will try to launch it without the --up /usr/libexec/nm-openvpn-service-openvpn-helper option 07:03 < Robbin> and see what happens 07:03 < Robbin> gotta change server push declarations first :S 07:03 < Robbin> if it drops me out - it doesn't work :D 07:03 < Bushmills> network manager fell in disgrace with me independently of openvpn issues 07:04 < Robbin> yeah, same 07:04 < Bushmills> so i actually don't know what the openvpn and network manager issues are 07:04 < Robbin> I was pissed when it started changing my network interfaces the way it likes 07:05 < Bushmills> my problem was switching between 3g and cable connection frequently 07:05 < Bushmills> it somehow interfered always in a way that i lost connection, and needed to get access active manually again 07:06 < Bushmills> removed it - solved. 07:06 < Robbin> yeah, that's why I started looking at the VPN problem too 07:06 < Robbin> because I had to add the route manually 07:06 < Robbin> to make my home lan visible 07:06 < Robbin> do you know if here is any replacement for it? 07:06 < Bushmills> yes. no network manager 07:06 < Robbin> I must say I preffer to see something like that on my laptop 07:06 < Robbin> 0.o 07:07 < Bushmills> with my current config, it wouldn't do much good anyway 07:08 < Bushmills> i run everything through vpn, including dns, regardless of the connection type 07:08 < Robbin> by the way - without that option for the network manager... it works just fine 07:08 < Robbin> heck, still doesn't show me why it happens on windows too 07:09 < Robbin> Bushmills, problem is - when I go out, I start torrents :D 07:09 < Robbin> can't really use my home net, heh 07:09 < Bushmills> i run those remotely 07:10 < Bushmills> not sensible to use local bandwidth. that's reserved for fetching completed stuff 07:10 < Robbin> :D 07:10 < Robbin> can't really download movies at the office 07:10 < _trine> you could run your torrents inside a router 07:10 < Bushmills> route is still locally 07:10 -!- krphop [n=krphop@watch.out.the.feds.are.rightbehind.us] has quit [Excess Flood] 07:10 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 07:11 < Robbin> _trine, the vpn server for me is... everything 07:11 < Robbin> web server, lan router, vpn server, mysql server.... 07:11 < Bushmills> (meaning: don't want to use asymmetric access provider bandwidth for torrents) 07:11 < _trine> I have a small touter at home which I vpn into and run rtorrent inside screen on the router 07:11 < Bushmills> and "remote" means, high and symmetric speed 07:11 < Robbin> Bushmills, that's the other downfall for me - we use ADSL lines in both home and office :S 07:11 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 07:12 -!- krphop [n=krphop@watch.out.the.feds.are.rightbehind.us] has joined ##openvpn 07:12 < Bushmills> Robbin: another reason to not jam the line with torrents 07:12 < Robbin> yeah _trine I do the same, but if my net gets routed throuh my home server.... would really piss me off while at work :) 07:13 < Robbin> yeah Bushmills, that's why I want to resolve this issue 07:13 < Robbin> because when that windows client downloads, it gets routed through my server again 07:13 < Bushmills> console clients run remotely nicely. many accept the torrent url instead of the torrent itself 07:14 < Robbin> nah, been using ktorrent long a go, recently Transmission is sufficient 07:14 < Robbin> lightweight is the key word here 07:15 < Robbin> ktorrent was a bit heavy :P 07:15 < Bushmills> bittornado mostly for me 07:15 < Bushmills> ncurses interface 07:16 < Robbin> lol, I would love that if I still had my old slack 7 router :D 07:16 < Robbin> lynx (or links) + centericq 07:16 < Robbin> haha 07:16 < Robbin> good old days 07:16 < Robbin> anyways 07:16 < Robbin> is there anyone which could help with the linux part of the problem? 07:16 < Robbin> krzee maybe. as the one which wrote some howtos on it :P 07:17 < Bushmills> i thought your problem was known already - network manager changes your default route 07:17 < Robbin> Bushmills, yeah, for the linux box 07:17 < Robbin> this does not apply to the windows box 07:18 < Bushmills> "anyone which could help with the linux part of the problem?" 07:18 < Robbin> hm, yeah, sorry, mystyped the OS in my above statemen, lol 07:21 < Robbin> krzee, could you? 07:24 < Robbin> =/ 07:26 < Robbin> heh Bushmills NM is acting up, but something I tried and didn't work before, just worked 07:26 < Robbin> there is checkbox in network manager for the vpn connection 07:27 < Robbin> "use this connection only for resources on this network" 07:27 < Robbin> it didn't work before, it's fine now though 07:27 < Robbin> doesn't replace the default route 07:27 < Robbin> and that checkbox isn't checked by default, even though it should be :S 07:28 < Robbin> I guess I had something changed in the server conf last time I checked that 07:28 < Robbin> okay, so only windows problem left to solve 08:32 < ecrist> good morning 08:34 < Robbin> good morning 08:34 < Robbin> even if it's afternoon for me :P 08:34 -!- hyper_ch [n=hyper@adsl-84-227-58-130.adslplus.ch] has left ##openvpn ["Konversation terminated!"] 09:08 -!- Grapsus [n=grapsus@che21-2-82-245-89-120.fbx.proxad.net] has joined ##openvpn 09:22 -!- Sky[x] [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 09:24 < krzee> good afternoon 09:24 < krzee> even if its still night for me 09:25 < Robbin> lol krzee 09:25 < Robbin> krzee, can you give me a hit about some windows issue with openvpn? 09:25 < Robbin> hint* 09:25 < krzee> only if you can give me a hint as to the problem you are having 09:26 < Robbin> openvpn in server mode, linux (fedora 10) 09:26 < Robbin> several clients 09:26 < Robbin> recently I realized that even though the server doesn't have the "redirect-gateway" enabled, the traffic from the clients gets routed 09:27 < Robbin> for the linux client (fedora 12) we came to the conclusion it's network manager's fault 09:27 < krzee> !configs 09:27 < vpnHelper> krzee: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 09:27 < Robbin> and I found a workaround 09:27 < krzee> network manager is crap 09:27 < Robbin> yeah, I know that.... =/ 09:27 < Robbin> so the problem now is only in the windows client 09:28 < krzee> see above bot command 09:29 < Robbin> yeah yeah, working on it..... 09:30 < Robbin> krzee, http://pastebin.com/m6ee1c101 09:34 < Robbin> krzee, appended the client conf now 09:35 < Robbin> ah OS and version :S 09:36 < Robbin> OpenVPN 2.1_rc15 i386-redhat-linux-gnu [SSL] [LZO2] [EPOLL] built on Nov 30 2008 09:36 < Robbin> server is fedora 10 09:36 < Robbin> OS on server * 09:37 < Robbin> krzee, I am sure it's not the server config which is the problem 09:37 < Robbin> changed it, tried with tun instead of tap - the results were the same 09:38 < Robbin> as I said - on the linux box, the problem was network manager 09:38 < Robbin> which is now bypassed 09:38 < Robbin> and as you see - I don't use the redirect-gateway option 09:38 < Robbin> but still all trafic gets routed through the box 09:39 < Robbin> the server* 09:41 < krzee> why are you bridging? 09:42 < krzee> when when you appended the client config it gave you a new url 09:42 < Robbin> no particular reason, did it this way in the begining, didn't bothered changing it 09:42 < Robbin> as it was serving the purpuse 09:42 < krzee> !tunortap 09:42 < vpnHelper> krzee: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 09:42 < vpnHelper> krzee: against you over the vpn 09:42 < krzee> go back to tun 09:42 < Robbin> doh, sorry, thought it updaes the same 09:42 < Robbin> http://pastebin.com/m34104c59 09:43 < krzee> when you go to tun you'll need to change the client ip too .16 wont be valid 09:43 < krzee> .6 .10 .14 .18 etc 09:43 < Robbin> krzee, tap does good job for me, let's not dig into this.... I will eventually route the trafic of my daughter through the server, so I can block some sites she shouldn't watch 09:44 < krzee> you can do that without tap 09:44 < Robbin> krzee, not quite, if you use the "topology subnet" declaration 09:44 < krzee> that is true 09:44 < Robbin> as I said - I played around with it before comming here ;-) 09:44 < krzee> cool, go back to it and i bet your problem goes byebye 09:45 < Robbin> back to tun? 09:45 < krzee> yup 09:45 < Robbin> I only tried it today, lol 09:45 < krzee> prove it 09:45 < krzee> go back to tun and show me logs and routing tables that its changing your default gateway 09:45 < Robbin> when I switch to tun it gaves some errors in the server log by the way 09:45 < Robbin> don't have access to the windows machines right now =/ 09:46 < krzee> cool, come back when you go 09:46 < krzee> when you do* 09:46 < krzee> we cant troubleshoot something you dont even have access to 09:46 < Robbin> Sun Jan 3 00:41:59 2010 XXXX:34819 MULTI: bad source address from client [XXXX], packet dropped 09:46 < krzee> you trying to route a lan over the tunnel? 09:47 < Robbin> krzee, I asked for hint.... 09:47 < Robbin> yes! 09:47 < krzee> !route 09:47 < vpnHelper> krzee: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 09:47 < Robbin> ...... 09:47 < krzee> thats only valid for tun setups 09:47 < Robbin> watched that thing dozen times, didn't really helped with my setup 09:47 < Robbin> but ok 09:47 < krzee> umm 09:47 < krzee> that error is explained 09:48 < krzee> lol 09:48 < Robbin> didn't watch there after I got that error really, lol 09:48 < Robbin> but thanks anyways 09:48 < Robbin> will check once the people are back in their homes..... :S 09:57 < krzee> cool 09:58 < Robbin> hm, just remembered why I moved along from tun 09:58 < Robbin> there was still some problem with the routing 09:58 < Robbin> which I think was because the subnet has the same addresses I've entered in the server.conf 10:03 -!- s0undt3ch [n=s0undt3c@80.69.34.147] has joined ##openvpn 10:04 < s0undt3ch> hello ppl 10:04 < s0undt3ch> I have an http proxy which requires authentication 10:04 < s0undt3ch> I've set openvpn(for now) to query username and passwd from stdin 10:05 < s0undt3ch> the issue seems to be that my username is in the form of WinsDomainName\MyUsername, I can login through the browser, but not with openvpn 10:19 < s0undt3ch> ok, openvpn adds another \ :\ 10:22 -!- erpel [n=erpel@f050094225.adsl.alicedsl.de] has joined ##openvpn 10:22 < erpel> hello everyone 10:25 < |Mike|> hi. 10:26 < erpel> does anyone have some tips on troubleshooting bridge mode on freebsd? 10:30 < erpel> I just don't get why this was easier on XP than on a proper OS... 10:30 -!- Danskmand1 [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has joined ##openvpn 10:32 < Robbin> erpel, I was using bridge mode just till 10 minues a go 10:32 < Robbin> according to krzee, bridging is no good :D 10:32 -!- Zordrak [n=jaz@unaffiliated/zordrak] has joined ##openvpn 10:32 < erpel> in general? 10:32 < erpel> I think theres right uses for almost anything 10:32 < Robbin> well someone could get acces to your vpn... blah blah blah... could arp-poison your vpn 10:33 < Robbin> yup, agreed 10:33 < Robbin> what are you using the bridging for 10:33 < Robbin> ? 10:34 < erpel> I'm rebuilding a home vpn for travelling purposes on a freebsd machine and the previous system used bridging 10:35 < erpel> dont things like mdns work only with bridge mode 10:35 < erpel> does wireshark work on the tap device on windows? does anybody know 10:36 < Robbin> for what I've got, most of the people (which were) here uses linux based systems 10:37 < Robbin> and can't say about mdns and wireshark 10:37 < erpel> sounds reasonable 10:38 < erpel> I know i could switch to layer 3 and have this thing up right now, but it really bothered me that this didn't work 10:38 < Robbin> well okay, what doesn't work for you right now 10:39 < erpel> I'm not entirely sure, the vpn connection works so far, that the xp client gets an IP address assigned but i can not get anything from one end to the other 10:40 < Robbin> could you start from the beginning? What's the purpuse, what you wanna do? You said you are packing it for traveling? Use pastebin to show conf files? 10:40 < Robbin> what was it 10:40 < Robbin> !configs 10:40 < vpnHelper> Robbin: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 10:41 < erpel> no problem, just a second 10:41 < Robbin> can't say I can be of much help, but I've been digging around openvpn for quite some time 10:44 < erpel> this is the server config 10:44 < erpel> http://pastebin.com/d7638ae8f 10:44 -!- Danskmand [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has quit [Read error: 110 (Connection timed out)] 10:45 -!- Zordrak_ [n=jaz@unaffiliated/zordrak] has quit [Read error: 110 (Connection timed out)] 10:45 < erpel> and the connection seems to be established without problems on the openvpn side 10:46 < erpel> 2.1.1 on the client (XP 32bit 10:46 < Robbin> erpel, probably will be good if you post them all in the same place 10:46 < erpel> 2.0.6 on the server (freebsd 8) 10:47 < Robbin> hm, so you are moving your server from the XP machine to the freebsd one? 10:48 < erpel> Its not really a move as I'm not reusing any files 10:48 < Robbin> but you want the same setup 10:48 < Robbin> well the conf isn't different really (for what I know) 10:48 < Robbin> can't say I have experience with XP server 10:50 < erpel> now we have everything in one place 10:50 < erpel> http://pastebin.com/d6bcfdddf 10:50 < erpel> but I also did not get better results from other clients 10:50 < erpel> My guess would be it's something with the bridge on the server side 10:53 < Robbin> ok, now with the files in one place, please, tell me the setup again, dunno if it's just me, I couldn't get it.... you are moving to the freebsd server, you have windows clients 10:54 < Robbin> so, clients connects 10:54 < Robbin> but....? 10:54 < erpel> okay from the start 10:55 < erpel> freebsd server. I'm currently testing this with a xp client 10:55 < erpel> client connect seems to work flawlessly (once you know the drill, openvpn is not to bad to set up i think) 10:55 < Robbin> yeah, indeed 10:55 < erpel> now I have something very weird 10:56 < Robbin> no "funny messages" in the logs I assume 10:56 < Robbin> yes? 10:56 < Robbin> hm, is it just me or you mistyped one line? 10:56 < Robbin> :local 192.168.99.51 10:57 < erpel> let me check 10:57 < Robbin> don't think it should have : in front 10:57 < |Mike|> Robbin: yep :p 10:57 < |Mike|> !tunortap 10:57 < erpel> I think thats fom the line above, where i commented the server details 10:57 < vpnHelper> |Mike|: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 10:57 < vpnHelper> |Mike|: against you over the vpn 10:57 -!- Grapsus [n=grapsus@che21-2-82-245-89-120.fbx.proxad.net] has quit ["Quitte"] 10:57 < |Mike|> why are you using layer 2 erpel ? :) 10:57 < erpel> It is not in the file 10:58 < Robbin> erpel, ok, just checking 10:58 < |Mike|> erpel: grep local openvpn.conf ? 10:58 < Robbin> |Mike|, he said he wants some special services to run with it, for which he knows they run with tap 10:58 < |Mike|> (or whatever you named it) 10:58 < Robbin> (server.conf :P) 10:58 < erpel> for mdns (iTunes autodiscovery and stuff). I want to have a setup as close as possible as a cable to the network 10:59 < |Mike|> are you sure that that stuff does layer 2? 10:59 < Robbin> |Mike|, do you know if that can be done with tun as well? 10:59 < Robbin> because I have no idea about it :D 10:59 < erpel> How does stuff that does multicast announces behave with tun 10:59 < erpel> !wins 11:00 < vpnHelper> erpel: "wins" is http://oreilly.com/catalog/samba/chapter/book/ch07_03.html is a good link for seeing how to run WINS on samba 11:00 < erpel> now to the weirdness 11:00 < erpel> Im running wireshark on the clients tap interface and just saw windows announces from the target network 11:01 < |Mike|> ah okay. /me writes that down :) 11:03 < Robbin> :S 11:03 < Robbin> can't help in these matters 11:03 < erpel> damn 11:03 < erpel> now I'm confused 11:04 < erpel> I see the samba share from the server on the client 11:04 < erpel> but no ping... 11:04 < Robbin> windows firewall? 11:05 < erpel> phu, nope did not forget that one 11:05 < erpel> its inactive 11:06 < Robbin> :D 11:06 < Robbin> gotta be sure, hehe 11:07 < erpel> no absolutely 11:08 < Robbin> but yeah, it's weird 11:08 < erpel> okay so I can see stuff like router advertisements from the target network. 11:08 < erpel> on the client 11:10 < Robbin> hm 11:10 < Robbin> seems like firewall issue to me, really 11:11 < erpel> yes 11:12 < erpel> it looks like for once, the client does not get any arp responses 11:18 -!- Danskmand1 [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has quit ["Leaving."] 11:36 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 11:37 -!- erpel [n=erpel@f050094225.adsl.alicedsl.de] has quit ["This computer has gone to sleep"] 11:52 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 12:11 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 12:11 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit [Client Quit] 12:12 -!- maek [n=maek@ip70-189-163-157.lv.lv.cox.net] has joined ##openvpn 12:15 < maek> I have 1 public ip address and I will be routing udp 1194 to the static 192.168.2 address for my openvpn server. My vpn block will be 10.0.55.0/24. is it going to be complicated to make it so when someone connects to the open vpn they have access to the 192.168.2.0/24 range of servers? 12:21 < Bushmills> !client-to-client 12:21 < vpnHelper> Bushmills: "client-to-client" is with this option packets from 1 client to another are routed inside the server process. without it packets leave the server process, hit the kernel (firewall, routing table) and if allowed by firewall and routed back to server process, they go to the client. you use this option when you do not want to use selective firewall rules on what clients can access things 12:21 < vpnHelper> Bushmills: behind other clients 12:21 < Bushmills> !route 12:21 < vpnHelper> Bushmills: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 12:23 -!- Danskmand [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has joined ##openvpn 12:28 < maek> Bushmills: thanks 12:28 < maek> so the route is what I want 12:28 < maek> because I dont want all the hosts on the local network to have to run a vpn client 12:43 -!- stirnlappenbasil [n=sag@f055121225.adsl.alicedsl.de] has joined ##openvpn 12:47 < Diddi> when I'm connected to my vpn, my tap interface says the connection is 10Mb/s, is it 10Mb/s or is it just showing that? 12:47 < Diddi> if it is, is it possible to change to 100Mb/s ? the server and client are on the same lan 12:51 < Diddi> using wget I get about 2Mb/s within the vpn.. still on same physical lan 12:53 -!- romero [n=user@mail.nfq.ktc.lt] has joined ##openvpn 12:56 -!- stirnlappenbasil [n=sag@f055121225.adsl.alicedsl.de] has quit [Read error: 104 (Connection reset by peer)] 12:56 -!- stirnlappenbasil [n=sag@g225239082.adsl.alicedsl.de] has joined ##openvpn 13:00 -!- G-Script50 [n=sag@f055169100.adsl.alicedsl.de] has joined ##openvpn 13:00 -!- G-Script50 [n=sag@f055169100.adsl.alicedsl.de] has quit [Read error: 54 (Connection reset by peer)] 13:00 -!- G-Script50 [n=sag@f055169100.adsl.alicedsl.de] has joined ##openvpn 13:05 -!- G-Script50 [n=sag@f055169100.adsl.alicedsl.de] has quit [Read error: 104 (Connection reset by peer)] 13:05 -!- G-Script50 [n=sag@g226231050.adsl.alicedsl.de] has joined ##openvpn 13:18 -!- stirnlappenbasil [n=sag@g225239082.adsl.alicedsl.de] has quit [Read error: 110 (Connection timed out)] 13:28 -!- MJD [n=quassel@CPE0015ef4fc6af-CM001bd7cbfc8c.cpe.net.cable.rogers.com] has quit [Read error: 110 (Connection timed out)] 13:29 -!- Danskmand [n=Danskman@dslb-088-069-215-127.pools.arcor-ip.net] has left ##openvpn [] 13:39 -!- Robbin [n=Multi-X@mobile.web.surgery.at.fenihon.com] has quit ["KVIrc Insomnia 4.0.0, revision: 3462, sources date: 20090703, built on: 2009/09/10 21:45:11 UTC http://www.kvirc.net/"] 14:30 -!- G-Script50 [n=sag@g226231050.adsl.alicedsl.de] has quit ["Verdiene Dir in Deiner Freizeiht etwas dazu,erpreß Deinen Freund."] 14:45 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 14:45 < mithridates> hey guys 14:46 < mithridates> I'm following HOWTO 14:46 < mithridates> and I'm in the "Generate certificate & key for server " 14:46 < mithridates> I used ./build-key-server server 14:47 < mithridates> to make Cert & key for my server 14:47 < mithridates> but after asking email , it asks a Challenge password 14:47 < mithridates> what's that? 14:47 < mithridates> Please enter the following 'extra' attributes 14:48 < mithridates> can I leave it blank? 14:49 < ecrist> yes 14:51 < mithridates> hi ecrist 14:51 < mithridates> what does "1 out of 1 certificate requests certified, commit?" mean? 15:16 < mithridates> !IP 15:16 < vpnHelper> mithridates: Error: "IP" is not a valid command. 15:17 < mithridates> !factoids search local 15:17 < vpnHelper> mithridates: "local" is a flag for --redirect-gateway, Add the local flag if both OpenVPN machines are directly connected via a common subnet, such as with wireless. 15:17 < mithridates> who can tell me what ";local a.b.c.d" means? 15:20 -!- erpel [n=erpel@f050095173.adsl.alicedsl.de] has joined ##openvpn 15:24 -!- ardya [i=ardy@unaffiliated/ardya] has joined ##openvpn 15:24 < ardya> hi folks, is it not possible to set ifconfig-pool range? 15:26 < ardya> man page says for tun device, range starts at .4, can that not be manually set? 15:29 < ardya> Jan 3 16:29:32 rdb openvpn[20324]: Options error: --server already defines an ifconfig-pool, so you can't also specify --ifconfig-pool explicitly 15:43 < mithridates> what's the --server ? 15:43 < mithridates> when I want to connect to my server it happens 16:26 -!- Lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 16:34 < ardya> guess no ones around 16:41 -!- lt83850 [n=your@c-24-127-180-91.hsd1.pa.comcast.net] has quit [No route to host] 16:43 < ardya> !iporder 16:43 < vpnHelper> ardya: "iporder" is (#1) OpenVPN's internal client IP address selection algorithm works as follows: 1 -- Use --client-connect script generated file for static IP (first choice)., or (#2) Use --client-config-dir file for static IP (next choice) !static for more info, or (#3) Use --ifconfig-pool allocation for dynamic IP (last choice), or (#4) if you use --ifconfig-pool-persist see !ipp 16:44 < ardya> !static 16:44 < vpnHelper> ardya: "static" is (#1) use --ifconfig-push in a ccd entry for a static ip for the vpn client, or (#2) example: ifconfig-push 10.8.0.6 255.255.255.0, or (#3) also see !ccd and !iporder 16:44 < ardya> !ccd 16:44 < vpnHelper> ardya: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 16:51 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 17:03 < ardya> hmmm I set .4 as a static IP, client says .5 is pTp, and .6 gets assigned 17:04 -!- Lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 113 (No route to host)] 17:13 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 104 (Connection reset by peer)] 17:26 -!- erpel [n=erpel@f050095173.adsl.alicedsl.de] has quit ["This computer has gone to sleep"] 17:28 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Read error: 54 (Connection reset by peer)] 17:37 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 17:37 -!- magic_1 [n=magic@41.121.14.23] has joined ##openvpn 17:44 < mithridates> !ifconfig-pool 17:44 < vpnHelper> mithridates: Error: "ifconfig-pool" is not a valid command. 17:45 < mithridates> !ipp 17:45 < vpnHelper> mithridates: "ipp" is (#1) the option --ifconfig-pool-persist ipp.txt does NOT create static ips, or (#2) Note that the entries in this file are treated by OpenVPN as suggestions only, based on past associations between a common name and IP address. They do not guarantee that the given common name will always receive the given IP address. If you want guaranteed assignment, see !iporder and !static 17:47 < mithridates> !iporder.x 17:47 < vpnHelper> mithridates: Error: "iporder.x" is not a valid command. 17:47 < mithridates> iporder 17:47 < mithridates> !iporder 17:47 < vpnHelper> mithridates: "iporder" is (#1) OpenVPN's internal client IP address selection algorithm works as follows: 1 -- Use --client-connect script generated file for static IP (first choice)., or (#2) Use --client-config-dir file for static IP (next choice) !static for more info, or (#3) Use --ifconfig-pool allocation for dynamic IP (last choice), or (#4) if you use --ifconfig-pool-persist see !ipp 17:48 < mithridates> !static 17:48 < vpnHelper> mithridates: "static" is (#1) use --ifconfig-push in a ccd entry for a static ip for the vpn client, or (#2) example: ifconfig-push 10.8.0.6 255.255.255.0, or (#3) also see !ccd and !iporder 17:49 < mithridates> !ccd 17:49 < vpnHelper> mithridates: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 17:49 < mithridates> !factoids list 17:49 < vpnHelper> mithridates: Error: The "Factoids" plugin is loaded, but there is no command named "list" in it. Try "list Factoids" to see the commands in the "Factoids" plugin. 17:49 < mithridates> list Factoids 17:52 < ardya> this isnt helping. I can use a dynamic ip, but if I set a static, the client fails. 17:53 -!- ardya [i=ardy@unaffiliated/ardya] has left ##openvpn ["*sigh*"] 17:54 < mithridates> !def1 17:54 < vpnHelper> mithridates: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 17:55 < mithridates> !man 17:55 < vpnHelper> mithridates: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 18:29 < mithridates> hey guys 18:30 < mithridates> I confused by this ip address : 10.8.0.0 18:30 < mithridates> is it the ip of TUN device? 18:30 < mithridates> or the ip address of eth0 which clients will connect ? 18:32 < mithridates> helloooo , is there any body ? 18:36 < Bushmills> would 192.168.50.70 be the ip address of a wlan interface, or a tun interface, or eth0? 18:38 -!- Nappy [n=nappy@123-247.97-97.tampabay.res.rr.com] has quit [Read error: 113 (No route to host)] 18:39 < mithridates> I'm talking about http://openvpn.net/index.php/open-source/documentation/howto.html#redirect 18:39 < vpnHelper> Title: HOWTO (at openvpn.net) 18:39 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 18:39 < mithridates> Bushmills: I use a valid ip address for my eth0 18:40 < mithridates> Bushmills: should I change that vali ip address with 10.8.0.0 ? 18:40 < Bushmills> 192.168.50.70 is a valid ip address 18:40 < Bushmills> 10.8.0.0 look like a network address 18:41 < mithridates> yes 18:41 -!- Nappy [n=nappy@123-247.97-97.tampabay.res.rr.com] has joined ##openvpn 18:41 < Bushmills> "is it the ip of TUN device?" - can be network address of wlan, of eth0, of tun, of ppp 18:41 < mithridates> so I should change the iptables command to this: "iptables -t nat -A POSTROUTING -s /24 -o eth0 -j MASQUERADE" 18:42 < mithridates> ok let me to explain it 18:42 < mithridates> I want to serve NAT to my clients by VPN 18:42 < mithridates> and I want to serve Internet to them 18:43 < mithridates> I have 2 NIC right now 18:43 < mithridates> 1- eth0 18:43 < mithridates> 2-TUN0 18:43 < mithridates> I configured server.conf by this flags push "redirect-gateway def1" 18:44 < mithridates> push "redirect-gateway def1" 18:44 < mithridates> now I want to configure NAT 18:44 < Bushmills> and you looked at iptables man page, which told you what the parameter behind -s means, right? 18:45 < Bushmills> do you know what the /24 means? 18:45 < mithridates> oh , :( ok I just copied. 18:45 < mithridates> yes that my subnet mask 18:45 < mithridates> ok I got it 18:45 < mithridates> -s is the source ip address 18:45 < Bushmills> how would "my ip address" go together with "subnet mask"? 18:46 < mithridates> ummm 18:46 < mithridates> so what? 18:46 < mithridates> is it the range of my network? 18:46 < mithridates> oh I got it 18:46 < mithridates> yes that's the range 18:47 < Bushmills> ip address, for single host, or network address, in conjunction with mask 18:47 < mithridates> 10.8.0.0/24 ---> 10.8.0.0 - 10.8.255.255 18:47 < mithridates> am I right? 18:47 < Bushmills> no 18:49 < mithridates> :( 18:49 < Bushmills> http://en.wikipedia.org/wiki/CIDR 18:49 < vpnHelper> Title: Classless Inter-Domain Routing - Wikipedia, the free encyclopedia (at en.wikipedia.org) 18:50 < mithridates> ok tnx a lot 18:50 < mithridates> :) 18:59 -!- Sky[x] [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has quit [] 19:05 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 19:15 -!- MJD [n=quassel@CPE0015ef4fc6af-CM001bd7cbfc8c.cpe.net.cable.rogers.com] has joined ##openvpn 19:21 -!- Nappy [n=nappy@123-247.97-97.tampabay.res.rr.com] has quit ["Leaving"] 19:26 < mithridates> Bushmills: are u still there? 19:28 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] 19:38 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 19:40 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 19:46 -!- ardya [i=ardy@unaffiliated/ardya] has joined ##openvpn 19:47 < ardya> !static 19:47 < vpnHelper> ardya: "static" is (#1) use --ifconfig-push in a ccd entry for a static ip for the vpn client, or (#2) example: ifconfig-push 10.8.0.6 255.255.255.0, or (#3) also see !ccd and !iporder 19:47 < ardya> !/30 19:47 < vpnHelper> ardya: "/30" is (#1) http://openvpn.net/index.php/open-source/faq.html#slash30 explains why routed clients each use 4 ips, or (#2) you can avoid this behavior with by reading !topology 19:47 < ardya> !topology 19:47 < vpnHelper> ardya: "topology" is is it is possible to avoid the !/30 behavior if you use 2.1 with the option: topology subnet http://osdir.com/ml/network.openvpn.devel/2005-09/msg00020.html This will end up being default in later versions. 19:57 -!- corretico [n=laguilar@201.201.46.106] has quit [Success] 19:59 < ardya> ohh version 2.1 20:05 < reiffert> :) 20:08 < ardya> sweet, building 2.1.1 20:12 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 20:12 < krzie> i love when people come in, read the topic, and help themselves 20:13 * krzie gives ardya a ^5 20:13 < reiffert> yeah, me too. 20:15 < ardya> I wasn't grokking the /30 thing 20:17 < ardya> dynamic config worked, static want, until I found an example via google where the netmask was actually the next ip, not a netmask, so got static working, then I got to thinking why does each machine use 2 IPs, and remembered !/30 20:17 < ardya> s/want/wasnt 20:18 < krzie> you can use a netmask, just have to use .6 .10 .14 etc as the ip 20:18 < krzie> or of course 2.1 and topology subnet (which is cooler) 20:18 < ardya> I was trying 192.168.20.4 255.255.255.0 20:18 < ardya> which was fail 20:19 < krzie> right 20:19 < ardya> the man page isnt clear on "remote-netmask" 20:20 < krzie> he read the manpage too! 20:20 < krzie> you should train people how to get help in here 20:20 < krzie> lol 20:20 < krzie> ;] 20:20 < reiffert> :) 20:22 < theDoc> I'm so darn annoyed. 20:22 < theDoc> Major outtage from asia to US. 20:22 * theDoc screams. 20:22 < krzie> doh 20:22 < krzie> im excited, going to australia next month 20:23 < krzie> decided yesterday, got ticket today 20:23 < theDoc> krzee> Welcome to the land of the bandwidth caps. 20:23 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 20:26 < ardya> slackware ships 2.0.9 20:26 < ardya> so fixing the man pages isn't worth it 20:26 < krzie> 2.1 was very recently released 20:26 < krzie> !man 20:26 < vpnHelper> krzie: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 20:26 < ardya> thats what I'm building 20:26 < ardya> slack pkgs for 13.0 and 12.1 20:29 < theDoc> krzee> Holiday there? 20:29 < krzie> yup, 3 weeks 20:29 < krzie> been wanting to go for a long time, finally taking up a friends offer to visit 20:29 < ardya> sweeeeet 20:29 < ardya> all working 20:29 < ardya> thanks guys 20:30 < krzie> ild say yw but you did it all yourself =] 20:30 < theDoc> nice. 20:30 < theDoc> i'm looking to migrate pronto. 20:30 < krzie> migrate to 2.1? 20:32 < theDoc> no, migration of citizenship :P 20:32 < krzie> oh coo 20:32 < krzie> any target countries? 20:34 < theDoc> Looking at sweden at the moment. 20:34 < theDoc> :p 20:34 < theDoc> I'll be moving once my vpn business settles down and all 20:34 < theDoc> I'm not keen on staying here. 20:34 < krzie> nice 20:34 < krzie> ive been happy with my choice to leave usa 20:34 < theDoc> krzee> where have you moved to? 20:35 < ardya> whats ACCESS SERVER thats nor supported 20:35 < theDoc> ardya> I some-what support access-server. 20:35 < krzie> its the corporate attempt for a pay for license openvpn 20:35 < krzie> theDoc, caribbean 20:35 < theDoc> But ymmv, depending on my time. 20:35 < theDoc> krzee> nice, how old are you? 20:36 < ardya> ahh 20:36 < krzie> 28 20:36 < theDoc> krzee> That's young, i'm about there too. 20:36 < theDoc> :p 20:37 < theDoc> fuck this place, i'm moving out and away from all of you 20:37 < theDoc> :D 20:37 -!- maek [n=maek@ip70-189-163-157.lv.lv.cox.net] has quit [] 20:38 < krzie> ardya if it was just like openvpn ild have no problem supporting it, but theres no independant config file, etc... they made it very different so we cant really troubleshoot it 20:38 < krzie> but thats not really an issue since its a licensed product, people can get support from whoever they license it from ;] 20:39 < ardya> I understand, just curious what it was 20:39 < krzie> understood ;] 20:39 < theDoc> krzee> but you'll have to admit that it's excellent for rapid deployment and minimal user intervention, however, it requires the people supporting it to actually have a clue :p 20:40 < krzie> theDoc actually i cant admit that, i know very little about it 20:40 < krzie> but i know you've used both so i trust what you said 20:41 < theDoc> krzee> my business stuff uses as, because all the user has to do is to put in a password. 20:41 < theDoc> granted, it's not as pretty or as "hacky" as openvpn (the opensourced one) 20:41 < theDoc> but it works good if you have to push it to dumb users. 20:41 < theDoc> like, ok see this icon here? yeah, click on it and put in your password and click connect 20:42 < theDoc> ahh, yes. that's all you need to do and you get all your porn 20:42 < theDoc> :p 20:42 < krzie> it should still have a standard config in the backend 20:42 < krzie> that the webserver uses 20:42 < krzie> imho 20:43 < krzie> then by knowing the OS one you would be prepard to use the license one 20:44 < krzie> if a company were paying me to setup a vpn solution, AS would have a chance if i could use standard config files in the backend, plus theyd be able to use the opensource community's support 20:44 < theDoc> krzee> True, but in this case, I don't think they'll be overhauling it anytime soon. 20:44 < theDoc> I've asked for a few feature requests, mainly to deal with the UI and all 20:45 < krzie> i dont think they will either, but think how easy it would have been if they did it that way 20:45 < krzie> then again i guess they would have had a hard time keeping it pay-for-use that way too 20:47 < theDoc> It's really a it may be for you product 20:47 < theDoc> :( 20:47 < krzie> well i do wish them well with it 20:49 < theDoc> i wish myself well with it, it'll be nice to manage to become asia-pac's largest consumer ip vpn carrier. 20:49 < theDoc> :P 20:49 < theDoc> or rather, i'll see if that's even feasible. 20:50 * theDoc forces everyone to encrypt their traffic. 20:51 -!- Ceil [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has joined ##openvpn 20:51 < Ceil> !tcp 20:51 < vpnHelper> Ceil: "tcp" is Sometimes you cannot avoid tunneling over tcp, but if you can avoid it, DO. Why TCP Over TCP Is A Bad Idea: http://sites.inka.de/~bigred/devel/tcp-tcp.html 20:51 < ardya> so whats bytecount all about in the management interface 20:52 < theDoc> ardya> total in/out? 20:52 -!- Ceil [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has quit [Client Quit] 20:52 < ardya> shown where? 20:53 < theDoc> who knows, where are you finding that bytecount section at? 20:53 < ardya> I'm not finding it in any docs on teh website so far 20:53 < krzie> seriously, whered you see that? 20:53 < ardya> I see it in help in the management interface 20:53 < krzie> management interface isnt documented too well 20:53 < ardya> bytecount n : Show bytes in/out, update every n secs (0=off). 20:54 < krzie> yup thats the best doc i know of for management interface 20:54 < krzie> oh well thats obvious then 20:54 < krzie> its total bytes in and out, lol 20:54 < krzie> but you also have: 20:54 < krzie> bytes_received 20:54 < krzie> Total number of bytes received from client during VPN session. Set prior to execution of the --client-disconnect script. 20:54 < krzie> bytes_sent 20:54 < krzie> Total number of bytes sent to client during VPN session. Set prior to execution of the --client-disconnect script. 20:54 < ardya> I set it to 1 sec, I see nothing heh 20:54 < krzie> env vars 20:55 < ardya> ah there we go 20:55 < ardya> generate some traffic :) 20:58 < krzie> management interface is mainly meant to be a socket for other apps to interact with openvpn with 20:59 < ardya> apps like what? 20:59 < krzie> whatever you script up i guess ;] 20:59 < ardya> oh ok 21:00 < krzie> im sure eventually someone will release something nice that interacts with it 21:00 < ardya> having its stats availa via snmp is an idea 21:01 < krzie> or even a nice web ui with ability to see stats, disconnect people with a click, and stuff like that 22:23 -!- _numbers [n=x@unaffiliated/numbers/x-253875] has joined ##openvpn 22:23 < _numbers> i have the id.dss but its a dropbearkey and dbclient is not on the server. openssh `ssh -i` does not understand dropbear's dss keys, or is there another way? 22:24 < _numbers> someone suggested converting it. i know id.dss is binary format and most private keys are stored by ssh-keygen in base64. i also know DSS and DSA are related (compatible?). i wonder if it is a matter of just converting binary to base64? 22:25 -!- ardya [i=ardy@unaffiliated/ardya] has left ##openvpn ["night folks"] 23:09 -!- magic_1 [n=magic@41.121.14.23] has quit [Read error: 104 (Connection reset by peer)] 23:09 -!- magic_1 [n=magic@41.121.14.23] has joined ##openvpn 23:27 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 60 (Operation timed out)] 23:37 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 23:58 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] --- Day changed Mon Jan 04 2010 00:14 -!- _numbers [n=x@unaffiliated/numbers/x-253875] has left ##openvpn ["Leaving."] 00:23 -!- Ceil [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has joined ##openvpn 00:23 < Ceil> !nat 00:23 < vpnHelper> Ceil: "nat" is (#1) http://openvpn.net/howto.html#redirect for an explanation of NAT as it applies to openvpn, or (#2) http://www.secure-computing.net/wiki/index.php/OpenVPN/FAQ#Traffic_forwarding_doesn.27t_work_when_using_client_specific_access_rules, or (#3) dont forget to turn on ip forwarding, or (#4) please choose between !linnat and !fbsdnat for specific howto 00:24 < Ceil> !forward 00:24 < vpnHelper> Ceil: Error: "forward" is not a valid command. 00:24 < Ceil> Hm.. what was the thing I needed to edit to make echo 1 > /proc/sys/net/ipv4/ip_forward 00:24 < Ceil> permant 00:25 < Ceil> net.ipv4.conf.default.forwarding=1 to your /etc/sysctl.conf 00:25 -!- Ceil [n=ceil@205.73.87.203.static.nsw.chariot.net.au] has quit [Client Quit] 00:38 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 00:46 -!- kaatje [n=paige@2001:470:d022:0:0:dead:beef:3] has joined ##openvpn 00:46 < kaatje> hi guys. 00:47 < kaatje> i am wondering, it is possible to emulate a cisco ipsec server with openvpm? 00:47 < kaatje> i am wondering, it is possible to emulate a cisco ipsec server with openvpn? 00:48 < kaatje> my devices only will support cisco ipsec supposedly 00:48 < kaatje> !howto 00:48 < vpnHelper> kaatje: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 00:52 < theDoc> kaatje> no, openvpn is an ssl vpn. 00:52 < theDoc> ipsec is ipsec 00:54 < kaatje> :( 00:54 < kaatje> someone told me it would do it 00:55 < kaatje> what about l2tp? 01:02 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 01:03 -!- kaatje [n=paige@2001:470:d022:0:0:dead:beef:3] has left ##openvpn ["Later gators!"] 01:16 -!- barefoot [n=magic@41.121.115.46] has joined ##openvpn 01:16 -!- magic_1 [n=magic@41.121.14.23] has quit [Read error: 104 (Connection reset by peer)] 01:32 -!- hyper_ch [n=hyper@177-117.78-83.cust.bluewin.ch] has joined ##openvpn 01:52 -!- mithridates [n=chatzill@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 01:52 < mithridates> hey guys 01:52 < mithridates> I've tried to NAT 01:53 < mithridates> but my client cannot reach to the internet 01:53 < mithridates> target prot opt source destination 01:53 < mithridates> MASQUERADE all -- 10.8.0.0/24 anywhere 01:53 < mithridates> it's my config 01:57 < theDoc> mithridates> Have you done an echo "1" > /proc/sys/net/ipv4/ip_forward yet? 01:58 < mithridates> let me to check it 01:58 < mithridates> oh no 01:58 < theDoc> Do it. 01:58 < mithridates> should I reset my network service after doing it ? 01:59 < mithridates> yes? 01:59 < theDoc> no, there's no need to 01:59 < mithridates> oh :( I did it 01:59 < mithridates> when I reset it changes to 0 again 02:00 < mithridates> why? 02:00 < theDoc> mithridates> edit your /etc/sysctl.conf 02:00 < mithridates> ah ok 02:00 < theDoc> and change the 0 to 1 for ip forwarding or something 02:01 < mithridates> what about this one? # Do not accept source routing 02:01 < mithridates> net.ipv4.conf.default.accept_source_route = 0 02:02 < mithridates> it's working perfect now 02:02 < mithridates> thank you 02:02 < theDoc> Leave that alone. 02:02 < theDoc> :p 02:02 < mithridates> theDoc: the dns for my clients is not working 02:02 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:02 < mithridates> should I use bind? 02:03 < theDoc> no, edit your server.conf and add in a dns thing :P 02:03 < mithridates> !dns 02:03 < vpnHelper> mithridates: "dns" is Level3 open recursive DNS server at 4.2.2.1 02:04 < mithridates> !factoids search dns 02:04 < vpnHelper> mithridates: 'pushdns' and 'dns' 02:04 < mithridates> !pushdn 02:04 < vpnHelper> mithridates: Error: "pushdn" is not a valid command. 02:04 < mithridates> !pushdns 02:04 < vpnHelper> mithridates: "pushdns" is (#1) push "dhcp-option DNS a.b.c.d" to push dns to the client, or (#2) http://thread.gmane.org/gmane.network.openvpn.user/25139/focus=25147 see that mail archive for some info on pushing dns, or (#3) http://article.gmane.org/gmane.network.openvpn.user/25149 for a perm fix via regedit 02:14 < mithridates> I didn't get 02:14 < mithridates> theDoc: do I need to implement a dns server? 02:14 < mithridates> how can I redirect all the dns traffic for my clients? 02:33 < theDoc> mithridates> what are you doing? 02:33 < Bushmills> mithridates: a way to route all dns traffic through vpn is to run a local dns, which queries an upstream dns on vpn server. Alternatively, let your clients query a recursive dns on your vpn server. 02:33 < Bushmills> (second method results in slightly increased vpn traffic) 02:37 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 02:38 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 02:38 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 02:39 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 02:40 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 02:41 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 02:42 -!- Sky[x] [n=mihaaaa@212.235.182.245] has joined ##openvpn 02:42 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 02:46 < mithridates> Bushmills: how can I set their dns server < 4.2.2.4 > or some other dns servers? 02:47 < Bushmills> locally run a dns which is used by clients, and uses <4.2.2.4 or some other dns server> as upstream dns 02:48 < Bushmills> or route 4.2.2.4 though vpn 02:54 -!- SkyX [n=mihaaaa@88.200.89.29] has joined ##openvpn 02:54 < mithridates> which one is better? 02:55 < mithridates> which one is the best solution regarding to the cpu usage of the server? 02:56 -!- barefoot is now known as magic_1 02:57 < mithridates> Bushmills: how can I route 4.2.2.4 through vpn for my clients dns requests? 03:01 < endre> push down the route for 4.2.2.4 03:03 < Bushmills> !howto 03:03 -!- barefoot [n=magic@41.121.115.46] has joined ##openvpn 03:03 < vpnHelper> Bushmills: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 03:03 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Nick collision from services.] 03:03 -!- barefoot is now known as magic_1 03:06 -!- master_o1_master [n=master_o@p57B53FD6.dip.t-dialin.net] has joined ##openvpn 03:08 -!- Sky[x] [n=mihaaaa@212.235.182.245] has quit [Connection timed out] 03:19 -!- master_of_master [i=master_o@p57B57C1A.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:38 -!- wedjat [n=wedjat@unaffiliated/wedjat] has joined ##openvpn 03:39 < wedjat> !route 03:39 < vpnHelper> wedjat: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 04:01 -!- SkyX [n=mihaaaa@88.200.89.29] has quit [Client Quit] 04:20 -!- mithridates1 [n=mithrida@76.76.15.203] has joined ##openvpn 04:21 < mithridates1> !ccd 04:21 < vpnHelper> mithridates1: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 04:21 -!- lt83850 [n=your@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 04:22 -!- mithridates [n=chatzill@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has quit [Read error: 110 (Connection timed out)] 04:26 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 110 (Connection timed out)] 04:43 -!- dazo_afk is now known as dazo 04:48 -!- mithridates1 [n=mithrida@76.76.15.203] has quit [Read error: 110 (Connection timed out)] 05:03 -!- Lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 05:04 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 05:09 -!- lt83850 [n=your@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 60 (Operation timed out)] 05:20 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has joined ##openvpn 05:25 -!- aland [n=aland@apple.rat.burntout.org] has left ##openvpn [] 05:30 -!- LittleJ [n=linuz@82.78.185.26] has quit ["changing servers"] 05:30 -!- LittleJ [n=linuz@82.78.185.26] has joined ##openvpn 05:47 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 06:07 -!- MJD [n=quassel@CPE0015ef4fc6af-CM001bd7cbfc8c.cpe.net.cable.rogers.com] has quit [Read error: 110 (Connection timed out)] 06:12 -!- havoc [n=havoc@saturn.chaillet.net] has joined ##openvpn 06:12 < havoc> morning 06:13 < cpm> morn'n 06:18 < krzee> moin 06:19 < Optic> good morning 06:26 < havoc> route-gateway dhcp and port-share seem nifty 06:53 -!- deever [n=deever@78.46.68.172] has left ##openvpn [] 06:54 < ecrist> good morning 06:54 < havoc> morning 07:31 -!- g0tcha [n=VaiO@41.252.40.105] has joined ##openvpn 07:32 -!- sigi [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 07:33 -!- MJD [n=quassel@mc-125-114.IPReg.McMaster.CA] has joined ##openvpn 07:33 < g0tcha> !howto 07:33 < vpnHelper> g0tcha: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 07:40 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Read error: 101 (Network is unreachable)] 07:41 < g0tcha> hey guys, ive installed openvpn server on my ubuntu and created the keys, then installed openvpn on winxp, copied over the files and edited the config.ovpn file.. when i try to run openvpn from that config file it gives me this msg: Error: private key password verification failed 07:42 < theDoc> Your password is wrong. :( 07:42 < g0tcha> theDoc, which password? thats whats confusing me 07:43 < reiffert> Guess you gave the private a password. 07:43 < Bushmills> private key password - that's what is called "passphrase" with ssh keys 07:43 < reiffert> MushBills! 07:43 < Bushmills> grin 07:43 < Bushmills> lard! 07:43 < Bushmills> :D 07:43 -!- Lt83850c is now known as lt83850c 07:43 < g0tcha> yeah, i did give it a priavet password, how do i make the client know the password? 07:43 < g0tcha> private* 07:43 < reiffert> g0tcha: the server. 07:44 < Bushmills> client 07:44 < reiffert> hrmn, however. 07:45 < reiffert> g0tcha: well, lets check the manpage 07:46 < reiffert> g0tcha: read --askpass 07:47 < Bushmills> train arriving at dest - gone agn 07:47 < reiffert> process with --auth-nocache 07:49 -!- kala [n=kala@83.151.191.90.dyn.estpak.ee] has quit [Read error: 104 (Connection reset by peer)] 07:49 < g0tcha> so it has to be run through command prompt if i need to use the password and not the gui? 07:53 -!- kala [n=kala@83.151.191.90.dyn.estpak.ee] has joined ##openvpn 07:54 < reiffert> gui? 07:57 < g0tcha> yeah, im running the client on a windows xp machine 07:57 < g0tcha> openvpn has a gui 07:57 < reiffert> ah, well it pops up a password window for me. 07:57 < g0tcha> i managed to start it fine from the command prompt with what you suggested, it asked for the password and connected fine 07:57 < reiffert> running 2.1.1 with the gui that comes with the installer. 07:57 < g0tcha> it does? hmm wierd.. it doesnt 07:58 < g0tcha> let me check what version im running 07:58 < reiffert> 2.1.1? 07:58 < g0tcha> hmm says OpenVPN GUI 1.0.3 :/ 08:00 < reiffert> yeah, thats correct. 08:00 < g0tcha> and openvpn is 2.1 it says 08:00 < reiffert> works like a charme for me. 08:00 < g0tcha> but it doesnt ask for the password when i right click the config.ovpn file and start it from there.. 08:01 < g0tcha> a command prompt pops up giving me the error msgs and to press any key to continue and thats it 08:01 < reiffert> what happens when you start it with the gui? 08:01 < reiffert> choosing "connect" 08:06 < reiffert> what happens for me, when using "right mouse click" on the .ovpn file choosing "Open with openvpn": dosbox comes up asking me for the private key password. 08:09 < g0tcha> it gives me the same error msg in the openvpn gui window instead of a command prompt.. ill use pastebin to paste the whole msg from the log file 08:10 -!- tomjones40000 [n=magic@41.121.115.46] has joined ##openvpn 08:10 < g0tcha> http://pastebin.com/m3e7c2620 08:10 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Nick collision from services.] 08:10 -!- tomjones40000 is now known as magic_1 08:11 < reiffert> thats what I get: 08:11 < reiffert> http://pastebin.com/m4b62a43e 08:12 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has joined ##openvpn 08:12 < reiffert> does home.key work at all (with --ask-pass)? 08:12 < reiffert> does home.key got a filesize of 0 bytes? 08:12 < g0tcha> no, 1kb 08:13 < reiffert> open it with wordpad, does it start with: 08:13 < reiffert> http://pastebin.com/me2b3309 08:14 < reiffert> did you transfer the file using a ftp client? 08:14 < reiffert> breaking line breaks/carraige returns? 08:15 < g0tcha> good call.. its some gebbrish stuff inside 08:15 < g0tcha> might got screwed while transfering it 08:15 < g0tcha> yeah, it was through ftp 08:15 < reiffert> gebbrish? 08:16 < reiffert> check on the server side/PKI-server. does it look ok there? 08:16 < dazo> mattock: why opening up a new openvpn irc channel? 08:16 < reiffert> Note: There is winscp if your remote site supports ssh. 08:16 < reiffert> dazo: Hi. btw there is #openvpn2009 08:17 < dazo> reiffert: oh man ... that's so oldish ... already :-P 08:17 < g0tcha> yeah reiffert, i just ssh'd and the home,key looks fine on the server side 08:17 < g0tcha> home.key 08:18 -!- _LittleJ [n=linuz@82.78.185.26] has joined ##openvpn 08:18 -!- LittleJ [n=linuz@82.78.185.26] has quit [Read error: 104 (Connection reset by peer)] 08:18 < reiffert> dazo: blame the openvpn developers! 08:19 < dazo> :) 08:19 -!- _LittleJ is now known as LittleJ 08:19 < reiffert> g0tcha: great news, welcome! 08:19 < reiffert> g0tcha: btw, there is winscp on windows. 08:20 < reiffert> http://winscp.net/eng/index.php 08:20 < vpnHelper> Title: WinSCP :: Free SFTP and FTP client for Windows (at winscp.net) 08:20 < reiffert> (GUI Style) 08:20 < reiffert> Faster than that 10mbit putty pscp stuff. 08:20 < g0tcha> yeah, thats what i use with windows 08:20 < reiffert> Didnt find any limits on speed yet. 08:20 < g0tcha> i like it 08:20 < reiffert> g0tcha: but why did you choose ftp then? 08:21 < g0tcha> it was set by default and didnt bother changing it 08:22 < reiffert> ?!? winscp fails using sftp? 08:22 < reiffert> it works great at my place... 08:22 < g0tcha> didnt say it fails.. it works fine.. only with that home.key it got corrupted while transfering, never happened to me before 08:23 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: sno, noooon, openvpn2009, Rienzilla, sdh, Bushmills 08:23 -!- Rienzilha [i=rien@sinas.rename-it.nl] has joined ##openvpn 08:23 -!- sno_ [n=sno@static.153.209.46.78.clients.your-server.de] has joined ##openvpn 08:23 -!- Netsplit over, joins: openvpn2009 08:23 -!- Netsplit over, joins: noooon 08:23 -!- sdh [n=steve@188.40.36.167] has joined ##openvpn 08:23 -!- Bushmills [n=nnnBushm@verhau.de] has joined ##openvpn 08:24 -!- MJD [n=quassel@mc-125-114.IPReg.McMaster.CA] has quit [Read error: 110 (Connection timed out)] 08:25 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has quit [Read error: 104 (Connection reset by peer)] 08:31 < g0tcha> aah it worked.. didnt ask for the password, it times out heheh but atleast its not showing the same error.. 08:31 < g0tcha> ill do some googling first 08:31 < g0tcha> thanks for the help reiffert 08:32 < reiffert> welcome 08:33 -!- Irssi: ##openvpn: Total of 94 nicks [0 ops, 0 halfops, 0 voices, 94 normal] 08:37 -!- rajin [n=_@port-10272.pppoe.wtnet.de] has joined ##openvpn 08:43 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has joined ##openvpn 08:56 < hobbsc> when i connect to my openvpn box, i receive the routes it's pushing out, but can't access any of the resources on those routes. the openvpn box can see those networks and those vice-versa. this wasn't an issue until i restarted the openvpn box. could a routing statement be messed up? 08:56 < ecrist> firewall? 08:56 < hobbsc> off 08:56 < hobbsc> i'm connected, i have routes, etc. 08:57 < hobbsc> from those other networks, i can ping the servers' tun interface, but i can't ping any clients. likewise for clientside. i can ping the server that's handing out vpn, but nothing beyond it 08:57 < hobbsc> the router that has the other networks attached to it has a route for the vpn server as well 08:59 < ecrist> hobbsc: you're saying you have no firewall on your vpn server? 08:59 < hobbsc> right 08:59 < hobbsc> none 08:59 < ecrist> ip_forward set to on? 08:59 < ecrist> in the OS kernel 08:59 < hobbsc> not sure 08:59 < ecrist> what OS? 08:59 < hobbsc> wouldn't that be ipv4? 08:59 < hobbsc> opensuse 08:59 < ecrist> sysctl -a | grep ip_forward 09:00 < hobbsc> this vpn worked before i restarted the openvpn server 09:00 < ecrist> so? 09:00 < hobbsc> net.ipv4.ip_forward = 0 09:00 < hobbsc> so i don't know what changed 09:00 < ecrist> you need to set that to 1 09:00 < hobbsc> it's turned off 09:00 < ecrist> turn it on 09:00 < hobbsc> sure thing 09:00 < ecrist> I don't know where you put that in linux, but in freebsd it's in /boot/loader.conf 09:01 < ecrist> man sysctl and find out where to put sysctl overrides for reboot 09:01 < hobbsc> sysctl -w net.ipv4.ip_forward=1 09:01 < hobbsc> er 09:01 < hobbsc> yeah 09:01 < hobbsc> it's in /etc/sysctl.conf 09:01 < hobbsc> alright, it's on. let me try again 09:02 < hobbsc> i can't imagine why a restart would cause everything to crap out 09:02 < hobbsc> that fixed it, though 09:02 < hobbsc> thank you 09:02 < hobbsc> i may not have added that to sysctl.conf 09:02 < ecrist> 'everything' didn't crap out, your sysctl setting wasn't set in /etc/sysctl.conf 09:02 < hobbsc> i'm aware, thanks 09:02 < ecrist> as such, the blame is completely on you. ;) 09:02 < hobbsc> i appreciate the assistance 09:03 < hobbsc> 90% of the time it's my fault anyway heheh 09:03 < hobbsc> thanks again 09:07 -!- Gilos [n=Gilos@kccsfw01.sec.sprint.net] has quit [Remote closed the connection] 09:12 -!- Sky[x] [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 09:15 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 09:28 < cybertron> hi, the bridge on my vppn server, which ip should it have? so any ip of my bridge range? 09:29 * |Mike| lols 09:29 < cybertron> o.O 09:29 < cybertron> my problem is that i cant reach my vpn net 09:29 < |Mike|> !howto 09:29 < vpnHelper> |Mike|: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 09:30 < cybertron> i read it often, so something i have to overread ;) 09:47 < reiffert> cybertron: the bridge got an ip of your lan range. 09:47 < cybertron> reiffert: the br0 oder br0:0 ? 09:47 < reiffert> cybertron: the bridge contains various interfaces. the local network interface and the one from openvpn (tap). 09:47 < reiffert> cybertron: there is no br0:0 in the howto. 09:48 < cybertron> hm no 09:48 < reiffert> ok, get rid of it then. 09:48 < reiffert> on top br0:0 alias interfaces are depreceated on linux. 09:48 < reiffert> x:0 is old style. 09:48 < cybertron> ok its is running on my wrt router 09:49 < reiffert> so? 09:50 < cybertron> reiffert: http://nopaste.info/f8661a4b60.html 09:50 < reiffert> just adding the tap if to your previous existing bridge will be enough. 09:50 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [Read error: 104 (Connection reset by peer)] 09:50 -!- m1dnight [n=rfranzen@189.27.187.13.dynamic.adsl.gvt.net.br] has joined ##openvpn 09:50 < reiffert> which is brctl addif br0 tap0 09:51 < cybertron> my problem is I cant test vpn inside my lan? so i can connect to my openvopn with my internal ip but if i use the vpnip i can not ping 09:51 < reiffert> sentence does not parse. 09:51 < cybertron> lokalip: 192.168.1.23 vpnip 192.168.1.120 <--no ping to each other 09:51 < cybertron> -k+c 09:52 < reiffert> paste brctl show 09:52 < cybertron> http://nopaste.info/48c948185a.html 09:52 < reiffert> brctl show 09:52 < cybertron> erm sorry mom 09:52 < cybertron> http://nopaste.info/9ccc96794c.html 09:53 < reiffert> client local lan adapter ip is? 09:53 < cybertron> 192.1681.1.23 and .120 from the client gui 09:53 < reiffert> ping 1.100 works? 09:54 < cybertron> yes from 1.23 09:54 < cybertron> but ping 1.23 to 1.120 no 09:54 < reiffert> ping 1.23 -> 1.100 works? 09:54 < cybertron> yes 09:54 < reiffert> does your client live in the server lan? 09:55 < cybertron> yes 09:55 < cybertron> mom 09:55 < reiffert> did you specify 09:55 < reiffert> !local 09:55 < vpnHelper> reiffert: "local" is a flag for --redirect-gateway, Add the local flag if both OpenVPN machines are directly connected via a common subnet, such as with wireless. 09:56 < reiffert> well, gotta go. be sure to test when your client is *not* in the server lan at the same time. 09:56 < reiffert> server side setup looks ok so far. 09:56 < reiffert> bbl 10:01 -!- MattJD [n=quassel@mc-193-93.IPReg.mcmaster.ca] has joined ##openvpn 10:03 -!- erpel [n=erpel@f050095173.adsl.alicedsl.de] has joined ##openvpn 10:05 -!- g0tcha [n=VaiO@41.252.40.105] has quit [] 10:11 -!- MattJD [n=quassel@mc-193-93.IPReg.mcmaster.ca] has quit ["http://quassel-irc.org - Chat comfortably. Anywhere."] 10:15 -!- tomjones40000 [n=magic@41.121.115.46] has joined ##openvpn 10:15 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Nick collision from services.] 10:15 -!- tomjones40000 is now known as magic_1 10:17 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 110 (Connection timed out)] 10:21 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has joined ##openvpn 10:43 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 10:47 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 10:47 < krzee> [11:51] lokalip: 192.168.1.23 vpnip 192.168.1.120 <--no ping to each other 10:47 < krzee> !samesubnet 10:47 < vpnHelper> krzee: "samesubnet" is clients can not connect to a server pushing its lan if on the same subnet. you can only reach your subnet on layer2 or through your gateway, when you create a route for it you will try to reach your gateway over the vpn which dies because you cant reach your gateway 10:48 -!- Kaspx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 104 (Connection reset by peer)] 10:49 < krzee> oh you're bridging 10:49 < krzee> nm 10:51 < cybertron> yes and now i got this problem krzee 10:51 < cybertron> http://nopaste.info/1845699838.html 10:52 < cybertron> i looked at the given link but thats not the problem 10:55 < cybertron> http://michaelellerbeck.com/2008/10/27/openvpn-client-hangs-on-dhcp-renewal-gets-apipa-address-instead/ i found this solution but cant belief that o.O 10:55 < vpnHelper> Title: OpenVPN Client hangs on DHCP renewal, recieves APIPA address instead. Resolved « Michael Ellerbeck (at michaelellerbeck.com) 10:57 < cybertron> so i got an ip for my client 10:58 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 11:01 -!- dazo is now known as dazo_afk 11:02 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 11:10 -!- hyper_ch [n=hyper@177-117.78-83.cust.bluewin.ch] has quit [Remote closed the connection] 11:25 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 11:28 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has joined ##openvpn 12:11 -!- bytesaber_ [n=bytesabe@208-98-188-95.directcom.com] has joined ##openvpn 12:15 -!- erpel_ [n=erpel@g224213211.adsl.alicedsl.de] has joined ##openvpn 12:17 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has quit [Remote closed the connection] 12:18 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 12:24 -!- wedjat [n=wedjat@unaffiliated/wedjat] has left ##openvpn [] 12:24 -!- erpel [n=erpel@f050095173.adsl.alicedsl.de] has quit [Read error: 113 (No route to host)] 12:29 -!- polaru [n=polaru@93.113.192.70] has quit [Read error: 104 (Connection reset by peer)] 12:30 -!- Grapsus [n=grapsus@che21-2-82-245-89-120.fbx.proxad.net] has joined ##openvpn 12:51 -!- m1dnight [n=rfranzen@189.27.187.13.dynamic.adsl.gvt.net.br] has quit ["Saindo"] 12:53 -!- erpel_ [n=erpel@g224213211.adsl.alicedsl.de] has quit ["This computer has gone to sleep"] 12:58 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit ["Leaving."] 13:00 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [Read error: 104 (Connection reset by peer)] 13:18 -!- Gilos [n=Gilos@kccsfw01.sec.sprint.net] has joined ##openvpn 13:48 -!- pm2 [i=47c2fcd3@gateway/web/freenode/x-guojjfhwnrndbhgf] has joined ##openvpn 13:52 < pm2> Hi - I have an OpenVPN server allowing users to connect to an office LAN. Its a routed, tcp tunnel, that uses 192.168.8.0/24 addresses for clients. The internal LAN uses 192.168.1.0/24. If a user's home LAN is also using 192.168.1.0/24 addresses, will that cause some problem? 13:58 -!- rajin [n=_@port-10272.pppoe.wtnet.de] has quit [" I love my HydraIRC -> http://www.hydrairc.com <-"] 14:04 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 14:09 -!- phy [n=phy@l.monkey.org] has left ##openvpn [] 14:09 < |Mike|> pm2: yeah that will clash.. 14:10 < pm2> |Mike|: any good way around that other than changing our internal LAN IP scheme? 14:10 < ecrist> nope 14:10 < pm2> great... 14:10 < |Mike|> I would hike to 172.x :) 14:10 < pm2> OK, I guess I'll have to do that, thanks 14:11 < ecrist> good rule of thumb is to use 10/8 for corp networks 14:11 < |Mike|> most standard routers use those 192.168.1.0/24 ranges imho 14:11 < ecrist> 172.x for vpn 14:11 < ecrist> leave 192 alone 14:11 < |Mike|> Yep 14:11 < ecrist> or use IPv6 on it all 14:11 < pm2> This was all setup by my predecessor... Alright, I'll try to convince people that changing the IP scheme is a good idea 14:12 < ecrist> s/a good idea/required/ 14:12 < |Mike|> Make a plan and stick to that! 14:12 < pm2> allright, thanks for the help all 14:12 -!- pm2 [i=47c2fcd3@gateway/web/freenode/x-guojjfhwnrndbhgf] has quit ["Page closed"] 14:13 < |Mike|> wow, that was easy. 14:14 < ecrist> we weren't even called any names that time 14:24 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has quit [] 14:26 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 14:26 < mithridates> hey guys 14:26 < mithridates> I need a web-based software to monitor clients bandwidth and vpn account 14:27 < mithridates> is there any software for this purpose? 14:32 < ecrist> yes and no 14:32 < ecrist> all the software you need is available and free 14:32 < ecrist> you need to piece it all together yourself. 14:33 < ecrist> if I were you, I would assign static IPs and use SNMP with ipfw to monitor bandwidth utilization 14:34 < ecrist> or, give each user their own device and do that 14:34 < ecrist> I'd do with with snmp, myself. 14:34 < mithridates> umm 14:34 < mithridates> I will have more than 150 clients 14:35 < mithridates> which way is the best? 14:35 < ecrist> snmp + firewall monitoring 14:35 < ecrist> ipfw supports log 14:35 < mithridates> would tell me the name of services which I need? 14:35 < mithridates> because I should search for each of them 14:36 < mithridates> and it takes a long time 14:36 < ecrist> cacti 14:36 < ecrist> snmp 14:36 < ecrist> ipfw on freebsd 14:36 < ecrist> I can't do the work for you, though 14:36 < mithridates> I have centos 14:36 < mithridates> ah ok 14:36 < ecrist> don't know how to do it on centos 14:37 < ecrist> http://www.linux.com/archive/articles/50649 14:37 < vpnHelper> Title: Linux.com :: Bandwidth monitoring with iptables (at www.linux.com) 14:37 < mithridates> so first I should assign static ip to my clients 14:37 < mithridates> then I should monitor them by snmp or a web-based monitoring tools 14:37 < mithridates> ok , thank you man 14:38 < mithridates> what about billing system? 14:38 < mithridates> do u have any idea about billing system? 14:40 < ecrist> mithridates: I'm not here to build your business. 14:40 < ecrist> that's what you make money on. 14:40 < ecrist> :) 14:40 < mithridates> no I'm asking only to find a software 14:40 < ecrist> nope 14:40 < mithridates> I didn't ask you to configure my server 14:40 < ecrist> I'd try #billing_software 14:41 < mithridates> ah ok that's fine :D 14:41 < mithridates> thank you 14:41 < mithridates> :D 15:18 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 15:21 -!- OpenVPN [n=fn-javac@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 15:22 -!- OpenVPN [n=fn-javac@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Client Quit] 15:22 -!- OpenVPN_Guest [n=fn-javac@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 15:26 -!- OpenVPN_Guest [n=fn-javac@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Client Quit] 15:58 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has quit ["ChatZilla 0.9.86 [Firefox 3.0.16/2009120208]"] 15:59 < reiffert> mithridates: I can sell you billing software... 16:02 < ecrist> OpenVPN is a registered nick name 16:02 < ecrist> tsk tsk 16:03 < reiffert> ecrist: and nother two devs. 16:03 < ecrist> two new devs? 16:03 < ecrist> reiffert: do you pay attention to the mailing list? 16:04 < |Mike|> Are you guys on LinkedIn btw? :) 16:04 < reiffert> -devel from time to time 16:04 -!- Irssi: ##openvpn: Total of 90 nicks [0 ops, 0 halfops, 0 voices, 90 normal] 16:04 < ecrist> the mattock guy created another channel, #openvpncommunity 16:04 < reiffert> ecrist: just kas and openvpn2009 and those OpenVPN and OpenVPN_Guest who join/parted. 16:05 < ecrist> looks like they're testing a java irc client 16:05 < reiffert> ecrist: someone should join that channel telling us whats going on there. 16:05 < mithridates> hi reiffert 16:05 < ecrist> I've been in that chan since it was created 16:05 < mithridates> plz come to pm 16:06 < reiffert> mithridates: please share your thoughts with all others, maybe they have ideas/improvement. 16:06 < Kas> I was just checking out a Java Client. No harm meant :-) 16:06 < ecrist> no harm at all, Kas. :) 16:06 < mithridates> ok 16:06 < reiffert> wacky, they really follow that channel! 16:06 < reiffert> :) 16:07 < mithridates> I'm gonna use cacti for monitoring the bandwidth but I'm not sure how can I manage users 16:07 < mithridates> aah 16:07 < mithridates> I got it 16:07 < ecrist> Kas: OpenVPN nick name is reserved for an upcoming channel bot 16:07 < mithridates> there is something to manage certificates of users 16:07 < mithridates> I can make them expired 16:07 < mithridates> am I right? 16:07 < |Mike|> yep 16:07 < Kas> No worries, I didn't mean to enter that name in the first place ;-) 16:08 < ecrist> mithridates: CRL will do that for you 16:08 < reiffert> mithridates: the logfile comes up with bytes transferred and so on. Keeping a history is a one line disconnect shell script. 16:08 < mithridates> !CRL 16:08 < vpnHelper> mithridates: "CRL" is (#1) --crl-verify A CRL (certificate revocation list) is used when a particular key is compromised but when the overall PKI is still intact. The only time when it would be necessary to rebuild the entire PKI from scratch would be if the root certificate key itself was compromised., or (#2) you can make use of CRL by using the revoke-full script in easy-rsa (packaged with 16:08 < vpnHelper> mithridates: openvpn) that will create the CRL file for you. ssl-admin will also build a crl for you 16:09 < reiffert> btw, I really got impressed recently using Hamachi. I'm using it on 8 machines now. It's so much fun. 16:11 < mithridates> ok guys 16:11 < ecrist> I'm leery of a VPN that I don't control 100% 16:11 < ecrist> IMHO, it defeats the concept of VPN 16:11 < mithridates> I'm gonna do more research about billing and I will share what I get 16:12 < ecrist> I don't know what you're looking for as far as billing goes. 16:13 < ecrist> if you going to bill based on 95th percentile, cacti will tell you the value. all you need to do is send the invoice... 16:13 < mithridates> ecrist: just I want a management system for openvpn 16:13 < mithridates> I don't even care about invoices right now 16:13 < ecrist> have you seen access server? 16:14 < mithridates> just I want to manage the bandwidth of each user , add, remove , suspend and some jobs like these 16:14 < mithridates> no 16:15 < ecrist> mithridates: have you seen openvpn status log? 16:15 < ecrist> Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since 16:15 < mithridates> oh yes 16:16 < mithridates> I need to show it to my clients also 16:16 < reiffert> mithridates: check out the openvpn web gui 16:16 < mithridates> ok tnx 16:18 -!- joomie [n=joomie@adsl-67-127-55-75.dsl.pltn13.pacbell.net] has joined ##openvpn 16:20 -!- joomie [n=joomie@adsl-67-127-55-75.dsl.pltn13.pacbell.net] has quit [Client Quit] 17:31 < mithridates> !epoll 17:31 < vpnHelper> mithridates: Error: "epoll" is not a valid command. 17:31 < mithridates> !factoids search epoll 17:31 < vpnHelper> mithridates: No keys matched that query. 17:40 < reiffert> !factoids search --values epoll 17:40 < vpnHelper> reiffert: No keys matched that query. 17:41 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has quit [Read error: 104 (Connection reset by peer)] 17:43 -!- kala_ [n=kala@83.151.191.90.dyn.estpak.ee] has joined ##openvpn 17:45 -!- Sky[x] [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has quit [] 17:46 -!- kala [n=kala@83.151.191.90.dyn.estpak.ee] has quit [Read error: 104 (Connection reset by peer)] 17:52 < mithridates> reiffert: :D 17:52 < mithridates> is there anybody have installed openvpn-web-gui on linux like centos? 17:52 < mithridates> I couldn't do that :( it needs smarty, I installed smarty but the page still shows blank 17:54 -!- Sky[x] [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 18:24 < reiffert> mithridates: I remember that I was installing smarty manually and had some mess around with various permission problems etc. 18:41 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has quit ["Leaving"] 18:52 < reiffert> the major problem is: reduce the security of your PKI down to a http password. 18:53 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Read error: 110 (Connection timed out)] 19:08 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: noooon, s0undt3ch, cybertron, krzie, dmarkey, oc80z, pekster, LittleJ, kc8pxy, dazo_afk, (+63 more, use /NETSPLIT to show all of them) 19:10 -!- romero [n=user@mail.nfq.ktc.lt] has joined ##openvpn 19:11 -!- APTX| [n=APTX@ks32603.kimsufi.com] has joined ##openvpn 19:16 -!- SkyX [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 19:16 -!- Sky[x] [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 19:16 -!- Bushmills [n=nnnBushm@verhau.de] has joined ##openvpn 19:16 -!- krzie [n=krzee@unaffiliated/krzee] has joined ##openvpn 19:16 -!- MrJK [n=jezu@194.199.166.96] has joined ##openvpn 19:16 -!- julius [n=julius@217.20.127.15] has joined ##openvpn 19:16 -!- balboah [n=johnny@joonix.se] has joined ##openvpn 19:16 -!- endre [i=me2@urbnet.hu] has joined ##openvpn 19:16 -!- Sky[x] [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has quit [SendQ exceeded] 19:16 -!- MrJK [n=jezu@194.199.166.96] has quit [Killed by sagan.freenode.net (Nick collision)] 19:16 -!- julius [n=julius@217.20.127.15] has quit [Connection reset by peer] 19:16 -!- krzie [n=krzee@unaffiliated/krzee] has quit [Read error: 104 (Connection reset by peer)] 19:17 -!- balboah [n=johnny@joonix.se] has quit [Killed by sagan.freenode.net (Nick collision)] 19:17 -!- MrJK [n=jezu@194.199.166.96] has joined ##openvpn 19:17 -!- balboah [n=johnny@joonix.se] has joined ##openvpn 19:17 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 19:17 -!- Gilos [n=Gilos@kccsfw01.sec.sprint.net] has joined ##openvpn 19:17 -!- Grapsus [n=grapsus@che21-2-82-245-89-120.fbx.proxad.net] has joined ##openvpn 19:17 -!- bytesaber_ [n=bytesabe@208-98-188-95.directcom.com] has joined ##openvpn 19:17 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 19:17 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 19:17 -!- sdh [n=steve@188.40.36.167] has joined ##openvpn 19:17 -!- noooon [n=var@vps-1005590-1468.united-hoster.de] has joined ##openvpn 19:17 -!- LittleJ [n=linuz@82.78.185.26] has joined ##openvpn 19:17 -!- sigi [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 19:17 -!- lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 19:17 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 19:17 -!- Zordrak [n=jaz@unaffiliated/zordrak] has joined ##openvpn 19:17 -!- s0undt3ch [n=s0undt3c@80.69.34.147] has joined ##openvpn 19:17 -!- krphop [n=krphop@watch.out.the.feds.are.rightbehind.us] has joined ##openvpn 19:17 -!- teddymills [n=teddy@208.92.235.227] has joined ##openvpn 19:17 -!- dmarkey [n=dmarkey@dmarkey.xen.prgmr.com] has joined ##openvpn 19:17 -!- ^scott^ [n=scott@stthom.org] has joined ##openvpn 19:17 -!- Typone [n=nnnnitsm@195.197.184.87] has joined ##openvpn 19:17 -!- zykes- [i=zykes@zykes.themariachi.info] has joined ##openvpn 19:17 -!- |Mike| [i=mike@2001:1af8:2:444:0:0:0:2] has joined ##openvpn 19:17 -!- ScriptFanix [i=vincent@Tuluk.riquer.fr] has joined ##openvpn 19:17 -!- zamba [i=marius@flage.org] has joined ##openvpn 19:17 -!- agagag [n=anton@158.37.56.5] has joined ##openvpn 19:17 -!- Intensity [i=[lRD75M9@unaffiliated/intensity] has joined ##openvpn 19:17 -!- Optic [n=Optic@miso.capybara.org] has joined ##openvpn 19:17 -!- alan` [n=alan@rrcs-67-52-47-64.west.biz.rr.com] has joined ##openvpn 19:17 -!- craver_ [n=craver@208.53.57.220] has joined ##openvpn 19:17 -!- pa [n=pa@unaffiliated/pa] has joined ##openvpn 19:17 -!- grub_booter [n=charlie@d54C519D5.access.telenet.be] has joined ##openvpn 19:17 -!- bvierra [n=bvierra@cpe-75-83-6-55.socal.res.rr.com] has joined ##openvpn 19:17 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 19:17 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has joined ##openvpn 19:17 -!- plundra [i=404@article.se] has joined ##openvpn 19:17 -!- jmm [n=jmm@LPuteaux-156-14-28-187.w82-127.abo.wanadoo.fr] has joined ##openvpn 19:17 -!- crazygir [n=jason@unaffiliated/crazygir] has joined ##openvpn 19:17 -!- freaky[t] [i=alpha@member.team-box.net] has joined ##openvpn 19:17 -!- optiz0r [n=optiz0r@miranda.sihnon.net] has joined ##openvpn 19:17 -!- LowKey [i=rhel@unaffiliated/lowkey] has joined ##openvpn 19:17 -!- kc8pxy [n=gecko@75-145-57-201-utah.hfc.comcastbusiness.net] has joined ##openvpn 19:17 -!- cybertron [n=cybertro@84.200.248.176] has joined ##openvpn 19:17 -!- ewook [n=ewook@thales.fluffis.se] has joined ##openvpn 19:17 -!- phusion__ [i=phusion@88.80.16.38] has joined ##openvpn 19:17 -!- redfox [n=redfox2@91.121.78.62] has joined ##openvpn 19:17 -!- Rzewus [n=Rzewus@153.19.140.234] has joined ##openvpn 19:17 -!- int [n=quassel@wikia/int] has joined ##openvpn 19:17 -!- dmz [n=dmz@64.203.207.101.dyn-cm-pool-54.hargray.net] has joined ##openvpn 19:17 -!- Cap_J_L_Picard [n=ewanm89@unaffiliated/ewanm89] has joined ##openvpn 19:17 -!- dazo_afk [n=dazo@nat/redhat/x-clfzuciztghjjygs] has joined ##openvpn 19:17 -!- reiffert [n=thomas@mail.webersheim.de] has joined ##openvpn 19:17 -!- oc80z [n=oc80z@74.63.222.147] has joined ##openvpn 19:17 -!- eliasp [n=quassel@HSI-KBW-095-208-170-144.hsi5.kabel-badenwuerttemberg.de] has joined ##openvpn 19:17 -!- disco- [i=disco@andromeda.h4xed.com] has joined ##openvpn 19:17 -!- zib [i=zib@slick.keff.org] has joined ##openvpn 19:17 -!- drue [n=drue@stiff.therub.org] has joined ##openvpn 19:17 -!- tarbo2_ [n=me@unaffiliated/tarbo] has joined ##openvpn 19:17 -!- Lyndon [n=late@62.142.98.18] has joined ##openvpn 19:17 -!- CaBa [n=caba@188.40.166.98] has joined ##openvpn 19:17 -!- hobbsc [n=zalgo@opensuse/member/hobbsc] has joined ##openvpn 19:17 -!- pekster [n=pekster@c-76-113-143-76.hsd1.mn.comcast.net] has joined ##openvpn 19:17 -!- stein0 [n=stein@mail.vgnett.no] has joined ##openvpn 19:17 -!- tompaw [n=tompaw@slave20.tesserakt.eu] has joined ##openvpn 19:17 -!- Diddi [i=diddi@zenit.bsnet.se] has joined ##openvpn 19:17 -!- _dren [i=dren@dereferenced.nullpointer.net] has joined ##openvpn 19:17 -!- krzie_ [n=krzee@butters.secure-computing.net] has joined ##openvpn 19:18 -!- julius [n=julius@217.20.127.15] has joined ##openvpn 19:19 -!- hyper_ch [n=hyper@84.226.234.60] has joined ##openvpn 19:31 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 19:45 -!- SkyX [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has quit [Client Quit] 20:12 -!- Dougy [n=douglas@64.18.144.2] has joined ##openvpn 20:12 < Dougy> hi kids 20:13 < mithridates> hi godfather 20:13 < Dougy> how are you 20:13 < mithridates> I'm not fine 20:13 < mithridates> I should implement a monitoring system for my openvpn server 20:14 < Dougy> You should buy a VPS from me and install nagios 20:14 < Dougy> ( 20:14 < Dougy> (: 20:14 < mithridates> nagios? 20:14 < Dougy> or whatever it is that you uuse 20:14 < mithridates> I have a dedicated server 20:14 < Dougy> never heard of nagios? 20:14 < mithridates> and I installed everythings 20:14 < Dougy> ahh 20:14 < Dougy> where from? 20:15 < mithridates> I'm not famillar with monitoring tools 20:15 < mithridates> ca 20:15 < Dougy> !google nagios 20:15 < vpnHelper> Dougy: Nagios - The Industry Standard in IT Infrastructure Monitoring: ; Nagios - Download: ; Nagios - Wikipedia, the free encyclopedia: 20:15 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 20:15 < mithridates> do u think it's possible to monitoring users' bandwidth ? 20:16 < mithridates> I need something like billing system 20:16 < Dougy> for VPN? 20:16 < Dougy> theDoc might be someone worth asking for that 20:16 < mithridates> when they use their bandwidth I need to make their certificates expired 20:16 < Dougy> i know he's into htat 20:16 < Dougy> that 20:16 < mithridates> I think I asked him 20:17 < mithridates> I donno why all IRC users are angry at me 20:17 < mithridates> they wanna kill me 20:18 < mithridates> theDoc: are u there man? 20:19 < mithridates> they answer my first question 20:19 < mithridates> then they kill me if I ask the second question 20:21 < Dougy> lol 20:22 -!- corretico__ [n=laguilar@201.201.46.106] has joined ##openvpn 20:23 < Dougy> mithridates: what provider is server from 20:24 < theDoc> Yeah, 'sup? 20:24 < theDoc> Sorry, was working on my stuff. 20:25 < Dougy> yeah yeah 20:25 < Dougy> thats what they all say 20:25 * Dougy punches theDoc 20:25 < theDoc> Hey, I had to wiggle my junk 20:26 < theDoc> why are you guys running vpn companies when you guys don't know how to chart this stuff :P 20:26 < mithridates> oh sorry guys I wasn't 20:26 < theDoc> I'm just innately curious as to why people do it 20:26 < theDoc> lol 20:27 < theDoc> mithridates> So what are you doing, I'll tell you how it's done on my end at least. 20:27 < theDoc> Come to think of it, I actually have it working right, just that I need to fix the website. 20:27 < theDoc> Stupid graphic thingy. 20:28 < mithridates> I'm talking for some stuff to monitoring this stupid users' bandwidth 20:28 < theDoc> mithridates> AAA look at radius 20:28 < mithridates> radius? 20:28 < theDoc> yep, remote authentication dial in user service 20:29 < theDoc> radius with a sql backend for AAA 20:29 < mithridates> ok but how can I check my clients' bandwidth? and how can I suspend them if they use more than limitation of bandwidth 20:29 < mithridates> ? 20:30 < theDoc> mithridates> I've already told you. Look at radius and write some scripts to suspend them based on your data in the radius db 20:30 < mithridates> ah ok 20:30 < mithridates> thanks man 20:30 < mithridates> :D 20:31 < mithridates> I ask a lot instead of reading documents 20:31 < mithridates> sorry 20:31 < theDoc> it's not that really but i figured that you should be clear of what you want to do before embarking on anything. 20:33 < theDoc> now, if you'll excuse me, i need to get back to a meeting 20:33 < mithridates> :) thank you theDoc 20:33 < mithridates> you helped me 20:33 < mithridates> have a good time 20:33 < theDoc> i wish, i wish. :P more vpn customers and i would be 20:35 < Dougy> mithridates: i dont rtfm 20:35 < Dougy> i just harass ecrist and krzie_ 20:35 < ecrist> naw, use ldap 20:36 < Dougy> see what im talking about 20:36 < Dougy> LOL 20:36 < Dougy> hey ecrist how are you 20:37 < theDoc> ecrist> ew, ldap? 20:37 < theDoc> That's annoying as fuck to use :P 20:37 < ecrist> theDoc: only if you don't know what you're doing 20:37 < Dougy> burn 20:38 < theDoc> ecrist> It's true, I don't know ldap. 20:38 * ecrist knows ldap 20:39 * Dougy is ignored 20:39 < ecrist> really, though, you could use anything as the authentication back end 20:40 < ecrist> Dougy: I'm fine. How're you? 20:40 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 20:40 < Dougy> I am well 20:40 < Dougy> how was your new years / xmas 20:40 < ecrist> meh 20:40 < Dougy> me too 20:42 < theDoc> ecrist> is there a reason to prefer ldap over radius? 20:43 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Connection timed out] 20:43 < Dougy> hm ok 20:44 < Dougy> time to go find some other channels i know ops that will let me spam my product 20:44 < Dougy> :-D 20:46 < theDoc> Dougy> #freenode 20:46 < theDoc> rofl 20:46 < ecrist> theDoc: really you're comparing two different things 20:46 < ecrist> radius is a method, ldap is a storage backend 20:46 * Dougy hits theDoc with the idiot hammer 20:46 < ecrist> there just happen to be methods which can talk directly to ldap 20:47 -!- Dougy [n=douglas@64.18.144.2] has quit ["leaving"] 20:47 < ecrist> most common is pam_ldap, which uses the pam stack 20:47 -!- Douglas [n=douglas@64.18.144.2] has joined ##openvpn 20:47 < Douglas> 21:54 -!- Channel #freenode created Fri Feb 9 18:16:24 2001 20:47 < Douglas> 21:54 -!- Home page for #freenode: http://freenode.net/ 20:47 < vpnHelper> Title: About the Network (at freenode.net) 20:47 < Douglas> 21:54 -!- Irssi: Join to #freenode was synced in 1 secs 20:47 < Douglas> 21:54 < Dougy> www.edgewire.sg 20:47 -!- Douglas is now known as Dougy 20:47 * Dougy gets akilled 20:47 < theDoc> That's not cool. 20:47 < Dougy> (: 20:47 < Dougy> theDoc: its ok 20:48 < theDoc> Not at all. 20:48 < Dougy> if your server gets attacked 20:48 < ecrist> akilled? 20:48 < Dougy> i have to pay the bandwidth bill 20:48 < Dougy> so chillax 20:48 < Dougy> lol 20:48 < theDoc> Dougy> That's annoying. I didn't ask you to spam my products. 20:48 < Dougy> Wahh 20:48 < theDoc> ecrist> Yeah. True. 20:49 < theDoc> Oh well. 20:50 < ecrist> Dougy: what's your deal? 20:50 < Dougy> who rang 20:50 < Dougy> oh 20:50 < Dougy> ecrist: i dunno 20:50 < Dougy> i think i'm going insane from cooping myself up inside so long 20:52 < ecrist> well, don't start spamming here... 20:52 < theDoc> lol 20:53 < theDoc> Such tough times. 20:53 < Dougy> ecrist: i know better 20:53 < Dougy> ofc 20:53 < ecrist> ofc? 20:53 < Dougy> of course 20:55 < theDoc> afk, skype meeting 20:55 < Dougy> fun 20:56 -!- corretico__ [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 20:56 < theDoc> Anything but fun, I'm about to be stationed in KL with no net connectivity 20:56 < theDoc> Don't remind me of it 20:56 < theDoc> :( 20:57 < Dougy> eew 20:57 < Dougy> pay me first 20:57 < ecrist> pay me first? 20:57 < ecrist> are you whoring again, dougy? 20:57 < Dougy> he understands 20:57 < Dougy> no sir 20:57 < Dougy> no no no 20:57 < Dougy> i assure you no 20:58 < theDoc> Dougy> Yeah, I will before I leave in the morning. 20:58 < theDoc> :P 20:58 < theDoc> After all, you were pretty rad last night 20:58 < Dougy> oh yes ;] 20:58 < Dougy> oh damnit ecrist you didnt see that 20:59 < theDoc> ecrist> You have no idea how flexible dougy is. 20:59 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 20:59 < Dougy> yo krzee 20:59 < Dougy> whats popn 20:59 < ecrist> theDoc: based on how sore my dog was the other day, I can only imagine. 20:59 < Dougy> :X 20:59 < krzee> just touched down in costa rica 20:59 < Dougy> i love you guys 20:59 < theDoc> Oh dear me. 21:00 -!- corretico__ [n=laguilar@201.201.46.106] has joined ##openvpn 21:00 < Dougy> i can tell you guys love me to 21:00 -!- corretico__ [n=laguilar@201.201.46.106] has quit [Client Quit] 21:00 < Dougy> its the love from behind kind of love 21:00 < theDoc> real rogues do it from behind. 21:01 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 21:06 < ecrist> dammit - forum is fubar 21:06 < ecrist> it appears someone did something nasty to the control panel 21:06 < ecrist> investigating 21:06 < Dougy> fubar where 21:06 < Dougy> i see nothing 21:08 < krzee> hrm, looks fine to me 21:09 < ecrist> click on 'Board Settings' 21:09 < krzee> hah im glad i can delete my own posts 21:09 < ecrist> some russians have been getting posts even though their accounts weren't active 21:10 < Dougy> woah 21:10 < Dougy> ecrist, security holes? 21:11 < ecrist> not sure, looking into it 21:11 < ecrist> krzee: why's that? 21:11 < krzee> i had responded to someones post in bragging rights asking what he wanted help with so i could move it to the right area 21:12 < krzee> not realizing, he posted in the right place and didnt need help 21:12 < krzee> lol 21:12 < Dougy> lol 21:12 < krzee> i just saw it and facepalmed 21:12 < Dougy> smooth moves, slick 21:12 < Dougy> i see more people coming to the forum slowly 21:12 < krzee> 1643 21:12 < krzee> i see you scripted up some cleaning ecrist 21:13 < krzee> 1643 total members 21:13 < Dougy> i bet you there are 5000 spambots 21:13 < Dougy> pending activation 21:13 < krzee> dude it was like 98% spambots before ecrist scripted something up to clean them out 21:13 < Dougy> Users Awaiting Email Confirmation 90 21:13 < Dougy> wtf 21:13 < Dougy> where the the 10k of them go 21:14 < theDoc> into my pocket :p 21:31 < krzee> To switch phones in the middle of an incoming call, just press * while you're talking, and your other phones will ring. Then, for example, you can pick up the call from your mobile phone (if you're about to head out), or from your desk. There are no passcodes or PINs to enter and, best of all, your caller won't even hear the switch. 21:31 < krzee> thats awesoe 21:31 < krzee> awesome 21:32 < ecrist> not sure what's up with the forum 21:33 * ecrist gives up and goes to bed 21:39 < Dougy> lol 21:41 < krzee> whoa 21:41 < krzee> goog voice does free outbound now too 21:41 < krzee> god i love the goog 21:41 < Dougy> :D 21:56 -!- Dougy [n=douglas@64.18.144.2] has quit ["Lost terminal"] 22:40 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 22:44 -!- kc8pxy [n=gecko@75-145-57-201-utah.hfc.comcastbusiness.net] has quit [Read error: 60 (Operation timed out)] 23:16 -!- tjz [n=tjz@bb121-7-11-34.singnet.com.sg] has joined ##openvpn 23:28 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] --- Day changed Tue Jan 05 2010 00:08 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 00:19 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [] 00:24 -!- Grapsus [n=grapsus@che21-2-82-245-89-120.fbx.proxad.net] has quit ["Quitte"] 01:02 < reiffert> moin 01:14 -!- hyper_ch [n=hyper@84.226.234.60] has quit [Remote closed the connection] 01:14 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 01:19 -!- Sky[x] [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 02:08 -!- hyper_ch [n=hyper@73-44.3-85.cust.bluewin.ch] has joined ##openvpn 02:18 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:39 < jmm> hi 02:56 -!- dazo_afk is now known as dazo 03:00 -!- teddymills [n=teddy@208.92.235.227] has quit [Read error: 104 (Connection reset by peer)] 03:01 -!- teddymills [n=teddy@208.92.235.227] has joined ##openvpn 03:02 -!- master_o1_master [n=master_o@p57B53FD6.dip.t-dialin.net] has quit [Read error: 60 (Operation timed out)] 03:06 -!- master_of_master [i=master_o@p57B571BE.dip.t-dialin.net] has joined ##openvpn 03:12 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has joined ##openvpn 03:15 < mithridates> hi jmm 03:27 < Bushmills> krzee: free outbound is new. modes of operation aren't - still the same as from grandcentral times. only that voice-to-text was added. 03:28 < Bushmills> i suppose you'll have the option to receive incoming-call related advertising soon. 03:29 < Bushmills> and grand central have 5 $ credit, google just10 cents. 03:29 < Bushmills> gave3 03:54 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [Excess Flood] 04:01 -!- wedjat [n=wedjat@unaffiliated/wedjat] has joined ##openvpn 04:26 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 110 (Connection timed out)] 04:26 < mithridates> do u know any client software fo MAC OS ? 04:26 < mithridates> !mac 04:26 < vpnHelper> mithridates: "mac" is Use Tunnelblick for the Mac. (http://code.google.com/p/tunnelblick/) 04:29 -!- romero [n=user@mail.nfq.ktc.lt] has quit ["leaving"] 04:56 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has joined ##openvpn 05:01 -!- Artio [n=_@port-91015.pppoe.wtnet.de] has joined ##openvpn 05:03 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 05:04 < jmm> I setuped a small vpn with a server and client, I would like the client to be able to access the server's LAN. I followed the documentation on openvpn's website, but the client still have only access to the server.can somebody help please ? here is my config : http://pastebin.ca/1738633 05:05 < mithridates> jmm: just wait I'm looking for what u want 05:05 < mithridates> I've seen an option 05:05 < jmm> hehe :) 05:06 < reiffert> jmm: read: 05:06 < reiffert> !route 05:06 < vpnHelper> reiffert: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 05:06 < mithridates> ;client-to-client 05:06 < jmm> I check this. 05:07 < reiffert> mithridates: jmm wants to access the servers LAN. 05:07 < mithridates> aah ok :D sorry 05:07 < reiffert> mithridates: client-to-client allows openvpn clients to talk to openvpn clients. 05:07 < jmm> hehe. 05:08 < jmm> I found a documentation about it, but I'm pretty sure I misunderstood something. 05:08 < jmm> http://openvpn.net/index.php/open-source/documentation/howto.html#policy 05:08 < vpnHelper> Title: HOWTO (at openvpn.net) 05:09 < reiffert> jmm: see above. 05:09 < jmm> I'm not sure of where to see. 05:10 < jmm> !route 05:10 < vpnHelper> jmm: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 05:12 < jmm> it doesn't looks like what I'm lookin for... I want to share server's lan, not client's lan. 05:13 < mithridates> jmm: I think u can do it by netfilter 05:13 < mithridates> it's about routing 05:13 < mithridates> am I right? 05:13 < reiffert> mithridates: nonsense. 05:13 < reiffert> jmm: the !route does both, however. 05:14 < jmm> oh cool. 05:14 < jmm> I'll read more so ! 05:15 * reiffert calls the vogons with their death rays. 05:15 < cpm> leave the vogons out of this please. can't take the shouting this early. 05:16 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has joined ##openvpn 05:16 < reiffert> Maybe Wowbagger then? 05:18 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 05:19 < jmm> reiffert: I don't think it's the right doc, you must be wrong. 05:19 < jmm> it's all about client configuration. 05:20 < reiffert> jmm: and you want to make the client access the servers lan.... 05:21 < reiffert> jmm: which is: make client1 talk to 192.168.2.0 in the howto. 05:21 < reiffert> (in the link given above) 05:21 < jmm> right , but client to client, I want to do client to server. 05:21 < jmm> the others computers are not part of the vpn. 05:22 < reiffert> allright, ignore me then. 05:23 < reiffert> u know, it's just that 5 people per day come in and happily live with that article, but you know it better, obviously. 05:23 < jmm> hehe, still thanks for the help, that doc has some interesting parts. 05:23 < jmm> pfft 05:24 < jmm> common you upset me. 05:24 < jmm> I bet you didn't even looked at the config I gave a link about. 05:25 < reiffert> why should I take a look at a working basic config you made from access the openvpn howto? 05:25 < jmm> it doesn't works. 05:25 < jmm> erm. 05:25 < jmm> maybe we don't understand well each other. 05:26 < reiffert> quote: "but the client still have only access to the server." 05:26 < jmm> yes. 05:26 -!- barefoot [n=magic@mail.virtuallogistics.co.za] has joined ##openvpn 05:26 < reiffert> basic working config. 05:26 < jmm> there is stuff to allow client to access server's lan. 05:26 < jmm> or at least what I trough I have to add. 05:27 < reiffert> yeah, the route reaches you client ... 05:27 < reiffert> your client can talk to your servers lan. 05:27 < jmm> I cannot ping any others computer on that lan. 05:27 < reiffert> you even have a route back on your firewall 05:28 < reiffert> then start some packet tracers, e.g tcpdump and follow that damn ping and ping-reply and see where it bails out 05:29 < jmm> let's try it. I'm not very good with those tool yet. 05:29 < reiffert> tcpdump -n -i interface proto ICMP 05:29 < reiffert> interface in eth0, tun0, eth1 etc 05:30 < jmm> roger. 05:32 < jmm> I can see the icmp echo request coming to the firewall, then to the openvpn computer. 05:32 < jmm> but I don't see any answer. 05:32 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Read error: 60 (Operation timed out)] 05:32 -!- magic_1 [n=magic@41.121.41.8] has joined ##openvpn 05:33 < reiffert> who is pinging who? 05:33 < jmm> the client is pinging a host( 192.168.1.121 ) on the server's lan. 05:33 < jmm> I tcpdumped from the firewall and openvpn server. 05:34 < reiffert> the request is 1st coming to the openvpn server 05:34 < reiffert> then to 1.121 05:34 < reiffert> from there a reply is sent to your lans gateway (firewall?) 05:34 < jmm> lemme check. 05:34 < reiffert> then back to openvpn server (1.123?), then back to client 05:34 < reiffert> sigh, thats what I meant by writing "follow". 05:35 < jmm> oh 05:35 < jmm> I got a reply on the 192.168.1.121 computer. 05:35 < jmm> but it doesn't reach the openvpn server. 05:35 < reiffert> so ... 05:35 < jmm> I guess I miss a route there. 05:36 < reiffert> whats inbetween, no a firewall. 05:36 < reiffert> 1.121 sends everything to its gateway 05:36 < reiffert> have a look on its gateway. 05:36 < jmm> oh yea it's 192.168.1.250 ! 05:37 < reiffert> so tell 1.250 to send everything openvpn related to 1.123 05:37 < jmm> route add -net 10.11.12.0/24 gw 192.168.1.123 05:37 < reiffert> ... 05:37 < jmm> erm. 05:37 < reiffert> thats what your already got here: 05:37 < reiffert> http://pastebin.ca/1738633 05:37 < reiffert> # 05:37 < reiffert> 10.11.12.0 192.168.1.123 255.255.255.0 UG 0 0 0 eth1 05:37 < reiffert> line 41. 05:37 < jmm> oh it's not to be added on 192.168.1.121 ? 05:38 < reiffert> no, why should you do that? 05:38 < magic_1> hi guys 05:38 < jmm> because 192.168.1.121 send reply and 192.168.1.123 doesn't see those. 05:38 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 05:39 < reiffert> jmm: adding routes .. want to do that on 254 computers or just on one? 05:39 < jmm> hehe I'd better do it just on one. 05:40 < reiffert> however, all this is in !route. 05:40 < reiffert> but it must be wrong. 05:40 < jmm> heh you're helpfull, try to be cool too. 05:40 < jmm> :) 05:41 < reiffert> quote: "4) Because 192.168.2.20 has no route for 10.8.0.6, it sends the traffic to its default gateway which is 192.168.2.1 " 05:41 < magic_1> anyway i can help 05:42 < jmm> reiffert: I think I understand better now. 05:42 < jmm> Thanks for your help and patience, I'll be back after lunch to fix all that. 05:43 < reiffert> jmm: talk to magic_1, he can help anyway. 05:44 -!- theDoc [n=hex@69.10.59.166] has joined ##openvpn 05:45 < jmm> allright magic :) 05:45 < theDoc> hi all :) 05:45 < jmm> magic_1: I'm afk for lunch , but I'll try to be back quite soon. 05:45 < mithridates> hi theDoc :D 05:46 < mithridates> I was waiting to catch u :D 05:46 < theDoc> You were? 05:46 < mithridates> not really 05:46 < mithridates> but I want to ask something 05:46 < theDoc> I thought so. 05:46 * theDoc goes to fire up gns3. 05:46 < theDoc> Yeah, go ahead and ask 05:46 < mithridates> :D 05:47 < mithridates> everyone knows in #openvpn that I want to implement a monitoring system :P 05:47 < mithridates> I wanted to know the best solution 05:47 < theDoc> well, i don't. :P 05:48 < mithridates> yes, you were the exception 05:48 < mithridates> LD 05:48 < mithridates> let me to explain it for u 05:48 < reiffert> mithridates: use openvpn web gui, it already got everything. 05:48 < mithridates> but it doesn't work on centos 05:49 < mithridates> I installed smarty and other packages 05:49 < reiffert> track down why it doesnt work then. 05:49 < reiffert> - or - re-implement the wheels. 05:49 < mithridates> but the page is still blank 05:49 < reiffert> still blank after tracking down the problems? doubt that. 05:50 < theDoc> mithridates> what exactly do you want to monitor? 05:51 < mithridates> ok theDoc 05:51 < mithridates> good question :D 05:51 < mithridates> I want to monitor the amount of bandwidth which each user uses 05:51 < theDoc> mithridates> How many users do you have? 05:51 < mithridates> more than 100 05:51 < mithridates> just a perfect user management 05:52 < mithridates> users should be able to see their usage in the web 05:52 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 05:52 < mithridates> the program should block them if they use more than bandwidth limitation 05:53 < theDoc> mithridates> i have a custom setup here which does that for me. 05:53 < mithridates> I know that's not possible by using a program 05:53 < theDoc> mithridates> whcms and AAA. 05:53 < mithridates> ok 05:53 < mithridates> WHMCS? 05:54 < theDoc> mithridates> How are you handling your AAA at the moment? 05:54 < mithridates> I don't know what AAA? 05:54 < mithridates> what's that? 05:54 < mithridates> :( 05:54 < reiffert> mithridates: wanna have a screenshot? 05:55 < mithridates> what's AAA? 05:55 < theDoc> mithridates> How are you handling your user accounts at the moment. 05:55 < mithridates> nothing 05:55 -!- barefoot [n=magic@mail.virtuallogistics.co.za] has quit [Read error: 113 (No route to host)] 05:55 < mithridates> manually 05:55 < theDoc> via pam? 05:55 < mithridates> I will have 100 users 05:55 < mithridates> I don't have any user right now 05:55 < mithridates> just 4 users for test 05:56 < theDoc> mithridates> where are you pulling out this number of 100 anyway? 05:56 < theDoc> O_o 05:56 < mithridates> let me to say everything first 05:56 < mithridates> I have a dedicated server 05:57 < theDoc> Yeah, go ahead. I'm going to load up the configs for my boxes first 05:57 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has joined ##openvpn 05:57 < reiffert> mithridates: I'm creating screenshots for you ... 05:57 < mithridates> I installed openvpn and it shares internet by SNAT for my clients which want to bypass filtering in IRAN 05:57 < mithridates> reiffert: would you give me the link of that plz? 05:58 < mithridates> no I want to use a monitoring system 05:58 < mithridates> to have an automation system 05:58 < theDoc> mithridates> Jesus christ. We know you want a monitoring system. I want to know what you have at the moment. 05:58 < mithridates> because they are growing 05:58 < mithridates> nothing 05:58 < mithridates> I have openvpn 05:59 < mithridates> and TLS/SSL 05:59 < mithridates> and also snmpd 05:59 < mithridates> these are all I have 06:00 < theDoc> mithridates> I suggest you look at AAA before running in head first. There's a fair bit of learning for you to do. 06:00 < mithridates> !AAA 06:00 < vpnHelper> mithridates: Error: "AAA" is not a valid command. 06:00 < theDoc> radius/ldap, sql, some-front-end. 06:00 < theDoc> iptables is also your friend. 06:01 < mithridates> and whmcs? 06:01 < reiffert> mithridates: http://snap.reifferscheid.org/owg/ 06:01 < vpnHelper> Title: Index of /owg (at snap.reifferscheid.org) 06:01 < Diffen> hello. are there any guides that takes you through on how to setup openvpn on a single-nic machine that are connected directly to internet. i have done all the certificates and so on. im getting connected but no ip-address to my vpn client. im running out of ideas here :( 06:01 < theDoc> mithridates> I have a custom coded whmcs setup. Chances are, you aren't going to be going down that route. 06:02 < mithridates> woow reiffert 06:03 < mithridates> it what I need 06:03 < mithridates> and also I can make a report system by mail to my clients 06:03 < mithridates> its what I need 06:03 < reiffert> ... 06:03 < mithridates> have u installed it on bsd or linux? 06:03 < magic_1> apologies, i am back 06:04 < magic_1> had a business call that came up 06:04 < reiffert> What I was adding is the history stuff and downloading *config* and required certs as zipfile. 06:04 < magic_1> had to sort some stuff out quick 06:04 < magic_1> where do we seem to be 06:04 -!- ewook [n=ewook@thales.fluffis.se] has quit ["server goes home!"] 06:04 < mithridates> I started a topic in openvpn web gui forum but they didn't answer me | it was about installing on centos 5 06:05 < magic_1> yea i can understand why that didnt work 06:05 < mithridates> why ? 06:05 < magic_1> to be honest with you i see it being a 2 fold solution 06:07 < mithridates> what's ur mean? 06:07 < mithridates> reiffert: there is no guideline to install it on centos 06:07 < reiffert> mithridates: so? 06:07 < reiffert> mithridates: write one. 06:07 < mithridates> I tried by my self but it doesn't work 06:07 < reiffert> mithridates: make it work then. 06:08 < mithridates> yes I need to do that :) 06:08 < theDoc> mithridates> Look man, you really shouldn't come running in here and telling us it doesn't work. We all know it doesn't work that's why you are here. You need to actually have an idea what is broken. More often than not, the server logs generate some decent output. 06:09 < theDoc> and do read up on AAA because you're lacking in that department. 06:10 < mithridates> theDoc: sure , I want to follow what u said 06:10 < reiffert> mithridates: no, you dont. 06:10 < mithridates> =)) 06:10 < reiffert> radius with sql backend for AAA? 06:10 < magic_1> there are guide lines, i use CentOS myself 06:11 < mithridates> reiffert: no I mean , I will read about AAA and radius and ldap, ok? :D 06:11 < magic_1> but i have used it for a while until now 06:11 < reiffert> let's see, wikipedia knows about 50 expandations for "AAA" 06:11 < magic_1> hahahahaha 06:11 < magic_1> that is true 06:11 < theDoc> reiffert> what's wrong with using radius with a sql backend for aaa? 06:12 < magic_1> well radius is going to be your best bet 06:12 < reiffert> theDoc: leaving the "keep it simple" rule. 06:12 < magic_1> but radius is not the easiest to setup 06:12 < theDoc> shrug 06:13 < magic_1> you have got a few options to be honest 06:13 < mithridates> uhum 06:13 < mithridates> I saved this chat, 06:13 < magic_1> the simplist could be the following 06:13 < reiffert> theDoc: what do we have here, a guy that is not running thousands of customers and on top he looks very overcharged with everything... 06:13 < buntfalke> Hi 06:14 < buntfalke> I get this message after I enabled IPv6 06:14 < buntfalke> http://paste.frubar.net/11675 06:14 < theDoc> i think radius is the simplest to manage in the long run but to be frank, it's probably a real pain to get it setup right if you don't have radius experience. 06:14 < buntfalke> Any hint's on how to fix it? 06:14 < theDoc> reiffert> Yeah true that I was kind of thinking of him being able to easily scale it up instead of running something like local pam and then migrating to radius. 06:14 < magic_1> use vyatta to setup openvpn as it has a gui interface to setup with 06:14 < reiffert> buntfalke: there has been some ipv6 discussion on the mailing lists. Never saw such a thing in here 06:14 < magic_1> raduis is best suited for this, but trust me its no walk in the park 06:15 < buntfalke> reiffert: Any idea what it actually means? 06:15 < magic_1> specially if you are going to be using freeradius 06:15 < mithridates> ah ok guys 06:15 < mithridates> thank u 06:15 < mithridates> I will come back with a monitoring solution 06:15 < mithridates> :D 06:15 < theDoc> freeradius almost killed me when i learnt it 06:15 < magic_1> but it depends you could use some other systems as well 06:15 < magic_1> can say that again 06:15 < buntfalke> reiffert: the server pushes the option "ifconfig-ipv6" to my, the client, but my version of openvpn doesnt understand such an option? 06:15 < reiffert> buntfalke: I could repeat the error message for you, but thats probably all I can do for you here. 06:16 < mithridates> theDoc: is it commercial? the radius? 06:16 < reiffert> buntfalke: which means something like: unrecognized option - or - missing parameter in your PUSH-OPTIONS 06:16 < reiffert> buntfalke: especially: route-ipv6 and ifconfig-ipv6. 06:16 < magic_1> mithridates, what you could use is a integrated solutions like the following 06:16 < buntfalke> yes, so what i described, right? 06:16 < buntfalke> Hmm 06:16 < theDoc> mithridates> opensource, freeradius but take heed, you'd probably want to run that on a -separate- server somewhere else and not locally on your openvpn servers 06:16 < magic_1> there are some easy to setup linux bandwidth montiring per IP solution 06:16 < reiffert> buntfalke: got openvpn 2.1.1? 06:17 < mithridates> theDoc: oh god, I don't have enough budget to do that :( 06:17 < buntfalke> reiffert: 2.1.0 06:17 < magic_1> what you could do then is , make sure that openvpn gives static IP per key, this way you will know 06:17 < magic_1> this is a crude solution, however it will work 06:17 < reiffert> buntfalke: dont think there has been much improvement between 2.1.0 and 2.1.1, just some bug fixing. 06:17 < theDoc> magic_1> That's a really crude solution to it. 06:18 < mithridates> magic_1: how can I set static ip per client? by ipp.txt? 06:18 < reiffert> magic_1: come on ... assing the traffic to the common name is *easy* 06:18 < magic_1> yea 06:18 < magic_1> it is 06:18 < theDoc> magic_1> the dhcp pool should be randomized based on a certain number of virtual ips to provide anonymity which are tied to the nics :P 06:18 < theDoc> or at least, to most people :P 06:18 < reiffert> it's a 2 line shell script talking to whatever database (starting by files) 06:18 < magic_1> look if you dont want bells and wistles etc... you could do a very straight forward solution 06:19 < theDoc> Yes, i know it's not exactly anonymous 06:19 < reiffert> theDoc: what? 06:19 < theDoc> reiffert> n/m. 06:19 < reiffert> theDoc: you want anonymity? unplug the cable. 06:20 < magic_1> yep, but the thought in his mind i am sure , it to offer a solution, i was mearly pointing out that yea look you can do it with minimal systems, however it would not be something i would recomend 06:20 < theDoc> reiffert> don't forget to hide in the bunker. 06:20 < theDoc> magic_1> There's no easy/cheap way to do this and still make it look nice. 06:20 < theDoc> at least not something i'm aware of at the moment. 06:21 < magic_1> i agree 100% 06:21 < reiffert> magic_1: all he really needs is a disconnect script on the server side, echo'ing the environmental variables to whatever he uses for storing values. 06:21 < mithridates> what do I use for my clients with windows vista? 06:21 < magic_1> openvpn 06:21 < reiffert> mithridates: openvpn client for windows vista. 06:21 < mithridates> is there something strange ? 06:21 < magic_1> will work on it as well 06:21 < reiffert> mithridates: polish is strange. 06:26 < reiffert> next. 06:38 < jmm> magic_1: I'm back . 06:42 < magic_1> how can i help jmm 06:43 < jmm> I've got a small vpn setup which is working, there is one client, and one server.I'd like to allow the client to access server's lan.I followed some docs and with reiffert's help I nearly succed. 06:44 < jmm> my last problem is that answers packets coming from lan use lan's default route and not the vpn. 06:44 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 06:44 < jmm> http://pastebin.ca/1738633 06:44 < jmm> here is my configs. 06:45 < magic_1> let me check quick 06:46 < reiffert> jmm: before leaving for food you only had to add a simple route command which you already had ... 06:46 < reiffert> why starting all over? 06:46 < jmm> I'm not starting over, that missing route is my last problem. 06:47 < jmm> the route seems here, but for some reason it doesn't works. 06:47 < jmm> see : 06:47 < jmm> 10.11.12.0 192.168.1.123 255.255.255.0 UG 0 0 0 eth1 06:47 < reiffert> on 1.250 06:47 < reiffert> so tcpdump -n .. 06:48 < reiffert> reply reaches 1.250? 06:48 < reiffert> and ends there? 06:48 < magic_1> dont suppose you have some sort of diagram of your setup 06:48 < reiffert> then check your firewall on 1.250. 06:49 < jmm> I don't infortunatly. I works there for just a few weeks. 06:49 < magic_1> what is the IP on the server side, and what is the IP on the client side 06:51 < jmm> gimme a second, I locate where the reply ends. 06:52 < reiffert> magic_1: lan 192.168.1.0/24 lan-gw: 1.250, lan openvpn server: 1.123 06:52 < jmm> yes it ends on the firewall 192.168.1.250 06:52 < reiffert> magic_1: openvpn net: 10.11.12.0/24 06:52 < reiffert> jmm: fix your firewall on 1.250 then. 06:54 < jmm> 10.11.12.0 192.168.1.123 255.255.255.0 UG 0 0 0 eth1 06:55 < jmm> 192.168.1.123 is openvpn server. is that route ok on the gateway ? 06:55 < reiffert> it was and it still is... 06:56 < reiffert> check that damn firewall on that gateway. 06:56 < magic_1> i take it the 2 are not on the same subnet 06:56 < jmm> I did, it seems ok. 06:56 < magic_1> as it seems so , apologies as i just need to tick my trouble shooting list here 06:57 -!- Alfafa [n=hhj@94.101.209.34] has joined ##openvpn 06:58 < reiffert> jmm: disable the firewall on that gateway. 06:58 < jmm> it's not possible, people are using it :( 06:58 < kyrix> jmm, not disable the gateway, the filtering, etc.. 06:59 < reiffert> jmm: linux? 06:59 < kyrix> jmm, just drop the filtering 06:59 < jmm> reiffert: yes. 06:59 < reiffert> jmm: iptables -P INPUT ACCEPT 06:59 < reiffert> same for FORWARD and OUTPUT 06:59 < jmm> okay. 07:00 < jmm> oh woot it works ! 07:01 < jmm> uhh now I'll have to dig that ipcop stuff trough :\ 07:01 < jmm> thanks for your help guys. 07:01 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 07:01 < kyrix> !firewall 07:01 < vpnHelper> kyrix: "firewall" is (#1) please see http://openvpn.net/man#lbBD for more info, or (#2) see http://www.secure-computing.net/wiki/index.php/OpenVPN/Firewall for brief notes on disabling firewall rulesets. 07:02 < kyrix> :D 07:02 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has quit ["This computer has gone to sleep"] 07:02 < reiffert> or have a look at the topic .. 07:02 < jmm> !topic 07:02 < vpnHelper> jmm: Error: "topic" is not a valid command. 07:02 < jmm> ops 07:02 < reiffert> kyrix: but all those links we have are all just wrong. 07:02 < kyrix> topic is the message you get when u login 07:02 < reiffert> type: /topic 07:02 < jmm> heh I did. 07:02 < kyrix> slash 07:03 < kyrix> i wish i had read the topic when i set up my first vpn 07:04 < reiffert> jmm: you get money for this? 07:04 -!- Alfafa [n=hhj@94.101.209.34] has quit ["leaving"] 07:04 < jmm> yes I'll do. 07:04 < jmm> I find you guys are hard with me. 07:04 < magic_1> everything is fine on your config, i would agree , it seems a FW issue 07:04 < reiffert> jmm: how about some donation then? 07:05 < jmm> it may not looks like but I'm not that bad. I've read docs before coming and that firewall stuff seemed ok at first. 07:05 < jmm> I earn 1150 euros a month. I don't give money to anyone. 07:05 < kyrix> hehe 07:05 < jmm> :) 07:05 < reiffert> Uh, you'll get more in slavery... 07:05 < kyrix> a donation can be $10 07:06 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 07:06 < kyrix> its good to donate to opensource projects 07:06 < kyrix> even if its very little 07:06 < jmm> I better contribute when I can. 07:06 < kyrix> well thats ok too 07:07 < kyrix> but most people, even myself, a software dev, consume a lot more than we produce 07:08 < kyrix> and i dont know how openvpn is doing, but some projects really could use cash :D 07:08 < reiffert> as in $$$. 07:09 < kyrix> work out time take care 07:10 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has quit ["Leaving"] 07:40 -!- FlaPer87 [n=FlaPer87@unaffiliated/flaper87] has joined ##openvpn 07:40 < FlaPer87> hey guys 07:40 < FlaPer87> what does "Authenticate/Decrypt packet error: cipher final failed" means? 07:40 -!- Winkie [n=urmom@ur.fa.gs] has joined ##openvpn 07:41 < Winkie> so hey, a quick question i've yet to be able to figure out. I'm running a server with server-bridge so that the local DHCP server (listening on tap0) can see requests and can update DNS with said requests 07:41 < Winkie> however, the client is proving to be a pain 07:41 < Winkie> if i bring it up, and then manually 'dhclient tap0' it works fine 07:41 < Winkie> but any combination of scripts i have tried to run dhclient on tap0 through the config fails, the packets just aren't transmitted 07:42 < Winkie> should i be using --up or --ipchange or similar? 07:42 < Winkie> i'm thinking it's probably the latter 07:42 < Winkie> hmm nope doesn't look like it 07:43 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has joined ##openvpn 07:48 -!- stephenh [i=stephenh@69.30.200.88] has joined ##openvpn 07:50 < krzee> !c2c 07:50 < vpnHelper> krzee: "c2c" is "client-to-client" is with this option packets from 1 client to another are routed inside the server process. without it packets leave the server process, hit the kernel (firewall, routing table) and if allowed by firewall and routed back to server process, they go to the client. you use this option when you want to use selective firewall rules on what clients can access things behind 07:50 < vpnHelper> krzee: other clients. 07:51 < krzee> damn i have part of that backwards 07:51 < krzee> !client-to-client 07:51 < vpnHelper> krzee: "client-to-client" is with this option packets from 1 client to another are routed inside the server process. without it packets leave the server process, hit the kernel (firewall, routing table) and if allowed by firewall and routed back to server process, they go to the client. you use this option when you do not want to use selective firewall rules on what clients can access things behind 07:51 < vpnHelper> krzee: other clients 07:51 < krzee> !forget c2c 07:51 < vpnHelper> krzee: Joo got it. 07:51 < krzee> !learn c2c as [client-to-client] 07:51 < vpnHelper> krzee: Joo got it. 07:51 < krzee> there we goes 07:58 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has joined ##openvpn 08:04 < FlaPer87> hi guys, I've push "dhcp-option DNS 192.168.2.1" 08:04 < FlaPer87> in my config 08:05 < FlaPer87> but for some reason the dns doesn't change when I connect to VPN 08:05 < FlaPer87> any idea of what I should check? 08:06 < Rienzilha> iirc the name of the dhcp option is different 08:06 < Rienzilha> nameserver or name-server iirc 08:09 < dazo> FlaPer87: are you running Windows? 08:09 < dazo> on the client 08:09 < krzee> !pushdns 08:09 < vpnHelper> krzee: "pushdns" is (#1) push "dhcp-option DNS a.b.c.d" to push dns to the client, or (#2) http://thread.gmane.org/gmane.network.openvpn.user/25139/focus=25147 see that mail archive for some info on pushing dns, or (#3) http://article.gmane.org/gmane.network.openvpn.user/25149 for a perm fix via regedit 08:10 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has quit ["This computer has gone to sleep"] 08:10 < Rienzilha> sorry I was wrong 08:10 < FlaPer87> dazo: linux 08:11 < krzee> in linux you need a script for that 08:11 < krzee> i believe it comes in the tgz 08:11 < krzee> !download 08:11 < vpnHelper> krzee: "download" is www.openvpn.net/download to download openvpn 08:11 < FlaPer87> thanks 08:11 < krzee> its named something like update-resolv 08:12 < krzee> iirc 08:12 < dazo> FlaPer87: Depending on your distro ... you might need a helper script as well .... but you need a resolvconf package for sure ... and the update script then tells a resolvconf updater about the new DNS, which updates /etc/resolv.conf properly 08:20 < dazo> FlaPer87: I didn't find the original place I was looking for (/me curses Google for reordering the search results) ... but this is closer to something http://www.daniweb.com/forums/thread165269.html# 08:20 < vpnHelper> Title: openvpn, dns not pushed on linux client - *nix Software (at www.daniweb.com) 08:21 * FlaPer87 reads, thanks dazo 08:21 < ecrist> good morning 08:29 < havoc> morning 08:29 < krzee> moinmoin 08:39 * ecrist deletes 3230 users from ovpnforum.com 08:40 < havoc> idle/dead accounts? 08:41 < ecrist> spam 08:41 < ecrist> users with reg date more than 15 days ago with 0 post count 08:41 < havoc> ah 08:41 < ecrist> we get a *ton* of spam on the forum 08:41 < ecrist> none of it makes it to public view anymore due to hard work my mods 08:42 < ecrist> all users who have less than 2 posts are required to be moderated 08:42 < havoc> nice 08:45 < FlaPer87> If I have 2 nameserver in the resolv.conf shouldn't it try to resolv the domain I'm trying to acces with both nameservers? My resolv.conf is having a strange behavior, it tries with the first line and then fails 08:46 < ecrist> 1979 disapproved posts so far 08:46 < ecrist> no, FlaPer87 08:46 < FlaPer87> hmm, too bad 08:46 < FlaPer87> ecrist: thanks 08:46 < ecrist> it only tries the second and subsequent servers if the first server is unreachable 08:46 < FlaPer87> ecrist: oh, I understand 08:46 < FlaPer87> didn't know that 08:47 < FlaPer87> thanks 08:48 < ecrist> a 'domain not found' message is considered an answer 08:48 < ecrist> DNS isn't like a child that asks dad, "can I go to the park" and when dad says no, asks mom the same question. :) 08:54 -!- Artio [n=_@port-91015.pppoe.wtnet.de] has quit [Connection timed out] 08:57 < wedjat> hello everybody 08:57 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 08:57 < wedjat> is it possible to route Roadwarriors through a site-to-site VPN ? 08:57 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 08:59 -!- tomjones4000 [n=magic@196.214.3.250] has joined ##openvpn 08:59 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Read error: 60 (Operation timed out)] 09:00 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 09:00 < ecrist> wedjat: not sure what you mean 09:03 < wedjat> ecrist: well, i have some roadwarriors who can access to a LAN behind a firewall. 09:04 < wedjat> ecrist: this firewall is connected to another firewall with a site-to-site OpenVPN. Then, it can access the other LAN behind the other firewall. 09:04 < havoc> you just need the correct routes 09:04 < wedjat> in fact, i want roadwarriors who access the first LAN, to access the second LAN 09:04 < havoc> I've done exactly that 09:05 < wedjat> havoc: yes. But i have some problems using the instructions "push route", "route" and "client-to-client" 09:05 -!- lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Read error: 60 (Operation timed out)] 09:05 < havoc> "client-to-client" has nothing to do with accessing the lan(s) 09:05 < ecrist> !route 09:05 < vpnHelper> ecrist: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 09:08 < havoc> routing is pretty simple once you understand it 09:08 < Winkie> going to repeat my question from before, cause someone here might have a clue 09:08 < Winkie> i'm bringing up a vpn with 'server-bridge' set, in order that dhcp requests go to a dhcp server listening on tap0 09:08 < havoc> I had 2 sites connected by VPN, and vpn servers at each site, clients could connect to either site or both and have access to both whichever way 09:09 < Winkie> however, using 'up', even with 'up-delay', calling dhclient results in none of the broadcast traffic getting to the other side of the domain 09:09 < Winkie> if i run dhclient post the interface coming up, it works fine 09:09 < Winkie> but i can't trigger that from openvpn's scripts 09:09 < havoc> Winkie: so this is a client issue on linux? 09:09 < Winkie> havoc: it is indeed 09:10 < havoc> Winkie: distro? 09:10 < Winkie> havoc: ubuntu 9.10 09:10 < Winkie> Version: 2.1~rc19-1ubuntu2 09:10 < havoc> Winkie: this might help: http://hans.fugal.net/blog/2009/01/06/putting-openvpn-in-its-place/ 09:10 < Winkie> openvpn version 09:10 < vpnHelper> Title: Putting OpenVPN in its place | The Fugue (at hans.fugal.net) 09:10 < Winkie> havoc: i read that but didn't see anything relevant, let me have another check 09:10 < havoc> towards the end it has ubuntu/debian specific dhcp client stuff 09:11 < Winkie> havoc: ha interesting 09:11 < havoc> read it again :) there is specific mention of ovpn dhcp options being ignored or something, and there is a workaround 09:11 < Winkie> indeed, i will be working on that momentarily :D 09:12 < havoc> the key is making sure the tun/tap iface is up first no matter what 09:18 < wedjat> havoc: ok, i have already read the documentation about routing, but i will search once again. Do you think OpenVPN can conflict with IPSec ? The truth is that i have another connection between my two firewall, an IpSec tunnel, which connects the same networks. 09:19 < havoc> if it moves IP traffic it shouldn't matter 09:20 < havoc> ...assuming there is no firewall rule(s) impeding IP traffic, and both routers/gateways support IP forwarding 09:21 < havoc> i.e. you can't just push the proper routes to your VPN clients, both routers must have proper routes as well 09:21 < havoc> so if your vpn clients can reach the first lan then the problem is routes on either or both gateways/routers, and not openvpn 09:25 -!- tjz [n=tjz@unaffiliated/tjz] has quit ["bbl"] 09:27 -!- magic_1 [n=magic@41.121.41.8] has joined ##openvpn 09:49 -!- tomjones4000 [n=magic@196.214.3.250] has quit [No route to host] 10:04 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 110 (Connection timed out)] 10:10 -!- lysip [n=lysip@208.85.2.66] has joined ##openvpn 10:11 < wedjat> havoc: in fact, when i try to ping the LAN2 from my Roadwarriors, i see the ICMP data coming to the tun1 interface of the first router (roadwarriors) but it doesn't go to the tun3 interface (site-to-site) 10:11 < wedjat> ip forwarding is enabled 10:13 -!- lysip [n=lysip@208.85.2.66] has quit [Client Quit] 10:13 < havoc> sounds like a missing route to lan2 on the lan1 gateway 10:14 < wedjat> but the lan1 firewall is able to ping lan2 10:19 < havoc> can it ping hosts on lan2? 10:20 < havoc> nto that that is conclusive anyway 10:22 < wedjat> can it ping hosts on lan2? >> yes, the lan1 firewall can do that directly with the tun3 interface 10:22 < havoc> and lan1 hosts can ping lan2 hosts? 10:23 < havoc> if so then the problem likely *is* the routes ovpn pushes to vpn clients 10:25 < wedjat> and lan1 hosts can ping lan2 hosts? >> well, difficult to say. Today, there is still an IPSec tunnel between LAN1 and LAN2. I don't really know if they can communicate each other through the OVPN tunnel 10:26 < havoc> vpn clients are also on lan1? 10:28 < wedjat> the routes ovpn pushes to vpn clients >> i've added a "push route LAN2netaddress netmask" to the server side of the roadwarriors config. As a client, i then have routes to LAN1 and LAN2. They have the same "special" OVPN gateway 10:28 < wedjat> vpn clients are also on lan1? >> vpn roadwarriors have access to lan1, yes 10:32 < havoc> are they in the same subnet, i.e. bridging? 10:32 < wedjat> no 10:32 < havoc> ok 10:34 < havoc> so you're pushing routes for every subnet, including the vpn subnet, with the vpn IP as gateway for each route? 10:35 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has left ##openvpn [] 10:36 < wedjat> i used "push route" for the roadwarriors. On the Lan2 firewall, i used "route roadwarriors_subnet netmask". that's all 10:36 < havoc> wedjat: http://pastebin.com/dab3325f 10:38 < wedjat> oh...i didn't know that the "push route" could take four arguments. is it the same for the "route" command ? Maybe it's indicated in the manual 10:38 < havoc> again, understanding "routing" helps :) 10:38 < havoc> anyway, you're probably missing the gateway, but since I haven't seen a config I can't know 10:39 < havoc> the metric is optional, but can come in handy 10:41 < havoc> e.g. I've pushed the same routes from both ends of a connected network, but with different metrics to prioritize access in case a client was connected to both ends at once 10:43 -!- Zarion [n=as@174.124.169.152] has joined ##openvpn 10:44 < Zarion> !route 10:44 < vpnHelper> Zarion: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 10:53 < wedjat> havoc: the "push route" doesn't work for site-to-site right ? only for roadwarriors pki configurations ? 10:53 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has joined ##openvpn 10:53 -!- hyper_ch [n=hyper@73-44.3-85.cust.bluewin.ch] has quit [Read error: 104 (Connection reset by peer)] 10:53 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 54 (Connection reset by peer)] 10:54 < havoc> openvpn can only push routes to vpn clients 10:55 < havoc> otherwise I'm not sure that I understand the question 10:56 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 11:01 < Winkie> havoc: we eventually abandoned the plan thanks to OSX also being a pain in the ass :) 11:01 < Winkie> havoc: thanks anyway 11:02 < wedjat> havoc: yes, i wanted to be sure, thanks. In your example, what is exactly 10.185.169.1 ? 11:03 < Zarion> I have openvpn setup, but am trying to get the other machines on my LAN to use the VPN, any idea how to go about doing this? 11:04 -!- jmm [n=jmm@LPuteaux-156-14-28-187.w82-127.abo.wanadoo.fr] has quit [Read error: 113 (No route to host)] 11:05 < havoc> Winkie: ok, np :) 11:05 < havoc> wedjat: 10.185.169.1 is the IP of the vpn server 11:06 < havoc> ...the IP vpn clients see on the other side 11:09 < wedjat> virtual OpenVPN address ? 11:22 -!- FlaPer87_0_ [n=FlaPer87@95.237.114.36] has joined ##openvpn 11:23 < reiffert> anyone having a rapidshare account and could get me 150MB in 3 files? 11:27 < ecrist> reiffert: what do you need? 11:31 < havoc> wedjat: yes, in the server.conf 11:31 -!- dauergast [n=sag@g227130156.adsl.alicedsl.de] has joined ##openvpn 11:33 < wedjat> havoc: very weird. Now i have an icmp echo reply coming from LAN2 firewall, on tun0 interface of a Roadwarrior client, but it doesn't display the answer to ping in the command output. 11:34 -!- FlaPer87 [n=FlaPer87@unaffiliated/flaper87] has quit [Read error: 110 (Connection timed out)] 11:46 -!- jeremy9174 [i=d041afc5@gateway/web/freenode/x-jroclmeawbhyziek] has joined ##openvpn 11:49 < jeremy9174> Hello 11:49 < jeremy9174> !howto 11:49 < vpnHelper> jeremy9174: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 11:50 < jeremy9174> Can anyone tell me how to get openVPN working on my Pre? i installed it through preware, and i beleive i have to enter some commands now? not sure 11:53 -!- hyper_ch [n=hyper@84.226.234.60] has joined ##openvpn 11:54 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 11:54 < jeremy9174> Can anyone tell me how to get openVPN working on my Pre? i installed it through preware, and i beleive i have to enter some commands now? not sure what to do. 11:55 < reiffert> Pre what? 11:59 * dazo guesses Palm Pre 11:59 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 12:00 < reiffert> jeremy9174: are you familiar with openvpn? 12:04 -!- FlaPer87_0_ [n=FlaPer87@95.237.114.36] has quit [Read error: 113 (No route to host)] 12:05 < jeremy9174> hey sorry stepped away from my computer 12:05 < jeremy9174> not very familiar, no 12:05 < jeremy9174> does it only connect to open vpn or does it work with others, like cisco 12:07 < Zarion> anyone know how to get OpenVPN to let the whole lan on the vpn subnet? 12:09 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 12:10 < Bushmills> !route 12:10 < vpnHelper> Bushmills: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 12:11 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Client Quit] 12:14 < Zarion> Isn't a openvpn connect supposed to work for all computers on the lan? 12:15 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 12:16 < Bushmills> no 12:16 < Bushmills> it is supposed to work between client and server 12:17 < Zarion> I've been trying all day to get my other computer to get a IP from the vpn, but it just won't work 12:17 < Zarion> I guess run two copy's of open vpn would work 12:18 < Bushmills> if the other computers aren't vpn clients, you wouldn't want to give them ip addresses from the range of your openvpn net 12:19 < Zarion> That would let them in the vpn though 12:19 < Zarion> I tried routing, but the linux bpox won't re-route over to the vpn 12:20 < Bushmills> why not? 12:20 < Zarion> I don't know why. 12:21 < Zarion> route add 50.0.0.0 mask 255.255.255.0 192.168.1.250 12:21 < Bushmills> so how do you know that your linux box won't route it? 12:21 < Zarion> I tried that, but that won't work 12:21 < Zarion> I've tried pinging a vpn ip, from the windows box, and it won't go through, but on the linux box it'll work just fine 12:22 < Zarion> Must be some silly routing thing I'm missing 12:22 < ecrist> Zarion: do you own the 50/24 network? 12:22 < ecrist> seems an odd range to route 12:22 < Zarion> No I'm just a client on it 12:22 < ecrist> ah 12:22 < Bushmills> seems there are two possibilites: a: you did something wrong, b: the operating systems are broken, by refusing otherwise correct routing statements. 12:23 < Zarion> Well on the linux side, the routing works fine, but it don't seem to want to reroute any of the 50.0.0.0 12:24 < reiffert> jeremy9174: openvpn is openvpn only. 12:24 -!- jeremy9174 [i=d041afc5@gateway/web/freenode/x-jroclmeawbhyziek] has quit ["Page closed"] 12:24 < reiffert> hehe. 12:29 < Zarion> interesting masks Freenode has 12:29 -!- dazo is now known as dazo_afk 12:30 < wedjat> thank you very much havoc for your time ! :D 12:30 < wedjat> thank you thank you ! 12:30 -!- wedjat [n=wedjat@unaffiliated/wedjat] has left ##openvpn [] 12:30 < reiffert> Zarion: pay and you get one IIRC. 12:30 < Zarion> Pay who? 12:30 < reiffert> freenode. 12:31 < Zarion> your kidding right? 12:36 -!- Hypnoz [n=colin@ip66-104-252-161.z252-104-66.customer.algx.net] has joined ##openvpn 12:37 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 12:38 -!- flo|va-nu-pied_ [i=c16d7718@gateway/web/freenode/x-xtiwmfajpowlkqho] has joined ##openvpn 12:38 < flo|va-nu-pied_> Hi all 12:39 -!- Zarion [n=as@174.124.169.152] has left ##openvpn [] 12:39 < flo|va-nu-pied_> Looking for some assistance to set up my VPN clients using a local DHCP server instead of the one provided by openvpn 12:40 < flo|va-nu-pied_> i'm currently able to connect to VPN server using a client which IP is assigned by openvpn 12:40 < flo|va-nu-pied_> them from the client again a dhclient tap0 get an IP from my local DHCP server 12:41 < flo|va-nu-pied_> how can I ask the server to stop sending DHCP reply and how can I tell cclients to ask for a dynamic IP direct on logon ? 12:43 -!- polaru [n=polaru@93.113.192.70] has quit [Read error: 104 (Connection reset by peer)] 12:43 < Bushmills> specify server to query with dhclient 12:43 -!- hyper_ch [n=hyper@84.226.234.60] has left ##openvpn ["Konversation terminated!"] 12:44 < flo|va-nu-pied_> sorry but how can I do that Bushmills ? which directive do I have to use 12:44 < Bushmills> man dhclient tells you about -s 12:44 < Bushmills> man man tells you about man 12:44 < flo|va-nu-pied_> hum ok Bushmills i'll see it 12:45 < flo|va-nu-pied_> for the moment I can't really figure out how things are exactlly qworkin :) 12:45 < Bushmills> why don't you disable dhclient on vpn altogether and use vpn server assigned ip addresses instead? 12:46 < flo|va-nu-pied_> 'cause I wan't my DHCP server to dynamically update my DNS server 12:47 < Bushmills> can be solved with static ip addresses on vpn net 12:47 < flo|va-nu-pied_> using ccd directory you mean ? 12:47 < Bushmills> that's a method. 12:48 < flo|va-nu-pied_> can't use this one for a large range of cliens 12:49 < flo|va-nu-pied_> what i don't understand is how to disable DHCP server on openvpn ? 12:50 < Bushmills> by telling dhcp client to not query it 12:51 < flo|va-nu-pied_> ok using the dhclient -s as you mentionned previously 12:52 < flo|va-nu-pied_> but that mean that any clietn need to do a manual dhclient -s $DHCP_SERVER 12:53 < flo|va-nu-pied_> how can I automate the fact that when a client connect to my VPN it must ask a specifif server ? 12:53 < Bushmills> it is just a command line parameter - can be scripted, no need to do that manually 12:53 < flo|va-nu-pied_> hum i've seen a thing like that learned-smthg 12:55 -!- novelli [n=novelli@151.60.88.224] has joined ##openvpn 12:56 < flo|va-nu-pied_> learn-address in man openvpn seems to be what you're talkin about right ? 13:04 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [SendQ exceeded] 13:04 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 13:09 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [Remote closed the connection] 13:09 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 13:13 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [] 13:32 -!- Steve973 [n=Steve@169.130.18.10] has joined ##openvpn 13:33 < Steve973> !howto 13:33 < vpnHelper> Steve973: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 13:41 -!- Diffen [n=diffen@c-3672e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 13:41 -!- krzee [i=nobody@unaffiliated/krzee] has quit [Read error: 54 (Connection reset by peer)] 13:59 -!- buntfalke_ is now known as buntfalke 14:08 -!- FlaPer87_0_ [n=FlaPer87@95.237.114.36] has joined ##openvpn 14:14 -!- novelli [n=novelli@151.60.88.224] has left ##openvpn [] 14:18 < flo|va-nu-pied_> Bushmills: sorry but after reading I still can't figure out how it works ? 14:18 < flo|va-nu-pied_> do I have to fix client's configuration or server's configuration ? 14:21 < FlaPer87_0_> is it possible to add script-security to the configs instead of passing it to the command? 14:26 -!- dauergast [n=sag@g227130156.adsl.alicedsl.de] has quit ["alle, die glauben, dass telekinese wirklich funktioniert heben bitte meine hand!"] 14:47 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has quit [] 14:48 -!- moonspa [n=moonspa@icm218137-orange.orange.sk] has joined ##openvpn 14:48 -!- Diffen [n=diffen@c-3672e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 14:51 -!- moonspa [n=moonspa@icm218137-orange.orange.sk] has left ##openvpn [] 14:51 -!- moonspa [n=moonspa@icm218137-orange.orange.sk] has joined ##openvpn 14:56 -!- Steve973 [n=Steve@169.130.18.10] has quit ["Leaving"] 15:10 -!- moonspa [n=moonspa@icm218137-orange.orange.sk] has quit [Read error: 60 (Operation timed out)] 15:29 -!- FlaPer87_0_ [n=FlaPer87@95.237.114.36] has quit [Client Quit] 15:29 -!- flo|va-nu-pied_ [i=c16d7718@gateway/web/freenode/x-xtiwmfajpowlkqho] has quit ["Page closed"] 15:40 < havoc> I think I'll be doing my first ever win32 server install of ovpn 15:41 < havoc> have new remote win2k8 web server 15:41 < havoc> gonna put ovpn on it for more secure RDP access 15:43 < reiffert> I preferr putting openvpn on the lans gateway.. 15:44 < havoc> this is gonna be a standalone box in a colo 15:45 < havoc> so not really an option 15:45 < havoc> supposedly 2k8 rdp is more secure, but I'd rather rely on ovpn w/ tls 15:45 < reiffert> putting openvpn on the linux/bsd host where the windows maschine is a virtual guest then .. maybe? ;) 15:46 < havoc> nah, no virtualization 15:46 < havoc> I suppose we could MSDN it (hyper-v), but we're trying to stay legal here 15:46 < havoc> ...and within budget 15:47 < havoc> I'd imagine I just install it and use the same configs (w/ diff iface/dev lines) I'd use anywhere else 15:47 < havoc> even build the server and tls and dh keys on a linux box if I want 15:48 < havoc> not that it matters 15:48 < havoc> does the windows build include easyrsa, I never looked? 15:48 < reiffert> virtualization and linux/bsd is free. 15:49 < reiffert> windows installation comes with easy rsa 15:49 < havoc> duh, run window on linux 15:49 < havoc> yeah, not thinking 15:49 < havoc> ah, cool (easyrsa) 15:49 < reiffert> it's great .. live migration, snapshots and such? 15:50 < havoc> eh, since I am the IT dept, I don't think I'll be doing virt 15:51 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 15:52 < havoc> little time as it is 15:53 -!- bvierra [n=bvierra@cpe-75-83-6-55.socal.res.rr.com] has quit [Read error: 104 (Connection reset by peer)] 15:57 -!- bvierra [n=bvierra@cpe-75-83-6-55.socal.res.rr.com] has joined ##openvpn 16:06 < havoc> will also facilitate remote backups 16:06 < havoc> I could make it a client of our existing vpn infrastructure, but I think this is more secure, and more likely to be up 16:09 < reiffert> jup. 16:11 < havoc> this machine could actually handle virtualization though 16:11 < havoc> it's new :) 16:12 < havoc> 1U supermicro, dual 2.66GHz CPUs, 8GB RAM 16:13 < havoc> but I need it out the door to go to the colo most likely tomorrow 16:13 < havoc> and someone else is most likely to manage it, and would have fits just *hearing* that there's linux on it 16:14 < havoc> especially if there's no need 16:15 < havoc> I'm internal IT, my clients are morons ;) 16:19 -!- barefoot [n=magic@41.121.41.8] has joined ##openvpn 16:20 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Nick collision from services.] 16:20 -!- barefoot is now known as magic_1 16:21 -!- barefoot [n=magic@41.121.41.8] has joined ##openvpn 16:21 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Nick collision from services.] 16:22 -!- barefoot is now known as magic_1 16:23 < havoc> I wonder if it's worth it to allow multiple cert uses in this case? 16:26 < reiffert> there's just one client which is your company and the usual admin backdoor. 16:27 < havoc> yeah, but may be two of us connected at a time 16:27 < reiffert> o? 16:27 < havoc> and a few of us that may need access, although seldomly 16:27 < reiffert> so? 16:27 < havoc> so I'm thinking of just having one set of client keys we share 16:27 < havoc> and allowing multiple uses of those keys 16:28 < reiffert> I'd create a permanent link for running offsite backups. 16:29 < havoc> yeah, that'll be a seperate key 16:30 < havoc> what I do is add a client iface at the office gw/vpn box and MASQ it 16:30 < havoc> i.e. one way connections 16:31 < havoc> already a billion ifaces and shorewall zones there anyway, what's one more? :) 16:32 < reiffert> jup 16:41 < havoc> well, gonna find out how well 2.1.1 works on win2k8 16:41 < reiffert> it works on linux and OS X :) 16:43 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has joined ##openvpn 16:43 < yrashk> Hi! Is there any way to let client use connection to route all traffic to, without pushing this from the server? 16:44 < yrashk> !howto 16:44 < vpnHelper> yrashk: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 16:45 < reiffert> yrashk: yeah, put redirect-gateway def1 into your client conf. 16:45 < reiffert> !redirect 16:45 < vpnHelper> reiffert: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 16:47 < yrashk> !def1 16:47 < vpnHelper> yrashk: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 16:47 -!- kyrix [n=ashley@80-121-59-39.adsl.highway.telekom.at] has joined ##openvpn 16:54 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 17:04 -!- APTX| [n=APTX@ks32603.kimsufi.com] has quit [Read error: 60 (Operation timed out)] 17:04 -!- APTX| [n=APTX@ks32603.kimsufi.com] has joined ##openvpn 17:24 -!- Sky[x] [n=mihaaaa@tm.213.143.85.148.dc.telemach.net] has quit [] 17:29 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has quit [Read error: 54 (Connection reset by peer)] 18:04 -!- kidem [n=jmartina@207-255-244-013-dhcp.wrn.pa.atlanticbb.net] has joined ##openvpn 18:06 < kidem> has openvpn been ported to work with windows 7 64 bit and Checkpoint r65 vpn? 18:08 -!- g-ram [n=gsaathof@cpe-74-74-156-140.rochester.res.rr.com] has joined ##openvpn 18:09 < g-ram> hey all 18:10 < g-ram> question for anyone who might be out there 18:10 < reiffert> kidem: 18:10 < reiffert> !notovpn 18:10 < vpnHelper> reiffert: "notovpn" is "notopenvpn" is your problem is not about openvpn, and while we try to be helpful, you may have a better chance of finding your answer if you ask your question in a channel related to your problem 18:10 < g-ram> i just added another network interface that I don't want to interact with openvpn at all, and now I can't connect to vpn 18:10 < reiffert> damn, wrong answer. 18:10 < reiffert> !factoids search --values cisco 18:10 < vpnHelper> reiffert: No keys matched that query. 18:10 < g-ram> server's giving me a log message showing a tls handshare error 18:10 < reiffert> damn, wheres that cisco stuff? 18:10 < reiffert> kidem: openvpn works with openvpn and does not with anything else. 18:11 < g-ram> might be a coincidence but openvpn's been very stable for the last couple years and it just happened to go down immediately after adding that additional interface (which also happens to be eth0) 18:11 < g-ram> any ideas? 18:15 -!- kidem [n=jmartina@207-255-244-013-dhcp.wrn.pa.atlanticbb.net] has quit [Read error: 104 (Connection reset by peer)] 18:15 < g-ram> I'm also getting the following 2 messages in syslog 18:15 < g-ram> Jan 5 19:16:41 sed-server ovpn-server[7084]: 74.74.156.140:41684 Local Options hash (VER=V4): 'a2e63101' 18:15 < g-ram> Jan 5 19:16:41 sed-server ovpn-server[7084]: 74.74.156.140:41684 Expected Remote Options hash (VER=V4): '272f1b58' 18:15 -!- kidem [n=jmartina@207-255-244-013-dhcp.wrn.pa.atlanticbb.net] has joined ##openvpn 18:18 -!- kidem [n=jmartina@207-255-244-013-dhcp.wrn.pa.atlanticbb.net] has quit [Read error: 54 (Connection reset by peer)] 18:21 -!- kyrix [n=ashley@80-121-59-39.adsl.highway.telekom.at] has quit [Read error: 110 (Connection timed out)] 18:33 < g-ram> ok, I think I figured out part of the problem 18:33 < g-ram> openvpn is binding to the wrong ip on the server 18:37 -!- Hypnoz [n=colin@ip66-104-252-161.z252-104-66.customer.algx.net] has left ##openvpn [] 18:43 < g-ram> fixed 18:43 < g-ram> thanks guys :p 18:43 < g-ram> anybody awake in here? 18:46 < reiffert> no. 18:57 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 18:57 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit ["Leaving"] 18:57 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 18:58 < theDoc> hi all o/ 18:59 < Kas> :-) 19:08 -!- lt83850 [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [] 19:37 -!- fixUp [n=fixUp@89.242.96.208] has joined ##openvpn 19:38 < fixUp> Has anyone had any trouble with openvpn and packet shaping ? 19:39 < fixUp> I'm running a samba link which until recently was working with no problems at all, config has not changed on either client or server 19:39 < g-ram> fixUp: what kind of trouble are you having? 19:39 < g-ram> oh ok 19:39 < g-ram> did you change anything in samba? on your firewall? on the server? 19:39 < fixUp> g-ram: The reason I suspect packet shaping is that for small transfers it works fine, if I try and upload large files it chokes 19:40 < g-ram> what are you using for packet shaping? 19:40 < g-ram> iptables / tc? 19:40 < fixUp> g-ram: no, I suspect my ISP has started 19:40 < g-ram> ooh 19:40 < g-ram> it could well be your ISP 19:40 < g-ram> which ISP? 19:41 < g-ram> US based? 19:41 < fixUp> g-ram: no, UK based TalkTalk 19:41 < g-ram> sorry, no experience with them 19:41 < g-ram> but I would contact your ISP and ask 19:41 < g-ram> if you have a business connection they have no excuse for shaping your traffic 19:41 < g-ram> if you're using a residential connection . . . well 19:42 < fixUp> g-ram: what about in the US do any providers there specificly target openvpn ports ? 19:42 < g-ram> they might have a decent argument 19:42 < g-ram> well 19:42 < g-ram> large amounts of encrypted udp traffic would send up red flags 19:42 < g-ram> might be mistaken for encrypted torrent traffic 19:43 < Rienzilha> can it be a MTU issue? 19:44 < Rienzilha> like, is 'small transfer' < 1.5kB per request\/ 19:44 < Rienzilha> ? 19:45 < fixUp> Rienzilha: no, its more to do with sustained throughput 19:45 < Rienzilha> does throughput outside of the vpn work fine? 19:45 < fixUp> reiffert: can transfer a couple of megs or so and then it graduallys slows down and stalls 19:46 < Rienzilha> mmmh 19:46 < Rienzilha> some isp's throttle all connections 19:46 < fixUp> Rienzilha: you mean another service like ssh ? 19:46 < Rienzilha> no I mean transferring data from somewhere else (not over openvon) 19:46 < Rienzilha> openvpn* 19:47 < fixUp> I had an scp transfer do the same, but it was shortly after I tried the openvpn transfer 19:48 < Rienzilha> i'd recommend calling your isp, especially if it happens out of your vpn as well 19:50 < fixUp> Rienzilha: I think I will, the thing that seems strange is that it isnt just capped at 10 kb/s or whatever it just dies and comes up with a file copy error in windows, is there a setting I can change in openvpn perhaps to make it more robust ? 19:52 < Rienzilha> well if the transport under openvpn fails, openvpn will fail as well 19:54 < theDoc> Oh snap :) 20:01 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 20:04 -!- Yurik [n=yrashk@174-143-148-222.static.cloud-ips.com] has joined ##openvpn 20:07 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has quit [Read error: 110 (Connection timed out)] 20:12 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has joined ##openvpn 20:25 -!- fixUp [n=fixUp@89.242.96.208] has quit ["Lost terminal"] 20:30 -!- Yurik [n=yrashk@174-143-148-222.static.cloud-ips.com] has quit [Read error: 110 (Connection timed out)] 20:40 -!- tjz [n=tjz@unaffiliated/tjz] has joined ##openvpn 21:09 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 21:33 < ecrist> fuckers 21:48 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has quit [Read error: 110 (Connection timed out)] 21:49 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 22:02 < g-ram> ecrist: ? 22:31 -!- g-ram [n=gsaathof@cpe-74-74-156-140.rochester.res.rr.com] has quit [Client Quit] 22:31 -!- g-ram [n=gsaathof@cpe-74-74-156-140.rochester.res.rr.com] has joined ##openvpn 22:35 -!- g-ram [n=gsaathof@cpe-74-74-156-140.rochester.res.rr.com] has quit [Client Quit] 23:04 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 104 (Connection reset by peer)] 23:04 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 23:15 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 23:27 -!- Snypa [n=John@c-65-34-160-25.hsd1.fl.comcast.net] has joined ##openvpn 23:27 < Snypa> !howto 23:27 < vpnHelper> Snypa: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 23:29 < Snypa> hello 23:29 < Snypa> I'm in need of assistance can anyone help with my OpenVPN Issue? 23:30 < Snypa> !interface 23:30 < vpnHelper> Snypa: "interface" is (#1) paste interface configuration from both client and server, while being disconnected and when beeing connected. Be sure to also add the routing tables for both situations from client and from server, or (#2) in windows: ipconfig /all - unix: ifconfig -a , and for routing tables: netstat -rn 23:31 < Snypa> !route 23:31 < vpnHelper> Snypa: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 23:32 < Snypa> !configs 23:32 < vpnHelper> Snypa: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 23:42 -!- Snypa [n=John@c-65-34-160-25.hsd1.fl.comcast.net] has quit ["—I-n-v-i-s-i-o-n— 3.1.1 (June '09)"] --- Day changed Wed Jan 06 2010 00:09 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 00:31 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 00:51 -!- kyrix [n=ashley@80-121-4-219.adsl.highway.telekom.at] has joined ##openvpn 00:52 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 00:53 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has quit [Remote closed the connection] 01:10 -!- hyper_ch [n=hyper@8-10.3-85.cust.bluewin.ch] has joined ##openvpn 01:17 -!- kyrix [n=ashley@80-121-4-219.adsl.highway.telekom.at] has quit [Read error: 110 (Connection timed out)] 01:32 -!- platoali [n=platoali@91.99.2.81] has joined ##openvpn 01:32 -!- platoali [n=platoali@91.99.2.81] has quit [Remote closed the connection] 01:33 -!- platoali [n=platoali@91.99.2.81] has joined ##openvpn 01:35 < platoali> Hi, I've an openvpn server and a few windows client. The problem is I can't install any software on them. Is there anyway to connect these PCs to server? 01:37 -!- Leila [i=d9dae562@gateway/web/freenode/x-gcnrmabgtwwjaxwd] has joined ##openvpn 01:41 -!- cpg [n=amahi@c-24-4-39-26.hsd1.ca.comcast.net] has joined ##openvpn 01:41 < hyper_ch> why should the server be able to install software on the clients? 01:45 < platoali> hyper_ch: installing software is not possible for us. We have openvpn server but our clients cant install software on their system 01:45 < platoali> hyper_ch: I'm also looking for a solution that is more secure than pptp. 01:47 < platoali> hyper_ch: is there any way to make windows client connect to the openvpn server without any additional softwares? 01:50 < hyper_ch> you could slipstream openvpn into a windows isntaller cd then it would not require additional software anymore 01:51 < platoali> hyper_ch: acctually I don't have any control on my clients. they are located on different places 01:52 < platoali> hyper_ch: and we can tel them to install openvpn on their windows 01:52 < hyper_ch> well, if people want to use email, they'll have to install an email client 01:52 < hyper_ch> if people want to watch dvd they need to install the proper codecs 01:52 < hyper_ch> if people want to use vpn they also need according software 01:53 < platoali> I know. so the answere is No. another question, can openvpn work with pptp? 01:55 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 01:56 < platoali> hyper_ch: Thank you very much 01:57 < hyper_ch> no clue... don't even know what pptp is 02:02 < ecrist> platoali: OpenVPN, if not pre-installed, requires admin privs. 02:05 < platoali> ecrist: thank you. Is there any built in solution to connect windows clients to servers without any additional software? except pptp? 02:05 < ecrist> nope 02:05 < ecrist> none 02:06 < platoali> ecrist: thank you again 02:06 < ecrist> np 02:10 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [SendQ exceeded] 02:11 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 02:17 -!- jmm [n=jmm@LPuteaux-156-14-28-187.w82-127.abo.wanadoo.fr] has joined ##openvpn 02:27 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 02:30 < theDoc> !routebyapp 02:30 < vpnHelper> theDoc: "routebyapp" is if you want to send only certain apps over the VPN you need to run a socks server on the internal VPN subnet (see !sockd) then get an app like proxifier (google it) to selectively route traffic over the socks proxy based on port/app/subnet or any combination. 02:38 < ecrist> g'night 02:42 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 03:00 -!- toehio2 [i=3e0a418a@gateway/web/freenode/x-ixyhkbapgefivedo] has joined ##openvpn 03:06 -!- master_o1_master [n=master_o@p57B53C44.dip.t-dialin.net] has joined ##openvpn 03:18 -!- master_of_master [i=master_o@p57B571BE.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:19 -!- platoali [n=platoali@91.99.2.81] has quit [Remote closed the connection] 03:21 -!- Diffen [n=diffen@c-3672e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 03:25 -!- wedjat [n=wedjat@unaffiliated/wedjat] has joined ##openvpn 03:42 -!- dazo_afk is now known as dazo 03:47 -!- toehio2 [i=3e0a418a@gateway/web/freenode/x-ixyhkbapgefivedo] has quit ["Page closed"] 03:51 < reiffert> anyone remember Samuli's Nickname? 03:52 < mattock> I do, he's me :) 03:52 < mattock> I added it to my email signature a few moments back 03:52 < mattock> shoot 03:53 < reiffert> Ah, there it is, the signature :) 03:53 < mattock> great! 03:54 < mattock> let's see how much twitter spam I start receiving... 03:54 < reiffert> mattock: your proposal sounds good to me, a wiki sounds great in the first place. My 2nd thought was: Why change the community site at all and the 3rd one is: What about getting a trac which solves so many things alltogether? 03:54 < jmm> twitter spam, ew. that innovation. 03:55 < mattock> reiffert, we don't yet have a community site (I guess? :) and the web pages are terribly hard to update 03:55 < mattock> and Trac or similar is definitely an option 03:56 < reiffert> mattock: for those who didnt find it yet, the community site is at: http://openvpn.net/index.php/open-source.html 03:56 < vpnHelper> Title: Community Software Overview (at openvpn.net) 03:56 < reiffert> :) 03:57 < mattock> personally I don't like the look of Trac sites, but that's just my opinion... they look too much alike 03:57 < reiffert> mattock: Well, this can be changes with the help of a CSS guy. 03:57 < mattock> although Trac itself is a really nice application, I've used it a lot 03:57 < reiffert> changed 03:57 < mattock> yes, that's one good option 03:58 < mattock> everything's still open for discussion 03:59 < mattock> we may have to vote unless there's a clear winner 03:59 < mattock> :) 04:00 < reiffert> Do you think if the devel team is ready to switch their work to trac (or similar)? 04:01 < mattock> I'm not sure, first we need to free up some resources from Access server development 04:01 < mattock> that's the key 04:01 < reiffert> Just like I thought. 04:01 < mattock> software such as trac does not solve anything by itself, unfortunately ;) 04:02 < mattock> it's work in progress... going strong so far 04:02 < reiffert> So in principle James et al. stick to payware and you are looking out for a sane way to hand openvpn to others/free developers. 04:04 < mattock> not exactly, but along those lines... first separate the goals of OpenVPN and OpenVPN Access Server clearly. This allows more open OpenVPN (OSS) development without hurting Access server. Simultaneously free some of James' time to the OpenVPN (OSS) project. And reorganize the development model around OpenVPN so that it's (much) more community-oriented. Delegation of responsibility and all that 04:06 < reiffert> How far did the first step grow allready? 04:07 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 04:09 < mattock> I created a very rough outline of the goals (or mission statement) of Access server, but I need to discuss it with others. I also also drafted a mission statement for OpenVPN. However, getting approval from James for the change of development model is the key. 04:10 < mattock> I think it's going to happen, but I need to emphasize that we need to get it right from the start (from community management perspective) 04:10 < mattock> to James I mean 04:12 -!- hyper_ch [n=hyper@8-10.3-85.cust.bluewin.ch] has quit [Remote closed the connection] 04:12 -!- hyper_ch [n=hyper@8-10.3-85.cust.bluewin.ch] has joined ##openvpn 04:15 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has joined ##openvpn 04:16 < reiffert> mattock: Sounds good to me, let's do it :) 04:16 -!- Sky[x] [n=SkyB0x@88.200.89.23] has joined ##openvpn 04:17 < mattock> reiffert: I'm just writing an email to James (and Francis) about this issue. James has been very positive toward the changes to project organisation, but I have not received any definitive answers yet. 04:17 < mattock> pretty much everything is in order, we just need approval (and resources) from James 04:39 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has quit [Remote closed the connection] 04:39 -!- Yurik [n=yrashk@S010600179a2767ab.vc.shawcable.net] has joined ##openvpn 04:44 -!- keerthi [n=keerthi@nat2.maa.collab.net] has joined ##openvpn 04:44 < keerthi> Hi 04:46 -!- Yurik [n=yrashk@S010600179a2767ab.vc.shawcable.net] has quit [Read error: 104 (Connection reset by peer)] 04:46 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has joined ##openvpn 04:46 < keerthi> can anyone help me of my vpn issue 04:46 < keerthi> I could not able to ssh after I connect VPN and also ping 04:47 < dazo> keerthi: surely someone here will respond .... if you ask the question .... we're not so good with jeopardy games here ;-) 04:47 < keerthi> have setup a vpn server (used 2.1.1 version) using tun 04:48 < keerthi> from the server I am able to ssh.. etc.. to the local network 04:48 < keerthi> but from the client.. I am not able to do ssh 04:48 < Leila> how can connect to vpn server in linux from windows without install app programs in windos?? 04:49 < dazo> keerthi: sounds like either the routing is not setup, that IP forwarding is not enabled or that you have a firewall blocking the traffic 04:49 < keerthi> is enabled 04:50 < keerthi> /proc/sys/net/ipv4/ip_forward is 1 04:50 < keerthi> I did not set any iptables 04:50 < dazo> Leila: you need to install the openvpn client, together with configuration files and most probably some key files ... might be that OpenVPN AS got some tricks which does what you want, but we don't support that here 04:51 < keerthi> iptables was stopped 04:51 < dazo> keerthi: have you tried to use tcpdump on the ovpn server? To see where the traffic goes and if it goes back? 04:51 < keerthi> for which device 04:51 < dazo> that's usually the quickest way to pin-point where the trouble is 04:51 < Leila> dazo: no. i don't have allow to install programs in my clients 04:51 < keerthi> tun0 04:51 < keerthi> or eth0 04:51 < Leila> i have to use pptp client on my server 04:51 < keerthi> yes it going 04:51 < dazo> keerthi: both the eth for the internal network and the tun0 04:52 < keerthi> I tried before the setup was working 04:52 < dazo> Leila: pptp is not openvpn 04:52 < keerthi> but box got rebooted its not working 04:52 < Leila> yes. 04:52 < dazo> Leila: if you're enforced to use pptp ... you must use apps which supports that protocol .... openvpn uses it's own protocol 04:53 < Leila> how? 04:53 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has quit [Remote closed the connection] 04:54 < Leila> dazo: how do it? 04:54 < dazo> Leila: how? you need to use openvpn on the client against an openvpn server .... and pptp against pptp based servers .... if you control the openvpn server, you can probably install and setup a pptp server .... but I have no idea how to do that ... google is your friend then 04:55 < Leila> but i don't have 2 server 04:55 < dazo> keerthi: if it did work before the reboot .... something definitely changed .... probably some init scripts 04:55 < dazo> Leila: then you're out of luck 04:55 < dazo> Leila: anyhow ... openvpn and pptp server *software* may run on the same box 04:56 < Leila> dazo: ok tnx a lot. 04:56 < keerthi> from that box I could able to access ssh all the box 04:57 < dazo> keerthi: from the openvpn server? 04:57 < keerthi> I mean from vpn box I could able to access all the box 04:57 < dazo> keerthi: lets start from scratch again .... you have ----------- 04:58 < keerthi> If i set the push I cannot able to ping my LAN box 04:58 < keerthi> yes 04:58 < dazo> keerthi: could you pastbin configs? 04:58 < dazo> !configs 04:58 < vpnHelper> dazo: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 04:58 < dazo> !pastebin 04:58 < vpnHelper> dazo: "pastebin" is (#1) please paste anything with more than 5 lines into pastebin or a similar website, or (#2) ie: www.pastebin.ca 04:59 < keerthi> Redhat 5.3 04:59 < keerthi> kernel 2.6.18-164.9.1.el5 04:59 < keerthi> OpenVPN 2.1.1 05:01 < dazo> keerthi: PASTEBIN!!!! 05:01 < dazo> man you choke my irc by what you're doing now! 05:04 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 05:05 < keerthi> oops so sorry 05:06 < dazo> I'm *still* receiving your conifg 05:07 < keerthi> ok 05:07 < dazo> keerthi: it's too many comments in your config .... please read !config carefully .... esp. the "grep" command .... and pastebin it ... it's easier to understand what's happening ... client config will also be nice to have 05:08 < keerthi> ok I will paste what ever I enabled 05:10 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has joined ##openvpn 05:11 < |Mike|> keerthi: you could use the grep -Ve ... command 05:11 < Leila> dazo: no without install programs in windows 05:17 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 05:21 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Read error: 104 (Connection reset by peer)] 05:21 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 05:22 -!- magic_1 [n=magic@41.121.41.8] has joined ##openvpn 05:34 < Leila> dazo: ? 05:35 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 05:36 < havoc> morning 05:44 -!- Sky[x] [n=SkyB0x@88.200.89.23] has quit [] 05:46 -!- Sky[x] [n=SkyB0x@88.200.89.23] has joined ##openvpn 05:57 -!- Sky[x] [n=SkyB0x@88.200.89.23] has quit [] 05:57 -!- keerthi [n=keerthi@nat2.maa.collab.net] has quit ["leaving"] 06:00 -!- cpg [n=amahi@c-24-4-39-26.hsd1.ca.comcast.net] has quit [] 06:04 -!- Leila [i=d9dae562@gateway/web/freenode/x-gcnrmabgtwwjaxwd] has quit [Ping timeout: 180 seconds] 06:05 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 06:05 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 06:05 -!- Leila_ [i=d9dae562@gateway/web/freenode/x-srlkciqqflmzefeu] has joined ##openvpn 06:19 < dazo> Leila_: I don't follow you now .... if you cannot install any apps on your Windows box, you're forced to use PPTP which is native in Windows. In this case, you'll need to install a pptp service on your Linux box .... if you can't do that either .... you're basically lost 06:20 < dazo> Leila_: there are no way around this .... openvpn requires that software on server and on client .... PPTP requires PPTP software on server and client ... there's no other ways around this 06:22 -!- Leila [i=d9dae562@gateway/web/freenode/x-lszuoeqpwdlospyi] has joined ##openvpn 06:23 < Leila> dazo: ? 06:23 < dazo> Leila: I don't follow you now .... if you cannot install any apps on your Windows box, you're forced to use PPTP which is native in Windows. In this case, you'll need to install a pptp service on your Linux box .... if you can't do that either .... you're basically lost 06:23 < dazo> Leila: there are no way around this .... openvpn requires that software on server and on client .... PPTP requires PPTP software on server and client ... there's no other ways around this 06:23 < Leila> how do it? 06:24 -!- Leila_ [i=d9dae562@gateway/web/freenode/x-srlkciqqflmzefeu] has quit [Ping timeout: 180 seconds] 06:24 < dazo> Leila: how to do what? Do you read what I'm writing here? 06:24 < Leila> ye 06:25 < Leila> i have to install pptp client on my server? 06:25 < Leila> or pptp server? 06:25 < dazo> pptp server 06:25 < reiffert> Leila: openvpn works with openvpn. 06:25 < reiffert> Leila: pptp will not work with openvpn. 06:25 < Leila> ye 06:25 < dazo> Leila: I am by no means familiar with pptp .... here on this channel we only talk about openvpn .... openvpn is not pptp 06:25 < reiffert> Leila: openvpn will not work with pptp 06:26 < Leila> i installed openvpn client gui 06:26 < reiffert> Leila: good. Now follow the official oepnvpn howto. 06:26 < dazo> !howto 06:26 < vpnHelper> dazo: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 06:26 < Leila> and i onnected to openvpn server 06:26 < Leila> but my clients dont allow to install it 06:27 < reiffert> Leila: well, then you'll have to take something else. 06:27 < Leila> they have to connect to cpnserver in linux via win connections 06:28 < Leila> what do you i? 06:29 < dazo> Leila: if you cannot install openvpn on both server AND client ... you can forget about OpenVPN 06:29 < Leila> no fg 06:30 -!- ribasushi_ [n=rabbit@dslb-084-063-042-037.pools.arcor-ip.net] has joined ##openvpn 06:31 -!- ribasushi [n=rabbit@dslb-084-063-048-214.pools.arcor-ip.net] has quit [Read error: 60 (Operation timed out)] 06:37 -!- ribasushi_ is now known as ribasushi 06:39 -!- Leila [i=d9dae562@gateway/web/freenode/x-lszuoeqpwdlospyi] has left ##openvpn [] 06:39 < |Mike|> wtf is up with this: 06:39 < |Mike|> LANDEN="nederland duitsland belgie frankrijk" for land in $LANDEN; do echo "Ik ben nu in ${land}"; done 06:39 < |Mike|> o crap, its dutch lol 06:41 -!- Gilos [n=Gilos@kccsfw01.sec.sprint.net] has quit [Read error: 110 (Connection timed out)] 06:45 -!- flo|va-nu-pied [n=florent@85.69.202.243] has joined ##openvpn 06:46 < dazo> |Mike|: you're missing a semicolon in that line 06:52 < mithridates> !mac 06:52 < vpnHelper> mithridates: "mac" is Use Tunnelblick for the Mac. (http://code.google.com/p/tunnelblick/) 06:53 < |Mike|> dazo: oh dear, tnx :) 07:02 < ecrist> good morning 07:04 < havoc> morning 07:06 -!- rob0 [n=rob0@tuxaloosa.org] has joined ##openvpn 07:42 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has joined ##openvpn 07:48 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 60 (Operation timed out)] 07:52 -!- Rzewus [n=Rzewus@153.19.140.234] has quit [Read error: 60 (Operation timed out)] 08:01 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 08:25 -!- mort_gib [n=mjensen@16.Red-83-36-63.staticIP.rima-tde.net] has joined ##openvpn 08:30 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 08:37 -!- krphop [n=krphop@watch.out.the.feds.are.rightbehind.us] has quit ["Leaving"] 08:40 -!- krphop [n=krphop@38.108.177.113] has joined ##openvpn 08:45 -!- tjz [n=tjz@unaffiliated/tjz] has quit ["bbl"] 08:47 -!- krphop [n=krphop@38.108.177.113] has quit [Remote closed the connection] 08:50 -!- krphop [n=krphop@watch.out.the.feds.are.rightbehind.us] has joined ##openvpn 08:52 -!- Rzewus [n=Rzewus@153.19.140.234] has joined ##openvpn 08:54 -!- ecrist changed the topic of ##openvpn to: Forum with OpenVPN Technologies staff on Monday, Jan 11 at 1900UTC | OpenVPN 2.1.1 most current. | Type !welcome before asking your questions. 08:54 < ecrist> !welcome 08:54 < vpnHelper> ecrist: Error: "welcome" is not a valid command. 08:54 < ecrist> !learn welcome as We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 08:54 < vpnHelper> ecrist: Error: You don't have the factoids.learn capability. If you think that you should have this capability, be sure that you are identified before trying again. The 'whoami' command can tell you if you're identified. 08:55 < ecrist> !learn welcome as We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 08:55 < vpnHelper> ecrist: Joo got it. 08:56 < havoc> damn bots ;) 08:57 -!- Irssi: ##openvpn: Total of 94 nicks [0 ops, 0 halfops, 0 voices, 94 normal] 08:57 < rob0> What about the Tuesday meeting for development? Same bat time, same bat channel. 08:58 < ecrist> it was unclear to me as to whether there were going to be two meetings or he was confused. 08:58 < ecrist> doh, I should read the email subject 08:58 < ecrist> now it's clear 08:59 < rob0> Looked like two to me. The Tuesday one was only posted to openvpn-devel. 08:59 -!- ecrist changed the topic of ##openvpn to: OpenVPN Community Forum Monday, Jan 11 at 1900UTC | OpenVPN Development Forum Tuesday, Jan 12 at 1900UTC | OpenVPN 2.1.1 most current. | Type !welcome before asking your questions. 09:02 -!- ecrist changed the topic of ##openvpn to: OpenVPN Community Forum Monday, Jan 11 at 1900UTC (moderated) | OpenVPN Development Forum Tuesday, Jan 12 at 1900UTC (moderated) | To apply for +v for forums, email openvpn@secure-computing.net with registered nickname | OpenVPN 2.1.1 most current. | Type !welcome before asking your questions. 09:04 < krzee> ive been moving around timezones too much 09:06 < krzee> ok cool ill be in -4 on mon/tues 09:07 -!- lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 09:07 < rob0> My shell with IRC is in UTC, so I am usually well aware of UTC time, sometimes I know that better than my local time. :) 09:07 < ecrist> I get annoyed with UTC. I prefer GMT 09:07 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 09:08 < krzee> now im in -6, ill be in -8 late jan, then +10 til mid march 09:08 < theDoc> hey all, o/ 09:08 -!- lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Client Quit] 09:08 < ecrist> hey, theDoc 09:08 < rob0> +10, wow, a globetrotter! 09:09 < dazo> krzee: are you running away from someone? 09:09 < krzee> lol 09:09 < krzee> no 09:09 < theDoc> ergh, viscosity is crapping up again. 09:09 < theDoc> Seems like the latest version doesn't like or is able to import config files. 09:09 < krzee> i live in the caribbean, am visiting costa rica right now, headed back to cali to visit friends and family, then out to australia 09:10 < ecrist> I'm confused 09:10 < ecrist> nm 09:10 * ecrist shuts up 09:11 < rob0> Just so long as you keep your openvpn tunnel going from wherever you might be, all is well :) 09:11 < krzee> heheh howd ya know ;] 09:11 -!- Irssi: ##openvpn: Total of 95 nicks [0 ops, 0 halfops, 0 voices, 95 normal] 09:13 < theDoc> Any of you are on openvpn + mac? 09:14 < mithridates> theDoc: yes 09:14 < mithridates> theDoc: I have just installed a client on mac 09:14 < krzee> yup me too 09:14 < krzee> mac is my primary os 09:15 < mithridates> that's working fine 09:15 < theDoc> krzee> What do you use? Viscosity? 09:15 < krzee> a clickable shell script 09:15 < ecrist> theDoc: I use a mac as well 09:15 < krzee> which i leave in my stacks 09:15 < ecrist> Tunnelblick 09:15 < ecrist> !mac 09:15 < krzee> it starts all the openvpn's i want 09:15 < vpnHelper> ecrist: "mac" is Use Tunnelblick for the Mac. (http://code.google.com/p/tunnelblick/) 09:15 < mithridates> theDoc: Tunnelblick 09:15 < theDoc> Hm, tunnelblick? 09:15 < mithridates> yes 09:15 < theDoc> For some reason, my viscosity client is broken 09:15 < theDoc> That or it doesn't like my config files from as. 09:15 < krzee> to make a shell script clickable in osx just name it with .command extention 09:16 < theDoc> I have to investigate this, I have a license for it ;p 09:16 < ecrist> theDoc: I don't know that viscosity can connect to AS 09:16 < krzee> back when i tried tunnelblick is just wanted to crash nonstop 09:17 < theDoc> ecrist> Yep, it can. 09:17 < theDoc> However, something has changed with 10.5 09:17 < ecrist> krzee: it's been stable for me for ~3 years 09:17 < theDoc> I used it with 10.6 09:17 < theDoc> I'm going to investigate and figure out exactly why the hell it refuses to import my connections now 09:17 < krzee> but honestly i dont get why a gui is needed for openvpn on osx, my shell script does just fine for me 09:17 < ecrist> I've run it on 10.4, 10.5 and 10.6 09:17 < krzee> hrm i believe i was trying on 10.4 and it had no love 09:17 < theDoc> krzee> Are you on 10.5 or 6? 09:18 < ecrist> krzee: it allows for easy selection of which vpn to start/stop in my case. I have different vpns I connect to depending on what I'm doing. 09:18 < krzee> 10.5 on laptop, 10.6 on desktop 09:18 < krzee> my shell script does as well, but i guess the gui is more of a realistic solution for that 09:19 < reiffert> uh oh, krzee has made a shell script 09:19 * reiffert runs 09:19 < krzee> hahahah 09:19 < reiffert> :) 09:20 < krzee> hey man ive made a lot of useful shell scripts, some even accepted by communities (ie: google: krzee iodine dns ) 09:20 < krzee> !google krzee iodine dns 09:20 < vpnHelper> krzee: TipsAndTricks – iodine: ; iodine: ; NStun.sh - DoesHosting.com - Nobody Does Hosting Better: 09:21 -!- mort_gib [n=mjensen@16.Red-83-36-63.staticIP.rima-tde.net] has quit ["Leaving"] 09:21 < krzee> :-p 09:22 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has joined ##openvpn 09:22 < krzee> and that 3000+ line beast made me a hero at work ;] they wanted something to do that for a long time but never saw it as possible 09:22 < ecrist> *cough* ssl-admin 09:22 < krzee> oh god i fubar'ed that one right up 09:22 < krzee> =[ 09:22 < theDoc> krzee> Do you happen to own doeshosting? ;) 09:23 < krzee> that was totally not a job for bash 09:23 < krzee> yes theDoc but its not a company anymore, i closed it like 3 yrs ago 09:23 < theDoc> ah, slow business? 09:24 < krzee> nah i left america and didnt want responsibility to customers 09:24 < krzee> so i closed all my businesses 09:24 < theDoc> Bummer. 09:24 < krzee> *shrug* i enjoy it 09:24 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has left ##openvpn [] 09:25 < theDoc> This is very odd. 09:25 < theDoc> I need to get a viscosity developer. 09:25 < theDoc> There's no real reason why their new software version breaks imports of AS config files on 10.5 09:25 < theDoc> I got it working on 10.6 09:26 < krzee> even when i still accept side work that comes my way (instead of passing it on) i let the people know that if their side lags and i cant do things on my timeline (usually i grind away and finish fast then disappear) then they may need to wait for me to resurface again 09:26 < krzee> if only they knew they could always find me here, lol 09:26 < ecrist> I know where to find you, sucka 09:27 < krzee> lol 09:27 < krzee> to an extent that is true 09:27 < krzee> but we're friends =] 09:27 < reiffert> ecrist: I dont think irc newbies will understand what it means to register at a nickserv. 09:27 < ecrist> indeed 09:28 < krzee> !google register freenode nickserv 09:28 < ecrist> reiffert: irc newbies won't need +v :) 09:28 < vpnHelper> krzee: freenode: frequently-asked questions: ; How to Register a User Name on Freenode: 12 steps - wikiHow: ; NickServ Is Your Friend « staffblog: 09:28 < reiffert> Have "/msg ecrist I want voice" at the topic 09:28 < ecrist> will set that during time of forum 09:28 < reiffert> ecrist: what about all those james and other irc dontusers? 09:28 -!- Rzewus [n=Rzewus@153.19.140.234] has quit ["leaving"] 09:29 < dazo> they have 5 days to discover it 09:29 < ecrist> info the openvpn folks I can get with a host mask 09:29 < ecrist> s/info // 09:29 < reiffert> ecrist: is your nick capable of receiving messages from non registered users? 09:30 < ecrist> reiffert: you don't need to send an email, we'll make sure you get +v 09:30 < ecrist> yes 09:30 < reiffert> 'k 09:30 < krzee> hey should the doc i write next be chaining vpns or a !redirect writeup? 09:30 < theDoc> krzee> Chaining, it'll be fun. 09:30 < ecrist> redirect 09:30 < ecrist> it's the most asked question in here 09:30 < reiffert> both 09:30 < dazo> krzee: chaining would be fun ... but redirect is more a relevant topic, both here and on ML 09:31 < krzee> hrm ya dazo and ecrist i guess you're right 09:31 < dazo> \o/ 09:31 < krzee> but chaining would be more fun theDoc ;] 09:31 < krzee> oki its time for me to go be useful, be back in like 15 hrs, lol 09:31 < reiffert> what is chaining at all? 09:32 < reiffert> route deployment, like routing protocols? 09:32 < reiffert> multiple nat, what are we talking abou? 09:32 < krzee> hooking vpn's to eachother in a manner that you talk to the first and you can tunnel from 1 to another to another to another as many as you want, choosing which machine to pop out of on the fly 09:32 < theDoc> krzee> Chains are utterly fun ;) 09:32 < krzee> its actually how i learned enough to write the !route doc 09:33 < theDoc> !route 09:33 < vpnHelper> theDoc: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 09:33 -!- dauergast [n=sag@g227138123.adsl.alicedsl.de] has joined ##openvpn 09:33 < reiffert> krzee: so client->server1->server2->server3? 09:33 < krzee> after teaching myself how to chain them (which had nothing written about it) i decided a decent routing doc for ovpn needed to be written 09:33 < krzee> client - server - client - server - client - server 09:33 < reiffert> krzee: what if server2 pops out? 09:33 < krzee> each client machine connects to 2 servers 09:33 < reiffert> ah 09:34 < reiffert> let's have a routing protocol? 09:34 < krzee> *shrug* machines i use rarely go down 09:34 < krzee> and i wanted it routed like that 09:34 < reiffert> krzee: vpnHelper goes down quite often. 09:34 < krzee> ironic isnt it? ;) 09:34 < ecrist> LOL 09:34 < reiffert> :) 09:35 < reiffert> afk 09:35 < krzee> anyways i need to go prove i was the right dude to bring to costa rica 09:35 < havoc> mmm, routing 09:35 < krzee> bbl 09:35 < havoc> I learned most of what I know about routing from the Shorewall author, not all, but most 09:35 < havoc> the guy's a networking genius 09:36 < rob0> Drink all the likka down in Costa Rica 09:37 < rob0> ain't nobody's business but yo' own ... 09:46 -!- MadTBone [n=MadTBone@160.39.238.196] has joined ##openvpn 09:52 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 09:54 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit [Read error: 60 (Operation timed out)] 10:01 -!- Steve973 [n=Steve@169.130.18.10] has joined ##openvpn 10:02 < Steve973> hello. If I want to give vpn clients access to another network accessible to the server, is it necessary to have a POSTROUTING MASQUERADE rule in iptables? 10:03 < Steve973> I have a push route in the server config 10:05 -!- jmm [n=jmm@LPuteaux-156-14-28-187.w82-127.abo.wanadoo.fr] has quit [Read error: 60 (Operation timed out)] 10:05 < ecrist> likely 10:06 < ecrist> either the other network needs to know how to route the packets, or they need to be natted 10:07 < Steve973> ok, thanks 10:07 < Steve973> that is the piece I'm likely missing 10:07 < rob0> NAT is ugly and can/should be avoided in most if not all RFC 1918 networks. Just learn how to route it. 10:08 -!- polaru [n=polaru@93.113.192.70] has quit [Read error: 104 (Connection reset by peer)] 10:08 * ecrist agrees 10:08 < Steve973> i haven't done that before. do you have any documentation to which you might point me, please? 10:09 < havoc> !route 10:09 < vpnHelper> havoc: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 10:18 < Steve973> ok, I don't have lans behind clients, so shouldn't the push "route 192.168.1.0 255.255.255.0" be sufficient? The 192.168.1.0/24 lan is behind the openvpn server. 10:19 < dazo> Steve973: sounds correct 10:20 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 10:20 < Steve973> i'll post what I assume is the relevant sections of my openvpn config and my iptables config. Maybe I'm missing something obvious... 10:22 < Steve973> http://pastebin.com/m2a2c6c30 10:22 < Steve973> let me know if i can provide any more config info 10:23 < Steve973> openvpn is working (can ping the ovpn server) but i just can't get to machines on the lan behind ovpn 10:23 < Steve973> by the way, I also tried -I instead of -A and the result was the same for me 10:24 < Steve973> pinging something on the 192.168.1.x network yielded a response from the openvpn server that the destination is unreachable 10:25 < Steve973> ip forwarding is set to 1, also 10:31 < rob0> The LAN machines are using the openvpn server as their gateway? 10:34 < Steve973> nah, don't need them to be a gateway. just need them to be able to access them... SSH for example 10:35 < Steve973> i think i misread your quesiton 10:37 < Steve973> yes, the 192.168.1.x lan is sitting behind the openvpn server, which is their gateway 10:39 -!- hyper_ch [n=hyper@8-10.3-85.cust.bluewin.ch] has quit [Remote closed the connection] 10:40 -!- nneul [n=nneul@infinity.srv.mst.edu] has joined ##openvpn 10:44 < rob0> Okay, I just looked at the paste; if you only want related/established connections from VPN hosts, that is what you should expect. VPN clients [probably] can't initiate connections to LAN hosts, according to the snippet you pasted. Neither can they connect to the VPN server. Why did you want a VPN? So the server and LAN hosts could reach the clients? 10:46 -!- nneul [n=nneul@infinity.srv.mst.edu] has quit ["Leaving"] 10:46 < Steve973> we want a vpn so that we can access the lan machines directly after authenticating. The machines on this lan cannot face the internet directly 10:46 -!- erpel_ [n=erpel@f050092131.adsl.alicedsl.de] has joined ##openvpn 10:47 < Steve973> the clients need to be able to reach the lan machines directly. 10:48 < ecrist> sounds simple enough 10:48 < rob0> You didn't allow that in the rules you pasted, so I'm guessing that a later rule or policy blocks that. 10:48 < Steve973> any idea what I'm doing wrong? I'm following the docs, and I'm definitely reading them as opposed to skimming them 10:48 < Steve973> the iptables INPUT commands that the faq mentions won't work either 10:49 < Steve973> yeah, rob0, or that 10:50 -!- nneul [n=nneul@infinity.srv.mst.edu] has joined ##openvpn 10:50 < nneul> !welcome 10:50 < vpnHelper> nneul: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 10:50 -!- Gilos [n=Gilos@kccsfw01.sec.sprint.net] has joined ##openvpn 10:53 < ecrist> nneul: you get a gold star for reading /topic 10:54 * rob0 was thinking the same thing :) 10:54 < dunc> :) 10:55 < rob0> Does the bot have a web page listing all factoids? 10:55 < rob0> if not, I think it would be a good idea 10:55 < nneul> unfortunately, I have a mtg I have to run to, I do have a question about stability/keepalives problem I've seen (and sent a note to devel list about). will ask once i get back from mtg. 10:55 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 60 (Operation timed out)] 11:09 < ecrist> rob0: not at this time 11:09 < ecrist> at some point, if I'm not too busy, I"m in process of writing a new bot 11:09 < ecrist> such interfaces will be possible with the new bot 11:10 < ecrist> although, the current bot does keep all those factoids in sqlite db, so I could just write an interface... 11:10 < ecrist> I'll consider it after I'm done writing the nagios plugin 11:21 < rob0> There's a similar bot in #postfix, nick is knoba, owner is Signum, if you're interested in how he did it. 11:23 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 11:28 < ecrist> did it with supybot, which is what vpnHelper is 11:30 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 11:33 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 11:39 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit ["I am off"] 11:39 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 11:47 -!- hyper_ch [n=hyper@84.226.234.60] has joined ##openvpn 11:55 < ecrist> reiffert: folks on the mailing list don't like the idea of moderated forum 11:56 -!- Irssi: ##openvpn: Total of 98 nicks [0 ops, 0 halfops, 0 voices, 98 normal] 11:58 < havoc> they can deal 11:59 < havoc> they don't have to babysit or fight spam 12:03 -!- magic_1 [n=magic@41.121.41.8] has quit [Remote closed the connection] 12:04 -!- magic_1 [n=magic@41.121.41.8] has joined ##openvpn 12:06 < ecrist> http://sourceforge.net/mailarchive/forum.php?thread_name=1262799221.18178.2%40mofo&forum_name=openvpn-devel 12:06 < vpnHelper> Title: SourceForge.net: OpenVPN: openvpn-devel (at sourceforge.net) 12:10 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 12:10 < Kas> ecrist: I agree with these guys. What is your opinion on that? 12:11 < ecrist> I'm formulating a response now. 12:12 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has quit ["Leaving"] 12:12 < rob0> I'd suggest play it by ear. Give out +v's in advance, but only silence the channel if it seems too hectic. 12:14 < ecrist> I'm open to ideas. 12:14 < ecrist> I just know that this channel has, in the past, gotten pretty nasty. :) 12:14 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [SendQ exceeded] 12:15 < ecrist> +v in advance and +m if needed works for me. 12:15 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 12:15 < ecrist> we've waited a considerable time to get openvpn devs involved with the community and I'd like it to go smooth. 12:16 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 12:16 < havoc> this channel hasn't seemed all that bad, but I'm sure I've just missed the nastiness 12:16 -!- wedjat [n=wedjat@unaffiliated/wedjat] has left ##openvpn [] 12:19 -!- Steve973 [n=Steve@169.130.18.10] has quit [Read error: 110 (Connection timed out)] 12:22 -!- ecrist changed the topic of ##openvpn to: OpenVPN Community Forum Monday, Jan 11 1900UTC | OpenVPNn Development Forum Tuesday, Jan 12 1900UTC | OpenVPN 2.1.1 most current. | Type !welcome before asking your questions. 12:22 < ecrist> we'll roll with preemptive +v and play it by ear. 12:22 < ecrist> Kas: does that suit you folks? 12:23 < Kas> Looks good to me :-) 12:24 < ecrist> whoever was asking for it, I'll look at making factoids DB available on a web page 12:24 < ecrist> link will be on http://secure-computing.net/openvpn.php 12:24 < vpnHelper> Title: SCN: ##openvpn Policy (at secure-computing.net) 12:32 < dazo> ecrist: I'n on the way out ... even though I do see your worries, I'd say we should probably try to keep it really open this time and see how that goes. I'm sure you know some quick ways to gain control if something really goes bad, and then introduce your initial idea 12:32 < nneul> question I had on openvpn stability/keepalives - ran into an issue recently with UDP based bridging setup - openvpn currently has no way to detect unidirectional link 12:32 -!- dwalluck [n=david@adsl-75-27-144-92.dsl.wlfrct.sbcglobal.net] has joined ##openvpn 12:33 < nneul> I had thrown a note together to devel list about a ping+response patch I put together, but ran into implementation issues with how outbound packet gets queued 12:33 < dwalluck> Trying to use openvpn from windows, I get an OpenSSL error about AES-256-CBC cipher missing. I am not sure if I have the right build of openssl, maybe missing strong crypto? 12:33 < nneul> Never heard anything back on devel list, was hoping to get some feedback/thoughts on the best way to address it. 12:34 < havoc> ecrist: put the link in vpnHelper's /whois info? 12:36 < ecrist> havoc: will look into it 12:36 < ecrist> /msg chanserv info ##openvpn has some links, though 12:36 * dauergast ist jetzt AWAY |grund: auto-AWAY nach 180 min idle-zeit| 12:36 -!- dauergast is now known as dauergast|wech 12:38 -!- dazo is now known as dazo_afk 12:49 < nneul> dwalluck: have you tried issuing "openvpn --show-ciphers" on command line to see the list of available ciphers - that will tell you if you have a limited openssl. 12:49 -!- hyper__ch [n=hyper@adsl-89-217-25-187.adslplus.ch] has joined ##openvpn 12:49 -!- hyper_ch [n=hyper@84.226.234.60] has quit [Nick collision from services.] 12:49 -!- hyper__ch is now known as hyper_ch 12:56 < dwalluck> nneul: actually that cipher is listed there :/ 12:57 < nneul> well, that's just odd... 12:57 < nneul> what happens if you issue "openssl ciphers" - is it in that list as well? 12:57 -!- corretico__ [n=laguilar@201.201.46.106] has joined ##openvpn 12:58 < ecrist> dwalluck: logs? 12:58 < ecrist> !logs 12:58 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 12:58 -!- Irssi: ##openvpn: Total of 97 nicks [0 ops, 0 halfops, 0 voices, 97 normal] 13:00 < nneul> ecrist: any suggestion as to who might be able to help with some internal openvpn code questions? 13:03 < ecrist> nneul: as of this time, we aren't directly associated with OpenVPN staff. there are some staff members here, and we're working on getting some developers in here, though. 13:03 < ecrist> I would suggest the devel mailing list 13:03 < nneul> yeah, unfortunately, got no reply there at all... 13:04 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 13:04 < ecrist> I would suggest just asking your questions here, and see if you get a response. 13:05 < nneul> Well, the basic problem I'm seeing is that openvpn can't detect a unidirectional link - I tried adding code to do a request/reply ping keepalive, which mostly works, 13:05 < nneul> however, there is an issue with how packets are generated/output in the main event loop in the openvpn code. 13:05 < nneul> It "looks" like it's queuing a packet for output, but the problem is that the code appears to be written to allow queueing only ONE packet. 13:06 < nneul> Any other attempt just stomps over the first one. With a timing driven packet generation (ping/pong), this occurs pretty frequently. 13:07 < nneul> I thought of a few approaches to possibly address it, but wanted to see if I'm just interpreting things wrong, or if this really is a flaw in how the main event loop/packet send/recv is implemented. 13:12 < ribasushi> is there some sort of bug-tracker or something? 13:12 < ribasushi> I have sent messages to openvpn-user and openvpn-devel 13:12 < ribasushi> filed a debian bug 13:12 < ribasushi> not a single response so far 13:13 < ribasushi> (I know it's the holidays but still) 13:14 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Connection timed out] 13:17 -!- corretico__ [n=laguilar@201.201.46.106] has quit [Connection timed out] 13:22 < ecrist> those are some of the issues that are to be discussed on monday and tuesday 13:28 -!- dauergast|wech [n=sag@g227138123.adsl.alicedsl.de] has quit ["Die häufigsten Männerlügen:- Aber natürlich liebe ich Dich!- Klar, die Alimente habe ich gestern überwiesen!- Nein, blas ruhi] 13:31 < ecrist> 218 factoids in the database. I'm writing a php script to display it now. not sure it'll get done today, though. 14:05 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 14:08 -!- pa [n=pa@unaffiliated/pa] has quit ["Sto andando via"] 14:09 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 14:23 -!- eliasp_ [n=quassel@HSI-KBW-095-208-170-144.hsi5.kabel-badenwuerttemberg.de] has joined ##openvpn 14:33 -!- JackW [n=jack@95.16.21.75] has joined ##openvpn 14:34 < ecrist> havoc: was it you looking for factoids dump? 14:34 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Success] 14:36 < havoc> ecrist: nope 14:36 * ecrist scrolls up 14:37 < ecrist> rob0: I have the factoids dump available 14:37 < ecrist> http://www.secure-computing.net/factoids.php 14:37 < vpnHelper> Title: SCN: vpnHelper Factoids (at www.secure-computing.net) 14:37 < rob0> nice 14:37 < ecrist> I need to clean it up, but it gets the data out 14:39 < ecrist> there, now it wraps correctly 14:39 < ecrist> I will get rid of the nasty borders at some point and colorize the output 14:39 < ecrist> do we care 'who' added a given factoid? 14:40 < rob0> as admin you might, as user, ?? 14:40 < ecrist> as admin, I'll just use sqlite from command line. 14:41 < rob0> It's not rendering right in links :( 14:42 < rob0> keys do not seem to be associated with the values 14:42 < rob0> but hey, it's a start 14:46 < ecrist> cleaned up coloring 14:46 < ecrist> will check it in lynx 14:47 < ecrist> rob0: not sure why output is so ugly in lynx. keys *are* associated with facts, but the first factoid has no key 14:47 < ecrist> don't know how that happened. 14:47 -!- nneul [n=nneul@infinity.srv.mst.edu] has quit ["Leaving"] 14:47 -!- hyper_ch [n=hyper@adsl-89-217-25-187.adslplus.ch] has left ##openvpn ["Konversation terminated!"] 14:50 < ecrist> !factoids 14:50 < vpnHelper> ecrist: Error: "factoids" is not a valid command. 14:51 < ecrist> !learn factoids as A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 14:51 < vpnHelper> ecrist: Joo got it. 14:55 -!- eliasp [n=quassel@HSI-KBW-095-208-170-144.hsi5.kabel-badenwuerttemberg.de] has quit [Connection timed out] 14:56 -!- pa [n=pa@unaffiliated/pa] has joined ##openvpn 14:56 < ecrist> rob0: unless you find a major bug, that web page isn't going to change any time soon. ;) 14:58 < rob0> I'll look it over when I get time, thanks 14:58 < rob0> got to get real world work done this afternoon 15:04 < bytesaber_> when i make or sign keys, it asks you quetsions like their company name, hostname, email addy, etc. 15:04 < bytesaber_> am I supposebly answer quetsions of their company or mine? 15:05 < ecrist> yours, really, for a vpn 15:05 < bytesaber_> ok 15:06 < bytesaber_> not sure what the questions intent is 15:06 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 15:06 < bytesaber_> if i'm making a key for another company, in order to invite them into my lan, sign everything with my companies info, and make up a common name to represent "them" ? 15:08 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 15:10 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has quit [] 15:16 < ecrist> rob0: you're right, the keys/data don't seem to be matched up 15:16 < ecrist> will need to look into it 15:21 -!- magic_1 [n=magic@41.121.41.8] has quit [] 15:22 < ecrist> silly SQL typo, got it fixed 15:27 -!- dauergast [n=sag@g227138123.adsl.alicedsl.de] has joined ##openvpn 15:27 -!- dauergast [n=sag@g227138123.adsl.alicedsl.de] has quit [Remote closed the connection] 15:28 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 15:28 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 15:35 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 15:37 < pfo> is there an active openvpn server web interface project out there anyone cares sharing info about? 15:37 < pfo> doesn't have to be anything fancy 15:50 < cybertron> hm think only in combination wither wrt oder firewall projects 15:50 < cybertron> wither=with 15:50 < cybertron> oder=or ^^ 16:05 -!- JackW [n=jack@95.16.21.75] has quit [Read error: 60 (Operation timed out)] 16:30 -!- JackW [n=jack@95.16.21.75] has joined ##openvpn 16:30 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] 16:32 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has joined ##openvpn 16:35 < yrashk> Hi, I have a somewhat strange problem with OpenVPN. I am running it on a (rackspace cloud's) Ubuntu 9.10 VPS to connect VPN clients to external IPs attached to that VPS. It works fine, however if I disconnect a client, then wait for up to 3 hours, connect this client, it is not reachable from the outside network (for example, ping does not work and no icmp requests received on tunX). However, if I stop OpenVPN, bring eth0:X up, ping th 16:35 < yrashk> again and connect VPN client, everything works fine — i.e. cient becomes reachable 16:35 < yrashk> I got it repeated this way 4 times in a row 16:36 < yrashk> Rackspace's support is blaming OpenVPN configuration I use. Is there any possible way to figure out why this above scenario is happening in my setup? 16:37 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 16:40 -!- ruied [n=ruied@bl8-61-251.dsl.telepac.pt] has joined ##openvpn 16:55 -!- JackW [n=jack@95.16.21.75] has quit [Read error: 113 (No route to host)] 17:00 -!- erpel_ [n=erpel@f050092131.adsl.alicedsl.de] has quit ["This computer has gone to sleep"] 17:07 -!- Nappy [n=nappy@123-247.97-97.tampabay.res.rr.com] has joined ##openvpn 17:28 -!- eliasp_ [n=quassel@HSI-KBW-095-208-170-144.hsi5.kabel-badenwuerttemberg.de] has left ##openvpn ["http://quassel-irc.org - Chat comfortably. Anywhere."] 17:31 -!- hyper_ch [n=hyper@adsl-89-217-25-187.adslplus.ch] has joined ##openvpn 18:07 -!- Diffen [n=diffen@c-3672e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 18:55 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 18:55 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 19:00 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 19:30 < krzie_> (these are for me) 19:30 < krzie_> !hmadc 19:30 < vpnHelper> krzie_: Error: "hmadc" is not a valid command. 19:30 < krzie_> !hmac 19:30 < vpnHelper> krzie_: "hmac" is (#1) The tls-auth directive adds an additional HMAC signature to all SSL/TLS handshake packets for integrity verification. Any UDP packet not bearing the correct HMAC signature can be dropped without further processing. The tls-auth HMAC signature provides an additional level of security above and beyond that provided by SSL/TLS., or (#2) openvpn --genkey --secret ta.key to make the 19:30 < vpnHelper> krzie_: tls static key , in configs: tls-auth ta.key # , 1 for client or 0 for server in the configs 19:30 < krzie_> !mitm 19:30 < vpnHelper> krzie_: "mitm" is (#1) http://openvpn.net/index.php/documentation/howto.html#mitm to know about stopping Man-in-the-Middle attacks by signing the server cert specially, or (#2) use !servercert to generate the server cert manually or use the easy-rsa build-key-server script to build your server certificates, or (#3) then use: ns-cert-type server in the client config 19:30 < krzie_> !route 19:30 < vpnHelper> krzie_: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 19:30 < krzie_> !tcp 19:30 < vpnHelper> krzie_: "tcp" is Sometimes you cannot avoid tunneling over tcp, but if you can avoid it, DO. Why TCP Over TCP Is A Bad Idea: http://sites.inka.de/~bigred/devel/tcp-tcp.html 19:33 < krzie_> !sample 19:33 < vpnHelper> krzie_: "sample" is (#1) http://www.ircpimps.org/openvpn.configs for a working sample config, or (#2) DO NOT use these configs until you understand the commands in them, read up on each first column of the configs in the manpage (see !man) 19:34 -!- corretico__ [n=laguilar@201.201.46.106] has joined ##openvpn 19:35 < reiffert> ? 19:47 -!- ruied [n=ruied@bl8-61-251.dsl.telepac.pt] has left ##openvpn [] 19:52 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 19:59 -!- tazdevil [n=tazmania@224.46.50.60.kmr04-home.tm.net.my] has joined ##openvpn 20:00 < tazdevil> Can I use openvpn to configure ipsec, pptp, and l2tp connection? 20:00 < tazdevil> I wanted to use openswan but came across openvpn 20:01 < tazdevil> are openswan and openvpn the same 20:03 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 20:09 < theDoc> tazdevil> No. 20:10 < tazdevil> reading through the wikipedia. also found strongswan but don't know which is the best to go with in implementing ipsec client within the router 20:21 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 110 (Connection timed out)] 20:21 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["This computer has gone to sleep"] 20:22 -!- theDoc [n=hex@119.73.165.162] has joined ##openvpn 20:36 < Kasx> tazdevil: What kind of router are you trying to setup ipsec on? 20:37 < tazdevil> Kasx: 3G or PPPoE wireless router 20:37 < Kasx> Linksys? 20:37 < tazdevil> no 20:37 < tazdevil> it's based on an old powerpc >10 years old 20:37 < Kasx> Ahh, I see. 20:38 < Kasx> What is your main purpose for setting up a VPN? 20:38 < tazdevil> corporate use over multi clients 20:38 < tazdevil> customer's request 20:38 < Kasx> How many users? 20:38 < tazdevil> nationwide 20:38 < tazdevil> across UK 20:39 < Kasx> What is the general OS platform that they will be using to connect to the VPN? 20:39 < tazdevil> did not have get much detail from them 20:39 < Kasx> What os are you running on the powerpc? Linux? 20:39 < tazdevil> for the time being, they just want to know if we can support vpn client, mainly ipsec, within the router 20:40 < tazdevil> yes, Linux 2.6 20:40 < Kasx> Well OpenVPN is different than ipsec (better IMO) 20:40 < Kasx> It should serve the same purpose as Ipsec though. 20:40 < tazdevil> is it compatible with ipsec? 20:41 < Kasx> Do they alreayd have an existing ipsec system? 20:41 < tazdevil> AFAIK, the customer has already had the systems (servers) setup somewhere in UK 20:41 < tazdevil> and it does only IPSec 20:41 < Kasx> Gotcha, than Openswan is probably your best bet. 20:42 < Kasx> Don;t have much experience with it though. 20:42 < tazdevil> i see. I am also reading Strongswan 20:42 < tazdevil> What is OpenVPN mainly for, in general? 20:43 < tazdevil> I have installed OpenVPN, OpenSwan, pptp, xl2tp, ipsec on my fedora machine 20:43 < Kasx> It is just another VPN Platform. With excellent support :-) 20:44 < Kasx> OpenVPN is a true SSL VPN 20:46 < tazdevil> I tried to setup a node using OpenVPN on fedora and during the setup, I was asked for so many things. Certificates and some questions that I do not have a clue 20:46 < tazdevil> OK, so in your opinion, I should stay away from OpenVPN 20:46 < tazdevil> and use OpenSwan or StrongSwan instead 20:48 < tazdevil> based on wikipedia, OpenVPN is not compatible with IPsec or any other VPN package 20:49 -!- lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has joined ##openvpn 20:49 < Kasx> You are correct it isn't. You could get it to work with them if you needed. It does ask you a low of question initially, but it is very stable. I would reccomend giving it another shot actually. 20:49 < Kasx> *alot 20:50 < tazdevil> but the customer insists on using IPSec 20:50 < Kasx> You could run an ipsec server and an openvpn server. Just make sure the machine you have the openvpn server running on has a client connection to the ipsec server and push the routes from the ipsec server to the openvpn clients 20:50 < Kasx> Are they aware of the other solutions? 20:51 < tazdevil> I am not sure. The IT guy from the company doesn't want to tell us much on their current system 20:52 < tazdevil> don't think they want to run another openvpn server, that's my observation 20:52 -!- lt83850c [i=lt83850@c-24-127-180-91.hsd1.pa.comcast.net] has quit [Client Quit] 20:54 < Kasx> Gotcha, well than go with ipsec if that what they want. It doesn;t sound like you have much of a choice :-) 20:55 < tazdevil> true... after all, I am only an engineer and customers are always right :) 20:55 < tazdevil> and the bosses are only interested to know if the whole thing can be done in less than 24 hours 20:55 < Kasx> lol, yep, sounds about right! 20:57 < tazdevil> Kasx: Thanks. but during my free time, I will try OpenVPN at home. 20:57 < Kasx> Please do. Once you get it working, you will be hooked!!! 20:58 < tazdevil> haha 20:58 < Kasx> Ask the other 92 people in this channel. They will most likley agree. :-) 20:59 < tazdevil> I will ask in openswan and strongswan to see what they say about openvpn :-) 21:00 < theDoc> ovpn? Pretty darn awesome. 21:05 -!- Gnewt [n=hackerle@li57-94.members.linode.com] has joined ##openvpn 21:06 < Gnewt> I currently have a server-client config with a CA... in my configs is a directive "ifconfig 10.8.0.1 10.8.0.2" 21:06 < Gnewt> I'd like to add another client to the OpenVPN network 21:06 < Gnewt> with some different configuration to push 21:06 < Gnewt> What's the way to do this? 21:09 < tazdevil> hmm... why does openvpn channel has 2 x ## instead of a single #? 21:37 < krzie_> because its not official, thats how freenode denotes official channels vs non-official 21:37 -!- krzie_ is now known as krzie 21:38 < krzie> Gnewt: 21:38 < krzie> !ccd 21:38 < vpnHelper> krzie: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 21:38 < Gnewt> That's perfect. 21:38 < Gnewt> Thank you! 21:38 < krzie> np 21:40 < krzie> randomness, a guy i met IRL today asked if i knew anything about openvpn, his problem was related to getting lans behind openvpn to route 21:40 < krzie> LOL 21:40 < krzie> i couldnt stop from laughing out loud before helping him 21:41 < havoc> nice 21:41 < havoc> krzie: what is your connection to openvpn? 21:41 < krzie> i help people with it 21:41 < havoc> are you an author? 21:41 < krzie> hehe 21:41 < havoc> ah 21:41 < Gnewt> What about custom DNS names inside the VPN? Is there a config for that too? 21:41 < krzie> !pushdns 21:41 < vpnHelper> krzie: "pushdns" is (#1) push "dhcp-option DNS a.b.c.d" to push dns to the client, or (#2) http://thread.gmane.org/gmane.network.openvpn.user/25139/focus=25147 see that mail archive for some info on pushing dns, or (#3) http://article.gmane.org/gmane.network.openvpn.user/25149 for a perm fix via regedit 21:42 < krzie> if in unix you need a script to deal with the pushed dns entry 21:42 < Gnewt> So I'd basically need to push DNS to my server and then make custom entries? 21:42 < krzie> in windows many report issues, those links can help if you have the issues 21:42 < krzie> well ya, lol 21:43 < Gnewt> So if I wanted serenity.vpn to resolve to one of my VPN clients would I just put that in the hosts file? 21:43 < Gnewt> er, no, I'd have to put that in my BIND wouldn't I? 21:43 < krzie> either would work 21:44 < krzie> its not a vpn question really 21:44 < Gnewt> Ah ok 21:44 < krzie> its a standard resolution question 21:44 < Gnewt> Thanks :) 21:44 < krzie> np 21:44 < Gnewt> I'll do some Googling 21:44 < havoc> /etc/hosts works fine on the vpn/dns server depending on /etc/resolv.conf 21:45 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [] 21:45 -!- Matir [n=david@c-98-251-88-239.hsd1.ga.comcast.net] has joined ##openvpn 21:45 < Gnewt> But if my clients are querying 10.8.0.1 for DNS, it'd go straight to BIND right? 21:45 < havoc> Gnewt: not necessarily 21:46 < havoc> Gnewt: if 10.8.0.1 is the dns server, its hosts file can override bind, even locally installed bind, if resolv.conf says to 21:47 < Gnewt> Cool 21:48 < Gnewt> I'm sorry for continuing on a non-OpenVPN related topic, but where would I put hosts file precedence in resolv.conf? 21:48 < havoc> first/top? 21:48 < Gnewt> Sorry I shoulda phrased that better 21:49 < Gnewt> _how_ do I get my resolv.conf to choose my host file? Syntax wise. 21:49 < havoc> man resolv.conf ? 21:49 < havoc> I'd have to too, likely 21:50 < havoc> I'd just give you the answer if I had it, I just know where to look to find the info 21:51 < Gnewt> No problem, it's just that the resolv.conf manpage is unclear. I'll look around. 21:51 < Gnewt> It may just work :P 21:58 < havoc> ok, google now that you know what you're looking for? 22:00 < Gnewt> Yep 22:10 < rob0> um, that's /etc/nsswitch.conf that controls the precedence of hosts(5) over DNS. 22:11 -!- tjz [n=tjz@bb121-7-11-34.singnet.com.sg] has joined ##openvpn 22:12 < rob0> and named(8) itself never consults hosts, so it will only answer with real DNS data. 22:27 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 22:53 -!- Leila [i=d9dae562@gateway/web/freenode/x-unbarfnwtzfgxdtt] has joined ##openvpn 22:59 < ecrist> krzie: you around? 23:04 < krzee> yupyup 23:04 < krzee> just got back to the hotel 23:04 < krzee> thinking the hot tub sounds reeeeal nice 23:10 < krzee> whats up bro? 23:11 < ecrist> !factoids 23:11 < vpnHelper> ecrist: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 23:11 < ecrist> that's what's up 23:12 < ecrist> also, if you hadn't, note the channel topic 23:13 < krzee> OH HELL YES @ !factoids 23:13 < krzee> some arent complete 23:13 < krzee> !wintaphide 23:13 < vpnHelper> krzee: "wintaphide" is (#1) in regedit find HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E972-E325-11CE-BFC1-08002bE10318} then Look through each sub-key for one with a DriverDesc = TAP-Win32Adapter V8 . Set Characteristics = 0x89, or (#2) To show again, set it to 0x81 23:13 < ecrist> hope you don't mind, I've got a cron that pulls the db to my web server every 3 hours 23:13 < krzee> it only shows #2 23:13 < ecrist> yeah, there are bugs, but i'll work them out 23:13 < krzee> no i actually totally love it 23:14 < ecrist> also, http://secure-computing.net/openvpn.php 23:14 < vpnHelper> Title: SCN: ##openvpn Policy (at secure-computing.net) 23:14 < ecrist> I will work on smoothing out the layout, was just using some templates I had laying around 23:15 < ecrist> but, I'm off to bed. see you tomorrow 23:15 < krzee> very nice stuff dude 23:15 < krzee> very very 23:15 < krzee> loving that dump, tried a shot at it myself awhile ago 23:15 < krzee> didnt work and i got lazy 23:17 < krzee> gnite 23:36 < theDoc> Bad bad bad headache. 23:36 < theDoc> Maybe it wasn't a wise idea to stay up all night last night playing with dynagen 23:38 -!- jaek_ [n=jaek@c-71-202-163-230.hsd1.ca.comcast.net] has joined ##openvpn 23:38 < jaek_> once logged in, i can ping the nsserver (192.168.1.1) but the nslookups are timing out 23:39 < jaek_> anyone know what i must have wrong? 23:44 < theDoc> !welcome 23:44 < vpnHelper> theDoc: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 23:46 < jaek_> !route 23:46 < vpnHelper> jaek_: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 23:54 < jaek_> not the right one... i'm not bridging networks 23:54 < jaek_> !howto 23:54 < vpnHelper> jaek_: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 23:58 < jaek_> the dns server gets pushed to the client, but the client cant do any lookups 23:59 < jaek_> even tho it can ping the dns server --- Day changed Thu Jan 07 2010 00:01 < jaek_> will dns traffic not travel over vpn unless using redirect-gateway? 00:02 -!- Matir [n=david@c-98-251-88-239.hsd1.ga.comcast.net] has quit [Connection timed out] 00:02 -!- tazdevil [n=tazmania@224.46.50.60.kmr04-home.tm.net.my] has left ##openvpn ["Leaving"] 00:04 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 00:04 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["This computer has gone to sleep"] 00:27 -!- hyper_ch [n=hyper@adsl-89-217-25-187.adslplus.ch] has quit [Remote closed the connection] 00:50 -!- theDoc [n=hex@119.73.165.162] has joined ##openvpn 00:52 -!- Matir [n=david@c-98-251-88-239.hsd1.ga.comcast.net] has joined ##openvpn 01:07 -!- hyper_ch [n=hyper@54-59.1-85.cust.bluewin.ch] has joined ##openvpn 01:11 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["This computer has gone to sleep"] 01:15 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 01:31 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 01:45 -!- jaek_ [n=jaek@c-71-202-163-230.hsd1.ca.comcast.net] has quit [Read error: 110 (Connection timed out)] 01:45 -!- jaek_ [n=jaek@c-71-202-163-230.hsd1.ca.comcast.net] has joined ##openvpn 01:54 -!- kyrix [n=ashley@80-121-4-195.adsl.highway.telekom.at] has joined ##openvpn 02:01 -!- MrJK [n=jezu@194.199.166.96] has quit [Read error: 104 (Connection reset by peer)] 02:10 -!- dazo_afk is now known as dazo 02:15 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 02:26 < krzee> !dns 02:26 < vpnHelper> krzee: "dns" is Level3 open recursive DNS server at 4.2.2.1 02:27 < krzee> !learn dns as Google open recursive DNS server at 8.8.8.8 02:27 < vpnHelper> krzee: Joo got it. 02:27 < reiffert> :) 02:27 < krzee> sup reif 02:27 < krzee> you see !factoids ? 02:27 < reiffert> !factoids 02:27 < vpnHelper> reiffert: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 02:27 < krzee> ecrist made it 02:27 < krzee> it rocks 02:27 < reiffert> oh, thats nice! 02:28 < reiffert> is it uptodate all the time? 02:28 < reiffert> no, it's not. 02:28 < krzee> its not showing multiple entries per factoid yet, but hes still playing with it 02:28 < krzee> nah its updated by a cronjob 02:28 < reiffert> ah 02:30 < krzee> !learn rules as http://secure-computing.net/openvpn.php for the channel rules! 02:30 < vpnHelper> krzee: Joo got it. 02:31 < krzee> that page isnt done yet either 02:42 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 02:50 < krzee> from ircstats 02:50 < krzee> 3 Apr 2009 11:43 oh well. 02:50 < krzee> 11:43 ecrist: you called me a troll a while back. But now YOU are behaving like troll. 02:50 < krzee> 11:43 *** mjt was kicked by ecrist (ecrist) 02:50 < krzee> LOL 02:50 < krzee> thats classic 02:50 < reiffert> :) 02:51 < reiffert> !irclogs 02:51 < vpnHelper> reiffert: "irclogs" is (#1) http://www.secure-computing.net/logs/openvpn.txt.gz (updated every half hour, on the half-hour, when ecrist is online.), or (#2) http://www.secure-computing.net/logs/openvpn.html for the stats, or (#3) http://www.secure-computing.net/logs/openvpn-last30.html for stats from the last 30 days. 02:53 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:54 < krzee> The evil guard of ##openvpn was ecrist who got this reputation after kicking out 21 people. 02:54 < krzee> Example: 23:55 < krzee> muncher or the anal? 02:54 < krzee> 00:00 -!- krzee was kicked from ##openvpn by ecrist [ecrist] 02:54 < krzee> hahahahah another classic 02:59 < reiffert> krzie DIDN'T REALISE HOW ANNOYING THIS WAS - 12 lines in CAPS! 02:59 < reiffert> Example: 22:20 < krzie> "NO SUPPORT FOR ACCESS SERVER" 02:59 < reiffert> :) 03:00 < krzee> weird it shows to me like this: 03:01 < krzee> krzie forgot to turn off the CAPS-lock, writing 112 lines in CAPS. 03:01 -!- MadTBone [n=MadTBone@160.39.238.196] has quit [Remote closed the connection] 03:01 < reiffert> THE BOTS ARE RIGHT ALL THE TIME! 03:02 < krzee> huh? 03:02 -!- master_o1_master [n=master_o@p57B53C44.dip.t-dialin.net] has quit [Read error: 60 (Operation timed out)] 03:03 < reiffert> if the bot says you didnt turn off CAPS, well then it's supposed to be right :) 03:03 < krzee> what bot? 03:03 < reiffert> the irclogs bot 03:04 < krzee> a crontabbed log analyzer counts as a bot? 03:05 < reiffert> cron calls itself a daemon.. 03:06 -!- master_of_master [i=master_o@p57B55916.dip.t-dialin.net] has joined ##openvpn 03:07 < krzee> yes, it does =] 03:07 < jaek_> does compression help thruput? 03:08 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 03:08 < krzee> jaek_, depending on what os being transfered over the tunnel it can 03:08 < krzee> what is being* 03:08 < reiffert> jaek_: depends on what you pipe through. 03:08 < jaek_> i'm mostly transferring already compressed data (rar files mostly) 03:08 < krzee> then no 03:08 < jaek_> ah cool... wont bother with it then 03:09 < jaek_> man openvpn is totally changing my workflow 03:09 < reiffert> ? 03:09 < jaek_> all my machines now are clients... so i can client-to-client communicate with all of them 03:10 < jaek_> i used to use reverse ssh tunnels 03:10 < krzee> oh ya you're lovin ovpn 03:11 < krzee> heheh 03:11 < jaek_> server runs on my router 03:12 < reiffert> jaek_: so compromising one of your maschines grants access to your local network too? 03:13 < jaek_> yup... it kinda does 03:14 < jaek_> even running a client on my phone 03:14 < krzee> please tell me you arent using tap too 03:14 < jaek_> no, tun 03:14 < reiffert> using tap is so much fun... 03:14 < jaek_> is that what will let me route dns requests? 03:15 < jaek_> cus right now i couldnt get dns lookups to work 03:15 < krzee> nope 03:15 < reiffert> jaek_: tap is layer 3. 03:15 < krzee> umm 03:15 < krzee> no 03:15 < reiffert> I should get coffeee. 03:15 < krzee> heheh 03:15 < reiffert> it's layer 2. 03:15 < jaek_> how low level is dns? 03:16 < krzee> dns is layer 4 i guess 03:16 < reiffert> 5 i'd say 03:16 < jaek_> it just uses udp? 03:16 < krzee> maybe 5 dunno 03:16 < krzee> havnt paid attention to stuff besides 2 and 3 for awhile now as far as whats what 03:16 < krzee> standard dns queries just use udp, zone xfers use tcp 03:17 < krzee> maybe you want this: 03:17 < krzee> !pushdns 03:17 < vpnHelper> krzee: "pushdns" is (#1) push "dhcp-option DNS a.b.c.d" to push dns to the client, or (#2) http://thread.gmane.org/gmane.network.openvpn.user/25139/focus=25147 see that mail archive for some info on pushing dns, or (#3) http://article.gmane.org/gmane.network.openvpn.user/25149 for a perm fix via regedit 03:17 < krzee> its time for me to crash out, gotta be at an office in like 5 hrs 03:17 < krzee> gnite 03:18 < jaek_> yeah i had that working, but the actual lookups from the client was timing out 03:18 < jaek_> even tho i could ping the DNS server 03:18 < krzee> !dns 03:18 < vpnHelper> krzee: "dns" is (#1) Level3 open recursive DNS server at 4.2.2.1, or (#2) Google open recursive DNS server at 8.8.8.8 03:18 < krzee> try one of those 03:19 < jaek_> well, the point was to use my router's dns server... it has all my hosts 03:19 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has joined ##openvpn 03:20 < reiffert> start tcpdump and watch the dns queries getting to you and back. 03:20 < jaek_> question about scp performance from within the vpn 03:20 < jaek_> is it going to double encrypt the data? 03:20 < jaek_> and cause a substantial performance overhead? 03:21 < jaek_> i'll try the tcpdump in a few 03:34 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 03:54 -!- buntfalke_ is now known as buntfalke 03:54 < buntfalke> Hi 03:55 < buntfalke> Does anyone know of a .deb-repository where the packages are built with the v6-patches? 03:56 < dazo> jaek_: DNS uses UDP or TCP ... it's pure application layer 03:56 < dazo> DNS uses TCP for bigger transfers, like zone dumps 03:57 < dazo> or ... can use ... is the proper wording 03:58 < dazo> buntfalke: I believe it's in the testing repo .... I know the maintainer sent some updates there around when 2.1.0 was released 03:58 < dazo> or was it called unstable .... I don't recall now 03:59 < buntfalke> dazo: Which "testing repo"? 03:59 * dazo digs up some old mails 03:59 < buntfalke> Are you referring to Debian Testing (aka Squeeze)? 04:00 < dazo> most probably ... I'm not a debian user .... but he added one of my patches into Debian as well, that's why I know a little bit 04:01 < buntfalke> dazo: is this the patch? http://patch-tracker.debian.org/patch/series/view/openvpn/2.1.0-1/jjo-ipv6-support.patch 04:01 < vpnHelper> Title: Patch information for openvpn (2.1.0-1) jjo-ipv6-support.patch (at patch-tracker.debian.org) 04:01 < dazo> "Debian Developers upload to unstable (Sid), ten days after that (if no 04:01 < dazo> serious bugs appear) the package migrates to testing (squeeze, right 04:01 < dazo> now) and from time to time (~2 years) testing becomes stable." 04:02 < dazo> ^^ that's the explanation I got 04:02 < dazo> buntfalke: yeah, that looks like it 04:02 < buntfalke> Then it doesn't quite do the trick for me. Are we talking about the same thing? I am lookig for IPv6-over-the-Tun, not IPv6-to-the-server 04:03 < buntfalke> I'm still getting Options error: Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:1: {ifconfig,route}-ipv6 even though this patch is in debian 04:03 < dazo> buntfalke: aha ... I'm not sure I've ever seen any IPv6-over-tun .... but you can use tap device managing that now 04:04 < buntfalke> Well, if it was my server, yes ;-) University only provides v6-over-tun 04:04 < buntfalke> Well, I'll digg some more. 04:05 < dazo> buntfalke: If you'll find the patches for ipv6-over-tun ... I'm interested in having a look at them .... as your university obviously must have managed something, doing that 04:07 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [] 04:09 -!- Leila [i=d9dae562@gateway/web/freenode/x-unbarfnwtzfgxdtt] has quit [Ping timeout: 180 seconds] 04:09 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [SendQ exceeded] 04:10 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 04:12 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 04:13 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 04:14 < buntfalke> dazo: They should be on the ML, as they are meant to become part of (one of the next) the next release(s) 04:14 < buntfalke> Seems like someone keeps pulling the plug... :-) 04:15 < dazo> buntfalke: hmmm .... I can't say I recall that ... but my memory can be selective of what it wants to remember from time to time ;-) 04:17 < buntfalke> I didn't check that by myself either, the guy from our edpc said they're trying to get it up into mainline 04:27 < dazo> aha 04:31 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [] 04:39 -!- JackW [n=jack@95.16.21.75] has joined ##openvpn 04:44 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 04:50 -!- savenger [n=savenger@p5792E4CD.dip.t-dialin.net] has joined ##openvpn 04:52 < savenger> Hi everyone... I want to give specific clients a static ip address. The openvpn documentations says e.g. to give Thelonius an ip addr of 10.9.0.1 I have to put the line "ifconfig-push 10.9.0.1 10.9.0.2" into the file Thelonius inside the ccd-dir. What does the second paramater of ifconfig-push mean? (10.9.0.2) 04:53 < hyper_ch> I don't know 04:53 < hyper_ch> I just accepted that and it works :) 04:57 < kyrix> savenger, i dont remember quite well, but wasnt it the mask? 04:58 < savenger> kyrix: yes, that would make sense.... 04:58 < savenger> hyper_ch: lol 04:59 < rob0> !ifconfig 04:59 < vpnHelper> rob0: "ifconfig" is usage: ifconfig l rn | Set TUN/TAP adapter parameters. l is the IP address of the local VPN endpoint. For TUN devices, rn is the IP address of the remote VPN endpoint. For TAP devices, rn is the subnet mask of the virtual ethernet segment which is being created or connected to. 04:59 < rob0> ifconfig-push is similar 05:00 < savenger> rob0: thanks... 05:02 < savenger> rob0: So, if my server had tun and ip 10.9.0.1 and I had Thelonius, that should have 10.8.0.128, I would write "ifconfig-push 10.8.0.128 10.8.0.1", right? 05:03 < buntfalke> dazo: I've asked for the specific patches, URLs and so on. let's see what the reply will look like. 05:06 -!- Briareos1 [n=B@13-98-136-94.static.net4you.net] has joined ##openvpn 05:06 < Briareos1> is there a reason to not use the road-warrior "server" also for site-to-site connection? 05:15 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 54 (Connection reset by peer)] 05:16 < rob0> 10.8.0.1 ? 05:18 < rob0> Briareos1, I just figure if I'm already running a server at at least one of the sites, might as well use it. But a static key (peer mode) is simpler to set up and maintain. 05:19 -!- Briareos1_ [n=B@13-98-136-94.static.net4you.net] has joined ##openvpn 05:20 < rob0> Also, with TLS, the keys expire, so there's not the theoretical brute force vulnerability, nor the potential that an attacker could have cached all your traffic in the hopes of eventually getting the key. 05:20 -!- Briareos1 [n=B@13-98-136-94.static.net4you.net] has quit [Read error: 104 (Connection reset by peer)] 05:20 < savenger> rob0: I mean 10.8.0.1 if my server had also 10.8.0.1 05:21 < rob0> (Neither of those are real world concerns.) 05:24 < dazo> rob0: even with a static key, I believe temporary session keys are being generated exchanged as well ... but of course, if you capture the handshake process (which mostly happens in clear text), with a brute forced key (or stolen static key) you'll be able to retrieve the temporary session keys, and then decrypt the core traffic as well 05:27 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has quit ["This computer has gone to sleep"] 05:28 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 05:34 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 05:45 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 05:49 -!- Leila [i=d9dae562@gateway/web/freenode/x-yrmakuviqwdiqtrs] has joined ##openvpn 05:50 -!- openvpnhater [n=sonupunn@82.109.74.162] has joined ##openvpn 05:50 < Leila> is it possible connect to openvpn server in linux from clients in windows without install openvpn client gui???/ 05:51 < reiffert> yep. 05:52 < Leila> how? 05:55 < reiffert> run the openvpn binary from the command line 05:55 < reiffert> or right click on the .ovpn file and choose "connect" or similar 05:55 < reiffert> Think it's "Open this file with openvpn" or something 05:56 -!- Briareos1_ [n=B@13-98-136-94.static.net4you.net] has quit [Read error: 110 (Connection timed out)] 05:58 -!- Leila [i=d9dae562@gateway/web/freenode/x-yrmakuviqwdiqtrs] has quit [Ping timeout: 180 seconds] 05:58 < openvpnhater> hello all..could i ask if anyone knows what the status=1 messages mean in the logs after the initial connection is established 05:58 -!- Leila_ [i=d9dae562@gateway/web/freenode/x-jmavkbigfuseheyi] has joined ##openvpn 05:58 < openvpnhater> the log files show me zobbo/90.210.88.136:55092 SENT CONTROL [zobbo]: 'PUSH_REPLY,route-gateway 192.168.112.254,ifconfig 192.168.112.230 255.255.255.0' (status=1) 06:00 < openvpnhater> i could connect and ping before but now have cannot ping machines on network once vpn in 06:00 -!- openvpnhater is now known as sppadicus 06:00 -!- flo|va-nu-pied [n=florent@85.69.202.243] has quit [Remote closed the connection] 06:00 < sppadicus> sorry-just been a crazy day so far trying to debug the messages in the logs 06:00 -!- flo|va-nu-pied [n=florent@85.69.202.243] has joined ##openvpn 06:01 < mithridates> hey guys 06:02 < mithridates> how can I set an account to be assigned just for a specific computer 06:02 < mithridates> ? 06:02 < mithridates> for example how can I set MAC access list for openvpn clients? 06:02 < Leila_> i want connect openvpn server in linux from client in windows without install openvpn gui 06:02 < Leila_> how? 06:03 < sppadicus> mithridates: i believe there is an --lladdr address 06:03 < sppadicus> Specify the link layer address, more commonly known as the MAC address. Only applied to TAP devices. 06:03 < mithridates> !lladdr 06:03 < vpnHelper> mithridates: Error: "lladdr" is not a valid command. 06:04 < mithridates> sppadicus: but I don't use TAP , I use TUN device in my server 06:04 < sppadicus> ahhh mithridates oops 06:06 < sppadicus> vpnHelper: could i ask if u have come across PUSH_REPLY (status=1) messages in the logs before? 06:06 < vpnHelper> sppadicus: Error: "could" is not a valid command. 06:07 < mithridates> I don't wanna let users access to connect by other computers or devices to my server via same certificates 06:08 < sppadicus> vpnHelper: sorry just been stressed trying to debug the openvpn logs 06:08 < vpnHelper> sppadicus: Error: "sorry" is not a valid command. 06:09 < sppadicus> i have hit a bot 06:10 < sppadicus> mithridates: u shud take out duplicate-cn in ur config file 06:10 < sppadicus> to prevent multiple clients connecting with same cert 06:10 < mithridates> !duplicate-cn 06:10 < vpnHelper> mithridates: Error: "duplicate-cn" is not a valid command. 06:10 < mithridates> !duplicate 06:10 < vpnHelper> mithridates: Error: "duplicate" is not a valid command. 06:17 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has joined ##openvpn 06:24 < mithridates> !factoids search duplicate 06:24 < vpnHelper> mithridates: No keys matched that query. 06:25 < mithridates> !factoids search duplicate_cn 06:25 < vpnHelper> mithridates: No keys matched that query. 06:25 -!- sppadicus [n=sonupunn@82.109.74.162] has left ##openvpn [] 06:26 -!- Leila_ is now known as Leila 06:27 -!- sppadicus [n=sonupunn@82.109.74.162] has joined ##openvpn 06:29 < dazo> Leila: you asked this question yesterday .... you will not get any different answers from anyone here, even today 06:31 < dazo> Leila: and I told you that OpenVPN Access Server _might_ have such a feature ... but nobody have confirmed this ... and OpenVPN AS is not supported here 06:31 < dazo> mithridates: what exactly are you trying to do? 06:32 < mithridates> I have more than 100 clients ( I will have) 06:32 < Leila> dazo: ok tnx a lot. 06:33 < mithridates> I want to stop them to connect by other computers to openvpn server 06:33 < dazo> mithridates: so you want the openvpn clients to be hard limited to a physical device? 06:33 < mithridates> yes 06:33 < mithridates> exactly 06:34 < dazo> mithridates: aha ... that's a very tricky one ... OpenVPN do not have any such limitations ... the tun devices do not have MAC addresses, and the MAC address on tap devices are easy to modify 06:36 < dazo> mithridates: you most probably would need to develop some extra software which needs to be run on the clients, which could be run via --up in the client configs 06:36 < mithridates> wait 06:36 < dazo> mithridates: this software would then collect the needed information which you would like to use to identify the client hardware ... and send this information to the server via the tunnel 06:37 < dazo> mithridates: and then the server could allow traffic to pass via the firewall ... or it could disconnect the client from the server 06:38 < mithridates> just a minute 06:38 < dazo> sure 06:39 < sppadicus> anyone got any ideas about status=1 messages in logs after connection is initiated 06:42 < sppadicus> also keep getting messsages in the logs saying that multiple connections even though its just me disconnectinga nd connecting back again 06:46 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has joined ##openvpn 06:47 < Diffen> Hello. Im running openvpn on a single-nic server. The server is connected straight to internet. Im using tun, my problem is that i dont get any ip on the vpn-client. Anyone that have any nice ideas on what i have missed out in the config file? 06:50 < ecrist> good morning. 07:01 < dazo> !configs 07:01 < vpnHelper> dazo: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 07:01 < dazo> Diffen: ^^^ 07:01 < dazo> !pastebin 07:01 < vpnHelper> dazo: "pastebin" is (#1) please paste anything with more than 5 lines into pastebin or a similar website, or (#2) ie: www.pastebin.ca 07:02 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 07:03 < Diffen> dazo will do 07:04 < Diffen> http://pastebin.com/m3bc21bcc 07:05 < dazo> Diffen: I'm not too responsive this afternoon (CET) ... but please paste it here ... several skilled people are following the channel and will give input of they see something 07:05 < Diffen> dazo no problems :D im trying around to see if i can manage to get it working 07:05 < dazo> Diffen: trust me ... you'll manage that ;-) 07:06 < dazo> you might also to share some logs as well 07:06 < dazo> !logs 07:06 < vpnHelper> dazo: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 07:06 < dazo> diffen ^^ 07:06 < Diffen> hmm sorry but how to i set verb to 6? 07:07 < dazo> in server and client configs .... add verb 6 ;-) 07:07 < Diffen> will do 07:07 < dazo> even though verb 4 might be enough, usually 07:07 < dazo> Diffen: btw ... you have verb 3 in your server config ... 07:08 < Diffen> yes saw that now 07:11 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 07:11 -!- Leila [i=d9dae562@gateway/web/freenode/x-jmavkbigfuseheyi] has left ##openvpn [] 07:15 < Diffen> http://pastebin.com/m16df804 updated one now dazo. 07:16 < Diffen> im a worthless on tunnelblick so i cant get it connected to my openvpn. earlier i used another vpn client but im to cheap to buy it :D 07:17 < dazo> Diffen: I'd like to see server log .... not status log ;-) .... have a look at --log in the man page 07:17 < Diffen> ahh 07:17 < Diffen> sorry my bad 07:23 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 07:24 < mithridates> dazo: which software can do that job? 07:24 < mithridates> openvpn? 07:25 < dazo> mithridates: you'll probably need to write it yourself 07:25 < dazo> mithridates: openvpn do not .... but openvpn can trigger such software to be run 07:26 < mithridates> what about duplicate_cn which a user in this channel said 07:26 -!- sppadicus [n=sonupunn@82.109.74.162] has left ##openvpn [] 07:27 < Diffen> http://pastebin.com/m7d12d12 new information dazo :D 07:27 < Diffen> at the bottom 07:28 < dazo> Diffen: and do you also have the client log as well? 07:28 < dazo> Diffen: at first sight, it looks pretty good at the server side 07:29 < Diffen> the only thing i get from tunnelblick is the thing that says tunnelblick log. im pretty sure i messed up the config on the tunnelblick 07:29 < rob0> mithridates, these are (will be) remote clients? You won't see their MAC if you're not on a common, directly-connected segment. 07:30 < Diffen> dazo thats good to hear :D 07:31 < ecrist> looks like I need a little more complicated algorithm to parse the factoids database 07:33 < mithridates> rob0: yes these are remote clients 07:33 < dazo> mithridates: duplicate-cn will only allow multiple users connecting from several clients using the same certificate .... if you want to bind the connection allowance to the physical hardware, you'll need authenticate the hardware somehow ... this is not possible to manage with the current openvpn versions at all ... you'll need to establish a connection, send over some extra auth-data to your own hw-auth service and then let this piece decid 07:33 < dazo> e what to do - disconnect the client or accept it by opening up in the firewall on-the-fly 07:34 < mithridates> oh I understood what you said 07:34 < rob0> Frankly, I am doubtful that it will be easy (or useful) to come up with a way to validate the hardware. 07:34 -!- Irssi: ##openvpn: Total of 100 nicks [0 ops, 0 halfops, 0 voices, 100 normal] 07:35 < ecrist> wow, 100 people in here 07:35 < mithridates> so if I use certificate in the current way , two users are not able to connect by same certificate in a same time 07:35 < mithridates> am I right? 07:35 < mithridates> ecrist: :d yes 07:37 -!- Guest32140 [n=sec@dslb-092-073-151-028.pools.arcor-ip.net] has joined ##openvpn 07:37 < Guest32140> hi there 07:38 -!- Guest32140 is now known as thordon 07:40 < mithridates> are clients able to use same certificate in the same time? 07:54 -!- sporedi [n=chatzill@121.247.65.116] has joined ##openvpn 07:55 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 07:55 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 07:55 < sporedi> what could be reson when i run ip xfrm monitor i get blank /zero output ,sorry i am new to vpn 07:56 < sporedi> !welcome 07:56 < vpnHelper> sporedi: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 07:56 < dazo> mithridates: without duplicate-cn ... only one user with the given certificate can connect simultaneously 07:57 < ecrist> !ccd 07:57 < vpnHelper> ecrist: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 07:58 < ecrist> krzee: I've corrected the factoids dump page 07:58 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has quit [Read error: 60 (Operation timed out)] 07:59 < mithridates> dazo: thank you man, :D that's the enough limitation that I have needed 08:00 < ecrist> dazo: !factoids 08:00 < dazo> ecrist: I know ... and I forget .... more often, I forget ;_) 08:00 < dazo> ;-) 08:00 < ecrist> no, I mean: 08:00 < ecrist> !factoids 08:00 < vpnHelper> ecrist: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 08:01 < ecrist> new as of yesterday, just worked out some bugs 08:01 < dazo> ecrist: nice! yeah, I saw it this (my) morning .... but nice with the new improvement :) 08:01 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] 08:02 < thordon> !welcome 08:02 < vpnHelper> thordon: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 08:02 < ecrist> it wasn't printing more than the last fact (for those with multiple facts) 08:02 < dazo> yeah ... this feature, I've been missing :) 08:02 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has joined ##openvpn 08:03 < ecrist> nobody asked for it until yesterday. took me about an hour to code, 30 minutes this morning to refactor my query and result processing. 08:03 < thordon> !forum 08:03 < vpnHelper> thordon: "forum" is The unofficial OpenVPN support forum is available at http://www.ovpnforum.com 08:03 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 08:06 -!- sporedi [n=chatzill@121.247.65.116] has quit ["ChatZilla 0.9.86 [Firefox 3.5.6/20091201220228]"] 08:12 < ecrist> krzee: do you mind if I install some plugins for vpnHelper? 08:45 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [] 08:46 < krzee> ecrist, nah knock yourself out 08:46 < krzee> after seeing that dump page im looking forward to seeing what else you do with him 08:47 < krzee> lol 08:47 < krzee> makes me wish i moved him to your lan long ago 08:47 < krzee> i need to get to the job site tho, bbl 08:50 -!- nneul [n=nneul@mo-76-3-37-166.dhcp.embarqhsd.net] has joined ##openvpn 08:53 < ecrist> !rss.info 08:53 < vpnHelper> ecrist: Error: "rss.info" is not a valid command. 08:53 < ecrist> !info 08:53 < vpnHelper> ecrist: Error: The command "info" is available in the Factoids and RSS plugins. Please specify the plugin whose command you wish to call by using its name as a command before "info". 08:53 < ecrist> !rss info 08:53 < vpnHelper> ecrist: (rss info ) -- Returns information from the given RSS feed, namely the title, URL, description, and last update date, if available. 08:54 < ecrist> !rss add "OpenVPN Forum" "feed://www.ovpnforum.com/smartfeed.php?feed_type=RSS2.0&limit=1_DAY&sort_by=standard&feed_style=HTML&" 08:54 < vpnHelper> ecrist: Error: 'OpenVPN Forum' is not a valid feed name. Feed names must not include spaces. 08:55 < ecrist> !rss add OpenVPN_Forum "feed://www.ovpnforum.com/smartfeed.php?feed_type=RSS2.0&limit=1_DAY&sort_by=standard&feed_style=HTML&" 08:55 < vpnHelper> ecrist: Joo got it. 08:55 < ecrist> !rss announce ##openvpn OpenVPN_Forum 08:55 < vpnHelper> ecrist: Error: 'announce' is not a valid url. 08:55 < ecrist> !announce ##openvpn OpenVPN_Forum 08:55 < vpnHelper> ecrist: Error: You don't have the owner capability. If you think that you should have this capability, be sure that you are identified before trying again. The 'whoami' command can tell you if you're identified. 08:59 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 08:59 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 09:05 -!- hyper__ch [n=hyper@143-200.2-85.cust.bluewin.ch] has joined ##openvpn 09:05 -!- hyper_ch [n=hyper@54-59.1-85.cust.bluewin.ch] has quit [Nick collision from services.] 09:05 -!- hyper__ch is now known as hyper_ch 09:07 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 09:09 < Diffen> Hello again. im struggleing with my route on my openvpn server. http://pastebin.com/d368ca082 the config and so on. my problem is that i think that the P-t-P on tun0 on the server are wrong configured. am i correct? 09:10 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has quit [Remote closed the connection] 09:10 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has joined ##OpenVPN 09:10 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has quit [Remote closed the connection] 09:10 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 09:11 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 09:14 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has joined ##OpenVPN 09:17 < dazo> Diffen: line 34-35 looks utterly wrong 09:17 < ecrist> !announce ##openvpn OpenVPN_Forum 09:17 < vpnHelper> ecrist: Error: You don't have the owner capability. If you think that you should have this capability, be sure that you are identified before trying again. The 'whoami' command can tell you if you're identified. 09:17 < ecrist> sigh 09:17 < ecrist> !announce ##openvpn OpenVPN_Forum 09:17 < vpnHelper> ecrist: Error: You don't have the owner capability. If you think that you should have this capability, be sure that you are identified before trying again. The 'whoami' command can tell you if you're identified. 09:17 < Diffen> dazo thanks chief. ill take a look 09:17 < ecrist> sigh again 09:18 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has quit [Client Quit] 09:19 < Diffen> dazo hmm ok should i remove the delete part? 09:19 < dazo> Diffen: those routes should come up automatically ... you should never ever need to manipulate the tun device currently being configured by openvpn 09:20 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has joined ##OpenVPN 09:20 < vpnHelper> Announcement from my owner (ecrist): ##openvpn OpenVPN_Forum 09:23 < Diffen> ok 09:23 < Diffen> im gonna give it a try. brb 09:24 < dazo> Diffen: !route might give you more info which can help you to understand the routing concept 09:26 < Diffen> !route 09:26 < vpnHelper> Diffen: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 09:28 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 09:28 < Diffen> dazo ok hmm the problem here is that i dont have a lan connected to my openvpn server. the server is connected directly to internet. 09:29 < dazo> Diffen: that's not a problem ... but the routing concepts are similar ... but you'll need to use redirect-gateway on the client (can be pushed from server) 09:30 < Diffen> sweet 09:34 -!- kyrixpower [n=ashley@80-121-67-95.adsl.highway.telekom.at] has joined ##openvpn 09:36 -!- kyrix [n=ashley@80-121-4-195.adsl.highway.telekom.at] has quit [Read error: 60 (Operation timed out)] 09:43 -!- LittleJ [n=linuz@82.78.185.26] has quit [Read error: 110 (Connection timed out)] 09:46 -!- corretico__ [n=laguilar@201.201.46.106] has quit [Connection timed out] 09:46 < Diffen> dazo thanks for all you help today 09:46 < dazo> Diffen: you're welcome! 09:47 < Diffen> im not getting it working :) but i will go home and fry me some meatballs and get right back on the horse :D 09:47 < dazo> Diffen: have fun! :) 09:48 < Diffen> i will try :D thanks and talk to you later :D 09:48 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has quit ["This computer has gone to sleep"] 09:48 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 09:51 -!- nneul [n=nneul@mo-76-3-37-166.dhcp.embarqhsd.net] has quit ["Leaving"] 09:52 -!- Irssi: ##openvpn: Total of 98 nicks [0 ops, 0 halfops, 0 voices, 98 normal] 10:00 < vpnHelper> New forum entry openvpnforum: Installation Help :: Re: Include username and psswd in the config file :: Reply by ecrist 10:00 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit ["Leaving."] 10:03 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 110 (Connection timed out)] 10:16 -!- hyper_ch [n=hyper@143-200.2-85.cust.bluewin.ch] has quit [Read error: 104 (Connection reset by peer)] 10:27 -!- stephenh [i=stephenh@69.30.200.88] has quit ["boom boom"] 10:33 < dwalluck> ok, I have my connection log and I'm getting: TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 10:33 < dwalluck> do I have to add the certificate as trusted for openssl (this is on Windows, so I'm not sure which store it uses) 10:35 < dwalluck> I don't have any option about the type in my ovpn config 10:36 < ecrist> !verify 10:36 < vpnHelper> ecrist: Error: "verify" is not a valid command. 10:36 < crazygir> trying to setup windows clients makes me want to slaughter MS 10:36 < crazygir> *openvpn on windows clietns 10:36 < ecrist> !certinfo 10:36 < vpnHelper> ecrist: "certinfo" is please run `openssl x509 -in -noout -text` for ca,server,client certs and pastebin the results 10:37 < ecrist> !certverify 10:37 < vpnHelper> ecrist: "certverify" is verify your certs are signed correctly by running `openssl verify -CAfile ` for client.crt and server.crt 10:37 < ecrist> dwalluck: those commands are for you 10:40 < crazygir> I'm a little lost in the documentation at this point.. what is the best way to setup a windows openvpn client to connect to a remote tun vpn (routed) 10:40 < crazygir> simplicity of use is key.. I'm deploying this to no-IT endusers 10:40 < ecrist> crazygir: windows uses the same config linux clients use 10:40 < dwalluck> ecrist: I am not sure, the certificate is the CA? 10:41 < dwalluck> ecrist: oh, I have to get the server cert off of the server? 10:41 < ecrist> yes 10:41 < dwalluck> ecrist: at least, how could I make sure that the cert marked as "ca" is actually trusted? 10:41 < ecrist> !configs 10:41 < vpnHelper> ecrist: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 10:42 < crazygir> ecrist: from what I was reading, it sounds like TUN is a pita to setup in windows? 10:42 < dwalluck> I assume that if the CA is not trusted the verify would automatically fail? 10:42 < crazygir> via the virtualTAP device 10:42 < ecrist> nope 10:42 < ecrist> it uses the same config as linux 10:42 < crazygir> hrm.. wonder what I'm doing wrong then 10:42 < dwalluck> But then, why does it say VERIFY OK and the error is about the nsCertType instead 10:43 < ecrist> dwalluck: you're not giving my your whole log, I can only offer advice based on the one line you displayed 10:43 < ecrist> !logs 10:43 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 10:43 < dwalluck> In Windows, if I double click on the crt I can add it to the Trusted Root Store. I am wondering if anything like that is needed here? 10:43 < ecrist> NO 10:43 -!- thordon_ [n=sec@dslb-088-078-082-148.pools.arcor-ip.net] has joined ##openvpn 10:43 < ecrist> dwalluck: post your configs and your logs, please 10:45 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 10:47 < dwalluck> ecrist: no problem, I just need to know what to obfuscate first 10:47 < thordon_> !welcome 10:47 < vpnHelper> thordon_: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 10:47 < thordon_> !mitm 10:48 < vpnHelper> thordon_: "mitm" is (#1) http://openvpn.net/index.php/documentation/howto.html#mitm to know about stopping Man-in-the-Middle attacks by signing the server cert specially, or (#2) use !servercert to generate the server cert manually or use the easy-rsa build-key-server script to build your server certificates, or (#3) then use: ns-cert-type server in the client config 10:48 < crazygir> how should windows paths (for keys) be speficied in the config? 10:48 < thordon_> !iporder 10:48 < vpnHelper> thordon_: "iporder" is (#1) OpenVPN's internal client IP address selection algorithm works as follows: 1 -- Use --client-connect script generated file for static IP (first choice)., or (#2) Use --client-config-dir file for static IP (next choice) !static for more info, or (#3) Use --ifconfig-pool allocation for dynamic IP (last choice), or (#4) if you use --ifconfig-pool-persist see !ipp 10:48 < ecrist> crazygir: your safest best is to use full paths when possible 10:49 < ecrist> relative paths are acceptable, as well 10:49 < crazygir> right.. that was my attempt 10:49 < thordon_> !ipp 10:49 < vpnHelper> thordon_: "ipp" is (#1) the option --ifconfig-pool-persist ipp.txt does NOT create static ips, or (#2) Note that the entries in this file are treated by OpenVPN as suggestions only, based on past associations between a common name and IP address. They do not guarantee that the given common name will always receive the given IP address. If you want guaranteed assignment, see !iporder and !static 10:49 < crazygir> I'll try relative in another way 10:50 < ecrist> iirc, you need to use forward slashes in the path, even though windows uses backslashes 10:51 < dwalluck> ecrist: config: http://www.pastebin.ca/1741558 10:52 < crazygir> oh fun 10:53 < ecrist> what's up with line 09? 10:53 < ecrist> dwalluck: where are your client certificate and keys? 10:53 -!- dazo is now known as dazo_afk 10:54 < crazygir> ecrist: I have the keys in the same directory as the config so my key/cert lines are: key client.key and cert client.crt 10:54 < ecrist> crazygir: I've never had a problem with windows clients. my configs only list the certificate/keys with no path, and all files go in the config directory 10:54 < dwalluck> ah well originally when I wasn't on windows it had another path, but I put '.' for the current directory: now the cert newca.crt is in the 'config' directory 10:54 < ecrist> always works for me 10:54 < crazygir> this is what I started with, then started testing with other path options 10:54 < ecrist> that should work. 10:54 < crazygir> I'm getting an fopen error 10:54 < dwalluck> There's no separate key file 10:54 < crazygir> trying to paste the error isn' 10:54 < crazygir> isn't working 10:54 < crazygir> hrm 10:55 < dwalluck> I should say the same config (line 9 has a different path) works on Linux 10:55 < ecrist> dwalluck: how are you authenticating your clients, then? 10:55 < crazygir> ecrist: what is weird, is that the ca line is first, and there's no error there 10:55 < ecrist> dwalluck: the cd command doesn't do anything 10:55 < ecrist> !configs please, crazygir 10:55 < vpnHelper> ecrist: Error: "configs" is not a valid command. 10:56 < dwalluck> the cd command makes it find the certficate I think is what it was for 10:56 < ecrist> dwalluck: no, it doesn't 10:57 < ecrist> it's a worthless command 10:57 < dwalluck> well i can remove it 10:57 < ecrist> I would start there. 10:57 < ecrist> then, where are your client certificate/key? 10:57 < dwalluck> the clients dont have certificates, only the server does and that's the one that's failing to verify, not newca.crt 10:57 < crazygir> yea, windows isn't finding the key/cert file 10:58 < ecrist> can you post your logs? 10:58 < ecrist> if not, I cannot help you 10:58 -!- thordon [n=sec@dslb-092-073-151-028.pools.arcor-ip.net] has quit [Read error: 110 (Connection timed out)] 10:58 < ecrist> (either of you) 10:58 < dwalluck> sure, but I guess I can take out the IP address 10:59 < ecrist> whatever you want to do, but I won't help without logs 11:02 < dwalluck> ecrist: http://www.pastebin.ca/1741580 11:03 < dwalluck> ecrist: took out some stuff let me know if it was important 11:03 < dwalluck> ecrist: I guess it's like 28--32 11:03 < dwalluck> ecrist: lines 11:03 < ecrist> what did you take out, and why? 11:04 -!- dyzdyz [n=dyzdyz@ch49172.petrus.pl] has joined ##openvpn 11:04 < dyzdyz> !welcome 11:04 < vpnHelper> dyzdyz: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 11:04 < dwalluck> ecrist: the IP address 11:04 < ecrist> that's all? 11:05 < ecrist> did you sent nsCertType on your server certificate? 11:05 < dyzdyz> hi all 11:05 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 11:05 < ecrist> hello, dyzdyz 11:05 < crazygir> ecrist: Cannot load certificate file client.crt: error:02001002:system library:fopen:No such file or directory: error:20074002:BIO routines: FILE_CTRL:system lib: error:140AD002:SSL routines:SSL_CTX_use_certificate_file:system lib 11:05 < dyzdyz> !topology 11:05 < vpnHelper> dyzdyz: "topology" is is it is possible to avoid the !/30 behavior if you use 2.1 with the option: topology subnet http://osdir.com/ml/network.openvpn.devel/2005-09/msg00020.html This will end up being default in later versions. 11:05 < ecrist> crazygir: can you post your configs, please 11:06 < ecrist> last time I'm willing to ask 11:06 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 11:06 -!- kyrixpower [n=ashley@80-121-67-95.adsl.highway.telekom.at] has quit ["Leaving"] 11:07 < dyzdyz> i need to set a VPN connection between my laptop and my office network, i'v got a Fedora 12 server behind dummy-router in the office 11:07 -!- phusion__ [i=phusion@88.80.16.38] has quit [Read error: 54 (Connection reset by peer)] 11:07 < dyzdyz> server has eth1 connected to LAN, with 192.168.1.X address 11:08 -!- phusion__ [i=phusion@88.80.16.38] has joined ##openvpn 11:08 < crazygir> ecrist: http://pastebin.ca/1741592 11:08 < crazygir> sorry, took me a few 11:09 < dyzdyz> i can farward a port to server from router, but i'm not sure how to edit server.conf, to use only one interface 11:09 < dyzdyz> only eth1 11:10 -!- JackW [n=jack@95.16.21.75] has left ##openvpn ["Konversation terminated!"] 11:11 < ecrist> doesn't sound like a problem, dyzdyz 11:11 < dyzdyz> can you show me the right way? 11:12 < ecrist> not sure what you want showed to you 11:12 < ecrist> start here 11:12 < ecrist> !howto 11:12 < vpnHelper> ecrist: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 11:12 -!- hyper_ch [n=hyper@adsl-89-217-25-187.adslplus.ch] has joined ##openvpn 11:13 < dyzdyz> i'll try 11:13 < ecrist> crazygir: are you using openvpn gui on windows? 11:13 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 11:13 < ecrist> and are the ca.crt, client.key, and client.crt files in the same directory as the config file? 11:14 -!- polaru [n=polaru@93.113.192.70] has quit [Remote closed the connection] 11:15 < dwalluck> ecrist: I don't run the server so I don't know, I removed the ns-cert-type line from the ovpn config, but apparently it still checks it? So what if there is none 11:16 < ecrist> dwalluck: you don't run the server? 11:16 < crazygir> ecrist: yes, all files (config/key/crts) are in the default openvpn config directory. and yes, I am using the openvpn windows gui, but I've been running openvpn.exe from the command line 11:16 < ecrist> I would suggest talking to your server admin, not a lot we can do for you 11:16 < ecrist> crazygir: use the gui, don't use command line 11:16 < ecrist> it should 'just work' 11:17 < crazygir> it doesn't that's why I have tried the cmd 11:17 < crazygir> I've got the red icon :| 11:23 < ecrist> hrm 11:23 < ecrist> my test box is not accessible. my personal vpn is down for some reason 11:25 < crazygir> :| 11:25 < thordon_> Hello, please does anyone 've an Idea for my not working openvpn under windows7? ping works fine, but games doesn't find partner in tap-mode over game broadcast. 11:26 < thordon_> I've tried nearby anything and google does not help 11:26 < thordon_> maybee a tricky option in win7 ? 11:26 < ecrist> thordon_: firewall issues, probably? 11:27 < thordon_> mmh, i guess i've disabled firewall on all sides 11:27 < thordon_> i 've also removed all blocking rules 11:27 < ecrist> I would check. 11:27 < ecrist> if you can ping over the vpn to the other hosts, your problem is not with openvpn 11:28 < thordon_> ok, that my guess, too. cause under xp everything worked fine. 11:31 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 11:35 < ecrist> my vpn is back up 11:35 < crazygir> W00T 11:35 < ecrist> looking, crazygir 11:35 < crazygir> :P 11:35 < crazygir> still trying over here, I was going to attempt from another windows box 11:37 < ecrist> running 2.1_rc22 works fine, crazygir 11:40 < ecrist> http://pastebin.com/m4a9ddec0 11:40 < ecrist> that config works without a problem 11:40 < ecrist> all files are in c:\Program Files\OpenVPN\config 11:45 < thordon_> is it necessary to run openvpn-gui in vista compatibility mode to work under win7 ? 11:49 -!- yoshx [n=yoshx@93.9.150.199] has joined ##openvpn 11:52 * crazygir double checking versions 11:55 < dyzdyz> !topology 11:55 < vpnHelper> dyzdyz: "topology" is is it is possible to avoid the !/30 behavior if you use 2.1 with the option: topology subnet http://osdir.com/ml/network.openvpn.devel/2005-09/msg00020.html This will end up being default in later versions. 12:02 -!- erpel_ [n=erpel@g224213073.adsl.alicedsl.de] has joined ##openvpn 12:03 -!- erpel_ [n=erpel@g224213073.adsl.alicedsl.de] has quit [Client Quit] 12:10 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 12:16 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [] 12:21 < ecrist> thordon_: no 12:23 -!- yoshx [n=yoshx@93.9.150.199] has quit [Read error: 110 (Connection timed out)] 12:24 -!- yoshx [n=yoshx@93.9.150.199] has joined ##openvpn 12:26 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 12:28 -!- thordon_ [n=sec@dslb-088-078-082-148.pools.arcor-ip.net] has quit [Read error: 110 (Connection timed out)] 12:36 -!- dauergast [n=sag@g226224106.adsl.alicedsl.de] has joined ##openvpn 12:37 -!- dauergast [n=sag@g226224106.adsl.alicedsl.de] has quit [Client Quit] 12:51 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has joined ##openvpn 13:10 -!- dauergast [n=sag@g226224106.adsl.alicedsl.de] has joined ##openvpn 13:17 -!- dwalluck is now known as dwalluck_lunch 13:18 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 13:41 -!- MrJK [n=jezu@194.199.166.96] has joined ##openvpn 13:41 < MrJK> hi 13:42 -!- G-Script50 [n=sag@g226224106.adsl.alicedsl.de] has joined ##openvpn 13:42 -!- G-Script50 [n=sag@g226224106.adsl.alicedsl.de] has quit [Remote closed the connection] 13:42 < MrJK> I've a question: how to change routes in Windows XP ( as client) to put all the web traffic trough my gateway ( the openVPN server in fact ) 13:43 < endre> use route cmd 13:43 < MrJK> I try to play with the route command, without success 13:43 < ecrist> !def1 13:43 < vpnHelper> ecrist: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 13:43 < endre> make a /32 route to the vpn server 13:43 < endre> and the make your default gw via the vpn peer linkaddr 13:43 < ecrist> endre: a /32 route will only route a single IP 13:43 < endre> ecrist: oh shit, no. rly? 13:44 < endre> you must have a host route or you will (wanna) route the vpn itself over the tunnel 13:45 -!- dauergast [n=sag@g226224106.adsl.alicedsl.de] has quit [Read error: 54 (Connection reset by peer)] 13:45 < MrJK> whaoo, huu, I'm little bit lost... I should have a look one the def1 flag ? 13:45 < ecrist> MrJK: the server end will need to support it, yes 13:45 < endre> not really 13:45 < endre> it's pure ip routing 13:45 < ecrist> yes, it will 13:46 < ecrist> he won't get internet access unless nat or public ips are use for vpn clients 13:46 < rob0> The server side would typically need to SNAT the outbound packets 13:46 < endre> the server must forward (and nat) your packets.. if that's what you cann support, then yes. 13:46 < endre> but it's out of openvpn's configuration at any kind. 13:46 < ecrist> indeed 13:46 < ecrist> as a 'client' he can't just decide, necessarily, to route all traffic over the vpn 13:46 < rob0> Right, and the original question is a Windows support one. 13:46 < endre> yup 13:47 < endre> MrJK: do a 13:47 < endre> route add mask 255.255.255.255 13:47 < endre> route del 0.0.0.0 13:47 < endre> route add 0.0.0.0 mask 0.0.0.0 13:49 < ecrist> I still posit it would be easier for him to ask the server admin to do this with a proper 'push' 13:50 < endre> indeed. 13:50 < endre> i totally agree 13:50 < endre> but he can define it on the client side openvpn config as well 13:51 < rob0> But then, the stated goal was to put only Web traffic through the tunnel, not all traffic. 13:51 < ecrist> without policy-routing, you cannot route specific ports over the vpn 13:59 -!- Steve973 [n=Steve@169.130.18.10] has joined ##openvpn 14:00 < Steve973> hello. since using a common subnet ip address scheme can result in ambiguity, are there any suggested guidelines for address ranges for subnets? 14:00 < MrJK> OMG, it works so much better 14:00 < MrJK> thanks a loooooot !!! 14:00 < MrJK> thx endre and ecrist =) 14:07 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 14:11 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Client Quit] 14:15 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 14:15 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 14:15 < ecrist> Steve973: the 'norm' seems to be 192.168.[01]/24 are used for most home networks, 172.16/12 is used for VPNs, and 10/8 is used for corp lans 14:15 < crazygir> I have the openvpn windows gui (same version) installed on two systems. The right-click menu on the tray icon is much more complete on one, and minimal on the other.. am I missing somehting? 14:15 < ecrist> configs? 14:15 < Steve973> thanks 14:15 < ecrist> can you post screen shots, crazygir ? 14:16 < ecrist> Steve973: that's not a hard-and-fast rule, but my observations 14:16 < Steve973> that can help 14:16 < crazygir> so that isn't a known problem 14:16 < crazygir> I was hoping it was something simple 14:16 < crazygir> let me see what I can do :) 14:17 < ecrist> !1918 14:18 < vpnHelper> ecrist: "1918" is (#1) http://en.wikipedia.org/wiki/Private_network or http://www.faqs.org/rfcs/rfc1918.html, or (#2) 10.0.0.0/8 | 172.16.0.0/12 | 192.168.0.0/16 14:18 < rob0> I avoid 192.168.0.0/22, generally make all my LAN/VPN netblocks in 192.168.4.x and above. 14:20 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 14:22 -!- dyzdyz [n=dyzdyz@ch49172.petrus.pl] has quit [Read error: 110 (Connection timed out)] 14:26 -!- buntfalke_ is now known as buntfalke 14:26 -!- k5ehx [i=oh9r51bH@unaffiliated/k5ehx] has joined ##openvpn 14:34 -!- mark__ [n=mark@74-132-123-85.dhcp.insightbb.com] has joined ##openvpn 14:35 < mark__> General question....I've got a working VPN connection, can ping ip addresses on the other side, but can't resolve hostnames on the other side. Double checked /etc/resolv.conf and it's right. Anybody know what I'm missing? 14:36 < mark__> routes seem correct too 14:36 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has quit [] 14:38 -!- mark__ is now known as shaggystyle 14:40 < shaggystyle> !welcome 14:40 < vpnHelper> shaggystyle: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 14:40 < shaggystyle> !redirect 14:40 < vpnHelper> shaggystyle: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 14:41 -!- Sky[x] [n=SkyB0x@BSN-176-142-83.dial-up.dsl.siol.net] has joined ##openvpn 14:46 < shaggystyle> !def1 14:46 < vpnHelper> shaggystyle: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 14:50 < shaggystyle> !howto 14:50 < vpnHelper> shaggystyle: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 14:52 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [] 14:55 * crazygir got side tracked.. making screenshots now 15:05 -!- shaggystyle [n=mark@74-132-123-85.dhcp.insightbb.com] has quit ["Leaving"] 15:06 -!- Holister [n=ryan@static-151-204-189-39.pskn.east.verizon.net] has quit [Read error: 54 (Connection reset by peer)] 15:06 -!- Steve973 [n=Steve@169.130.18.10] has quit ["Leaving"] 15:07 < crazygir> ok, made the screenshots.. but found the issue as part of making them 15:07 < crazygir> the conf was config.opvn 15:09 < ecrist> and you called it something else? 15:10 < crazygir> so the gui wasn't picking up the conf 15:10 < crazygir> nope.. the extension should be .ovpn for the gui to extend the menu 15:12 < crazygir> ok, now on to more fun problems ;) 15:15 < crazygir> all tap devices are in use. thanks windows 15:23 -!- thordon [n=sec@188.109.25.178] has joined ##openvpn 15:25 -!- bvierra [n=bvierra@cpe-75-83-6-55.socal.res.rr.com] has quit [Read error: 110 (Connection timed out)] 15:25 -!- Holister [n=ryan@static-151-204-189-39.pskn.east.verizon.net] has joined ##openvpn 15:25 -!- Sky[x] [n=SkyB0x@BSN-176-142-83.dial-up.dsl.siol.net] has quit [Connection timed out] 15:31 -!- Patric3 [n=Patric3@it040352.massey.ac.nz] has joined ##openvpn 15:41 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has quit ["ChatZilla 0.9.86 [Firefox 3.0.17/2009122116]"] 15:42 < thordon> hi, please could someone give a hint why my windows7 clients doesn't connect to broadcast games each other in tap-mode. under winxp everything worked fine. ping going through. firewalls are disabled. i'm desponded. 15:42 < thordon> *snief* 15:43 < thordon> is it necessary to use compatibility mode vista ? 15:43 < reiffert> does it work for you with hamachi? 15:43 * crazygir still uses XP when windows is required 15:44 < thordon> i don't like hamachi. have not tested under win7 15:44 < thordon> argh.. working and search for day 15:44 < thordon> s 15:45 < thordon> maybee a pecial option in win7 15:45 < thordon> reiffert: should i try hamchi first ? 15:45 < reiffert> Hamachi just works like openvpn ... 15:46 < thordon> ping is working 15:46 < thordon> my colleges have tried hamachi, without success 15:46 < reiffert> Give it a try, it works for every game I tested. 15:47 < thordon> but openvpn give me a ping about 14ms and hamchi..^^ to slow 15:48 < thordon> adapter order ist set to openvpn first 15:48 < thordon> and why is ping working ? 15:48 < thordon> server is a freebsd 15:48 < reiffert> cause basically it's working. 15:49 < reiffert> adapter order? hahaha. 15:49 < reiffert> a myth coming up here and there but bullshit. 15:50 < thordon> mmmh, ok. 15:50 < reiffert> all your clients are in the same subnet, what should an adapter order do here? 15:50 < thordon> whats about compatibility mode ? a myth too ? 15:50 < reiffert> packets apply to routing .. 15:50 < reiffert> openvpn compatibility mode? 15:51 < thordon> reiffert: thats a good question ^^ 15:52 < thordon> reiffert: no i mean. windows7 compatiblity mode 15:52 < reiffert> Ah, thought you meant freebsd compatibility mode. 15:52 < reiffert> whats a compat mode and what does it do? 15:53 < thordon> no, openvpn-gui.exe in compat mode vista 15:53 < reiffert> doing what? 15:53 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 15:53 < thordon> don't know how it works or what it does exactly. i'm not a great windows expert 15:54 -!- Patric3 [n=Patric3@it040352.massey.ac.nz] has left ##openvpn [] 15:56 < thordon> mmh. i've found a guy , over google, who had exactly the same problem. but no answers 15:56 -!- yoshx [n=yoshx@93.9.150.199] has quit [Read error: 60 (Operation timed out)] 15:56 < thordon> 2 win7 and 2 winxp. winxp is working. win7 don't. only for games with broadcast search 15:59 < thordon> ok, maybee a wireshark on the server could show me the way, but i'm not so familiar with it 16:00 < thordon> thought that you experts have heard about this problem, already. 16:03 < thordon> reiffert: thanX, are U _the_ reiffert who was on #chillout - werderstrasse ? 16:05 < reiffert> yes. 16:05 -!- thordon is now known as sec 16:05 -!- dwalluck_lunch is now known as dwalluck 16:05 < reiffert> ah, moin sec 16:06 -!- sec is now known as Guest83708 16:06 < Guest83708> :) gg - cool. 16:06 -!- Guest83708 is now known as thordon 16:07 < thordon> my nick is already registerd on ircnet :/ 16:07 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Remote closed the connection] 16:07 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 16:07 < reiffert> to be honest, you are on freenode and not on ircnet. 16:11 < thordon> ups, of course 16:18 < thordon> reiffert: do U have a hint for me to bring me on the right way, please. any suggestions ? 16:19 < thordon> other than downgrade to winxp 16:20 < reiffert> Like I said, I run hamachi for playing games. 16:20 < reiffert> I never found out why some games work when using broadcast/multicast search and why some of them dont run. I also used wireshark etc. 16:22 < reiffert> They all do on hamachi for me. 16:24 < thordon> hamachi ist toooo slow. and i've dated me with friends to play at friday evening and we could not connect to hamachi ! 16:25 < thordon> that was the point where i switched to openvpn and it working glorious. pretty nice pings. that was a time ago under winxp 16:26 < thordon> i dont want to put up with a non working openvpn under win7. 16:26 < reiffert> well .. wireshark then? 16:27 < thordon> my ambition is awakedned 16:28 < thordon> mmmh. i will give it a try, but how i said i'm not an expert in analyzing ethernet streams ^^ 16:28 < thordon> ok, another thing to learn :) 16:29 < thordon> reiffert: thank U very much for your efforts and nice to meet u again. maybee U will revisit us at #chillout. 16:30 < reiffert> you are welcome 16:30 < thordon> have a nice evening 16:30 < reiffert> thx, same goes out for you 16:34 -!- k5ehx [i=oh9r51bH@unaffiliated/k5ehx] has left ##openvpn [] 16:43 -!- Sky[x] [n=SkyB0x@BSN-176-142-83.dial-up.dsl.siol.net] has joined ##openvpn 16:53 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has joined ##openvpn 17:03 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has quit ["Leaving"] 17:05 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has joined ##openvpn 17:08 -!- Sky[x] [n=SkyB0x@BSN-176-142-83.dial-up.dsl.siol.net] has quit [] 17:17 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 60 (Operation timed out)] 17:18 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 17:52 -!- Diffen [n=diffen@c-3672e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 18:21 -!- bvierra [n=bvierra@cpe-75-83-6-55.socal.res.rr.com] has joined ##openvpn 18:22 -!- bvierra [n=bvierra@cpe-75-83-6-55.socal.res.rr.com] has left ##openvpn ["Leaving"] 18:46 < Diffen> evning: is this a correct route setup on the openvpn server? http://pastebin.com/d7fe983a1 18:54 -!- Diffen [n=diffen@c-3672e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 18:59 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Remote closed the connection] 19:01 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 19:13 -!- savenger_ [n=savenger@p5792EF11.dip.t-dialin.net] has joined ##openvpn 19:18 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has quit ["Leaving"] 19:28 -!- optiz0r [n=optiz0r@miranda.sihnon.net] has quit [Read error: 110 (Connection timed out)] 19:29 -!- savenger [n=savenger@p5792E4CD.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 19:44 -!- optiz0r [n=optiz0r@miranda.sihnon.net] has joined ##openvpn 20:19 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 20:37 -!- Gnewt [n=hackerle@li57-94.members.linode.com] has quit [Remote closed the connection] 21:08 -!- salax [n=ubuntu@219.95.96.90] has joined ##openvpn 21:10 < salax> hi all, i've setup the openvpn server and client in my ubuntu 21:10 < salax> but i got error when i want to initiate the connection 21:10 < salax> http://salawank.pastebin.com/f3969233b .. any idea? is it because of my key/certs? 21:15 < krzee> you changed the email in log yourself? 21:16 < krzee> or its really [at] ? 21:16 < krzee> yes, it has something to do with the certs 22:05 < salax> i changed it.. google crawl :) 22:05 < salax> krzee, i'll look into it, thnaks 22:05 < salax> thanks* 22:11 < salax> regarding certs/ keys for client, i have to issue it at the openvpn server right? and put it in the client side? 22:11 < krzee> also make sure both sides clocks are set to the right time / timezone 22:14 < salax> krzee, can this setting work? ---- i Installed openvpn server on ubuntu, put it in dmz, use the dynamic public ip for the openvpn server 22:14 < krzee> sure with dyndns 22:15 < salax> -- i installed openvpn client in another box, using ubuntu also, i connect to openvpn server.. both box is in my home 22:15 < krzee> oh both at home 22:15 < krzee> do they communicate through the same router? 22:15 < salax> yes, so basically, both have the same public IP, just the openvpn server is in the dmz 22:16 < salax> if i put let say 60.110.1.133, this will direct to the openvpn server 22:16 < salax> as my posted output, it seems they dont have trouble communicating with each other, just the certs/keys issue 22:17 < krzee> well you did cut the logs short too 22:17 < krzee> cant tell if something hat mattered was above or not 22:18 < salax> so, theoretical and technically, my settings for openvpn server and openvpn client is correct? if both in my home connecting thru same router? 22:20 < krzee> how could i know so far? 22:20 < krzee> !configs 22:20 < vpnHelper> krzee: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries --- Day changed Fri Jan 08 2010 00:08 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [] 00:22 -!- hyper_ch [n=hyper@adsl-89-217-25-187.adslplus.ch] has quit [Remote closed the connection] 00:25 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 00:53 -!- kerx [n=kerx@38.118.193.18] has joined ##openvpn 00:54 < kerx> hi everyone, i'm pushing a route of 192.168.1.0/24 to client's however i'm not able to ping ip's in the 192.168.1.0/24 range... it used to do it before, but it just all of a sudden stopped 00:54 < kerx> any ideas, please help? 01:02 -!- kerx_ [n=kerx@38.118.193.18] has joined ##openvpn 01:02 < kerx_> wups, lost internet 01:02 < endre> forwarding maybe off on the server/client? 01:02 < kerx_> endre, no forwarding is enabled since it's a NAT gateway as well 01:03 < endre> then a firewall rule? 01:03 < kerx_> which rule? 01:03 < endre> tcpdump all the participating interface 01:03 < endre> lol which rule 01:03 < endre> where should i know from 01:03 < kerx_> i just lost the server 01:03 < kerx_> because of doing: route 192.168.1.0 255.255.255.0 01:03 < endre> weird 01:04 < endre> remove that route from the kernel then 01:04 < kerx_> i use 192.168.1.0/24 on that server 01:04 < kerx_> it's my local network 01:05 < kerx_> $ipt -A INPUT -i tun0 -j ACCEPT 01:05 < kerx_> i have this rule setup 01:06 < kerx_> endre, you still around? i would like to explain to you further the network 01:06 < kerx_> OPENVPN Server has eth0 (external IP) and eth1 (internal range 192.168.1.0/24) 01:06 < endre> that's input not forward 01:06 < kerx_> tun0, has 10.20.01, and I push route 192.168.1.0/24 to the openvpn client's 01:06 < kerx_> however, the client once connected it has ip 10.20.0.x and can't access anything on 192.168.0.x 01:07 < kerx_> you mean setup forwarding for tun0 ? 01:07 < kerx_> $ipt -A FORWARD -i tun0 -j ACCEPT ? 01:07 < endre> yeah, like that 01:07 < kerx_> that doesn't work still 01:07 < kerx_> the client can't ping 192.168.1.0/24 01:07 < endre> that's a whole subnet of course it cannot ping that 01:08 < kerx_> well, i try pinging an IP on that subnet that is pingable, such as 192.168.1.210 or even the gw 192.168.1.1 01:08 < kerx_> i see in the openvpn log that it's pushing the route to the client of 192.168.1.0 255.255.255.0 01:08 < kerx_> it was working before, not sure what just happened 01:09 -!- hyper_ch [n=hyper@143-200.2-85.cust.bluewin.ch] has joined ##openvpn 01:09 < kerx_> does the windows machine need to have a route setup manually? 01:13 < kerx_> wow, weird, i can't even ping the tun0 IP address of the server from the client 01:14 < kerx_> any help is appreciated 01:15 -!- kerx [n=kerx@38.118.193.18] has quit [Read error: 110 (Connection timed out)] 01:15 < endre> dump and dump and dump to see what's goin where 01:17 < kerx_> I see! 01:17 < kerx_> From the client in the log's I see the following: 01:17 < kerx_> TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up 01:17 < kerx_> route ADD 192.168.1.0 MASK 255.255.255.0 10.20.0.9 01:18 < endre> 0.9?? 01:18 < kerx_> ROUTE: route addition failed using CreateIpForwardEntry: One or more arguments are not correct. [if_index=29] 01:18 < endre> you told me your server is at 0.1 01:18 < kerx_> tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 01:18 < kerx_> inet addr:10.20.0.1 P-t-P:10.20.0.2 Mask:255.255.255.255 01:18 < kerx_> that's on the openvpn server 01:18 < endre> ah i see, windows..... that explains 01:18 < kerx_> 10.20.0.10 is the ipv4 address on the windows box 01:18 < endre> it can handle /30's only properly 01:18 < endre> ok, nvm 01:19 < endre> that sould world btw 01:19 < endre> s/world/work/ 01:19 < kerx_> hrm, why is that failing? 01:19 < endre> apply that command by hand 01:19 < endre> on a cmdline 01:20 < kerx_> it says OK! 01:20 < kerx_> but i still can't ping 192.168.1.1 01:20 < kerx_> it says 01:20 < kerx_> Reply from 10.20.0.10: Destination host unreachable. 01:20 < kerx_> This used to work :-( 01:20 < kerx_> Not sure what's going on 01:22 < kerx_> OMG 01:22 < kerx_> it works on Windows XP machine 01:22 < endre> can you ping the 10.20.0.9 now? 01:22 < endre> lol wtf 01:22 < kerx_> This machine not working is Windows Vista 01:22 < kerx_> how can this be? 01:22 < endre> i dont have experience with vista at all 01:22 < kerx_> The OpenVPN Gui doesn't work w/ Vista? 01:22 < endre> try some recent versions 01:25 < kerx_> k, i just saw something online about it 01:25 < kerx_> Thank goodness I noticed on XP it works 01:25 < kerx_> otherwise my brain will go crazy :P 01:32 -!- kerx_ [n=kerx@38.118.193.18] has quit ["Leaving"] 02:06 -!- aia [n=aia@64-135-203-23.FoxValley.net] has joined ##openvpn 02:17 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 02:18 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:20 -!- LittleJ [n=linuz@82.78.185.26] has joined ##openvpn 02:26 -!- jmm [n=jmm@LPuteaux-156-14-28-187.w82-127.abo.wanadoo.fr] has joined ##openvpn 02:26 < jmm> hello. 02:37 -!- Diffen [n=diffen@c-3672e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 02:40 -!- savenger_ [n=savenger@p5792EF11.dip.t-dialin.net] has quit ["leaving"] 02:49 -!- Diffen [n=diffen@c-3672e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 02:56 -!- pa [n=pa@unaffiliated/pa] has quit ["Sto andando via"] 03:01 -!- Sky[x] [n=SkyB0x@212.235.186.230] has joined ##openvpn 03:03 -!- salax_ [n=salax@219.95.96.90] has joined ##openvpn 03:03 -!- salax_ [n=salax@219.95.96.90] has quit [Client Quit] 03:07 -!- master_o1_master [n=master_o@p57B570A3.dip.t-dialin.net] has joined ##openvpn 03:18 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Remote closed the connection] 03:18 -!- master_of_master [i=master_o@p57B55916.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:35 -!- lolipop [n=soontak@209.247.95.219.cbj02-home.tm.net.my] has joined ##openvpn 03:41 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has joined ##openvpn 03:44 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 03:52 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [] 04:02 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 04:10 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Excess Flood] 04:10 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 04:11 -!- d12fk [n=heiko@vpn.astaro.de] has joined ##openvpn 04:15 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has joined ##openvpn 04:37 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 04:44 -!- yoshx [n=yoshx@93.9.150.199] has joined ##openvpn 04:50 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has quit ["This computer has gone to sleep"] 04:50 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has joined ##openvpn 04:52 -!- salax [n=ubuntu@219.95.96.90] has quit ["Leaving"] 04:55 -!- lolipop [n=soontak@209.247.95.219.cbj02-home.tm.net.my] has quit ["Leaving"] 05:06 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 05:14 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 05:21 -!- zib [i=zib@slick.keff.org] has quit [Read error: 110 (Connection timed out)] 05:22 -!- dazo_afk is now known as dazo 05:27 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 05:27 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 54 (Connection reset by peer)] 05:28 -!- pfo_ is now known as pfo 05:41 -!- Sky[x] [n=SkyB0x@212.235.186.230] has quit [] 06:00 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has quit ["Leaving"] 06:16 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 60 (Operation timed out)] 06:25 -!- hyper_ch [n=hyper@143-200.2-85.cust.bluewin.ch] has quit [Read error: 60 (Operation timed out)] 06:27 -!- hyper_ch [n=hyper@81.62.30.120] has joined ##openvpn 06:28 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 06:56 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 06:56 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 06:59 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 06:59 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 54 (Connection reset by peer)] 06:59 -!- pfo_ is now known as pfo 07:23 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 07:23 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 54 (Connection reset by peer)] 07:23 -!- pfo_ is now known as pfo 07:43 -!- yoshx [n=yoshx@93.9.150.199] has quit [Remote closed the connection] 07:44 -!- yoshx [n=yoshx@93.9.150.199] has joined ##openvpn 07:45 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 07:45 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 54 (Connection reset by peer)] 07:45 -!- pfo_ is now known as pfo 07:47 < ecrist> good morning 07:47 -!- Irssi: ##openvpn: Total of 95 nicks [0 ops, 0 halfops, 0 voices, 95 normal] 07:48 < havoc> morning 07:51 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 54 (Connection reset by peer)] 07:52 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 07:53 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 07:55 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 07:56 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 54 (Connection reset by peer)] 07:56 -!- pfo_ is now known as pfo 08:08 < havoc> maybe I'll get around to putting ovpn on win2k8 tiday 08:08 < havoc> today 08:08 < havoc> may have to disable the sign-driver protection though, not sure yet 08:42 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 08:42 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 104 (Connection reset by peer)] 08:42 -!- pfo_ is now known as pfo 08:49 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 104 (Connection reset by peer)] 08:49 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 08:54 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 09:06 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 09:15 -!- Diffen [n=diffen@226.234.241.83.in-addr.dgcsystems.net] has quit ["This computer has gone to sleep"] 09:24 -!- Diddi [i=diddi@zenit.bsnet.se] has quit [Remote closed the connection] 09:26 -!- rajin [n=_@port-94030.pppoe.wtnet.de] has joined ##openvpn 09:52 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 09:52 -!- cityLights [n=cityLigh@bzq-84-111-46-151.red.bezeqint.net] has joined ##openvpn 09:52 < cityLights> hi can I get some help with bridging 09:52 < cityLights> ? 09:54 < ecrist> sure can. don't know what kind of help you want, though, you haven't asked anything 09:55 < cityLights> ok 09:55 < cityLights> I got two LANs in two sites 09:56 < cityLights> the gateway of the first LAN (subnet) also runs a openvpn server 09:56 < cityLights> the second LAN has a gateway to the internet which runs a openvpn client 09:57 < cityLights> so the second pc connects to the first server 09:57 < ecrist> sounds reasonable 09:57 < cityLights> now, I had it all working in layer3 dev tun 09:58 < cityLights> I want to connect them using layer 2 to allow avahi (zero-config) 09:58 < cityLights> so I changed the config to "dev tap" 09:59 < cityLights> they connect but I dont understand how to do that bridging magic 09:59 < havoc> what OS? 09:59 < cityLights> gentoo linux 09:59 < havoc> as bridging involves some OS-dependent steps 09:59 < cityLights> in both pcs, I installed the relevent tools and kernel modules 10:00 < havoc> so you have br0 on both ends? 10:00 < cityLights> and indeed I setup br0 and tap0 10:00 < havoc> and the local taps are bridged? 10:00 < cityLights> yes I do have br0 on both ends 10:00 < havoc> so say tap0 + eth0 = br0? 10:00 < ecrist> is tap0 'up' on both boxes? 10:00 < cityLights> brctl show 10:00 < cityLights> bridge name bridge id STP enabled interfaces 10:00 < cityLights> br0 8000.00d0b79ef738 no eth1 10:00 < cityLights> tap0 10:01 < ecrist> ifconfig br0 10:01 < ecrist> ifconfig tap0 10:01 < ecrist> from both hosts, please 10:02 < ecrist> I only care about line 1 10:03 < cityLights> server:br0 Link encap:Ethernet HWaddr 00:d0:b7:9e:f7:38 tap0 Link encap:Ethernet HWaddr 42:02:94:ba:31:c7 10:03 < ecrist> is linux output that different? 10:04 < ecrist> can you pastebin the entire output from both? 10:04 < cityLights> min 10:05 < cityLights> my question is: should I add the line server-bridge 192.168.14.1 255.255.255.0 192.168.14.82 192.168.14.94 ? 10:05 < ecrist> if you want openvpn to hand the ips to the vpn server, yes 10:06 < cityLights> when I do that the tap0 devices get an IP address, but I understand that if I bridge them to the LAN ethernet card and give them a static IP - they should get an IP right? 10:07 < ecrist> that line doesn't make sense to me 10:08 -!- martexx [n=martexx@92.69.4.167] has joined ##openvpn 10:08 < cityLights> ok let me show you then 10:08 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 110 (Connection timed out)] 10:08 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 10:09 < martexx> HI there, i have a question about routing. I have a voip server in working order and it also servers as a openvpn server 10:10 < martexx> everything is working ok, but i need to know if it is possible that i put some rules in my home router so that a desktop ip phone can register to this server. local phone --> local pc ---> openvpn 10:11 < martexx> local pc is 172.19.3.2 phone is 172.19.3.3 and server is 10.8.0.1 10:12 < martexx> i dont mind to keep the pc on power 10:12 < ecrist> yes, but it involves connection sharing on your desktop/client PC and running a DHCP server available via the VPN 10:12 < cityLights> ecrist: min pls 10:13 < martexx> mmm i tried connection sharing and i lost internet but thats proberply dns then 10:13 < martexx> but i dont want other machines to connect to the internet via the vpn, only the phone 10:14 < ecrist> not sure what that has to do with this. 10:14 < ecrist> the phone should plug directly into your PC 10:14 < martexx> no it plugs in my router 10:14 < ecrist> PC should have internet connection sharing enabled 10:14 < ecrist> martexx: then no, it's going to be more difficult than that 10:15 < martexx> this i understand .. to create a route to the vpn 10:15 < ecrist> assign a static VPN ip to your phone, and set it's default route to your PC's VPN address 10:15 < martexx> is it not possible to create routing rules or something in the router telling that traffic to 10.8.0.1 goes tru the pc\ 10:15 < martexx> aha 10:16 < martexx> and my pc will know what to do? 10:16 < martexx> or will the vpn just be available 10:16 < ecrist> you'll need a bridged vpn, and bridge tap with your lan address 10:16 < martexx> mmm i using routing now :( 10:17 < ecrist> this is really beyond teh scope of this channel 10:17 < martexx> actualy im not shure if i do, i have a tun device. oh ok i did not know what the scope was, but thanks for your advice 10:18 < havoc> FYI, bridging on windows: http://www.pavelec.net/adam/openvpn/bridge/ 10:18 < vpnHelper> Title: OpenVPN Bridging with Windows HOWTO (at www.pavelec.net) 10:18 < martexx> hey im gonna take a look at that, thanks 10:19 -!- pfo_ [n=pfo@pseudoterminal.org] has joined ##openvpn 10:21 < martexx> to havoc: so i tried this before and lost my internet connection, do i need to give my pc and phone a static ip on my router or on openvpn server? I only want to conect to the server secure, other traffic can go via my home wan 10:23 < martexx> as i see it openvpn will do dns in this setup and its proberply setup so that all traffic goed to openvpn server :( 10:23 < martexx> dns is dhcp 10:23 < havoc> openvpn does not do dns 10:23 < havoc> it can push ips of dns servers though 10:24 < martexx> i will give this a trie when im home, working remote now so it wont wordk :) Thank you!! 10:25 < havoc> hmm, ok 10:25 < martexx> Too bad i cant tell my router that traffic for 10.8.0.1 needs to go to my pc 10:25 < havoc> I was reading back trying to figure out want the goal was 10:25 < martexx> Im soorry but if i try now i lose the connection, tried this before 10:26 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 110 (Connection timed out)] 10:26 -!- pfo_ is now known as pfo 10:26 < havoc> what kind of router is it? 10:26 < martexx> i want my desktop ip phone wich is connected to my router at home to register on the openvpn server 10:26 < martexx> its a allied data p2p1212 10:27 < martexx> or something like that, it has the option to add routes 10:27 < martexx> and i can use an different one if needed like a linksys bef or fritzbox 10:27 < havoc> then yes, you should be able to add either a host, or subnet route to it that uses your pc as the gateway 10:27 < havoc> but then the phone also need to use the router as the default gatewat 10:28 < havoc> and the routers needs an interface to the foreign subnet 10:28 < havoc> router 10:28 < martexx> it does now as its connected to the router and get an ip from it. TThe sip account registers to 10.8.1.0 10:28 < martexx> an interface? 10:29 < havoc> but the router needs a path to 10.8.1.0 10:29 < martexx> i can add an interface to the router, i saw this option 10:29 < martexx> yes thats was the question 10:30 < cityLights> ecrist: http://dpaste.com/142571/ 10:30 < havoc> see, the router can't "tell" the phone where to send packets, the phone is just sending them to the router 10:31 < martexx> so i ned to add a virtual interface on the same subnet on this router 10:31 < havoc> so once the router would have them it would be completely up to the router to get them to the right spot 10:31 < havoc> this means the router would need an interface on the 10.8.1.0 subnet 10:31 < martexx> and then make a route to the local pc wich will act as gateway 10:31 < havoc> correct 10:31 < ecrist> cityLights: ok, all the interfaces are UP, which is a good place to be. where is br0 on client? 10:31 < martexx> this last thing.. will the pc accept these kind of connections automaticly? 10:32 < cityLights> ecrist: I am afraid I killed sshd on the client now, and can no longer access it 10:32 < havoc> martexx: not necessarily 10:32 < martexx> i was thi nking to set up a small server at home for this but the problem will persist 10:32 < martexx> thats too bad :) 10:32 < havoc> martexx: the pc needs the interface esposed externally, and not firewalled 10:33 < havoc> martexx: and the pc must have a route to direct the packets once it recieves them the same as the routers 10:33 < havoc> router 10:33 < cityLights> ecrist: my question is: in a bridging senerio should the tap0 device on the client get an IP address from openvpn? 10:33 < martexx> maybe i will buy a phone wich supports openvpn, they already exist!!!!!!!well its a local network so i dont think that will be a problem 10:33 < ecrist> cityLights: it doesn't really need to 10:33 < ecrist> ethernet (bridging) is layer 2, IP is layer 3 10:34 < cityLights> haha so I can avoid the server-bridge line in the config 10:34 < havoc> martexx: routing is failry simple, once you understand what it does, and more importantly what it does NOT do 10:34 < ecrist> you *could* have an entire ethernet bridged vpn without a single IP assigned and be functional for compat protocols 10:34 < martexx> too bad i cant try it right now 10:34 < havoc> martexx: basically, at any point/hop along the way, there must be a route on that router to the intermediate/final destination 10:35 < martexx> Thank soo much for your thoughts on this, it has given me some insight and i will try it as soon as i am home next wek or so 10:35 < martexx> yes i see that now, thank you man (or woman) 10:35 < havoc> usually you have a net/host route to a foreign subnet through a specified gateway of which the router is a memeber of the same subnet 10:35 < cityLights> ecrist : when I have the server-bridge line , and the client tap0 gets an IP , I can ping it from the server using the client's br0 IP address 10:36 < havoc> martexx: good luck later :) 10:36 < cityLights> when I drop the server-bridge line I can;t 10:36 < martexx> setup virtual interface on router and then add route to pc, on pc add route to 10.8.0.0 or 10.8.0.1 10:37 < martexx> hey i can try this as it wont concern bridging the adapters 10:37 -!- hyper_ch [n=hyper@81.62.30.120] has quit [Remote closed the connection] 10:37 < martexx> coolc 10:38 < havoc> martexx: if 10.8.0.0 is the vpn network, then the router must have an iface in the same subnet as the PC 10:38 < martexx> so i ca do it remote 10:38 < havoc> it might not need to be in the 10.8.0.0 subnet 10:38 < ecrist> cityLights: I forget the option, but there's another option separate from server-bridge 10:39 < martexx> ? the router server the ihome network so has it not already a iface in this subnet off pc? 10:39 < havoc> martexx: add a host route on the router to 10.8.0.0 255.255.255.0 using 172.19.3.2 as gateway (assuming 172.19.3.2 is the PC, and that the router also has an iface in the 172.19.3.0 subnet) 10:39 < martexx> sorry for my english 10:40 < havoc> martexx: then you need a route on the PC to get to 10.8.0.0 from 172.19.3.0 10:40 < havoc> but that should be there already 10:40 < havoc> martexx: the PC also muct do IP forwarding 10:40 < martexx> ok ill try it, yes it should be there as i can acces the vpn server from this pc 10:40 < martexx> good tip, ill try it 10:41 < havoc> martexx: the IP forwarding thing is key 10:41 < havoc> martexx: nothing can "route" incoming traffic without it 10:41 < havoc> I believe there's an openvpn faq about it somewhere 10:42 < havoc> martexx: and your english is good enough to get the job done :) 10:43 < havoc> martexx: just remember that for routing to work you always need IP forwarding, and a rule that tells you 2 things: 1) where to go [subnet|host], and 2) how to get there [gateway] 10:46 -!- martexx480 [n=martexx@92.69.4.167] has joined ##openvpn 10:47 < martexx480> havoc: that was rude from me, got disconnected 10:47 < martexx480> now ill give it a try but as this is a java app (irc) i cant stay connected as my laptop sucks 10:48 < martexx> thank you again and perhaps catch u later 10:49 -!- martexx [n=martexx@92.69.4.167] has quit ["http://irc2go.com/"] 10:49 < martexx480> seems i was not diconnected haha 10:50 < martexx480> just did not see the window, now im gone 10:50 -!- martexx480 [n=martexx@92.69.4.167] has quit [Client Quit] 10:50 < havoc> ok, good luck :) 10:50 < havoc> doh 10:50 -!- pfo [n=pfo@pseudoterminal.org] has quit [] 10:52 -!- yoshx [n=yoshx@93.9.150.199] has quit [Read error: 110 (Connection timed out)] 11:04 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 11:04 -!- jmm [n=jmm@LPuteaux-156-14-28-187.w82-127.abo.wanadoo.fr] has quit [Read error: 113 (No route to host)] 11:04 -!- APTX|_ [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 11:08 -!- aia [n=aia@64-135-203-23.FoxValley.net] has quit ["Bye"] 11:15 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 11:25 < cityLights> ecrist: what does that option do? "but there's another option separate from server-bridge" 11:28 < krzee> !factoids 11:28 < vpnHelper> krzee: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 11:28 < krzee> !bridge-dhcp 11:28 < vpnHelper> krzee: "bridge-dhcp" is http://openvpn.net/faq.html#bridge-addressing for making clients grab dhcp ip over the bridge but not over-riding dhcp ip from local dhcp server 11:29 < cityLights> krzee: but then the tap0 in the client will get an IP address 11:30 < krzee> thats all i got for ya, i dont support bridge setups 11:30 < krzee> theres RARELY a real reason to use bridge 11:31 < cityLights> but the whole point of a bridge mode is to avoid giving the tap device an address, right? 11:31 < krzee> nope 11:31 < havoc> cityLights: krzee is *not* the guy you want to be talking to about briding/TAP ;) 11:31 < krzee> the whole point of bridge mode is to tunnel layer2 traffic 11:31 < krzee> and be in the same broadcast domain without a bcast relay 11:31 < cityLights> zero-config for example 11:31 < havoc> and you should have a damn good, and well understood, reason for bridging/using TAP 11:32 < krzee> havoc is right on both of those 11:32 < cityLights> issue is I am searching to learn about bridging 11:32 < havoc> *but*, if you have a good reason, and understand the implications, then sure, bridging and/or tap is ok 11:32 < cityLights> and I dont see a good source 11:33 < havoc> krzee: is ipsec layer2 or 3? 11:33 < havoc> as I understand it the main difference is that ipsec runs in kernel space, ssl (ovpn) runs in user space? 11:33 < cityLights> 2 11:33 < krzee> its its own layer3 protocol 11:34 < krzee> thats a huge difference 11:34 < cityLights> right 11:34 < krzee> and it tunnels layer3 11:34 < krzee> ip traffic 11:36 < krzee> cityLights, whats zeroconfig do for you? 11:36 < cityLights> ssh , samba,cups and pulse-audio 11:37 < krzee> why do you need zeroconfig for any of those? 11:38 < cityLights> so I can use these services regardless of where my portable is 11:38 < krzee> !wins 11:38 < vpnHelper> krzee: "wins" is http://oreilly.com/catalog/samba/chapter/book/ch07_03.html is a good link for seeing how to run WINS on samba 11:38 < krzee> !pushdns 11:38 < vpnHelper> krzee: "pushdns" is (#1) push "dhcp-option DNS a.b.c.d" to push dns to the client, or (#2) http://thread.gmane.org/gmane.network.openvpn.user/25139/focus=25147 see that mail archive for some info on pushing dns, or (#3) http://article.gmane.org/gmane.network.openvpn.user/25149 for a perm fix via regedit 11:38 < krzee> can push wins option too 11:39 < krzee> ssh, i dont see how zeroconfig has ANYTHING to do with 11:39 < krzee> cups is an ip protocol 11:39 < havoc> personal choice should be enough of a reason 11:39 < krzee> (samba is too, but wins will get you netbios resolution) 11:39 < havoc> ...if the implications are understood, and accepted 11:39 < krzee> *shrug* i guess so, you think he understands the implications tho? most dont 11:39 < cityLights> well, I got started on this from pidgin bonjur implimintation 11:40 < havoc> krzee: not necessarily, but you're the one to tell him :) 11:40 < krzee> security and performance are the implications 11:40 -!- TheDavidFactor-H [n=chatzill@nc-71-0-16-133.dhcp.embarqhsd.net] has joined ##openvpn 11:40 < krzee> !tunortap 11:40 < havoc> !mitm 11:40 < vpnHelper> krzee: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 11:40 < vpnHelper> krzee: against you over the vpn 11:40 < vpnHelper> havoc: "mitm" is (#1) http://openvpn.net/index.php/documentation/howto.html#mitm to know about stopping Man-in-the-Middle attacks by signing the server cert specially, or (#2) use !servercert to generate the server cert manually or use the easy-rsa build-key-server script to build your server certificates, or (#3) then use: ns-cert-type server in the client config 11:40 < cityLights> so I can "see" the other parties on the lan , without the need to connect to msn or google 11:40 < krzee> nah !mitm is for servercert 11:41 < havoc> cityLights: before going down this road, and possibly accepting the potential risks, you should understand the possible exploitations of layer2 11:41 < havoc> krzee: also layer2 11:41 < havoc> ...as opposed to layer3/TUN 11:41 < krzee> no, the factoid !mitm has nothing to do with layer2 11:41 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 11:41 < havoc> ah, I wasn't sure about the contents of the factoid 11:41 < havoc> doh 11:42 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 11:43 < havoc> krzee: wrong button? 11:43 < havoc> and I wasn't sure about the contents of the factoid 11:43 < krzee> forgot battery was low 11:43 < havoc> aCk! 11:43 < krzee> check out what ecrist did with the factoids 11:43 < krzee> !factoid 11:43 < vpnHelper> krzee: Error: "factoid" is not a valid command. 11:43 < krzee> !factoids 11:43 < vpnHelper> krzee: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 11:43 < havoc> yeah, I've seen him testing the past few days 11:44 < krzee> i had forgotten about so many of those 11:44 -!- Gilos [n=Gilos@kccsfw01.sec.sprint.net] has quit [Remote closed the connection] 11:44 < krzee> whoa i dont know if i ever saw this one 11:44 < krzee> !bonjour 11:44 < vpnHelper> krzee: "bonjour" is http://www.dslreports.com/forum/r18525512-Routing-Bonjour-How-to 11:45 -!- hyper_ch [n=hyper@adsl-89-217-25-187.adslplus.ch] has joined ##openvpn 11:45 -!- polaru [n=polaru@93.113.192.70] has quit [Read error: 104 (Connection reset by peer)] 11:46 < TheDavidFactor-H> Hey all, I'm trying to setup an openvpn client on Fedora Core 10, the server is pushing down "dhcp-option DNS x.x.x.x"; it works on windows machines, but I can't get it to work on my FC machine. Can anyone point me to the documentation that would address this? 11:49 < krzee> openvpn comes with a script for it 11:49 < krzee> to update the resolv.conf 11:50 < krzee> google also has quite a few of them 11:51 < TheDavidFactor-H> ok, thanks! 11:51 < krzee> update-resolv-conf 11:51 < krzee> np 11:51 < krzee> !learn pushdns as in unix you'll use the update-resolv-conf script 11:51 < vpnHelper> krzee: Error: You don't have the factoids.learn capability. If you think that you should have this capability, be sure that you are identified before trying again. The 'whoami' command can tell you if you're identified. 11:51 < krzee> do too 11:52 < krzee> !learn pushdns as in unix you'll use the update-resolv-conf script 11:52 < vpnHelper> krzee: Joo got it. 11:57 < krzee> !learn menu or type !factoids to see a complete list 11:57 < vpnHelper> krzee: (learn [] as ) -- Associates with . is only necessary if the message isn't sent on the channel itself. The word 'as' is necessary to separate the key from the value. It can be changed to another word via the learnSeparator registry value. 11:57 < krzee> !learn menu as or type !factoids to see a complete list 11:57 < vpnHelper> krzee: Joo got it. 12:02 -!- TheDavidFactor-H [n=chatzill@nc-71-0-16-133.dhcp.embarqhsd.net] has quit [Remote closed the connection] 12:07 -!- teddymills [n=teddy@208.92.235.227] has quit ["Ex-Chat"] 12:10 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 12:12 -!- aia [n=aia@64-135-203-23.FoxValley.net] has joined ##openvpn 12:12 -!- aia [n=aia@64-135-203-23.FoxValley.net] has quit [Remote closed the connection] 12:12 -!- aia [n=aia@64-135-203-23.FoxValley.net] has joined ##openvpn 12:19 -!- aia [n=aia@64-135-203-23.FoxValley.net] has quit ["Bye"] 12:19 -!- theoretical [n=theoreti@64-135-203-23.FoxValley.net] has joined ##openvpn 12:25 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 12:33 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Read error: 110 (Connection timed out)] 12:33 -!- pfo_ is now known as pfo 12:43 -!- MadTBone [n=MadTBone@160.39.238.196] has joined ##openvpn 12:58 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [] 13:05 < vpnHelper> New forum entry openvpnforum: Wishlist :: Re: Statistics Offloading :: Reply by krzee 13:06 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 13:12 -!- Gnewt [n=hackerle@li57-94.members.linode.com] has joined ##openvpn 13:13 < Gnewt> Hey, I'm running Tunnelblick on a Mac, connecting to a server that pushes "dhcp-option DNS 10.8.0.1" 13:13 < Gnewt> er, along with some other dns servers after that 13:13 < Gnewt> queries for public domains resolve fine 13:13 < Gnewt> but things like fidelity.vpn are resolved with dig but ping and Finder don't recognize them 13:13 < Gnewt> help? 13:14 < krzee> !pushdns 13:14 < vpnHelper> krzee: "pushdns" is (#1) push "dhcp-option DNS a.b.c.d" to push dns to the client, or (#2) http://thread.gmane.org/gmane.network.openvpn.user/25139/focus=25147 see that mail archive for some info on pushing dns, or (#3) http://article.gmane.org/gmane.network.openvpn.user/25149 for a perm fix via regedit, or (#4) in unix you'll use the update-resolv-conf script 13:14 < krzee> see #4 13:14 < krzee> actually i saw one that specificly supports osx 13:14 < krzee> 1sec 13:15 < Gnewt> resolvconf is being updated as far as I can tell. cat /etc/resolv.conf shows 10.8.0.1 as first on the nameserver list. 13:16 < krzee> hrm and if you do this it works? 13:16 < krzee> host fidelity.vpn 10.8.0.1 13:16 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [] 13:16 -!- flo|va-nu-pied [n=florent@unaffiliated/flovanupied/x-758957] has quit [Read error: 113 (No route to host)] 13:17 < Gnewt> yep that works 13:17 < Gnewt> it seems like the OS isn't recognizing the change in resolv.conf 13:18 < krzee> interesting 13:18 < krzee> ive never tried in osx but i know it does use resolv.conf 13:18 < krzee> checked in tcpip settings to see if its visable in there too? 13:19 < reiffert> OS X is special, got a changed resolverlib in libc. 13:19 < reiffert> nameservice per domain is possible 13:20 < reiffert> adding nameserves without touching resolv.conf is possible as well 13:20 < Gnewt> I can have them all go through 10.8.0.1, is that what I should do? 13:20 < Gnewt> DNS servers are listed in the system config 13:21 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 13:22 < Gnewt> haha, this is such a weird bug XD 13:22 < Gnewt> if I put 10.8.0.1 in the DNS server 13:22 < Gnewt> only 10.8.0.1 13:22 < Gnewt> resolving works EXCEPT when pinging somebody inside the VPN 13:22 < Gnewt> it resolves and then the VPN dies 13:25 < Gnewt> lunchtime, back in a bit 13:35 < vpnHelper> New forum entry openvpnforum: Wishlist :: Re: Statistics Offloading :: Reply by ecrist 13:43 -!- dazo is now known as dazo_afk 13:43 -!- cityLights [n=cityLigh@bzq-84-111-46-151.red.bezeqint.net] has quit [Remote closed the connection] 13:47 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 13:51 -!- Intensity [i=[lRD75M9@unaffiliated/intensity] has quit [Remote closed the connection] 13:58 -!- pfo_ [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 14:06 -!- MadTBone [n=MadTBone@160.39.238.196] has quit [Remote closed the connection] 14:15 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 110 (Connection timed out)] 14:15 -!- pfo_ is now known as pfo 14:17 -!- rajin [n=_@port-94030.pppoe.wtnet.de] has quit [" Want to be different? Try HydraIRC -> http://www.hydrairc.com <-"] 14:23 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [] 14:25 -!- andyjrobbins [n=ajrobbin@h70.251.190.173.static.ip.windstream.net] has joined ##openvpn 14:25 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 14:33 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 14:38 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has quit ["This computer has gone to sleep"] 14:39 < andyjrobbins> Greetings. I'm setting up openvpn on CentOS 5 and I am running into an error when I ./build-ca 14:40 < andyjrobbins> It says: 8930:error:0E065068:configuration file routines:STR_COPY:variable has no value:conf_def.c:629:line 88 14:40 < andyjrobbins> But I'm not sure what the STR_COPY variable should be set to and Googling has not yet produced the answer to my problem - any ideas? 14:48 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit [Read error: 60 (Operation timed out)] 14:56 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [] 15:07 < andyjrobbins> Ok, line 88 of openssl.cnf had: default_bits = $ENV::KEY_SIZE 15:07 < andyjrobbins> I changed this to default_bits = 1024 - and then it ran fine 15:23 < Matir> andyjrobbins, had you sourced the "vars" file into your environment? 15:43 -!- dwalluck [n=david@adsl-75-27-144-92.dsl.wlfrct.sbcglobal.net] has left ##openvpn [] 16:10 < ecrist> easyrsa sucks 16:11 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit ["I am off"] 16:11 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 16:15 < reiffert> what for? 16:31 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 16:38 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 16:45 -!- g0tcha [n=VaiO@41.252.62.179] has joined ##openvpn 16:51 -!- andyjrobbins [n=ajrobbin@h70.251.190.173.static.ip.windstream.net] has quit [] 17:47 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 17:47 -!- corretico__ [n=laguilar@201.201.46.106] has joined ##openvpn 17:47 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 17:48 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 17:48 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 17:48 -!- corretico__ [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 17:52 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 18:22 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has quit ["This computer has gone to sleep"] 18:22 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 18:30 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 18:36 < g0tcha> do i have to restart openvpn server everytime i create a new client certifacte? 18:37 < reiffert> no. 18:37 < g0tcha> thank you 18:53 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 19:06 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [] 19:19 -!- Intensity [i=[iKhVexW@unaffiliated/intensity] has joined ##openvpn 19:27 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has quit ["This computer has gone to sleep"] 19:33 < Bushmills> http://eprint.iacr.org/2010/006 - 768 bit RSA keys to be considered crackable now 19:33 < vpnHelper> Title: Cryptology ePrint Archive: Report 2010/006 (at eprint.iacr.org) 19:36 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 19:39 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 19:39 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] 19:39 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 19:52 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has quit [Client Quit] 20:38 -!- jmm [n=jmm@LPuteaux-156-14-28-187.w82-127.abo.wanadoo.fr] has joined ##openvpn 20:45 -!- nneul [n=nneul@mo-76-3-37-166.dhcp.embarqhsd.net] has joined ##openvpn 20:45 -!- nneul [n=nneul@mo-76-3-37-166.dhcp.embarqhsd.net] has quit [Client Quit] 21:17 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 21:30 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 21:34 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 22:08 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has quit ["Ctrl-C at console."] 22:08 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has joined ##OpenVPN 22:09 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has quit [Client Quit] 22:10 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has joined ##OpenVPN 22:21 -!- lclarkjr [n=wIRCer@173-132-88-153.pools.spcsdns.net] has joined ##openvpn 22:22 -!- lclarkjr [n=wIRCer@173-132-88-153.pools.spcsdns.net] has left ##openvpn [] 22:25 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 104 (Connection reset by peer)] 22:25 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 22:25 -!- mode/##openvpn [+v Kasx] by ChanServ 22:33 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 22:34 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 22:38 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 22:38 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 23:04 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [Read error: 104 (Connection reset by peer)] 23:05 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 23:19 -!- broerd [n=broerd@S0106001f3a41bc6a.gv.shawcable.net] has joined ##openvpn 23:38 -!- broerd [n=broerd@S0106001f3a41bc6a.gv.shawcable.net] has quit ["http://irc2go.com/"] --- Day changed Sat Jan 09 2010 00:14 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 00:31 -!- Leila [i=d9dae562@gateway/web/freenode/x-iucockirqpvioumd] has joined ##openvpn 00:36 -!- Leila [i=d9dae562@gateway/web/freenode/x-iucockirqpvioumd] has left ##openvpn [] 01:03 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 01:18 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 01:19 -!- mode/##openvpn [+o mattock] by ChanServ 02:57 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 03:07 -!- master_of_master [i=master_o@p57B54290.dip.t-dialin.net] has joined ##openvpn 03:16 -!- Intensity [i=[iKhVexW@unaffiliated/intensity] has quit [Excess Flood] 03:18 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Excess Flood] 03:18 -!- master_o1_master [n=master_o@p57B570A3.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:19 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 03:20 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 03:23 < krzee> ecrist, here? 03:24 < krzee> any interest of being CTO of a company in costa rica? 03:24 < krzee> personally im good where im at but i know you were looking to get outta the job you're at and i think youd do a good job out here 03:25 -!- Intensity [i=[bcjlWLN@unaffiliated/intensity] has joined ##openvpn 03:25 < krzee> let me know either way, i have people in mind if you say you arent interested 03:29 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 03:29 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 03:32 < reiffert> CTO in Costa Rica sounds interesting, what about working hours, vacation and salery? 03:33 < reiffert> How many slaves, how many employes in the company? 03:35 < krzee> reiffert, you actually interested or just curious? 03:36 < krzee> ild have no issue with recommending you if you are actually interested 03:36 < krzee> as to the questions, i cant answer them 03:37 < krzee> you wouldnt be working for or with me 03:37 < krzee> someone said something along the lines of 'damn too bad this guy is spoken for, we need a new cto' 03:37 < krzee> to which i responded that we should talk shop some 03:38 < krzee> found out what it is they require from one, and said i had some people i knew that fit their needs 03:38 < krzee> anything beyond that is none of my business since im just connecting 2 people 03:40 < krzee> company is large, not sure of the tech team's size 03:41 < krzee> and they know who i am, and respect my recommendation (they dont just know me from now) 03:48 < reiffert> More curious than interested, cant stop things here.. 03:50 < reiffert> Maybe Bushmills .. said something that it's too cold outside atm 03:50 < krzee> gotchya 03:56 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit [Read error: 60 (Operation timed out)] 04:31 -!- Zordrak [n=jaz@87-194-141-163.bethere.co.uk] has quit [Read error: 60 (Operation timed out)] 04:33 -!- Zordrak [n=jaz@87-194-141-163.bethere.co.uk] has joined ##openvpn 04:42 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 04:42 -!- Intensity [i=[bcjlWLN@unaffiliated/intensity] has quit [Excess Flood] 04:44 -!- Zordrak_ [n=jaz@87-194-141-163.bethere.co.uk] has joined ##openvpn 04:47 -!- Intensity [i=[1pUJy44@unaffiliated/intensity] has joined ##openvpn 04:50 -!- Zordrak__ [n=jaz@87-194-141-163.bethere.co.uk] has joined ##openvpn 04:50 -!- Zordrak_ [n=jaz@87-194-141-163.bethere.co.uk] has quit [Read error: 60 (Operation timed out)] 04:55 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 04:56 -!- Zordrak [n=jaz@87-194-141-163.bethere.co.uk] has quit [Read error: 110 (Connection timed out)] 05:03 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Read error: 110 (Connection timed out)] 05:03 -!- pfo_ is now known as pfo 05:09 -!- pfo_ [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 05:29 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 110 (Connection timed out)] 05:34 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 05:39 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Client Quit] 05:44 -!- pfo_ [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Read error: 110 (Connection timed out)] 05:59 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 06:03 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 06:07 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has quit ["This computer has gone to sleep"] 06:09 -!- Irssi: ##openvpn: Total of 91 nicks [0 ops, 0 halfops, 1 voices, 90 normal] 06:32 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 06:33 -!- int [n=quassel@wikia/int] has quit [Read error: 60 (Operation timed out)] 06:35 -!- int [n=quassel@int.matrixtelecom.net] has joined ##openvpn 06:55 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 07:11 -!- APTX|_ [n=APTX@chello089076052083.chello.pl] has quit [Read error: 104 (Connection reset by peer)] 07:23 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 07:45 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has quit ["This computer has gone to sleep"] 07:47 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 07:47 -!- mode/##openvpn [+o mattock] by ChanServ 07:48 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 07:50 -!- Student_of_AI_ [n=chatzill@195-241-32-69.ip.telfort.nl] has joined ##openvpn 07:51 < Student_of_AI_> hello, does open vpn work on windows? 07:52 < havoc> yes 07:52 < havoc> as both a server and client 07:55 < Student_of_AI_> is the client free? 07:57 < Student_of_AI_> I guess so, I registered freely. 07:58 < Student_of_AI_> I'm trying openvpn to acces my university vpn on my windows XP64 machine. My university is telling me to use Cisco VPN. But Cisco VPN does not support x64. I'm hoping that openvpn can replace Cisco VPN. 08:02 < ScriptFanix> nope 08:03 < ScriptFanix> it's not the same protocol 08:20 -!- g0tcha [n=VaiO@41.252.62.179] has quit [] 08:33 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 08:49 -!- Student_of_AI_ [n=chatzill@195-241-32-69.ip.telfort.nl] has left ##openvpn [] 09:31 -!- Intensity [i=[1pUJy44@unaffiliated/intensity] has quit [Excess Flood] 09:32 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 09:35 -!- Intensity [i=[n4t3vNi@unaffiliated/intensity] has joined ##openvpn 09:44 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has joined ##openvpn 09:45 -!- sigi [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 09:48 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 09:58 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 10:16 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has quit ["Leaving"] 10:20 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has joined ##openvpn 10:23 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 10:28 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 10:29 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Client Quit] 10:31 -!- t10000 [n=t10000@p54BD5709.dip.t-dialin.net] has joined ##openvpn 10:32 < t10000> Hi, I want to build an rpm without pkcs-helper support, how can I do this? 10:45 < reiffert> pkcs-helper support? 10:46 < reiffert> run the configure script. 10:46 < reiffert> thomas@mail:~/openvpn-2.1~rc11$ ./configure --help | grep pkcs --disable-pkcs11 Disable pkcs11 support 10:56 < t10000> reiffert: thanks 11:07 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit ["Leaving"] 11:18 -!- qvc [n=pexaa@zurich.perfect-privacy.com] has joined ##openvpn 11:18 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 11:19 < qvc> is the version included in the ubuntu repositories the latest version? 11:20 < reiffert> qvc: ask on #ubuntu. 11:20 < qvc> they wont know that 11:21 < rob0> Read /topic hee and compare? 11:21 < rob0> *here 11:22 < qvc> well I dont know what the crap their version means because it says "2.1~rc19-1ubuntu2" 11:22 < reiffert> 2.1 release candidate 19. 2nd build. 11:22 < rob0> rc19 is ... ys 11:23 < qvc> I dont know if that's the latest? 11:23 < rob0> We do. It is not. 11:24 < qvc> do you have to must register to download openvpn? 11:25 < qvc> !help 11:25 < vpnHelper> qvc: (help [] []) -- This command gives a useful description of what does. is only necessary if the command is in more than one plugin. 11:25 < rob0> huh? Register where? No. 11:25 -!- s0undt3ch [n=s0undt3c@80.69.34.147] has left ##openvpn [] 11:27 < qvc> i cant find where to download the client, only the sever 11:27 < qvc> server 11:28 < rob0> the client IS the server, there is only one package, one binary. 11:28 < qvc> http://openvpn.net/index.php/access-server/download-openvpn-as.html <<<<<<< Title: Access Server Downloads (at openvpn.net) 11:29 < rob0> !access 11:29 < vpnHelper> rob0: Error: "access" is not a valid command. 11:30 -!- Briareos1 [n=B@13-98-136-94.static.net4you.net] has joined ##openvpn 11:30 < Briareos1> which group does a user have to belong to for initiating an openvpn tunnel? 11:30 < Briareos1> Cannot allocate TUN/TAP dev dynamically 11:31 < qvc> rob0: ? 11:31 < rob0> OpenVPN-AS is a commercial product which uses the open source openvpn project. 11:32 < rob0> This channel is about the open source project. 11:33 < qvc> rob0: could you direct me to the open source download please? 11:33 < qvc> I can't' find it 11:33 < rob0> !download 11:33 < vpnHelper> rob0: "download" is www.openvpn.net/download to download openvpn 11:34 < rob0> If that's wrong, I don't know. 11:36 < Briareos1> direct: http://www.openvpn.net/index.php/open-source/downloads.html 11:36 < vpnHelper> Title: Downloads (at www.openvpn.net) 11:37 < Briareos1> anyone knows how to set up networkmanager (ubuntu) to allow a non-root user for a openvpn connection? 11:38 < hyper_ch> what about a sudo user? 11:38 < hyper_ch> I think openvpn needs root right 11:39 < rob0> yes, routing table changes require root privilege 11:40 < hyper_ch> an option would be a cron root that runs like every minute 11:40 < hyper_ch> and check for a given file if new instructions are in there 11:40 < hyper_ch> that file could be set by any user then 11:40 < hyper_ch> but that sounds dangerous to do 11:40 < rob0> and ugly 11:40 < hyper_ch> but it might work 11:41 < rob0> Maybe the Debian/Ubuntu package maintainers have documented how they work. 11:52 -!- t10000_ [n=t10000@84.189.44.175] has joined ##openvpn 11:55 < Briareos1> haven't found something yet, rob0 11:55 < Briareos1> it's kinda strange that there's a gui for openvpn that's apparently not working (without root-privs) 11:56 < krzee> [11:33] rob0: "download" is www.openvpn.net/download to download openvpn 11:56 < krzee> [11:34] If that's wrong, I don't know. 11:56 < krzee> [11:36] direct: http://www.openvpn.net/index.php/open-source/downloads.html 11:56 < vpnHelper> Title: Downloads (at www.openvpn.net) 11:56 < krzee> both are right 11:56 < krzee> first link forwards to second 11:56 < Briareos1> yep 11:58 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit ["I am off"] 12:07 < qvc> rob0, Briareos1 : how do you upgrade if you have an older version of openvpn already on your box? 12:08 -!- t10000 [n=t10000@p54BD5709.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 12:11 -!- corretico_ [n=laguilar@201.201.46.106] has quit [Read error: 54 (Connection reset by peer)] 12:21 < Briareos1> restarting networkmanager solved the problem 12:22 < krzee> !netman 12:22 < vpnHelper> krzee: "netman" is if you are using network manager for linux to configure your vpn, dont! http://openvpn.net/archive/openvpn-users/2008-01/msg00046.html to read the same thing from an openvpn expert on the mail list 12:27 -!- Tattooman919 [n=Tattooma@89.100.125.48] has joined ##openvpn 12:28 -!- Tattooman919 [n=Tattooma@89.100.125.48] has quit [Client Quit] 12:28 < qvc> is it important to check the gnupg signature? 12:28 -!- Tattooman189 [n=Tattooma@89.100.125.48] has joined ##openvpn 12:28 < Tattooman189> hello people 12:28 < Tattooman189> anyone here? 12:29 < qvc> just my cat paul 12:29 < krzee> qvc, personal decision, you know why it exists right? 12:29 < qvc> krzee: not entirely 12:29 < Tattooman189> anyone able help me regarding open vpn routes to sbs 2003 via ipcop 12:29 < krzee> Tattooman189, huh? 12:30 < krzee> qvc, verify integrity of the package 12:30 < Tattooman189> i have weird setup router and sbs 2003 wit 2 nics 12:30 < qvc> i thought it was to make sure someone on a router along the way didn't slip a backdoor into it 12:30 < Tattooman189> so i seted up ipcop on the middle 12:30 < krzee> whats sbs 2003 12:30 < Tattooman189> small business server 12:31 < krzee> windows? 12:31 < Tattooman189> yes 12:31 < qvc> or didnt swap the package for one with a back door in it 12:31 < qvc> or a virus 12:31 < krzee> ok[12:30] i thought it was to make sure someone on a router along the way didn't slip a backdoor into it 12:31 < krzee> wouldnt that be ruining the integrity of the package...? 12:31 < krzee> heh 12:31 < krzee> you thought correct 12:32 < Tattooman189> i can see dmz ip range but cannot see local range after dmz 12:32 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 12:33 < krzee> but the machine you are connecting to can see the local range? 12:33 < Tattooman189> yes 12:33 < Tattooman189> example 192.168.0 12:34 < krzee> !route 12:34 < vpnHelper> krzee: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 12:34 < krzee> read that already? 12:34 < Tattooman189> is dmz range and 192.168.16 is second range 12:34 -!- Tattooman189 [n=Tattooma@89.100.125.48] has quit ["Leaving"] 12:34 < krzee> the machine in the dmz is client or server? 12:34 < krzee> lol ok 12:35 -!- Tattooman189931 [n=Tattooma@89.100.125.48] has joined ##openvpn 12:35 -!- Tattooman189931 [n=Tattooma@89.100.125.48] has quit [Client Quit] 12:35 -!- Tattooman189 [n=Tattooma@89.100.125.48] has joined ##openvpn 12:36 < Tattooman189> sorry popup bloker kicked in 12:36 < Tattooman189> ! route 12:36 < vpnHelper> Tattooman189: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 12:36 -!- Tattooman189 [n=Tattooma@89.100.125.48] has quit [Client Quit] 12:37 -!- Tattooman189 [n=Tattooma@89.100.125.48] has joined ##openvpn 12:37 < Tattooman189> ! route 12:37 < vpnHelper> Tattooman189: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 12:41 -!- t10000_ [n=t10000@84.189.44.175] has quit [Read error: 110 (Connection timed out)] 12:45 < qvc> what if you skim milk it 12:48 < qvc> krzee: could you help me learn how to check gnupg signatures? 12:48 < krzee> wow that was the worst oun i may have ever learned 12:49 < krzee> !google check gnupg 12:49 < vpnHelper> krzee: Integrity Check - GnuPG.org: ; [Announce] GnuPG 2.0.14 released: ; Issue 1176: 'make check' fails for gnupg-2.0.14 - g10 Code's BTS: 12:49 < rob0> Then you'd have less than 1/2% milkfat. Some folks like skim milk, others don't. 2% or whole definitely has the creamy "feel" and taste, but sometimes I like skim better. 12:49 < rob0> "man gpg" would be a good start on that. 12:53 < qvc> man gpg is too hard :( 12:54 < hyper_ch> qvc: not running a desktop? 12:54 < qvc> hyper_ch: what? 12:55 < hyper_ch> qvc: why do you try to check gpg signatures from the cli? 12:55 < qvc> cli=terminal? 12:56 < qvc> hyper_ch: cli = terminal? 12:56 < hyper_ch> yes 12:56 < rob0> It might be as simple as "gpg filename.sig" 12:56 < rob0> In Ubuntu, I bet it is that simple 12:57 < qvc> hyper_ch: well what should I do? 12:57 < rob0> assuming the sig and the signed file are in the current directory. 12:57 < hyper_ch> qvc: I don't even know what you try to do 12:58 < qvc> rob0: what's a signed file? 12:58 < Tattooman189> anyone herw willing to help me ? 12:58 < qvc> hyper_ch: im trying to check the integrity of a openvpn tarball 12:58 < Tattooman189> i have strange setup i need som information 12:59 < rob0> yikes. Why are you bothering if you don't even know that much about it? 13:01 -!- hyper_ch [n=hyper@adsl-89-217-25-187.adslplus.ch] has quit [Read error: 104 (Connection reset by peer)] 13:03 < qvc> rob0: why cant you just answer my question then I will know much about it 13:04 < rob0> I did. I'm not going to try to explain every little bit of it. 13:05 -!- Tattooman189 [n=Tattooma@89.100.125.48] has quit ["Leaving"] 13:17 -!- hyper_ch [n=hyper@84.226.239.178] has joined ##openvpn 13:19 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 13:21 < qvc> rob0: no you didn't. show me you did? 13:42 -!- correcaminos [n=laguilar@201.201.46.106] has joined ##openvpn 13:42 -!- Briareos1 [n=B@13-98-136-94.static.net4you.net] has quit [Read error: 113 (No route to host)] 13:58 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has quit ["Leaving"] 14:12 -!- eyeoh [i=eyeoh@just.download.some.addons.org.ru] has joined ##openvpn 14:12 < eyeoh> !welcome 14:12 < vpnHelper> eyeoh: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 14:13 < eyeoh> !wiki 14:13 < vpnHelper> eyeoh: "wiki" is http://www.secure-computing.net/wiki/index.php/OpenVPN 14:14 < eyeoh> !interface 14:14 < vpnHelper> eyeoh: "interface" is (#1) paste interface configuration from both client and server, while being disconnected and when beeing connected. Be sure to also add the routing tables for both situations from client and from server, or (#2) in windows: ipconfig /all - unix: ifconfig -a , and for routing tables: netstat -rn 14:14 < eyeoh> !howto 14:14 < vpnHelper> eyeoh: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 14:17 < eyeoh> hmm 14:17 < qvc> is not having the latest version a security concern? 14:22 < eyeoh> hehe, im scared to ask questions :p 14:22 < eyeoh> i want to use tap, but the server is set to tun 14:22 < eyeoh> reading up on the howto's im not sure if it can work still 14:23 < eyeoh> and my attempts to make it work have failed :( 14:35 < rob0> Why do you want tap? 14:35 < rob0> qvc, not likely. 14:38 < eyeoh> i was told to use it 14:38 < eyeoh> but its possible to use tun and only route traffic to/from certain ports? 14:39 < eyeoh> and all traffic goes through to the internet as normal 14:39 < rob0> !tap 14:40 < vpnHelper> rob0: "tap" is "bridge" is (#1) http://openvpn.net/index.php/documentation/faq.html#bridge1, or (#2) http://openvpn.net/index.php/documentation/miscellaneous/ethernet-bridging.html, or (#3) Bridging looks like a good choice to people who don't know how to set up IP routing, but to learn routing is generally far better., or (#4) useful for windows sharing (without wins server) and LAN gaming, anything 14:40 < vpnHelper> rob0: where the protocol uses MAC addresses instead of IP addresses. 14:40 < rob0> see #3 14:40 < eyeoh> so tun can work if i get my routing right 14:40 < eyeoh> thats probably why i was told to use it 14:40 < rob0> Because the person who told you doesn't understand routing? :) 14:41 < eyeoh> !routing 14:41 < vpnHelper> eyeoh: Error: "routing" is not a valid command. 14:41 < eyeoh> hehe, probably :D 14:41 < eyeoh> can you recomned a good article on ip routing? 14:41 < rob0> !route 14:41 < eyeoh> i think i tried a bit 14:41 < vpnHelper> rob0: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 14:42 < eyeoh> hehe, I like this bot :) 14:42 * eyeoh skims 14:42 < rob0> :) 14:43 < eyeoh> hmm, I might run in to trouble though; I don't have access to the server config 14:43 < rob0> I learned about routing not so much by reading as by doing, and openvpn is a wonderful toy to teach you this stuff. 14:43 < rob0> ah 14:44 < eyeoh> i like learning curves 14:49 < eyeoh> hmm 14:49 < eyeoh> by the looks of that, that is server side 14:50 < eyeoh> i think i need to split the traffic based on rules defined on the client? 14:53 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 15:11 -!- hyper_ch [n=hyper@84.226.239.178] has quit [Remote closed the connection] 15:23 < qvc> rob0: define "not likely" please 15:26 < rob0> The only exploitable issues in openvpn that I am aware of would be addressed by fixing openssl. If you're using a distro like Ubuntu, they are taking good care of you. Just stay with their packages and their recommended updates, and you will be fine. 15:27 < rob0> BTW I also saw this which might be of interest to you: 15:27 < rob0> !tell qvc ubuntu 15:27 < rob0> !ubuntu 15:27 < vpnHelper> rob0: "ubuntu" is dont use network manager! 15:28 < rob0> I have no idea if that is accurate or not, or what it is supposed to mean in real terms. 15:29 < qvc> um, don't use network manager? 15:29 < qvc> why not? 15:30 < qvc> !why 15:30 < vpnHelper> qvc: Error: "why" is not a valid command. 15:32 < qvc> !why dont use network manager 15:32 < vpnHelper> qvc: Error: "why" is not a valid command. 15:35 < krzee> !netman 15:35 < vpnHelper> krzee: "netman" is if you are using network manager for linux to configure your vpn, dont! http://openvpn.net/archive/openvpn-users/2008-01/msg00046.html to read the same thing from an openvpn expert on the mail list 15:35 < krzee> see that post for your answer 15:37 -!- hyper_ch [n=hyper@84.226.239.178] has joined ##openvpn 15:37 < |Mike|> oi. 15:41 < qvc> oh im not 15:41 < qvc> i just use it to manage my connection 15:41 < qvc> not my vpn 15:49 < ecrist> qvc: network manager is broken 15:50 < qvc> ecrist: what do you mean/ 15:51 < ecrist> did you read the mailing list entry? 15:57 < qvc> ecrist: no, im not subscribed 15:57 < ecrist> http://openvpn.net/archive/openvpn-users/2008-01/msg00046.html 15:57 < vpnHelper> Title: Re: [Openvpn-users] Importing an OpenVPN configuration file in Network Manager (at openvpn.net) 15:58 < |Mike|> you don't need t obe subcribed lol 16:01 -!- correcaminos [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 16:03 < rob0> 403 You Must Be Subscribed Sucka. 16:04 < rob0> Anyway, that didn't say anything specific, Just that Jan doesn't like it. 16:04 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [SendQ exceeded] 16:05 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 16:06 -!- spiekey [n=mario@projekte.imos.net] has joined ##openvpn 16:06 < krzee> and Jan doesnt like it for the same reason we dont 16:06 < spiekey> Hello! 16:07 < spiekey> what are the files 01.pem, 02.pem, etc... good for? 16:07 < krzee> feal free to use it, but dont ask for help regarding it or we'll be saying "dont use it" 16:07 < krzee> spiekey, making a CRL 16:07 < krzee> (iirc) 16:07 < spiekey> CRL? 16:07 < krzee> !crl 16:07 < vpnHelper> krzee: "crl" is (#1) --crl-verify A CRL (certificate revocation list) is used when a particular key is compromised but when the overall PKI is still intact. The only time when it would be necessary to rebuild the entire PKI from scratch would be if the root certificate key itself was compromised., or (#2) you can make use of CRL by using the revoke-full script in easy-rsa (packaged with openvpn) 16:07 < vpnHelper> krzee: that will create the CRL file for you. ssl-admin will also build a crl for you 16:08 < spiekey> thanks 16:08 < krzee> yw 16:10 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has quit ["Leaving"] 16:12 < rob0> krzee, I have no interest in such a thing, it was qvc who mentioned it earlier. I just happened to come across the !ubuntu factoid. 16:12 < krzee> =] 16:12 * rob0 uses ip(8) and iwconfig(8) and the like 16:13 < krzee> oh !ubuntu is just regarding openvpn 16:13 < krzee> same with !netman 16:24 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 16:26 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 16:28 -!- eyeoh [i=eyeoh@just.download.some.addons.org.ru] has quit ["Lost terminal"] 16:44 < Diffen> evning 16:46 < Diffen> i cant get this right regarding the damn route. i guess i might have done something that im not supposed to do. the openvpn server works fine. here are the routing table and so on if someone wants to take a quick look :) http://pastebin.com/d492a4452 16:48 < krzee> you're trying to default route over the vpn? 16:49 < Diffen> krzee i guess so :) i just want to send all traffic through the tunnel 16:49 < krzee> !redirect 16:49 < vpnHelper> krzee: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 16:49 < krzee> server is what OS? 16:49 < Diffen> ubuntu server, latest version 16:49 < Diffen> hmmm 16:50 < krzee> !linnat 16:50 < vpnHelper> krzee: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 16:50 < krzee> !linipforward 16:50 < vpnHelper> krzee: "linipforward" is echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution (til reboot) or set net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 16:50 < krzee> !def1 16:50 < vpnHelper> krzee: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 16:50 < krzee> =] 16:50 < Diffen> push "redirect-gateway def1" 16:50 < Diffen> i have that in my server.conf 16:50 < krzee> and you are NAT'ing the vpn subnet in the server? 16:50 < krzee> and ip forwarding is enabled on the server? 16:51 < Diffen> krzee how do i know if its on? 16:51 < Diffen> sorry but im not a linux expert :( 16:51 -!- eyeoh [n=io@lotsofinfo.mine.nu] has joined ##openvpn 16:51 < eyeoh> sorry, i timed out :( 16:51 < eyeoh> did anyone reply to what i said :D 16:52 < krzee> bbl 16:52 < krzee> Diffen, if you read everything my bot told you you should be able to find the rest on google 16:52 < krzee> my bot gave you exact commands, hehe 16:52 < Diffen> krzee im on it. thanks for the tip :D 16:53 < eyeoh> is it possible to only route specific traffic through tun0/vpn based on the port? 16:54 < |Mike|> sure eyeoh 16:55 < eyeoh> because at the moment it takes over the entire connection, which is nay good :( 16:55 < eyeoh> could i be pushed in the right direction please :D 16:55 < eyeoh> im thinking its routing 16:56 -!- elexis39 [n=elexis39@173-30-169-170.client.mchsi.com] has joined ##openvpn 16:59 < elexis39> Hi. 17:00 < Diffen> !!linnat 17:00 < vpnHelper> Diffen: Error: "!linnat" is not a valid command. 17:00 < Diffen> !linnat 17:00 < vpnHelper> Diffen: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 17:00 < elexis39> wow 17:01 < elexis39> that was actually my question 17:02 < Diffen> :) 17:02 < Diffen> mine too 17:02 < krzee> lol 17:02 < Diffen> now lets try the damn openvpn server :) brb 17:04 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has joined ##openvpn 17:09 < krzee> !sample 17:09 < vpnHelper> krzee: "sample" is (#1) http://www.ircpimps.org/openvpn.configs for a working sample config, or (#2) DO NOT use these configs until you understand the commands in them, read up on each first column of the configs in the manpage (see !man) 17:09 -!- diffen_ [n=diffen@c-d372e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 17:09 < diffen_> :) 17:10 < diffen_> dont know if you got my last message but it works :) thanks krzee :) 17:10 < krzee> =] 17:10 < krzee> yw 17:10 < diffen_> :) 17:10 < diffen_> i have worked on this for 1,5 week :D 17:10 < diffen_> im really happy now 17:10 < diffen_> i feel like dancing :D 17:10 < krzee> ya the first setup often can take awhile if you dont enter it with a lot of network background 17:11 < krzee> im out for awhile, bbl =] 17:11 < diffen_> take car e:D 17:11 < diffen_> care 17:22 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has quit [Read error: 110 (Connection timed out)] 17:26 < eyeoh> brain melt :D 17:27 < rob0> Mmmm, with cheese, and it comes in a convenient microwave-safe bowl! 17:28 < rob0> I'm hungry now. 17:28 * rob0 nibbles on some finger sandwiches 17:29 -!- spiekey [n=mario@projekte.imos.net] has quit ["Ex-Chat"] 17:29 -!- dauergast [n=sag@f055002107.adsl.alicedsl.de] has joined ##openvpn 17:30 < eyeoh> i just had lovely cheese cake 17:30 -!- rajin [n=_@port-9202.pppoe.wtnet.de] has joined ##openvpn 17:30 -!- rajin [n=_@port-9202.pppoe.wtnet.de] has quit [Remote closed the connection] 17:34 < eyeoh> hmm, so i need to use iptables and prerouting 17:35 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 17:35 < |Mike|> cupcakes ftw. 17:37 < eyeoh> hehe, space ones? :D 17:40 -!- diffen_ [n=diffen@c-d372e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Read error: 54 (Connection reset by peer)] 17:42 < eyeoh> -A PREROUTING -t nat -p udp --sport 1234 -j DNAT --to :port 17:43 < eyeoh> if I wanted to route all traffic to/from that port (1234) its something like that? 17:43 < eyeoh> sorry to be a pest :( 17:43 -!- dazo_afk [n=dazo@nat/redhat/x-clfzuciztghjjygs] has quit [Read error: 60 (Operation timed out)] 17:46 < eyeoh> ah 17:46 < elexis39> eyeoh, I just spent a few hours setting up the default easy-rsa config and forwarding stuff from tun0 to eth0 17:46 < elexis39> I ended up using these rules to get it working in the end: http://blog.baldiyo.com/posts/openvpn-roadwarrior-routing-internet-traffic-through-vpn.html 17:46 < vpnHelper> Title: Baldo's web log - Road-Warrior - Routing all client's internet traffic through the VPN (at blog.baldiyo.com) 17:46 -!- Diffen [n=diffen@78-82-118-208.tn.glocalnet.net] has quit [Read error: 60 (Operation timed out)] 17:46 -!- Diffen [n=diffen@c-d372e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 17:49 < eyeoh> ooo 17:49 < eyeoh> im slowly piecing together what I want/need to do 17:49 < eyeoh> thankyou for the link 17:49 < Diffen> hmm stupid question but if i remove push "redirect-gateway def1" 17:49 < Diffen> from the server.conf file. do i need to add the route at the client then? 17:50 < eyeoh> but I want to limit traffic going through the vpn to a port range 17:50 < eyeoh> and all the rest to reach the internet normally 17:52 < qvc> what does it mean to "Import an OpenVPN configuration file in Network Manager" 17:52 -!- dazo_afk [n=dazo@nat/redhat/x-jifqzmzsnwsidnni] has joined ##openvpn 17:52 -!- dazo_afk is now known as Guest8170 17:52 -!- Guest8170 is now known as dazo 17:53 -!- dazo is now known as Guest43774 18:02 -!- Guest43774 [n=dazo@nat/redhat/x-jifqzmzsnwsidnni] has quit [Read error: 60 (Operation timed out)] 18:06 -!- elexis39 [n=elexis39@173-30-169-170.client.mchsi.com] has quit ["Java user signed off"] 18:09 < |Mike|> qvc: rotflol, are you f*cking kidding me ? :s 18:11 < qvc> i knew coming here on a sat night was a mistake lol 18:12 -!- dazo_afk [n=dazo@nat/redhat/x-zfwjbkjozujgogmm] has joined ##openvpn 18:12 -!- dazo_afk is now known as Guest549 18:12 -!- Guest549 is now known as dazo 18:13 -!- dazo is now known as Guest82625 18:13 < qvc> |Mike|: are you angry you didn't have any plans tonight 18:13 < qvc> lol 18:14 < |Mike|> something with timezones. 18:15 < eyeoh> theres a flipside to that qvc :) 18:16 < eyeoh> hmm, iptables dosnt like *nat 18:17 -!- Diffen [n=diffen@c-d372e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["Leaving"] 18:18 < |Mike|> 2.4.x kernels don't *DOH* 18:18 < qvc> |Mike|: admit it, I can catch you here every weekend 18:18 < |Mike|> Doubt that. 18:19 < |Mike|> But then again, why don't you monitor it for me. 18:19 < |Mike|> Hmz, I should write yet another h0no article. 18:20 < qvc> because I don't have as much time on my hands as you 18:20 < eyeoh> qvc, is it not saturday where you are to? 18:20 < |Mike|> epic fail. 18:20 < eyeoh> maybe its sunday now :p 18:20 < |Mike|> We need more trolls in ##openvpn 18:21 < qvc> its wednesday i think 18:21 < eyeoh> 2.6 kernel here btw 18:21 < |Mike|> Don't think, it's Sunday morning! 18:22 < qvc> no I was wrong. its friday on my planet 18:22 < eyeoh> bah, im so close. I can feel it :D 18:23 < |Mike|> qvc is ret. No doubt about that. 18:23 < eyeoh> ./ignore :) 18:24 < qvc> what does it mean to "Import an OpenVPN configuration file in Network Manager" 18:25 < eyeoh> i assume that you need to import your .ovpn file in your network manager 18:25 < qvc> nope 18:25 < |Mike|> network managers suck. 18:25 < |Mike|> !ubuntu 18:25 < vpnHelper> |Mike|: "ubuntu" is dont use network manager! 18:25 < eyeoh> maybe you need to build a building and call it dave 18:27 < qvc> :D 18:28 < qvc> dave huh? 18:28 -!- Diffen2 [n=diffen2@c-d372e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 18:31 < qvc> |Mike|: weren't you the moron that told me earlier that I had to subscribe to the mailing list to read it 18:31 < qvc> lol 18:32 < |Mike|> qvc: Mister, I only warn once. You're the moron in question. And no, it wasn't me. 18:33 < qvc> only warn once about what 18:33 < |Mike|> Abusive language. 18:33 < qvc> its just jesting 18:33 < qvc> :) 18:33 < |Mike|> ignoring all from qvc 18:33 < |Mike|> cya. 18:33 < qvc> oh no 18:34 < qvc> thats what I didn't want 18:34 < qvc> lol 18:35 < |Mike|> ecrist: You might want to help qvc a bit towards the right point (exit ) 18:37 < eyeoh> |Mike|: can i request some guidance please :) 18:37 < qvc> ecrist: I was trying to ask you what you were trying to explain to me when Mike started cursing and insulting me. He's been inappropriate to more than me. Please kick him. 18:38 < eyeoh> have i got ecrist on ignore? 18:38 < eyeoh> i cant see him speak :s 18:38 < qvc> eyeoh: thought you were going to ignore me, mr carpenter 18:39 < |Mike|> heh eyeoh ? 18:39 < eyeoh> both you and qvc talking to ecrist ^^ 18:39 * eyeoh is confused 18:39 < |Mike|> ever heard about hilighting ? 18:39 < eyeoh> of course 18:39 < qvc> eyeoh: put me on ignore. now. I command you. 18:40 < eyeoh> i dont need a command to do that qvc 18:40 < qvc> eyeoh: joke! :P 18:41 < eyeoh> mike, can you help me with my iptables por favor? 18:42 < |Mike|> Nope. I'm not an iptables guru. 18:42 < eyeoh> ah 18:42 < |Mike|> !nat 18:42 < vpnHelper> |Mike|: "nat" is (#1) http://openvpn.net/howto.html#redirect for an explanation of NAT as it applies to openvpn, or (#2) http://www.secure-computing.net/wiki/index.php/OpenVPN/FAQ#Traffic_forwarding_doesn.27t_work_when_using_client_specific_access_rules, or (#3) dont forget to turn on ip forwarding, or (#4) please choose between !linnat and !fbsdnat for specific howto 18:42 < |Mike|> !lin-nat 18:42 < vpnHelper> |Mike|: Error: "lin-nat" is not a valid command. 18:42 < |Mike|> !linnat 18:42 < vpnHelper> |Mike|: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 18:42 < eyeoh> i had a read through !linnat 18:42 < eyeoh> it has helped me 18:43 < qvc> eyeoh: looks like all your brown-nosing got you nowhere 18:43 < eyeoh> ooooo 18:43 < eyeoh> 18:43 < qvc> :p 18:44 < eyeoh> ;p 18:46 -!- diffen3 [n=diffen2@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 18:49 < diffen3> !route 18:49 < vpnHelper> diffen3: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 18:51 -!- dazo_afk [n=dazo@nat/redhat/x-vrciuwwbqqqarvwf] has joined ##openvpn 18:52 -!- dazo_afk is now known as Guest95156 18:52 -!- Guest82625 [n=dazo@nat/redhat/x-zfwjbkjozujgogmm] has quit [Read error: 54 (Connection reset by peer)] 18:55 -!- dazo_afk [n=dazo@nat/redhat/x-ybtxoeoesmarrssg] has joined ##openvpn 18:55 -!- dazo_afk is now known as Guest66910 18:55 -!- Guest66910 is now known as dazo 18:56 -!- dazo is now known as Guest51222 18:56 -!- Diffen2 [n=diffen2@c-d372e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Read error: 110 (Connection timed out)] 18:57 < eyeoh> ahah 18:57 -!- diffen3 is now known as Diffen2 18:57 < eyeoh> http://www.taiter.com/blog/2009/10/iptables-route-traffic-from-sp.html 18:57 < vpnHelper> Title: IPTABLES - Route Traffic from Specific Interface to a Specific Gateway - taiter.com - Tech Blog (at www.taiter.com) 18:57 < eyeoh> this is a big help 18:58 < eyeoh> but i still need to prevent tun0 taking over everything 18:59 < eyeoh> maybe if i was to bind tun0 to a local port? 19:06 < rob0> "Bind tun0 to a local port"? 19:10 -!- Guest95156 [n=dazo@nat/redhat/x-vrciuwwbqqqarvwf] has quit [Read error: 110 (Connection timed out)] 19:12 < eyeoh> well as soon as i initiate it it routes all traffic through it 19:12 < eyeoh> its just my iptables im sure 19:16 < rob0> I missed the real world goal. 19:17 -!- Diffen2 [n=diffen2@78-82-118-208.tn.glocalnet.net] has quit [Read error: 60 (Operation timed out)] 19:17 < eyeoh> i want to only route traffic on port 80 through the vpn, all other traffic is to go through the internet as normal 19:17 -!- Diffen2 [n=diffen2@c-d372e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 19:18 < rob0> and the client(?) OS is ...? 19:18 < eyeoh> client OS is linux, debian 19:19 < rob0> LARTC, a fairly simple recipe 19:20 < rob0> ip route add default via vpn.peer.ip.addr table VPN # add VPN to your /etc/iproute2/rt_tables 19:20 < eyeoh> http://lartc.org/howto/lartc.rpdb.multiple-links.html ? 19:20 < vpnHelper> Title: Routing for multiple uplinks/providers (at lartc.org) 19:20 < eyeoh> sorry to interrupt :) 19:21 < rob0> ip rule ... with a fwmark 19:23 < rob0> iptables -vt mangle -A OUTPUT -p tcp --dport 80 -j MARK ... 19:23 < rob0> the mark you set is the mark that puts it in the VPN table 19:23 < eyeoh> yeah the mark bit i understand (from reading http://www.taiter.com/blog/2009/10/iptables-route-traffic-from-sp.html) 19:23 < vpnHelper> Title: IPTABLES - Route Traffic from Specific Interface to a Specific Gateway - taiter.com - Tech Blog (at www.taiter.com) 19:24 < rob0> In LARTC terms it's fairly simple, but it is complex really 19:24 < Diffen2> hmm is it possible to push a route from openvpn server to client that the client only should send the traffic from client to 130.239.8.25 to tun0. the rest to eth0? i have looked at push route and tested but no good result 19:24 < eyeoh> hehe yeah 19:24 < eyeoh> i feel like i understand it, but its still not graspable 19:24 < rob0> "policy routing" I think it is called 19:24 < Diffen2> thanks rob0 19:25 < rob0> huh? 19:25 < rob0> What am I being thanked for, I had not even read your question yet? 19:26 < rob0> And now I have, and my only answer would have been, "huh?" 19:30 < eyeoh> so when i start openvpn with the client config, it changes the default gw to use the vpn, dosnt it? 19:30 -!- Diffen [n=diffen2@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 19:30 < eyeoh> looking at it starting with verbose 4 i see it doing it 19:31 < eyeoh> how can i prevent that 19:31 < rob0> Hmmm, not ever having seen your config makes that a bit difficult to answer. I would say, definitely maybe, unless not. 19:31 < eyeoh> one second, i will pastebin it 19:31 < eyeoh> if you dont mind? 19:31 < rob0> just don't redirect-gateway 19:32 < eyeoh> http://pastebin.ca/1744840 19:32 < eyeoh> i dont 19:35 < eyeoh> ah 19:35 < eyeoh> but i get a push reply that makes it redirect 19:35 < eyeoh> anyway to prevent that? 19:35 < eyeoh> (i dont have access to the server) 19:36 -!- Diffen2 [n=diffen2@c-d372e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Read error: 104 (Connection reset by peer)] 19:38 < rob0> I don't know, actually, but you can manually delete the routes that the server pushes. Maybe an --up script? 19:41 < eyeoh> ah, so as soon as it initalizes, I just remove the changes? 19:41 < eyeoh> then just build my own? 19:43 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 19:57 -!- Guest51222 [n=dazo@nat/redhat/x-ybtxoeoesmarrssg] has quit [Read error: 60 (Operation timed out)] 19:58 -!- dazo_afk [n=dazo@nat/redhat/x-xocjmklootjmplgk] has joined ##openvpn 19:58 -!- dazo_afk is now known as Guest25297 19:59 -!- Guest25297 is now known as dazo 19:59 -!- dazo is now known as Guest52139 20:00 -!- Diffen [n=diffen2@78-82-118-208.tn.glocalnet.net] has quit ["This computer has gone to sleep"] 20:09 -!- dazo_afk [n=dazo@nat/redhat/x-mjlepsllwgxeosxc] has joined ##openvpn 20:09 -!- dazo_afk is now known as Guest84987 20:09 -!- Guest84987 is now known as dazo 20:10 -!- dazo is now known as Guest33650 20:14 -!- Guest52139 [n=dazo@nat/redhat/x-xocjmklootjmplgk] has quit [Read error: 104 (Connection reset by peer)] 20:15 -!- Guest76610 [n=dazo@nat/redhat/x-fpwztfiswrszdmvx] has joined ##openvpn 20:15 -!- Guest33650 [n=dazo@nat/redhat/x-mjlepsllwgxeosxc] has quit [Read error: 60 (Operation timed out)] 20:16 -!- Guest76610 is now known as dazo 20:16 -!- dazo is now known as Guest92669 20:25 -!- dazo_afk [n=dazo@nat/redhat/x-rlydlhulyongjdde] has joined ##openvpn 20:25 -!- dazo_afk is now known as Guest4532 20:25 -!- Guest4532 is now known as dazo 20:26 -!- Guest92669 [n=dazo@nat/redhat/x-fpwztfiswrszdmvx] has quit [Read error: 60 (Operation timed out)] 20:26 -!- dazo is now known as Guest11014 20:31 -!- theoretical [n=theoreti@64-135-203-23.FoxValley.net] has quit [Read error: 60 (Operation timed out)] 20:34 * dauergast ist jetzt AWAY |grund: auto-AWAY nach 180 min idle-zeit| 20:34 -!- dauergast is now known as dauergast|wech 20:35 -!- dauergast|wech [n=sag@f055002107.adsl.alicedsl.de] has quit ["ich nutze das [G]Script... ©daGroove neuste versionen: www.orbitirc.net"] 20:44 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit [Read error: 60 (Operation timed out)] 20:45 -!- theoretical [n=theoreti@64-135-203-23.FoxValley.net] has joined ##openvpn 20:48 < eyeoh> woo 20:48 < eyeoh> step 1 complete :D 20:59 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 20:59 < mithridates> hey guys, this is mithri who installed openvpn + openvpn-gui-web based finally :D 21:00 < mithridates> who has installed openvpn-gui-webbased ? he gave me some screenshots of openvpn-gui-webbased 21:00 < mithridates> I wanna ask some questions about that 21:04 -!- theoretical [n=theoreti@64-135-203-23.FoxValley.net] has quit [Read error: 60 (Operation timed out)] 21:10 < eyeoh> hmm, I have it working that the vpn works outwords (ping -I tun0 google.com / traceroute -i tun0 google.com work as expected) but when i ping the ip address of the vpn it dosnt respond :( 21:31 -!- qvc [n=pexaa@zurich.perfect-privacy.com] has quit [Remote closed the connection] 23:02 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] 23:17 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [] 23:43 -!- lepine2 [n=leprecha@modemcable140.128-20-96.mc.videotron.ca] has joined ##openvpn 23:43 < lepine2> can anyone remind what i'm forgetting here? just got a tunnel up and running, but can't get past the openvpn server. 23:44 < lepine2> I have push redirect-gateway, /proc/sys/net/ipv4/ip_forward = 1, iptables -P FORWARD ACCEPT 23:45 < lepine2> the routes on my client are good 23:45 < lepine2> the routes on the server are good --- Day changed Sun Jan 10 2010 00:04 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 00:12 -!- lepine3 [n=leprecha@modemcable140.128-20-96.mc.videotron.ca] has joined ##openvpn 00:13 -!- lepine2 [n=leprecha@modemcable140.128-20-96.mc.videotron.ca] has quit [Read error: 110 (Connection timed out)] 00:24 -!- lepine2 [n=leprecha@69-165-136-248.dsl.teksavvy.com] has joined ##openvpn 00:30 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 60 (Operation timed out)] 00:37 -!- lepine3 [n=leprecha@modemcable140.128-20-96.mc.videotron.ca] has quit [Read error: 110 (Connection timed out)] 00:40 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 00:41 -!- lepine2 [n=leprecha@69-165-136-248.dsl.teksavvy.com] has quit ["Leaving."] 01:07 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 01:40 < jaek_> is there any reason why i shouldnt use bridged tap mode? seems like the most straight forward solution... 01:49 -!- LittleJ [n=linuz@82.78.185.26] has quit [Read error: 60 (Operation timed out)] 02:42 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 54 (Connection reset by peer)] 02:43 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 02:45 -!- corretico [n=laguilar@201.201.46.106] has quit [Connection reset by peer] 02:46 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 02:49 < hyper_ch> !route 02:49 < vpnHelper> hyper_ch: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 02:57 < krzee> too bad fot lepine he left 02:58 < hyper_ch> hi krzee 02:58 < krzee> hyper_ch, when you're done reading that if you still have ?'s fire away 02:58 < krzee> but read it well firat 02:58 < krzee> first 02:58 < hyper_ch> krzee: well, can you explain how to route? ^^ 02:58 < hyper_ch> I don't think I'll ever get that concept... but currently I don't have problems 02:58 < krzee> yes, i did it at !route 02:59 < krzee> oh you dont understand routing at all? 02:59 < hyper_ch> krzee: not really... but I don't have an issue 02:59 < krzee> seen a routing table before? 02:59 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 02:59 < hyper_ch> jaek_ asked before what makes tap better than bridging and I thought the !route entry gives that short explanation 03:00 < hyper_ch> krzee: well, I finally managed to set everything up the way I want :) well, sort of... I still had to circumvent a few things 03:00 < krzee> well when your machine has ip forwarding enabled packets may travel in, hit your kernel (routing table) and go out through your machine 03:00 < reiffert> !tunortap 03:00 < vpnHelper> reiffert: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 03:00 < vpnHelper> reiffert: against you over the vpn 03:00 < krzee> your kernel looks at its source address (src) and destination address (dst) 03:01 < reiffert> erm, src? 03:01 < krzee> the most specific route wins 03:01 < krzee> to understand that learn about subnets via google 03:02 < hyper_ch> well, I understand the theoretical principle sort of but not the practical application :) 03:02 < hyper_ch> but don't worry about me... I'm fine with the way I finally set it all up 03:02 < krzee> reiffert, ? 03:03 < krzee> im hammered 03:03 < reiffert> the kernel pays attention to the dst address. 03:03 < krzee> firewall runs in kernel 03:03 < krzee> routing pays attention to dst 03:04 < krzee> kernel sees all of it 03:04 < krzee> besides im way drunk ;] 03:04 < reiffert> I'm trying to get sober ...# 03:04 < hyper_ch> drunk coding is not advised :) 03:04 < krzee> they make a don julio better than 1942! 03:04 < krzee> don julio real 03:05 < krzee> badass bottle too 03:05 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 03:05 < hyper_ch> I wonder, why does routing not also involve ports? wouldn't it make a lot of things easier? 03:05 < krzee> !routebyapp 03:05 < vpnHelper> krzee: "routebyapp" is if you want to send only certain apps over the VPN you need to run a socks server on the internal VPN subnet (see !sockd) then get an app like proxifier (google it) to selectively route traffic over the socks proxy based on port/app/subnet or any combination. 03:06 < reiffert> ah, golden tequila? 03:06 < krzee> smoothest thing i ever seen 03:06 < krzee> the bottle was like $500 usd 03:06 < krzee> i wanted to buy the bottle at first til i heard the price, did shots instead 03:06 < krzee> lol 03:07 < reiffert> hyper_ch: thats called policy routing and varies from OS to OS# 03:07 < hyper_ch> there are other OSes besides Linux? :) 03:07 -!- master_o1_master [n=master_o@p57B54B98.dip.t-dialin.net] has joined ##openvpn 03:07 < krzee> <-- bsd/osx user 03:07 < hyper_ch> right :) there are Unices 03:10 -!- grub_booter [n=charlie@d54C519D5.access.telenet.be] has quit ["Ex-Chat"] 03:11 < hyper_ch> so, what is required to actually master routing? 03:11 < reiffert> iproute2. 03:12 < hyper_ch> I mean what do I need to really undestand routing :) 03:12 < reiffert> google for "static routing" 03:13 < hyper_ch> google hates me 03:13 < hyper_ch> since google knows way too much things about me 03:18 -!- master_of_master [i=master_o@p57B54290.dip.t-dialin.net] has quit [Connection timed out] 03:43 < mithridates> hi reiffert 03:43 < mithridates> reiffert: are you there? 03:47 < mithridates> I'll come back later 04:17 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 05:23 -!- LobbyZ [n=default@main.lobbyzffs.com] has quit ["Free FTW"] 05:24 -!- flo|va-nu-pied [n=florent@unaffiliated/flovanupied/x-758957] has joined ##openvpn 05:24 < flo|va-nu-pied> I all 05:25 < flo|va-nu-pied> My VPN configuration is almost working 05:26 < flo|va-nu-pied> I'm trying to use an external DHCP server with openvpn to be able to dynamically update DNS zones 05:27 -!- Tattooman [n=Tattooma@89.100.125.48] has joined ##openvpn 05:27 < flo|va-nu-pied> all is workin fine except that I have to manually do the dhcp request on the client side 05:27 < Tattooman> hello people 05:28 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 05:28 < flo|va-nu-pied> Hi Tattooman 05:28 < Tattooman> anyone here maybe can help me about ipcop openvpn and windows sbs 2003 server wit 2 nics 05:28 < flo|va-nu-pied> just to finish, is there a way to force vpn client requesting a DHCP lease on connection ? 05:35 < hyper_ch> flo|va-nu-pied: not sure what you mean 05:36 < flo|va-nu-pied> i've installed both openvpn and a dhcp server 05:37 < hyper_ch> well, int he openvpn server config you can set that the server should hand out same ip as before 05:37 < hyper_ch> it will then noted down in a text file 05:37 < hyper_ch> or you can created for each client a static ip for the vpn network 05:38 < hyper_ch> I guess if you neitehr say in the config to try and hand out the same ip and not configuring static ip that you'll get then your dynamic vpn ips 05:38 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 05:38 < flo|va-nu-pied> hyper_ch: unfortunatly not 05:38 < hyper_ch> flo|va-nu-pied: so I don't quite understand what you try to achieve 05:39 < flo|va-nu-pied> I just want my VPN client using the DHCP server and not the one provided by openvpn 05:39 < |Mike|> heh a flo|va-nu-pied 05:39 < flo|va-nu-pied> hey |Mike| ;) 05:40 < flo|va-nu-pied> hyper_ch: I fact i think that the "DHCP Server" from open vpn is only launched on server side IMO 05:40 < |Mike|> even I don't understand what you're trying to accheive :p 05:41 < flo|va-nu-pied> i mean when a client connect the VPN no network request is done by the client 05:41 < hyper_ch> openvpn creates a seperate network... I fail to see how some external dhcp server has any influence there 05:41 < flo|va-nu-pied> the openvpn pick a free IP from a range of provided IP and assign it statically to the client 05:42 < |Mike|> jup 05:42 < flo|va-nu-pied> you can configure any service to listen on a tap interface 05:42 < |Mike|> !tunortap 05:42 < vpnHelper> |Mike|: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 05:42 < vpnHelper> |Mike|: against you over the vpn 05:43 < |Mike|> You're aware of the OSI layers ? :P 05:43 < flo|va-nu-pied> totally :) 05:43 < flo|va-nu-pied> a bridge braodcast :P 05:43 < |Mike|> you can't bind services to mac addresses ;) 05:43 < flo|va-nu-pied> but it works 05:44 < flo|va-nu-pied> i mean for the moment i'm able to create then crypted VPN 05:44 < flo|va-nu-pied> and then i do a dhclient on the client side 05:44 < flo|va-nu-pied> and the external DHCP server (installed on the same workstation as the openvpn server) answer correctly 05:45 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Read error: 110 (Connection timed out)] 05:45 -!- pfo_ is now known as pfo 05:45 < flo|va-nu-pied> I just can't succes in automating the client DHCP request on connection 05:45 < flo|va-nu-pied> is it more comprehensive now ? :) 05:48 < flo|va-nu-pied> |Mike|: on the server side my tap0 interface is staticaly addressed that's why i'm able to listen on 05:48 < flo|va-nu-pied> using the ifconfig directive from openvpn 05:50 < |Mike|> hmz 05:50 < |Mike|> !ifconfig 05:51 < vpnHelper> |Mike|: "ifconfig" is usage: ifconfig l rn | Set TUN/TAP adapter parameters. l is the IP address of the local VPN endpoint. For TUN devices, rn is the IP address of the remote VPN endpoint. For TAP devices, rn is the subnet mask of the virtual ethernet segment which is being created or connected to. 05:51 < flo|va-nu-pied> that's what i've done :) 05:52 < flo|va-nu-pied> I think there is a missunderstoud regarding my problem 05:54 < flo|va-nu-pied> http://pastebin.ca/1745372 05:55 < flo|va-nu-pied> here is my config file (server/client) 05:56 < flo|va-nu-pied> tap configuration allow me to forward Layer2 packets over the VPN 05:57 < flo|va-nu-pied> after starting openvpn on the client side tap0 interface is created and stay unaddressed waiting for an IP address 05:57 < flo|va-nu-pied> than i do a dhclient tap0 again on the client 05:57 < flo|va-nu-pied> on the server side I can see the DHCP request from the client 05:57 < flo|va-nu-pied> Jan 10 12:45:09 localhost dhcpd: DHCPREQUEST for 11.0.0.57 from aa:bb:cc:dd:ee:ff via tap0 05:58 < flo|va-nu-pied> afster that tap0 from my client has IP 11.0.0.57 05:58 < flo|va-nu-pied> so it work :) 05:59 < flo|va-nu-pied> the only thing I can't solve is to automate the dhcp request from client on openvpn connexion 06:00 < flo|va-nu-pied> I got it working on linux/unix client using a up.sh launched on vpn connexion but I can't use the same thing on windows workstation 06:01 < flo|va-nu-pied> That why i think that there is probably a way to do it into openvpn configuration. 06:01 < flo|va-nu-pied> but I don't know how 06:01 < flo|va-nu-pied> |Mike|: do you understand what I ask for now ? 06:01 < flo|va-nu-pied> :) 06:07 < flo|va-nu-pied> hum I think i've found something in manpage regarding dhcp-renew option which work for tap-Win32 only :) 06:07 < flo|va-nu-pied> i've got to test it 06:16 -!- Tattooman [n=Tattooma@89.100.125.48] has quit ["http://irc2go.com/"] 06:19 -!- LobbyZ [n=default@main.lobbyzffs.com] has joined ##openvpn 07:12 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 07:26 < theDoc> Anyone here has done work on optimizing openvpn for online gaming? I'd like a word on how that is done. 07:29 < hyper_ch> theDoc: define "optimizing for online gaming" 07:31 < theDoc> hyper_ch> That's what I'm looking at, at the moment. I'm seeing something like 2x jump in latency when I fire up openvpn and attempt to play WoW over it. 07:31 < theDoc> hyper_ch> I'm wondering if there's something about the mtu which I can tweak to try to reduce the latency or something along those lines. I'm not exactly sure what's going on. 07:32 < hyper_ch> no clue 07:32 < hyper_ch> but an increase in latency is expected over a vpn 07:32 < theDoc> hyper_ch> But twice? 07:32 < hyper_ch> why not? 07:32 < hyper_ch> it depends on many factors 07:32 < theDoc> Yeah, I know that I should be expecting latency but I'm just surprised it's 2x. 07:33 < hyper_ch> I don't know what your vpn is setup like 07:33 < hyper_ch> if you run like a lan vpn then it shouldn't increase 2x I tend to think 07:33 < theDoc> hyper_ch> Single server here, all traffic gets tunneled through it. Over the WAN. 07:33 < hyper_ch> but creating a vpn with a server somewhere else located in the world 07:33 < hyper_ch> I expect latency to jump 07:33 < hyper_ch> where is that server and where are you? 07:34 < theDoc> hyper_ch> Yeah, we all do. I wasn't quite expecting a 2x jump. I'm going to take another look at it. 07:34 < theDoc> hyper_ch> Singapore > US > US 07:34 < hyper_ch> well, I'm surprised it's only 2x 07:34 < theDoc> That's the rough geographical route. US > US hops are showing good latency. SG to US is about 200ms. 07:35 < hyper_ch> trans-continental connections 07:35 < theDoc> I suppose this is a case of ymmv eh? 07:35 < hyper_ch> I have no clue what you mean by ymmv 07:35 < theDoc> your mileage may vary? ;p 07:35 < hyper_ch> I notice the same here 07:35 < hyper_ch> connecting within europe is usally quite fast 07:36 < theDoc> hyper_ch> Where are you connecting from and where to? 07:36 < hyper_ch> but as soon as I connect to the US it gets slow 07:36 < hyper_ch> transcontinental connections are not so good.... 07:36 < hyper_ch> well, for normal browsing it hardly doesn't matter but for gaming it does 07:37 < theDoc> hyper_ch> Yeah, sounds like a ymmv situation to me, unless I find a magical config file somewhere. 07:37 < theDoc> Browsing works just fine. Latency sensitive things are usable, just not as smooth as I'd like it to be. 07:38 < hyper_ch> well, get a vpn server in SG :) 07:39 < theDoc> hyper_ch> $400/mbit? I'm sure ;) 07:39 < hyper_ch> that sounds expensive 07:39 < hyper_ch> no cheap hosting? 07:39 < theDoc> It's ridiculously expensive. 07:39 < theDoc> No, none at all. 07:40 < hyper_ch> I pay for my server now about $ 100/month and it has a 100mbit connection, 2x 1500 gb disks and 5tb traffic included... if I use more than 2tb it'll throttled to 10mbit 07:40 < theDoc> That's not too bad. 07:41 < theDoc> hyper_ch> I have 8tb's of traffic a month and frankly, my customers aren't blowing it out of the water yet ;p 07:41 < theDoc> Need more torrents! 07:41 < hyper_ch> there are many good torrents :) 07:41 < hyper_ch> well, it's unlimited the traffic... just after 2 tb the connection gets slowed down to 10mbit 07:42 < theDoc> hyper_ch> I can't control what my customers torrent and I'm just here to make it go faster for them ;) 07:42 < hyper_ch> use private trackers :) 07:43 < theDoc> hyper_ch> I don't torrent, my customers do and as a vpn provider, I can't tell them how and where to get their torrents, lest I get hounded by the RIAA for "helping" people torrent. 07:43 < hyper_ch> stupid MAFIAA 07:44 < theDoc> hyper_ch> The MAFIAA is a huge problem and it needs to die. 07:44 < ecrist> good morning 07:44 < theDoc> Well, maybe not. Since that allows us to try to force people to use encryption ;) 07:44 < hyper_ch> people should just stop buying records to set an example 07:44 < theDoc> hello ecrist. 07:44 < hyper_ch> I've been using pgp/gpg since '96 but most people don't care about it 07:44 < theDoc> hyper_ch> Yeah, I usually get my customers to use pandora.com for their music feed. 07:45 < ecrist> I wish PGP was more widely used. 07:45 < theDoc> hyper_ch> I once upon a time used a rule where if you don't sign your messages, I don't read them. 07:45 < ecrist> I'd still use it if apple mail had an easy way to integrate it. 07:46 < ecrist> theDoc: I'm guessing you abandoned that rule because a 'let's go to the bar friday' doens't really need verification via pgp? 07:46 < hyper_ch> theDoc: that meant you read no emails anymore :) 07:46 < hyper_ch> ecrist: why not TB for Mac with Enigmail? 07:46 < theDoc> ecrist> I used it for work, not personal emails about going to strip clubs 07:46 < theDoc> hyper_ch> That meant, that customers got annoyed and my boss was mad at me 07:46 < theDoc> lol 07:46 < ecrist> because I can't stand thunderbird 07:47 < hyper_ch> kmail? 07:47 < hyper_ch> Eudora? 07:47 < hyper_ch> mutts? 07:47 < theDoc> I realized that the excuse of, but they don't encrypt their mails doesn't fly well. 07:47 < ecrist> kmail is the best mail client ever 07:47 < ecrist> imho 07:47 < hyper_ch> I love kontact :) 07:47 < hyper_ch> kmail/korganizer/akregator 07:48 < hyper_ch> becdause it can really handle IMAP and especially disconnected IMAP 07:48 < hyper_ch> contrary to Outlook 07:48 < hyper_ch> running a little Horde setup on my server 07:48 < hyper_ch> so I can even sync it easily with my cell phone :) 07:49 < theDoc> Horde is good, for a mail client. 07:49 < theDoc> However, I'm a stickler for default things, so Mail.app works about right for me. 07:49 < hyper_ch> well, I have to test horde 4 some time.... :) it's quite mature meanwhile 07:49 < ecrist> does kde still have mac support? 07:49 < hyper_ch> syncing tasks, events etc. between your PIM and cell phone is great 07:50 < hyper_ch> ecrist: I think so... there's a windows port 07:50 < hyper_ch> and OSX is based on a unix 07:50 < hyper_ch> so I think kde can be run on a mac 07:50 < ecrist> http://mac.kde.org 07:50 < vpnHelper> Title: .: KDE 4 Mac :. (at mac.kde.org) 07:53 < hyper_ch> are there actually any cell phones that can be completely encrypted 07:54 < ecrist> I think blackberry devices can be 07:54 < ecrist> but for full support, they need to integrate with BES 07:54 < hyper_ch> what's BES? 07:54 < ecrist> blackberry enterprise server 07:54 < hyper_ch> ah 07:55 < hyper_ch> well, the N900 looks somewhat promising as it basically runs a stripped down debian 07:55 < hyper_ch> at least encrypting the memory card should work fine 07:55 < ecrist> if you, as an individual get a blackberry, it generally only comes with BIS (blackberry internet service) which gets your your email and web browsing. full support requires BES, which can be had from hosted services and some wireless carriers will provide for it, as well 07:56 < theDoc> Any of you run 2048bit encryption? :o 07:56 < ecrist> theDoc: my vpn ruls 2048bit ssl certificates 07:56 < ecrist> when I used pgp (even 10 years ago) I was using 4096 07:56 < hyper_ch> well, it would be nice to encrypt caller list, phone book, text messages also... 07:57 < theDoc> ecrist> How much sensitive data do you transmit that the government spooks are interested in? :? 07:57 < ecrist> as if I would answer that in an open IRC channel 07:58 < theDoc> lol 07:58 < ecrist> I'm not a tin-hat wearer, but I don't desire to make decryption of data I want encrypted easily crackable 07:58 < hyper_ch> ecrist: so you deny to even transmit any sensitive data that government spooks could be interested in? 07:59 < hyper_ch> :) 07:59 < ecrist> using adium and our company jabber server, I PGP encrypt (on the fly) one-to-one chats between users. 07:59 < theDoc> ecrist> Was there an exploit/weakness found for RSA? 07:59 < ecrist> I am neither confirming nor denying anything. 07:59 < ecrist> 768bit keys are now considered crackable 07:59 < theDoc> ecrist> Ah, ok. 07:59 < ecrist> within 2 to 3 years, 1024bit keys are crackable 08:00 < ecrist> by crackable, I'm talking within 5-30 minutes 08:00 < hyper_ch> ecrist: but how does your chat partner decrypt the stuff? 08:00 < ecrist> they also use adium for that particular support 08:00 < hyper_ch> oh ok :) 08:00 -!- Guest11014 is now known as dazo 08:02 < theDoc> It'll be interesting to see how people are going to crack the 2048 ones, since the numbers are ridiculously insane. 08:02 < hyper_ch> I still don't get that bit part of encyrption... 08:02 < hyper_ch> as they vary very much between symmetric and asymmetric encryption 08:04 * dazo read the scroll back 08:05 < dazo> hyper_ch: you've been using Horde for syncing between mobile devices and/or computers? 08:05 < dazo> or did I just misunderstand 08:05 < dazo> ? 08:05 < hyper_ch> dazo: 08:05 < hyper_ch> dazo: yes 08:05 < hyper_ch> dazo: I sync Konact with Horde 08:05 < hyper_ch> dazo: and I sync my cell phone with horde 08:06 < dazo> hyper_ch: nice! does it also do calender now? group/shared calendars? 08:06 < hyper_ch> horde has calendars 08:07 * dazo has been asked to setup something which is syncable with mobile phones and computers (Windoze unfortunately) 08:07 < dazo> hmmm 08:07 < hyper_ch> but not sure what you mean with group/shared calendars 08:07 < dazo> That several users can access the same calendar 08:07 < hyper_ch> it can do that 08:07 < hyper_ch> but the limitation of cellphones usually is, that you can setup only one profile 08:08 < dazo> yeah, that's more than fine enough 08:08 < hyper_ch> so if you setup multiple calendar profiles one overwrites the other 08:08 < hyper_ch> and if the windows application supports webdav/caldav it works fine in windows 08:08 < dazo> they mostly want their own calendar on the mobile ... and to see their colleagues calendars on the PC 08:08 * dazo goes to dig up Horde info 08:08 < hyper_ch> yeah, that's what I use for our small company 08:09 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 08:09 < hyper_ch> and I was able to sync with horde from my old SonyEricsson K800i, the new C905 and a nokia N97 08:10 < dazo> I've been considering Zimbra .... but ... it's a monster to install .... and I'm using it at work, and I'm far from convinced I want to help someone install and maintain Zimbra in my spare time 08:10 < dazo> and I've been looking at Funambol, which looks promising in a lot of aspects .... but again .... not convinced 08:10 < ecrist> dazo: what do you use for spam filtering? 08:11 < hyper_ch> it took me a while to install horde 3 from svn 08:11 < hyper_ch> but it's been working fine for a year now 08:11 < hyper_ch> and horde 4 should be declared stable soon 08:11 < hyper_ch> one of the main improvments I'm looking forward there is that different calendards can be coloured differently 08:11 < hyper_ch> that's missing in h3 08:12 < dazo> ecrist: right now, email handling is done by a third party which I don't know what uses .... those domains I've migrated to a new provider uses spamassassin + 2-3 anti-virus engines, that works very well 08:16 < ecrist> I used only spamassassin for about a decade, which worked extremely well with rules du jour 08:16 < dazo> I'm considering a setup where a third party receives the emails and my own server fetches mails via POP3 or IMAP to a local server which all employees uses ... to avoid being a hackable target ..... I'm just helping out an non-profit organisation who do not have any dedicated IT personnel, so I'm trying to make it work as best as possible with pure open source software, and as little maintenance as possible 08:16 < ecrist> now I'm using dspam, which works just as well, and has a slick user interface along iwth it (users can handle their own queues) 08:17 < ecrist> for the office I'm considering Postini or purchasing a barracuda appliance 08:17 < ecrist> would still run dspam on the mail server in the even either failed. 08:17 < eyeoh> hey :) 08:17 < ecrist> dazo: why not set them up on google apps? 08:18 < ecrist> iirc, non profits get their services for free 08:18 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 08:18 < eyeoh> I managed to set up my tun0 device so that I can route traffic out through the vpn 08:19 < dazo> ecrist: Google is getting too big for me ... I don't trust them as much anymore .... and some persons in the organisation handles sensitive information about persons, which I don't want to give to Google 08:19 < eyeoh> but I can't seem to get it to listen on the device 08:19 < eyeoh> i dont have access to the server or its config 08:19 < eyeoh> how can i troubleshoot if its me or the server preventing this? 08:19 < dazo> eyeoh: what should be listening to that interface? 08:19 < ecrist> dazo: same reasons I don't host services there 08:20 < eyeoh> ircd 08:20 < dazo> eyeoh: and you start ircd after you've started openvpn? 08:20 < hyper_ch> dazo: well, have a look at horde :) I really like it 08:20 < eyeoh> yeah 08:20 < ecrist> horde suck, imho 08:20 < dazo> hyper_ch: I'm looking here http://www.horde.org/groupware/ .... it looks promising 08:20 < vpnHelper> Title: Horde Groupware (at www.horde.org) 08:21 < dazo> ecrist: why? 08:21 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has joined ##openvpn 08:21 < hyper_ch> dazo: and of course there's also #horde :) 08:22 < dazo> eyeoh: if you can ping the server's tun interface .... and from the server side can ping the client's tun0 interface .... then you'll need to dig into ircd log files 08:22 < dazo> hyper_ch: hmmmmmm ;-) 08:22 < eyeoh> i dont have access to the server/server config 08:22 < hyper_ch> dazo: the devs are really helpful there :) 08:23 < dazo> hyper_ch: you're using SyncML? 08:23 < hyper_ch> dazo: so I am 08:23 < eyeoh> ping -I tun0 google.com 08:23 < eyeoh> that works though 08:24 < ecrist> dazo: it's just too much. the amount of effort to install and maintain is not worth the benefit 08:24 < hyper_ch> ecrist: maintain? 08:24 < ecrist> yes 08:25 < hyper_ch> what's to maintain there? 08:25 < dazo> ecrist: sounds like the same issues I have with Zimbra and opengroupware.org 08:25 < ecrist> yeah 08:25 < ecrist> I looked at all three at one point, and the benefit didn't seem worth it for 8 people (or a couple, on my personal stuff) 08:25 < hyper_ch> copy horde folder as backup; update throught git/svn :) 08:25 < hyper_ch> if it doesn't work out, copy back the backup folder 08:26 < ecrist> postfix + postfixadmin + dspam + dovecot works well, and has been rock solid for me for 3 years now 08:26 < hyper_ch> but no calendar on there 08:27 < ecrist> iCal + Apache/DAV 08:27 < hyper_ch> and syncing with phone? 08:27 < ecrist> my ical syncs fine with my blackberry 08:28 < hyper_ch> :) 08:28 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 08:29 < eyeoh> should the ircd be listning on the subnet, or the end ip? 08:30 < dazo> eyeoh: dunno ... but that's not really an openvpn related question though .... 08:31 < eyeoh> oh, sorry 08:31 < ecrist> dazo, pm? 08:31 < dazo> ecrist: sure 08:31 < hyper_ch> well, we are 7 in the company and we use horde and it was worth to get it up and running 08:36 -!- Diffen2 [n=diffen2@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 08:40 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 08:43 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 08:46 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Read error: 110 (Connection timed out)] 08:46 -!- pfo_ is now known as pfo 08:50 < dazo> hyper_ch: did you follow any guide/howto to get started? 08:50 < dazo> hyper_ch: and do you know any deadlines for v4 to get stable? 08:50 < hyper_ch> dazo: I found multiple howtos to get started and wanted to write my own 08:50 < hyper_ch> it was planned to make v4 stable at the end of 2009 08:50 < hyper_ch> I guess they didn't make the deadline 08:51 < hyper_ch> you wanna try h4? 08:51 < dazo> hyper_ch: I'd be interested to try out Horde on an VM within a few months probably .... so if I can skip the "search for howto-get-started blogs", I'd appreciate that 08:52 < dazo> hyper_ch: As this will go into production, with about 50-60 users in the end (starting with 10-12 users) ... I'd like to have something which is defined as stable 08:52 < hyper_ch> well, as said, I wanted to write a h3 quick'n'dirty howto but never got to it 08:52 < hyper_ch> and now I think I'll make a h4 one 08:52 < hyper_ch> stable can mean a lot of things 08:53 < hyper_ch> the only thing I know is that the definition of stable varies from project to project and the differences are massiv 08:53 * dazo understands "stable" as when developers have defined it as stable ... no major new rewrites of the code, expected features present and working 08:54 < hyper_ch> :) 08:54 < dazo> that's the definition I've met most of the time 08:54 < dazo> the worst any project gets, is a major code rewrite ... that always breaks things 08:56 < hyper_ch> h4 is a total rewrite from h3 :) 08:56 < dazo> hyper_ch: you're running Horde Groupware Webmail? Is Groupware Webmail the same as Groupware + a web gui on top of that? 08:56 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 08:57 * dazo found the info now :) 08:57 < dazo> "Please see the page for general features of the the Horde Groupware Webmail Edition and the calendar, contacts, tasks, and notes components." 08:57 < hyper_ch> dazo: I'm running H3 framework with various stuff (IMP, Kronolith, DIMP, MIMP, ......) 08:58 < dazo> aha 08:59 < dazo> "Horde Groupware Webmail Edition bundles the separately available applications IMP, Ingo, Kronolith, Turba, Nag and Mnemo. " 09:00 < hyper_ch> ah... ok 09:00 < hyper_ch> well, I installed them all manually 09:01 < dazo> hyper_ch: thanks a lot for your info! This was very enlightening ... and Horde has achieved a lot since last time I considered it 09:01 < hyper_ch> dazo: :) 09:01 < hyper_ch> well, if you wanted to have a look at it I suggest to try H4 09:01 * dazo goes to #horde to gain more release info about H4 09:01 < hyper_ch> as said, it was planned to declare it as stable end of 2009... so I assume they are pretty close to it 09:04 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 09:17 < havoc> horde looks pretty interesting 09:19 < hyper_ch> it is :) 09:25 < ecrist> IMP is an IMAP client? 09:25 < ecrist> so horde sits on top of a separate MTA/MDA? 09:27 < |Mike|> heh 09:27 < hyper_ch> nope, IMP is the webmail part of Horde Framework 09:28 < ecrist> so it's a client 09:28 < ecrist> not a server 09:29 < hyper_ch> yes, webmail client 09:29 < hyper_ch> it's not MTA 09:29 < hyper_ch> and it's no pop3/imap server 09:29 < ecrist> that would be MDA 09:31 < hyper_ch> what is then procmail? 09:31 < dazo> MDA, I'd say 09:31 < hyper_ch> I would procmail label as MDA 09:31 < ecrist> ditto 09:31 < ecrist> fetchmail would be a client 09:32 < hyper_ch> but then courier/dovecot does more than just put email into the right location 09:32 < hyper_ch> the enable actual access to those stored emails 09:32 < dazo> http://en.wikipedia.org/wiki/Mail_delivery_agent 09:32 < vpnHelper> Title: Mail delivery agent - Wikipedia, the free encyclopedia (at en.wikipedia.org) 09:32 < dazo> MTA's speak SMTP, to say it easy 09:32 < dazo> s/easy/simple 09:32 < ecrist> MDA's include methods to retrieve mail 09:33 < hyper_ch> nah 09:33 < hyper_ch> that would be a MRA according to that wikipage 09:33 < ecrist> MTA, transfer mail between servers. MDA, handle organizing, storage, and client access 09:33 < ecrist> MRA is retarded 09:34 < ecrist> there is some grey area 09:34 < hyper_ch> A mail delivery agent or message delivery agent (MDA) is computer software that transfers the responsibility for the management of e-mail messages from the message transfer agent (MTA) within the message handling service (MHS) to a recipient's environment, commonly transferring them into a mailbox. 09:34 < ecrist> postfix can handle some parts of what the MDA does (which directory, etc) and it can handle authentication for sending client 09:35 < dazo> MUA->MTA->MTA->MDA 09:35 < hyper_ch> if it can do both then it is both :) 09:35 < ecrist> yes/now 09:35 < ecrist> no* 09:36 < ecrist> postfix doesn't handle the MUA connections, so it can't really be called a full MDA 09:36 * dazo heads out 09:36 < ecrist> wtf 09:37 -!- dazo is now known as dazo_afk 09:37 < ecrist> no kmail in mac port of kde 09:37 < hyper_ch> oh well, my great postfix / procmail / courier-imap / spamasssin / grey-listing setup works great :)$ 09:37 < hyper_ch> ecrist: no Kontact / KDEPIM either? 09:46 -!- eyeoh [n=io@lotsofinfo.mine.nu] has quit ["leaving"] 09:46 < ecrist> the installer is hanging now. 09:46 < ecrist> hrm 09:47 < |Mike|> debian / ;) 09:47 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Remote closed the connection] 09:52 < hyper_ch> installer is hanging on Mac? 09:59 < ecrist> yeah 10:01 < mithridates> hey guys, who has worked with OpenVPN WEB GUI ? 10:02 < mithridates> brb 10:07 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 10:13 < mithridates> I'm here 10:13 -!- thordon [n=sec@188.109.25.178] has quit [Read error: 110 (Connection timed out)] 10:13 < mithridates> who has worked with OpenVPN WEB GUI ? 10:13 < flo|va-nu-pied> not me 10:14 -!- optiz0r [n=optiz0r@miranda.sihnon.net] has left ##openvpn [] 10:14 < hyper_ch> there is a openvpn web gui? 10:14 < mithridates> yes here is an openvpn web gui 10:14 < mithridates> is there too? 10:14 < hyper_ch> what does it do? 10:15 < mithridates> it creates certificate , show bandwidth usage of clients who are connected ,.... 10:16 < flo|va-nu-pied> this one openvpn web gui mithridates 10:16 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 10:16 < flo|va-nu-pied> http://sourceforge.net/project/screenshots.php?group_id=131667&ssid=7404 10:16 < vpnHelper> Title: SourceForge.net: OpenVPN Web GUI: Screenshots (at sourceforge.net) 10:19 < mithridates> I wanna add more features for user management to this project 10:26 < krzee> you gunana revive that project? 10:26 < krzee> that would be pretty cool 10:26 < mithridates> krzee: yes I wanna keep user's datas in a database 10:27 < krzee> well and allow disconnecting a connected client through the gui 10:27 < krzee> maybe see how much bw they've used... 10:27 < mithridates> krzee: yes, exactly 10:27 < krzee> etc 10:28 < mithridates> do you have any idea? 10:28 < krzee> i think a lot of people would use it if you made it nice 10:28 < krzee> idea of what? 10:28 < mithridates> because I'm not famillar with smarty 10:28 < krzee> nor am i 10:29 < mithridates> umm 10:29 -!- Diffen2 [n=diffen2@78-82-118-208.tn.glocalnet.net] has quit ["Leaving"] 10:30 < mithridates> I think Mikhail Levin is not there, the owner of project, 10:30 < krzee> 08-18-2005. Version 0.3.2 10:30 < krzee> hey you're the last forum post 10:30 < krzee> hehe 10:31 < mithridates> =))) 10:31 < mithridates> yes 10:31 -!- Diffen [n=diffen2@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 10:44 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has quit ["Leaving"] 11:20 -!- d12fk [n=heiko@vpn.astaro.de] has quit ["No Ping reply in 180 seconds."] 11:32 -!- kyrix [n=ashley@91-114-141-43.adsl.highway.telekom.at] has joined ##openvpn 11:34 * ecrist starts strangling mother fuckers 11:34 < ecrist> don't ask me to build your port, then tell me I don't know what the hell I'm doing. 11:34 < ecrist> rawr 11:35 < reiffert> Mikhail answers to private emails. 11:36 < reiffert> ecrist fell in love with a neighbour? 11:36 < ecrist> o.O 11:37 < mithridates> reiffert: reiffert did you play with mikhail's codes in this project? 11:38 -!- kyrixpower [n=ashley@91-114-141-43.adsl.highway.telekom.at] has joined ##openvpn 11:40 -!- kyrixstuff [n=ashley@80-121-50-148.adsl.highway.telekom.at] has joined ##openvpn 11:41 < krzee> issues in voipland eric? 11:41 < reiffert> mithridates: I was extending it, so that a history of the connections gets available and I was adding code so that the administrator is able to download .zip files containing a working openvpn config file with those certs required. 11:42 < mithridates> reiffert: woow nice 11:42 < mithridates> reiffert: do u wanna share it? 11:43 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Remote closed the connection] 11:44 < reiffert> mithridates: sure, but I need time for reviewing my code and extracting it from the original code. 11:45 < mithridates> reiffert: tnx , it's ok . I want to add somethings to this code , maybe a client interface 11:45 < mithridates> but I need to learn smarty 11:46 < reiffert> There is plenty of smarty code available, you will get it, once playing around with existing code. 11:47 < mithridates> reiffert: ok nice, when do u have enough time to review your code man? 11:48 < reiffert> I'm busy the whole next week. 11:48 < mithridates> reiffert: may be , we can make the new generation of ovpn gui web 11:48 < reiffert> nah, it deserves a rewrite from scratch. smarty sucks. 11:48 < mithridates> reiffert: :( can u send it to me without review? because I'm free in this week 11:49 < mithridates> why did he use fucking smarty 11:49 < mithridates> brb 11:51 < reiffert> another real pain in the ass is, that you have to drop off security considerations at so many places .. apache running as apache-user, openvpn running as nobody, write permissions in the key directory and such. 11:52 < krzee> should just put them in common group and use the group for perms 11:52 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 11:54 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 11:54 -!- mode/##openvpn [+o mattock] by ChanServ 11:54 < mithridates> reiffert: I felt that pain when I wanted to install it 11:56 < reiffert> You might solves this pain by the help of some wrappers or named pipes, but it just sucks that the user apache can add certificates to openvpn. 11:56 < mithridates> reiffert: what do u recommend me , in this way but better than it? 11:57 < reiffert> pay a guy as system engineer for adding certificates manually. 11:57 < reiffert> or do it yourself. 11:58 -!- Irssi: ##openvpn: Total of 91 nicks [1 ops, 0 halfops, 1 voices, 89 normal] 11:58 < mithridates> reiffert: Ouchhhhhh , why this is happening to me ??? lool 11:58 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [Connection reset by peer] 11:58 -!- dunc_ [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 11:58 -!- kyrix [n=ashley@91-114-141-43.adsl.highway.telekom.at] has quit [Read error: 110 (Connection timed out)] 11:59 < reiffert> mithridates: Thats why I stopped developing openvpn-web-gui. 11:59 < reiffert> It will suck no matter what you do. 11:59 < mithridates> reiffert: why there is not any web based stuff for openvpn :(((( 12:00 < ecrist> there is 12:00 < reiffert> mithridates: did you ever see web based stuff for bind nameservice? dhcpd? apache configuration? 12:00 < ecrist> see access-server 12:00 < mithridates> reiffert: no 12:01 -!- kyrixpower [n=ashley@91-114-141-43.adsl.highway.telekom.at] has quit [Connection timed out] 12:01 < mithridates> ecrist: there is but I should pay 5$ for each client 12:01 < reiffert> ecrist: how do they solve the horrible permission scenario? 12:01 < krzee> i agree there reiffert 12:01 < krzee> no reason to have the webgui making certs 12:01 < krzee> nor changing configs 12:01 < krzee> i like the idea to have it just be a web interface for management interface stuffs 12:01 < rob0> $5 / client doesn't sound bad to me, if value is added 12:01 < reiffert> krzee: it's kind of nice, but get back to pain and ass. 12:02 < ecrist> reiffert: it's a trade-off 12:02 < ecrist> the webserver has rights to all that stuff. 12:02 < mithridates> no I don't wanna make certificate , just I want to have a management interface for users , I can write some bash scripts to make certificate for my clients 12:02 < krzee> mithridates, already a nice perl one 12:03 < ecrist> mithridates: the amount of time you've spent asking for such, you likely could have written one 12:03 < krzee> !ssl-admin 12:03 < vpnHelper> krzee: "ssl-admin" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN_Server, or (#2) svn co https://www.secure-computing.net/svn/trunk/ to grab it from svn, or (#3) if you use freebsd, it is in ports 12:03 < reiffert> ecrist: anything special like named pipes? wrappers? cronjobs looking for newly created certs? 12:03 < ecrist> not sure, haven't bothered installing it . 12:03 < ecrist> easier for me to say, ask for support from the people you paid money to 12:03 < reiffert> ecrist: cant believe that this is all they want to earn money with. 12:04 < ecrist> now, if the corp were to provide funding and some licenses, I don't mind being their support for that 12:05 < reiffert> ecrist: pardon? They gave you free licenses? 12:08 < reiffert> or do you offer to get some? 12:16 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Read error: 111 (Connection refused)] 12:27 -!- corretico_ [n=laguilar@201.201.46.106] has quit ["Leaving"] 12:31 < ecrist> if they gave me some, and would fund me, I'd provide support for it 12:32 -!- kyrixstuff [n=ashley@80-121-50-148.adsl.highway.telekom.at] has quit ["Leaving"] 12:32 -!- Mujtaba [i=4f7f0148@gateway/web/freenode/x-tyipyczurvhhewfg] has joined ##openvpn 12:32 < Mujtaba> Hello, I am having a problem with OpenVPN 12:33 < Mujtaba> I get an error with the routing 12:33 < Mujtaba> I'm on Ubuntu Karmic 12:34 < Mujtaba> The error is : SIOCADDRT: No such process 12:34 < Mujtaba> The same config works on Windows on the same computer (inside VM) also works on other computers 12:35 < Mujtaba> I was told you can add a line to the config that would make the client wait before attempting 12:36 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 12:36 < reiffert> !logs 12:37 < vpnHelper> reiffert: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 12:46 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Read error: 60 (Operation timed out)] 12:47 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 12:49 < mithridates> Mujtaba: are u iranian? 12:50 < Mujtaba> y 12:50 < mithridates> :d me 2 12:50 < Mujtaba> lol 12:51 < mithridates> let me to read your msgs 12:52 < mithridates> Mujtaba: did you check your logs in the server side? 12:52 < mithridates> Mujtaba: would you paste that in pastebin.com ? 12:55 < Mujtaba> Well, I cannot access the server side scripts 12:55 < Mujtaba> But it is very odd, the very same script on the very same network works 12:55 < Mujtaba> It's probably a problem from the network-manager or something like that... 12:56 < krzee> !netman 12:56 < vpnHelper> krzee: "netman" is if you are using network manager for linux to configure your vpn, dont! http://openvpn.net/archive/openvpn-users/2008-01/msg00046.html to read the same thing from an openvpn expert on the mail list 12:56 < mithridates> Mujtaba: plz come to the pm 13:28 -!- Mujtaba [i=4f7f0148@gateway/web/freenode/x-tyipyczurvhhewfg] has quit [Ping timeout: 180 seconds] 13:40 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Remote closed the connection] 13:41 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 13:41 -!- kyrix [n=ashley@80-121-50-148.adsl.highway.telekom.at] has joined ##openvpn 13:57 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit [Read error: 60 (Operation timed out)] 14:05 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 14:06 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Remote closed the connection] 14:21 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 14:29 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 14:38 -!- SkyX [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 14:39 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 14:49 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Read error: 110 (Connection timed out)] 14:49 -!- pfo_ is now known as pfo 14:49 -!- SkyX [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [Client Quit] 14:50 -!- Diffen [n=diffen2@78-82-118-208.tn.glocalnet.net] has quit [Operation timed out] 14:51 -!- Diffen2 [n=diffen2@78-82-118-208.tn.glocalnet.net] has joined ##openvpn 14:55 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [Connection timed out] 15:03 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 15:05 -!- MadTBone [n=MadTBone@gw.msmnyc.edu] has joined ##openvpn 15:09 -!- Diffen2 [n=diffen2@78-82-118-208.tn.glocalnet.net] has quit [Read error: 110 (Connection timed out)] 15:17 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 54 (Connection reset by peer)] 15:17 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 15:24 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 15:25 < mithridates> how can I disconnect someone ? 15:46 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 15:59 < hyper_ch> revoke his key? 16:03 < mithridates> !revoke 16:03 < vpnHelper> mithridates: Error: "revoke" is not a valid command. 16:03 < mithridates> for example a client is connected , I want to disconnect him just now 16:03 < mithridates> is it revoking? 16:06 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has quit ["Leaving"] 16:11 < agagag> i think revoking is a bit more permanent 16:11 < mithridates> yes exactly 16:11 < mithridates> I'm talking about suspending a client 16:12 < mithridates> temporary 16:15 < agagag> block his ip? if he can not change it ofcource 16:16 < rob0> The management interface lets you do that. 16:16 < rob0> of course, the client might try to reconnect immediately. 16:23 < mithridates> rob0: which management? 16:25 < reiffert> mithridates: openvpn management | google 16:25 < rob0> No, see --management in the man page for better results. :) 16:26 < mithridates> tnx 16:26 < rob0> If you're not already using it, you will have to restart the server, which disconnects everyone. 16:26 < mithridates> rob0: =)))) I like your solution but other clients will kill me 16:27 < reiffert> rob0: the above gets you right into the ovpn manpage btw. 16:27 < reiffert> rob0: sorry, http://openvpn.net/index.php/open-source/documentation/miscellaneous/79-management-interface.html 16:27 < vpnHelper> Title: Management Interface (at openvpn.net) 16:44 -!- MadTBone_ [n=MadTBone@160.39.238.196] has joined ##openvpn 16:50 -!- MadTBone [n=MadTBone@gw.msmnyc.edu] has quit [Read error: 110 (Connection timed out)] 17:09 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has joined ##openvpn 17:14 -!- Intensity [i=[n4t3vNi@unaffiliated/intensity] has quit [Remote closed the connection] 17:27 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 17:28 -!- lepine [n=leprecha@69-165-136-248.dsl.teksavvy.com] has joined ##openvpn 17:33 -!- rycar_ [n=rycar@adsl-76-228-202-253.dsl.bkfd14.sbcglobal.net] has joined ##openvpn 17:34 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Read error: 60 (Operation timed out)] 17:34 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 17:36 -!- rycar_ is now known as rycar 17:50 -!- MadTBone_ [n=MadTBone@160.39.238.196] has quit ["Leaving"] 17:54 -!- lepine [n=leprecha@69-165-136-248.dsl.teksavvy.com] has quit [Read error: 110 (Connection timed out)] 17:55 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] 18:21 -!- dash123 [n=Aly@ool-4579da57.dyn.optonline.net] has joined ##openvpn 18:21 < dash123> can you run the server as a client? 18:21 < dash123> or can you access the server via the vpn like you normally would a client? 18:23 < reiffert> yes. 18:24 < dash123> oh great 18:24 < dash123> thanks 18:25 < dash123> im also having another problem 18:27 -!- dash [n=Aly@ool-4579c671.dyn.optonline.net] has joined ##openvpn 18:27 < dash> but when i go to click connect 18:28 < dash> it tries to access the dh parameters on the c: drive but i have the program installed on G: 18:28 < reiffert> edit the config. 18:29 < dash> durp 18:29 < dash> :P 18:29 < dash> also what is the proper device name? i also have another tap driver installed for hamachi and i need to specify which network device it is 18:30 < dash> i tried TAP-WIN32 Adapter V8 that didnt work.... 18:30 < dash> is it just called Local Connection 5? 18:31 < reiffert> rtfm 18:31 < dash> nitfmdb 18:32 < dash> thats what the device is called by windwos 18:32 < reiffert> and guess whats written in tfm 18:32 < reiffert> Oh, how could I, you are actually guessing.! 18:33 -!- dash123 [n=Aly@ool-4579da57.dyn.optonline.net] has quit [Read error: 60 (Operation timed out)] 18:35 < dash> that is what the network card name is 18:35 < dash> thats what im saying 18:35 < dash> whats going to help me in the manual if exactly what the manual says isnt working 18:35 < reiffert> crying. 18:37 < dash> what are you doing here if your not going to help, this is an irc channel by the way 18:38 * rob0 shudders at the now-distant memory of Windows 18:38 < reiffert> People greet when they join irc channels. 18:38 < dash> in it for the greets eh? 18:38 < reiffert> dash: when you stopped crying, go back to reading whats written down for that problem you have. 18:39 < dash> nah its cool i just commented it out, thanks for the help dick 18:39 -!- dash [n=Aly@ool-4579c671.dyn.optonline.net] has quit [Read error: 104 (Connection reset by peer)] 18:40 * reiffert is a dick. 18:40 < rob0> That's MISTER dick. 18:41 < reiffert> Of course. 18:41 < rob0> This is something I'd like to bring up at the meeting. I get tired of clueless Windows questions on the mailing list. I' 18:42 < rob0> d participate more if there was a segregated list, Unix only. 18:42 < reiffert> just unsubscribe from -users... 18:42 < reiffert> well, thats what I did before joining #openvpn 18:43 < rob0> well yeah, but I don't mind helping people in general, just not the leeches and dead-weights 18:44 < rob0> (description seems to fit the average Windows user unfortunately) 18:49 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 19:08 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 19:15 -!- kyrix [n=ashley@80-121-50-148.adsl.highway.telekom.at] has quit ["Leaving"] 20:12 -!- number2 [n=number@75-173-241-97.clsp.qwest.net] has joined ##openvpn 20:22 < tjz> i haven't tried port-share 20:22 < tjz> can two openvpn process used the same 443 port? 20:22 < tjz> processes 20:22 < theDoc> tjz> No, I don't believe so. 20:25 < ecrist> no 20:37 < tjz> roger that 20:37 < tjz> :) 20:52 < rob0> but, IIRC it can be shared with another process such as httpd 20:52 < rob0> oh but you knew that 20:52 < rob0> (that's what port-share is, huh?) 20:59 -!- number2 [n=number@75-173-241-97.clsp.qwest.net] has quit [Read error: 110 (Connection timed out)] 21:03 -!- Bushmills [n=nnnBushm@verhau.de] has left ##openvpn ["Leaving."] 21:03 -!- Bushmills [n=nnnBushm@verhau.de] has joined ##openvpn 21:06 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: krzie, Rundll, corretico, bytesaber_, mrnice1, plundra, vpnHelper 21:06 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: jaek_, krphop, Optic, LobbyZ 21:07 -!- Netsplit over, joins: LobbyZ, jaek_, krphop, Optic 21:08 -!- Netsplit over, joins: Rundll, corretico, vpnHelper, krzie, bytesaber_, mrnice1, plundra 21:13 -!- rycar [n=rycar@adsl-76-228-202-253.dsl.bkfd14.sbcglobal.net] has quit ["Leaving"] 21:20 < tjz> rob0, maximum is 1 vpn to 1 https (443), i guess 21:20 < tjz> look like a ba-nana^netsplit.. 21:32 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 60 (Operation timed out)] 21:42 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 22:30 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 22:31 < rawDawg> !welcome 22:31 < vpnHelper> rawDawg: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 22:56 -!- Leila_ [i=d9dae562@gateway/web/freenode/x-iiwdpwsxzmeulbuq] has joined ##openvpn 23:04 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 23:06 -!- tjz [n=tjz@unaffiliated/tjz] has quit [Read error: 104 (Connection reset by peer)] 23:25 < Leila_> i want to configure pptp server on suse 11.2 but i can't do. plz help me. this files are rewured: * /etc/modules.conf * /etc/pptpd.conf * /etc/ppp/options.pptpd * /etc/ppp/chap-secrets 23:26 < Leila_> but i don/t have them????????????????/ 23:26 < Leila_> thos 23:26 < Leila_> e 23:26 < rob0> um, this is not a channel for pptpd 23:28 < Leila_> ok. i want my clients in windows connected to open vpn server in linux, so i need to pptp 23:29 < Leila_> clients not to allowed to install app programs 23:32 -!- Leila_ [i=d9dae562@gateway/web/freenode/x-iiwdpwsxzmeulbuq] has left ##openvpn [] 23:33 < rob0> yikes 23:48 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] --- Day changed Mon Jan 11 2010 00:08 -!- hyper_ch [n=hyper@84.226.239.178] has quit [Remote closed the connection] 00:13 -!- maodun [n=stopgo@114.243.119.42] has joined ##openvpn 00:17 < maodun> I'm trying to figure out why my openvpn connection isn't working. I'm trying to forward my net connection over openvpn (to bypass the Chinese firewall, if anyone cares). I'm watching tshark on both ends. ARP requests and DNS requests seem to be happening properly on both sides over my tap connection, but when I try to talk to a website, something goes amiss. 00:17 < maodun> The gateway / server is 10.8.0.1 and my client is 10.8.0.12. 00:18 < maodun> When I talk to a website (@ 174.132.x.y), I see the following in tshark. 00:18 < maodun> On the client side: 00:18 < maodun> 10.8.0.12 -> 174.132.x.y HTTP GET / HTTP/1.1 00:19 < maodun> On the server side, I see the same, followed by: 00:20 < maodun> 174.132.x.y -> 10.8.0.12 TCP [TCP segment of a reassembled PDU] 00:20 < maodun> 174.132.x.y -> 10.8.0.12 TCP [TCP segment of a reassembled PDU] 00:20 < maodun> so it looks like everything is going well, except the client side never sees those packets 00:21 < maodun> so the client keeps trying to reconnect to 174.132.x.y because it never hears anything, apparently 00:21 < maodun> all in all, the forwarding doesn't work 00:22 -!- Leila_ [i=d9dae562@gateway/web/freenode/x-iiwdpwsxzmeulbuq] has joined ##openvpn 00:22 < maodun> I don't know enough about openvpn / tshark / networking to know where the packets are getting lost - on the openvpn server? Between the openvpn server and client? On the client? 00:23 < maodun> Anyone have any ideas? 00:24 < maodun> Incidentally, krzee, I found that I can avoid the Bad Source message by using a tap connection instead of a tun connection. I don't know why. 00:24 < krzee> !iroute 00:24 < vpnHelper> krzee: "iroute" is does not bypass or alter the kernel's routing table, it allows openvpn to know it should handle the routing when the kernel points to it but the network is not one that openvpn knows about. This is only needed when connecting a LAN which is behind a client, and therefor belongs in a ccd entry. Also see !route and !ccd 00:25 < maodun> Eh? Does the distinction between tun and tap have something to do with iroute? 00:26 < krzee> Without the iroute entry you will find the following in your logfiles: 00:26 < krzee> MULTI: bad source address from client [IP ADDRESS], packet dropped 00:26 < krzee> IP ADDRESS in that case would be the machine on client LAN which tried to talk through vpn, because openVPN has no clue what that address is. Once you give it the iroute statement, that changes. 00:26 < krzee> (im pasting from !route) 00:27 -!- Leila_ [i=d9dae562@gateway/web/freenode/x-iiwdpwsxzmeulbuq] has quit [Ping timeout: 180 seconds] 00:27 < maodun> Yeah, but openvpn should be able to function without iroute, no? 00:28 < krzee> function yes, route packets back to clients that arent the vpn address of the client, no 00:29 < maodun> But, I don't need to route packets back to clients that aren't the vpn address of the client, do I? 00:29 < krzee> [00:24] Incidentally, krzee, I found that I can avoid the Bad Source message by using a tap connection instead of a tun connection. I don't know why. 00:29 < krzee> you said bad src message error, right? 00:29 < krzee> like: 00:29 < krzee> [00:26] MULTI: bad source address from client [IP ADDRESS], packet dropped 00:29 < krzee> right? 00:29 < maodun> Sure, we had a conversation about this a while back 00:30 < krzee> i talk to a lot of people about their problems, yours doesnt stick out to me right now 00:30 < maodun> and I wanted a solution other than using iroute, because I don't always know my client's addresses 00:30 < maodun> s/client's/clients' 00:30 < krzee> well its working for you now? 00:30 < maodun> it works with a tap device - you asked me to give you more information if I ever found out workarounds to the bad src problem (aside from iroute) 00:31 < maodun> so I'm giving you more information 00:32 < maodun> Well, doesn't matter. Different issue now, I just remembered you helped me and wanted to tell you how I finally "solved" it. 00:40 < krzee> oh i gotchya 00:40 < krzee> thanx 00:40 < krzee> i was thinkin bout that, curious about this: 00:40 < krzee> is ip forwarding enabled on that client? 00:43 < maodun> krzee: no 00:44 < maodun> should it be? 00:44 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 00:44 -!- mode/##openvpn [+o mattock] by ChanServ 00:46 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 00:46 < krzee> nah i was thinking maybe thats what does it 00:47 < krzee> (still wanna know why some clients talk over tun with their lan ip 00:47 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 00:47 < krzee> ) 00:49 -!- jaek_ [n=jaek@c-71-202-163-230.hsd1.ca.comcast.net] has quit [Read error: 104 (Connection reset by peer)] 00:50 -!- jaek_ [n=jaek@c-71-202-163-230.hsd1.ca.comcast.net] has joined ##openvpn 00:51 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has quit [Client Quit] 01:04 -!- tjz [n=tjz@unaffiliated/tjz] has joined ##openvpn 01:06 -!- hyper_ch [n=hyper@83-161.78-83.cust.bluewin.ch] has joined ##openvpn 01:12 -!- Intensity [i=[exNgvKL@unaffiliated/intensity] has joined ##openvpn 01:14 -!- dunc_ [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit ["Leaving"] 01:19 < jaek_> i thought the tap mode should provide broadcast capabilities... upnp broadcasts dont seem to be making it 01:24 < jaek_> SSDP broadcasts 01:28 < krzee> bridging as well? 01:28 < krzee> you can also get bcast over tun with 01:28 < krzee> !bcast 01:28 < vpnHelper> krzee: "bcast" is pptp source tree has bcrelay in it, bcrelay can be used to relay broadcasts over a tun setup 01:28 < jaek_> yeah, i have it configured for bridging right now 01:29 < krzee> well ya i would expect it to work too 01:30 < jaek_> SSDP might have a very low TTL time or something... i was testing it over 3.5G 01:32 < jaek_> you know of something simple i could use to test bcasts? 01:35 < krzee> try pinging the bcast address maybe? 01:52 < jaek_> TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 01:52 < jaek_> this is what i get from a particular host 01:52 < jaek_> have a few others that work with the same config file 01:53 < krzee> firewall 01:53 < jaek_> i pray not... 01:54 < jaek_> i know it allows ssh and pptp thru 01:54 -!- Zap-W [n=z@77.124.136.234] has joined ##openvpn 01:54 < Zap-W> Hi 01:54 < Zap-W> can openvpn distribute IP addresses based on the authenticated username ? 01:54 < Zap-W> or based on info from the certificate of the user 01:54 < jaek_> that would be sweet 01:55 < krzee> Zap-W, either one 01:55 < krzee> !ccd 01:55 < vpnHelper> krzee: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 01:55 < krzee> !static 01:55 < vpnHelper> krzee: "static" is (#1) use --ifconfig-push in a ccd entry for a static ip for the vpn client, or (#2) example: ifconfig-push 10.8.0.6 255.255.255.0, or (#3) also see !ccd and !iporder 01:55 < krzee> !authpass 01:55 < vpnHelper> krzee: "authpass" is (#1) please see --auth-user-pass-verify in the manual to learn how to force clients to use passwords in addition to certs, or (#2) or to ONLY use passwords (no certs, highly NOT recommended) also use --client-cert-not-required, or (#3) and if you want the login name to be used as the common-name for things like ccd entries, use --username-as-common-name 01:57 < jaek_> very interesting... dunno how to use that with my dd-wrt router 01:57 < Zap-W> krzee: nice 01:58 < Zap-W> !iporder 01:58 < vpnHelper> Zap-W: "iporder" is (#1) OpenVPN's internal client IP address selection algorithm works as follows: 1 -- Use --client-connect script generated file for static IP (first choice)., or (#2) Use --client-config-dir file for static IP (next choice) !static for more info, or (#3) Use --ifconfig-pool allocation for dynamic IP (last choice), or (#4) if you use --ifconfig-pool-persist see !ipp 01:59 < jaek_> !ipp 01:59 < vpnHelper> jaek_: "ipp" is (#1) the option --ifconfig-pool-persist ipp.txt does NOT create static ips, or (#2) Note that the entries in this file are treated by OpenVPN as suggestions only, based on past associations between a common name and IP address. They do not guarantee that the given common name will always receive the given IP address. If you want guaranteed assignment, see !iporder and !static 01:59 < jaek_> man some open firmware needs to make a complete interface for this 02:00 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 02:03 < jaek_> anyone hear of client virtualbox guestissues? 02:06 < hyper_ch> no 02:07 < jaek_> i'm just really hoping it isnt the firewall... really wanted to use openvpn for this 02:12 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:13 -!- aep [n=aep@libqxt/developer/aep] has joined ##openvpn 02:14 < aep> hi. i can't get the handshake working, any idea what to set to get more usefull debug hints? I get nothing relevant in syslog 02:15 < aep> that's the server log. repeating it http://codepad.org/JQZ5JlBu 02:15 < vpnHelper> Title: Plain Text code - 14 lines - codepad (at codepad.org) 02:15 < aep> almost identical on the client 02:15 < aep> can't really see anything useful in there 02:15 < krzee> firewall or nat 02:16 < aep> i have a nat inbetween, indeed 02:16 < aep> should i forward something? 02:17 < krzee> the answer to that is the same as running ANY service 02:17 < aep> i'm not running the server behind a nat 02:17 < aep> but the client is 02:17 < krzee> ok well somehow the server isnt receiving any traffic 02:18 < krzee> so if your client is trying to contact the server at the right place (ip:port) then something is not allowing that in 02:18 < aep> um well, but it does see the initial request from the client 02:18 < aep> thats the server log i posted 02:18 -!- LobbyZ [n=default@main.lobbyzffs.com] has quit [Read error: 104 (Connection reset by peer)] 02:18 < krzee> o tru 02:18 < krzee> !logs 02:18 < vpnHelper> krzee: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 02:19 < aep> verb 6. will do 02:19 < jmm> hi. 02:22 < aep> server: http://codepad.org/HvxggJj0 client: http://codepad.org/GeBn2RCP 02:22 < vpnHelper> Title: Plain Text code - 236 lines - codepad (at codepad.org) 02:23 < aep> it writes stuff fine and all sudden decides to close oO 02:28 -!- Zap-W [n=z@77.124.136.234] has quit [Read error: 54 (Connection reset by peer)] 02:35 -!- LobbyZ [n=default@main.lobbyzffs.com] has joined ##openvpn 02:38 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 02:40 < aep> krzee: well any idea on that one? 02:41 < aep> most google results i get have a more usefull entry in thr log 02:52 < aep> actually the log is larger. at the top it verfies on both sides that the remotes cert is fine 02:57 < aep> huh. switched to udp and everything works just fine 03:01 -!- fulat2k [n=fulat2k@142.12.111.218.klj01-home.tm.net.my] has joined ##openvpn 03:01 < fulat2k> !welcome 03:01 < vpnHelper> fulat2k: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 03:01 < fulat2k> !forum 03:01 < vpnHelper> fulat2k: "forum" is The unofficial OpenVPN support forum is available at http://www.ovpnforum.com 03:03 -!- master_o1_master [n=master_o@p57B54B98.dip.t-dialin.net] has quit [Read error: 60 (Operation timed out)] 03:04 < fulat2k> hi folks, i've configured openvpn to use freeradius+mysql to authenticate users. using the same setup, is it possible to assign ips or other attributes from the radius server to openvpn? 03:05 < reiffert> Quite intresting question. 03:05 < reiffert> try asking the -devel mailinglist. 03:06 < fulat2k> reiffert: cool. thx for the pointer 03:07 -!- master_of_master [i=master_o@p57B547AC.dip.t-dialin.net] has joined ##openvpn 03:10 < fulat2k> so even with radius/ldap authentication, post auth attributes are still controlled via the server config? 03:13 -!- LobbyZ [n=default@main.lobbyzffs.com] has quit ["Free FTW"] 03:14 -!- LobbyZ [n=default@main.lobbyzffs.com] has joined ##openvpn 03:26 < aep> can i give the server a fixed address? it seems to rotate and i have no clue how to set routes based on that 03:26 < aep> actually what the hell are those routes it adds by default. they make no sense 03:26 < fulat2k> darn, can't post to devel mailling list 03:38 -!- Zordrak__ is now known as Zordrak 03:41 -!- dazo_afk is now known as dazo 03:52 -!- mode/##openvpn [+o dazo] by ChanServ 03:52 -!- dazo changed the topic of ##openvpn to: OpenVPN Community Forum Monday, Jan 11 1900UTC on #openvpn-discussion | OpenVPNn Development Forum Tuesday, Jan 12 1900UTC on #openvpn-discussion | OpenVPN 2.1.1 most current. | Type !welcome before asking your questions. 03:52 -!- mode/##openvpn [-o dazo] by ChanServ 03:54 -!- mode/##openvpn [+o dazo] by ChanServ 03:54 -!- dazo changed the topic of ##openvpn to: OpenVPN Community Forum Monday, Jan 11 1900UTC on ##openvpn-discussion | OpenVPNn Development Forum Tuesday, Jan 12 1900UTC on ##openvpn-discussion | OpenVPN 2.1.1 most current. | Type !welcome before asking your questions. 03:54 -!- mode/##openvpn [-o dazo] by ChanServ 03:59 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 04:03 < fulat2k> reiffert: saw this: http://openvpn.net/archive/openvpn-devel/2007-04/msg00001.html. any idea if that's been implemented? 04:11 < dazo> fulat2k: I believe most installations which includes RADIUS does it via tha auth-pam plug-in ... I've not registered much "traffic" in regards to a native RADIUS plug-in 04:12 < dazo> fulat2k: so, the features mentioned here is not implemented anywhere afaik 04:20 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 110 (Connection timed out)] 04:38 < fulat2k> dazo: does the native auth-pam plugin work? i can't seem to find any documentation on it. any pointers would be greatly appreciated 04:40 < dazo> fulat2k: the auth-pam should work, I've never configured it myself, but there is a read me file in the source tree ... a lot of users use it, so I don't think that should be too difficult to configure though .... but how to get RADIUS to do auth via PAM is another chapter, where I'm definitely not the guy to ask 04:40 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 04:46 -!- d12fk [n=heiko@vpn.astaro.de] has joined ##openvpn 04:58 -!- dyzdyz [n=dyzdyz@ch49172.petrus.pl] has joined ##openvpn 05:02 -!- theDoc [n=hex@69.10.59.166] has joined ##openvpn 05:04 < fulat2k> dazo: yeah, i'm strictly looking at radius to do pam for ovpn. thing is backend need not be radius. could be anything (even pam_mysql or ldap). i just need to be able to push the user's attributes from the backend to openvpn. 05:04 < fulat2k> any ideas? 05:05 < dazo> fulat2k: you mean to do ccd stuff via a back-end? 05:09 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has joined ##openvpn 05:14 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 05:19 < fulat2k> dazo: i'm guessing ccd == auth/properties management :), if so, then yes :) 05:20 < dazo> fulat2k: ccd == client-config-dir .... so if you mean configuration parameters for specific users, then this is not supported via other channels than --client-config-dir now 05:24 < fulat2k> dazo: ahh..... 05:24 < fulat2k> dazo: and darn :( thanks for the pointer. will read up on that 05:38 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 05:43 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 06:21 < fulat2k> has anyone here implemented bandwidth limiting for openvpn? 06:21 -!- alibaba [n=xerox@goliath.hantsch.co.at] has joined ##openvpn 06:22 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 06:22 -!- rwscott [n=rwscott@207.236.169.155] has joined ##openvpn 06:22 < alibaba> hello, I kindly please for your help. I had openvpn running since some months. Now, suddenly, it does not work any more, the client shows no tun0 interface. 06:22 < dazo> fulat2k: not in openvpn .... that's usually managed best by the OS ... in Linux I believe 'tc' is the command to set the qdisc's profiles correct 06:23 < dazo> alibaba: what did you change? 06:23 < alibaba> Really nothing. 06:23 < dazo> alibaba: I don't believe you .... nothing stops working automatically .... something must have changed :) 06:24 < alibaba> I had to reboot it and now it doesn't work any more. 06:24 < alibaba> I have automated online updates activated, maybe they changed something? 06:24 < dazo> alibaba: yeah, or that you did not enable something automatically in boot scripts 06:25 < alibaba> I entered "rcopenvpn start" and I see the daemon in 'ps auxw' 06:27 < alibaba> TLS Error: TLS key negotiation failed to occur within 60 seconds This is what I get 06:28 < |Mike|> lol 06:28 < |Mike|> err, wrong window. 06:29 < dazo> heh 06:30 < fulat2k> dazo: hmm... so it's still tc... :) 06:30 -!- pfo_ [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 06:31 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 104 (Connection reset by peer)] 06:31 -!- pfo_ is now known as pfo 06:31 < alibaba> dazo: Can you help me, please? 06:32 < dazo> alibaba: first of all ... I'm at work, and can't always respond immediately .... secondly ... we need !logs and !configs on a !pastebin 06:32 < dazo> !logs 06:32 < vpnHelper> dazo: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 06:32 < dazo> !configs 06:32 < vpnHelper> dazo: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 06:32 < dazo> !pastebin 06:32 < vpnHelper> dazo: "pastebin" is (#1) please paste anything with more than 5 lines into pastebin or a similar website, or (#2) ie: www.pastebin.ca 06:32 < fulat2k> !route 06:32 < vpnHelper> fulat2k: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 06:33 < dazo> alibaba: and please .... do not paste configs or logs on irc .... or I'll strangle you immediately .... ;-) 06:33 < dazo> fulat2k: yeah, still tc afaik 06:34 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Client Quit] 06:34 < fulat2k> dazo: was hoping ovpn can provide all the user/cert/bandwidth management in one nice package :) 06:34 < dazo> fulat2k: it's a lot of things which could be put into openvpn ... but why do it when other parts can do it just as well, if not even better .... that's the unix philosophy, small modules which does a simple task and does it very well 06:35 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 06:38 < dazo> openvpn is supposed to do one thing .... create secure VPN connections between two computers .... and it does that very well, then openvpn just needs to be stacked with those modules which solves your needs 06:40 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 06:40 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 06:43 -!- dyzdyz [n=dyzdyz@ch49172.petrus.pl] has quit [Read error: 110 (Connection timed out)] 06:48 < ecrist> good morning 06:49 < dazo> morning! 06:49 < fulat2k> dazo: that's true. :) 06:49 < theDoc> Good evening to you all. o/ 06:49 < ecrist> dazo, no need for +o to change topic 06:50 < dazo> ecrist: ahh ... earlier I got my fingers smacked when I tried to do it :) 06:50 < ecrist> really? 06:50 < dazo> yeah, I had to do +o to be able to update it ... but its a while since I experienced the smacking, so I just do it automatically now 06:51 < ecrist> no worries 06:53 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 06:59 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit [Read error: 104 (Connection reset by peer)] 07:01 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Read error: 60 (Operation timed out)] 07:09 -!- fulat2k [n=fulat2k@142.12.111.218.klj01-home.tm.net.my] has quit ["Leaving."] 07:10 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has joined ##openvpn 07:10 -!- bootlaces [n=bootlace@unaffiliated/bootlaces] has joined ##openvpn 07:21 < alibaba> dazo: I had a meeting, now I can start supplying you the infos you need. Here the server side: http://pastebin.com/dc57d3e9 07:23 < alibaba> dazo: This is the client side: http://pastebin.com/dd7e41e9 07:25 < alibaba> dazo: Do you need further details? The server has a device tun0 visible. The firewall is configured to let port 1194 come in (UDP+TCP). The client has no tun0 visible. 07:26 < dazo> alibaba: I'll look asap on it ... in the middle of something right now 07:28 < Holister> is there a mac client? 07:28 < alibaba> I only use Linux. 07:28 < Holister> same here....someone asked at work.... 07:29 < alibaba> Holister: How good is your knowledge with openvpn? 07:30 < alibaba> (server+client) 07:31 < Holister> so-so 07:31 < alibaba> My one is almost no-no ... ;) 07:32 -!- zxd [n=marceloa@95.211.21.34] has joined ##openvpn 07:32 < zxd> hi 07:32 < zxd> where do I write down the passphrase for my password protected pkcs12 certificate 07:42 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 07:49 -!- APTX|_ [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 07:51 < ecrist> you don't. 07:51 -!- APTX|_ [n=APTX@chello089076052083.chello.pl] has quit [Remote closed the connection] 07:52 -!- APTX|_ [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 07:52 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 104 (Connection reset by peer)] 07:53 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 07:54 < dazo> alibaba: your server log and client log don't match too well ... there's no trace after the client trying to connect there .... 07:56 -!- ycy_ [n=mb@131.179.136.74] has joined ##openvpn 07:56 < ycy_> hi 07:56 < ycy_> I have a strange problem 07:56 < ycy_> i correctly setup openvpn server 07:57 < ycy_> on a client, I correctly configured openvpn and then I launch openvpn with openvpn --config client.conf 07:57 < ycy_> and then I keep receiving 07:57 < ycy_> TLS Error: Unroutable control packet received 07:57 < ycy_> what should I do? 07:57 < alibaba> dazo: what shall I change in the config? 07:59 < dazo> alibaba: first of all .... have you shared the _complete_ log files? 07:59 < dazo> alibaba: it looks like a lot is missing 07:59 < dazo> alibaba: make sure verb is set to 4 in the configs (--verb 4) 08:00 < dazo> alibaba: preferably from scratch empty log files .... by using --log 08:00 < dazo> alibaba: and provide the complete output ... that gives a better indication 08:00 < krzee> ycy_, 08:00 < krzee> !configs 08:00 < vpnHelper> krzee: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 08:00 < alibaba> I made a marker into every log, then I restarted the openvpn service and sent you everything that came afterwards. 08:00 < krzee> !logs 08:00 < vpnHelper> krzee: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 08:01 < dazo> alibaba: well, then verb 4 is needed for sure 08:01 < krzee> 4 at least 08:01 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 08:01 < krzee> i usually say 5 or 6 08:01 < alibaba> I have verb5 inside. Isn't that even more verbose? 08:01 < krzee> 6 helps find firewall issues 08:01 < krzee> ya 5 is more verbose 08:04 < dazo> krzee: with 5 or 6, you get much more info which is more useful when needing to debug the core network traffic over the tunnel .... 4 gives rRwW with info of which side is writing or reading data 08:04 < dazo> alibaba: yeah 5 is enough 08:04 < dazo> alibaba: and remember to restart your openvpn services 08:05 < alibaba> Sure. Here is the entile log (level 5) after restarting the server side. 08:05 < alibaba> http://pastebin.com/d6adeb330 08:06 < alibaba> Is this ok or shall I increase the loglevel? 08:06 < dazo> 5 is more than enough 08:09 < alibaba> And here the log of the client: http://pastebin.com/d65b9293c (It loops between the WWWWWWWWWWW sections...) 08:09 < krzee> 4 gies RWRW? i thought that was 5 08:11 < dazo> krzee: 4 too :) 08:11 < alibaba> I swear, I didn't touch the config files within last 2 months. Today the VPN suddenly was slow, so I restarted the client, and since then I have no tun0 any more. 08:12 < krzee> you shouldnt have tun unless you have openvpn running (unless you created a static device) 08:12 < dazo> alibaba: the tun interface is created when openvpn starts .... and if it stops due to an error, it's usually gone again 08:13 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 08:13 < dazo> alibaba: please make sure the client is connecting against the proper IP address .... looks like there is no traffic at all on the server 08:13 < reiffert> dazo: will it get created even when the directory /dev/net is missing? 08:14 < alibaba> Sure. I have entered the static IP of my server. I am also currently not at the client, I have a ssh to it. But I need vpn to access all files there. 08:15 < dazo> reiffert: nope ... you do need /dev/net 08:15 < dazo> on Linux, that is 08:15 < dazo> alibaba: do you have the tun module loaded? 08:16 < rob0> I do. 08:17 < reiffert> dazo: which might be worth adjusting in a upcoming release. 08:17 < krzee> moin moin reif 08:18 < reiffert> the krzee, moin! 08:18 < krzee> asjusting it how? dynamicly load the tun driver? 08:18 < alibaba> dazo: This is openSuSE 11.1 (fyi). I cannot remember that I had to load something lik ethat in the past. 08:18 < reiffert> krzee: adjusting as in: get rid of /net/ in /dev/net 08:18 < krzee> ahh, thats os specific tho 08:18 < krzee> bsd and osx do it different than linux 08:19 < krzee> bigboy-2:~ Jeff$ ls -ls /dev/tun* 08:19 < krzee> 0 crw-rw---- 1 root wheel 19, 0 Jan 11 08:19 /dev/tun0 08:19 < krzee> 0 crw-rw---- 1 root wheel 19, 1 Jan 11 08:19 /dev/tun1 08:20 < reiffert> thats the way it should work with linux, without paying attention to what others say on google. 08:20 < krzee> i agree 08:21 < dazo> krzee: in Linux the user space tools use /dev/net/tun to create/modify/remove tun/tap network devices .... there are no /dev/tunX devices in Linux 08:21 < krzee> but theres a few things that i like more about fbsd hier than linux 08:21 < krzee> dazo, yup i think i misunderstood what he meant in the very beginning (thought he meant future release of openvpn, vs something linux specific) 08:21 < reiffert> Another approach should be getting a sane error message from openvpn "Cant create tun0 special device, because /dev/net is not available". I can remember some releases where you get certification bio messages when there is no /dev/net. 08:22 < alibaba> Ok. From my point of view, the server side is fine (as it shows a tun0 device). Can somebody help me with the client now, please? 08:22 < krzee> ya openvpn could use some better error messages 08:22 < krzee> alibaba, did you post !configs and !logs? 08:23 < alibaba> Meanwhile I losted them twice. 08:23 < alibaba> ... posted ... 08:23 < krzee> cool, i found client log, wheres server log? 08:23 < krzee> and wheres the configs? 08:23 < krzee> ahh found server log now 08:24 < Bushmills> alternatively, ls -ls /dev/net/tun* 08:24 < krzee> looks like firewall on server, client cant communicate with it at all 08:24 < krzee> firewall or nat i mean 08:25 < alibaba> Server side: http://pastebin.com/dc57d3e9 Client side: http://pastebin.com/dd7e41e9 08:25 < alibaba> Was at 14:23 today. ;) 08:26 < alibaba> On top you see the log, at the end the config file 08:26 < krzee> its only 8:25, you posted them in 6 hours 08:26 < zxd> do I need server 10.8.0.0 255.255.255.0 if I want to use fixed VPN ip addresses for clients ? 08:26 < alibaba> Ha, time difference! I am GMT+1 08:26 < reiffert> krzee: so one hour ago... 08:26 < alibaba> yessss 08:27 < krzee> zxd, yes, 08:27 < krzee> !static 08:27 < vpnHelper> krzee: "static" is (#1) use --ifconfig-push in a ccd entry for a static ip for the vpn client, or (#2) example: ifconfig-push 10.8.0.6 255.255.255.0, or (#3) also see !ccd and !iporder 08:28 < krzee> alibaba, 10.0.0.0 is behind server and 10.1.0.0 behind client? 08:28 < alibaba> yes. 08:28 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Read error: 104 (Connection reset by peer)] 08:28 < krzee> 10.1.0.0 iroute entry in clients ccd file, right? 08:29 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 08:29 < alibaba> This is in the ccd file: iroute 10.1.0.0 255.255.0.0 08:29 < krzee> ok 08:30 < krzee> server is on a LAN ip, correct? 08:30 < krzee> (as opposed to an external ip) 08:30 < alibaba> What do you mean? 08:30 < krzee> ifconfig shows an ip in 10.0.0.0/24 range 08:30 < krzee> on the server 08:30 < alibaba> The server is also firewall etc. It has two NICs, one for LAN, one for WAN. 08:31 < krzee> ok, i dont believe the firewall has the openvpn ip:port/udp open 08:31 < krzee> you can see the client opens a connection, writes writes writes, server sees nothing 08:31 < krzee> its your firewall =] 08:31 < alibaba> On server side? 08:31 < krzee> yes 08:32 < krzee> unless its a firewall on the client blocking outbound... 08:32 < alibaba> Let me verify... 08:32 < krzee> (less common) 08:33 < alibaba> Does the open port appear to nmap? 08:33 < alibaba> I can run nmap from the client against my server? 08:34 < krzee> depends on something in configs, lemme check 08:34 < krzee> ya yours should 08:34 < krzee> with this it wouldnt: 08:34 < krzee> !hmac 08:34 < vpnHelper> krzee: "hmac" is (#1) The tls-auth directive adds an additional HMAC signature to all SSL/TLS handshake packets for integrity verification. Any UDP packet not bearing the correct HMAC signature can be dropped without further processing. The tls-auth HMAC signature provides an additional level of security above and beyond that provided by SSL/TLS., or (#2) openvpn --genkey --secret ta.key to make the 08:34 < vpnHelper> krzee: tls static key , in configs: tls-auth ta.key # , 1 for client or 0 for server in the configs 08:34 < alibaba> Ok, then the port is closed. 08:35 < krzee> well ya 08:35 < krzee> didnt i say that? 08:35 < krzee> ;] 08:35 < alibaba> But nmap doesn't show 996 filtered ports. 08:36 < krzee> *shrug* fix your firewall for your ovpn setup 08:36 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has joined ##openvpn 08:37 < Bushmills> did you scan udp (assuming that you server has been configured to use udp)? 08:37 < krzee> either way, its the firewall 08:37 < krzee> or wrong ip (im unable to verify that for you) 08:40 < alibaba> No. I definitely have 1194 in the list of open UDP services in the firewall. I'll switch to TCP, if this is better? 08:40 < Bushmills> no 08:40 < krzee> !tcp 08:40 < vpnHelper> krzee: "tcp" is Sometimes you cannot avoid tunneling over tcp, but if you can avoid it, DO. Why TCP Over TCP Is A Bad Idea: http://sites.inka.de/~bigred/devel/tcp-tcp.html 08:40 < krzee> !firewall 08:40 < vpnHelper> krzee: "firewall" is (#1) please see http://openvpn.net/man#lbBD for more info, or (#2) see http://www.secure-computing.net/wiki/index.php/OpenVPN/Firewall for brief notes on disabling firewall rulesets. 08:40 < Bushmills> most likley not helping you with your problem, but instead introducing other ones 08:40 < krzee> see #1 08:42 < krzee> mattock, http://openvpn.net/man#lbBD doesnt rewrite the #lbBD marker 08:42 < dazo> alibaba: you must have something blocking the traffic somewhere ... the server do not get any connection attempts 08:42 < krzee> alibaba, http://openvpn.net/index.php/open-source/documentation/manuals/65-openvpn-20x-manpage.html#lbBD 08:42 < vpnHelper> Title: OpenVPN 2.0.x (at openvpn.net) 08:43 < alibaba> Hmm. Could you try to test if my server has 1194 open? 212.186.160.15 08:44 < zxd> what's the difference between iroute and route 08:44 < krzee> !iroute 08:44 < vpnHelper> krzee: "iroute" is does not bypass or alter the kernel's routing table, it allows openvpn to know it should handle the routing when the kernel points to it but the network is not one that openvpn knows about. This is only needed when connecting a LAN which is behind a client, and therefor belongs in a ccd entry. Also see !route and !ccd 08:47 < Bushmills> alibaba: closed 08:48 < rob0> A UDP port scan can't really tell the difference between a dropped packet and an openvpn server. 08:49 < krzee> right, which is why i checed his config 08:49 < krzee> its not using hmac sigs, so not dropping packets 08:49 < rob0> alibaba did have tcp/1194 closed, though, while other ports around it were dropped. 08:50 < Bushmills> i used netcat -u on it 08:51 < Bushmills> difference is that with port open, an Enter exits, close ports hang waiting 08:52 < rob0> s/dropped/filtered/ in nmap terms 08:53 < Bushmills> though that's also not a very reliable method 08:55 < zxd> is it possible to have multiplie clients on the same machine connecting to different servers? 08:56 < krzee> zxd, yes 08:56 < alibaba> I changed now - for testing - to tcp and nmap shows me that port 1194 is open. 08:57 < alibaba> So if I change now the client, too, should it work? 08:57 < zxd> krzee, I just put in multiple remote entries on the same client.conf file? or do I need to load it with different .conf files? 08:57 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 08:57 < krzee> 2 different 08:57 < krzee> 2 remotes will have 1 client rotate which it tries 08:57 < krzee> randomly if you choose 08:58 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 09:04 < alibaba> Hmm - After changing to tcp, I tried a telnet 1194 and received some little packages of crap. So I guess it answers to my client. Though, I get no tun0 device after restarting the client. :( 09:07 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 09:09 -!- rwscott [n=rwscott@207.236.169.155] has quit [SendQ exceeded] 09:09 -!- rwscott [n=rwscott@207.236.169.155] has joined ##openvpn 09:11 < alibaba> Stupid questions: Do the certificates of openvpn expire? 09:12 -!- rawDawg [n=rawDawg@adsl-99-57-58-238.dsl.bcvloh.sbcglobal.net] has joined ##openvpn 09:13 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has quit [Read error: 104 (Connection reset by peer)] 09:17 < rob0> A better approach than to switch to TCP might be to fix the firewall to allow UDP. 09:19 < alibaba> I have currently both open: UDP and TCP. And openvpn was configured to use UDP. This worked until today morning, then slowly, and after rebooting client it didn't work any longer. 09:19 < rob0> SSL certificates (which is what openvpn uses) do have expiration dates, yes. 09:19 < vpnHelper> New forum entry openvpnforum: Configuration :: Re: Reporting scripts :: Reply by george || Configuration :: Re: openvpn and samba, can't browse shares :: Reply by george 09:20 < alibaba> How long are these dates? ~2-3 months? 09:21 < rob0> These dates are what you set them to be when you created the cert. 09:21 < alibaba> Have you read the logs I posted? 09:22 < alibaba> Do they look like an expired cert? 09:22 < krzee> paste your firewall rules 09:23 < alibaba> You are familiar with SuSEFirewall2 ? There I only have to enter FW_External_UDP="1194" and restart it (through a script). 09:24 < alibaba> But this works, I know that. 09:24 < krzee> im sure it uses iptables, right? 09:24 < krzee> !iptables 09:24 < vpnHelper> krzee: "iptables" is (#1) to test if iptables is your problem, disable all rules except $IPTABLES -P INPUT ACCEPT $IPTABLES -P OUTPUT ACCEPT $IPTABLES -P FORWARD ACCEPT, or (#2) then run iptables -F, iptables -Z after being SURE policies are set to accept, or (#3) please see http://openvpn.net/man#lbBD for more info, or (#4) see http://www.secure-computing.net/wiki/index.php/OpenVPN/Firewall 09:24 < alibaba> It is an uptodate distro. 09:25 < alibaba> Yes it does. 09:26 < Bushmills> here is its sucks/rules ratio graph: http://stats.verhau.de/localdomain/localhost.localdomain-rulesuckratio-month.png 09:27 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has joined ##openvpn 09:27 < krzee> lol 09:27 < krzee> whats actually being graphed? 09:27 < alibaba> good question. :) 09:28 < zxd> how do I run a script once a tun interface goes up , like enabling proxy arp 09:28 < Bushmills> http://scarydevilmonastery.net/munin/rulesuckratio 09:28 < krzee> you want proxy arp? 09:28 < krzee> theres a few places to run scripts, you likely want --up 09:29 < Bushmills> in rating() the calculation is done 09:29 < zxd> krzee, yes I want proxy arp 09:30 < krzee> hahah nice Bushmills 09:31 < zxd> krzee, does it pass tun interface name as argument to the script? 09:31 < krzee> check the manual 09:31 < krzee> !man 09:31 < vpnHelper> krzee: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 09:32 < krzee> theres a section for external scripts, a piece on --up, environment vars section, etc 09:32 < krzee> everything you could need =] 09:32 < Bushmills> krzee: albeit a very rough metric, the results appear to match user opinions 09:33 < krzee> toss in osx 09:33 < Bushmills> freebsd, gentoo, slackware and debian tops, windows bottom, sounds about right 09:34 < Bushmills> note how windows experienced a temporary boost when win7 came out 09:34 < Bushmills> though it's on the decline again 09:34 < Bushmills> oh sorry, needs year graph: http://stats.verhau.de/localdomain/localhost.localdomain-rulesuckratio-year.png 09:35 < krzee> whoaa 09:35 < krzee> ya they definitely improved for a bit 09:36 -!- steelnwool [n=jeff@204-232-209-119.static.cloud-ips.com] has joined ##openvpn 09:36 < steelnwool> !welcome 09:36 < vpnHelper> steelnwool: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 09:37 < steelnwool> hello 09:37 < krzee> hey 09:37 < steelnwool> I've just setup openvpn ussing the how to. using viscosity as the client. my server is 10.8.0.1 via tun, my client received 10.8.0.6 09:38 < steelnwool> if my client is running ssh, should i expect the server to be able to ssh to it? 09:39 < krzee> if the ssh server on * ip, and no firewall, yes 09:39 < steelnwool> oddly enough the ssh server will ask me for a password but won't let me in. also, if i run a webserver on the client, i can't get to it with the server.. but can locally. [typing more] 09:40 < steelnwool> i can't ping the server from my client, but i can ping the client from my server... 09:40 < krzee> makes me think the client has a firewall 09:40 < steelnwool> so it would seem things are "mostly working".. 09:41 < reiffert> ah, viscosity seems to be another openvpn gui client for OS X. 09:41 < steelnwool> yeah. 09:41 < steelnwool> just checked client, no firewall. 09:41 < krzee> !osx 09:41 < vpnHelper> krzee: "osx" is (#1) http://www.viscosityvpn.com/ (PAY), or (#2) http://www.tunnelblick.net/ (FREE) 09:41 < steelnwool> likewise if i ssh or http to my client from within my own lan, everything works fine. 09:41 < steelnwool> i chekced to see what IP's apache and ssh bind to on the client and they bind to everything. 09:41 < krzee> you ssh'ing by vpn ip? 09:41 < steelnwool> yeah. 09:42 < krzee> ssh listening on * ip? 09:42 < robotti^> reiffert: viscosity is nice 09:42 < steelnwool> and like i said, ssh actually does ask for a password, so there is some sort of handshake going on there. 09:42 < krzee> ahh 09:42 < reiffert> oh, payware, why do we list it on !osx? 09:42 < steelnwool> krzee: yes. 09:42 < robotti^> It is good 09:42 < krzee> reiffert, up to the user 09:42 < robotti^> and it is quite cheap :) 09:42 < reiffert> krzee: advertisment for payware? 09:42 < steelnwool> also, i was told tunnelblick has "issues" so i just skpped it and dropped the 9 bucks. 09:43 < krzee> ad for 2 choices of apps people seem to like that take standard openvpn configs 09:43 < krzee> 1 is pay 1 is free 09:43 < krzee> personally i use niether 09:43 < zxd> I can't get any networks routed via the tun0 interface 09:43 < steelnwool> anyways krzee, all that ssh/apache cleint stuff, lets ignore that, i'll make my question alot more simple : I can ping form the server to client, but not client to server. 09:43 < zxd> tcpdump shows the traffic being routed to the tun0 interface 09:43 < zxd> but I dont see the traffic on the other side 09:44 < reiffert> krzee: I really dislike the idea of running ads for payware I dont own. 09:44 < krzee> and that sounds like firewall on server 09:44 < steelnwool> krzee: if i ping the server/ssh the server from elsewhere inside its own network, things work tho. I did not setup/configure a firewall. 09:44 < krzee> reiffert, is !osx having that link you running ads for payware you dont own? 09:45 < reiffert> krzee: jup. 09:45 < krzee> steelnwool, from the manual: 09:45 < krzee> iptables -A INPUT -i tun+ -j ACCEPT 09:46 < krzee> iptables -A FORWARD -i tun+ -j ACCEPT 09:46 < robotti^> what is problem? :) 09:47 -!- steelie [n=devel1@dns1.suite2101.com] has joined ##openvpn 09:48 < krzee> reiffert, but i dont see how, you have the choice to make it show up or not, you can just use !mac 09:48 < steelie> krzie: sorry, the machine steelnwool is on just died this is me. 09:48 < krzee> !mac 09:48 < vpnHelper> krzee: "mac" is Use Tunnelblick for the Mac. (http://code.google.com/p/tunnelblick/) 09:48 < steelie> can you repaste that iptables thing. 09:48 < krzee> =] 09:48 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 09:48 -!- mode/##openvpn [+v Kas] by ChanServ 09:48 < krzee> steelie, 09:48 < krzee> [09:45] steelnwool, from the manual: 09:48 < krzee> [09:45] iptables -A INPUT -i tun+ -j ACCEPT 09:48 < krzee> [09:46] iptables -A FORWARD -i tun+ -j ACCEPT 09:48 < steelie> thanks. 09:48 < steelie> can you URL me on w here oyu found that. 09:48 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 09:49 < krzee> !man 09:49 < vpnHelper> krzee: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 09:49 < krzee> in section named FIREWALLS 09:49 < reiffert> krzee: Allright, I can live with that. 09:49 -!- steelnwool [n=jeff@204-232-209-119.static.cloud-ips.com] has quit [Read error: 60 (Operation timed out)] 09:49 < steelie> krzee: thanks. 09:49 < krzee> np 09:50 < vpnHelper> New forum entry openvpnforum: Configuration :: Re: OpenSUSE 11.1 service command issues :: Reply by george 09:50 < steelie> however i'm not running any firewalls ON this machine. there is a SSG5 in front of it, but i'm already past that part since the VPN did connect. 09:50 -!- alibaba [n=xerox@goliath.hantsch.co.at] has quit [Read error: 110 (Connection timed out)] 09:51 -!- alibaba [n=xerox@goliath.hantsch.co.at] has joined ##openvpn 09:51 < alibaba> Hi, I restarted now my server after doing an online update, therefore I was away for some time. 09:52 < steelie> krzee: ah ha... last line of troubleshooting from the HOWTO - its about one way connections. says my firewall is likly blocking outgoing UDP or something. 09:52 < steelie> loooking into that now. 09:52 < alibaba> This reboot solved nothing, but then I disabled the compression. Oh wonder, now it works again! 09:53 -!- steelnwool [n=jeff@204-232-209-119.static.cloud-ips.com] has joined ##openvpn 09:54 < steelnwool> huh, rackspace must have had an outage. 09:54 -!- steelie [n=devel1@dns1.suite2101.com] has quit ["leaving"] 09:56 < steelnwool> krzie: it says this in the how to : The firewall can either be (a) a personal software firewall running on the client, or (b) the NAT router gateway for the client. Modify the firewall to allow returning UDP packets from the server to reach the client. 09:57 < steelnwool> does that mean open udp 1194 in my firewall to the ip of my client? that seems like it would raise issues if i had multiple clietns wanting to use VPN's at my client site. 09:57 -!- dragoin [n=dragoin@81.19.35.122] has joined ##openvpn 09:58 < dragoin> Hi, I have a problem... with VPN 09:59 < le0> youre in the right place then 09:59 < Bushmills> dragoin: did you say "openvpn"? 09:59 < dragoin> I connect throuth vpn, and i get ip address. problem is in settings DNS servers for "transfer" ip 10:00 < dragoin> sry my eng is bad 10:00 < dragoin> jj openvpn 10:00 < dragoin> i have ubuntu 9.10 10:00 < Bushmills> !ubuntu 10:00 < vpnHelper> Bushmills: "ubuntu" is dont use network manager! 10:00 < dragoin> i know... 10:01 < le0> you need to get scripts to grab your DNS settings from the VPN host 10:01 < Bushmills> where is the dns you're using? 10:01 < le0> and execute them upon connecting / disconnecting 10:02 < dragoin> le0: and where i donwload it? i am laik. 10:02 < le0> i found some a while back 10:02 < le0> sec 10:03 < dragoin> bushmills: that is i dont know... or pls repeat qu 10:03 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 110 (Connection timed out)] 10:04 < Bushmills> is your intention to use a different dns after connection, or are you unable to query to your usual dns after vpn connection? 10:04 < dragoin> then connect... i can ping destination... 10:05 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [] 10:07 < dragoin> or dont ping ,google.com , 10:07 < dragoin> etc. 10:08 < Bushmills> do you redirect your internet traffic through vpn server? 10:08 < dragoin> ok, again, after vpn connection, i need internet... 10:09 < dragoin> i connecting to my school, because school have a licence ip address to database 10:10 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has joined ##openvpn 10:11 < dragoin> Bushmills:i dont know, where, or how i detect 10:11 < dragoin> maybe, this is a problem... 10:11 < dragoin> but i fail it do this... 10:12 < Bushmills> if you don't know, you better don't mess with the config 10:12 < Bushmills> little angry man may appear and chide you. 10:13 < dragoin> so sorry... but 10:14 < alibaba> Ha, it works again! :) This crazy online updates overwrote my firewall settings! 8O 10:14 < Bushmills> alibaba <3 SuSE 10:14 < dragoin> i am agonized. that all 10:15 < dragoin> i use openvpn... and setings from school 10:15 < alibaba> Bushmills: Believe me: Everything is better than debian. 10:15 < Bushmills> SuSE policy: "personal configuration detected ... must overwrite immediately" 10:16 < Bushmills> alibaba: i don't believe you, knowing both suse and debian. 10:17 < alibaba> I use suse since 20 yrs. I had a look on ubuntu (which is debian) and I must say, I stay with suse. 10:17 < Bushmills> well, anyway, have fun with your mentioned online update which overwrote your settings 10:17 < Bushmills> ubuntu is ubuntu, not debain 10:17 < Bushmills> debian 10:18 < alibaba> doesn't matter it is at least totally different in administration. 10:18 < dragoin> Bushmills: i find, this...but i dont repair, http://www.isaserver.org/tutorials/work-around-VPN-clients-split-DNS.html 10:18 < vpnHelper> Title: How to work around an issue with VPN clients and split DNS (at www.isaserver.org) 10:19 < dragoin> I trust this channel:-) 10:19 < Bushmills> alibaba: "The first version of this distribution appeared in early 1994" ... "I use suse since 20 yrs" 10:19 < Bushmills> time warp? 10:20 < dragoin> le0: do you know, how solve my problem? 10:20 < alibaba> I started with SuSE 5.0 10:20 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has joined ##openvpn 10:21 < alibaba> This is - estimated - 20 years. 10:21 < rob0> Linux itself is not yet 20-y-o. 1991 wasn't it? 10:21 < Bushmills> ah, so suse5.0 was out before the first version of suse was available 10:21 < Bushmills> getting more interesting :) 10:21 < alibaba> How long is it then? 10:21 < le0> dragoin, if you are not SPLIT tunnelling, you need to update your local DNS to reflect settings pushed from your VPN endpoint 10:21 < alibaba> It is Very long ago. 10:21 < le0> i have scripts whcih work with openvpn in linux 10:22 < le0> they are shell scripts 10:22 < le0> i am not sure about windows as none of my users are windows users 10:22 < Bushmills> bit more than 15 years that first version came out. 5.x was around 1995 10:22 < Bushmills> maybe 96 10:22 < alibaba> Ok. Then it is 15 yrs. Still long time. 10:23 < rob0> SuSE was a fork of Slackware, which began in 1993. Slackware was a fork of SLS. 10:23 * Bushmills used SLS 10:23 < alibaba> I slightly remember this stack of floppy disks. Then I bought a SuSE 5.0 package. :) 10:24 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 10:24 < dragoin> le0: yes, I use Ubuntu 9.10, and openvpn... 10:24 < alibaba> Anyway, thank you very, very much for your kindly help. 10:24 < dragoin> no wins 10:25 * rob0 statred with Zipslack 3.6, 1998ish 10:25 < le0> okay, i will post, sec 10:25 < rob0> <== a newbie 10:25 < dragoin> le0: thank you 10:25 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Client Quit] 10:26 -!- alibaba [n=xerox@goliath.hantsch.co.at] has left ##openvpn ["Konversation terminated!"] 10:28 < le0> dragoin, i accept NO resp for these scripts btw 10:28 < le0> http://paste.debian.net/56378/ 10:28 < le0> thats the up script 10:28 <+Kas> :kasx blitzen1 10:29 <+Kas> tehe 10:29 < le0> down script is: cp /home/user/keys/pentest/nonsplit/resolv.conf /etc/resolv.conf 10:31 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has joined ##openvpn 10:31 < zxd> I don't think my ccd file is working , can the Common Name have spaces in it 10:32 < zxd> per example : VPS Gateway1 10:35 -!- pfo [n=pfo@srv.gmi.oeaw.ac.at] has quit [Client Quit] 10:35 < zxd> Ok I got it 10:35 < zxd> it converts the space to _ 10:37 < dragoin> pls le0 what is folder. if i get it, i have to rewrite resolv.conf?? I testing, this file, and i take same ip address... 10:37 < le0> what is folder? 10:37 < le0> you will need to amend paths to suit your env 10:38 < dragoin> before, and after vpn connect ... folder ehm /home/user/keys,, 10:38 < le0> i have a base copy of my resolv.conf so i know its right 10:41 -!- bootlaces [n=bootlace@unaffiliated/bootlaces] has quit ["Hometime - joy!"] 10:43 < le0> any luck dragoin 10:43 < dragoin> le0: pls vpn_up.sh one sec... 10:43 < dragoin> what is 10:44 < dragoin> what is it... i not found 10:47 < le0> dragoin, check pm 10:49 -!- Briareos1 [n=B@13-98-136-94.static.net4you.net] has joined ##openvpn 10:49 < Briareos1> !download 10:49 < vpnHelper> Briareos1: "download" is www.openvpn.net/download to download openvpn 10:49 < Briareos1> !downloads 10:49 < vpnHelper> Briareos1: Error: "downloads" is not a valid command. 10:51 -!- dazo [n=dazo@nat/redhat/x-rlydlhulyongjdde] has quit [Read error: 54 (Connection reset by peer)] 10:53 < Briareos1> i am receiving "read UDPv4 [EMSGSIZE Path-MTU=1460]: Message too long (code=90)" on my client though I've set mssfix 1200 and the openvpn-server is responding to pings 10:53 < Briareos1> client is newest version (just downloaded) 10:53 -!- dazo_ [n=dazo@nat/redhat/x-lwskmcolscvullpx] has joined ##openvpn 10:53 < Briareos1> with version from ubuntu package repo it's the same 10:53 < Briareos1> couldn't find a solution 10:54 -!- dazo_afk [n=dazo@nat/redhat/x-hjlzmengnirgaqjc] has joined ##openvpn 10:54 -!- dazo_afk is now known as Guest39119 10:54 -!- Guest39119 is now known as dazo 10:54 -!- dazo is now known as Guest32313 10:55 < Briareos1> it seems to only happen with rdp 10:55 -!- Guest32313 is now known as dazo 10:57 -!- dazo_ [n=dazo@nat/redhat/x-lwskmcolscvullpx] has quit [Client Quit] 10:58 -!- hyper_ch [n=hyper@83-161.78-83.cust.bluewin.ch] has quit [Remote closed the connection] 11:06 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 11:11 -!- dragoin_ [n=dragoin@81.19.35.122] has joined ##openvpn 11:11 < le0> are your mtu settings the same on both local and remote systems? 11:11 -!- polaru [n=polaru@93.113.192.70] has quit [Remote closed the connection] 11:13 < Briareos1> le0 haven't set them explicitly to anything 11:13 < Briareos1> now i set "fragment 1200" in addition to "mssfix 1200" (as stated in the faq) and it seems to work 11:14 < le0> cool 11:14 < Briareos1> i hope i'm not loosing too much performance or so :) 11:14 -!- teddymills [n=teddy@208.92.235.227] has joined ##openvpn 11:15 < Bushmills> it is good to loose performance. it is bad to lose it. 11:17 < Briareos1> thanks :) 11:17 < Briareos1> but don't tell my english teacher 11:18 < Briareos1> well see you later then 11:18 -!- Briareos1 [n=B@13-98-136-94.static.net4you.net] has quit [Remote closed the connection] 11:20 -!- krzee [i=nobody@unaffiliated/krzee] has quit [Read error: 104 (Connection reset by peer)] 11:21 -!- dyzdyz [n=dyzdyz@ch49172.petrus.pl] has joined ##openvpn 11:21 -!- dragoin [n=dragoin@81.19.35.122] has quit [Read error: 110 (Connection timed out)] 11:21 -!- LobbyZ [n=default@main.lobbyzffs.com] has quit ["Free FTW"] 11:21 -!- dyzdyz [n=dyzdyz@ch49172.petrus.pl] has quit [Client Quit] 11:22 -!- LobbyZ [n=default@main.lobbyzffs.com] has joined ##openvpn 11:31 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 60 (Operation timed out)] 11:32 < steelnwool> I have my vpn setup, I can ping form the server to the client, but not the client to the server.. idea's ? [using tun] 11:32 < rob0> whois robotti^ 11:32 < steelnwool> i'm not forwarding gateways, or publishing any routes. when i do a traceroute from my client, it dies on the first hop 11:33 < rob0> (Sorry, forgot the / -- just thought you might be someone I know) 11:38 -!- derRichard [n=derRicha@ununbium.nod.at] has joined ##openvpn 11:39 < steelnwool> why does client.conf have to exist on the server? 11:43 -!- APTX|1 [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 11:43 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has quit ["Leaving"] 11:44 -!- APTX|_ [n=APTX@chello089076052083.chello.pl] has quit [Read error: 60 (Operation timed out)] 11:44 -!- dragoin_ [n=dragoin@81.19.35.122] has quit ["Lost terminal"] 11:46 < dazo> steelnwool: you need some routes, they can be in the client config ... or being pushed to clients from the server config by using --push ... the client.conf don't need to exist on the server, unless they are a part of --client-config-dir (aka ccd) 11:46 < dazo> !ccd 11:46 < vpnHelper> dazo: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 11:48 < steelnwool> dazo: wouldn't the route from 10.8.0.6 to 10.8.0.1 be published automatically when the connection starts? i would only use --push for routes to other networks beyond the vpn host, right? 11:48 < dazo> steelnwool: that's right 11:48 < steelnwool> okay, in taht case then i should already ahve the route. 11:49 < dazo> steelnwool: that's just to double check the client routing table ... route -n (Linux) or route print (windows, iirc) 11:49 < Bushmills> i think for only trying to contact server from client, no additional routes need to be pushed. problem should be a different one 11:49 < steelnwool> also: i noticed if i remoted clietn.conf , that all pings completly failed, but if i put it back in place, and restart openvpn, i can at least ping from server to client again, but cannot ping from client to server. 11:49 < Bushmills> (i'd say, firewall) 11:49 < steelnwool> Bushmills: yeah exactly. and i'm stumped 11:50 < steelnwool> bushmills firewall on which side ? a friend of mine was at my house last week and was able to connecto to his vpn at his work [also using openvpn and his client is also a mac] 11:50 < Bushmills> but to make sure, check your client routing table. route to vpn net should be there 11:50 < steelnwool> on my side : os x has no firewall turned on, my timecapsule isn't blocking any vpn traffic. 11:50 < steelnwool> Bushmills: 11:50 < steelnwool> tun0: flags=8851 mtu 1500 inet 10.8.0.6 --> 10.8.0.5 netmask 0xffffffff open (pid 10869) 11:50 < Bushmills> steelnwool: server firewall, most likely 11:51 < steelnwool> Bushmills: ok for server firewall i opened UDP 1194, are there other things i should have open? 11:51 < Bushmills> ehm .. you can connect to server, so it's not an issue with udp 1194 11:52 < steelnwool> yeah zactly. 11:52 < Bushmills> the services which you can't reach on server should be allowed. or the whole tun interface 11:52 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 11:52 < dazo> steelnwool: also double check that IP forwarding is enabled as well 11:52 < dazo> steelnwool: even though to ping the other side of a p-t-p tunnel, would not require that ... but no traffic will be routed if IP forwarding is disabled 11:53 < steelnwool> my server is ubuntu with linux se, so it could be app-armour or ufw getting in the way.. 11:53 < steelnwool> let me look into those. 11:53 < Bushmills> again, no ip forwarding needed for simple client - server connection 11:54 < steelnwool> yeah zactly. i'll get to that part later. for now i'll be happy just to have the two talk to each other. 11:54 * Bushmills nods 11:54 < dazo> that depends on which IP address you ping on the server .... if it is the tun interface, Bushmills is right ... if you do the physical eth, it will fail 11:55 < Bushmills> if traffic not redirected, those requests would go the other route 11:55 < dazo> as long as IP fwd is enabled 11:55 < steelnwool> i'm pinging from 10.8.0.6 to 10.8.0.1 and i just get 100% packet loss. 11:56 < dazo> what is what here? what is client and what is server? 11:56 < steelnwool> client is mac osx, server is ubuntu LTS. client is .6 server is .1 11:56 < dazo> the server on the client side will then be 10.8.0.7, iirc 11:56 < dazo> and the client on the server side will be 10.8.0.2 11:57 < Bushmills> 0.7 should be the p2p address. probably not pingable 11:57 < steelnwool> should .1 be pingable/ 11:57 < Bushmills> 0.1 as server address sounds right 11:57 < dazo> sorry! 10.8.0.5, I meant 11:58 < steelnwool> dazo: yeah its 1 and 2 and 5 and 6 11:58 < dazo> 0.7 would be the broadcast of the 10.8.0.4/30 net 11:59 < dazo> steelnwool: this can be a bit confusing, but with the p-t-p setup ... on the client side, you should be able to ping .0.5 and 0.6 ... and on the server side .0.1 and .0.2 12:00 < steelnwool> dazo: if i want to ssh from the client to the server. which ip should i ssh to? 12:01 < dazo> steelnwool: if sshd is listening to the tun address on the server, that would be 10.0.8.5, if the client address is 10.8.0.6 12:02 < Bushmills> ip addr of tun interface on server would be fine 12:02 -!- hyper_ch [n=hyper@adsl-84-226-239-178.adslplus.ch] has joined ##openvpn 12:02 < dazo> seen from the client side, though 12:02 < steelnwool> yeah, doesn't work. 12:04 < dazo> tried tcpdump on the tun devices? 12:05 < steelnwool> not yet. trying TCP, then I'll try that. 12:05 < Bushmills> I'd try watch -n 1 iptables -nvL on server, then ping from client and look if anything changes (rule hit count, number if policy caught packets) 12:06 < steelnwool> k, will do that now. then tcp i guess. thanks 12:08 < steelnwool> Bushmills: that command seems to exist almost immediatly. 12:08 < steelnwool> root@vpn:/etc/openvpn# tcpdump watch -n 1 iptables -nvL 12:08 < steelnwool> Data link types (use option -y to set): DOCSIS (DOCSIS) (not supported) EN10MB (Ethernet) 12:08 < reiffert> :) 12:09 < steelnwool> you can mock my tcp-fu, i don't mind. 12:09 < steelnwool> er tcpdump-fu 12:09 < Bushmills> i didn't mention tcpdump 12:09 < steelnwool> oh. heh. 12:10 < steelnwool> okay, "watching" now 12:10 < steelnwool> nay, my pings from the client get "Request timeout for icmp_seq 0" so i don't think they're even leaving my house... 12:10 < dazo> steelnwool: the tcpdump would be ... tcpdump -n -i tun0 (if your tun device is tun0) 12:11 < steelnwool> yeah, nothing from tcpdump. 12:11 < dazo> including on the client? 12:11 < steelnwool> sec. will run there. 12:12 < steelnwool> 14:12:18.312509 IP 10.8.0.6 > 10.8.0.1: ICMP echo request, id 18731, seq 0, length 64 12:12 < steelnwool> thats from the client. 12:13 < dazo> steelnwool: please ... try to ping 10.8.0.4 .... 10.8.0.1 will in most cases never work in a p-t-p setup 12:13 < steelnwool> you mean .2 ? 12:13 < dazo> I mean 10.8.0.5 12:13 < dazo> sorry 12:13 < steelnwool> yeah, did that, failed too. 12:14 < dazo> then you have some issues on your client's firewall most probably 12:14 < steelnwool> my mac firewall is off, and my nat-router was used last week by a friend connecting to his own openvpn elsewhere tho... 12:14 < dazo> or that the tun0 device is not found in the route table 12:14 < steelnwool> the tun0 interface IS found in my route table. 12:15 < steelnwool> http://pastebin.com/m2fb53112 12:15 < dazo> well, the packets disappear somewhere .... 12:15 < steelnwool> yeah. 12:16 * steelnwool relooks at mac firewall. 12:16 -!- jamesyonan [n=jamesyon@c-76-120-71-74.hsd1.co.comcast.net] has joined ##openvpn 12:16 < steelnwool> yeah, tis off. 12:16 < dazo> gateway: 10.8.0.5 ..... you should almost always be able to ping your gateway ... if that's not doable .... something is blocking you 12:17 < steelnwool> indeed. 12:18 < steelnwool> i'm going to try running the openvpn client from a linux command line, it might have some more verbose debugging, or at least removes the 'os x variable' 12:18 -!- jamesyonan [n=jamesyon@c-76-120-71-74.hsd1.co.comcast.net] has left ##openvpn [] 12:19 -!- jamesyonan [n=jamesyon@c-76-120-71-74.hsd1.co.comcast.net] has joined ##openvpn 12:21 < jamesyonan> test message 12:21 < dazo> jamesyonan: roger that :) 12:21 < jamesyonan> cool 12:21 < dazo> jamesyonan: you might want to join ##openvpn-discussion 12:24 < hyper_ch> dazo: what's that? 12:24 < dazo> what's what? 12:24 < dazo> hyper_ch: have you seen the topic lately? 12:25 < openvpn2009> !welcome 12:25 < vpnHelper> openvpn2009: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 12:25 < hyper_ch> topics? isn't that like FAQs, READMEs, manuals etc. just there to be ignored? 12:26 < dazo> only if you like to be spanked in public 12:26 < openvpn2009> hyper_ch, in most of the channels, yes. Not in here 12:26 < dazo> heh 12:27 < hyper_ch> dazo: I have a hardened shell from #debian 12:28 < dazo> :) 12:34 < hyper_ch> well, I've heard horror stories that people always get told RTFM 12:34 < hyper_ch> in #debian 12:34 < hyper_ch> but my experience has been quite nice this far 12:34 < Bushmills> no. only those who don't 12:34 < steelnwool> well. just tried with CLI on linux, and same symptons... so i guess that only leaves my firewall on the client side.. 12:34 < hyper_ch> tbh, I think just shouting RTFM at people is not the best way 12:35 < hyper_ch> sometimes people are willing to RTM but they don't know where to start 12:35 < Bushmills> oh, some say "that's written in the manual - do you want me to paste it, or rephrase it so you can understand it too?" 12:35 < steelnwool> hyper_ch: in my experience i've found it depends upon the question. 12:35 < hyper_ch> if you don't know what a "thing" is called then you can't really search info on it 12:36 < Bushmills> but essentially, that means about the same :) 12:37 -!- mintaka [n=kosmic@unaffiliated/spice] has joined ##openvpn 12:37 < mintaka> Jan 11 19:33:39 2010 us=426024 [server] Inactivity timeout (--ping-restart), restarting 12:37 < mintaka> i get that a LOT 12:37 < mintaka> don't know what is causing it 12:37 < hyper_ch> k y gk 12:37 < mintaka> but sometimes every few minutes my connection drops 12:37 < hyper_ch> inactivity is causing it :) 12:38 < mintaka> but im not inactive 12:38 < Bushmills> your VPN might be 12:39 < Bushmills> after all, it is the vpn timing out, and not you. 12:39 < mintaka> it happens mostly when im on wireless 12:42 < Bushmills> !keepalive 12:42 < vpnHelper> Bushmills: Error: "keepalive" is not a valid command. 12:43 < Bushmills> mintaka: http://scarydevilmonastery.net/snap/1263235399510542882.png 12:44 < mintaka> thats nice 12:44 < mintaka> that's a nice hostname 12:45 < mintaka> i set ping-restart 0 in the ovpn file 12:46 < Bushmills> To disable the 120 second default, set --ping-restart 0 on the client. 12:46 < mintaka> that man snip says it's for servers. i dont have server access 12:46 < mintaka> theres another issue im having 12:47 < mintaka> i run openvpn as root, (you have to) then when i do get disconnected 12:47 < mintaka> the reconnect will be attempted 12:47 < Bushmills> keepalive causes ping and pingrestart on both server and client. if you can edit client config only, you can have ping and ping-restart there 12:48 < mintaka> but if i have set to downgrade to user nobody or 12:48 < mintaka> grouand group nobody 12:48 < mintaka> it will fail to create the tunnel 12:48 < mintaka> it basically always needs root 12:48 < mintaka> i dont know if i like that 12:48 < mintaka> someone could send a carefully crafted packet that exploits my system when it reaches me 12:49 < mintaka> gains root access! 12:50 < rob0> user/group downgrade works for me 12:50 < mintaka> and when you recoonnect? 12:51 < mintaka> kkk 12:51 < Bushmills> normally you can drop privileges. 12:51 < mintaka> nverming that 12:51 < mintaka> i can drop privs but i cant get it to remake the connection 12:53 < Bushmills> check your .crt file on client for permission problems 12:53 < Bushmills> i think client.crt and ca.crt should be non-root readable 12:53 < mintaka> i only have ca.crt 12:54 < Bushmills> client.conf not sure, but i don't think that's needed 12:54 < mintaka> and it's readable by all 12:54 < mintaka> hmm maybe 12:54 < mintaka> let me try that 12:54 < mintaka> i dont have a client.conf just a .ovpn 12:54 < Bushmills> what's the name of your .key file? 12:55 < mintaka> no key files 12:55 < mintaka> password only 12:55 < Bushmills> ah 12:57 -!- cron2 [n=gert@dhcp-174.greenie.muc.de] has joined ##openvpn 12:59 -!- cron2_ [n=gert@dhcp-174.greenie.muc.de] has joined ##openvpn 13:15 -!- Schlaubi [n=daniel@p5B0A1A24.dip0.t-ipconnect.de] has joined ##openvpn 13:18 -!- Thaxll [n=Thaxll@69.70.215.78] has joined ##openvpn 13:20 -!- Schlaubi [n=daniel@p5B0A1A24.dip0.t-ipconnect.de] has quit ["Verlassend"] 13:20 -!- hyper_ch [n=hyper@adsl-84-226-239-178.adslplus.ch] has quit [Remote closed the connection] 13:20 -!- hyper_ch [n=hyper@adsl-84-226-239-178.adslplus.ch] has joined ##openvpn 13:21 -!- Schlaubi [n=daniel@p5B0A1A24.dip0.t-ipconnect.de] has joined ##openvpn 13:26 < Schlaubi> ö 13:27 < reiffert> !!! 13:27 < vpnHelper> reiffert: Error: "!!" is not a valid command. 13:28 < steelnwool> okay so.. a friend of mine, also on a mac and time capsule, was just connected to his own vpn. he disconnected and tried to connect to mine and got same symptoms. i think that means i can rule out my client side and that my issues are wither with the firewall on my server side, my server config it self or something else on the server side of things. 13:33 -!- rawDawg [n=rawDawg@adsl-99-57-58-238.dsl.bcvloh.sbcglobal.net] has quit [Read error: 104 (Connection reset by peer)] 13:34 -!- berniv6 [n=berni@2001:1b10:1000:0:0:0:26c3:1] has joined ##openvpn 13:37 -!- Winkie [n=urmom@ur.fa.gs] has left ##openvpn [] 13:39 < mintaka> so i run openvpn with ping-restart 0 13:39 < mintaka> it seems to help with my problem 13:40 < mintaka> but the question now becomes since i can only run one vpn connection at a time 13:40 < mintaka> what happens if i disconnect abruptly 13:40 < mintaka> will the remote server think im connected for ever? 13:41 < Bushmills> if you terminate client, the client won't ping anymore. but with your config, it won't anyway. 13:41 < Bushmills> means, it has no reason to ping for keeping alive. 13:42 -!- rajin [n=_@port-10961.pppoe.wtnet.de] has joined ##openvpn 13:43 -!- Schlaubi [n=daniel@p5B0A1A24.dip0.t-ipconnect.de] has left ##openvpn ["Verlassend"] 13:58 -!- rwscott [n=rwscott@207.236.169.155] has quit [Remote closed the connection] 14:01 < Thaxll> Hello, i've a question about routing, I know it's a well known subject but i'm a bit lost. How do we push all internet traffic from client to VPN because my push " blabla" in conf file doesn't work :/ 14:02 < reiffert> !def1 14:02 < vpnHelper> reiffert: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 14:04 < Thaxll> Hmm ok, i'm going to check that thanks ;) 14:05 < steelnwool> are the ovpn forums usually pretty good? 14:09 < mintaka> bushmills, so what happens 14:09 < Bushmills> (19:46:06) Bushmills: To disable the 120 second default, set --ping-restart 0 on the client. 14:09 < mintaka> i cant reconnect anymore? 14:09 < mintaka> well, 14:09 < Bushmills> and you haven't added a ping 14:10 < steelnwool> woo, got it working. 14:12 < ecrist> If folks didn't know, community forum going on now in ##openvpn-discussion 14:13 < mintaka> that's lovely and all 14:15 < steelnwool> i'm embarrased to say how i got it working,b ut suffice to say i had a client running on the server :) 14:15 < steelnwool> which of course = "a wrench in the gears" and a facepalm. 14:17 -!- cron2 [n=gert@dhcp-174.greenie.muc.de] has left ##openvpn ["-server freenode2 #openvpn"] 14:23 -!- Section58 [n=steve@ipt0-2.core.bsd.uk.phib3r.net] has quit [] 14:23 -!- a-zlex [n=as@null0.ipv6.bgp4.org] has joined ##openvpn 14:24 < steelnwool> can you use the push route comand for pushing routes to non-private ips ?> 14:25 < Bushmills> yes, you can 14:27 < steelnwool> holy crap. everything works. 14:27 < steelnwool> this is awesome. 14:27 < steelnwool> thanks for your patience everyone. 14:28 < mintaka> what do you think i should i do 14:28 < mintaka> to not get kicked off the vpn 14:29 -!- jamesyonan [n=jamesyon@c-76-120-71-74.hsd1.co.comcast.net] has left ##openvpn [] 14:30 < Bushmills> it works? now that it does, you gotta change the configuration. 14:30 -!- a-zlex [n=as@null0.ipv6.bgp4.org] has left ##openvpn [] 14:31 < mintaka> heh 14:31 < mintaka> to what! 14:31 < Bushmills> mintaka: try reading man page, concerning keepalive, ping, ping-restart 14:31 < mintaka> those are all badly named commands imo 14:31 < mintaka> yeah im diving into the man 14:32 < Bushmills> write a bug report, telling why you consider them inaptly named. 14:34 < mintaka> nah! 14:40 < mintaka> trying with keepalive 10 60 in .ovpn 14:40 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit ["Leaving."] 14:49 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has quit [] 14:50 -!- cron2_ [n=gert@dhcp-174.greenie.muc.de] has left ##openvpn [] 14:52 < mintaka> Jan 11 21:49:54 2010 us=697583 [server] Inactivity timeout (--ping-restart), restarting 14:52 < mintaka> again i got that 14:52 < mintaka> what is it with this crap 14:53 -!- cron2 [n=gert@2001:608:4:0:222:68ff:fe7f:7420] has joined ##openvpn 14:53 -!- dabozz [n=benny@dslb-094-219-206-019.pools.arcor-ip.net] has joined ##openvpn 14:54 -!- rajin [n=_@port-10961.pppoe.wtnet.de] has quit [" HydraIRC -> http://www.hydrairc.com <- Po-ta-to, boil em, mash em, stick em in a stew."] 14:55 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has joined ##openvpn 14:55 -!- pfo [n=pfo@chello084114049188.14.vie.surfer.at] has quit [Client Quit] 14:56 < dabozz> hi, can someone help me with my openvpn problem 14:56 < dabozz> ? 14:56 < dabozz> my client says: http://paste.pocoo.org/show/164440/ 14:58 < ecrist> that tells me exactly nothing 14:59 < dabozz> mm ok 14:59 < ecrist> !logs 14:59 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 15:06 -!- ycy_ [n=mb@131.179.136.74] has quit [Read error: 104 (Connection reset by peer)] 15:06 < mintaka> dabozz, i think ecrist is asking for better logs 15:07 < dabozz> ok im looking for it 15:09 < Bushmills> actually, a description what your problem actually is can also be useful 15:11 < cron2> indeed, as the log looks pretty non-problematic so far - it initialized fine, and is now waiting for activity (as far as I can see) 15:11 -!- ycy_ [n=mb@Noise.CS.UCLA.EDU] has joined ##openvpn 15:11 < Bushmills> maybe your disk is full? 15:15 < mintaka> this is rather interesting 15:15 < mintaka> you know what i did? i ran a tun on one machine 15:15 < mintaka> killed the wireless without killinbg the tun first 15:15 < mintaka> then tried connecting to the vpn from a different machine 15:16 < mintaka> and it worked, even with ping-restart 0 15:16 -!- dabozz [n=benny@dslb-094-219-206-019.pools.arcor-ip.net] has quit ["Leaving."] 15:16 < mintaka> worked on the third try but still 15:19 < mintaka> that might be worth noting :) 15:24 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has joined ##openvpn 15:29 -!- zz_hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has joined ##openvpn 15:32 -!- XATRIX [n=George@217-64-178-94.pool.ukrtel.net] has joined ##openvpn 15:32 < XATRIX> hi guys 15:33 < XATRIX> any idea of how openvpn connection can be unreachable 15:33 < XATRIX> look 15:33 < XATRIX> From 192.168.7.34 icmp_seq=1 Destination Port Unreachable 15:34 < XATRIX> http://pastebin.com/d43e039ec 15:34 < XATRIX> i'm trying to ping 192.168.3.74 15:35 < rob0> who/what is 7.34 then? 15:36 < ecrist> XATRIX: that host isn't reachable 15:36 < ecrist> either it's not on the LAN, or your routing tables are fubar 15:36 < XATRIX> rob0: as i understand it's my remote host openvpn interface 15:37 < XATRIX> and 192.168.3.0/24 is a remote office network 15:37 < XATRIX> ok, i'll describe the situation 15:37 < XATRIX> i have my laptop, and ADSL modem, so, my laptop is in 192.168.1.0/24 network 15:38 < XATRIX> 192.168.1.1 - is a laptop, and 192.168.1.254 - modem 15:38 < XATRIX> i have the remote network on our office , (192.168.3.0/24) 15:38 < XATRIX> i try to connect to it via openvpn 15:39 < XATRIX> some of the config files and certificates were given to me by our administrator 15:39 < rob0> Sounds like maybe the typical routing confusion. Each side has to know how to route to the other. 15:39 < rob0> !route 15:39 < vpnHelper> rob0: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 15:40 < XATRIX> http://pastebin.com/d5a6ab86e 15:40 < XATRIX> ok please , look at the config file 15:40 < XATRIX> i don't think i do something wrong 15:41 -!- Holister [n=ryan@static-151-204-189-39.pskn.east.verizon.net] has quit [Read error: 104 (Connection reset by peer)] 15:42 -!- Holister [n=ryan@static-151-204-189-39.pskn.east.verizon.net] has joined ##openvpn 15:43 -!- dauergast [n=sag@g227117037.adsl.alicedsl.de] has joined ##openvpn 15:46 < XATRIX> so ? 15:46 < XATRIX> i'm really need help 15:46 -!- dazo is now known as dazo_afk 15:46 < hyper_ch> dazo: you're using znc, right? 15:52 < XATRIX> guys please, help me to solve problem 15:58 < rob0> Did you read !route completely? I think it would help. I have my own jobs to do, unable to hold your hand through all of it. 16:00 -!- hyper_ch [n=hyper@adsl-84-226-239-178.adslplus.ch] has quit [Remote closed the connection] 16:00 -!- zz_hyper_ch is now known as hyper_ch 16:01 -!- hyper__ch [n=hyper@adsl-84-226-239-178.adslplus.ch] has joined ##openvpn 16:01 -!- hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has quit [Nick collision from services.] 16:01 -!- hyper__ch is now known as hyper_ch 16:02 < XATRIX> rob0: look, it quite strange, i didn't change anything in config files after i migrate from gentoo 16:02 < XATRIX> on gentoo i connected with this configs sucessfully 16:02 -!- zz_hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has joined ##openvpn 16:03 -!- Thaxll [n=Thaxll@69.70.215.78] has quit ["Quitte"] 16:03 < XATRIX> can't understand what isn't right 16:03 < XATRIX> i have routes to 192.168.3.0/24 network... what can be wrong? 16:06 -!- zz_hyper_ch is now known as hyper_away 16:06 -!- hyper_away is now known as zz_hyper_ch 16:06 -!- hyper_ch [n=hyper@adsl-84-226-239-178.adslplus.ch] has quit [Remote closed the connection] 16:06 -!- zz_hyper_ch is now known as hyper_ch 16:07 -!- hyper_ch is now known as hyper_away 16:07 -!- hyper_away is now known as hyper_ch 16:08 -!- dauergast [n=sag@g227117037.adsl.alicedsl.de] has quit ["Windows error 000 : No errors found! [CLOSE]"] 16:20 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has quit ["ChatZilla 0.9.86 [Firefox 3.0.17/2009122116]"] 16:29 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 16:46 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has quit ["Leaving"] 16:53 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [] 17:09 -!- hyper_ch is now known as hyper_away 17:12 -!- hyper_away is now known as hyper_ch 17:14 -!- XATRIX [n=George@217-64-178-94.pool.ukrtel.net] has left ##openvpn ["Leaving"] 17:18 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has quit ["Leaving."] 17:19 -!- ribasushi [n=rabbit@dslb-084-063-042-037.pools.arcor-ip.net] has quit [Read error: 110 (Connection timed out)] 17:24 -!- hyper_ch is now known as hyper_away 17:26 -!- ribasushi [n=rabbit@dslb-084-063-012-137.pools.arcor-ip.net] has joined ##openvpn 17:35 -!- ribasushi_ [n=rabbit@dslb-084-063-041-247.pools.arcor-ip.net] has joined ##openvpn 17:39 -!- ribasushi_ [n=rabbit@dslb-084-063-041-247.pools.arcor-ip.net] has quit [Read error: 60 (Operation timed out)] 17:42 -!- ribasushi [n=rabbit@dslb-084-063-012-137.pools.arcor-ip.net] has quit [Connection timed out] 17:52 -!- corretico [n=laguilar@201.201.46.106] has quit ["Leaving"] 18:00 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 18:00 -!- tjz2 [n=tjz@bb116-15-75-62.singnet.com.sg] has joined ##openvpn 18:06 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 54 (Connection reset by peer)] 18:06 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 18:07 -!- tjz [n=tjz@unaffiliated/tjz] has quit [Read error: 60 (Operation timed out)] 18:15 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 19:07 -!- theDoc [n=hex@69.10.59.166] has joined ##openvpn 19:11 < crazygir> I can connect to the VPN just fine, but then can't get thru to the 172.x subnet from 10.0.65/ 19:11 < crazygir> any thoughts.. I'm a bit lost on this VPN/routing issue: http://pastebin.ca/1747678 19:18 < ecrist> !route 19:18 < vpnHelper> ecrist: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 19:19 < ecrist> ip_forward enabled? 19:19 < mithridates> !factoids search group 19:19 < vpnHelper> mithridates: No keys matched that query. 19:20 < mithridates> !factoids search config 19:20 < vpnHelper> mithridates: 'ifconfig' and 'configs' 19:20 < mithridates> !configs 19:20 < vpnHelper> mithridates: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 19:21 < mithridates> ecrist: how can I have different configurations for different groups of clients ? by ccd? 19:23 < crazygir> ecrist: pretty sure ip forwarding is set, will double check though.. may have been lost with a reboot 19:28 < crazygir> ecrist: yep.. ip forwarding is enabled 19:30 < ecrist> mithridates: ccd is the right way to do it 19:30 < ecrist> you can also do more complicated things with client connect scripts 19:32 < mithridates> ecrist: is there any other things for group clients management? 19:32 < ecrist> mithridates: depending on how complicated, I would probably do a shared certificate for everyone in a specific group, but use user/pass verification to auth each user 19:33 < mithridates> aah ok 19:33 < mithridates> ecrist: can I set one certificate only for 10 people? 19:33 < ecrist> you can auth user/pass based on cname, to prevent users from other groups from using a different group's certificate 19:34 < mithridates> I didn't get the last part 19:34 < ecrist> crazygir: !logs, please 19:35 < ecrist> in your auth script, set some logic to verify a user has access to a specific CN 19:35 < theDoc> crazygir> Is your routing table looking correct? 19:35 < mithridates> ecrist: ahaa I think I got it 19:36 < ecrist> theDoc: it seems to 19:36 * ecrist guesses firewall, or lack of a route on the server 19:36 < theDoc> Does the destination have a route back to the source? 19:37 < mithridates> ecrist: for example, I can set 10 users for one certificate. thus only 10 people can be online with a same configuration by ccd 19:37 < mithridates> am I right? 19:37 < theDoc> ecrist> Funnily enough, I was in a minor network nightmare due to default g/w's and non-existant routes in the routing table. ;p 19:38 -!- ribasushi [n=rabbit@dslb-084-063-001-106.pools.arcor-ip.net] has joined ##openvpn 19:40 < ecrist> mithridates: only if you set that in the auth script 19:41 < mithridates> is there any sample-script? 19:41 < ecrist> nope 19:41 < ecrist> for a six pack, I could write one, though. ;) 19:42 < mithridates> I don't know how I can write script related to this case 19:43 < mithridates> I think it doesn't need script 19:43 < ecrist> how many users are you talking about? 19:43 < mithridates> between 50 - 100 19:44 < ecrist> in each group, or total? 19:44 < mithridates> total 19:44 < mithridates> 10 or 20 for each group 19:44 < ecrist> ok, you have a couple options. 19:44 < ecrist> 1) every user gets their own CCD entry and their own certificate 19:44 < mithridates> ok 19:45 < ecrist> 2) every group gets their own certificate. each certificate get its own CCD entry 19:45 < ecrist> 3) same as #2, but you incorporate a user auth script in addition 19:45 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 19:46 < ecrist> 2 is insecure as if a user changes groups, you cannot, without great hassle, remove their access from the former group, or prevent users from sharing certificates. 19:47 * ecrist bitch-slaps dazo 19:47 < mithridates> ecrist: number 3) it means to use a same user for all people in a group? 19:47 < ecrist> no 19:48 < ecrist> just do #1 and be done with it. ;) 19:48 < mithridates> ecrist: number one is like a crowd job 19:48 < mithridates> I like the way of number 2 19:48 < mithridates> every group gets their own certificate. each certificate get its own CCD entry 19:50 < mithridates> ecrist: would you tell me , can I use this certificate for a group of 10 people only? 19:50 < ecrist> nope 19:51 < ecrist> not with just openvpn 19:51 < ecrist> you need to do #3 otherwise 19:51 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 19:51 < mithridates> but , What do u mean by auth script 19:51 < mithridates> which auth script 19:52 < ecrist> one you write 19:52 < vpnHelper> New forum entry openvpnforum: Configuration :: Obtain user attributes from Radius server :: Author fulat2k || Configuration :: So far - I have a one way vpn and I'm scratching my head. :: Author bignose || Configuration :: client.conf - On the server ? :: Author bignose if you can't write one, you cannot do it 19:53 < mithridates> ecrist: aah I got it now , tell me use radius or nagios 19:53 < mithridates> =)) u only say auth script 19:53 < ecrist> nagios is not an auth system 19:53 < ecrist> it's a system monitor 19:54 < ecrist> ping dazo 19:54 < theDoc> radius != nagios 19:56 < ecrist> not even close 19:56 < theDoc> That's like comparing an apple to a car 19:56 < theDoc> ;p 19:56 < mithridates> =))) 19:56 < mithridates> say more 19:57 < ecrist> your smiley face is broken 19:57 < mithridates> describe a mistake , it's an enjoyable job 19:57 < mithridates> :)) 19:59 < theDoc> Oh shoot, my ftp is broken 19:59 < theDoc> I'll get around to it in a few hours 19:59 < crazygir> theDoc: I posting the routes 20:00 < crazygir> ecrist: openvpn's logs? 20:00 < theDoc> crazygir> Wha? 20:00 < crazygir> *posted 20:00 < theDoc> route -e and pastebin that, I'm sure it's something along those lines. 20:00 < crazygir> http://pastebin.ca/1747678 20:00 < crazygir> theDoc: on the server? 20:00 < crazygir> or client 20:00 < theDoc> crazygir> Taking a look. 20:00 < theDoc> Both 20:00 < crazygir> ^^ 20:01 < theDoc> ^^ 20:01 < crazygir> (the paste should be sufficient) 20:01 < theDoc> crazygir> Which network are you originating from and which network is your destination? 20:02 < crazygir> I want to connect to systems in the 172.x subnet, my client is connected to the vpn and is coming from the 10.0.x 20:04 < ecrist> crazygir: did you include server routes on that paste? 20:05 < theDoc> crazygir> What's the -exact- 172.16.x ip you are trying to hit? 20:05 < crazygir> theDoc: 172.20.10.0 20:05 < crazygir> ecrist: yes 20:05 < theDoc> crazygir> That's your subnet id or a host address? 20:06 < theDoc> Because it looks like there isn't a route like that in your routing table. 20:06 < theDoc> on the server, at least 20:06 < ecrist> you don't have a route 20:06 < crazygir> http://pastebin.ca/1747738 20:06 < crazygir> ecrist: ? 20:06 < ecrist> you only have a route to 172.20.10.10 20:06 < theDoc> Line 45 shows a route going to 172.20.10.10 20:06 -!- APTX|_ [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 20:06 < crazygir> hrm.. let me check that 20:07 < theDoc> That's a /32 and seems to be pointing to a particular host, you need to have a route for the entire subnet 20:07 -!- APTX|_ [n=APTX@chello089076052083.chello.pl] has quit [Remote closed the connection] 20:08 < theDoc> and I believe, we have that solved ;p 20:08 < crazygir> yep, dunno why that is. adding the route now and testing 20:09 < crazygir> that would make sense, I was having difficulty pinpointing the goofed route 20:09 < theDoc> I think the 2 most common problems we see around here is not having ipv4_forward=1 and the routing table. 20:09 < ecrist> nope, most common is firewall problems 20:10 < theDoc> Talking about that, I'm feeling sleepy but I have to go lab this hsrp setup 20:10 < theDoc> ecrist> With iptables? :? 20:10 < crazygir> heh 20:10 < ecrist> theDoc: what any firewall 20:11 < theDoc> Oh, any firewall. 20:11 < ecrist> s/what/any 20:11 < crazygir> I can ping the vpn server ip (10.0.65.1) just fine, but no one inside 172.20.10.0 20:11 < ecrist> crazygir: did you read !route? 20:12 < crazygir> my route wasn't added :| 20:12 < ecrist> it really seems as though you did not 20:12 < crazygir> yes I did 20:13 < theDoc> !route 20:13 < vpnHelper> theDoc: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 20:15 < theDoc> crazygir> pastebin relevant push statements on your server.conf please. 20:15 -!- stephenh [n=stephenh@94-23-158-103.kimsufi.com] has joined ##openvpn 20:19 * ecrist goes to bed. 20:19 -!- APTX|1 [n=APTX@chello089076052083.chello.pl] has quit [Read error: 110 (Connection timed out)] 20:22 < vpnHelper> New forum entry openvpnforum: Wishlist :: Re: Statistics Offloading :: Reply by dazo || Wishlist :: Re: Statistics Offloading :: Reply by ecrist 20:23 < crazygir> theDoc: push "route 172.20.10.0 255.255.255.0" <--- this gets out to the client, I can see this in the client's logs/output. A traceroute to a system in the 172.x subnet shows that the client routes thru to the vpn (correct!) but then ends there. so the server's routes are correct. I'm looking into this now 20:25 < crazygir> theDoc: the client seems to reinitiate its connection, doesn't seem normal, is that? 20:26 < theDoc> crazygir> Your server doesn't have a route in the routing table, try adding one in like, route add -n 172.16.10.0 netmask 255.255.255.0 dev eth1_or_whatever 20:26 < crazygir> yep, I have. it isn't linux, but I'm working on figuring out why what I've tried isn't working 20:26 < theDoc> crazygir> Doesn't matter, you can push the routes via your server.conf but if your server's routing table doesn't have the network, it's pointless. 20:26 < theDoc> Which platform is this? 20:28 < crazygir> theDoc: right, I understand. and adding the route isn't erroring out, but it isn't being added either.. again, I'm debugging this now :) 20:28 < crazygir> theDoc: openbsd 20:29 < theDoc> crazygir> You see, I could pretend to have -any- subnet behind me in my server.conf but if my server's actual routing table doesn't have the routes, the traffic isn't going anywhere because the client is just told to send traffic to that network which is advertised via the server and nothing more. 20:30 < theDoc> lmao, d000::/8 prefix is still out there. 20:30 < theDoc> ;p 20:31 < crazygir> of course. it makes sense. again.. trying to figure out why the server's route isn't being added correctly 20:31 < theDoc> Now, that's not something I can help with, not familiar with bsd. 20:45 < mintaka> im strugglin real hardc with trying to add unpriviledged users to openvpn 20:46 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 20:48 < mintaka> its real hard 20:50 < mintaka> doesnt work like the manual shows 20:52 < vpnHelper> New forum entry openvpnforum: Configuration :: Re: OpenSUSE 11.1 service command issues :: Reply by Douglas 21:09 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 21:10 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 21:16 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 21:19 -!- APTX|_ [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 21:22 < vpnHelper> New forum entry openvpnforum: Configuration :: Re: So far - I have a one way vpn and I'm scratching my head. :: Reply by bignose || Configuration :: Re: client.conf - On the server ? :: Reply by bignose 21:25 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit ["( www.nnscript.com :: NoNameScript 4.22 :: www.esnation.com )"] 21:38 -!- poningru [n=poningru@dsl093-236-026.hfd1.dsl.speakeasy.net] has joined ##openvpn 21:38 < poningru> question 21:39 < poningru> need help with understanding anyconnect 21:39 < poningru> \/openconnect 21:40 < poningru> ... 21:41 < poningru> I'm an idiot 21:41 < poningru> nvm 21:41 < poningru> http://www.infradead.org/openconnect/ 21:41 < vpnHelper> Title: OpenConnect (at www.infradead.org) 21:41 < poningru> the bottom section provides all the info 21:41 < poningru> sorry 21:41 -!- poningru [n=poningru@dsl093-236-026.hfd1.dsl.speakeasy.net] has left ##openvpn ["Leaving"] 21:49 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 21:49 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 22:23 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 22:30 -!- tjz2 is now known as tjz 22:30 -!- tjz [n=tjz@bb116-15-75-62.singnet.com.sg] has quit ["bbl"] 22:30 -!- tjz [n=tjz@unaffiliated/tjz] has joined ##openvpn 22:33 -!- maodun [n=stopgo@114.243.119.42] has left ##openvpn [] 22:36 -!- yrashk [n=yrashk@S010600179a2767ab.vc.shawcable.net] has left ##openvpn [] 22:52 -!- xod [n=onats@112.201.158.40] has joined ##openvpn 23:03 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 23:30 -!- freaky[t] [i=alpha@member.team-box.net] has quit [Remote closed the connection] 23:35 -!- freaky[t] [i=alpha@member.team-box.net] has joined ##openvpn 23:55 -!- hyper_away is now known as hyper_ch --- Day changed Tue Jan 12 2010 00:01 -!- hyper_ch is now known as hyper_away 00:03 -!- hyper_away is now known as hyper_ch 00:03 -!- hyper_ch is now known as hyper_away 00:04 -!- hyper_away is now known as hyper_ch 01:20 -!- freaky[t] [i=alpha@member.team-box.net] has quit [Read error: 60 (Operation timed out)] 01:26 -!- freaky[t] [i=alpha@member.team-box.net] has joined ##openvpn 01:45 -!- simplechat_ [n=simple@unaffiliated/simplechat] has joined ##openvpn 01:45 < simplechat_> Hi, I'm trying to set up bridged mode openvpn and it is failing oddly 01:46 < simplechat_> and i can't seem to find anything useful via google 01:46 < simplechat_> the interfaces have bridged properly (to br0) 01:46 < simplechat_> i have routes client side to the other network, with the gateway set, however no data is transfered through either tap 01:47 < simplechat_> 192.168.3.0 192.168.3.1 255.255.255.0 UG 0 0 0 tap0 01:47 < simplechat_> 192.168.3.0 * 255.255.255.0 U 0 0 0 tap0 01:47 < simplechat_> is the output client side 01:47 < simplechat_> from route 01:50 < endre> you know how bridge works, don't you? 01:50 < simplechat_> i'm using bridge.sh 01:50 < endre> that was not the right answer. 01:50 < simplechat_> how would i conferm? 01:50 < simplechat_> http://pastebin.ca/1747981 is the output from ifconfig 01:50 -!- hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has left ##openvpn [] 01:51 < endre> can you see the mac addresses of the other side at the bridge? 01:51 < endre> you can dump the tap interface as welll 01:52 < simplechat_> more information? 01:52 -!- hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has joined ##openvpn 01:52 < endre> i won't do it for you 01:53 < simplechat_> endre, if you can tell me enough that i can google it, i'd be much grateful 01:54 < endre> google on tcpdump brctl first 01:54 < simplechat_> so i want to tcpdump the interface? 01:55 < cron2> you need to tcpdump the tap0 (to see whether packets from the LAN are properly bridged into tap0) - and also the tap0 on the server side, to see if packets arrive 01:56 < simplechat_> so run tcpdump on tap0 01:56 < simplechat_> and then attempt a tcp connection through? 01:56 < cron2> yes 01:56 < cron2> start with ping 01:56 < simplechat_> ok 01:56 < simplechat_> if it changes anything, this is a deb stable vm 01:57 < endre> is there any #openvpn-advanced? 01:57 < endre> or -dev? 01:57 < simplechat_> 07:57:56.617194 IP6 fe80::1440:5758:e2e5:47e2.52803 > ff02::c.1900: UDP, length 146 01:57 < simplechat_> does that mean anything? 01:57 < cron2> endre: well, there's the -dev mailing list 01:58 < simplechat_> its the only thing that i'm getting from tcpdump 01:58 < endre> not really except if the source lladdr is on the other network 01:58 < simplechat_> ping comes back Destination Host unreachable 01:58 < cron2> simplechat_: that's IPv6. if that's all you get, your bridge config is not right 01:58 < simplechat_> yeah 01:58 < simplechat_> and 07:58:33.238361 arp who-has 192.168.3.201 tell BROADWAYROUTER 01:58 < endre> yup 01:59 < cron2> now that's better 01:59 < endre> at least arp is getting on the interface 01:59 < simplechat_> yeah 01:59 < simplechat_> but 201 is on the other side 01:59 < simplechat_> i've assigned openvpn .50 to .75 01:59 < cron2> well, that's the point: it's trying to figure out how to find .201 01:59 < endre> you not assigned anytinh 01:59 < endre> anything 01:59 < endre> using tap is above of ip addresses and all 01:59 < cron2> and since tap/bridge is ethernet it needs to do ARP for that - that ARP packet needs to arrive at the server side, be bridged to the server side LAN, and be answered by whoever has the .201 02:00 < endre> u are mixing tun and tap characteristics 02:00 < cron2> endre: I'd call it "below" :) 02:00 < endre> tap is like ethernet 02:00 < endre> cron2: i try to be like 'for dummies'. i know iso/osi model as well. 02:00 < cron2> endre: but still, with "server-bridge" you can have the OpenVPN server hand out IP addresses for the client's tap interfaces 02:00 < endre> fuck me, i use dhcp 02:00 < simplechat_> hmmmm 02:00 < simplechat_> :( 02:01 < simplechat_> damnit this stuff is painful 02:01 < cron2> endre: in that case, yes, openvpn tap is "just plain ethernet" :-) 02:01 < endre> :) 02:02 < simplechat_> hmmm 02:02 < simplechat_> would seeing my openvpn.conf help? 02:03 < cron2> I think it's more an issue of the bridge config on the server side 02:03 < cron2> since you see the ARP going out on the client side - that should be sufficient to make the client side work 02:03 < simplechat_> cron2, i was tcpdumping on the server 02:05 < cron2> simplechat: ah. good: the OpenVPN part is transporting the packet to the server. Now the question is: does the packet travel from the server's tap0 to the server's eth0 (->bridge config on server side). Run "tcpdump -n arp -i $physical_ethernet" on the server side, and try the ping again 02:05 < simplechat_> hmmmm 02:05 < simplechat_> so eth0? 02:06 < cron2> we can't know :-) - could be eth17. but eth0 is quite likely :) 02:06 < simplechat_> 08:06:19.232696 arp who-has 192.168.3.1 tell 192.168.3.181 02:06 < simplechat_> 08:06:19.233150 arp reply 192.168.3.1 is-at 00:24:8c:8d:08:2e 02:06 < simplechat_> 3.1 is the gateway 02:06 < simplechat_> 181 is itsef 02:06 < simplechat_> i'm 3.50 02:07 < endre> seems like bridge is defunct 02:07 < endre> brctl show 02:07 < cron2> ok, I got confused about the arp packet above. Let's do a step back 02:07 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:07 < cron2> if you do a "ping 192.168.3.1" from the client side, you need to see an ARP from 3.50->3.1 on the client tap0, on the server tap0, and on the server eth0 02:08 < cron2> there is no good tcpdumping the server side unless you see *this* ARP on the client tap0 02:09 < simplechat_> bridge name bridge id STP enabled interfaces 02:09 < simplechat_> br0 8000.00163e8cd05e no eth0 02:09 < simplechat_> tap0 02:09 < cron2> problem could be client bridge/client ifconfig, openvpn, and server bridge config - and this needs to be analyzed systematically, starting with the client bridge (to make sure the packet is actually entering the client's openvpn interface) 02:09 < endre> this looks good 02:09 < cron2> simplechat_: is this client or server side? 02:09 < simplechat_> server side 02:10 < simplechat_> client has no bridge, that i can see 02:10 < cron2> ok. less stuff to worry about 02:10 < simplechat_> ok 02:10 < cron2> so please run the "ping" command while watching "tcpdump -n -i tap0 arp" on the client side 02:10 < cron2> (or make that "tcpdump -n -i tap0 arp or icmp") 02:11 < simplechat_> client side? 02:11 < cron2> yes, client side. 02:11 < endre> yeah 02:12 < endre> you should start it on server side as well 02:12 < cron2> first, make sure that the client kernel is handing the packet *to* openvpn, in the first place 02:12 < simplechat_> 19:12:23.208741 arp who-has 192.168.3.1 tell 192.168.3.50 02:12 < simplechat_> 19:12:24.208747 arp who-has 192.168.3.1 tell 192.168.3.50 02:12 < simplechat_> 19:12:25.208746 arp who-has 192.168.3.1 tell 192.168.3.50 02:12 < simplechat_> 19:12:26.216736 arp who-has 192.168.3.1 tell 192.168.3.50 02:12 < simplechat_> on client 02:12 < simplechat_> on server nothing 02:13 < cron2> my interpretation: client side ifconfig is fine, but tap-in-openvpn is failing. is there anythign in the server side openvpn log? 02:14 < jmm> hi. 02:14 < simplechat_> openvpn-status.log? 02:14 < simplechat_> jmm, hey 02:16 < simplechat_> cron2, what sort of things am i looking for? 02:16 < cron2> simplechat: I'm not sure "something that looks like an error or warning" 02:17 < simplechat_> nothing 02:18 < cron2> hmmm. is there an openvpn-status.log on the server side? 02:18 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: krzie, Optic, ribasushi, jaek_, corretico, bytesaber_, mrnice1, krphop, plundra, vpnHelper 02:18 < simplechat_> yeah 02:18 < simplechat_> well 02:18 < simplechat_> i'm looking at the servers one 02:19 < simplechat_> i get Tue Jan 12 19:15:19 2010 PUSH: Received control message: 'PUSH_REPLY,route 192.168.3.0 255.255.255.0,route-gateway 192.168.3.1,ping 10,ping-restart 120,ifconfig 192.168.3.50 255.255.255.0' 02:19 < simplechat_> Tue Jan 12 19:15:19 2010 /sbin/ifconfig tap0 192.168.3.50 netmask 255.255.255.0 mtu 1500 broadcast 192.168.3.255 02:19 < simplechat_> Tue Jan 12 19:15:19 2010 /sbin/route add -net 192.168.3.0 netmask 255.255.255.0 gw 192.168.3.1 02:19 < cron2> that's the client side 02:19 < simplechat_> Tue Jan 12 19:15:19 2010 ROUTE default_gateway=192.168.1.1 02:19 < simplechat_> thats odd 02:20 < cron2> the route 192.168.3.0/24 -> 192.168.3.1 looks confusing - it shouldn't be there if your LAN is 192.168.3.x 02:20 -!- Netsplit over, joins: ribasushi, vpnHelper, corretico, jaek_, plundra, mrnice1, bytesaber_, krzie, krphop, Optic 02:22 < simplechat_> my lan is 1. 02:22 < simplechat_> the lan on the servers side is 3. 02:22 < cron2> in that case, that's all fine (because that is your local default gateway) 02:23 < cron2> but still, the "push route 192.168.3.0..." part is wrong - the server should not push a route for the network connected to the tap interface 02:24 < simplechat_> so that shouldn't be in there? 02:24 < cron2> yes 02:24 < simplechat_> i added it to my servers openvpn.conf 02:24 < cron2> that is quite obvious :) 02:25 < simplechat_> still won't do it 02:25 < simplechat_> without the push 02:25 < cron2> I think we need to see client & server openvpn.conf now... 02:26 < reiffert> moin.. 02:27 -!- simplechat [n=simple@unaffiliated/simplechat] has joined ##openvpn 02:27 < simplechat> that was odd 02:27 -!- simplechat [n=simple@unaffiliated/simplechat] has quit ["Leaving"] 02:28 < simplechat_> ok 02:29 < simplechat_> http://pastebin.ca/1748010 02:29 < simplechat_> wait 02:29 < simplechat_> ok 02:29 < simplechat_> right one 02:30 < cron2> ok, and the server side? 02:30 < reiffert> cron2: there are various commands with the vpnHelper bot in here. Like !logs !configs and !interfaces 02:32 < cron2> reiffert: yes, I've noticed people use that. Nice tool. 02:36 < simplechat_> sorry 02:36 < simplechat_> server was kind of screwed up :( 02:36 < simplechat_> http://pastebin.ca/1748014 02:39 < cron2> mmmh. this looks right. What I'd do now is to increase "verb" to 5 or 6 on both sides, and see if there is something in the logs when you run ping - the client should tell you that it's sending to the server (or an error message), and the server should receive something 02:40 < reiffert> guess he was removing the push route just seconds before .. let him see if it works properly now 02:40 < cron2> the push route was wrong, but should not actually cause harm - we saw ARP packets going into the client tap, but coming out of the server tap. That's independent of routing issues 02:41 < cron2> "... but not coming out of the server tap" 02:41 < simplechat_> getting reads/writes 02:41 < cron2> sorry 02:41 < simplechat_> cron2, what should the route be? 02:41 < simplechat_> never hurts to fix something 02:41 < cron2> simplechat_: no route. this is ethernet 02:41 < simplechat_> cron2, but this is over tap? 02:41 < cron2> tap is ethernet 02:41 < cron2> tap is ethernet 02:41 < cron2> tap is ethernet 02:42 < simplechat_> k 02:42 < cron2> back to the read/write: you see something every 10 seconds, when the "ping" timeout fires. Then you should see activity as soon as there is something happening in "tcpdump -i tap0" on the client 02:42 < reiffert> -n 02:43 < cron2> for this sort of debugging it can help to increase the "keepalive" settings to something very high (keepalive 300 900) or even turn it off 02:43 < simplechat_> when i run the ping command i get continuous reads/writes on both sides 02:43 < simplechat_> Tue Jan 12 08:41:53 2010 us=708886 alex-desktop/123.243.79.139:49128 TUN WRITE [42] 02:43 < simplechat_> Tue Jan 12 08:42:00 2010 us=48722 alex-desktop/123.243.79.139:49128 UDPv4 WRITE [53] to 123.243.79.139:49128: P_DATA_V1 kid=0 DATA len=52 02:43 < cron2> that's the ARP packet going out 02:43 < simplechat_> the key i'm connecting from is called alex-desktop 02:44 < cron2> mmmh. if that was the server log, it's a packet going server->client, so you really should see something in the client's "tcpdump -n -i tap0" 02:45 < cron2> (and each WRITE on the server should bring a READ on the client, and vice versa) 02:45 < simplechat_> that was server log 02:45 < simplechat_> Tue Jan 12 19:41:33 2010 us=417768 TUN READ [42] 02:45 < simplechat_> Tue Jan 12 19:41:33 2010 us=417834 UDPv4 WRITE [77] to 110.174.4.223:1194: P_DATA_V1 kid=0 DATA len=76 02:45 < simplechat_> Tue Jan 12 19:41:39 2010 us=796555 UDPv4 READ [53] from 110.174.4.223:1194: P_DATA_V1 kid=0 DATA len=52 02:45 < simplechat_> on client 02:47 < cron2> well. this could very well be the "ping" packets -> please turn off "keepalive" in the server config, restart the server, reconnect, and then re-test 02:47 < cron2> run ping, see what happens in the client "tcpdump -n -i tap0", in the client openvpn log, in the server openvpn log, in the server "tcpdump -n -i tap0" and figure out where the packet is lost 02:48 -!- Intensity [i=[exNgvKL@unaffiliated/intensity] has quit [Remote closed the connection] 02:48 < simplechat_> theres a fair amount of traffic 02:49 < cron2> you need to correlate what's going on in all 4 observation points to see why it is not working 02:49 < simplechat_> ok 02:50 -!- Schlaubi [n=daniel@p5B0A151B.dip0.t-ipconnect.de] has joined ##openvpn 02:50 < cron2> client arp -> visible in tcpdump on client -> WRITE on client openvpn -> READ on server openvpn -> visible in server TAP. ARP reply -> other direction. 02:50 < simplechat_> ok 02:51 < cron2> well, that ws simplified a bit, it's actually "TUN READ, UDP WRITE on client", etc. 02:51 < simplechat_> the two openvpns are sending/recieving stuff every few seconds 02:51 < cron2> have you turned off keepalive? 02:51 < simplechat_> yep 02:51 < simplechat_> and it turns off when i turn off ping 02:51 < simplechat_> so its getting through openvpn 02:52 < cron2> good 02:52 < simplechat_> client side has continuous stream of arp packets 02:52 < simplechat_> server side has a stream of 02:52 < simplechat_> 08:51:53.535890 IP6 fe80::1440:5758:e2e5:47e2.52803 > ff02::c.1900: UDP, length 146 02:52 < simplechat_> for no apparent reason 02:52 < cron2> that's some host on IPv6 trying DHCPv6 (most likely). Noisy, but should not harm 02:52 < simplechat_> ok 02:52 < simplechat_> yeah 02:53 < simplechat_> nothing on the servers end 02:53 < cron2> ok, which interface is the server using? is it using tap0 or tap1? 02:53 < simplechat_> nothing 02:53 < simplechat_> so its a problem with the bridge? 02:53 < cron2> I just remembered: to make a bridge config work, you need to pre-create the tap interface and tell the openvpn server to connect to "dev tap0" not "dev tap" (which will use the first available(!) tap device) 02:54 < simplechat_> wow 02:54 < simplechat_> and now its working 02:54 < simplechat_> holy shit cron2 02:54 < simplechat_> thanks :D 02:55 < cron2> stupid me, could have remembered that earlier :-) 02:55 < cron2> glad that it's working now 02:56 -!- Schlaubi [n=daniel@p5B0A151B.dip0.t-ipconnect.de] has left ##openvpn ["Verlassend"] 02:56 < cron2> reiffert: is there a command in VPN-Helper that will point to the most likely "tap/bridge" mistakes? I think this must be one of them :-) 02:56 < reiffert> cron2: I remember that openvpn has issues when running on vmware.. it really sounds like one of them. 02:57 < reiffert> cron2: unfourtunatly I dont remember any vpnHelper factoids 02:57 -!- int [n=quassel@wikia/int] has quit [Read error: 113 (No route to host)] 02:57 < reiffert> !factoids search --values bridge 02:57 < vpnHelper> reiffert: 'bridge', 'samba', 'tap', and 'bridge-dhcp' 02:57 < reiffert> !bridge 02:57 < vpnHelper> reiffert: "bridge" is (#1) http://openvpn.net/index.php/documentation/faq.html#bridge1, or (#2) http://openvpn.net/index.php/documentation/miscellaneous/ethernet-bridging.html, or (#3) Bridging looks like a good choice to people who don't know how to set up IP routing, but to learn routing is generally far better., or (#4) useful for anything where the protocol uses MAC addresses instead of IP 02:57 < vpnHelper> reiffert: addresses. (but not samba, see !wins) 02:57 < cron2> reiffert: no, that was really "dev tap" allocating "tap1" while the bridge is connected to "tap0" 02:57 < reiffert> !tap 02:57 < vpnHelper> reiffert: "tap" is "bridge" is (#1) http://openvpn.net/index.php/documentation/faq.html#bridge1, or (#2) http://openvpn.net/index.php/documentation/miscellaneous/ethernet-bridging.html, or (#3) Bridging looks like a good choice to people who don't know how to set up IP routing, but to learn routing is generally far better., or (#4) useful for windows sharing (without wins server) and LAN gaming, 02:57 < vpnHelper> reiffert: anything where the protocol uses MAC addresses instead of IP addresses. 02:58 < reiffert> !factoids search --values tap0 02:58 < vpnHelper> reiffert: No keys matched that query. 02:58 < reiffert> simplechat_: is there vmware involved anywhere? 02:58 < cron2> oh well, the ethernet-bridging.html has "dev tap0" in there, quite explicitely so :-) 02:59 < reiffert> 08:56 < simplechat_> if it changes anything, this is a deb stable vm 03:00 < cron2> reiffert: we got it to work now :-) 03:00 < reiffert> ? 03:00 < cron2> it was really "dev tap" vs. "dev tap0". I was just wondering whether there is a FAQ available that covers this - and yes, it is (!tap has the relevant lines) 03:00 < reiffert> 09:54 < simplechat_> and now its working 03:01 < reiffert> Ah well, you can have dev tap as well and use a shell script adding the next interface to the bridge 03:02 < simplechat_> reiffert, nope 03:02 < simplechat_> xen 03:02 < simplechat_> this is amd64 debian lenny running the latest version of xen from the stable repos 03:03 < reiffert> :) anyway, time to get some work done 03:06 < simplechat_> kk 03:07 -!- master_o1_master [n=master_o@p57B55E0F.dip.t-dialin.net] has joined ##openvpn 03:18 -!- master_of_master [i=master_o@p57B547AC.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:36 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 60 (Operation timed out)] 03:46 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has joined ##openvpn 03:47 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has joined ##openvpn 04:10 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 60 (Operation timed out)] 04:22 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 04:37 -!- dazo_afk is now known as dazo 04:42 -!- ribasushi [n=rabbit@dslb-084-063-001-106.pools.arcor-ip.net] has left ##openvpn ["Leaving"] 04:52 -!- Intensity [i=[3HRxiKb@unaffiliated/intensity] has joined ##openvpn 04:56 -!- trap [n=trap@host86-168-121-116.range86-168.btcentralplus.com] has joined ##openvpn 05:08 -!- Intensity [i=[3HRxiKb@unaffiliated/intensity] has quit [Remote closed the connection] 05:20 -!- trap is now known as lalaland 05:21 -!- lalaland is now known as blabland 05:29 < reiffert> !tcp 05:29 < vpnHelper> reiffert: "tcp" is Sometimes you cannot avoid tunneling over tcp, but if you can avoid it, DO. Why TCP Over TCP Is A Bad Idea: http://sites.inka.de/~bigred/devel/tcp-tcp.html 05:29 < mithridates> !management 05:29 < vpnHelper> mithridates: Error: "management" is not a valid command. 05:29 < mithridates> reiffert: how can I use management interface? should I put management in the configuration file? 05:30 < reiffert> echo "openvpn management" | google 05:30 < reiffert> first link. 05:30 < mithridates> tnx 05:45 -!- dunc_ [n=dunc@fenchurch.ipv6.braddon.org.uk] has joined ##openvpn 05:59 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has quit [Read error: 111 (Connection refused)] 06:08 < mithridates> !manage 06:08 < vpnHelper> mithridates: Error: "manage" is not a valid command. 06:09 < mithridates> !factoids search manage 06:09 < vpnHelper> mithridates: No keys matched that query. 06:13 < reiffert> !factoids search --values management 06:13 < vpnHelper> reiffert: 'mgmt' and 'mgmt' 06:13 < reiffert> !mgmt 06:13 < vpnHelper> reiffert: "mgmt" is (#1) http://openvpn.net/index.php/documentation/miscellaneous/management-interface.html, or (#2) http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn/management/management-notes.txt 06:17 < mithridates> tnx reiffert 06:17 < mithridates> have you ever heard about ZERINA ? 06:18 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 06:19 < reiffert> no. 06:19 < mithridates> :D I found the gui interface for openvpn 06:20 < mithridates> check it http://www.openvpn.eu/index.php?id=35&L=1 06:20 < vpnHelper> Title: ZERINA for IPCop: OpenVPN e.V. (at www.openvpn.eu) 06:20 < reiffert> no. 06:20 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has joined ##openvpn 06:23 < mithridates> !factoids search --values zerina 06:23 < vpnHelper> mithridates: No keys matched that query. 06:24 < mithridates> !factoids search --values gui 06:24 < vpnHelper> mithridates: 'winpass', 'pfsense', 'activedirectory', 'webgui', and 'tunnelblick' 06:24 < vpnHelper> New forum entry openvpnforum: Wishlist :: Re: Statistics Offloading :: Reply by dazo 06:24 < mithridates> !factoids search --values web 06:24 < vpnHelper> mithridates: 'pastebin', 'pfsense', 'webgui', 'paste', and 'nopaste' 06:38 < zxd> Hi 06:38 < mithridates> hi 06:38 < zxd> what's the proper way to add custom ip route add , commands once Tun0 interface comes up? 06:39 -!- APTX| is now known as APTXderZweite 06:39 < mithridates> custom ip for different clients? 06:40 -!- APTX|_ is now known as APTX| 06:40 < mithridates> may be !ccd 06:40 < mithridates> !ccd 06:40 < vpnHelper> mithridates: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 06:40 < mithridates> then put your configuration for route in that config file 06:41 < mithridates> but wait more and ask other people 06:41 < mithridates> because I'm newbie in openvpn 06:42 < zxd> ip route add default via 10.8.0.6 dev tun0 table T1 06:42 < zxd> per example 06:43 < mithridates> I donno man , I'm sorry 06:54 -!- APTX| is now known as APTX 06:58 -!- corrideat [n=tor@CAcert/user/corrideat] has joined ##openvpn 06:59 < Bushmills> zxd: ccd and push "route..." if server side, you can also route ... client side 07:00 < zxd> Bushmills, the push " route ... is a raw command? 07:01 < Bushmills> no. accepts ip/net, netmask and gateway as args 07:01 < zxd> my command uses iproute2 07:01 < zxd> with table T1 as argument 07:02 -!- APTX is now known as APTX| 07:02 -!- APTX| is now known as APTX|_ 07:02 -!- APTX|_ is now known as APTX 07:03 < Bushmills> --iproute cmd 07:03 < Bushmills> Set alternate command to execute instead of default iproute2 command. 07:05 < Bushmills> --route-up cmd - Execute shell command cmd after routes are added 07:11 -!- mode/##openvpn [-c] by ChanServ 07:25 < mithridates> !mgmt 07:25 < vpnHelper> mithridates: "mgmt" is (#1) http://openvpn.net/index.php/documentation/miscellaneous/management-interface.html, or (#2) http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn/management/management-notes.txt 07:29 < zxd> should --tun-mtu be the same as the mtu of the physical interface to avoid fragmantation ? 07:35 < ecrist> no 07:35 < ecrist> !mtu 07:35 < vpnHelper> ecrist: "mtu" is see --mtu-test to learn how to test your MTU settings. Basically you just use --mtu-test in your normal client config 07:35 < zxd> what? 07:36 < zxd> it shows an MTU higher than 1500 07:45 < havoc> yeah, found some issues w/ openvpn on windows, specifically easy-rsa, which I guess isn't really an openvpn issue 07:46 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 07:50 -!- dunc_ [n=dunc@fenchurch.ipv6.braddon.org.uk] has quit ["Leaving"] 07:50 < ecrist> easy-rsa sucks 07:52 < havoc> anyway, they just need to quote pathnames 07:53 < ecrist> easy-rsa is developed by OpenVPN 07:53 < havoc> ah 07:55 -!- kyrix [n=ashley@mail.ic-vienna.at] has joined ##openvpn 07:59 < zxd> L:1542 07:59 < zxd> why does it say 1542 for mtu 08:00 -!- Sonderblade [n=meh@h-52-159.A157.priv.bahnhof.se] has joined ##openvpn 08:00 -!- mithridates1 [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 08:00 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has quit ["Leaving."] 08:12 -!- Schlaubi [n=daniel@p5B0A151B.dip0.t-ipconnect.de] has joined ##openvpn 08:12 -!- Schlaubi [n=daniel@p5B0A151B.dip0.t-ipconnect.de] has left ##openvpn ["Verlassend"] 08:21 -!- Sonderblade [n=meh@h-52-159.A157.priv.bahnhof.se] has quit ["Lämnar"] 08:23 -!- mattock [n=samuli@sparkgw.utu.fi] has joined ##openvpn 08:23 -!- mode/##openvpn [+o mattock] by ChanServ 08:32 -!- kenrick86 [n=john@c-65-34-160-25.hsd1.fl.comcast.net] has joined ##Openvpn 08:32 < kenrick86> !welcome 08:32 < vpnHelper> kenrick86: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 08:33 < kenrick86> hello 08:33 -!- dazo changed the topic of ##openvpn to: OpenVPNn Development Forum Tuesday, Jan 12 1900UTC on ##openvpn-discussion | OpenVPN 2.1.1 most current. | Type !welcome before asking your questions. 08:33 < kenrick86> !howto 08:33 < vpnHelper> kenrick86: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 08:34 < kenrick86> !redirect 08:34 < vpnHelper> kenrick86: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 08:34 < kenrick86> !def1 08:34 < vpnHelper> kenrick86: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 08:34 < kenrick86> !ipforward 08:34 < vpnHelper> kenrick86: "ipforward" is please choose between !linipforward !winipforward and !fbsdipforward 08:35 < kenrick86> i have an issue and i can't seem to figure this out 08:35 < kenrick86> i have a CentOS Red Hat vps to Openvpn setup 08:36 < dazo> !configs 08:36 < vpnHelper> dazo: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 08:36 < dazo> !logs 08:36 < vpnHelper> dazo: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 08:36 < dazo> !pastebin 08:36 < vpnHelper> dazo: "pastebin" is (#1) please paste anything with more than 5 lines into pastebin or a similar website, or (#2) ie: www.pastebin.ca 08:36 < dazo> !goal 08:36 < vpnHelper> dazo: "goal" is Please clearly state your goal for your vpn: example, I would like to access the lan behind the server , I would like to access the internet over my vpn , I just want a secure connection between 2 computers , etc 08:36 < kenrick86> problem is: they connect but when i'm browsing with the VPN on client end it forwards my ISP of my regular ISP instead of the VPS IP 08:37 < dazo> kenrick86: that's related to !redirect 08:37 < dazo> !redirect 08:37 < vpnHelper> dazo: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 08:38 < dazo> !linipforward 08:38 < vpnHelper> dazo: "linipforward" is echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution (til reboot) or set net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 08:38 < dazo> !linnat 08:38 < vpnHelper> dazo: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 08:38 < kenrick86> so its not an iptables issue? 08:38 < kenrick86> ok cool let me see 08:38 < kenrick86> thanks 08:39 < dazo> if your VPN client uses your local ISP address when surfing the net .... then it is clearly a local routing issue, as default gateway is not setup to use the VPN tunnel 08:40 < kenrick86> one more question I have....my IT set the VPS VPN config to send request to the 10.66.77.1 but the VPN connection on client end is 10.66.77.2 08:40 < kenrick86> i put the 10.66.77.1 in broswer settings with port and nothing loads 08:40 -!- cyberninja [n=user@CPE-58-170-30-196.lns9.cht.bigpond.net.au] has joined ##openvpn 08:41 < kenrick86> i put the 10.66.77.2 in browser like the client says when connected with port and it loads webpages 08:41 * dazo don't understand 08:41 < kenrick86> so am i supposed to be using the 10.66.77.1 or 10.66.77.2 in browser? 08:42 < dazo> you have a webserver on the VPS server you want to access over the VPN? 08:42 < kenrick86> yeah 08:42 < kenrick86> this is the setup I want that he's trying to succeed 08:43 < kenrick86> vps (IP) ---> Windows Openvpn Client---> external software on port 3128---->>browser 08:43 -!- cyberninja [n=user@CPE-58-170-30-196.lns9.cht.bigpond.net.au] has left ##openvpn [] 08:44 < dazo> without !configs ... it's difficult to see the whole picture 08:46 -!- ecrist changed the topic of ##openvpn to: Developer Forum TODAY 1900UTC in ##openvpn-discussion || OpenVPN 2.1.1 Most Current | Type !welcome before asking your questions. 08:54 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 09:00 -!- mithridates1 [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has left ##openvpn [] 09:01 < kenrick86> i have a CentOS Red Hat vps to Openvpn setup problem is: they connect but when i'm browsing with the VPN on client end it forwards my ISP of my regular ISP instead of the VPS IP here's the pastebin link to see config http://pastebin.ca/Z-8KATJf 09:03 < kenrick86> this is the setup im trying to have vps (IP) ---> Windows Openvpn Client---> external software on port 3128---->>browser 09:05 < Bushmills> tell browser to use proxy on vpn server 09:05 < kenrick86> sorry last past was bloocked here's the new link http://pastebin.ca/1748322 09:06 < kenrick86> i did the browser is using openvpn client ip with port 3128 09:06 < kenrick86> but when i use the external software with a basic anonymity ip that shows forward ip i see its forwarding my ISP ip instead of the VPS ip 09:07 < Bushmills> i suppose that software doesn't use the proxy 09:07 < kenrick86> please see my openvpn setup http://pastebin.ca/1748322 and help me forward the VPS IP to Openvpn 09:07 < Bushmills> your problem is not an openvpn problem. it is a matter of setting your client routing right., 09:08 < kenrick86> oh 09:08 < kenrick86> i pasted my client config in that link also 09:09 < kenrick86> in the client config part under add route what do you suggest I put 09:11 < Bushmills> route the destination host or net which you want to go over vpn so that it uses vpn server as gateway. 09:12 < Bushmills> or that it simply gets there. in case of proxy, vpn server isn't gateway. just destination. 09:13 < kenrick86> so if I uncomment that line in Addroute 09:13 < kenrick86> it should work? 09:13 < Bushmills> configure your client so that the programs you want to use vpn such that they access one of the vpn-routed ip addresses as destination. 09:15 < kenrick86> im a newbie 09:15 < kenrick86> can you please be a bit more specific 09:15 < kenrick86> like what would i have to add to my client config exactly...example please 09:16 < kenrick86> my IT isn't online right now either for him to help me either 09:16 < Bushmills> set your quote external software with a basic anonymity ip unquote to use your proxy on vpn server 09:16 < Bushmills> difficult to get more specific if you lack such 09:18 < Bushmills> if you run a tor proxy on server, set browser proxy to server:torproxyport. if you run squid on server, set browser proxy to server:squidport 09:19 < kenrick86> i have apache 09:19 < Bushmills> on port 3128? 09:20 < kenrick86> the VPS ip is on port 8080 09:23 < kenrick86> ok i set browser on the server ip:port 09:25 < kenrick86> the external software on windows in preferences in network there's only internal where I can put the port for internal proxy settings 09:37 -!- mattock [n=samuli@sparkgw.utu.fi] has quit ["Leaving."] 09:57 < mintaka> i need to get this openvpn POS to connect as unpriviledged user 09:58 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 09:58 -!- mode/##openvpn [+v Kasx] by ChanServ 10:02 < mintaka> is there a guide or something 10:03 < mintaka> !manual 10:03 < vpnHelper> mintaka: Error: "manual" is not a valid command. 10:03 < mintaka> !guide 10:03 < vpnHelper> mintaka: Error: "guide" is not a valid command. 10:05 < dazo> !man 10:05 < vpnHelper> dazo: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 10:06 < dazo> mintaka: ^^ 10:06 < mintaka> is there something else 10:06 < mintaka> i tried that 10:07 < mintaka> i still didnt get it to work 10:07 < mintaka> i think it may be ubunts fault 10:07 < dazo> !ubuntu 10:07 < vpnHelper> dazo: "ubuntu" is dont use network manager! 10:07 < dazo> mintaka: which version are you running of openvpn? 10:08 < mintaka> 2.1 10:09 < mintaka> i tried running the openvpn.net guide for 2.0 regarding the unpriv setup 10:09 < mintaka> it didnt work but ill have to try it again 10:09 < dazo> mintaka: which 2.1 version? 10:09 < mintaka> 2.1 rc19 10:10 -!- kenrick1986 [n=john@c-65-34-160-25.hsd1.fl.comcast.net] has joined ##Openvpn 10:11 < dazo> oki ... rc19 is good enough 10:12 -!- Guest4252 [n=vamsi@121.245.60.203] has joined ##openvpn 10:14 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 110 (Connection timed out)] 10:22 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 10:23 -!- LobbyZ [n=default@main.lobbyzffs.com] has quit ["Free FTW"] 10:27 -!- kenrick86 [n=john@c-65-34-160-25.hsd1.fl.comcast.net] has quit [Read error: 113 (No route to host)] 10:30 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 10:32 -!- kenrick1986 [n=john@c-65-34-160-25.hsd1.fl.comcast.net] has quit [Read error: 113 (No route to host)] 10:33 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 60 (Operation timed out)] 10:37 < flo|va-nu-pied> hi all 10:41 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has joined ##openvpn 10:42 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 10:44 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 10:44 -!- mode/##openvpn [+o mattock] by ChanServ 10:45 -!- Guest4252 [n=vamsi@121.245.60.203] has quit ["Leaving"] 11:02 -!- simplechat_ [n=simple@unaffiliated/simplechat] has quit [Read error: 54 (Connection reset by peer)] 11:02 -!- LobbyZ [n=default@main.lobbyzffs.com] has joined ##openvpn 11:07 -!- Diffen [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 11:14 < Diffen> Evning. hmm have i missed out one something regarding the route? i just want to route 130.239.8.25 and nothing else. when i connect to openvpn everyting works fine except the 130.239.8.25 route. http://pastebin.com/d10c4acf2 11:25 < flo|va-nu-pied> you want this route to be knowned by your VPN clients ? 11:25 < flo|va-nu-pied> don't you need to use ccd directory and iroute directive ? (not sure about it) 11:26 < Diffen> yes i want the route to known by all clients 11:26 < flo|va-nu-pied> do you have anything regarding this directive in your logs ? 11:27 < flo|va-nu-pied> to check the action is correctly done on the clients side or not 11:27 < Diffen> i think its known, got this: 130.239.8.25 192.168.98.5 UGS 0 2 1500 tun0 11:27 < Diffen> let me check the logs 11:29 < flo|va-nu-pied> this given route has been found on the client side ? 11:29 < Diffen> yes 11:29 < Diffen> http://pastebin.com/d735e42b6 from the server log 11:30 < flo|va-nu-pied> does 192.168.98.1 know the route to reach host ? 130.239.8.25 11:31 < Diffen> yes 11:31 < flo|va-nu-pied> I mean from the client when you try to ping ip 130.239.8.25 what does it answer ? 11:31 < blabland> anybody know of some wlel known trustworthy vpn providers ? 11:32 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 11:32 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 11:32 < Diffen> flo ahh ok the server reaches the ip when i do a trace. the client does not 11:33 < flo|va-nu-pied> is ip_forwarding enabled on the server ? 11:34 < Diffen> i guess so. if i use #push "redirect-gateway def1" everything works fine 11:34 < Diffen> all traffic uses the openvpnserver from the client 11:34 < Diffen> but not if i remove it 11:35 < flo|va-nu-pied> so leave it on :) 11:35 < Diffen> hehe cant :) i dont want to route all traffic through the vpn tunnel :( 11:36 < flo|va-nu-pied> and you didn't answered about the output of ping from client side ? 11:36 < Diffen> sorry no the client cant ping the ip 11:36 < Diffen> and if i do a trace it get stucked at the vpnserver 11:37 < flo|va-nu-pied> ok so the config is ok IMO 11:37 < Diffen> yes 11:37 < flo|va-nu-pied> any firewall rule on the server ? 11:37 < Diffen> nope no firewall on the server 11:37 < Diffen> the server is a single-nic directly connect to internet 11:38 < flo|va-nu-pied> hum ... 11:38 < flo|va-nu-pied> no idea anymore for the moment :) 11:38 < flo|va-nu-pied> sorry :) 11:39 < Diffen> its ok. thanks for you time anyway :D 11:39 < flo|va-nu-pied> ;) 11:41 -!- Intensity [i=[4twWOV+@unaffiliated/intensity] has joined ##openvpn 11:56 -!- Kaspx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 11:56 -!- mode/##openvpn [+v Kaspx] by ChanServ 11:59 -!- notneb_ [n=email@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 11:59 -!- mode/##openvpn [+v notneb_] by ChanServ 12:01 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has joined ##openvpn 12:04 -!- openvpn2009 [n=email@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 60 (Operation timed out)] 12:06 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 12:15 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 110 (Connection timed out)] 12:23 -!- xamox [n=xamox@68-28-137-226.pools.spcsdns.net] has joined ##openvpn 12:23 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 12:23 < xamox> Quick question and probably stupid but can I use openVPN as a socks proxy like I can with SSH? 12:25 < rob0> uh, no ... what openvpn gives you is a tunneled IP address. What you can do with that IP address is limited only by bandwidth and your imagination. 12:27 < Bushmills> xamox: you can securely connect to a remote socks proxy with openvpn 12:31 < xamox> rob0, so for instance when I setup my VPN and connect to it. How would I tell firefox to route my internet traffic through it? Or is this not possible? Say I am on my work machine and they lock down a lot of sites. As of now I can use SSH and proxy on my local machine via a tunnel, is there something similar for openVPN? Excuse my ignorance as I have never used openVPN before but looking to set it up and seeing if it can replace SSH for 12:31 < xamox> this type of functionality. 12:36 < Bushmills> xamox: possible. as you discovered: by routing. 12:36 -!- Diffen [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Read error: 60 (Operation timed out)] 12:36 < Bushmills> alternatively, run a proxy on vpn server, and configure web browser to use that proxy 12:36 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 60 (Operation timed out)] 12:37 < xamox> Bushmills, alrighty, thanks. I just didn't know if it could support it out of the box. 12:37 < Bushmills> for client sites with locked down services, you can easily route your whole traffic through openvpn 12:37 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 60 (Operation timed out)] 12:38 < crazygir> when a tun interface has inet 10.0.65.1 --> 10.0.65.2, which is the address available to clients? 12:38 < Bushmills> local is 10.0.65.1. peer address is .2 . peer address is only relevant to the openvpn machine 12:38 -!- Diffen [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 12:39 * crazygir nods 12:39 * Bushmills nods back 12:39 < crazygir> going thru my setup again, still having problems with the OS routes on the vpn server 12:40 < rob0> Okay, I should revise that. Limited by bandwidth, imagination, and what you know how to do. :) 12:40 < crazygir> !welcome 12:40 < vpnHelper> crazygir: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 12:41 < Bushmills> rob, also limited by conceptial bounds of what one can do with a tunnel 12:42 < Bushmills> you can't get an IP address to make your laundry, for example. 12:42 < Bushmills> even if imagination and bandwidth would allow that 12:43 < ecrist> crazygir: did you correct the route on the server? 12:43 < crazygir> that's what I'm working to sort out 12:44 < crazygir> I got a bit turned around last night and had to start fresh 12:44 < crazygir> so that's where I'm at 12:44 < rob0> Bushmills, as a matter of fact I am at work on a RFC draft for laundry over IP. 12:45 < rob0> (It has a ways to go, I doubt I'll finish in time for 2010-04-01.) 12:45 < Bushmills> still needs some sort of device, handling your laundry. an IP address alone won't do. 12:47 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 12:48 < ecrist> crazygir: if you read and follow !route, you would have been done. 12:48 < crazygir> I have read and followed route 12:48 < crazygir> the issue isn't openvpn 12:49 < crazygir> it's me and the OS playing nice ;) 12:49 < rob0> You'd be surprised what can be done by hanging dirty clothes on an active Ethernet wire. Preliminary studies suggest that IPv6 packets are more effective at removing stains, whereas IPv4 is better for general cleaning. 12:49 < hyper_ch> rob0: lol 12:50 < Bushmills> sensitive fabric and wool should be limited to 100 mbit lines. 12:51 < rob0> Yes, and silk on 10. 12:52 < Bushmills> for space limited environments, you can hang them on wifi links 12:55 < rob0> Beware, WEP leaves an oily residue. You need strong crypto like openvpn to get that out. 12:56 -!- Schlaubi [n=daniel@p5B0A151B.dip0.t-ipconnect.de] has joined ##openvpn 12:56 -!- Schlaubi [n=daniel@p5B0A151B.dip0.t-ipconnect.de] has left ##openvpn ["Verlassend"] 13:00 < ecrist> or WPA2 13:00 < havoc> bah 13:00 < havoc> getting TLS errors :( 13:03 < havoc> "Certificate does not have key usage extension" 13:03 < havoc> bah 13:04 < ecrist> are you asking for help? 13:04 < havoc> not yet..., still googling 13:04 -!- kyrix [n=ashley@mail.ic-vienna.at] has quit ["Leaving"] 13:11 < havoc> ok, *now* I'm asking for help ;) 13:13 < havoc> getting logs.... 13:13 < havoc> log: http://pastebin.com/d23db46d2 13:15 < rob0> Looks like something was wrong in the way that the cert was generated, openssl problem. 13:15 < havoc> yeah, my guess too 13:16 < havoc> indentical setup and configs to many other working installations, but this is the first one on win2k8 13:17 < rob0> Unfortunately I don't know enough about openssl to offer a useful suggestion. 13:18 < havoc> and firewall is completely disabled 13:18 < havoc> I know that can cause TLS issues 13:18 < rob0> you got through the firewall, the cert itself was rejected 13:18 < havoc> rob0: ecrist probably knows right off the top of his head, I'm just being patient until he returns 13:18 < crazygir> Bushmills / rob0 you folks rock 13:19 < crazygir> we've been talking about an IT standup routine 13:19 < crazygir> that's possible content right there 13:19 -!- ecrist changed the topic of ##openvpn to: Developer Forum in ##openvpn-discussion going on NOW || OpenVPN 2.1.1 Most Current || type !welcome before asking your questions. 13:20 < ecrist> havoc: I need your configs, 13:21 < havoc> ecrist: http://pastebin.com/d175b20b4 13:24 < ecrist> how did you build your certificates? 13:24 < havoc> with easy-rsa, according to HOWTO 13:25 < havoc> and "openvpn --genkey --secret ta.key" 13:25 < havoc> build-ca, build-key-server, build-dh, build-key 13:26 < ecrist> the log you gave me, from server or client? 13:27 < havoc> client 13:27 < havoc> lemme get server side 13:28 -!- Olrick [n=Olrick@unaffiliated/olrick] has joined ##openvpn 13:28 < havoc> ecrist: http://pastebin.com/d1e419c5b 13:30 < havoc> oh geez 13:30 < havoc> might be client side fw 13:31 < ecrist> your config looks overly complex, but otherwise valid 13:31 < havoc> I never rebooted after installing ovpn on this client 13:31 < havoc> so no fw settings available, which on winxp usually means no access 13:32 < havoc> bbiab, rebooting 13:37 < rob0> But if there was a non-default openssl.cnf being used by easy-rsa, it could change the settings ... 13:38 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 13:42 < havoc> back 13:44 < havoc> bah, no go :( 13:46 -!- flo|va-n1-pied [n=florent@85.69.202.243] has joined ##openvpn 13:47 < havoc> rob0: yeah, it's possible 13:47 < havoc> "Certificate does not have key usage extension" 13:47 < havoc> that's what's confusing me 13:48 < rob0> I would spend some time in openssl documentation looking for "key usage extension". 13:50 < havoc> http://openvpn.net/archive/openvpn-devel/2006-11/msg00024.html 13:50 < vpnHelper> Title: [Openvpn-devel] bug in easy-rsa in windows (at openvpn.net) 13:50 < havoc> already found many flaws in the win32 easy-rsa, just unquoted pathnames madae everything fail 13:52 < havoc> and: http://osdir.com/ml/java.ejbca.devel/2005-11/msg00017.html 13:52 < vpnHelper> Title: Re: nsCertType=server - msg#00017 - java.ejbca.devel (at osdir.com) 13:55 < havoc> now we wait a while for build-dh :| 13:56 -!- polaru [n=polaru@93.113.192.70] has quit [Remote closed the connection] 14:03 -!- flo|va-nu-pied [n=florent@unaffiliated/flovanupied/x-758957] has quit [Read error: 110 (Connection timed out)] 14:08 < havoc> w00t! 14:08 < havoc> yeah, was that ssl key usage thing 14:14 -!- notneb_ is now known as openvpn_2009 14:14 -!- openvpn_2009 is now known as openvpn2009 14:14 -!- mode/##openvpn [+o openvpn2009] by ChanServ 14:16 -!- Irssi: ##openvpn: Total of 101 nicks [2 ops, 0 halfops, 1 voices, 98 normal] 14:24 < rob0> got it working? 14:24 -!- xamox [n=xamox@68-28-137-226.pools.spcsdns.net] has quit [Remote closed the connection] 14:24 < havoc> yup 14:25 -!- Olrick [n=Olrick@unaffiliated/olrick] has left ##openvpn [] 14:25 < vpnHelper> New forum entry openvpnforum: Wishlist :: Re: bind to multiple ports :: Reply by cron2 || Wishlist :: Configs From Server :: Author ecrist 14:34 < crazygir> what docs/pages would you folks suggest reading for certificate revocation? 14:36 < ecrist> !crl 14:36 < vpnHelper> ecrist: "crl" is (#1) --crl-verify A CRL (certificate revocation list) is used when a particular key is compromised but when the overall PKI is still intact. The only time when it would be necessary to rebuild the entire PKI from scratch would be if the root certificate key itself was compromised., or (#2) you can make use of CRL by using the revoke-full script in easy-rsa (packaged with 14:36 < vpnHelper> ecrist: openvpn) that will create the CRL file for you. ssl-admin will also build a crl for you 14:38 < crazygir> thanks! 14:38 < crazygir> ecrist: I got my route issue resolved, it was partly routes and partly nat 14:39 < crazygir> :) 14:39 < ecrist> glad to hear it! 14:42 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has quit [] 14:49 -!- dazo is now known as dazo_afk 14:52 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit ["Leaving."] 15:09 < crazygir> me too :) 15:09 < crazygir> so begins the openvpn journey.. :P 15:18 * havoc continues to fight w/ win2k8 :( 15:19 < havoc> cannot for the life of me get ovpn to give out a default gateway along w/ and IP 15:19 < havoc> s/and/sn/ 15:19 < havoc> I've tried --server, --ifconfig, --route-gateway, --route (w/ all args) 15:20 < havoc> gets IP, and can ping the vpn server, but no gatewat 15:20 * havoc googles 15:24 * havoc reads about --ip-win32 15:31 -!- ribasushi [n=rabbit@dslb-084-063-001-106.pools.arcor-ip.net] has joined ##openvpn 15:33 < crazygir> save your money and drop 2k8? 15:34 < havoc> *I* do, it's for work 15:34 < havoc> all my stuff is debian 15:34 < havoc> although if I had my choice I wouldn't have anything to do with computers 15:35 -!- Martexx [n=Martexx@90.145.45.11] has joined ##openvpn 15:39 < Martexx> Hi there, i was here a week ago asking for some advice about routing, anybody here who may be able to help me? I want a setup where a client pc has a openvpn client and a desktop ip phone in the same lan will register thru the pc. I thought i would add a static route in my home router to my pc and enable ipforwarding on the pc 15:39 < Martexx> any problems ahead? 15:40 < Martexx> Need some help on the static route as well 15:40 < havoc> Martexx: so you haven't tried anything yet? 15:41 < Martexx> pc is 192.168.10/255.255.255.255 ip phone is 192.168.1.11, router is 192.168.1.1 and openvpn is 10.8.0.1/255.255.255.252 15:41 < Martexx> i did but lost the remote connection and thus the chat history and acces to my network, i was working remote 15:42 < Martexx> Im home now with a beer in my hand and a cig (ouch) in my mouth 15:43 < Martexx> ( for listeners...) havoc explained me before but i could not try it succesfully 15:43 -!- HackOrDie [n=HackOrDi@41.249.62.68] has joined ##openvpn 15:44 < Martexx> But is it that simple? 15:45 < Martexx> i add a route to 10.8.0.0/255.255.255.252 gateway 192.168.1.10 in my router and ipforwarding turned on on the pc 15:45 < Martexx> should i not add a route on the pc? 15:45 -!- kenrick86 [n=john@c-65-34-160-25.hsd1.fl.comcast.net] has joined ##OpenVPN 15:45 < Martexx> and do i need te restart for ipforwarding on windows 7 wil wordk? 15:47 < Martexx> :S 15:47 < kenrick86> has anyone ever heard of Proxyswitcher? 15:48 < Martexx> Is thids not a webservice wich lets you connect to a remote server and wich switches you on a time basis to a different proxy? 15:48 < kenrick86> i have that software on my windows set up and i'm trying to get my VPS to connect to it but proxyswitcher in network options has only internal server port 15:49 < HackOrDie> proxyswitcher i've use it for a long time 15:49 < kenrick86> so how would i get my vps ip and port to talk to proxyswitcher on its internal port 3128 15:49 < Martexx> But why use a vpn over a proxy? Is your vpn endpoint not anom anough? 15:50 < kenrick86> well heres what i'm trying to accomplish 15:50 < HackOrDie> u click on file and u click on apport from text file and in this file u made ur own 15:50 < crazygir> here's a fun one.. how do I get dns (for a remote-vpn subnet) over the vpn to a client? (specifically for windows) 15:50 < crazygir> !windows 15:51 < vpnHelper> crazygir: Error: "windows" is not a valid command. 15:51 < crazygir> arg 15:51 < crazygir> !win 15:51 < HackOrDie> evenif he's his own proxy he can use it for encrypting his data 15:51 < vpnHelper> crazygir: Error: "win" is not a valid command. 15:51 < kenrick86> I have a VPS (red hat centos)--->>to vpn---->>proxyswitcher---->browser 15:51 < HackOrDie> agaisnt man in the midlle attack 15:51 < Martexx> man in the middle on a vpn? 15:51 < HackOrDie> if he use vpn is encrypted but if not 15:51 < Martexx> I use a vps as openvpn server, there is no man in the middle 15:52 < HackOrDie> ya if u use vpn then u are protected 15:52 < HackOrDie> i mean if u don't use vpn 15:52 < crazygir> no mitm hah 15:52 < crazygir> ssl can be broken ;) 15:53 < HackOrDie> vps in ur own server or in special companie of storga 15:53 < kenrick86> the thing is i want my ip for my VPS to route to proxy switcher so i can use the ips in proxy switcher over the IP from VPS 15:53 < kenrick86> hope that wasn't confusing ;-) 15:53 < Martexx> For me it was :) 15:53 < HackOrDie> essl can be broken of course 15:53 < HackOrDie> ssl* 15:53 < Martexx> so you want client>openvpn>proxy? 15:54 < kenrick86> vps>vpn>proxyswitcher>browser 15:54 < Martexx> yes offcourse it can, and the risk is how big? haha if you have info wich is worthy of hacking you would not be here :) 15:54 < kenrick86> i accomplished the vps>vpn part 15:54 < crazygir> do you have to include dns in your server push to clients? 15:54 < Martexx> Im sorry i dont get the wanted picture 15:55 < kenrick86> lol sorry let me break what i have done here 15:55 < kenrick86> my browser is on my vpn server ip on port 8080 15:55 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has quit ["ChatZilla 0.9.86 [Firefox 3.0.17/2009122116]"] 15:55 < kenrick86> that vpn server ip (my vps IP) 15:56 < kenrick86> now that speaks to the client which is on windows 15:56 < kenrick86> before the vpn server ip talks to client, I want proxy switcher to intercept and use an ip from proxyswitcher 15:56 < Martexx> your browser connect to vps on 8080? 15:56 < kenrick86> then send to client vpn 15:56 < kenrick86> yeah 15:56 < Martexx> or is your browser on your vps 15:57 < kenrick86> my browser is on windows 15:57 < kenrick86> network settings is vpn server (my vps IP) port 8080 15:57 < Martexx> so your problem is that you want your vps to use the proxyswitcher? 15:57 < kenrick86> exactly 15:58 < Martexx> aha :) 15:58 < kenrick86> :-) 15:58 < kenrick86> now in the proxyswitcher network settings it only has internal proxy port...I can't put the VPS IP & Port for it to communicate 15:58 < Martexx> you did check with the service provider? 15:59 < Martexx> is there a linux client for this software? 15:59 < kenrick86> no only windows 15:59 < kenrick86> i thought about that too if there was a linux version :-) 15:59 < kenrick86> so in order to get linux to talk to windows i used the vpn server to client 15:59 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has quit ["Leaving"] 15:59 < kenrick86> so the proxyswitcher is on the computer which is the client 16:00 < kenrick86> so now i'm wondering if there's a way to intercept client vpn>proxyswitcher>browser 16:00 < Martexx> yes but this does not tell your vps to route all trafic to proxyblabla and tell proxyblabla to accept your connection 16:00 < Martexx> I have no insight on their software, but i guesss no 16:01 < Martexx> most provider like these use the client software to generate connection and so 16:01 < kenrick86> so the best bet is to find a software to put on linux that works like proxyswitcher? 16:01 < Martexx> you have everything right but you need a way to tell your vps to use proxyblabla for external traffic. 16:02 < kenrick86> exactly 16:02 < Martexx> I guess so, there are some openvpn proxy providers! So u could use one of those 16:02 < crazygir> http://support.microsoft.com/kb/311218 <-- am I understanding this correctly.. the caveat exists (no DNS across the VPN) when the VPN gateway is the default route? 16:02 < vpnHelper> Title: Cannot Change the Binding Order for Remote Access Connections (at support.microsoft.com) 16:03 < Martexx> Then you would use something wich is opensource and understand a bit better and you would not need a vps :( 16:03 < Martexx> :) 16:03 < Martexx> ? 16:03 < kenrick86> well i want a connection like VPS to proxy switch program to VPN to browser 16:03 < kenrick86> anonymity is excellent with that ;-) 16:04 < Martexx> well ok,, if that is your choice, talk to the creators of proxyblabla :) All openvpn stuff is ok as i see it. I dont believe that you need a solution like this to be anom, but hey.. i dont have big bucks secrets 16:05 < kenrick86> ? real quick your saying if I do vps to openvpn I should be ok? 16:05 < kenrick86> with anonymity 16:05 < crazygir> do you need separate push statements for routes, DNS, WINS, etc? 16:06 < Martexx> You couls however go a different route: proxy> openvpn proxy >other proxy> vps> other openvpn> proxy 16:06 < Martexx> Thats safer 16:06 < Martexx> crazygirl: yes you do, as it is not automated you need to manualy provide the info 16:06 < kenrick86> ahh but i do marketing 16:06 < Martexx> all the info you want the network to have needs to be pushed 16:07 < kenrick86> i have leads and these networks want to see numerous ips for these leads 16:07 < kenrick86> so thats why i wanted something like proxy switcher 16:07 < Martexx> Its always a criminal who needs this kind of stuff :))) 16:07 < kenrick86> in the config of my setup 16:07 < kenrick86> not a crime 16:07 < kenrick86> not at all 16:07 < Martexx> Yes its in the manual at openvpn 16:07 < crazygir> Martexx: there's no l :) so if the vpn is not the default gateway, theoretically all is well 16:08 < Martexx> Yes and no, i depends of what you want to achive 16:08 < kenrick86> technically instead of getting edu leads to my site i actually have employees getting the leads 16:08 < crazygir> Martexx: I just want my CEO to be happy and not call me :) 16:08 < kenrick86> so to submit all these leads i need them to look like those people did on their own 16:08 < Martexx> if you want to connect to this vpn and you provide all the info there should be no problem 16:08 < crazygir> when he's in poland or somewhere inaccessible :P 16:09 < Martexx> You dont need to explain :) I dont care actualy :)) As lonf as you make money and live im well 16:09 < kenrick86> lol cool 16:09 < crazygir> Martexx: thanks! 16:09 < kenrick86> so i guess i'll find a program like proxy switcher for linux 16:09 < kenrick86> thanks Martexx 16:09 < Martexx> Crazy: Just give it a try 16:09 < Martexx> I did not do anything 16:10 < crazygir> I have.. but can only 1/2 test atm, as I'm in the network I'm VPN'ing to 16:10 < Martexx> Too bad my problem still exist :( 16:10 < kenrick86> for your comments on helping me out 16:10 < Martexx> use a proxy like kendrick :)) 16:10 < kenrick86> kenrick* 16:10 < kenrick86> no d 16:10 < kenrick86> lol 16:10 < Martexx> yes thats what i meant, well if you find a client like that you are all set to go! 16:11 < crazygir> what's your problem Martexx 16:11 < Martexx> Now.. i have a question for a very smart routing guru, anyone? 16:12 < Martexx> I need to route traffic from a desktop ip phone in the internal lan to a pc in this lan wich has a openvpn client and it needs to work :) 16:13 < Martexx> I did turn on ipforwarding on the pc, added a route on my network router to the pc and am waiting for it to magicly go working 16:13 < crazygir> heh 16:13 < Martexx> but it takes lomng 16:13 < Martexx> long 16:13 < crazygir> filtering involved? 16:13 < Martexx> no its all internal 16:13 < Martexx> and the vpn is ok 16:13 < Martexx> as in working 16:13 -!- HackOrDie [n=HackOrDi@41.249.62.68] has quit [Read error: 110 (Connection timed out)] 16:14 < Martexx> so i told my router that: traffic for 10.8.0.0/255.255.255.252 has to go to gateway 192.168.1.10 16:17 < Martexx> aha well thank you for your thoughts anyway :) Im giving up, thanks so far all!! Im off to bed as it is late here 16:17 -!- Martexx [n=Martexx@90.145.45.11] has quit [Read error: 54 (Connection reset by peer)] 16:18 -!- Martexx [n=Martexx@90.145.45.11] has joined ##openvpn 16:19 -!- Martexx [n=Martexx@90.145.45.11] has quit [Client Quit] 16:25 -!- hyper_ch is now known as aavci 16:25 -!- aavci is now known as hyper_ch 16:29 -!- diffen2 [n=diffen2@c-6075e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 16:38 -!- Diffen [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Read error: 110 (Connection timed out)] 16:42 < kenrick86> does anyone know of a program thats like proxyswitcher but for Linux? 16:42 < kenrick86> i'm looking for one but its hard to find 16:42 < kenrick86> my linux is on a VPS by the way 16:43 < havoc> yeah, I wish I knew why my clients weren't getting a default gateway :( 16:57 < Bushmills> havoc, if there wasn't one to start with, redirect-gateway without def1 might not set a new one. 17:00 < kenrick86> hey bushmills 17:00 < Bushmills> kenrick86: foxyproxy for firefox 17:01 < havoc> Bushmills: I haven't been able to set one at all 17:01 < kenrick86> is that a windows or linux? 17:02 < Bushmills> either 17:02 < havoc> windows server 17:02 < kenrick86> so i can put that on my vps? 17:02 < Bushmills> you can run it as add-on in your firefox 17:02 < kenrick86> oh cool 17:02 < kenrick86> thank you sir 17:02 < havoc> Bushmills: it's win2k8r2 17:03 < Bushmills> https://addons.mozilla.org/en-US/firefox/addon/2464 17:03 < havoc> not sure that showing you a config would help any as I've tried a couple dozen different things, all allow for a connection, but still no gateway :( 17:03 < vpnHelper> Title: FoxyProxy Standard :: Add-ons for Firefox (at addons.mozilla.org) 17:04 < Bushmills> havoc: my windows exposure approaches zero 17:04 < havoc> Bushmills: consider yourself lucky :( 17:05 < Bushmills> on the contrary 17:06 < Bushmills> meaning, i consider myself not special in that respect, but i note that there are a few unlucky souls struggling with those systems 17:06 < Bushmills> i didn't understand though why they do 17:07 < havoc> I've been running into many issues :( 17:07 < Bushmills> I hear that frequently 17:08 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: berniv6, |Mike|, ScriptFanix, zykes-, dunc, master_o1_master, aep, Typone, xod, le0, (+13 more, use /NETSPLIT to show all of them) 17:10 -!- Netsplit over, joins: cron2, dunc, blabland, master_o1_master, xod, steelnwool, aep, le0, Zordrak, MrJK (+1 more) 17:10 -!- Netsplit over, joins: berniv6, corrideat, freaky[t], tjz, Matir, balboah, ScriptFanix, |Mike|, zykes-, Typone (+1 more) 17:29 < havoc> so, schannel.dll is what's causing the problems here 17:29 < havoc> I just don't know why 17:29 < havoc> I can connect to vpn fine, no gateway, but still connected and ping works, but cannot RDP 17:34 -!- kenrick86 [n=john@c-65-34-160-25.hsd1.fl.comcast.net] has joined ##Openvpn 17:36 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has quit ["Leaving."] 17:36 < kenrick86> Bushmills thanks it works but one thing how do I get Proxyswitcher to speak with the browser (which has the FoxyProxy Add on) 17:38 < Bushmills> "to speak"? 17:38 < kenrick86> yeah 17:38 < Bushmills> put it on status bar, that way you can switch proxies easily 17:39 < kenrick86> wait what you mean in the status bar 17:39 < Bushmills> but that is, you "speaking" to proxy switcher, not procy switcher to browser 17:39 < kenrick86> foxy proxy is added to my firefox 17:40 < kenrick86> foxy proxy is i set to my server IP which is the Server VPN IP 17:40 < kenrick86> so the server vpn ip = vps server ip 17:41 < kenrick86> i want foxy proxy to go to proxy switcher (which has many ips) then go to browser 17:41 < Bushmills> so if proxy runs on vpn server, you can switch to it, to have web traffic go across vpn. switching proxy off lets web traffic use default route 17:41 < havoc> I don't think openvpn is compatible w/ win2k8r2 :( 17:42 < Bushmills> or is it that win2k8r2 isn't compatible with openvpn? 17:42 < havoc> that too, either way they still don't work together :( 17:43 < Bushmills> good opportunity to get rid of win2k8 17:43 < havoc> I wish 17:43 < Bushmills> did it help? 17:44 < havoc> did what help? 17:44 < kenrick86> no 17:44 < Bushmills> wishing 17:44 < havoc> no :( 17:45 < kenrick86> the reason i want proxyswitcher to intercept between foxyproxy & browser 17:45 < Bushmills> i'd give installing another OS better chances than wishing. 17:45 < Bushmills> foxyproxy *is* a proxy switcher 17:45 < kenrick86> my vpn 10.66.77.1 >>>Proxyswitcher>>>Browser 17:45 < Bushmills> limited to firefox, though 17:45 < kenrick86> but it doesn't have a rotate mode 17:46 < kenrick86> for list of ips 17:46 < Bushmills> no. you select proxy either manually, or by request pattern 17:46 < Bushmills> like "for this type of files, use that proxy" 17:47 < kenrick86> thats not what i want 17:48 < kenrick86> I have my VPS IP and i need that to work with proxyswitcher 17:48 < kenrick86> so when an IP is being used in proxyswitcher its over my vps IP and then I need the IP from proxyswitcher to be sent to my browser 17:48 < kenrick86> so VPS>Proxyswitcher>Browser 17:49 < kenrick86> but Proxyswitcher doesn't have an external port part where i can put VPS IP:Port 17:49 < kenrick86> only an internal port for whichever pc computer its on 17:56 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Read error: 113 (No route to host)] 17:57 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 18:02 -!- balboah [n=johnny@joonix.se] has quit [Read error: 104 (Connection reset by peer)] 18:03 -!- balboah [n=johnny@joonix.se] has joined ##openvpn 18:29 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 60 (Operation timed out)] 18:32 < havoc> ok, win2k8r2 doesn't even work as an openvpn client (entirely) 18:34 < havoc> so I guess openvpn still has a ways to go :( 18:40 < rob0> Or perhaps, Microsoft does? 18:40 < havoc> no, it's *because* of microsoft 18:40 < havoc> if they didn't want to support M$ there'd be a lot less reason to work as hard 18:41 < havoc> and openvpn *is* awesome 18:41 -!- cybertron [n=cybertro@84.200.248.176] has quit [Read error: 104 (Connection reset by peer)] 18:41 -!- cybertron [n=cybertro@84.200.248.176] has joined ##openvpn 18:43 < rob0> So you found confirmation of this issue somewhere? I've heard of lots of people using lots of Windows versions with openvpn. Fortunately I am not one of them. :) 18:44 < havoc> this is win2k8r2 18:45 < havoc> so still relatively new 18:45 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 18:45 < havoc> but I can't get it working as a client either 18:45 < havoc> and the FW is as disabled as can be 18:45 < havoc> schannel.dll is throwing the errors 18:45 < havoc> vpn is connected fine 18:45 < havoc> so I'm guessing the tap adapter is where it'd have to be fixed, if even possible 18:45 -!- dunc_ [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 18:46 < havoc> otherwise wait for a fix from M$ 18:46 < havoc> and the win2k8 FW no longer accepts per iface rules 18:47 < havoc> very lame 18:49 -!- kenrick86 [n=john@c-65-34-160-25.hsd1.fl.comcast.net] has quit [Read error: 60 (Operation timed out)] 18:54 -!- Kitty- [n=nunyuh@hpavc/Kitty] has joined ##openvpn 18:54 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 18:55 -!- dunc_ [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Remote closed the connection] 18:57 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 18:57 -!- dunc_ [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 19:01 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Read error: 111 (Connection refused)] 19:02 -!- openvpn2009 [n=email@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit ["ircN 8.00 for mIRC (20080809) - www.ircN.org"] 19:05 -!- kenrick86 [n=john@c-65-34-160-25.hsd1.fl.comcast.net] has joined ##Openvpn 19:14 -!- dunc_ [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Remote closed the connection] 19:17 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 19:20 -!- corrideat [n=tor@CAcert/user/corrideat] has quit [K-lined] 19:29 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 19:31 -!- cybertron [n=cybertro@84.200.248.176] has quit [Read error: 60 (Operation timed out)] 19:32 -!- dunc_ [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 19:33 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Read error: 104 (Connection reset by peer)] 19:39 -!- cybertron [n=cybertro@84.200.248.176] has joined ##openvpn 19:46 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 20:00 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 20:00 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has joined ##openvpn 20:01 < NickWebHA> !welcome 20:01 < vpnHelper> NickWebHA: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 20:02 < NickWebHA> !route 20:02 < vpnHelper> NickWebHA: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 20:04 -!- Lyndon [n=late@62.142.98.18] has quit [Read error: 104 (Connection reset by peer)] 20:04 -!- Lyndon [n=late@savolaiset.fi] has joined ##openvpn 20:12 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 20:16 < NickWebHA> I am running an OpenVPN server (v2.1.1) on a Windows XP machine. After a day-- on and off-- of screwing with it I can not figure out what I am doing wrong regarding bridging. I have the TAP-Win32 adapter and physical adapter bridged with the local IP on the server side set. When I connect I get assigned an IP via the OpenVPN server (like I should) but I can not reach the rest of the network. 20:17 < NickWebHA> The local network is 10.0.0.0/25 while the OpenVPN pool is 10.0.0.128/25. 20:18 < NickWebHA> Please excuse me if I am leaving important information out or am not explaining myself very well; I think my eyes may start to bleed soon. 20:22 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has quit [Read error: 110 (Connection timed out)] 20:57 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has left ##openvpn [] 21:28 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has quit ["Ctrl-C at console."] 21:29 -!- vpnHelper [n=vpn@unaffiliated/krzee/bot/vpnhelper] has joined ##OpenVPN 22:36 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [] 23:06 -!- bytesaber_ [n=bytesabe@208-98-188-95.directcom.com] has quit [Remote closed the connection] 23:30 -!- kenrick86 [n=john@c-65-34-160-25.hsd1.fl.comcast.net] has quit ["—I-n-v-i-s-i-o-n— 3.1.1 (June '09)"] --- Day changed Wed Jan 13 2010 00:09 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 00:26 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 01:14 -!- Kitty- [n=nunyuh@hpavc/Kitty] has quit [Read error: 110 (Connection timed out)] 01:21 -!- Leila [i=d9dae562@gateway/web/freenode/x-jgwlydrtfugxqqbm] has joined ##openvpn 01:40 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 01:48 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 01:48 -!- mode/##openvpn [+o mattock] by ChanServ 02:07 -!- ribasushi [n=rabbit@dslb-084-063-001-106.pools.arcor-ip.net] has quit [Read error: 110 (Connection timed out)] 02:07 -!- ribasushi [n=rabbit@dslb-084-063-050-203.pools.arcor-ip.net] has joined ##openvpn 02:11 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:29 -!- Leila [i=d9dae562@gateway/web/freenode/x-jgwlydrtfugxqqbm] has quit ["Page closed"] 02:30 -!- ribasushi_ [n=rabbit@dslb-084-063-038-130.pools.arcor-ip.net] has joined ##openvpn 02:45 -!- ribasushi [n=rabbit@dslb-084-063-050-203.pools.arcor-ip.net] has quit [Read error: 110 (Connection timed out)] 03:06 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 03:07 -!- master_of_master [i=master_o@p57B57B1C.dip.t-dialin.net] has joined ##openvpn 03:18 -!- master_o1_master [n=master_o@p57B55E0F.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:40 -!- dazo_afk is now known as dazo 03:56 -!- phusion__ [i=phusion@88.80.16.38] has quit [Read error: 60 (Operation timed out)] 03:56 -!- phusion__ [i=phusion@88.80.16.38] has joined ##openvpn 04:07 -!- xod [n=onats@112.201.158.40] has quit [Read error: 104 (Connection reset by peer)] 04:07 -!- xod [n=onats@112.201.158.40] has joined ##openvpn 04:10 -!- xod [n=onats@112.201.158.40] has quit [Connection reset by peer] 04:10 -!- xod [n=onats@112.201.158.40] has joined ##openvpn 04:16 -!- mintaka is now known as pimpatine 04:21 -!- xod [n=onats@112.201.158.40] has quit ["Ex-Chat"] 04:24 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 110 (Connection timed out)] 04:34 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 04:41 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 04:45 < plundra> If I wanted to customize the win32-installer, by adding a config and a ca.crt, would I still need to build the package from scratch or can it be altered later? 04:45 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has joined ##openvpn 04:46 < plundra> Also, is the win32-installer built on windows or crosscompiled? 04:56 < d12fk> plundra: the installer is built by nsis which is available for windows only afaik 04:58 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 05:00 < jmm> hi everyone. 05:00 < |Mike|> morning. 05:02 < jmm> I setuped a openvpn network, and I push DNS and DOMAIN to clients. on linux it works fine, but the window client doesn't have shorts names, and ipconfig /all show no dns suffixes.I'm a dick with window$ so I may have done something wrong. any suggestions ? 05:02 < dazo> plundra: you can cross compile from Linux to Windows by using the mingw32 compiler, iirc 05:16 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has joined ##openvpn 05:20 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 05:21 < havoc> bah 05:28 -!- ribasushi_ [n=rabbit@dslb-084-063-038-130.pools.arcor-ip.net] has quit [Read error: 110 (Connection timed out)] 05:28 -!- ribasushi_ [n=rabbit@dslb-084-063-044-135.pools.arcor-ip.net] has joined ##openvpn 05:28 < aep> can i load balance a single encrypted route over two unencrypted? 05:29 < aep> preferable so that when one breaks, the other doesn't 05:31 < aep> well failover seems to be easy, but i want both lines to be connected at the same time in a way that makes it appear as one 05:38 -!- eatnumber1 [n=eatnumbe@129.21.83.152] has joined ##openvpn 05:39 < eatnumber1> my openvpn setup seems to be dropping packets. I can ping the remote exit-point fine, but if I ping a host on the remote network, I only get about 3/4 of the packets back 05:41 -!- flo|va-n1-pied is now known as flo|va-nu-pied 05:43 -!- eatnumber1 [n=eatnumbe@129.21.83.152] has quit [Client Quit] 05:43 -!- eatnumber1 [n=eatnumbe@129.21.83.152] has joined ##openvpn 05:46 < plundra> d12fk: That was what I figured, but I grepped for the nsis-file which the docs for the gui mentioned (before merging it) 05:59 -!- eatnumber1 [n=eatnumbe@129.21.83.152] has quit ["Leaving."] 05:59 -!- eatnumber1 [n=eatnumbe@129.21.83.152] has joined ##openvpn 06:00 -!- eatnumber1 [n=eatnumbe@129.21.83.152] has quit [Client Quit] 06:02 -!- eatnumber1 [n=eatnumbe@129.21.83.152] has joined ##openvpn 06:27 -!- d12fk [n=heiko@vpn.astaro.de] has quit [Remote closed the connection] 06:34 -!- d12fk [n=heiko@vpn.astaro.de] has joined ##openvpn 06:37 -!- eatnumber1 [n=eatnumbe@129.21.83.152] has quit ["Leaving."] 06:39 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 06:40 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 06:43 -!- wulfgarpro [n=wulfgarp@CPE-58-168-232-79.lns6.win.bigpond.net.au] has joined ##openvpn 06:43 < wulfgarpro> hi, im getting error msg: Cannot load certificate file sample-keys/server.crt 06:43 < wulfgarpro> can someone point me in the right direction please ? 06:51 < havoc> hmm, yet more info on ovpn on win2k8r2, it's sending DHCPNACK's 06:54 < dazo> wulfgarpro: try using full paths, check that the user running openvpn can read the files 06:54 < dazo> wulfgarpro: make sure that server.crt contents looks like a certificate .... can be validated by doing 'openssl x509 -in server.crt', iirc 07:01 < vpnHelper> New forum entry openvpnforum: Configuration :: Re: Waiting for TUN/TAP interface to come up... :: Reply by iss42 07:04 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has joined ##openvpn 07:07 < wulfgarpro> dazo, got it thanks! 07:07 < dazo> np! 07:14 < jmm> I'm trying to push DNS and DOMAIN to my vpn's clients, it works for linux clients, but for some reasons on windows(not on linux ) only the dns server is setuped, the DOMAIN is not updated. can somebody help me please ? 07:25 -!- ribasushi_ is now known as ribasushi 07:34 -!- kyrix [n=ashley@mail.ic-vienna.at] has joined ##openvpn 07:44 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has joined ##openvpn 07:46 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 07:51 < jmm> uh ho window$ problem, it's fixed now. 07:51 < jmm> thanks myself and not thanks to m$. 07:51 -!- marceloa_ [n=marceloa@80.179.214.25.cable.012.net.il] has joined ##openvpn 07:52 -!- zxd [n=marceloa@95.211.21.34] has quit [Read error: 60 (Operation timed out)] 07:56 -!- wulfgarpro [n=wulfgarp@CPE-58-168-232-79.lns6.win.bigpond.net.au] has quit [Read error: 110 (Connection timed out)] 07:56 -!- wulfgarpro [n=wulfgarp@mdiche1.lnk.telstra.net] has joined ##openvpn 07:57 < ribasushi> right, so is there anyone who actually has a dev status 07:57 < ribasushi> and can help me further diagnose/fix the --multihome issue? 07:57 < ribasushi> being frozen at rc19 is no fun 07:58 < ecrist> ribasushi: your question/bug information belongs on the -devel mailing list for now 07:59 < ecrist> we will be able to help you further with bugs in the coming months as openvpn reorganizes at the community level and some of us are given more official roles. 07:59 -!- marceloa_ [n=marceloa@80.179.214.25.cable.012.net.il] has quit [Read error: 104 (Connection reset by peer)] 08:00 < ribasushi> ecrist: I see... well I guess I'll just have to stick with rc19 then and wait for someone to do something 08:00 < rob0> I don't want an official roll, I want a donut!! 08:00 < ecrist> did you submit on -devel list? 08:00 < ecrist> s/donut/official donut/ 08:00 < ecrist> ;) 08:00 < rob0> ys 08:04 -!- trap_ [n=trap@host86-168-126-222.range86-168.btcentralplus.com] has joined ##openvpn 08:04 < havoc> hmm, my win2k8r2 issue may be ™U related 08:04 < ribasushi> ecrist: http://sourceforge.net/mailarchive/message.php?msg_name=4B40CC5E.10709%40rabbit.us 08:04 < vpnHelper> Title: SourceForge.net: OpenVPN: (at sourceforge.net) 08:07 < havoc> ok, ping -l 1500 -f indicates an MTU problem 08:07 < ribasushi> ecrist: also the --nobind thread does not apply to me, as I always had this in the client config 08:07 < havoc> what is the recommended way to adjust MTU? 08:07 < ecrist> !mtu 08:07 < vpnHelper> ecrist: "mtu" is see --mtu-test to learn how to test your MTU settings. Basically you just use --mtu-test in your normal client config 08:07 < havoc> i.e. what options should I be RTFMing? 08:07 < havoc> ok 08:07 < ecrist> !factoids 08:07 < vpnHelper> ecrist: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 08:08 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 08:08 < havoc> wow, --mtu-test takes 3min on startup? 08:08 < ecrist> you only use it once 08:08 < havoc> ah 08:09 < havoc> on client or server side? 08:09 * havoc guesses client 08:09 < ecrist> "Basically you just use --mtu-test in your normal client config 08:09 < ecrist> so, yeah 08:09 < ecrist> it was spelled out there for you... 08:10 < havoc> ack, already scrolled off, sorry, was looking at openvpn man entry 08:11 -!- blabland [n=trap@host86-168-121-116.range86-168.btcentralplus.com] has quit [Read error: 110 (Connection timed out)] 08:11 < havoc> I guess I wait and something should show up in logs in a few minutes? 08:14 < havoc> ok, test completed 08:14 < havoc> NOTE: Empirical MTU test completed [Tried,Actual] local->remote=[1573,1573] remote->local=[1573,1573] 08:15 < havoc> but if 1573 works, the ping.exe shouldn't have had an issue with 1500 08:16 < havoc> "++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication" 08:16 < havoc> just noticed that 08:20 -!- wulfgarpro [n=wulfgarp@mdiche1.lnk.telstra.net] has quit [Read error: 110 (Connection timed out)] 08:22 -!- mort_gib [n=mjensen@177.209.244.195.dsl.static.gibconnect.com] has joined ##openvpn 08:28 < dazo> ribasushi: have you tried to compile rc20 yourself? or have you only tried .deb packages? 08:28 < ribasushi> only .deb 08:28 < ribasushi> no resources right now to try it with hand compile 08:28 < dazo> ribasushi: I've skimmed through the diff between rc19 to rc20 .... and I honestly don't see that --multihome has been touched at all 08:28 < ribasushi> as I need to make sure I clean up after myself properly and things 08:29 < dazo> ribasushi: it might be that a options->sockflag is reset, need to go more carefully through the diff to catch that ... but basically, --multihome only sets a flag ... and that flag is not changed anywhere in that diff 08:29 < dazo> ribasushi: understood 08:30 < ribasushi> dazo: I only have one heavy-production multihome server :) 08:30 < dazo> ribasushi: I just know that the .deb packages includes the IPv6 and eurephia patches as well .... maybe even some more, which then breaks things 08:30 < ribasushi> hm hm 08:30 < dazo> ribasushi: heh .... better be careful then ... 08:30 < ribasushi> I'll ask the maintainer for source diffs then 08:30 < ribasushi> maybe I'll spot it 08:30 < dazo> ribasushi: on the other hand ... you can compile openvpn, and run it from the source dir without doing make install 08:31 < ribasushi> dazo: oh it will run? 08:31 < ribasushi> cool I'll try tonight then 08:31 < dazo> ribasushi: yeah ... it's a nice little binary :) 08:31 < ribasushi> should I try rc20 or latest? 08:31 < ribasushi> I guess both 08:31 < dazo> ribasushi: I'd suggest rc20 ... as you know for sure this is the point where it fails 08:31 < ribasushi> right 08:31 < dazo> and if it works, then I'd try the latest one 08:32 < ribasushi> ok that's a way to do go forward 08:32 < ribasushi> dazo++ #even if a git fanboi :D 08:32 < dazo> ribasushi: heh ;-) 08:33 < havoc> bah 08:39 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 60 (Operation timed out)] 08:44 -!- Kalculus [n=na@x40343ce2.ip.e-nt.net] has joined ##openvpn 08:53 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [] 08:54 -!- kyrix [n=ashley@mail.ic-vienna.at] has quit ["Leaving"] 09:04 -!- cybertron [n=cybertro@84.200.248.176] has left ##openvpn [] 09:09 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 09:10 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit [Read error: 60 (Operation timed out)] 09:15 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [] 09:20 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Connection timed out] 09:27 < ribasushi> is there a stable mechanism to guarantee ipp assigments? 09:27 * ecrist converts his vpn to bridged. 09:27 < ribasushi> the docs mention that the assignment is "best effort" not guaranteed 09:27 < ecrist> !iporder 09:27 < vpnHelper> ecrist: "iporder" is (#1) OpenVPN's internal client IP address selection algorithm works as follows: 1 -- Use --client-connect script generated file for static IP (first choice)., or (#2) Use --client-config-dir file for static IP (next choice) !static for more info, or (#3) Use --ifconfig-pool allocation for dynamic IP (last choice), or (#4) if you use --ifconfig-pool-persist see !ipp 09:28 < ribasushi> !ipp 09:28 < vpnHelper> ribasushi: "ipp" is (#1) the option --ifconfig-pool-persist ipp.txt does NOT create static ips, or (#2) Note that the entries in this file are treated by OpenVPN as suggestions only, based on past associations between a common name and IP address. They do not guarantee that the given common name will always receive the given IP address. If you want guaranteed assignment, see !iporder and !static 09:28 < ribasushi> !static 09:28 < vpnHelper> ribasushi: "static" is (#1) use --ifconfig-push in a ccd entry for a static ip for the vpn client, or (#2) example: ifconfig-push 10.8.0.6 255.255.255.0, or (#3) also see !ccd and !iporder 09:29 < ribasushi> hm hm hm 09:29 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 09:29 < ribasushi> so I could make a client-connect-script 09:29 < ribasushi> which would scan the ipp.txt 09:30 < ribasushi> and use it as the persistence database 09:30 < ribasushi> ? 09:34 < ecrist> you could, I suppose 09:35 -!- dmz [n=dmz@64.203.207.101.dyn-cm-pool-54.hargray.net] has quit ["Ex-Chat"] 09:41 < hyper_ch> ribasushi: what are you trying to do? 09:41 < ribasushi> is there a stable mechanism to guarantee ip assigments? 09:41 < hyper_ch> I tend to think if really care what ip which client gets then you'd assign static ips in the client config 09:42 < hyper_ch> otherwise use ipp.txt to sort of assign the same client the same ip - if possible 09:42 < ribasushi> hyper_ch: clients have access to the client config 09:42 < ribasushi> the whole point is to enforce ip assignments server side 09:42 < ribasushi> so you can punch appropriate firewall holes etc 09:43 < hyper_ch> ribasushi: http://www.pastebin.org/75553 09:43 < hyper_ch> then assign a static ip to each client 09:44 < hyper_ch> ipp.txt will not ensure that each client always has the same ip... but using ifconfig-push in the ccd dir will do so 09:44 < ribasushi> yeah 09:44 < ribasushi> and then you need a database that gets autopopulated 09:44 < ribasushi> for which I'll use ipp.txt for 09:44 < hyper_ch> http://www.pastebin.org/75554 09:44 < ribasushi> so if I find an ip in the ipp - I'll gnerate a ccd 09:44 < ribasushi> otherwise I'll fallback to the assignment 09:44 < ribasushi> which will populate ipp for next time 09:44 < ribasushi> so all is good 09:45 < hyper_ch> not sure if ipp still works when you enable client config dirs 09:45 < ribasushi> it does (I have ccd enabled for other reasons) 09:45 < hyper_ch> ok :) 09:45 < hyper_ch> well, I only have a handful clients :) 09:46 < hyper_ch> so I don't need more sophisticated means to handle them 09:46 < ribasushi> by the way what is the reason that every client gets a /30 ? 09:46 < ribasushi> is this mandated by windows or something? 09:47 < ribasushi> can I pack clients closer together? 09:47 < hyper_ch> it says in the howto to use like that 09:47 < hyper_ch> and that's how I use it :) 09:47 < hyper_ch> !howto 09:47 < vpnHelper> hyper_ch: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 09:48 < ribasushi> hm hm hm 09:48 < ribasushi> so ten I could /25 my range when I outgrow the /24 ? 09:48 < ribasushi> and still keep the spacing at /30 for individuals? 09:49 < hyper_ch> Each pair of ifconfig-push addresses represent the virtual client and server IP endpoints. They must be taken from successive /30 subnets in order to be compatible with Windows clients and the TAP-Win32 driver. Specifically, the last octet in the IP address of each endpoint pair must be taken from this set: 09:49 < hyper_ch> http://openvpn.net/index.php/open-source/documentation/howto.html#policy 09:49 < vpnHelper> Title: HOWTO (at openvpn.net) 09:49 < ribasushi> hyper_ch: I just read that 09:49 < ribasushi> it doesn't say if > /24 subnets are ok 09:50 < ribasushi> when you outgrow your pool 09:50 < hyper_ch> make a new subnet I think 09:50 < hyper_ch> and add according routes 09:51 < hyper_ch> but then, I'm a noob on subnets and routing and stuff 09:51 < ribasushi> then why do you try to give advice? :) 09:51 < hyper_ch> why shouldn't I try to? 09:51 < dunc_> can you not just make the pool larger than a /24 and have openvpn deal with it? 09:51 < ribasushi> dunc_: I am asking if openvpn does deal with it 09:52 < ribasushi> with all the tap32 weirdness an stuff 09:52 < hyper_ch> ribasushi: why not just give it a try 09:52 < hyper_ch> you'd find out pretty quickly 09:58 -!- Zahra [n=Zahra@unaffiliated/belendax] has joined ##openvpn 09:59 -!- Zahra [n=Zahra@unaffiliated/belendax] has left ##openvpn [] 10:02 -!- huzaifas [n=huzaifas@115.240.219.83] has joined ##openvpn 10:02 < huzaifas> hi is there any relation between tls-remote and tls-auth 10:02 < huzaifas> is tls-remote used only when tls-auth is used 10:02 < huzaifas> !welcome 10:02 < vpnHelper> huzaifas: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 10:03 < huzaifas> !welcome configs 10:03 < vpnHelper> huzaifas: Error: "welcome" is not a valid command. 10:03 < huzaifas> :) 10:05 < dazo> huzaifas: nope ... they just depend on tls-server or tls-client 10:06 < dazo> huzaifas: tls-remote validates the hostname given against the CN given in the server's certificate, to avoid MITM 10:06 < dazo> attack 10:06 < huzaifas> yeah 10:06 < huzaifas> so basically i am writing a patch for Networkmanager-openvpn 10:06 < huzaifas> when has an option for tls-auth 10:07 < dazo> huzaifas: tls-auth is just an extra layer of security, which is a static key .... if this key is wrong, openvpn in UDP mode will not even bother responding to the client 10:07 < huzaifas> just wanted to make sure tls-remote does not depends on tls-auth 10:07 < huzaifas> ok 10:08 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 10:08 -!- mode/##openvpn [+v Kas] by ChanServ 10:08 -!- huzaifas [n=huzaifas@115.240.219.83] has quit ["Leaving"] 10:08 < dazo> gah ... why logout when I want to say more! :-P 10:09 * dazo finds that rude! 10:09 < dazo> :-P 10:12 -!- Kaspx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 60 (Operation timed out)] 10:16 < dunc_> ribasushi, are you using the server keyword? e.g. "server 10.12.12.0 255.255.255.0" 10:16 < ribasushi> dunc_: yup 10:16 < dunc_> coz if so, openvpn will just chop out /30s from whatever size you make the network 10:16 < ribasushi> so 255.255.254.0 will just work? 10:16 < dunc_> so if you make it a /23 (255.255.254.0) then you'll be allowed to have twice as many clients before you run out 10:16 < dunc_> i reckon 10:17 < ribasushi> awesome 10:19 < dunc_> i'd better qualify it slightly, i've used it before with a /24 and a /26, and it just works, i can't imagine they'd make it so that the maximum is a /24 and not bother to mention it in the docs :) 10:21 < dunc_> as hyper_ch says tho, you're only one character change in the config, and 65 clients away from finding out 10:21 < dunc_> bagsy not being number 65 10:22 < dunc_> gah, 64, there's a server 10:24 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has joined ##openvpn 10:25 -!- Zahra [n=Zahra@unaffiliated/belendax] has joined ##openvpn 10:26 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 104 (Connection reset by peer)] 10:27 < Zahra> !welcome 10:27 < vpnHelper> Zahra: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 10:27 < Zahra> hi, can anybody help me about this error? http://pastebin.com/m4380a913 10:28 < Zahra> I've searched most forums but I can't find any right way 10:28 < ecrist> check your network? 10:28 < ecrist> !logs 10:28 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 10:29 < Zahra> my network doesn't have any problem, my ip & port are true 10:29 < ecrist> we need to see server and client logs, then 10:30 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 10:31 < Zahra> it's for my client http://pastebin.com/m60d87404 10:31 < Zahra> and it's for server http://pastebin.com/ma94bbc5 10:32 < Zahra> repeat this log every 1 min 10:37 < dazo> Zahra: this is UDP? 10:37 < ecrist> Zahra: full logs, please 10:37 < ecrist> as was stated in !logs, above 10:37 < dazo> Zahra: you might want to try TCP in this case ... not as efficient, but sometimes UDP gets filtered by some ISPs 10:38 < dazo> Zahra: if still failing .... do as ecrist says, easier to help out then 10:42 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 10:45 < Zahra> dazo: yes, but I opened udp for 1194 port 10:46 < dazo> Zahra: if you're using UDP, then I'd recommend trying out TCP in your case ... I've had similar issues myself, from one network I believe this was exactly the same which happened to me ... switching to TCP solved it 10:47 < dazo> unfortunately, I don't think there are any other ways around that 10:48 < dazo> unless you can investigate the infrastructure between your server and client 10:48 -!- mort_gib [n=mjensen@177.209.244.195.dsl.static.gibconnect.com] has quit ["Leaving"] 10:48 < Zahra> dazo: ok dazo, I'll test it 10:48 < Zahra> tnx 10:48 < dazo> np! 10:55 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has joined ##openvpn 11:01 -!- polaru [n=polaru@93.113.192.70] has quit [Read error: 104 (Connection reset by peer)] 11:06 < rob0> dazo, switch ISPs? 11:08 < Zahra> dazo: I did this! but same problem exist! 11:09 < dazo> Zahra: then we need !configs and complete !logs with minimum verb 4 11:09 < dazo> rob0: yeah, if you can ;-) 11:13 -!- diffen2 [n=diffen2@c-6075e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Read error: 60 (Operation timed out)] 11:15 -!- Section58 [n=steve@ipt0-2.core.bsd.uk.phib3r.net] has joined ##openvpn 11:17 -!- diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 11:21 < Zahra> my server log: http://pastebin.com/m7f7c580b 11:21 < Zahra> myclient log: http://pastebin.com/m4369b911 11:21 < Zahra> my server.conf: http://pastebin.com/m4679c48e 11:22 < Zahra> my client.conf: http://pastebin.com/m59f0c326 11:28 < dazo> Zahra: your server and client config don't match ... one says TCP (server) and the other one says UDP ... 11:28 < Zahra> ow! w8! 11:29 < dazo> and! those logs is not verb 4 or higher 11:45 -!- sympho08 [n=casa@adsl196-42-228-217-196.adsl196-16.iam.net.ma] has joined ##openvpn 11:48 -!- sympho08 [n=casa@adsl196-42-228-217-196.adsl196-16.iam.net.ma] has quit ["Quitte"] 11:51 -!- diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Read error: 60 (Operation timed out)] 11:58 -!- diffen2 [n=diffen2@c-6075e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 12:00 -!- diffen2 [n=diffen2@c-6075e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Client Quit] 12:20 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has quit ["Leaving"] 12:22 < Zahra> same problem!!! 12:22 < Zahra> server log : http://pastebin.com/m76a48887 12:23 < Zahra> client log: http://pastebin.com/m4d9ae2 12:23 < Zahra> server.conf: http://pastebin.com/m4679c48e 12:23 < Zahra> client.conf : http://pastebin.com/m39f2c31b 12:26 < dazo> Zahra: where is the verb 4 with complete logs? 12:26 < dazo> that is not verb 4 logs 12:26 < dazo> at least not complete 12:28 < Zahra> dazo: but, as u see I used openvpn with --verb 4 & it was all of the output! 12:29 < dazo> Zahra: please try to put --verb 4 behind the --config ..... if you have verb 2 or verb 3 in the config, that will override the verb 4 infront 12:29 < dazo> Zahra: I just know that this log is not a verb 4 log ... from how it looks 12:35 < Zahra> server.conf:http://pastebin.com/m1ff987bb 12:35 < Zahra> client.conf:http://pastebin.com/m3383aa1d 12:35 < Zahra> is that true dazo?! 12:37 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 12:37 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 60 (Operation timed out)] 12:37 < dazo> Zahra: this looks like verb 4 12:41 < ecrist> !logs 12:41 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 12:41 < ecrist> I think we ask for verb 6 12:41 < Zahra> do u want verb 15?!:D 12:42 < ecrist> Zahra: we're here to help you. If you cannot do as we ask, we cannot help you. 12:43 < ecrist> the things we ask for are specific, and have been vetted from years of practice helping users such as yourself. 12:43 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Connection timed out] 12:43 < Zahra> ecrist: sorry, It was only a humer & I didn't want to upset u. 12:45 < Zahra> server: http://pastebin.com/m6d72f23b 12:45 < Zahra> client: http://pastebin.com/m699d38f2 12:48 -!- bytesaber_ [n=bytesabe@208-98-188-95.directcom.com] has joined ##openvpn 12:50 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 12:52 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has joined ##openvpn 12:58 -!- newmember [n=chatzill@static-66-11-81-77.ptr.terago.net] has joined ##openvpn 13:06 -!- Zahra [n=Zahra@unaffiliated/belendax] has quit ["Leaving."] 13:22 -!- dazo is now known as dazo_afk 13:29 < steelnwool> hello 13:31 < ecrist> hi 13:35 < steelnwool> i have my vpn working now in so much as I can connect to 10.8.0.1. I want to push a route to 66.48.78.64/26 [255.255.255.192] however when i do that, and connect to my vpn both viscosity and openvpn processes go thru the roof. if i ping 10.8.0.1 i'm told "no buffer space available" 13:36 < ecrist> firewall 13:40 < steelnwool> sorry, one word answers don't help me much :) 13:42 < steelnwool> i'm not sure what firewall is in the way, i thought i've already gotten around the firewall by using open vpn. that was our point. Our servers do not have internal ips on reserved IP blocks, so we want to for example only allow ssh via the VPN and not poke holes in teh firewall. 13:45 < steelnwool> right ? 13:46 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 13:55 < ecrist> you need to make certain your firewalls are not blocking VPN traffic. 13:56 < ecrist> a VPN isn't a magic bullet. you still need proper routing, and firwalling 13:56 < steelnwool> ah, i know my firewall isn't blocking vpn traffic. i thought that was clear when i said "as I can conect to 10.8.0.1" 13:56 < ecrist> if there is a firewall installed and running on the VPN server, it will block VPN traffic unless set to an open policy, or specifically instructed to allow VPN traffic. 13:57 < steelnwool> there isn't. 13:57 < ecrist> sigh 13:57 < steelnwool> i checked. 13:57 < ecrist> no buffer space available usually means the firewall is blocking the packet 13:57 < ecrist> s/usually/almost always/ 13:58 < steelnwool> i only get that tho if i push the route to the other subnet. if i don't push that route, ping works fine. 13:58 < ecrist> !configs 13:58 < vpnHelper> ecrist: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 13:58 < steelnwool> sure , i'll put that up now. 13:58 < steelnwool> one sec. 14:00 < steelnwool> http://bignose.ca/openvpn/server.conf 14:00 < steelnwool> want me to remove comments? 14:00 < ecrist> are you the one who posted this to the forum recently? 14:00 < steelnwool> this is on ubunt LTS. 14:00 < steelnwool> ecrist: yup. that is me. 14:01 < ecrist> yes, please remove comments, per the instructions. 14:01 < steelnwool> k, one sec. 14:01 < steelnwool> http://bignose.ca/openvpn/nocomments.conf 14:02 < ecrist> client config/ 14:02 < ecrist> and 14:02 < ecrist> !logs 14:02 < steelnwool> not sure how to show that... i'm using viscosity, there is no client.conf on the server. 14:02 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 14:03 < vpnHelper> New forum entry openvpnforum: Configuration :: pushing routes to public ip blocks :: Author bignose 14:03 < ecrist> just get me logs, first 14:03 < steelnwool> sure. will get server side logs. let me turn the verb up. 14:04 < steelnwool> do you want openvpn-status.log ipp.txt or something else? 14:04 < steelnwool> syslog? 14:04 < ecrist> no, main log 14:04 < steelnwool> k one sec. 14:05 < ecrist> if you run the command at the cli, everything that's output on stdout 14:06 < steelnwool> yeah its /var/log/daemon on ubuntu. one sec, i gotta kill viscosity/openvpn here... 14:07 < steelnwool> actually i have a linux box in m house that i can run openvpn right form command line too. i'll do that if you need client side logs. 14:10 < steelnwool> http://bignose.ca/openvpn/daemon.log 14:11 < steelnwool> the comments above the push route command suggest i may need to add a route back to tun 0 from eth0.. i thik, but i don't uquite understand that part. 14:13 < ecrist> the lines that state 'connection refused' demonstrate a firewall 14:13 < ecrist> with the push route in place, are you able to ping 10.8.0.1 from the client? 14:14 < ecrist> just not the newly pushed route? 14:14 < steelnwool> no :( 14:14 < steelnwool> i can't ping either route. 14:14 < steelnwool> i'll check iptables again on the vpn host... 14:14 < ecrist> !iptables 14:14 < vpnHelper> ecrist: "iptables" is (#1) to test if iptables is your problem, disable all rules except $IPTABLES -P INPUT ACCEPT $IPTABLES -P OUTPUT ACCEPT $IPTABLES -P FORWARD ACCEPT, or (#2) then run iptables -F, iptables -Z after being SURE policies are set to accept, or (#3) please see http://openvpn.net/man#lbBD for more info, or (#4) see http://www.secure-computing.net/wiki/index.php/OpenVPN/Firewall 14:15 < steelnwool> okay did htose steps. re testing now. [but i did just confirm and those were the only rules there. 14:16 < ecrist> where is the clientn log? 14:16 < steelnwool> didn't get it yet. i'm going to do that in one sec. 14:21 < reiffert> we should add ;'s in #1 14:22 < steelnwool> okay, so i just setup the client on my linux machine. joined vpn and did some pings.i get 100% packet loss to both 10.8.0.1 and 66.48.78.91 , now I'm pasting the client logs. 14:23 < steelnwool> http://bignose.ca/openvpn/client.log 14:24 -!- caution [n=caution@unaffiliated/caution] has joined ##openvpn 14:24 < caution> !welcome 14:24 < vpnHelper> caution: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 14:25 < caution> !redirect 14:25 < vpnHelper> caution: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 14:25 < caution> !def1 14:25 < vpnHelper> caution: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 14:25 < reiffert> steelnwool: client log says: everybody is ok. 14:25 < steelnwool> rieffert its lying :) 14:26 < reiffert> steelnwool: right, the problem is: 14:26 < reiffert> Wed Jan 13 16:21:40 2010 UDPv4 link remote: 66.48.78.87:1194 14:26 < reiffert> Wed Jan 13 16:21:40 2010 UDPv4 link remote: 66.48.78.87:1194 14:26 < reiffert> Wed Jan 13 16:21:43 2010 /sbin/route add -net 66.48.78.64 netmask 255.255.255.192 gw 10.8.0.5 14:26 < steelnwool> i don't see it.. help? 14:27 < reiffert> 66.48.78.64/26 includes 66.48.78.87 14:28 < steelnwool> right... so how is that a problem? 14:28 < reiffert> guess. 14:28 < reiffert> 21:26 < reiffert> Wed Jan 13 16:21:43 2010 /sbin/route add -net 66.48.78.64 netmask 255.255.255.192 gw 10.8.0.5 14:28 * Bushmills thinks of throwing a letter box key into the letter box 14:28 < steelnwool> i can't. with my limited understanding it makes sense. .87 is in the blcok i want to access and ipushed a route to that block, it should work. 14:29 < reiffert> your vpn connection will die that way. 14:29 < caution> !ipforward 14:29 < vpnHelper> caution: "ipforward" is please choose between !linipforward !winipforward and !fbsdipforward 14:29 < caution> !linipforward 14:29 < vpnHelper> caution: "linipforward" is echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution (til reboot) or set net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 14:30 < steelnwool> reiffert: i know it will die that way. that is why i'm here :) 14:30 < caution> !nat 14:30 < vpnHelper> caution: "nat" is (#1) http://openvpn.net/howto.html#redirect for an explanation of NAT as it applies to openvpn, or (#2) http://www.secure-computing.net/wiki/index.php/OpenVPN/FAQ#Traffic_forwarding_doesn.27t_work_when_using_client_specific_access_rules, or (#3) dont forget to turn on ip forwarding, or (#4) please choose between !linnat and !fbsdnat for specific howto 14:30 < caution> !linnat 14:30 < vpnHelper> caution: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 14:30 < reiffert> steelnwool: look. 14:30 < Bushmills> steelnwool: think about the problem you'd have when you'd threw a letter box key into the letter box 14:31 < steelnwool> wtf is a letter box? 14:31 < Bushmills> then try to open the box 14:31 < steelnwool> okay, yes, i understand that. 14:31 < reiffert> steelnwool: you send packets from A to your gateway, to servers gateway, to server. 14:31 < steelnwool> but i can't link the analogy. 14:31 < steelnwool> okay.. 14:31 < reiffert> steelnwool: now you tell the routing table, to send exactly those packets through the vpn link 14:31 < reiffert> steelnwool: but the vpn link can only exist, when you send packets from A to your gateway, to servers gateway, to server. 14:32 < steelnwool> so am i attacking the problem wrong? 14:32 < reiffert> no, you didnt understand it. 14:33 < caution> when I try the !linnat iptables command I get: iptables: No chain/target/match by that name 14:33 < steelnwool> i'm afraid i still don't.. i can't think of what other route i should be pushing... 14:33 < steelnwool> i understand what you are telling me, but i'm not connecting the dots as to what i should be doing. 14:34 < Bushmills> steelnwool: how is the client supposed to talk to the server, when you change that route to go through the vpn tunnel itself? 14:34 < steelnwool> well, i WANT it to go thru the VPN, because we have that server at .87 firewalled off. 14:35 < Bushmills> but there won't be a tunnel then 14:35 * ecrist thinks the firewall is the issue. 14:35 < Bushmills> because the client can't talk to the server anymore 14:35 < reiffert> caution: guess you are missing some modules or some iptables specific support in your kernel. 14:35 < caution> that's what I thought, what can I do about it? 14:35 < steelnwool> ecrist: when you say firewall, would you also mean the firewall outside of them achine ? liek the one besides ip tables ? 14:35 < reiffert> ecrist: what about the routing issue, is it so far off? 14:36 < ecrist> the routing looked fine to me. I've been afk for about 10 mins 14:36 < reiffert> caution: adjust your kernel config - or - load the appropriate kernel modules. 14:36 < reiffert> ecrist: http://bignose.ca/openvpn/client.log 14:36 < steelnwool> are you saying that i need to open a port between my vpn and my juniper to .87 ? 14:37 < ecrist> yes 14:37 < reiffert> ecrist: pay attention to "link remote" and the routes. 14:37 < Bushmills> why does --redirect-gateway add a host route to server? 14:37 < steelnwool> i do not have --redirect-gateway turned on. 14:37 < ecrist> steelnwool: I don't see a route .87 14:37 < Bushmills> but you have the same problem 14:37 < reiffert> ecrist: did you tell him before? 14:38 < steelnwool> workshop@workshop-desktop:~$ netstat -nr|grep 78 14:38 < steelnwool> 66.48.78.64 10.8.0.5 255.255.255.192 UG 0 0 0 tun0 14:38 < steelnwool> thats from my client. 14:38 < reiffert> you broke routing. 14:38 < ecrist> ignore my comment. 14:38 < ecrist> durr 14:38 < reiffert> steelnwool: tell your client how to get to the openvpn server. 14:38 < ecrist> !durr 14:38 < vpnHelper> ecrist: Error: "durr" is not a valid command. 14:39 < ecrist> steelnwool: you have a conflicting route in your push 14:39 < reiffert> caution: zgrep /proc/config.gz MASQ 14:39 < ecrist> your client is connecting to .87, after connection, you're adding a static route 14:39 < ecrist> break it all up 14:39 < steelnwool> no idea how. :( 14:39 < caution> reiffert: gzip: MASQ.gz: No such file or directory 14:39 < reiffert> caution: sorry. zgrep MASQ /proc/config.gz 14:40 < steelnwool> i thought that routes were like firewall rules, ie : first one matched was the one that was taken... ? 14:40 < ecrist> steelnwool: give me 2 mins 14:40 < steelnwool> ecrist: tks 14:40 < caution> reiffert: gzip: /proc/config.gz: No such file or directory 14:40 < ecrist> steelnwool: it does, but you're providing a route with a lower metric through the vpn 14:40 < steelnwool> thanks for your patience guys btw. i help people in a freebsd channel, and i know the facepalms that go on. 14:40 < reiffert> caution: do you have an idea how to get to your kernel config? 14:40 < caution> no, sorry 14:40 < reiffert> caution: what distro are you running, kernel version? 14:41 < caution> ubuntu 2.6.18-128.2.1.el5.028stab064.7 14:41 < reiffert> self made kernel? 14:41 < caution> I didn't make it but my host may have 14:41 < reiffert> caution: pastebin.ca << lsmod 14:42 < caution> the -j SNAT command works, is that an alternative? 14:42 < caution> lsmod is blank 14:42 < reiffert> caution: like !linnat tells us. 14:42 < reiffert> caution: omg. 14:43 < reiffert> caution: ls /lib/modules 14:43 < caution> 2.6.18-028stab062.3 2.6.18-128.2.1.el5.028stab064.7 14:43 < reiffert> find /lib/modules/2.6.18-128.2.1.el5.028stab064.7 | grep -i masq 14:43 < caution> no output 14:44 < reiffert> your kernel is missing the masquerading feature. get a new one. 14:44 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has quit [] 14:44 < reiffert> find /lib/modules/2.6.18-128.2.1.el5.028stab064.7 -name '*.ko' |wc -l 14:45 < caution> 0 14:45 < reiffert> caution: your kernel misses *any* module. 14:45 < reiffert> steelnwool: whats the ip of the clients gateway? 14:46 < reiffert> caution: whoever did this to you, make him fix it. 14:46 < steelnwool> 66.48.78.65 however there is a bridge between the gateway and the client. 14:46 < steelnwool> which might be a giant light over my head..... 14:46 < reiffert> whats the clients ip? 14:46 < steelnwool> sorry. rewind. when you siad client, did you mean the openvpn client as in my desktop here in my house? 14:47 < reiffert> yes. 14:47 < steelnwool> open 10.0.1.1 14:47 < steelnwool> er s/open/okay. 14:47 < reiffert> "open"? 14:47 < steelnwool> here is a diagram. 14:47 < ecrist> steelnwool: here: http://pastebin.com/m1a46339a 14:47 < ecrist> add those to the server, remove the push you have, and you should be good to go 14:47 < reiffert> push "route 66.48.78.87 255.255.255.255 10.0.1.1" 14:48 < reiffert> add this line and there you are. 14:48 < reiffert> even put this line to client conf to get a working setup: 14:48 < reiffert> route 66.48.78.87 255.255.255.255 10.0.1.1 14:48 < reiffert> ecrist: why the heck? 14:49 < steelnwool> reiffert: there are many hosts behind the network and they come and go, i don't want to have to tell my clients to update everytime i add them... 14:49 < ecrist> reiffert: my push routes are good for 'any' client, even if that client's gateway isn't 10.0.1.1 14:49 -!- napcae [n=napcae@i59F76047.versanet.de] has joined ##openvpn 14:49 < steelnwool> ecrist: trying yours now... 14:49 < ecrist> reiffert: I do that exact thing on my work vpn, as our VPN server resides in the middle of a subnet. 14:49 < caution> reiffert: apparently openvz doesn't support masquerading 14:50 < reiffert> caution: I have no idea about openvz, sorry 14:50 < reiffert> ecrist: how about running openvpn on your subnet's gateway? 14:50 < steelnwool> ecrist: okay, i added those lines. i can now ping 10.8.0.1 but not 66.48.78.91 14:51 < reiffert> same question goes out to steelnwool 14:51 < ecrist> reiffert: because we don't do it that way 14:51 < steelnwool> reiffert: my subnets gateway is a cisco thingy that i have no access to. 14:51 < ecrist> for good reasons (has to do with firewall layout, redundancy 14:51 < caution> thanks for the help 14:51 < ecrist> now, if openvpn supported something like pfsync, I could do that. 14:52 < ecrist> regardless, reiffert, that setup's been working for +3years 14:52 -!- ecrist changed the topic of ##openvpn to: OpenVPN 2.1.1 Most Current || type !welcome before asking your questions. 14:53 -!- ecrist changed the topic of ##openvpn to: OpenVPN 2.1.1 Most Current || Your problem is your firewall, really. || Type !welcome before asking your questions. 14:53 < havoc> heh 14:53 < steelnwool> ecrist: those lines you sent me in pastebin, does that mean i'd have to add a new one for every machine i add behind my vpn? 14:53 < ecrist> steelnwool: no 14:53 < ecrist> I broke up your subnets to exclude .87 14:54 < steelnwool> well, it didn't work :) 14:54 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [] 14:54 < steelnwool> and i want to be able to access the whole subnet. 14:54 < havoc> someone needs to put a public web UI on ipcalc 14:54 < ecrist> havoc: send me an email with a scope and I'll make it happen 14:55 < steelnwool> however like i said [you may have missed it] there IS a firewall between the gateway and the .87, its a bridge. so perhaps if i just made a ruile that .65 could connectoto anything behind the firewall i'd be working? 14:55 < havoc> ecrist: I meant so you could link it for other people 14:55 < havoc> ecrist: a nice CGI w/ args in GET 14:55 < ecrist> what's the IP? 14:55 < ecrist> hostname, rather 14:55 < steelnwool> of the bridge? bridges are ip-less. 14:55 < ecrist> steelnwool: was talking to havoc, not you 14:55 < steelnwool> werd. 14:56 < steelnwool> well, now i'm just confused :) 14:56 < havoc> ecrist: oh, I have ipcalc, it would just be handy for providing support to have a web ui 14:56 < havoc> ecrist: something you could give them a URL w/ GET string for the args 14:56 < ecrist> steelnwool: did you put those route in place, and test? 14:56 < havoc> would be easy enough to write, would just need somewhere to put it 14:57 < ecrist> havoc: send me an email, and I"ll make it happen 14:57 < steelnwool> ecrist: yes, said that above. they don't work. 14:57 < havoc> I probably wouldn't waste time w/ making an interface to ipcalc even, just reimplement code in JS 14:57 < steelnwool> ecrist: there was a small chnage. with those routes i can ping 10.8.0.1 once again. 14:58 < havoc> ecrist: email you what, just a reminder to do it? :) 14:58 < ecrist> yes 14:58 < havoc> I should just write it, could do it all in JS in a single html file 14:58 < ecrist> and what, specifically, you want it to do 14:58 < ecrist> then do it 14:58 < ecrist> and I'll host it 14:58 < havoc> I'm thinking about it 14:59 < steelnwool> ecrist: would this understanding be correct: with my orriginal route statement, i was telling all traffic for the /26 to go thru the gateway. but since there is a bridge between gateway and machines using that gatewayu, the bridge is blcoking the traffic? 14:59 < ecrist> I already host the forum and wiki 14:59 < ecrist> steelnwool: no 14:59 < havoc> a CGI iface to ipcalc is easiest, reimplemented in JS is most portable, but more work 14:59 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 14:59 < reiffert> steelnwool: paste you server config. 15:00 < steelnwool> reiffert: http://bignose.ca/openvpn/nocomments.conf 15:00 < havoc> although startiung w/ CGI to ipcalc gets 1st rev done faster and allows for UI design work/time 15:00 < ecrist> you were connectingn to the vpn which resides within the /26, after you connected to the vpn, it sent you a new route to get to the /26, which removed the default, since it couldn't get to the .87 IP (no route) the vpn was dropped 15:00 < ecrist> it was a nasty circle 15:00 < reiffert> steelnwool: the _current_ one, DOH! 15:00 < steelnwool> ecrist: ahhhhh that makes sense. 15:00 < steelnwool> reiffert: :) stupid me. updating it now. 15:01 < havoc> ecrist: nm: http://jodies.de/ipcalc 15:01 < vpnHelper> Title: IP Calculator / IP Subnetting (at jodies.de) 15:01 < steelnwool> reiffert: hit reload. 15:01 < reiffert> steelnwool: add the /26 route back. 15:01 < ecrist> havoc: that works, but I hate cluttered pages. ;) 15:02 < havoc> yeah 15:02 < reiffert> steelnwool: sorry, dont. 15:02 < steelnwool> done ! :) 15:02 < ecrist> reiffert: don't confuse the lad 15:02 < reiffert> ecrist: dont think that can be raised anymore. 15:02 < havoc> syntax highlighting for pastebin for routing tables would be cool too 15:05 < Bushmills> use a different ip address on vpn server, if you have several there. 15:05 < steelnwool> i have a pool of 64, but they'd all be in the same subnet. 15:05 < steelnwool> not sure how that would help tho.. would be the same issue. 15:06 < napcae> can someone help me?i have an ubuntu hardy heron server with openvpn and my macbook unibody 5,1 with "tunnelblick" as the client. i can connect to my server, from lan and also from everywhere else, but i don't get my "home ip", which means;@home i have over(whatsmyip.org) 89.xxx; from the external lan i have 85.xxx; normally i would get 89.xxx isn't like that!? 15:06 < Bushmills> no. then vpn server ip address would be outside the routed net 15:06 < steelnwool> i don't have an IP that is outside the routed net.. 15:06 < steelnwool> i only have things in .64/26 15:06 -!- caution [n=caution@unaffiliated/caution] has quit [Remote closed the connection] 15:06 < steelnwool> what i'm doing can't be that bizzare thos is it ? 15:06 < Bushmills> don't route /26, but /27 15:07 < ecrist> steelnwool: that's why i did all those funky push routes 15:07 < Bushmills> use for server one of the /27 addresses which isn't routed 15:07 < ecrist> Bushmills: read up 15:07 < Bushmills> trying to simplify, rather than route cluttering 15:07 < steelnwool> yeah, i htink our IP usage is all over the place tho. [i inherited this system, in 2 months its all gonna be NAT with privagte ip's anyways] 15:08 < napcae> push? 15:08 < Bushmills> pop 15:08 < napcae> .. 15:09 < steelnwool> ecrist: so i should probably just play around with the route values you sent me. like perhaps removing all but one and try to connect to something in that block. 15:12 < ecrist> sure, but what I gave you will get you everything 15:12 < steelnwool> what you gave me, does not work. 15:12 -!- napcae [n=napcae@i59F76047.versanet.de] has quit ["Changing server"] 15:12 < ecrist> why not? 15:13 < steelnwool> i don't know yet.. 15:13 < ecrist> what makes you think it doesn't work? 15:13 < steelnwool> um.. the lack of abilitty ping or connect to things. 15:13 < steelnwool> like 66.48.78.91 for example. 15:14 < ecrist> !logs 15:14 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 15:16 < steelnwool> while running a ping to .91 my server logs say something like this : Jan 13 16:13:40 vpn ovpn-server[10209]: jeffmacdonald/96.30.130.240:46157 UDPv4 READ [125] from 96.30.130.240:46157: P_DATA_V1 kid=0 DATA len=124 15:16 < steelnwool> Jan 13 16:13:40 vpn ovpn-server[10209]: jeffmacdonald/96.30.130.240:46157 TUN WRITE [84] 15:16 < steelnwool> turning up client logs now. 15:16 < steelnwool> Wed Jan 13 17:17:16 2010 us=384971 TUN READ [84] 15:16 < steelnwool> Wed Jan 13 17:17:16 2010 us=385127 UDPv4 WRITE [125] to 66.48.78.87:1194: P_DATA_V1 kid=0 DATA len=124 15:16 < steelnwool> from the client.. 15:17 < krzie> use pastebin to paste 15:24 < steelnwool> is there a chance my issues have anything to do with this statement ? http://pastebin.com/m7b3f7beb - about routing back to the openvpn client pool? 15:26 < steelnwool> here's my logs.. http://pastebin.com/m20cf475f 15:26 < ecrist> yes, you'll need to either provide reverse routing, or nat VPN clients to the VPN server IP 15:26 < ecrist> also, ip_forward needs to be enabled. 15:26 < steelnwool> oh that part is just so things behind the vpn can talk back to MY private net then? 15:26 < steelnwool> i don't really need that. 15:28 < ecrist> no 15:28 < ecrist> the systems on the VPN lan need to be able to route to 10.8.0.1/24 15:29 < steelnwool> so i guess thats waht is missing here? 15:29 < ecrist> yes 15:29 < ecrist> like I said, you can do it two ways 15:29 < ecrist> 1) NAT VPN clients to the server IP address 15:29 < steelnwool> i missed that i guess. 15:29 < ecrist> 2) provide a reverse path to the 10.8/24 subnet 15:30 < steelnwool> so that is a config i have to perform on every server.. is there a reason we might not have talked about that an hour ago? 15:30 < ecrist> because it wasn't the problem an hour ago 15:32 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 15:32 < steelnwool> but the problem set didn't change :) 15:33 < ecrist> sure it did 15:33 < ecrist> this is a separate issue from your other one 15:33 < steelnwool> how so? all i want to do is to be able to talk to .91 15:33 < ecrist> jesus man 15:34 < steelnwool> he definatly can't help me. 15:34 < ecrist> add in the reverse route and you'er all done 15:34 < krzie> lol 15:35 < steelnwool> via server.conf or the command line on the server? 15:37 < steelnwool> sorry i'm so dense. i don't know if you mean add the route on .91 to get to 10.8.0.1 or 10.8.0.2 or.. what in the hell... 15:37 < steelnwool> or i fyou mean add it on the vpn server... or. 15:37 < cron2> steelnwool: the *other* machines in the network need to know how to reach 10.8.0.x ("send it to the OpenVPN server") 15:38 < ecrist> on the network default gateway, type this at the CLO 15:38 < ecrist> I 15:38 < cron2> so, yes, if you want to talk to .91, the .91 needs to know how to reach 10.8.0.x 15:38 < ecrist> route add 10.8.0.0/24 ip.ip.ip.87 15:38 < steelnwool> ecrist: i have no access to the network gateway. 15:38 < ecrist> change ip.ip.ip to your ip range, i don't remember it 15:38 < krzie> sure, if .91 is all you care about make a persistent route on it to let it know that the vpn subnets are behind the local vpn machine 15:38 < krzie> !route 15:38 < vpnHelper> krzie: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 15:38 < ecrist> then type that on .91 15:38 < krzie> ROUTES TO ADD OUTSIDE OPENVPN 15:39 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit ["( www.nnscript.com :: NoNameScript 4.22 :: www.esnation.com )"] 15:39 < steelnwool> okay i typed this on .91 : route add 10.8.0.0/24 66.48.78.87 15:40 < steelnwool> pinging .91 still doesn't work. 15:41 < steelnwool> obviously this will be easy when the servers all get private ip's. 15:42 < krzie> it will be easy when you read that section of my routing doc and understand it 15:43 < steelnwool> krzie: i'll read it, but it doesn't seem analogous to my issue, because i'm trying to route to a public subnet.. whre routes already exist. 15:43 < steelnwool> and its hard when your document says i need ip forwarding yet ecrist says i do not need ip forwarding. so i'm getting conflicting info. 15:43 < steelnwool> but yes, i will read it. 15:43 < cron2> you need ip forwarding on the OpenVPN server machine 15:43 < ecrist> YOU DO NEED ip_forward 15:43 < steelnwool> oh. 15:44 < krzie> ohh 15:44 < steelnwool> one second then. 15:44 < havoc> if you have routes for packets coming from a non-local subnet you need ip forwarding 15:44 < krzie> i jumped in 1/2 way through, ill disapeer and let ecrist finish with ya 15:44 < ecrist> no, please don't 15:44 < krzie> lol 15:44 < ecrist> I've already checked out. 15:44 < ecrist> ;) 15:44 < cron2> havoc: nothing to do with "non-local subnet" - any time a machine is supposed to forward a packet from A to B, and neither "A" nor "B" are local addresses, you need ip forwarding 15:45 < havoc> cron2: I was trying to find language to explain it to someone who doesn't know routing 15:45 -!- vampyr [n=vampyr@i198189.upc-i.chello.nl] has joined ##openvpn 15:45 < havoc> it's tricky 15:45 < steelnwool> it works now. 15:45 < steelnwool> works just fine. 15:46 < havoc> cron2: and I just forgot the non-local destination bit 15:46 < cron2> havoc: mmmh, indeed. "If you receive packets from machine A and need to pass them on to machine B, you need ip_forward" 15:46 < havoc> cron2: and you're on neither machine A or B 15:46 < havoc> see, you forgot key bits too ;) 15:46 < cron2> if a packet is to travel A -> B -> C, B needs "ip_forward" 15:47 < havoc> cron2: this is your first mention of a 'C' ;) 15:47 < havoc> but yes, that's better 15:47 < cron2> redesign :) 15:47 -!- vampyr [n=vampyr@i198189.upc-i.chello.nl] has quit [Read error: 104 (Connection reset by peer)] 15:47 < havoc> see? explaing it is harder than doing it 15:47 < cron2> yes 15:47 < steelnwool> also, ssh on C knows nothing of the rsa keys on A, it is looking for them from B.. but thats trivial. my vpn works now. thanks guys. 15:48 < steelnwool> I know it was a struggle, but thank you. 15:48 < cron2> steelnwool: now *this* is a question on whether or not "B" does NAT (which will make the whole mess even more muddy) 15:48 < steelnwool> b doens't do nat in my case. 15:49 < cron2> in that case, C will see the SSH session coming from A, and will not know anything about B 15:49 -!- hagna [n=hagna@70.102.57.178] has joined ##openvpn 15:49 < cron2> (except that B is where IP packets to A need to be sent to, but that's not something sshd will know) 15:49 < steelnwool> in that case i'm not sure. i know i didn't setup nat. but there is a trnaslation between 10.8.0.1 and 66.48.78.91 so i guess that counts as nat. 15:51 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 15:53 < steelnwool> ecrist: if i was using a private subnet on the VPN lan, would i need to add routes on each machine still? part of me thinks yes. 15:55 < ecrist> yes 15:56 < steelnwool> okay. that struggle is out of the way then. now i just have to figure out how to "nat the vpn clients to the server address" 15:56 < steelnwool> which i guess you just mean nat 10.8.0.0/24 to say... 10.14.14.0/32 if 10.14.14.0/32 is my internal private block... 15:57 < steelnwool> or... just add a route on my gateway. once i have control of my gateway.... 16:02 -!- KaiForce [n=chatzill@adsl-70-228-89-235.dsl.akrnoh.ameritech.net] has quit ["ChatZilla 0.9.86 [Firefox 3.0.17/2009122116]"] 16:04 < hagna> where are the bsd openvpn ethernet bridging instructions? 16:04 < ecrist> not complete, but I can answer questions 16:05 < hagna> so it's possible? 16:05 < ecrist> yes 16:05 < ecrist> I run a bridged vpn on freebsd now 16:05 < hagna> do you have the start-bridge script handy? 16:06 < hagna> I'm on freebsd 16:06 < ecrist> no, I don't use that. ;) 16:06 < ecrist> let me grab my setup 16:06 < hagna> you don't use freebsd? 16:06 < ecrist> yes, I use freebsd 16:06 < ecrist> almost exclusively 16:06 < hagna> uh sleepy 16:06 < hagna> cool 16:07 < ecrist> in rc.conf, I have the following line: ifconfig_tap0="inet 172.30.20.1 netmask 255.255.255.0" 16:07 < ecrist> before that, cloned_interfaces="tap0" 16:07 < ecrist> bah, let me start over 16:07 < hagna> this is the client side? 16:08 < ecrist> no, server side 16:08 < hagna> ahh ok 16:08 -!- wulfgarpro [n=wulfgarp@mdiche1.lnk.telstra.net] has joined ##openvpn 16:08 < ecrist> this is what I have in /etc/rc.conf: http://pastebin.com/m1eabc4ed 16:10 < ecrist> this is my openvpn.conf config: http://pastebin.com/m5382f14e 16:10 < hagna> ok that's simple enough 16:10 < ecrist> I have one problem that I've been too lazy to fix, and that's where the tap0 interface isn't 'up' after a reboot 16:11 < hagna> huh I'm a newb to freebsd 16:11 < ecrist> in the config, change line 17 to: up ifconfig tap0 up 16:11 < hagna> so you just fixed it? 16:11 < ecrist> may have. let me test. 16:12 < hagna> line 17? mine only goes to 7 16:12 < ecrist> there were two pastebins 16:12 < krzie> heh, hes talking bout his line 17 16:12 < ecrist> the second is what I'm referring to 16:12 < hagna> ohh missed that 16:13 -!- caution [n=caution@unaffiliated/caution] has joined ##openvpn 16:14 < caution> !linnat 16:14 < vpnHelper> caution: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 16:15 < caution> ahh, I finally understand 16:15 < caution> --to is actually --to-source 16:16 < krzie> basically 16:16 < krzie> (its a SNAT) 16:17 < caution> basically? Isn't it identical? 16:17 < krzie> the --to does set the source 16:18 < caution> I thought iptables was expanding it to --to-source 16:18 < krzie> whether or not theres a --to-source i dunno 16:18 < krzie> im sure the man would tell ya that one tho 16:18 < caution> yes, I got that from the man 16:18 < krzie> ok then =] 16:18 < caution> I was confused why --to was used when it was actually --to-source 16:18 < ecrist> hagna: add 'up' to the end of the ifconfig_tap0 line 16:18 < ecrist> so: ifconfig_tap0="inet 172.30.20.1 netmask 255.255.255.0 up" 16:19 -!- caution [n=caution@unaffiliated/caution] has left ##openvpn [] 16:20 * ecrist is leaving. hagna if you have questions, please feel free to hit me up, but krzee is also a bsd guy 16:21 < krzie> yup and i am around, but im in and out (working) 16:22 < hagna> ecrist: thanks 16:23 < derRichard> !welcome 16:23 < vpnHelper> derRichard: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 16:29 < krzie> Also... I keep getting a fscking CUDA initialization error 16:29 < krzie> oops 16:42 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has quit ["Leaving"] 16:45 -!- mode/##openvpn [+s] by ChanServ 17:01 -!- wulfgarpro [n=wulfgarp@mdiche1.lnk.telstra.net] has quit [Client Quit] 17:12 -!- pimpatine is now known as mintaka 17:20 -!- chilicuil [n=sistemas@189.144.79.31] has joined ##openvpn 17:21 < hagna> I suppose the same server cannot connect client1 to tap0 and client2 to tap1 17:26 < mintaka> speaking of tap 17:31 < krzie> not the same server process 17:31 < krzie> but the same machine with 2 openvpn's running, sure 17:32 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has quit [Read error: 104 (Connection reset by peer)] 17:32 < hagna> krzie: ok makes sense 18:05 -!- newmember [n=chatzill@static-66-11-81-77.ptr.terago.net] has quit [Read error: 110 (Connection timed out)] 18:18 -!- Wired_Life [n=Chatzill@mgdb-4db8d038.pool.mediaWays.net] has joined ##openvpn 18:20 < Wired_Life> i have the problem openvpn @ windows 7 ultimate x64 the tap interface wont change ip and i cant ping anything 18:28 -!- hagna [n=hagna@70.102.57.178] has quit [Read error: 110 (Connection timed out)] 18:34 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 18:42 -!- Wired_Life [n=Chatzill@mgdb-4db8d038.pool.mediaWays.net] has left ##openvpn [] 19:12 -!- le0 [n=itsle0@host86-157-228-21.range86-157.btcentralplus.com] has joined ##openvpn 19:13 -!- eZ [n=eZ@201-93-218-229.dsl.telesp.net.br] has joined ##openvpn 19:13 < eZ> hi dudes, how are you ? 19:13 < eZ> can anyone help me with a simple question ? 19:14 < eZ> !welcome 19:14 < vpnHelper> eZ: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 19:14 < krzie> hi =] 19:14 < krzie> start with: 19:14 < krzie> !goal 19:14 < vpnHelper> krzie: "goal" is Please clearly state your goal for your vpn: example, I would like to access the lan behind the server , I would like to access the internet over my vpn , I just want a secure connection between 2 computers , etc 19:15 < eZ> there is a way to control old versions of the keys ? If a guy have a old version, with default password, he can access. I need to revoke only a specific version of keys. there is a way to control it ? 19:15 < krzie> version of keys? 19:17 < eZ> krzie: yes .. like .. the old sysadm and manager has a copy of all default keys... he got fired,so he can access via any key that he have a copy ...the users have the keys on their workstations, with newer password, but the guy has the old one. How can I assure that only the keys on the users can be used ? not the sysadm ? 19:18 < krzie> the old sysadmin has the ca.key i would suspect, is that correct? 19:19 < eZ> he has user1.key, user2.key, usern.key .. and maybe the ca.key too ... 19:21 < eZ> krzie: i think all the keys will need to be regenerated, right ? 19:21 < krzie> yes 19:21 < krzie> !crl 19:21 < vpnHelper> krzie: "crl" is (#1) --crl-verify A CRL (certificate revocation list) is used when a particular key is compromised but when the overall PKI is still intact. The only time when it would be necessary to rebuild the entire PKI from scratch would be if the root certificate key itself was compromised., or (#2) you can make use of CRL by using the revoke-full script in easy-rsa (packaged with openvpn) 19:21 < vpnHelper> krzie: that will create the CRL file for you. ssl-admin will also build a crl for you 19:21 < krzie> The only time when it would 19:21 < krzie> be necessary to rebuild the entire PKI from scratch would be if 19:21 < krzie> the root certificate key itself was compromised. 19:21 < krzie> thats your situation 19:22 < eZ> krzie: bad news for my customer ... lol ... i told him that ... i was not wrong after all .. thank you ver much :) 19:34 -!- le0 [n=itsle0@host86-157-228-21.range86-157.btcentralplus.com] has quit ["Leaving"] 19:41 < krzie> np 20:26 < tjz> hmm.. 20:26 < tjz> have a small problem with openvpn on dd-wrt router.. 20:27 < tjz> anyone have experience with openvpn dd-wrt router? 20:37 -!- Matir [n=david@c-98-251-88-239.hsd1.ga.comcast.net] has quit [Read error: 113 (No route to host)] 20:48 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 20:48 < theDoc> lolwut? 20:49 < theDoc> Problem isn't my firewall ;p 20:49 < steelnwool> sure it is. 20:49 < theDoc> It sure isn't. 20:56 < rob0> is too! is not! is too! 20:57 < rob0> Rabbit season! 21:00 < krzie> Duck season! 21:00 < rob0> Rabbit season! 21:02 < theDoc> is never! 21:02 < theDoc> ;p 21:04 * rob0 points the shotgun at the duck ... BLAM 21:05 < rob0> s/the duck/theDoc/ 21:05 < rob0> What's up Doc? 21:06 < theDoc> rob0> Too much work, too little sleep 21:57 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 22:05 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 23:03 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 23:27 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn --- Day changed Thu Jan 14 2010 00:41 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [] 00:57 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 01:29 -!- hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has left ##openvpn [] 01:30 -!- hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has joined ##openvpn 02:14 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:26 -!- chilicuil [n=sistemas@189.144.79.31] has quit [Read error: 60 (Operation timed out)] 02:26 -!- chilicuil [n=sistemas@189.191.135.225] has joined ##openvpn 03:07 -!- master_o1_master [n=master_o@p57B54C5B.dip.t-dialin.net] has joined ##openvpn 03:09 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 03:18 -!- master_of_master [i=master_o@p57B57B1C.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:21 -!- LobbyZ [n=default@main.lobbyzffs.com] has quit ["Free FTW"] 03:22 -!- LobbyZ [n=default@main.lobbyzffs.com] has joined ##openvpn 03:40 -!- trap_ [n=trap@host86-168-126-222.range86-168.btcentralplus.com] has quit [Read error: 60 (Operation timed out)] 03:47 -!- le0 [n=itsle0@host86-157-228-21.range86-157.btcentralplus.com] has joined ##openvpn 04:00 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 04:09 -!- Han [n=han@unaffiliated/han] has joined ##openvpn 04:10 < Han> Hi, I got push "route 1.2.3.4 255.255.255.255" on the server which sets up a route to my mailserver on the network. But now I need to figure out how to add a route from the server to that machine? 04:10 < Han> How should I do that? 04:19 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 04:19 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 04:20 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 04:21 -!- Han [n=han@unaffiliated/han] has left ##openvpn [] 04:22 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 04:22 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 04:22 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 04:34 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has joined ##openvpn 04:40 -!- huzaifas [n=huzaifas@115.240.191.139] has joined ##openvpn 04:58 -!- spiekey [n=mario@projekte.imos.net] has joined ##openvpn 04:58 < spiekey> Hello! 04:59 < spiekey> i have multipe OpenVPN Servers...and i want to manage the certs and keys on only one central server 04:59 < spiekey> any idea how i can do this? 05:02 < huzaifas> spiekey: all of them listen on the same interface? 05:11 -!- huzaifas [n=huzaifas@115.240.191.139] has quit [Remote closed the connection] 05:12 -!- Schlaubi [n=daniel@p5B0A168B.dip0.t-ipconnect.de] has joined ##openvpn 05:12 < Bushmills> spiekey: rather than relying on the key/cert server to be online as single point of failure for logins to all your vpn servers, I'd probably distribute certs and keys by script over a secure channel to the servers. 05:12 -!- Schlaubi [n=daniel@p5B0A168B.dip0.t-ipconnect.de] has left ##openvpn ["Verlassend"] 05:15 -!- eZ [n=eZ@201-93-218-229.dsl.telesp.net.br] has quit ["Lost terminal"] 05:15 < spiekey> i am planing to set up about 100 Firewalls and i want to manag them on openldap basis 05:15 < spiekey> i already have my config files in my openldap structure including password authentitification 05:15 < spiekey> now i only need to be able to manage that ca, key stuff centrally :) 05:22 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit ["I am off"] 05:31 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 05:40 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has joined ##openvpn 06:37 < _trine> when I use a public wifi access point my VPN gives me this message and stops further access to the net can anyone give me an answer to help solve it 06:37 < _trine> Replay-window backtrack occurred [1] 06:37 < _trine> on other wifi networks it works ok 06:42 -!- macsppadic [n=sonupunn@82.109.74.162] has joined ##openvpn 06:43 < macsppadic> wondering if anyone else has been seeing MULTI:status=1 messages when disconnecting and reconnecting the same client 06:43 < macsppadic> obtaining the ip address from server fine but cant ping anything - routing seems to be gone to hell 06:48 < Bushmills> macsppadic: client may have received a different ip address. check. 06:52 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 104 (Connection reset by peer)] 06:53 < macsppadic> hello Bushmills - just checked -the ip receieved is within the ifconfig-pool range 06:53 < Bushmills> different than the one before disconnect 06:53 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 06:55 < macsppadic> nope same IP - jsut did a test connect n disconnect three times - same Ip is being received from the server - i dont have a client-config-dir just a standard server config 06:55 < macsppadic> persist-key and persist-tun are set as well 06:55 < macsppadic> as per the docs 06:58 < macsppadic> am pushing 5 routes through in the openvpn server conf but none of those work as cant get to the gateway 06:59 < macsppadic> i can ping from the openvpn server to all the five routes ..so must be something in openvpn routing that i have fubared 06:59 < macsppadic> am using a bridged tap configuration 07:07 < macsppadic> can see echo request going out but no replies coming back when doing a tcpdump on the tap interface Bushmills 07:07 < ecrist> good morning 07:07 < Bushmills> sounds serverish 07:09 < ecrist> !configs 07:09 < vpnHelper> ecrist: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 07:09 < macsppadic> aye wondering if the firewall is doing anything funky ... 07:10 < ecrist> macsppadic what vpnHelper said was for you 07:11 -!- dazo_afk is now known as dazo 07:16 < macsppadic> hello ecrist http://pastebin.com/d5c11a146 07:19 -!- aep [n=aep@libqxt/developer/aep] has left ##openvpn ["WeeChat 0.3.1-dev"] 07:35 < ecrist> macsppadic: why do yo have such an odd set of routes? 07:36 < jmm> hello. 07:36 < macsppadic> hello ecrist- one of the clients has different vlan segments so need the mobile vpn connected client to be able to reach each of them 07:37 < macsppadic> they all go thru 131.254 gateway - which shud be pingable - but cant ping that once i connect in with openvpn 07:37 < macsppadic> the ip i receive is 131.246 07:37 < macsppadic> on connecting in with openvpn 07:37 < jmm> I wish to route all traffic from one client by the vpn, I tried using 'push redirect-gateway def1" in my ccd, but it doesn't seems to works, routes on the clients remain the same.can somebody help please ? 07:39 < ecrist> macsppadic: why are you using bridged mode? 07:39 < ecrist> jmm, we need configs and some sort of evidence of what you're saying is/is not happening 07:40 < jmm> ecrist: allright. 07:40 < macsppadic> ecrist - u reckon routing setup will be easier? 07:40 < ecrist> macsppadic: yes, we generally recommend routing here. 07:41 < macsppadic> just thought since bridging shud forward all traffic would make life easier - after tinkering the firewall that is ... 07:42 < ecrist> well, bridging is easier is some cases, but not the way you have your network subnetted. 07:46 < jmm> ecrist: http://pastebin.ca/1750956, tell me if you need something else. 07:50 < ecrist> jmm: logs, too, please: 07:50 < ecrist> !logs 07:50 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 07:51 < jmm> do you really want logs lvl to 6 ? it will make huge files. 07:51 < ecrist> yes, we really do 07:51 < jmm> okay, I'll add this. 07:57 < tjz> hey guys, do you have experience with openvpn on dd-wrt router? 07:57 < tjz> i have the openvpn connected successfully 07:57 < ecrist> limited. we can handle basic questions, but they bastardize it quite a bit 07:57 < tjz> but incoming traffic seem to be 'block' 07:57 < tjz> :( 07:58 < ecrist> tjz: check your firewall settings 07:58 < tjz> hmm.. 07:58 < tjz> i have this been run: 07:58 < tjz> iptables -t nat -F POSTROUTING 07:59 < ecrist> !iptables 07:59 < vpnHelper> ecrist: "iptables" is (#1) to test if iptables is your problem, disable all rules except $IPTABLES -P INPUT ACCEPT $IPTABLES -P OUTPUT ACCEPT $IPTABLES -P FORWARD ACCEPT, or (#2) then run iptables -F, iptables -Z after being SURE policies are set to accept, or (#3) please see http://openvpn.net/man#lbBD for more info, or (#4) see http://www.secure-computing.net/wiki/index.php/OpenVPN/Firewall 07:59 < tjz> it should have clear off everything, i think.. 07:59 < reiffert> ecrist: can you edit this stuff onthefly? 08:00 < reiffert> ecrist: we should add ;'s in #1 08:00 < ecrist> reiffert: I can edit only directly in db, otherwise it's a forget/relearn 08:01 < tjz> talking about briding.. 08:01 < tjz> bridging 08:01 < tjz> i am with this situation 08:01 < tjz> lol 08:01 < tjz> this openvpn was setup on router #2 08:01 < tjz> wall - router #1 - router #2 and pc 08:02 < tjz> :D 08:02 < tjz> reiffert, care to tell me what you like to edit on the fly ...like via from web-based? 08:03 < ecrist> reiffert: tell me how #1 should be formatted and I'll update 08:03 < ecrist> pleas 08:03 < ecrist> e 08:03 < reiffert> tjz: I was talking to ecrist, thats why I put his name in front of my question. 08:04 < reiffert> to test if iptables is your problem, disable all rules or put the defaults to accept: iptables -P INPUT ACCEPT; iptables -P OUTPUT ACCEPT; iptables -P FORWARD ACCEPT; 08:04 < jmm> ecrist: here are the logs : http://pastebin.ca/1750968 and http://pastebin.ca/1750972 . 08:04 -!- zobbo [n=icottee@82.109.74.162] has joined ##openvpn 08:04 -!- lettucefire [n=lettucef@82.109.74.162] has joined ##openvpn 08:04 < jmm> I had to shortend the server one a bit because it was too big. 08:05 < jmm> but I think all important informations are here. 08:05 < ecrist> !iptables 08:05 < vpnHelper> ecrist: '"iptables" is (#1) o test if iptables is your problem, disable all rules or put the defaults to accept: iptables -P INPUT ACCEPT; iptables -P OUTPUT \nACCEPT; iptables -P FORWARD ACCEPT;, or (#2) then run iptables -F, iptables -Z after being SURE policies are set to accept, or (#3) please see http://openvpn.net/man#lbBD for more info, or (#4) see http://www.secure- 08:05 < vpnHelper> ecrist: computing.net/wiki/index.php/OpenVPN/Firewall' 08:05 < ecrist> like that, reiffert? 08:06 < lettucefire> ping bloffers 08:07 < macsppadic> bloffers has left the building lettucefire 08:07 < lettucefire> ah ok ta macsppadic .. 08:07 < reiffert> ecrist: without that copy paste \n. 08:07 < ecrist> doh 08:07 -!- lettucefire [n=lettucef@82.109.74.162] has left ##openvpn [] 08:07 < reiffert> :) 08:08 < ecrist> !iptables 08:08 < vpnHelper> ecrist: "iptables" is (#1) o test if iptables is your problem, disable all rules or put the defaults to accept: iptables -P INPUT ACCEPT; iptables -P OUTPUT ACCEPT; iptables -P FORWARD ACCEPT;, or (#2) then run iptables -F, iptables -Z after being SURE policies are set to accept, or (#3) please see http://openvpn.net/man#lbBD for more info, or (#4) see http://www.secure- 08:08 < vpnHelper> ecrist: computing.net/wiki/index.php/OpenVPN/Firewall 08:10 < reiffert> great :) 08:10 < reiffert> thank you 08:10 < ecrist> np 08:13 -!- spiekey [n=mario@projekte.imos.net] has quit ["Ex-Chat"] 08:16 < tjz> reiffert, okay.. :D 08:23 -!- trap [n=trap@host86-168-126-222.range86-168.btcentralplus.com] has joined ##openvpn 08:23 < trap> will using an openvpn client with untangle on a nat'd network screw up things at all? 08:24 < ecrist> what is untangle? 08:24 < trap> just bundles a load of opensoucce stuff together 08:24 < trap> like snort/openvpn client into one pacakage 08:24 < trap> basically will using an openvpn client on a nat'd network make things weird? 08:24 < trap> ie.not working 08:25 < ecrist> nope 08:25 < ecrist> I'm connected to two different VPNs right now through a NAT 08:25 < jmm> I do too :) 08:25 < trap> nice 08:26 < trap> can snort sniff the unencrypted traffic? 08:26 < trap> it will be on the same box as the vpn client 08:26 < trap> i heard u can use snort to just sniff the plain packets ..? 08:26 < trap> after it gets decrypted in / beforei t gets encrypted on way out 08:26 < ecrist> it depends on where you're doing your sniffing 08:27 < ecrist> then sure, why couldn't it? 08:27 < trap> where should i be doing my sniffing ? 08:29 < tjz> ecrist, hmm... 08:29 < tjz> interesting.. 08:32 < jmm> so guys nobody can't help with routing all client traffic trough the vpn ? 08:32 < trap> im gonna be pyaing for shadowvpn 08:32 < trap> i want all my traffic to be going through shadowvpn . ..will that be hard to setup client side? 08:33 < ecrist> !def1 08:33 < vpnHelper> ecrist: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 08:34 -!- mattock1 [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 08:34 -!- mode/##openvpn [+o mattock1] by ChanServ 08:42 < jmm> ecrist: you didn't spotted something suspect in the logs ? 08:42 < ecrist> haven't looked yet 08:43 < tjz> i am planning to move away from gmail after seeing this one: http://www.youtube.com/watch?v=hrontojPWEE 08:43 < vpnHelper> Title: YouTube - The Google Toilet: SuperNews! (at www.youtube.com) 08:43 < tjz> :D 08:45 -!- zobbo [n=icottee@82.109.74.162] has left ##openvpn [] 08:47 < ecrist> jmm: what isn't working? 08:47 < jmm> the client doesn't seems to route traffic trough the vpn. 08:48 < ecrist> can you post your configs again (or just give me the link) 08:48 < jmm> sure. 08:48 < jmm> http://pastebin.ca/1750956 08:49 < ecrist> jmm: you want all traffic to go through the vpn? 08:50 < ecrist> line 28 of your pastebin is missing a double quote 08:50 < ecrist> I don't see anything in the logs about it trying to push the route 08:50 < jmm> my final objective is to route all traffic but a class. the current config is made to route all . 08:50 -!- Zahra [n=Zahra@unaffiliated/belendax] has joined ##openvpn 08:50 < jmm> lemme check line 28. 08:51 < jmm> it just on the pastebin. 08:51 < jmm> I got : push "redirect-gateway def1" 08:51 < jmm> in the config. 08:52 < Zahra> I've configed openvpn for my client & server & everything is true but I have this error: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 08:53 < jmm> ecrist: I do see the route pushed too, I don't understand why. 08:53 < ecrist> Zahra: logs 08:53 < ecrist> !logs 08:53 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 08:53 < Zahra> ecrist: server: http://pastebin.com/m5af35b18 client: http://pastebin.com/m7297d0f5 08:55 < ecrist> jmm: my guess is the ccd is names wrong, or something. 08:55 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has joined ##openvpn 08:55 < jmm> let's double check it ! 08:56 < ecrist> Zahra: you should update to 2.1.1 08:56 < jmm> ecrist: oh lol I think you are right. 08:56 < jmm> I'm banging my head on the wall for 2 hours. 08:57 < ecrist> the file needs to be named the same as what is in the client's CN 08:57 < jmm> thanks a lot man. 08:57 < Zahra> ecrist: r u share that it will be fixed after update? 08:57 < ecrist> no, that's a separate issue 08:57 < ecrist> I'm just telling you to update. 08:57 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 08:57 < ecrist> 2.0.9 is more than 4 years old 08:59 < ecrist> !configs 08:59 < vpnHelper> ecrist: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 08:59 < ecrist> Zahra: ^^^ 09:02 < Zahra> ecrist: server.conf http://pastebin.com/m129a518c client.conf http://pastebin.com/m51a79873 09:03 < ecrist> please dispose of the comments 09:05 -!- Kalculus [n=na@x40343ce2.ip.e-nt.net] has quit [Read error: 60 (Operation timed out)] 09:08 < Zahra> server http://pastebin.com/m7ee39bea client http://pastebin.com/m5bf0d523 09:10 < Zahra> ecrist: ^^ 09:10 < ecrist> Zahra: it really looks like there's network connection issues 09:10 < ecrist> nothing specifically openvpn related. 09:11 < ecrist> your configs look fine,and your logs don't indicate a problem. 09:14 -!- LobbyZ [n=default@main.lobbyzffs.com] has quit [Read error: 60 (Operation timed out)] 09:14 -!- havoc [n=havoc@saturn.chaillet.net] has quit [Read error: 60 (Operation timed out)] 09:14 -!- sno_ [n=sno@static.153.209.46.78.clients.your-server.de] has quit [Read error: 60 (Operation timed out)] 09:14 < jmm> ecrist: does by any chance you know how to route everything exept the local class of the client ? I find no docs about it. 09:14 -!- sno [n=sno@static.153.209.46.78.clients.your-server.de] has joined ##openvpn 09:14 < ecrist> !def1 09:14 < vpnHelper> ecrist: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 09:15 -!- LobbyZ [n=default@main.lobbyzffs.com] has joined ##openvpn 09:15 -!- havoc [n=havoc@saturn.chaillet.net] has joined ##openvpn 09:18 -!- corretico_ [n=laguilar@201.201.46.106] has joined ##openvpn 09:18 -!- tjz2 [n=tjz@bb116-15-75-62.singnet.com.sg] has joined ##openvpn 09:22 -!- tjz2 [n=tjz@bb116-15-75-62.singnet.com.sg] has quit [Client Quit] 09:22 -!- tjz2 [n=tjz@bb116-15-75-62.singnet.com.sg] has joined ##openvpn 09:23 -!- tjz [n=tjz@unaffiliated/tjz] has quit [Nick collision from services.] 09:23 -!- tjz2 is now known as tjz 09:26 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 09:32 -!- flo|va-nu-pied [n=florent@unaffiliated/flovanupied/x-758957] has quit [Read error: 110 (Connection timed out)] 09:35 -!- chilicuil [n=sistemas@189.191.135.225] has quit [Read error: 60 (Operation timed out)] 09:37 -!- chilicuil [n=sistemas@189.191.135.225] has joined ##openvpn 09:45 -!- ez [n=ez@200.169.162.250] has joined ##openvpn 09:45 < ez> !goal 09:45 < vpnHelper> ez: "goal" is Please clearly state your goal for your vpn: example, I would like to access the lan behind the server , I would like to access the internet over my vpn , I just want a secure connection between 2 computers , etc 09:46 -!- chilicuil [n=sistemas@189.191.135.225] has quit [Read error: 60 (Operation timed out)] 09:47 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 09:48 -!- chilicuil [n=sistemas@189.191.135.225] has joined ##openvpn 09:52 -!- Otacon22 [n=otacon22@93-36-88-88.ip59.fastwebnet.it] has joined ##openvpn 09:52 < Otacon22> How can i check the expire time of a CA certificate? 09:58 < ecrist> with openssl command 09:59 < Otacon22> ovviusly 09:59 < Otacon22> but how 09:59 < Otacon22> ? 09:59 < ecrist> !verifyca 09:59 < vpnHelper> ecrist: Error: "verifyca" is not a valid command. 09:59 < ecrist> !verify 09:59 < vpnHelper> ecrist: Error: "verify" is not a valid command. 09:59 < ecrist> !certverify 09:59 < vpnHelper> ecrist: "certverify" is verify your certs are signed correctly by running `openssl verify -CAfile ` for client.crt and server.crt 09:59 < Otacon22> ok 10:09 -!- teddymills [n=teddy@208.92.235.227] has quit ["Ex-Chat"] 10:10 < Otacon22> ecrist, the verify says me that is all ok, but it is not ok. 10:10 < Otacon22> i've created a ca.key and ca.cert with an expire time of 3650 days 10:10 < Otacon22> and i've signed a request of a client with the option --days 3650 with openssl 10:11 < Otacon22> then i've tried and all was working 10:11 < ecrist> OK, so what is your issue? 10:11 < Otacon22> then i've changed in the future the time on the server and on the client 10:11 < Otacon22> (1 year in the future) 10:11 < Otacon22> and nothing working 10:11 < Otacon22> Fri Jan 14 18:06:36 2011 us=969187 VERIFY ERROR: depth=0, error=certificate has expired: /C=AU/ST=Some-State/O=Internet_Widgits_Pty_Ltd/CN=Otacon22_VPN_main_Server 10:11 < Otacon22> where is the problem? I can't understand 10:12 -!- teddymills [n=teddy@208.92.235.227] has joined ##openvpn 10:15 < Otacon22> ecrist, any suggestions for me? 10:16 < reiffert> !masq 10:16 < vpnHelper> reiffert: Error: "masq" is not a valid command. 10:16 < reiffert> !factoids search masq 10:16 < vpnHelper> reiffert: No keys matched that query. 10:16 < reiffert> !factoids search --values masq 10:16 < vpnHelper> reiffert: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 10:16 -!- chilicuil [n=sistemas@189.191.135.225] has quit [Success] 10:16 < reiffert> !winnat 10:16 < vpnHelper> reiffert: "winnat" is http://support.microsoft.com/kb/306126 for windows nat (windows calls it internet connection sharing aka ICS) 10:17 < reiffert> !forward 10:17 < vpnHelper> reiffert: Error: "forward" is not a valid command. 10:17 < reiffert> !ipforward 10:17 < vpnHelper> reiffert: "ipforward" is please choose between !linipforward !winipforward and !fbsdipforward 10:17 -!- chilicuil [n=sistemas@189.191.135.225] has joined ##openvpn 10:17 < reiffert> !winipforward 10:17 < vpnHelper> reiffert: "winipforward" is http://support.microsoft.com/kb/315236 to enable ip forwarding on windows 10:19 < havoc> hmm, I always use netsh to enable IP forwarding in windows 10:19 < havoc> I *think* it sets the reg key 10:19 -!- chilicuil [n=sistemas@189.191.135.225] has quit [Read error: 54 (Connection reset by peer)] 10:20 -!- chilicuil1 [n=sistemas@189.191.135.225] has joined ##openvpn 10:26 < ecrist> working on a minor ssl-admin update 10:27 -!- napcae [n=napcae@i59F76F00.versanet.de] has joined ##openvpn 10:27 < napcae> hi 10:28 < napcae> i have a problem, i can connect to my vpn server, but i don't get a new ip on whatsmyip.org 10:30 -!- chilicuil1 [n=sistemas@189.191.135.225] has quit [Read error: 60 (Operation timed out)] 10:31 < napcae> anybody there? 10:36 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has quit [Read error: 60 (Operation timed out)] 10:44 -!- polaru [n=polaru@93.113.192.70] has quit [Remote closed the connection] 10:44 < dazo> napcae: (I'm in a meeting now) ... sounds --redirect-gateway is not correctly setup on your client 10:46 < napcae> should i post my client config? 10:48 < krzie> !configs 10:48 < vpnHelper> krzie: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 10:48 < krzie> also, heres a basic checklist 10:48 < krzie> !redirect 10:48 < vpnHelper> krzie: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 10:50 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has joined ##openvpn 10:51 -!- chilicuil [n=sistemas@189.191.135.225] has joined ##openvpn 10:51 < napcae> client conf: 10:51 < napcae> client 10:51 < napcae> dev tun 10:51 < napcae> proto udp 10:51 < napcae> remote napcae.dyndns.org 10:51 < napcae> resolv-retry infinite 10:51 < napcae> nobind 10:52 < napcae> persist-key 10:52 < napcae> persist-tun 10:52 < napcae> ca ca.crt 10:52 < napcae> cert lindenhome-napcae.crt 10:52 -!- le0 [n=itsle0@host86-157-228-21.range86-157.btcentralplus.com] has quit [Read error: 110 (Connection timed out)] 10:52 < napcae> key lindenhome-napcae.key 10:52 < napcae> comp-lzo 10:52 < napcae> verb 3 10:52 < krzie> whoaaa 10:52 < krzie> !pastebin 10:52 < vpnHelper> krzie: "pastebin" is (#1) please paste anything with more than 5 lines into pastebin or a similar website, or (#2) ie: www.pastebin.ca 10:53 < krzie> that was made clear in the welcome message when you joined 10:53 < krzie> 35mb cpp!? 10:53 < napcae> ahh okay, sry 10:54 < krzie> np 10:54 < napcae> i new to that 10:54 < krzie> !configs 10:54 < vpnHelper> krzie: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 10:54 < krzie> ~redirect 10:54 < krzie> !redirect 10:54 < vpnHelper> krzie: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 10:55 < napcae> I'm sry, but i don't understand what you mean :S 10:55 -!- chilicuil [n=sistemas@189.191.135.225] has quit [Read error: 54 (Connection reset by peer)] 10:55 < krzie> what part dont you understand 10:55 -!- chilicuil1 [n=sistemas@189.191.135.225] has joined ##openvpn 10:55 < napcae> what do you mean with !configs; !redirect 10:56 < napcae> where i have to type that in? 10:56 < krzie> read what my bot tells you 10:56 < krzie> im giving commands to my bot 10:56 < krzie> !bot 10:56 < vpnHelper> krzie: "bot" is I'm a bot.. just a bot. krzee is my maintainer, and I haven't said anything, if you'd notice, the person who spoke just before me gave a !command to make me speak :P 10:57 < napcae> okay, i'll check my server.conf 10:58 -!- chilicuil1 [n=sistemas@189.191.135.225] has quit [Read error: 54 (Connection reset by peer)] 10:59 -!- chilicuil [n=sistemas@189.191.135.225] has joined ##openvpn 10:59 < Otacon22> damn certificates! 11:00 < Otacon22> it's since 2 hours that i'm tring to create a certificate wich could work for more than 1 month 11:01 -!- napcae [n=napcae@i59F76F00.versanet.de] has quit ["Lost terminal"] 11:04 < ecrist> krzie: I've finally automated the freebsd portbuild of ssl-admin 11:04 -!- le0 [n=itsle0@host86-157-228-21.range86-157.btcentralplus.com] has joined ##openvpn 11:04 < ecrist> working on a batch update to get rid of some of the extra confirmations from openssl command line call 11:05 < ecrist> hoping to submit the patch today after testing 11:06 -!- krzee [i=nobody@unaffiliated/krzee] has quit [Read error: 54 (Connection reset by peer)] 11:08 -!- napcae [n=napcae@i59F76F00.versanet.de] has joined ##openvpn 11:09 < napcae> sry, my keyboard didn't write anymore;had to restart 11:10 < napcae> http://pastebin.com/m28c5ebab 11:10 < Otacon22> ecrist, please could you check this commands wich i've used to create certificates? http://pastebin.com/f2fa66310 11:10 < napcae> i think i have to change "redirect gateway" 11:11 < Otacon22> if i can find the error i will finish to write my guide (in italian) about how to build up a openvpn network 11:11 < ecrist> what do you think is wrong with your certificates? 11:12 < Otacon22> ecrist, expire time 11:12 < ecrist> why do you think it is wrong? 11:12 < Otacon22> because every 1 month i must regenerate all client certificates 11:13 < Otacon22> and ca certificate 11:15 < ecrist> your commands look OK to me. 11:19 < ecrist> krzie: you around? 11:21 < Otacon22> ecrist, sure? uff, but it is not working ! 11:21 < Otacon22> GH 11:22 -!- macsppadic [n=sonupunn@82.109.74.162] has left ##openvpn [] 11:26 < krzie> hey just got back 11:27 < krzie> napcae, so your server has NAT and ip forwarding enabled? 11:27 -!- chilicuil1 [n=sistemas@189.191.135.225] has joined ##openvpn 11:27 -!- le0 [n=itsle0@host86-157-228-21.range86-157.btcentralplus.com] has quit ["Leaving"] 11:28 < ecrist> krzie: I have some changes to ssl-admin, if you could help test them 11:29 < napcae> ip forwarding 1 11:29 < napcae> and NAT, from the how to iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE 11:30 < napcae> it should work now, but I can't test it yet 11:30 < krzie> ecrist sure 11:30 < krzie> ecrist are they in trunk? 11:30 < ecrist> let me put it somewhere for you 11:31 < krzie> ok 11:31 < ecrist> yes, the changes are 11:31 -!- chilicuil [n=sistemas@189.191.135.225] has quit [Read error: 104 (Connection reset by peer)] 11:31 < krzie> ahh ya if you could gimme the tgz it would be easier 11:31 < ecrist> if you just want the ports patch, I can make that avaialble 11:31 < krzie> my unix box here has no inet access 11:31 < ecrist> you want freebsd version? 11:31 < krzie> ya 11:31 < krzie> and ill just toss in the dir 11:32 < ecrist> ftp://ftp.secure-computing.net/pub/FreeBSD/ports/ssl-admin/ssl-admin-1.0.3.tar.gz 11:32 < ecrist> that for the ports build 11:33 < ecrist> here's the patch: http://pastebin.com/m221ea56e 11:33 < napcae> is there i way to test my configuration in the lan? 11:33 < ecrist> run that patch on /usr/ports/security/ssl-admin 11:34 < krzie> is part of the update a real makefile (bypassing my super ugly configure attempt) ? 11:50 < krzie> Patching file Makefile using Plan A... 11:50 < krzie> Hunk #1 failed at 1. 11:50 < krzie> 1 out of 1 hunks failed--saving rejects to Makefile.rej 11:52 < krzie> hrm nm\ 11:52 < krzie> got it now 11:56 -!- chilicuil [n=sistemas@189.191.135.225] has joined ##openvpn 11:59 < ecrist> most of the changes in svn were related to my packaging up for the port 11:59 < ecrist> the real program change was the addtion of the -batch flag to openssl to not ask for vars that are set already 12:01 -!- dauergast [n=sag@g225217008.adsl.alicedsl.de] has joined ##openvpn 12:08 < krzie> any changes to the config gile? 12:08 < krzie> file 12:08 < krzie> or can i just install right over the old one 12:08 -!- chilicuil1 [n=sistemas@189.191.135.225] has quit [Connection timed out] 12:13 -!- chilicuil [n=sistemas@189.191.135.225] has quit [Success] 12:14 -!- openvpn2009 [n=email@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 12:15 -!- mode/##openvpn [+o openvpn2009] by ChanServ 12:15 < napcae> i added push "redirect-gateway" 12:15 < napcae> to my server config 12:15 < napcae> but I'm stuck on my router configuration 12:28 < ecrist> !def1 12:28 < vpnHelper> ecrist: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 12:28 < ecrist> krzie: just install over the existing one 12:29 < krzie> your router config napcae ? 12:29 < trap> im paying for a commercial openvpn service called shadowvpn ...its a subset of xerobank ....using my openvpn client can i route ALL my internet traffic through the vpn ? 12:29 < krzie> trap, we know nothing of that service 12:30 < krzie> but if they are setup for that, and use openvpn, sure 12:30 < ecrist> you need to contact their support 12:30 < krzie> yes, what ecrist said 12:30 < krzie> if you ran both sides we could help you 12:34 -!- chilicuil [n=sistemas@189.191.135.225] has joined ##openvpn 12:43 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 12:47 -!- hagna [n=hagna@173-10-30-5-BusName-utah.ut.hfc.comcastbusiness.net] has joined ##openvpn 12:49 < hagna> http://pastebin.com/m7ccddd8f shows a simple server and client config for p2p with certs, but it won't connect and the server says ECONREFUSED]: Connection refused (code=111) 12:53 < ecrist> firewall 12:53 < ecrist> we've been over this 12:54 -!- corretico_ [n=laguilar@201.201.46.106] has quit ["Leaving"] 12:54 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 13:00 < hagna> I'd agree if p2p with these config files didn't work http://pastebin.com/m1b5b96a1 13:01 < hagna> is the client trying to tcp in the former example? 13:01 < hagna> s/to tcp/to do tcp 13:02 < trap> does anybody know of some trustworthy vpn providers who dont keep logs, where you can choose between a load of different ips for you vpn in different countries 13:02 < trap> i dont want the same vpn ip all the time 13:03 < trap> i want different us vpn ips every time i use the service..or atleast a big selection 13:04 < napcae> okay, i tried my config with a friend 13:04 < napcae> he said, that he can't ping any machines of mine in my networ 13:06 < hagna> ecrist: nm it's a cert verify failure I missed it 13:07 < napcae> btw, server.conf 13:07 < napcae> http://pastebin.com/d1118732e 13:12 < krzie> napcae 13:13 < krzie> !goal 13:13 < vpnHelper> krzie: "goal" is Please clearly state your goal for your vpn: example, I would like to access the lan behind the server , I would like to access the internet over my vpn , I just want a secure connection between 2 computers , etc 13:16 -!- caesar_ [n=napcae@i59F76F00.versanet.de] has joined ##openvpn 13:17 < caesar_> wth? 13:17 < caesar_> napcae=caesar 13:17 < caesar_> did you say something krzie ? 13:19 < hagna> he said !goal 13:20 < caesar_> ty, replied yet 13:22 -!- napcae [n=napcae@i59F76F00.versanet.de] has quit [Read error: 54 (Connection reset by peer)] 13:26 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 13:27 -!- napcae [n=napcae@i59F76F00.versanet.de] has joined ##openvpn 13:30 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has joined ##openvpn 13:33 < napcae> ? 13:33 < napcae> seems to work 13:40 -!- caesar_ [n=napcae@i59F76F00.versanet.de] has quit [Read error: 110 (Connection timed out)] 13:42 -!- Holister [n=ryan@static-151-204-189-39.pskn.east.verizon.net] has quit [Read error: 104 (Connection reset by peer)] 13:42 -!- Holister [n=ryan@static-151-204-189-39.pskn.east.verizon.net] has joined ##openvpn 13:44 -!- Holister [n=ryan@static-151-204-189-39.pskn.east.verizon.net] has quit [Read error: 104 (Connection reset by peer)] 13:45 -!- Holister [n=ryan@static-151-204-189-39.pskn.east.verizon.net] has joined ##openvpn 13:47 -!- napcae [n=napcae@i59F76F00.versanet.de] has quit ["Lost terminal"] 13:53 -!- chilicuil [n=sistemas@189.191.135.225] has quit [Connection reset by peer] 14:25 -!- Zahra [n=Zahra@unaffiliated/belendax] has quit ["Leaving."] 14:29 -!- chilicuil [n=sistemas@189.191.135.225] has joined ##openvpn 14:36 < krzie> ecrist still here? 14:41 < ecrist> yep 14:42 -!- Section58 [n=steve@ipt0-2.core.bsd.uk.phib3r.net] has quit [Read error: 60 (Operation timed out)] 14:44 < ecrist> krzie: what you need? 14:44 < krzie> did you make the meetings on mon/tues? 14:44 < ecrist> yes 14:44 < krzie> traveling for work and whatnot kept me from making it 14:45 < ecrist> logs are available 14:45 < krzie> howd it go? anything cool? 14:45 < krzie> ahh nice 14:46 < ecrist> http://secure-computing.net/logs/openvpn-20090111.log 14:46 < ecrist> http://secure-computing.net/logs/openvpn-20090112.log 14:47 < ecrist> ah, 'fortune -o' is great 14:48 -!- hagna [n=hagna@173-10-30-5-BusName-utah.ut.hfc.comcastbusiness.net] has quit ["leaving"] 14:49 * rob0 <3 fortune(6) 14:50 < ecrist> directories I don't want indexed on my web server simply cat fortune -o 14:50 < ecrist> ;) 14:51 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has quit [] 14:51 < rob0> oh haha nice 14:52 -!- mattock1 [n=samuli@dyn55-11.yok.fi] has quit ["Leaving."] 14:55 < krzie> lol 14:56 < dazo> Q: How does a Unix guru have sex? 14:56 < dazo> A: unzip;strip;touch;finger;mount;fsck;more;yes;umount;sleep 14:57 < krzie> who; last; talk; read; pause; grep; touch; finger; unzip; head; mount 14:57 < krzie> /dev/girl -t wet; fsck; fsck; fsck; fsck; yes; yes; yes; umount 14:57 < krzie> /dev/girl; zip; rm -rf wet.spot; sleep; 14:58 < dazo> heh 14:58 -!- chilicuil [n=sistemas@189.191.135.225] has quit [Connection reset by peer] 15:01 < ecrist> Q: What do you call a truck load of vibrators? 15:01 < ecrist> A: Toys for twats. 15:02 < hyper_ch> what's a twat? 15:03 < ecrist> The word twat has various functions, its primary meaning being a vulgar synonym for the human vulva, vagina, or clitoris. .. 15:03 < rob0> That's a slang term ... 15:04 < hyper_ch> ah :) 15:15 < havoc> geez, so I installed win2k8 web ed., NOT R2, did everything idential, even used same configs, and everything magically works now 15:15 < havoc> so definitely an R2 issue 15:28 -!- trap_ [n=trap@host86-162-65-161.range86-162.btcentralplus.com] has joined ##openvpn 15:28 -!- trap [n=trap@host86-168-126-222.range86-168.btcentralplus.com] has quit [Read error: 110 (Connection timed out)] 15:28 -!- dazo is now known as dazo_afk 15:30 -!- ez [n=ez@200.169.162.250] has quit ["leaving"] 15:38 < havoc> and win2k8 still has MTU issues, have to use mssfix to make it work 15:47 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 15:59 -!- dauergast [n=sag@g225217008.adsl.alicedsl.de] has quit ["Widersprich nie einer Frau! Warte einen Augenblick, dann tut sie es selbst"] 16:08 < vpnHelper> New forum entry openvpnforum: Server Administration :: MULTI: new incoming connection would exceed maximum number o :: Author ... 16:34 -!- trap_ [n=trap@host86-162-65-161.range86-162.btcentralplus.com] has quit [Read error: 110 (Connection timed out)] 16:35 -!- trap_ [n=trap@host86-162-65-239.range86-162.btcentralplus.com] has joined ##openvpn 16:37 -!- hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has quit [Read error: 60 (Operation timed out)] 16:37 -!- hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has joined ##openvpn 16:46 -!- Lantizia [n=Lantizia@212.57.229.111] has joined ##openvpn 17:08 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 17:22 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has quit [Read error: 104 (Connection reset by peer)] 17:47 -!- dunc_ [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Remote closed the connection] 17:48 -!- invalidrecord [n=biodroid@client-80-3-173-31.cht-bng-011.adsl.virginmedia.net] has joined ##openvpn 17:49 < invalidrecord> !welcome 17:49 < vpnHelper> invalidrecord: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 17:49 < invalidrecord> !redirect 17:49 < vpnHelper> invalidrecord: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 17:49 < invalidrecord> !def1 17:49 < vpnHelper> invalidrecord: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 17:51 < invalidrecord> great bot guys all the silly bits out of the way we need one in ror 17:51 < invalidrecord> !nat 17:51 < vpnHelper> invalidrecord: "nat" is (#1) http://openvpn.net/howto.html#redirect for an explanation of NAT as it applies to openvpn, or (#2) http://www.secure-computing.net/wiki/index.php/OpenVPN/FAQ#Traffic_forwarding_doesn.27t_work_when_using_client_specific_access_rules, or (#3) dont forget to turn on ip forwarding, or (#4) please choose between !linnat and !fbsdnat for specific howto 17:51 < rob0> !factoids 17:51 < vpnHelper> rob0: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 17:51 < invalidrecord> ohh sweet 17:51 < rob0> ^^ that has the whole thing 17:51 < rob0> yw 17:51 < invalidrecord> cheers man 17:52 < invalidrecord> how does openvpn compare to freeswan etc? 17:52 < rob0> Anyone who reads the /topic when joining a channel can't be all bad. :) 17:53 < rob0> Well, openvpn is what's called a SSL VPN, whereas Freeswan is IPSec. 17:53 < invalidrecord> ahh so an ssl vpn is what like l2tp 17:53 < invalidrecord> or ptptp 17:54 < invalidrecord> bahh im being lazy i can google 17:54 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 17:54 < rob0> Depends on your needs. If you're going to push crap through the tunnel and push the limits all the time, maybe ipsec is better. 17:54 < invalidrecord> no i want my imap to work when im on the college wifi 17:55 < invalidrecord> ohh and hulu vids ;) 17:55 < rob0> SSL VPN means there's a single port which carries the connection, and it's secured by SSL, the same as HTTPS and so on. 17:55 < invalidrecord> ok and what it does some multiplexing sort of like socks\ 17:55 < rob0> You'll be able to get through a nasty proxy server with openvpn. I don't know, with ipsec. 17:56 < invalidrecord> ipsec is a bitch 17:56 < rob0> openvpn can actually share a port such as 443/tcp, share it with your httpd. 17:56 -!- byu [n=clastu@202.71.103.246] has joined ##openvpn 17:56 < invalidrecord> i was close to going the ssh route but i want something a bit less hacky\ 17:56 < invalidrecord> ohh i can share it on my 8080 17:56 < rob0> (although ideally you would not want to run openvpn on TCP) 17:57 < rob0> try UDP first, see if you can get out 17:57 -!- byu [n=clastu@202.71.103.246] has quit [Client Quit] 17:57 < invalidrecord> yes the overhead + enc would be a bit heavy\ 17:57 < rob0> right 17:58 < invalidrecord> well ill go check my nat etc before firing off questions, no doubt ill still come back to a 'have you plugged it in?' type of solution. Price of being blonde 17:59 < rob0> :) 17:59 < invalidrecord> can you belive my college blocks /. that was the last straw 18:00 < invalidrecord> how will i know when textmate2 is out \ 18:02 < rob0> well, I generally have a low opinion of "education", so stuff like that does not surprise me. 18:02 < invalidrecord> !linnat 18:02 < vpnHelper> invalidrecord: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 18:03 < invalidrecord> its just frustrating as their tech guys are well i would have them on my servers put it that way 18:03 < invalidrecord> the temptation to fuck with them is imense 18:03 < invalidrecord> integer based 4 digit password you cant change for example 18:15 -!- biodroid [n=biodroid@client-80-3-173-31.cht-bng-011.adsl.virginmedia.net] has joined ##openvpn 18:15 -!- invalidrecord [n=biodroid@client-80-3-173-31.cht-bng-011.adsl.virginmedia.net] has quit [Read error: 104 (Connection reset by peer)] 18:18 -!- biodroid is now known as invalidrecord 18:19 -!- invalidrecord is now known as invalidrecord_ 18:19 -!- invalidrecord_ [n=biodroid@client-80-3-173-31.cht-bng-011.adsl.virginmedia.net] has quit [Remote closed the connection] 18:24 -!- Lantizia [n=Lantizia@212.57.229.111] has quit ["Leaving"] 18:28 -!- DarkAnt [n=DarkAnt@c-24-63-224-114.hsd1.ma.comcast.net] has joined ##openvpn 18:46 < DarkAnt> This is my first time trying to set up a vpn and I need a bit of help solving this problem. 18:46 < DarkAnt> I have a centos 5.3 box acting as the openvpn server 18:46 < DarkAnt> and a windows 7 box acting as the client 18:46 < DarkAnt> they're both on the same lan 18:47 < DarkAnt> now the client is sending to the server 18:47 < DarkAnt> and I've captured those packets on the server 18:47 < DarkAnt> but the client is not connecting, I keep getting P_CONTROL_HARD_RESET_CLIENT_V2 18:48 < DarkAnt> I'll post the configs and logs: 18:48 < DarkAnt> server conf: http://pastebin.im/1599 18:50 < DarkAnt> client conf: http://pastebin.im/1600 18:51 < DarkAnt> client log: http://pastebin.im/1601 18:52 < DarkAnt> server log: http://pastebin.im/1602 18:57 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has quit ["Leaving"] 18:58 < reiffert> be sure that you are on openvpn-2.1.1 and dont do openvpn when on the same lan (for the beginning) 18:59 < reiffert> when those two maschines are on the same lan. 18:59 < havoc> it can work, you just have to make sure you have the right metrics for the routes 18:59 < havoc> but if he can't get it working initially it's probably best not to be on same enet segment 19:00 < DarkAnt> ok 19:00 < reiffert> try with a simple setup, get insane later. 19:00 < havoc> my laptop stays connected to work and home no matter where I am, even if/when on same lan, it's nice :) 19:00 < havoc> yeah, what reiffert said :) 19:01 < DarkAnt> so don't be on the same lan, anything else that could make it simpler? 19:01 < DarkAnt> and update my version of openvpn 19:01 < havoc> don't muck about with DHCP or anything 19:01 < havoc> get keys made and vpn connections working 19:01 < havoc> and make sure firewalls allow everything to start for initial setup and testing 19:02 < DarkAnt> yeah, I'm mostly using the stock config files 19:02 < havoc> and yes, use latest versions of everything 19:02 < DarkAnt> ok 19:02 < havoc> just get it *working* first, then tweak 19:02 < DarkAnt> oh, I was trying to just get it to work 19:02 < DarkAnt> tweaking was later :P 19:03 < DarkAnt> if my firewall was rejecting, would I still be able to capture the packets via tcpdump? 19:04 < havoc> that depends on where tcpdump was running 19:05 < havoc> if it's behind the FW, then No. ;) 19:05 < DarkAnt> yeah, I'm not sure where it is. I'd assume it would be behind the firewall 19:05 < havoc> ecrist: so anyway, I'm trying win2k8r2 again, I have some ideas 19:05 < DarkAnt> I guess I could go test 19:05 < havoc> it'll either not work, or be an OMFG moment 19:05 < DarkAnt> ok, thanks guys :) 19:06 < havoc> DarkAnt: good luck :) 19:13 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 19:13 < theDoc> Morn' all. 19:14 < havoc> morning 19:16 < theDoc> Oh lord, lol. 19:16 < theDoc> http://i.imgur.com/68eug.jpg 19:18 < tjz> lol 19:19 < havoc> jesus fucking allah 19:19 < tjz> lol 19:19 < havoc> there's a good reason why I make every effort to avoid Humanity 19:21 < theDoc> I just lost more faith in humanity 19:21 < theDoc> lol 19:21 < havoc> I sincerely hope that's in jest, but I fear it's not as I've seen too many real examples of similar beliefs 19:21 < theDoc> Considering that the above was the FIRST thing I saw when I got onto digg.com this morning. 19:26 < rob0> Aww, that's hard to believe. Bible thumpers don't condone rape; they want the state to kill all accused murderers and rapists and robbers and drug vendors and users (and speeders, and jaywalkers ...) 19:29 * havoc considers Poe's Law 19:30 < DarkAnt> he's trolling 19:45 -!- Wired_Life [n=Chatzill@mgdb-4db8c302.pool.mediaWays.net] has joined ##openvpn 19:46 < Wired_Life> hello is that possible to see any host in openvpn client network? 19:48 < Wired_Life> route add clientnetwork mask 255.255.255.0 serverip @ server dont work 20:09 < freaky[t]> why does the moon not fall down to earth ;D 20:34 < Wired_Life> is there anywhere a good net to net how to ? 20:41 < krzee> !route 20:41 < vpnHelper> krzee: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 21:04 -!- pekster [n=pekster@c-76-113-143-76.hsd1.mn.comcast.net] has left ##openvpn [""""] 21:05 -!- Wired_Life1 [n=Chatzill@mgdb-4db8d279.pool.mediaWays.net] has joined ##openvpn 21:10 -!- Wired_Life [n=Chatzill@mgdb-4db8c302.pool.mediaWays.net] has quit [Read error: 60 (Operation timed out)] 21:56 < Wired_Life1> krzee is that possible to change from tap to tun with this config? http://pastebin.com/d1c14adae 22:21 -!- Wired_Life1 [n=Chatzill@mgdb-4db8d279.pool.mediaWays.net] has quit ["Und tschüss!"] 23:49 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] --- Day changed Fri Jan 15 2010 00:22 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [] 00:34 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 00:54 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 01:40 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit ["Leaving"] 02:08 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:10 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: ycy_, havoc, Intensity, alan`, stein0, disco-, Nappy, phusion__, tarbo2_, hobbsc, (+26 more, use /NETSPLIT to show all of them) 02:10 -!- Netsplit over, joins: d12fk 02:12 -!- Netsplit over, joins: +Kas, mintaka, dazo_afk, drue, krzee, Rolybrau, Otacon22, havoc, phusion__, Intensity (+25 more) 02:14 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: cron2 02:15 -!- cron2 [n=gert@blue.greenie.muc.de] has joined ##openvpn 02:17 -!- sdh [n=steve@188.40.36.167] has quit [Read error: 104 (Connection reset by peer)] 02:18 -!- sdh [n=steve@steve.st] has joined ##openvpn 02:25 < tjz> split split split.. :( 02:27 < hyper_ch> join, join, join :) 02:40 < jmm> hi. 02:40 < reiffert> moin 02:43 -!- LowKey [i=rhel@unaffiliated/lowkey] has quit [Read error: 104 (Connection reset by peer)] 02:43 < reiffert> nen live ticker hats da auch irgendwo 02:43 -!- LowKey [i=rhel@72.20.37.172] has joined ##openvpn 02:43 < reiffert> http://live.24hseries.com/ 02:43 < vpnHelper> Title: 24H Series - endurance racing : 24H Dubai 2010 Live (at live.24hseries.com) 02:43 < reiffert> ww 02:49 < hyper_ch> anyone uses here voip/sip? 02:55 -!- APTXderZweite [n=APTX@ks32603.kimsufi.com] has quit [Remote closed the connection] 02:57 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 02:58 -!- Rolybrau [n=Rolybrau@122-78.78-83.cust.bluewin.ch] has joined ##openvpn 03:06 -!- dazo_afk is now known as dazo 03:07 -!- master_of_master [i=master_o@p57B55175.dip.t-dialin.net] has joined ##openvpn 03:12 < krzee> hyper_ch, sure why? 03:14 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has joined ##openvpn 03:15 < hyper_ch> krzee: well, I started now working as partner in a SME and it seems the current ISDN PBX must be completely replace... so I'm currently looking for other options to keep up the service we have now but lower the costs and VOIP/SIP seems interesting. However I do not have any experience with it :) 03:18 < hyper_ch> I don't even know what on the technical side would be required... right now there are 10 numbers in use and one of them is a fax machine... :) 03:19 -!- master_o1_master [n=master_o@p57B54C5B.dip.t-dialin.net] has quit [Success] 03:23 < dazo> hyper_ch: an organisation I know about switched from PBX to VoIP. They had an ISDN based PBX, and they still use it .... they just got some "modems" which takes the ISP connector and provides an ISDN plug 03:23 < dazo> From what I've heard, they seem to be happy ... they've been to that solution for a couple of years already 03:23 < hyper_ch> dazo: how big are they? We are currently 3 partners and 4 employees :) 03:23 < dazo> but they have a dedicated Internet connection to the ISP/Phone service vendor 03:24 < dazo> They're about 20-25 people 03:24 < dazo> (that dedicated connection was a part of a pretty decent offer they got) 03:27 < hyper_ch> dazo: can you ask them how much bandwidth they have on their dedicated line? 03:28 < dazo> hyper_ch: I believe they have a 1 or 2Mbit connection ... it's nothing "beefy" ... but it's enough for phone 03:52 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 04:07 -!- cybertron [n=cybertro@84.200.248.176] has joined ##openvpn 04:07 < cybertron> hello, is it realy nesseccary that i install samba on my router to connect windows share in my internal lan? 04:08 < reiffert> cybertron: this is #openvpn. It's about openvpn. 04:10 < vpnHelper> New forum entry openvpnforum: Server Administration :: Re: help with OpenVPN for Ubuntu :: Reply by mwandelaar 04:11 < cybertron> reiffert: yes i know ;) i mean if i realy need smb von my router where i have installed openvpn 04:11 < cybertron> i will connect from win to win per openvpn and using win shares 04:11 < cybertron> will?Want 04:11 < cybertron> will=want 04:13 < cybertron> i only know the bridging way 04:23 < reiffert> I cant follow you. 04:23 < reiffert> why do you think that you need smb on your router? 04:27 < dazo> cybertron: no, you don't need samba on the router ... you need to setup WINS and push the WINS server to the clients, then browsing should begin to work 04:28 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 04:29 < cybertron> dazo: thx thats what i mean :) 04:29 < dazo> cybertron: http://support.microsoft.com/kb/117633 ... this is the kind of topics you probably need to look for 04:29 < vpnHelper> Title: How browsing browsing over a multi-subnet TCPIP network works in a domain and in a workgroup (at support.microsoft.com) 04:29 < dazo> cool spelling error by MS ..... maybe they use Word? :-P 04:29 < reiffert> dazo: you dont need browsing for accessing one maschine from the other. 04:29 < cybertron> lol 04:29 < dazo> not spelling, but typing error 04:30 < cybertron> i just wanna have access to the shares 04:30 < dazo> cybertron: then you just go in and type the IP or hostname in Explorer ... and it should show up 04:30 < reiffert> cybertron: type this into windows explorer \\ip and hit return 04:31 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 04:31 < cybertron> ok ok i c its like without vpn :) 04:32 < cybertron> but then when i need bridge net? 04:32 < dazo> cybertron: when you need bridge? 04:32 < cybertron> yes 04:32 < dazo> very seldom, I'd say 04:32 < dazo> that's more when you want to "extend" two remote networks via VPN .... to look as they are on exactly the same network 04:33 < dazo> and where routing is not an alternative .... f.ex. if you use non TCP/IP based protocols .... AppleTalk, IPX, etc 04:33 < cybertron> yeah ok, so i read it in the openvpn doku that i need brdiging for windows shares 04:34 < cybertron> but gread if not so i can also use win2k as client for the net 04:34 < cybertron> gread=great 04:34 < reiffert> dazo: AppleTalk is working across tun quite well btw. 04:35 < reiffert> dazo: all you need is a zeroconf proxy like avahi-daemon 04:35 < reiffert> relaying the name resolution 04:35 < dazo> cybertron: well, that's probably written before sub-network browsing really began to work .... and that before you could use IP addresses and DNS hostnames directly in the Explorer 04:35 < dazo> reiffert: ahh ... I lived in a world where I thought AppleTalk was something different than TCP/IP 04:35 * dazo stands corrected 04:36 < cybertron> dazo: k so its out of date :) 04:36 < dazo> cybertron: in the old days, you had to have browsing work to be able to use windows share .... so yeah, pretty outdated .... Microsoft understood around the time of WinXP that they needed cross-subnet to work :-P 04:37 < cybertron> hey that would say that MS learns somthing...wtf.... :> 04:39 < reiffert> dazo: well basically it's name resolution on multicast, and zeroconf announcing services on every maschine. 04:39 < dazo> reiffert: are you sure you meant AppleTalk, and not the file-sharing service? (AppleShare, or some of the "sub" parts) .... 04:39 < reiffert> dazo: where as filetransfer etc is tcp/ip and ipv6 wherever it is possible. 04:40 < dazo> http://en.wikipedia.org/wiki/AppleTalk 04:40 < vpnHelper> Title: AppleTalk - Wikipedia, the free encyclopedia (at en.wikipedia.org) 04:40 < reiffert> dazo: I'm sure. 04:40 < dazo> reiffert: AppleTalk can also use the DDP protocol, which is Layer-3 traffic 04:41 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 104 (Connection reset by peer)] 04:42 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 04:42 < dazo> reiffert: Apple just made it confusing, by calling all elements from Layer-3 to Layer-7 "AppleTalk"-something ... 04:42 < reiffert> Despite the default networking on the Mac being TCP/IP, AppleTalk support was provided in Apple operating systems before the release of Mac OS X v10.6 for backward compatibility with many products. 04:42 < reiffert> provided but turned off in 10.5 and 10.4 by default. 04:43 < reiffert> Starting with Mac OS X v10.2, Bonjour (originally named Rendezvous) provides similar discovery and configuration services for TCP/IP-based networks. Bonjour is Apple's implementation of ZeroConf, which was written specifically to bring NBP's ease-of-use to the TCP/IP world. Mac OS X v10.5 was the last version of Mac OS X to support AppleTalk[1]. 04:43 < reiffert> well, anyway, nobody is still on AppleTalk. 04:44 < reiffert> but you are right, it's naming hell as we spoke from totally different things. 04:45 < dazo> reiffert: yeah :) 04:48 < dazo> on the otherhand, I didn't know that the Layer-3/4 support (probably) of the AppleTalk stack was abandoned ... but in today's world, standardising on TCP/IP is also not a bad move 04:48 < reiffert> :) 04:48 < reiffert> coming back to bridge vs tunnel: bridge solution doesnt have to fight 3rd party windows firewalls. 04:49 < dazo> reiffert: how is it with bridge support in Windows actually? It's never ever crossed my mind to check out if that could work .... 04:51 < reiffert> dazo: It works, but you dont have a single chance getting it to work when sitting remotely. 04:51 < dazo> ugh 04:52 < reiffert> dazo: choose two adapters, right click -> bridge them 04:52 < reiffert> dazo: thats where you loose the remote connection. bridge no ip. 04:53 < dazo> reiffert: I see ... well, technically speaking, it's the same issue in Linux, if you're moving from non-bridged to bridged setup .... but if you have defined a bridge with only ethX ... then you can modify it on the fly 04:53 < dazo> only one ethX, I meant 04:54 < reiffert> or run shell scripts with a scheduler, job system, etc. 04:54 < dazo> true 04:54 < dazo> reiffert: bridging works on all Win (newer) boxes? 04:55 < reiffert> dazo: it worked for XP, no idea about later windows. 04:55 < dazo> good to know :) 04:55 < dazo> thx! 05:15 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 05:15 -!- mode/##openvpn [+o mattock] by ChanServ 05:20 < reiffert> Hi mattock 05:20 <@mattock> hi reiffert 05:20 < reiffert> Any unexpecting news on the progress? ;) 05:26 <@mattock> no, not really. I'm drawing process flow diagrams. Idea is to help communicate the possible future development processes. An enhanced version of the current process is already finished: http://users.utu.fi/sjsepp/openvpn/process_contributing_to_openvpn.png 05:27 <@mattock> I'll do a few more so we can discuss which is best and what modifications are required 05:31 < dazo> mattock: the "Developer" segment .... that's people doing patch reviews? 05:32 <@mattock> yep 05:32 * dazo asks ... because a contributor is also a developer 05:33 < dazo> "is" is probably too strong, but most often it is a developer 05:33 <@mattock> dazo: true, perhaps it should be "Contributor/Developer" -> "Developers (incl. James)" for clarity 05:34 < dazo> mattock: I'd probably use the wording "Patch reviewer (incl. James)" in that segment ... and "Patch contributor" on the first one 05:34 <@mattock> patch author perhaps? 05:35 < dazo> patches is to say indirectly development ... but it can also include fixes to man pages, readme files, etc ... which is not "development" 05:35 < dazo> mattock: yeah, patch author can work 05:36 <@mattock> ok, now it's updated 05:36 < trap_> i need a vpn provider which has the choice of thousands and thousands of dynamic ips in the us to choose from ...any ideas? i need to be able to route all my traffic through it 05:37 <@mattock> dazo: I'll create a modified version where James is not the bottleneck 05:39 < dazo> mattock: actually, this will not necessarily make James such a "bottleneck" .... because when it comes to deciding what hits the final releases, you need someone who decides ... but with such a model, it is possible to let the patch reviewers keep all dialogue with the contributor ... and when it's ready for inclusion, those patches can be queued up for James 05:40 <@mattock> in fact, one important step is missing from diagram I drew... signing the contributor agreement 05:40 < dazo> mattock: http://whygitisbetterthanx.com/images/workflow-c.png ... this is kind of the workflow, I do see beneficial now 05:40 <@mattock> unfortunately we need that 05:40 <@mattock> dazo: I'll take a look at that 05:40 < dazo> mattock: why? 05:40 < dazo> mattock: why do you need such an agreement? It' 05:40 -!- mikkel [n=mikkel@84.238.113.66] has joined ##openvpn 05:40 < dazo> it's GPLv2, isn't it? 05:41 <@mattock> dazo: we sell "commercial" licenses under a proprietary license... 05:42 <@mattock> so we need the copyright to the whole codebase... fortunately the contributor agreement is the best I've seen so far. We guarantee that the contribution is released under an OSS license 05:42 < dazo> mattock: well, but the source code to OpenVPN is GPLv2 ... whatever changes you put into there, needs to be made available, at minimum on request .... that's already covered by GPLv2 05:43 <@mattock> I'm not a fan of contributor agreements myself and would love to get rid of it 05:43 < dazo> mattock: such an agreement will just kill interest for OpenVPN and encourage a fork 05:43 < dazo> interest for contributing to OpenVPN, that is 05:45 <@mattock> dazo: agreed, a contributor agreement is a bad idea. Do you know if earlier contributors have signed contributor agreements? 05:45 <@mattock> because if they didn't, I don't see much value in forcing people to sign them now 05:45 < dazo> mattock: I know I have not .... and James have accepted two of my patches (bug fixes), which went into the v2.1.0 and v2.1.1 05:46 < dazo> mattock: I don't know about others, tbh ... Alon Bar-Lev seem to have gotten more patches in 05:46 <@mattock> dazo: I need to check this out, too... I've discussed this issue with Francis and he wants contributor agreements. However, he has not told why, even though I've asked. 05:47 <@mattock> I understand the need for having the copyright to the whole codebase, but if it's already "contaminated" with code not from us, then... what's the point? 05:48 < dazo> mattock: based on histories going here about Francis .... he seem to talk warmly about OSS ... but he wants to control it like it is proprietary ... he really do not have any high scores or trust in the community nowadays 05:48 <@mattock> dazo: that's my feeling, too... he comes from such a different background than, say, me or you 05:48 <@mattock> and different priorities 05:48 <@mattock> I guess I'm the balancing force, "the other public face of the company" 05:49 < dazo> mattock: According to the GPL licenses ... the contributor keeps the copyright. BUT! The GPL license states that changes provided under GPL must be available in source code, and it cannot be withdrawn without a common consensus to all who have contributed to the source 05:50 < dazo> mattock: the GPL license protects both the author, the one implementing code and the one using the source .... to be sure the code is free and available for anyone, without any restrictions (other than it must still be GPL) 05:51 <@mattock> dazo: true. So, if we've included patches without forcing the authors to waive their copyrights, then we don't have the right to publish the code under any other license than GPLv2 05:51 < dazo> mattock: exactly 05:52 <@mattock> if we _do_ hold the copyright to the whole code then we can do whatever we want... 05:53 <@mattock> dazo: I think I got to take a deeper look at the previous contributors and inform Francis about this 05:53 <@mattock> personally I'd like to see that OpenVPN is full of stuff not under our copyright... that'd make the contributor agreement unnecessary 05:53 < dazo> mattock: Also read GPLv2 license .... it's not in a difficult language ... and it's quite a lot you can learn from it as well .... 05:53 <@mattock> and would not hurt the community 05:54 < dazo> http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt 05:54 <@mattock> dazo: yep, I've read it several times :) 05:54 < dazo> :) 05:54 < dazo> mattock: even better ... make Francis read it to 05:54 <@mattock> dazo: I'll provide him with a link, but give a brief overview of the problem 05:54 <@mattock> I need some real data to back up my claims, though 05:55 < dazo> mattock: understood 05:55 <@mattock> meaning SVN logs, mailing list posts etc. 05:55 <@mattock> and I think I'll talk to James, too, he knows how many patches have been included 05:55 < dazo> mattock: but if a contributor agreement comes .... I know, I'd rather support a fork of OpenVPN which is *really* open 05:56 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 05:58 < hyper_ch> mattock: you can still publish it under gplv3 06:00 <@mattock> dazo: I'll make sure Francis knows this. I've spoken of the risk of a fork earlier with ihm 06:00 <@mattock> him 06:01 <@mattock> dazo: in fact, I think Francis is just misinformed about the status of copyright issues in OpenVPN 06:01 <@mattock> I'll let him know the status and the problems involved in using "Contributor agreements" 06:03 -!- trap_ [n=trap@host86-162-65-239.range86-162.btcentralplus.com] has quit [Read error: 113 (No route to host)] 06:03 < hyper_ch> mattock: who is in charge of the openvpn website? 06:04 < hyper_ch> because of: Copyright © 2002-2006 by Telethra, Inc. 06:04 <@mattock> hyper_ch: I'm not exactly sure. There's a guy who responsible for technical maintenance, but beyond that I'm not sure 06:05 -!- __trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 06:05 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 104 (Connection reset by peer)] 06:05 -!- __trine is now known as _trine 06:05 <@mattock> hyper_ch: telethra seems to be company in Pleasanton, CA... the same city as OpenVPN Technologies, Inc. 06:06 < hyper_ch> I was rather referring to the  before the copyright sign :) 06:06 <@mattock> hyper_ch: ok :) 06:08 <@mattock> another slightly modified (and more open) process here: http://users.utu.fi/sjsepp/openvpn/process_contributing_to_openvpn_2.png 06:09 <@mattock> I'll make one which includes a bug tracker 06:15 <@mattock> dazo: what do you think of a hybrid patch merge model, where bugfix patches are attached to a bug report (in a tracker), whereas others are sent to openvpn-devel? 06:16 <@mattock> or should all patches be sent to the list (e.g. with tracker item ID) 06:18 <@mattock> some sort of tracker<->email bridge would probably be needed in any case (as you suggested earlier?) 06:19 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 06:22 < havoc> bah 06:22 * havoc installs win2k8 yet again 06:29 < reiffert> mattock: are there any other developers supposed getting svn commit rights or will it stay at James? 06:30 < havoc> reiffert: morning 06:30 < reiffert> Hi 06:31 <@mattock> reiffert: At first it's probably best that only James commits. Later on I think it makes sense to grant write access to a few trusted core developers 06:32 <@mattock> when a good development team has formed 06:36 < reiffert> Are you going to create a time schedule for this? 06:47 <@mattock> reiffert: perhaps later on... I think we should first see how the modified development model works. If there are already competent developers who James trusts, then I see no point in delaying giving them write access. But that's ultimately up to James 06:58 < dazo> hyper_ch: if I recall history right .... the copyrights went to Telethra Inc and then to OpenVPN Technology Inc ... most places in the code .... it happened between 2.1_rc12 and rc16, iirc ... And I believe it happened some organisational changes as well at that time 07:00 < dazo> mattock: If using both openvpn-devel and a bug tracker to track patches .... if they are not synchronised, patches will be missed in the long run 07:01 < hyper_ch> dazo: I was asking becuase of: © 07:02 < dazo> mattock: and then you'll have a case where some is reported only one place, or both places ... that's rather chaotic ... if they are synchronised somehow, then you'll find them both places, and the submitter can use what's convenient for the user 07:02 <@mattock> dazo: agreed 07:03 < dazo> hyper_ch: yeah, but despite having (C) ... that is not in contrast to GPL .... GPL actually requires a contributor of or to a source file to keep his/hers copyrights 07:03 < ecrist> good morning 07:03 <@mattock> and we definitely need a bug tracker... 07:03 <@mattock> good morning, ecrist 07:04 < dazo> g'afternoon! 07:06 < hyper_ch> dazo: I mean the "Â" before the copyright --> type error 07:07 < dazo> ahh ... I thought that was a buggy IRC client :-P 07:12 < hyper_ch> :) 07:13 -!- ribasushi [n=rabbit@dslb-084-063-044-135.pools.arcor-ip.net] has quit [Read error: 110 (Connection timed out)] 07:14 -!- ribasushi [n=rabbit@dslb-084-063-002-197.pools.arcor-ip.net] has joined ##openvpn 07:26 <@mattock> hyper_ch: you can send mail to frank at openvpn about the typo 07:27 -!- phusion__ [i=phusion@88.80.16.38] has quit [Read error: 60 (Operation timed out)] 07:29 -!- phusion__ [i=phusion@88.80.16.38] has joined ##openvpn 07:29 -!- xeviox [n=NEBAP@p5497876D.dip0.t-ipconnect.de] has joined ##openvpn 07:30 < xeviox> !welcome 07:30 < vpnHelper> xeviox: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 07:31 < xeviox> is "don't use 192.168.1.0/24 ..." for the local addresses in a lan? 07:31 < xeviox> !route 07:31 < vpnHelper> xeviox: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 07:34 < xeviox> the problem is that our company ips are in this structure (192.168.0.x) 07:34 < xeviox> now I've tried to establish a connection from a client in the LAN to the server 07:35 < xeviox> connection works fine (no errors) 07:35 < xeviox> but I'm not able to ping anything (not the 10.8.0.1 and no part of the LAN) 07:35 < xeviox> there is no firewall involved .. 07:36 < xeviox> but maybe thats a logic error when trying to connect from the lan itself, but I'm not sure .. 07:36 < jmm> xeviox: show us your config files, and logs. 07:36 < xeviox> k, one second 07:36 < jmm> no hurry. 07:39 < xeviox> jmm: this is the server side: http://pastebin.com/d7458f02e 07:41 -!- dazo [n=dazo@nat/redhat/x-hjlzmengnirgaqjc] has quit [Read error: 54 (Connection reset by peer)] 07:41 < xeviox> jmm: this is the client side (there is no log ?!?): http://pastebin.com/d174bc5bd 07:44 -!- dazo [n=dazo@nat/redhat/x-lshoztazovndqxix] has joined ##openvpn 07:44 -!- dazo is now known as Guest60666 07:45 < xeviox> any ideas? 07:45 < jmm> not yet, but I'm thinking about it ! 07:45 < jmm> :) 07:45 < xeviox> kk thank you :) 07:45 -!- Guest60666 is now known as dazo 07:51 < xeviox> maybe the problem is caused by my lan internal test? 07:51 < jmm> maybe,what's that lan test ? 07:51 < xeviox> that the route breaks when the client trys to add another route 192.168.0.x? 07:52 < xeviox> I mean because I try to establish a connection from the lan itself 07:52 < ecrist> xeviox: you must change your IPs if there is a conflict 07:53 < xeviox> the lan in our company our like "192.168.0.x" 07:53 < xeviox> I tried to establish the connection from a workstation in the lan to the server in the lan 07:53 < jmm> xeviox: did you checked your firewall rules ? if openvpn port is allowed from client to server ? 07:53 -!- ycy_ [n=mb@Noise.CS.UCLA.EDU] has left ##openvpn [] 07:53 < jmm> hi ecrist . 07:54 < xeviox> the firewall is disabled on client and server 07:55 < ecrist> xeviox: if you have clients connecting from the 192.168.0.0/24 network as their LAN, you will break their connections with your pushed route 07:55 < xeviox> k, so that seems to be the problem 07:55 < xeviox> ecrist: thanks :) 07:55 < ecrist> also, you cannot reliably connect to a vpn server on the same lan if it's pushing routes for that lan 07:55 < xeviox> so I have to try from an outside connection 07:55 < ecrist> yes 07:55 < xeviox> k 07:55 < ecrist> change your company IPs 07:56 < ecrist> I would suggest the 10.0/24 range 07:56 < xeviox> I think that's a problem :( 07:56 < xeviox> but maybe we can do that when we get some new workstations .. 07:56 < ecrist> why is it a problem? 07:56 < xeviox> for now the connection should work when the clients ip (at home) has a ip different from "192.168.0.x" right? 07:57 < ecrist> yes 07:57 < xeviox> ecrist: to much work for now (have to change both server, dhcp, router ..) 07:57 < ecrist> *shrug* your decision 07:57 < ecrist> I'm just telling you what will/won't work. 07:57 < jmm> I maybe wrong, but why not just changing the route to be pushed ? 07:58 < jmm> just stop pushin 192.168.0.0 route. 07:58 < ecrist> jmm: he would have to change that route and those of the LAN 07:58 < jmm> why changing lan routes ? 07:58 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit [Remote closed the connection] 08:05 < xeviox> when I stop pushing that route it may work for the local test? 08:05 < ecrist> jmm: do you understand routing? 08:05 < endre> use netmap guys if you have overlapping ip subnets 08:06 < xeviox> if it does, I will test it locally with disabled push and then enable the push for the remote test .. 08:06 < endre> not a perfect solution but will work 08:06 < ecrist> what is netmap? 08:07 < xeviox> ecrist: do you think the test will work if I disablet the route push? 08:07 < jmm> ecrist: I do. 08:07 < xeviox> *disable 08:08 < jmm> ecrist: I may have misunderstood something, but i thinked since his 2 computers are on same lan, just stop pushing lan route would be good. 08:08 < ecrist> xeviox: you will be able to ping 10.8 subnet, but not your office lan 08:08 < ecrist> jmm: he's only on the same lan for testing 08:08 < jmm> now I may not know something about routing, that force use of an unknown route to me. 08:08 < jmm> ecrist: ah. 08:09 < xeviox> ecrist: k, thats worth a try :), I think I will test that, and if it works it should work with a different net on the remote clients .. 08:11 < xeviox> so, I've commented the line with the "push .." let's see what happens :D 08:12 < xeviox> I've also encountered another problem, the gui client for windows does always throw an error "Could not open the server.log for writing ..." even when I open it as administrator .. 08:12 < xeviox> yeah baby 08:12 < xeviox> ping for 1.8.0.1 works :D 08:13 < xeviox> also the local adresses work (192.168.0.x) but maybe they are not send through the tunnel, anything how to check that? 08:14 < jmm> check with route -n 08:14 < ecrist> without the push route, they won't be sent through tunnel 08:15 < xeviox> yep seems not to be tunneled .. ^^ 08:16 < xeviox> thank you guys :D 08:19 < xeviox> what do I have to install on the client? The network adapter and the -client....? 08:19 < xeviox> or do I need something extra? 08:19 < xeviox> like the rsa stuff? 08:19 < ecrist> nope 08:19 < ecrist> just openvpn and the config 08:20 < xeviox> cool 08:20 < xeviox> puh 08:20 < xeviox> I really hope that will work from home ;) 08:20 < xeviox> I try for month to enable a vpn connection to our company 08:20 < jmm> xeviox: the client need the keys too. 08:20 < xeviox> first solution with our symantec firewall didn't work because of the missing client (couldn' find any) 08:21 < jmm> vpnpabst.{crt,key} 08:21 < ecrist> yes, the client ssl certificate and key 08:21 < xeviox> k 08:21 < xeviox> thank you 08:21 < jmm> yw. 08:21 < xeviox> I put everything together on a stick :D 08:22 < xeviox> the second solution didn't work because the firewall wasn't able to forward the GRE protocolls vor ipsec or pptp 08:22 < xeviox> so I really hope this one will correctly work with our firewall / lan :D 08:22 -!- reiffert [n=thomas@mail.webersheim.de] has left ##openvpn [] 08:22 < xeviox> at first I tried to setup it in bridge mode, but that messed up the hole lan (clients couldn't reach the internet) 08:23 < xeviox> so I hope the routing will be enough to get a connection to the servers :D 08:23 < ecrist> that's likely because of your conflicting address space 08:23 < xeviox> ? 08:23 < xeviox> in the lan? 08:23 < ecrist> between lan and clients 08:24 < xeviox> I've done everything like in the howto, I added a bridge over both networks on the win2k3 server 08:24 < xeviox> and then enabled a static ip 08:24 < xeviox> server worked fine after that (could reach each client and the internet) 08:24 < ecrist> you really need to change your office ips to get a fully working vpn 08:25 < xeviox> but the client couldn't reach the internet any more.. 08:25 < xeviox> ecrist: why? When I establish from home where the local ips are like "178.168.0.x" will there be a problem now? 08:25 < ecrist> you have 178.168 addresses at home? 08:26 < xeviox> ah sorry, I messed up, i think "168.178.0.x" 08:26 < ecrist> you own that address space? 08:27 < ecrist> according to ARIN, that address space is owned by the State of Utah 08:27 < xeviox> ?!? no, I think this is the default space in fritz!box config 08:27 < xeviox> ^^ 08:27 < ecrist> that would be 192.168.0.0 08:27 < ecrist> which is the same as your office lan 08:27 < ecrist> nevermind, I give up. 08:28 < xeviox> then it's maybe 192.178... 08:28 < xeviox> there is a 178 somewhere ^^ 08:28 < ecrist> if you want a problem-free vpn, you need to change your office lan 08:28 < xeviox> but why? 08:28 < ecrist> BECAUSE THEY CONFLICT 08:28 < ecrist> that's why your clients lose internet 08:28 < xeviox> I thought the problem is only caused by giving client and server the same space, right? 08:29 < ecrist> that's why I had you remove the push route 08:29 < xeviox> the clients in the lan (at work) just lost internet when I enabled the network bridge on the server 08:29 < xeviox> ah k 08:30 < xeviox> sorry, I think you missunderstand me, the broken internet was a problem IN the LAN at work 08:30 < xeviox> has nothing to do with the vpn 08:30 < ecrist> whatever 08:30 < xeviox> the problem was caused by the bridging of the network adapters 08:31 < xeviox> but you're right, I have to change the ips to avoid problems with some home networks (because of same network space) 08:35 < xeviox> and I really have to forward that single port through the firewall?? 08:35 < xeviox> no GRE protocols or something else? 08:44 < xeviox> is it possible to avoid the route push manually on the client? 08:45 < jmm> I'm not sure about what you mean. 08:45 < jmm> it's the word manually that I don't get. 08:45 < xeviox> ah ok 08:46 < xeviox> if the push is enabled on the server 08:46 < xeviox> is it possible to let the client know to not use this push? 08:46 < jmm> oh I get it. 08:46 < jmm> I think it's possible, I saw some option I think. 08:47 < xeviox> because then I maybe can disable the route for clients that may have conflicts with the route and setup up some single routes to the servers (if that is possible) 08:48 < jmm> you can configure which route are pushed or not to client if you use ccd. 08:48 < Bushmills> xeviox: you can push selectively 08:48 < Bushmills> !ccd 08:48 < vpnHelper> Bushmills: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 08:48 < jmm> Bushmills: heh :) 08:49 < xeviox> Bushmills: does that enable the client to deny the server push? 08:50 < jmm> xeviox: no. 08:50 < Bushmills> no. it is an inclusive feature, not an exclusive one 08:50 < xeviox> hmm 08:50 < jmm> it allow to choose which route are pushed on which clients. 08:50 < jmm> ( not just routes btw ). 08:50 < ecrist> xeviox: just change your damn ips 08:50 < xeviox> I'm searching for an option to disable the server push on the client and add some other routes instead of the server push 08:51 < ecrist> the time you've spent in here could have change the ips. 08:51 < xeviox> ecrist: like I've set I couldn't simply change the office ips 08:53 < xeviox> so, like I understand the problem that is caused by the "wrong" ips, it can simply be knocked out by using just single routes to the servers if the clients ip range is in conflict with the one of the server 08:54 < xeviox> but that means 08:54 < xeviox> that I need a way to tell the client if it should use the server push (which adds the route for the hole net) or if it should use some single routes. But not depending on the client 08:55 < xeviox> depending on the network were the client is at the moment it wants to connect the server .. 08:56 < xeviox> would be no problem if there is an option like "disable server pushs" OR an option to setup the route in the client config 08:58 < xeviox> so maybe someone knows of a way to add the route in the client config? 09:00 < Bushmills> though you might be able to trick it. 09:00 < Bushmills> you can change route command by parameter. possibly also to removing a route from ccd 09:01 < xeviox> hmmm 09:01 < xeviox> maybe I'll disable route push on the server and enter the routes on the client manually after successfull connection .. 09:02 < Bushmills> !ccd 09:02 < vpnHelper> Bushmills: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 09:02 < Bushmills> easier than doing it by hand 09:05 < xeviox> I've found a doc tellling me something about the "pull" option on the client 09:06 < xeviox> which seems to be needed when using the "push" on the server, right? 09:06 < Bushmills> there's a no-pull 09:07 < xeviox> aha :D 09:07 < xeviox> so using no-pull, the client will skip the server pushs? 09:08 < Bushmills> route-nopull might do that 09:09 < xeviox> route-nopull or route-no-pull? 09:09 < Bushmills> TMPIYF 09:09 < xeviox> ??? 09:10 < Bushmills> "the manual page is your friend" 09:10 < xeviox> kk thank you 09:10 < xeviox> maybe the german translation was from an older version (as it missed that) 09:15 < xeviox> k, just for info its "--route-no-pull" and the "--pull" option is still there .. 09:17 < xeviox> wow, so I can use parameters instead of config files to start openvpn ?!? cool, that opens the way for a nice and small gui to start the client :D 09:17 < xeviox> thank you all guys 09:18 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Read error: 60 (Operation timed out)] 09:18 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has joined ##openvpn 09:19 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 09:23 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 09:24 -!- steelnwool [n=jeff@204-232-209-119.static.cloud-ips.com] has left ##openvpn [] 09:30 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 09:31 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [Read error: 54 (Connection reset by peer)] 09:31 -!- magic_1 [n=magic@41.123.156.25] has joined ##openvpn 09:35 < ecrist> krzee: any problems with the new changes to ssl-admin, or can I send them up to freebsd-ports? 09:43 -!- Zordrak_ [n=jaz@87-194-141-163.bethere.co.uk] has joined ##openvpn 09:47 -!- xeviox [n=NEBAP@p5497876D.dip0.t-ipconnect.de] has quit ["Nettalk6 - www.ntalk.de"] 09:49 -!- kit_ [n=chatzill@gw-65.bdo-it.com] has joined ##openvpn 09:50 -!- kit_ [n=chatzill@gw-65.bdo-it.com] has left ##openvpn [] 09:50 -!- kit_ [n=chatzill@gw-65.bdo-it.com] has joined ##openvpn 09:52 < kit_> Hi, I just found how to run windows client as non-admin using patched openvpn (--win32-gui option added). I studied the path and it seem straight and easy to integrate the patch to me. Is there any reason to not include it in official relase? 09:57 < dazo> kit_: you'll probably need to bring that discussion up on the mailing list .... it's no official openvpn developers here, thus difficult to answer you for us 09:57 -!- Zordrak [n=jaz@87-194-141-163.bethere.co.uk] has quit [Read error: 110 (Connection timed out)] 09:58 < kit_> dazo: thanks 09:59 -!- kit_ [n=chatzill@gw-65.bdo-it.com] has quit ["ChatZilla 0.9.85 [SeaMonkey 2.0.1/2009121000]"] 10:03 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 10:03 -!- mode/##openvpn [+v Kasx] by ChanServ 10:04 -!- d12fk [n=heiko@vpn.astaro.de] has quit [Read error: 60 (Operation timed out)] 10:04 -!- d12fk [n=heiko@vpn.astaro.de] has joined ##openvpn 10:08 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 60 (Operation timed out)] 10:15 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Read error: 60 (Operation timed out)] 10:15 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 10:33 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 10:34 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 10:36 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has joined ##openvpn 10:44 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 10:46 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 10:46 -!- mode/##openvpn [+o mattock] by ChanServ 11:06 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 11:07 -!- gazelle [n=luna@80-254-76-142.dynamic.swissvpn.net] has joined ##openvpn 11:09 -!- mikkel [n=mikkel@84.238.113.66] has quit ["Leaving"] 11:11 -!- hobbsc [n=zalgo@opensuse/member/hobbsc] has quit ["bad client, no donut"] 11:12 -!- dli [n=dli@dsl-69-172-118-139.acanac.net] has joined ##openvpn 11:12 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 11:13 < dli> is openvpn blocked in china? 11:14 < krzee> ecrist, its on my ca box at work, i got busy and couldnt test =[ 11:14 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 11:14 < krzee> now today is my day off 11:15 -!- ius [n=thralas@2001:610:1908:8000:21f:c6ff:fe52:7e30] has joined ##openvpn 11:15 < ius> !welcome 11:15 < vpnHelper> ius: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 11:16 < ius> !topology 11:16 < vpnHelper> ius: "topology" is is it is possible to avoid the !/30 behavior if you use 2.1 with the option: topology subnet http://osdir.com/ml/network.openvpn.devel/2005-09/msg00020.html This will end up being default in later versions. 11:17 -!- gazelle [n=luna@80-254-76-142.dynamic.swissvpn.net] has quit ["Lost terminal"] 11:19 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 11:29 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has quit [Remote closed the connection] 11:30 -!- MrRR [i=1856a0fc@gateway/web/freenode/x-rutsgnqoifynrumt] has joined ##openvpn 11:30 < MrRR> Am I on the wrong page here? I'm trying to download OpenVPN but all I get are appliance downloads. Is http://www.openvpn.net/ the correct web site? Thanks in advance. 11:30 < vpnHelper> Title: Welcome to OpenVPN (at www.openvpn.net) 11:30 < krzee> !download 11:30 < vpnHelper> krzee: "download" is www.openvpn.net/download to download openvpn 11:31 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has joined ##openvpn 11:31 < havoc> MrRR: you want the Community Software part of the site 11:31 < MrRR> There we go, it redirects here: http://www.openvpn.net/index.php/open-source/downloads.html 11:31 < vpnHelper> Title: Downloads (at www.openvpn.net) 11:31 < MrRR> There doesn't seem to be a link to this page from the home page. 11:31 < MrRR> Thanks. 11:31 < MrRR> It's not obvious. 11:31 < havoc> MrRR: right at the top in the main nav bar 11:32 < MrRR> I'm having trouble getting users to try OpenVPN because they can't figure out how to download it either. They end up asking me how to get the appliance server stuff to work in the way I've been telling them how good OpenVPN is. 11:32 < MrRR> There used to be a "Downloads" button that included OpenVPN. 11:32 < MrRR> I see the link now, but it's not obvious to people downloading. 11:33 < MrRR> havoc: Are you in charge of the web site? If so, I suggest adding a "Download OpenVPN" button somewhere on the page. Calling it "Community Software" is really nice, but it's not intuitive. 11:34 < MrRR> I worry that a lot of people have looked elsewhere for other VPN solutions when they couldn't download OpenVPN and were presented with options that cost money. 11:34 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 11:34 < MrRR> I appreciate that the OpenVPN site owners are running a business, but I think this is a serious design problem with the web site. 11:35 < dazo> MrRR: mattock, openvpn2009 and Kasx are working in OpenVPN Tech .... the rest is the community 11:35 -!- Section58 [n=steve@ipt0-2.core.bsd.uk.phib3r.net] has joined ##openvpn 11:41 <@openvpn2009> MrRR: your concern is noted. 11:41 < MrRR> Thanks! 11:41 < MrRR> I love this product, by the way. 11:41 -!- mode/##openvpn [+o Kasx] by openvpn2009 11:42 <@openvpn2009> We are glad you like it. 11:42 <@openvpn2009> :-) 11:42 < MrRR> I even link to it from here: http://www.lumbercartel.ca/resources/security.pl#openvpn 11:42 < vpnHelper> Title: [LumberCartel.ca] Resources - Anti-Virus, Anti-SpyWare, and Security solutions (at www.lumbercartel.ca) 11:43 <@Kasx> Just a heads up, openvpn.net is the correct url ;-) 11:43 <@openvpn2009> Awesome! 11:44 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 11:45 < MrRR> Kasx: Fixed. Thanks for the pointer. 11:45 <@mattock> hi guys, do you know of anyone who has signed a "contributor agreement" for OpenVPN? Essentially giving away the copyright to their work when contributing to OpenVPN... 11:46 <@mattock> I'm trying to figure out the copyright owner status of OpenVPN 11:54 -!- polaru [n=polaru@93.113.192.70] has quit [Remote closed the connection] 11:56 -!- MrRR [i=1856a0fc@gateway/web/freenode/x-rutsgnqoifynrumt] has left ##openvpn [] 12:14 < havoc> I'm sorry, but if somone can't find the download link on openvpn.net then they probably aren't qualified to use openvpn 12:16 < dazo> havoc: to put it another way .... to configure openvpn you need some basic knowledge, and if you can't find the software ................ 12:25 < Section58> i wish i could say that to my clients 12:26 -!- kisom [n=kisom@c-9fdce155.648-1-64736c11.cust.bredbandsbolaget.se] has joined ##openvpn 12:26 < dazo> Section58: you can always say that .... the question is more if it is clever :) 12:29 < havoc> anyway, I fought to keep my mouth shut while he was here ;) 12:31 -!- hagna [n=hagna@74-92-245-181-Utah.hfc.comcastbusiness.net] has joined ##openvpn 12:32 -!- hagna [n=hagna@74-92-245-181-Utah.hfc.comcastbusiness.net] has quit [Client Quit] 12:32 -!- hagna [n=hagna@74-92-245-181-Utah.hfc.comcastbusiness.net] has joined ##openvpn 12:36 < hagna> if kldload: can't load if_tap: No such file or directory how can I get a tap device? 12:37 < hagna> on freebsd 12:47 < ecrist> what version of freebsd? 12:51 -!- tommyd3mdi [n=tommyd@77-23-252-15-dynip.superkabel.de] has joined ##openvpn 12:52 < hyper_ch> I wonder, is it ok to post a new link about TSA security in here? 12:53 < tommyd3mdi> Hi guys! You guess it, I need your help! I'm getting an SSL handshake error when trying to setup an openvpn connection, similar to what has been reported here: http://openvpn.net/archive/openvpn-users/2004-12/msg00377.html 12:53 < vpnHelper> Title: [Openvpn-users] error=self signed certificate (at openvpn.net) 12:55 < tommyd3mdi> I roughly followed the installation instructions here http://dd-wrt.com/wiki/index.php/VPN_%28the_easy_way%29_v24+ and everything seems to be nice, but the connection drops server-side with this: http://pastebin.ca/1752660 12:55 < vpnHelper> Title: VPN (the easy way) v24+ - DD-WRT Wiki (at dd-wrt.com) 12:55 -!- dazo is now known as dazo_afk 12:56 < tommyd3mdi> and client-side with this: http://pastebin.ca/1752665 12:56 < hagna> ecrist 7.2 12:57 < tommyd3mdi> does this look like a firewall issue or rather a key issue? 12:58 < ecrist> unless you built a custom kernel, it's already there 12:58 < ecrist> ifconfig create tap0 12:58 < ecrist> or whatever 12:59 < hagna> I did ifconfig create tap0 and it says ifconfig: interface create does not exist 13:00 < ecrist> sorry, ifconfig tap0 create 13:00 < hagna> ooh 13:00 < hagna> yeah saw that 13:00 < hagna> ok that works 13:00 < ecrist> why were you trying to load the kernel module? 13:01 < hagna> it's what http://www.freebsddiary.org/openvpn.php said to do 13:01 < vpnHelper> Title: The FreeBSD Diary -- OpenVPN - getting it running (at www.freebsddiary.org) 13:03 -!- mithridates1 [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 13:03 < ecrist> lol 13:03 -!- Irssi: ##openvpn: Total of 93 nicks [3 ops, 0 halfops, 0 voices, 90 normal] 13:03 < mithridates1> hey guys 13:03 < mithridates1> I wanted to create more certificates 13:03 < mithridates1> but when I wanted to use them I got this error message : 13:03 < mithridates1> TLS Error: Unroutable control packet received from 76.76.15.203:1194 (si=3 op=P_CONTROL_V1) 13:04 < ecrist> hagna: he built that page sitting in here, talking to me and krzee. ;) 13:04 < hagna> haha that's funny 13:04 < ecrist> the link he says, 'For another view...' is my wiki page 13:05 -!- CrashSys [n=kumba@173.6.83.123] has joined ##openvpn 13:05 <@mattock> dazo_afk: are you there? 13:05 < ecrist> could be he built the article around freebsd 6, don't remember if if_tap was built in back then. 13:05 < CrashSys> Is there any benefit of 32 or 64 bit in terms of system load? 13:06 < hagna> freebsd is nice so far 13:06 < mithridates1> :O what the fuck is that? I searched the error and I found my ip address in pastebin http://pastebin.ca/raw/1734444 13:07 < ecrist> mithridates1: what are you talking about? 13:08 < mithridates1> I got an error , then I searched the line in google 13:08 < mithridates1> TLS Error: Unroutable control packet received from 76.76.15.203:1194 (si=3 op=P_CONTROL_V1) 13:08 < ecrist> you didn't know pastebin was indexed? 13:08 < mithridates1> I saw a log file in pastebin same as what I have in openvpn log file 13:09 < mithridates1> nevermind 13:09 < mithridates1> what do u think about the error message ecrist? 13:09 < ecrist> looks to me like it doesn't know how to route the packets 13:10 < ecrist> really can't do anything without full logs, though 13:10 < ius> Say I have a remote machine A with a /28 IP block assigned, and would like clients routed by machine B to be able to use these addresses. Is OpenVPN in bridging mode what I'm looking for? 13:10 < ecrist> !logs 13:10 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 13:10 < mithridates1> ok 13:11 < ecrist> mithridates1: start here: http://www.go2linux.org/troubleshooting-openvpn 13:11 < vpnHelper> Title: TLS Error: Unroutable control packet received and Connection refused (code=111) | Linux Operating System - Debian, Ubuntu, Fedora, Gentoo, Arch (at www.go2linux.org) 13:11 < mithridates1> ok tnx 13:11 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 13:12 < ecrist> mattock: dazo isn't usually around this time of day, as I recall 13:12 < ecrist> mattock: http://www.secure-computing.net/logs/openvpn_page_2.html #5 is dazo 13:13 < vpnHelper> Title: ##openvpn stats from ecrist! - Detailed info (at www.secure-computing.net) 13:13 < ecrist> historicaly, he drops off about an hour ago and isn't heard from again. 13:13 <@mattock> ecrist: thank, I thought so... I think he's in Czech republic or something. I'm not usually around this time either 13:13 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 13:14 <@mattock> ecrist: wow, that's one cool-looking IRC statistics page :) 13:14 < ecrist> http://secure-computing.net/openvpn.php 13:14 < vpnHelper> Title: SCN: ##openvpn Policy (at secure-computing.net) 13:14 < ecrist> for information, other stats pages there. 13:14 < ecrist> you're looking at page 2 of 'all time' stats 13:16 < krzee> ya that stats page is cool 13:17 < krzee> you're full of cool stuff you've made eric 13:17 * krzee <3 !factoids page 13:17 < mithridates1> ecrist: http://pastebin.ca/1752690 I uploaded both logs, server side and client side 13:17 <@mattock> I'll add this to my bookmarks, it's not only cool, but also quite useful :) 13:17 < hyper_ch> krzee: you're from the US? 13:17 < krzee> hyper_ch, orig i am 13:17 < hyper_ch> krzee: new TSA security measure: http://www.youtube.com/watch?v=4ajNpR6bmes 13:17 < vpnHelper> Title: YouTube - TSA Training Video - Hug A Jew (at www.youtube.com) 13:18 < ecrist> mattock: the factoids page may be useful to you, as well 13:18 < ecrist> !factoids 13:18 < vpnHelper> ecrist: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 13:19 <@mattock> ecrist: thanks! 13:20 < krzee> lol hyper_ch 13:20 < mithridates1> would you plz have a look on my log file ? http://pastebin.ca/1752690 13:20 < hyper_ch> krzee: what woman made you leave the US? 13:20 < ecrist> mithridates1: did you see the link I posted to you? 13:20 < mithridates1> yes 13:20 < mithridates1> but I don't think so that it is the problem 13:21 < ecrist> why not? 13:21 < krzee> mithridates1, the 'women' in washington dc 13:21 < mithridates1> because with the other certificate I can connect in the same system 13:21 < krzee> i dont agree with them, so i left 13:21 < krzee> i still vote tho 13:21 < hyper_ch> krzee: where are you located now? Canada? England? Down Under? 13:22 < krzee> tropical island 13:22 < krzee> =] 13:22 < havoc> bastard! 13:22 < havoc> nm, I like *cold*, not heat 13:23 < mithridates1> havoc: that's wrong command, you should type !bastard 13:23 < hyper_ch> working all day at the beach with a notebook? 13:23 < hyper_ch> having some nice drinks while working 13:23 < hyper_ch> get sometimes a bath to cool down$ 13:23 < havoc> s/beach/bar/ 13:23 < hyper_ch> :) 13:23 < havoc> dark bar 13:23 < havoc> w/ food 13:24 < krzee> mithridates1, what verb are you using? can you increase to 5 13:24 < mithridates1> aah 13:24 < mithridates1> ok 13:24 < mithridates1> sure 13:24 < mithridates1> I use 3 13:24 * havoc uses verb 3 as well, when not debugging 13:31 < mithridates1> ecrist: same error 13:32 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has joined ##openvpn 13:32 < CrashSys> Anyone know of a java-based openvpn client that I can launch within a web page? 13:32 < ecrist> I do not know of one, CrashSys 13:34 < CrashSys> Any difference between 32 or 64 bit for scaling/system-load? 13:34 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Read error: 60 (Operation timed out)] 13:35 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 13:42 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Read error: 104 (Connection reset by peer)] 13:43 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 13:47 -!- tommyd3mdi [n=tommyd@77-23-252-15-dynip.superkabel.de] has quit [] 13:50 < CrashSys> ANyone got any links on how to seed an openvpn client download? I want to make a php webpage that a client put in their user/pass, and it seeds a client and lets them download it 13:51 < hyper_ch> CrashSys: what do you mean by seeding a client? 13:53 < CrashSys> they download openvpn-client-special.exe... then they just click it, it runs, they are connected 13:53 < CrashSys> no config files, etc, for the end user to mess with 13:54 < hyper_ch> and linux clients? 13:54 < CrashSys> These are all window clients 13:54 < hyper_ch> somehow I don't think you can establish a vpned connection as non-privileged user 13:54 < hyper_ch> but that's just me 13:55 < CrashSys> I'm trying to address the 95% of the end user base I will have. The other 5% will have to edit config files. 13:57 -!- chilicuil [n=sistemas@189.191.135.77] has joined ##openvpn 14:01 -!- sigi [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 14:01 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Read error: 104 (Connection reset by peer)] 14:03 < hagna> so my goal is to setup in freebsd what I've setup in linux and that is a bridged tap interface where the tap is connected via p2p tunnel to a openvpn remote 14:04 < hagna> so I've got A -> FreeBSD --(openvpn tap)--> L 14:05 * hyper_ch heard that p2p is evil 14:05 < hagna> that's nice 14:05 < hagna> I'm only doing p2p because it's the most simple vpn config 14:06 < hagna> once this is working I could do some other configuration 14:06 < hyper_ch> I think I misunderstood :) 14:06 < hagna> oh p2p hehe 14:14 < hagna> on FreeBSD tcpdump -i tap0 shows ping requests from A, but none get answered 14:14 < hagna> ping requests to L that is 14:14 < hyper_ch> firewall problems? 14:15 < hyper_ch> routing problems? 14:15 < hagna> problems 14:15 < hagna> for sure 14:15 < hyper_ch> at least I was half-rigth :) 14:15 < hagna> my guess is routing because firewall is off (pfctl -d) 14:16 < hyper_ch> but I was told for years that I can't go into the internet without firewall 14:16 < hyper_ch> otherwise evil people will hack my computer :) 14:17 < hagna> p2p users? 14:21 < hagna> BTW it was routing woot 14:21 < CrashSys> can I put the keys in the actual ovpn file or do I have to link to an external file? 14:22 < hagna> mithridates1, terrance this is stupid stuff ... is you nick from this http://www.bartleby.com/123/62.html ? 14:22 < vpnHelper> Title: LXII. Terence, this is stupid stuff. Housman, A. E. 1896. A Shropshire Lad (at www.bartleby.com) 14:23 < hagna> vpnHelper, thanks 14:23 < vpnHelper> hagna: Error: "thanks" is not a valid command. 14:24 -!- MadTBone_ [n=MadTBone@160.39.238.196] has joined ##openvpn 14:30 -!- chilicuil [n=sistemas@189.191.135.77] has quit [Connection reset by peer] 14:30 -!- CrashSys [n=kumba@173.6.83.123] has quit [Read error: 60 (Operation timed out)] 14:57 -!- Grapsus [n=grapsus@che21-2-82-245-89-120.fbx.proxad.net] has joined ##openvpn 14:59 -!- chilicuil [n=sistemas@189.191.134.144] has joined ##openvpn 15:28 -!- chilicuil1 [n=sistemas@189.191.134.144] has joined ##openvpn 15:28 -!- chilicuil [n=sistemas@189.191.134.144] has quit [Read error: 104 (Connection reset by peer)] 15:29 -!- chilicuil [n=sistemas@189.191.134.144] has joined ##openvpn 15:29 -!- chilicuil [n=sistemas@189.191.134.144] has quit [Read error: 104 (Connection reset by peer)] 15:30 -!- chilicuil2 [n=sistemas@189.191.134.144] has joined ##openvpn 15:31 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit [Read error: 110 (Connection timed out)] 15:33 -!- mithridates1 [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has quit ["Leaving."] 15:45 -!- Grapsus [n=grapsus@che21-2-82-245-89-120.fbx.proxad.net] has quit ["Quitte"] 15:45 -!- chilicuil1 [n=sistemas@189.191.134.144] has quit [Connection timed out] 15:49 < ius> Say I have an OpenVPN server with a /28 block of IPs. Should I use bridging mode with DHCP instead of routing in order to assign the /28 range to clients and forward traffic? 15:50 < rob0> not unless you need bridging 15:50 < rob0> !topology 15:50 < vpnHelper> rob0: "topology" is is it is possible to avoid the !/30 behavior if you use 2.1 with the option: topology subnet http://osdir.com/ml/network.openvpn.devel/2005-09/msg00020.html This will end up being default in later versions. 15:51 < ius> Well, I'd like a set of virtualized clients to be assigned addresses from the /28 pool.. 15:52 < ius> With as few configuration as possible on the client side. Transparent would be the ultimate solution, ie. assign IPs via DHCP to those clients (VMware allows me to bridge their network connectivity to a network interface) 15:53 < ius> As far as I understand the routing vs. bridging concept, I'd have to use bridging to achieve that? 15:53 < krzee> but you dont actually need dhcp 15:54 < krzee> rob0 pointed to !topology because with topology subnet and --server you can just assign ips from a pool 15:55 -!- MadTBone_ [n=MadTBone@160.39.238.196] has quit [Read error: 110 (Connection timed out)] 15:56 < rob0> A pool as small as /28 is tiny without --topology subnet, limited to 3 clients 15:56 < ius> Hm I'm afraid I don't fully understand the topology concept, but I'm fairly certain it isn't exactly what I'm looking for. 15:59 -!- hagna [n=hagna@74-92-245-181-Utah.hfc.comcastbusiness.net] has quit [Read error: 110 (Connection timed out)] 15:59 -!- hagna [n=hagna@74-92-245-181-Utah.hfc.comcastbusiness.net] has joined ##openvpn 16:01 -!- hagna [n=hagna@74-92-245-181-Utah.hfc.comcastbusiness.net] has quit [Client Quit] 16:01 < ius> Or perhaps it is.. 16:11 < ius> But if I do not want to run OpenVPN on the clients (they will be all on a 'local' bridge interface on server A) and still want to route traffic from each client via server B, I do need to use bridging mode in OpenVPN, right? 16:17 < Bushmills> a client which does not run openvpn is, in openvpn terms, not a client. 16:17 < Bushmills> it may have its traffic routed through another machine which is an openvpn client 16:17 < ius> I undertand, it's a little confusing indeed. Let's call A the (sole) client then 16:18 < Bushmills> but you need an openvpn client somewhere 16:19 < ius> That would be A in this case, B being the server. 16:20 < Bushmills> one client, one server 16:20 < ius> Correct 16:21 < Bushmills> that's a feasable configuration 16:21 < Bushmills> :D 16:21 < ius> So rephrasing, if the OpenVPN server B has 16 IPs assigned which I'd like to be assigned to hosts 'behind' A, A being an OpenVPN client, would I need briging? 16:22 < ius> Hm the second assigned should read something like re-assigned, which still isn't entirely the right wording, but you get what I mean I guess 16:23 < Bushmills> if a host behind A pings one of the 16 server ip addresses, where should the packets go to? 16:24 < ius> Doesn't matter. They don't need to interact, all I want is for the 'outside world' to reach the 16 hosts behind A via the 16 IPs and vice versa 16:25 < Bushmills> an i try to look at an interfaces with a specific ip address from inside and outside look. after all that interface must be the same for both inside and outside, right? 16:27 < Bushmills> oh well, don't worry. routing in internet is done by routers. what your server needs to be, essentially, is a router for those addresses. 16:27 < ius> Hm, not sure whether I entirely get what you're trying to say, but I do think so. 16:28 < ius> Given B has interfaces eth0:0 to eth0:15, I'd just like it to be as if those interfaces where on the hosts behind A. Just for IP, but if bridging is required that would add the network layer as well 16:29 < Bushmills> no. it won't have those 16:29 < Bushmills> because, in that case, the server has interfaces with the same addresses you want to assign to the clients 16:29 < ius> Yeah I get what you mean (and thats what I mean), B still has the interfaces assigned, but it needs to route the traffic 16:29 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has quit ["Leaving."] 16:30 < Bushmills> right, but it doesn't need to have an interface for each single address it want to route 16:30 < Bushmills> were you to do that, you'd rather look at SNAT on server 16:31 < Bushmills> that was, btw, what my ping question was relating to. 16:31 < ius> That's my current setup actually, each host behind A is an OpenVPN client to B, B SNAT'ing each client 16:32 < ius> But I'd like to eliminate the requirement of having to install OpenVPN on each and every client. 16:33 < ius> Whoops, I used client instead of host again 16:33 < Bushmills> you can hook up a patchkabel to the server, and a switch, and connect the clients to the switch 16:34 < Bushmills> no need for openvpn 16:34 < ius> The hosts are virtualized on A, so what VMware offers is a bridge interface which I can all connect them to 16:34 < ius> B is on WAN, not on LAN 16:35 < Bushmills> your packets are also routed by several routers to google.com without needing openvpn 16:36 < Bushmills> donc, it is a routing question. not an openvpn question 16:39 < ius> But, A and B being only connected via IP/LAN, I do need OpenVPN.. 16:39 < ius> IP/WAN* 16:39 < ius> Perhaps I should draw a diagram 16:41 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: krzie, kisom, jaek_, balboah, bytesaber_, mrnice1, cybertron, plundra, Section58, magic_1, (+1 more, use /NETSPLIT to show all of them) 16:42 -!- Netsplit over, joins: kisom 16:42 -!- Netsplit over, joins: cybertron 16:43 -!- Netsplit over, joins: phusion__ 16:43 -!- Netsplit over, joins: plundra 16:43 -!- Netsplit over, joins: balboah 16:47 < ius> Bushmills: http://i45.tinypic.com/2vcdpas.png Does this clarify things? 16:47 < |Mike|> Afternoon :) 16:47 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: Optic, newmember, hyper_ch, krphop, Diffen 16:49 -!- hyper__ch [n=hyper_ch@91.121.147.34] has joined ##openvpn 16:53 -!- hyper__ch is now known as hyper_ch 16:53 -!- Netsplit over, joins: krphop 16:55 -!- magic_1 [n=magic@41.123.156.25] has joined ##openvpn 17:00 -!- jaek_ [n=jaek@c-71-202-163-230.hsd1.ca.comcast.net] has joined ##openvpn 17:07 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: buntfalke 17:09 -!- |Mike| [i=mike@2001:1af8:2:444:0:0:0:2] has quit ["Reconnecting"] 17:09 -!- |Mike| [i=mike@2001:1af8:2:444:0:0:0:2] has joined ##openvpn 17:12 -!- Netsplit over, joins: buntfalke 17:12 -!- _phusion__ [i=phusion@88.80.16.38] has joined ##openvpn 17:14 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: master_of_master, sno, DarkAnt, Holister, MrJK, tjz, zamba, le0 17:15 -!- sno_ [n=sno@static.153.209.46.78.clients.your-server.de] has joined ##openvpn 17:15 -!- DarkAnt_ [n=DarkAnt@24.63.224.114] has joined ##openvpn 17:15 -!- |Mike| [i=mike@2001:1af8:2:444:0:0:0:2] has quit ["Reconnecting"] 17:15 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: Intensity, stein0, jaek_, krphop, craver_, drue, Rolybrau, jfkw, hyper_ch, _dren, (+8 more, use /NETSPLIT to show all of them) 17:18 -!- rob0 [n=rob0@tuxaloosa.org] has quit [Read error: 54 (Connection reset by peer)] 17:18 -!- sdh [n=steve@steve.st] has quit [Dead socket] 17:18 -!- phusion__ [i=phusion@88.80.16.38] has quit [Dead socket] 17:18 -!- bytesaber_ [n=bytesabe@208-98-188-95.directcom.com] has joined ##openvpn 17:18 -!- krzie [n=krzee@unaffiliated/krzee] has joined ##openvpn 17:18 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 17:19 -!- Netsplit over, joins: zamba 17:19 -!- zamba [i=marius@flage.org] has quit [Killed by ballard.freenode.net (Nick collision)] 17:19 -!- zamba [i=marius@flage.org] has joined ##openvpn 17:19 -!- tjz2 [n=tjz@bb116-15-75-62.singnet.com.sg] has joined ##openvpn 17:19 -!- |Mike| [i=mike@2001:1af8:2:444:0:0:0:2] has joined ##openvpn 17:19 -!- rob0_ [n=rob0@tuxaloosa.org] has joined ##openvpn 17:22 -!- DarkAnt_ is now known as DarkAnt 17:22 -!- sdh [n=steve@steve.st] has joined ##openvpn 17:22 -!- Hypnoz [n=colin@ip66-104-252-161.z252-104-66.customer.algx.net] has joined ##openvpn 17:22 -!- jaek_ [n=jaek@c-71-202-163-230.hsd1.ca.comcast.net] has joined ##openvpn 17:22 -!- krphop [n=krphop@watch.out.the.feds.are.rightbehind.us] has joined ##openvpn 17:22 -!- hyper_ch [n=hyper_ch@91.121.147.34] has joined ##openvpn 17:22 -!- plundra [i=404@article.se] has joined ##openvpn 17:22 -!- sigi [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 17:22 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 17:22 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 17:22 -!- LowKey [i=rhel@unaffiliated/lowkey] has joined ##openvpn 17:22 -!- Intensity [i=[4twWOV+@unaffiliated/intensity] has joined ##openvpn 17:22 -!- stephenh [n=stephenh@94-23-158-103.kimsufi.com] has joined ##openvpn 17:22 -!- Gnewt [n=hackerle@li57-94.members.linode.com] has joined ##openvpn 17:22 -!- craver_ [n=craver@208.53.57.220] has joined ##openvpn 17:22 -!- crazygir [n=jason@unaffiliated/crazygir] has joined ##openvpn 17:22 -!- Cap_J_L_Picard [n=ewanm89@unaffiliated/ewanm89] has joined ##openvpn 17:22 -!- drue [n=drue@stiff.therub.org] has joined ##openvpn 17:22 -!- stein0 [n=stein@mail.vgnett.no] has joined ##openvpn 17:22 -!- tompaw [n=tompaw@slave20.tesserakt.eu] has joined ##openvpn 17:22 -!- _dren [i=dren@dereferenced.nullpointer.net] has joined ##openvpn 17:23 -!- Section58 [n=steve@ipt0-2.core.bsd.uk.phib3r.net] has joined ##openvpn 17:23 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has joined ##openvpn 17:23 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 17:23 -!- Optic [n=Optic@miso.capybara.org] has joined ##openvpn 17:23 -!- MrJK [n=jezu@194.199.166.96] has joined ##openvpn 17:23 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: Optic, newmember, MrJK, Section58, Diffen 17:24 -!- le0_ [n=itsle0@82.16.123.181] has joined ##openvpn 17:24 -!- |Mike|_ [i=mike@2001:1af8:2:444:0:0:0:2] has joined ##openvpn 17:24 -!- dmarkey [n=dmarkey@dmarkey.xen.prgmr.com] has quit [Connection reset by peer] 17:24 -!- mintaka [n=kosmic@unaffiliated/spice] has quit [Connection reset by peer] 17:24 -!- master_o1_master [n=master_o@87.181.81.117] has joined ##openvpn 17:24 -!- |Mike|_ [i=mike@2001:1af8:2:444:0:0:0:2] has quit [Client Quit] 17:24 -!- mintaka [n=kosmic@thefuckin.net] has joined ##openvpn 17:24 -!- Holister [n=ryan@151.204.189.39] has joined ##openvpn 17:29 -!- zamba [i=marius@flage.org] has quit [Killed by ballard.freenode.net (ballard.freenode.net (zamba[i=marius@flage.org] Ghosted sagan.freenode.net))] 17:35 -!- zamba [i=marius@flage.org] has joined ##openvpn 17:35 -!- dmarkey [n=dmarkey@dmarkey.xen.prgmr.com] has joined ##openvpn 17:48 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: tjz2, krzie, bytesaber_, mrnice1 17:58 -!- Netsplit over, joins: tjz2, bytesaber_, krzie, mrnice1 18:01 -!- APTX [n=APTX@phpBB/developer/APTX] has quit [Read error: 110 (Connection timed out)] 18:06 -!- chilicuil2 [n=sistemas@189.191.134.144] has quit [Read error: 104 (Connection reset by peer)] 18:09 -!- MrJK [n=jezu@194.199.166.96] has joined ##openvpn 18:09 -!- Section58 [n=steve@ipt0-2.core.bsd.uk.phib3r.net] has joined ##openvpn 18:09 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has joined ##openvpn 18:09 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 18:09 -!- Optic [n=Optic@miso.capybara.org] has joined ##openvpn 18:10 -!- APTX [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 18:12 -!- bytesaber_ [n=bytesabe@208-98-188-95.directcom.com] has quit ["Leaving"] 18:13 -!- rob0_ is now known as rob0 18:15 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: Section58, newmember, MrJK, Diffen, Optic 18:19 -!- Netsplit over, joins: MrJK, Section58, newmember, Diffen, Optic 18:20 -!- _phusion__ [i=phusion@88.80.16.38] has left ##openvpn [] 18:25 -!- slonbg [n=chatzill@216.17.90.91] has joined ##openvpn 18:27 -!- Bushmills [n=nnnBushm@verhau.de] has left ##openvpn ["Leaving."] 18:28 -!- Bushmills [n=nnnBushm@verhau.de] has joined ##openvpn 18:30 -!- stephenh_ [n=stephenh@94-23-158-103.kimsufi.com] has joined ##openvpn 18:31 -!- sdh [n=steve@steve.st] has quit [Remote closed the connection] 18:31 -!- sdh [n=steve@steve.st] has joined ##openvpn 18:31 -!- stephenh [n=stephenh@94-23-158-103.kimsufi.com] has quit [Read error: 104 (Connection reset by peer)] 18:33 < slonbg> I have 2 environments, connected trough openvpn tunnel - OFFICE and PROD. everything works ok, when I try to access any machine on PROD from any machine in OFFICE. I also have on the same OFFICE machine an openvpn server, so remote users can connect to OFFICE. All is OK, when remote client tries to access OFFICE. A proper routing is pushed to the clients to PROD. Also, when I listen... 18:33 < slonbg> ...(tcpdump) to the 2 TUN devices on OFFICE, I see the packet (tcp 80 request) coming from remote client, so the routing works (maybe). But on the entry point in PROD I do not see it. So, something's wrong with the routing. How to investigate? Any ideas how to go after this? 18:42 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has quit ["ChatZilla 0.9.86 [Firefox 3.5.7/20091221164558]"] 18:52 -!- RandomizeR [n=randomiz@41.237.69.77] has joined ##openvpn 18:53 < RandomizeR> anyone around? 18:53 < RandomizeR> hello..? 18:55 < RandomizeR> :( 18:55 * RandomizeR 's sound echoes off in the empty channel... 18:56 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has joined ##openvpn 18:57 < RandomizeR> hey Nick 18:57 < NickWebHA> Hey, hey. :-D 18:57 < NickWebHA> How are you? 18:57 < RandomizeR> I'm fine, you? :) 18:58 < RandomizeR> I was looking for a small bit of help, you think you might be able to help me? 18:58 < NickWebHA> I think my eye are going to start bleeding after I am done plugging my hair out. 18:58 < NickWebHA> I am also here for the same thing. I even wrote a blog post about it. 18:58 < RandomizeR> :-D 18:58 < RandomizeR> what's the problem? 18:59 < NickWebHA> I am going to plead my case now I guess with my pre-prepared speech. "I throw myself on the mercy of the channel. I just can not get OpenVPN working properly. Can anyone help me regain my sanity? http://blog.lifebloodnetworks.com/?p=163" 18:59 < NickWebHA> What is your issue? 19:00 < RandomizeR> well, my issue is much simpler, really, i just need to connect to a VPN but it's using the same address range as my own network 19:00 < RandomizeR> 10.0.0.0 19:00 < RandomizeR> i'm behind a router 19:01 < NickWebHA> So your VPN server has the same local network scheme as the network you are on now? 19:01 < RandomizeR> and although my router is on a different ip than the router of the network i'm connecting to, as soon as i get connected i lose connectivity completely 19:01 < RandomizeR> yep 19:01 < NickWebHA> Short answer: No can do. 19:01 < RandomizeR> not exact, though 19:02 < RandomizeR> yeah, but the client that installs on windows works around this issue by re-routing all the addresses 19:02 < RandomizeR> i was wondering if i can do the same on my linux 19:02 < RandomizeR> it works on windows but not linux, which is a shame really :( 19:02 < NickWebHA> Really? Not sure how that works... unless the IPs you are using are unused on the other network. 19:03 < NickWebHA> I have only been using Linux for about six months. I have learned a hell of a lot but some of it is still a black box to me. 19:03 < RandomizeR> but on windows when i do a dns lookup for a machine on the remote network by name, i get a fake "internet" address 19:03 < RandomizeR> yeah, same here really 19:04 < RandomizeR> and i can still access stuff using their real internal network IPs as long as there's no conflict 19:04 < RandomizeR> where there isn't really 19:05 < RandomizeR> my own network is very small, and currently i'm the only one on it beside the router, it's my home network 19:05 < NickWebHA> The default route is going to be sent to one not the other. I would assume you just got lucky that the network you wanted happened to be the default one at the time. I do not think Windows can work around that. 19:05 < RandomizeR> the other one is the work network, but i know for a fact i'm not conflicting with any of the work addresses, both the address for the router and my own machine are free on the work network 19:06 < RandomizeR> i think the windows client is the one that works around it 19:06 < NickWebHA> I am saying I do not see how. 19:06 < NickWebHA> Sounds fishy to me. 19:06 < RandomizeR> well, why does it work on windows and not linux? 19:06 < NickWebHA> No idea. 19:07 < NickWebHA> If I could answer that one way or another I would be sitting on the stairs in my apartment building stealing WiFi so I could play with my new VPN. :-P 19:07 < RandomizeR> hold on a minute, i'll try something, but i might lose connectivity for a while 19:07 < RandomizeR> :P 19:08 < RandomizeR> nop, still no luck 19:09 < RandomizeR> well, i was content with it only working on windows since i only needed to go in to check stuff occasionally so far 19:10 < RandomizeR> but now some code i wrote yesterday broke the cron job, and i wanted to go in and fix it but all my tools and stuff are linux based 19:10 < NickWebHA> According to the OpenVPN site the examples should work virtually unmodified. Does this thing require other ports to work or something? 19:10 < RandomizeR> and i really would hate to have to go to work tomorrow just to see what went wrong :( 19:11 < RandomizeR> i wouldn't know, really, i'm not the network admin, i'm just a developer ^_^ 19:11 < NickWebHA> netstat does not show me anything... 19:11 < RandomizeR> i haven't had to deal with VPN until a couple of weeks ago 19:12 < NickWebHA> Need? I just want. :-P 19:14 < RandomizeR> :-P 19:14 < RandomizeR> so you're just doing this for fun? :-P 19:14 < NickWebHA> If you have a better idea of what is fun I would like to hear it! 19:14 < RandomizeR> i totally see where you're coming from, but i wouldn't have waited until i start pulling my hair out 19:15 < RandomizeR> actually, the first network i ever built was also for the same reason 19:15 < NickWebHA> I am convinced of a) I am an idiot or b) the site is wrong. 19:15 < RandomizeR> i had a single internet connection and a switch not a router (not that i knew the difference back then!), and i decided i wanna share that internet connection across the multiple PCs i had 19:16 < NickWebHA> I remember my first website a while back. I made a copy of each image for each time I wanted it on the page because it never occurred to me I could use the same image in two places. 19:16 < RandomizeR> well, it's usually c) Some other variable is different with you that the site doesn't mention 19:17 < RandomizeR> o_O 19:18 < RandomizeR> well, can't claim my first web experience was much better really, i started by reverse-engineering multiple web pages to try and learn what that "language" they were "programmed" in 19:18 < RandomizeR> using "View Source" :-P 19:18 < NickWebHA> English. Duh. :-P 19:18 < RandomizeR> only a while later that it occured to me i don't have to do that really, i could just read a book :-P 19:19 < RandomizeR> yeah, but i didn't really know anything about tags and html, i just started reading the html source of the pages and trying to figure out how it works 19:20 < RandomizeR> i actually got surprisingly far with that, too! 19:21 < RandomizeR> *sigh* the things we do for fun... :-P 19:21 < NickWebHA> I failed many a high school class that way. 19:21 < NickWebHA> ... also I never showed up. But that did not help. 19:21 < RandomizeR> Yeah, I'd imagine so. 19:23 < RandomizeR> it's funny how when you look back at things that you thought at the time were really complicated and see how simple they seem now 19:23 < NickWebHA> I want that day to come for OpenVPN. 19:23 -!- napcae [n=napcae@i59F7066D.versanet.de] has joined ##openvpn 19:23 < RandomizeR> and the good news is, this same thing is probably gonna happen with you and this whole VPN thing 19:24 < RandomizeR> yep, i hope so myself 19:24 < NickWebHA> Well, it is worse than that I think. I think I do understand it and it still does not work. 19:24 < NickWebHA> hahaha, that amuses me. 19:24 < RandomizeR> and you actually got me thinking about doing that VPN thing myself, actually! 19:24 < napcae> i've activated "redirect-gateway" but the clients have no internetconnection 19:24 < napcae> what can be the reasons for that? 19:25 < RandomizeR> napcae, i don't think either of us would be able to help you, we each have our own unsolved mysteries :-D 19:25 < napcae> :S 19:26 < RandomizeR> and we have all come here looking for answers, but i guess it's a low time for the channel right now 19:26 < napcae> hmm 19:26 < napcae> guess you're right 19:28 < napcae> WTF 19:28 < NickWebHA> What now? 19:28 < RandomizeR> ?? 19:28 < RandomizeR> :-P 19:28 < napcae> I'm sitting for over 2 hours on this fuckin problem 19:28 < napcae> and now, i just uncommented dev tap for random in my server.conf 19:28 < napcae> and now it works! 19:28 < RandomizeR> careful with the language, i think there's an autobot 19:28 < napcae> oO 19:28 < napcae> sry^^ 19:28 < NickWebHA> That is pretty awesome. 19:29 < RandomizeR> wouldn't wanna get kicked out now, that's a definite mood spoiler :-P 19:29 < RandomizeR> well, congrats ;-) 19:29 < NickWebHA> Seriously. All this hope is making me try harder. Cut that out! 19:29 < RandomizeR> :-[ 19:30 < RandomizeR> you know, i'm thinking seriously of changing my local network settings to like 192.168.0.0 or something 19:31 < RandomizeR> i know that would probably solve the problem 19:31 < NickWebHA> Sounds like a plan to me. 19:31 < NickWebHA> I went with 10.0.0.0/25 (router would not let me choose /8). 19:31 < RandomizeR> it's just too much of a freakin hassle, and i've never done that with this router before 19:31 < RandomizeR> if i end up screwing something up i might find myself with no connectivity at all 19:32 < RandomizeR> or worse, having to hard-reset the router :-P 19:33 < RandomizeR> oh well, i think i'll give it a try anyway! 19:34 < RandomizeR> NickWebHA, i didn't get from your blog post what the exact problem is 19:35 < RandomizeR> your clients connect to the vpn but can't route properly? 19:35 < NickWebHA> I will re-read it. I might have left out the most important part due to the fact I can not think any more. 19:35 < RandomizeR> well, i'm not anywhere near knowing what anything means anyway, so it might be just fine and the problem is with me 19:36 < RandomizeR> i'm just trying to understand so maybe i can help after all 19:36 < RandomizeR> you know what they say, 2 heads is better than one 19:36 < NickWebHA> Reading it now I do see that I need to rewrite it. I am all over the place in that description. 19:37 < NickWebHA> I also have not slept more than a few hours a night in the last week. I think I am starting to fall asleep. 19:37 < napcae> ty.. 19:37 < napcae> wow that was a lucky one.. 19:37 < napcae> maybe u could post ur problems again 19:37 -!- napcae [n=napcae@i59F7066D.versanet.de] has quit ["leaving"] 19:38 < RandomizeR> i think you should go sleep 19:38 < RandomizeR> me too actually, that won't be such a bad idea 19:39 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 19:40 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 19:40 < NickWebHA> Have a good one. 19:41 < RandomizeR> you too 19:42 < RandomizeR> good night then :-), and good luck! 19:42 < RandomizeR> bye... 19:42 -!- RandomizeR [n=randomiz@41.237.69.77] has quit ["Leaving"] 19:43 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 19:56 -!- Hypnoz [n=colin@ip66-104-252-161.z252-104-66.customer.algx.net] has quit ["Leaving."] 20:13 -!- JodaX [n=NOTOKAY@ks22848.kimsufi.com] has joined ##openvpn 20:14 < JodaX> i want to use my dedicated server to encrypt my connection to the internet (connection to it) so it can't be sniffed on open wlans and such, are there any setup guides that describe that scenario ? 20:25 < Bushmills> !redirect 20:25 < vpnHelper> Bushmills: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 20:25 < Bushmills> JodaX: ^^^^ 20:27 < Bushmills> essentially just a client - server openvpn connection, with redirect-gateway in config, NAT enabled on server, and a name server which can be used by client. 20:29 < JodaX> redirect-gateway in the client config ? 20:29 < Bushmills> your choice, 20:29 < Bushmills> can be pushed by server, or written into client config 20:30 < JodaX> ok 20:30 < JodaX> but how exactly do i enable nat on the server and configure openvpns network settings ? 20:30 < Bushmills> by reading what the bot told you 20:31 < JodaX> !ipforward 20:31 < vpnHelper> JodaX: "ipforward" is please choose between !linipforward !winipforward and !fbsdipforward 20:31 < JodaX> !nat 20:31 < vpnHelper> JodaX: "nat" is (#1) http://openvpn.net/howto.html#redirect for an explanation of NAT as it applies to openvpn, or (#2) http://www.secure-computing.net/wiki/index.php/OpenVPN/FAQ#Traffic_forwarding_doesn.27t_work_when_using_client_specific_access_rules, or (#3) dont forget to turn on ip forwarding, or (#4) please choose between !linnat and !fbsdnat for specific howto 20:31 < JodaX> !linipforward 20:31 < vpnHelper> JodaX: "linipforward" is echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution (til reboot) or set net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 20:31 < JodaX> !def1 20:31 < vpnHelper> JodaX: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 20:33 < JodaX> !linnat 20:33 < vpnHelper> JodaX: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 20:34 < JodaX> Bushmills, how do i set the vpn network ? what server.conf option is that ? 20:35 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 20:35 < mithridates> hey guys 20:36 < Bushmills> a macro which also sets the net, in server config, is server 20:36 < mithridates> is there any difference between certificates for openvpn by openssl and other certificates? 20:36 < mithridates> is it an specific type of certificates? 20:37 < mithridates> !certificate 20:37 < vpnHelper> mithridates: Error: "certificate" is not a valid command. 20:37 < mithridates> !ca 20:37 < vpnHelper> mithridates: Error: "ca" is not a valid command. 20:37 < Bushmills> !ssl 20:37 < vpnHelper> Bushmills: Error: "ssl" is not a valid command. 20:37 < mithridates> !openssl 20:37 < vpnHelper> mithridates: Error: "openssl" is not a valid command. 20:38 < mithridates> hey Bushmills 20:38 < Bushmills> 'morning 20:38 < mithridates> where are you from? 20:38 < Bushmills> try http://tldp.org/HOWTO/SSL-Certificates-HOWTO/ 20:38 < vpnHelper> Title: SSL Certificates HOWTO (at tldp.org) 20:38 < mithridates> oh tnx 20:39 < mithridates> where are you from Bushmills? 20:39 < Bushmills> sol3, milky way 20:39 < mithridates> sol3? 20:39 < mithridates> =))) 20:39 < mithridates> milky way 20:39 < Bushmills> third planet around star named sol 20:39 < mithridates> K-PAX ? 20:40 < mithridates> have u seen this movie ? 20:40 < Bushmills> not that i remember 20:40 < mithridates> Kevin Spacey has a role in that 20:40 < Bushmills> http://www.imdb.com/title/tt0272152/ 20:40 < vpnHelper> Title: K-PAX (2001) (at www.imdb.com) 20:40 < Bushmills> this one? 20:40 < mithridates> yes 20:40 < mithridates> I like that 20:41 < JodaX> Bushmills, what route do i push to the client ? 20:41 < mithridates> when a person asked him where are you from he said something like you 20:41 < Bushmills> not seen. i'll keep it in mind 20:41 < Bushmills> JodaX: i don't know which ones you do. tell me. 20:42 < JodaX> which ones should i ? 20:42 < Bushmills> besides the vpn net itself? 20:43 < Bushmills> redirect-gateway updates your routes, and creates new default route through vpn 20:43 < JodaX> can you explain what the vpn net, and what the route is in normal networking terms 20:43 < Bushmills> none extra needed. it also adds a host route to vpn server through your old interface 20:44 < Bushmills> vpn net is the range of ip addresses within which the addresses of server and client tun devices fall 20:45 < JodaX> so when a client connects i will get a tun device that is a connection to that client, and the client will have an ip of the net i set with the "server" config option ? 20:45 < Bushmills> normally, packets to vpn net are routed through tun device 20:45 < Bushmills> yes, essentially. only, second client should be "server" 20:45 < mithridates> Bushmills: do u know some web based management system for certificates? 20:46 < ecrist> !ssl-admin 20:46 < vpnHelper> ecrist: "ssl-admin" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN_Server, or (#2) svn co https://www.secure-computing.net/svn/trunk/ to grab it from svn, or (#3) if you use freebsd, it is in ports 20:46 < Bushmills> mithridates: no. 20:46 < ecrist> not web based, but it's menu driven 20:46 < JodaX> Bushmills, ah, ok, so the connection when shown using ipconfig will sport that ip, what ip will the client have ? 20:46 < mithridates> ecrist: tnx man 20:46 < Bushmills> JodaX: determined by server, as consequence of your server config 20:47 < JodaX> Bushmills, now you are confusing me 20:48 < JodaX> if i do 20:48 < JodaX> server 10.8.0.0 255.255.255.0 20:48 < Bushmills> the address is not hardcoded. 20:48 < JodaX> in the server config 20:48 < ecrist> mithridates: i wrote it, if you have questions, let know 20:48 < Bushmills> so you have control over it 20:48 < ecrist> ^me 20:48 < JodaX> that ip is the servers ip on the tun device ? 20:48 < mithridates> sure tnx 20:48 < Bushmills> that's the vpn net. server and client will fall into into. 20:48 < JodaX> ok 20:49 < JodaX> so what does push "route 192.168.1.0 255.255.255.0" 20:49 < JodaX> do then ? 20:49 < Bushmills> check out --topology, --ifconfig-push 20:49 < Bushmills> check out --push, and route 20:50 < JodaX> push pushes a setting to the client 20:50 < Bushmills> or, even better, try !howto 20:51 < JodaX> where do i check those ? 20:51 < Bushmills> !howto 20:51 < vpnHelper> Bushmills: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 20:51 < Bushmills> !man 20:51 < vpnHelper> Bushmills: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 20:52 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has left ##openvpn [] 20:53 < JodaX> so for the client to access the internet over the server i'd push a internet route to it ? 0.0.0.0 0.0.0.0 ? 20:53 < Bushmills> !redirect 20:53 < vpnHelper> Bushmills: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 20:53 < Bushmills> !def1 20:53 < JodaX> so i don't need route ? 20:53 < vpnHelper> Bushmills: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 20:54 < Bushmills> (03:43:06) Bushmills: redirect-gateway updates your routes, and creates new default route through vpn 20:54 < JodaX> ok, so no routes, just redirect gateway 20:54 < JodaX> right ? 20:54 < Bushmills> bingo 21:03 < mithridates> ecrist: I'm looking for some web based stuff like the plugin which is in Webmin 21:06 < JodaX> ehum, there any openvpn gui for windows 7 ? 21:06 < JodaX> or does openvpn even work on windows 7 ? (certified drivers and such... ?) 21:06 < mithridates> JodaX: yes I've tried 21:07 < JodaX> which gui ? 21:07 < mithridates> just use run as administrator 21:07 < mithridates> and change compatibility mode to win vista 21:07 < JodaX> install what ? 21:07 < JodaX> and i don't want to disable driver signing... 21:08 < mithridates> driver signing? 21:08 < mithridates> !download 21:08 < vpnHelper> mithridates: "download" is www.openvpn.net/download to download openvpn 21:09 < mithridates> I donno about driver singing 21:10 < rob0> Musical drivers! 21:12 < JodaX> lol 21:12 < JodaX> nice gui it is 21:13 < JodaX> where is the config ? 21:24 < mithridates> JodaX: !config 21:25 < mithridates> !config 21:25 < vpnHelper> mithridates: (config []) -- If is given, sets the value of to . Otherwise, returns the current value of . You may omit the leading "supybot." in the name if you so choose. 21:25 < JodaX> nvm that 21:25 < mithridates> see the howto 21:25 < mithridates> no 21:25 < mithridates> look at the article section of openvpn.net community software 21:26 < mithridates> there is an article which talked about installing openvpn over different OSs 21:26 < mithridates> hey guys, what's the best way for managing certificates? 21:28 < JodaX> hmm, used redirect-gateway in the client, connects, but doesn't redirect traffic over the gateway 21:29 < Bushmills> look at routing table 21:30 < mithridates> JodaX: do u wanna use NAT? 21:30 < JodaX> yes 21:30 < mithridates> JodaX: have a look at ip_forward 21:30 < mithridates> put 1 instead of 0 21:30 < JodaX> well, i need to get clientside working 21:30 < JodaX> it should at least shutdown my internet on clientside if serverside wasn't working 21:31 < JodaX> but it seems to not redirect over the openvpn 21:31 < Bushmills> you can speculate, or you can obtain information from the system. 21:32 < JodaX> i can't read routing tables, never got into that 21:32 < mithridates> who knows a perfect certificate administration system? 21:32 < Bushmills> then pastebin the output 21:33 < JodaX> ipv4 route table enough ? 21:33 < Bushmills> yes 21:33 < mithridates> I removed all certificates files from my server but a client is still connected 21:34 < JodaX> Bushmills, http://piratepad.net/Zf2sDwrNAE 21:34 < vpnHelper> Title: PiratePad: Zf2sDwrNAE (at piratepad.net) 21:34 < mithridates> !openssl 21:34 < vpnHelper> mithridates: Error: "openssl" is not a valid command. 21:34 < mithridates> !factoids search --value ssl 21:34 < vpnHelper> mithridates: 'tls-auth', 'hmac', 'servercert', 'certs', 'crl', 'notcompat', 'quietopenssl', 'quietopenssl', 'dh', 'certinfo', 'certverify', and 'pptp' 21:34 < mithridates> !notcompat 21:34 < vpnHelper> mithridates: "notcompat" is (#1) ipsec and pptp are NOT compatibile with openvpn... openvpn is uses SSL, pptp and ipsec both use proprietary protocols, and therefor CAN NOT be compatible, or (#2) openvpn only connects to openvpn 21:35 < mithridates> !certinfo 21:35 < vpnHelper> mithridates: "certinfo" is please run `openssl x509 -in -noout -text` for ca,server,client certs and pastebin the results 21:35 < JodaX> hmm, but i seen open implementations of ipsec... 21:35 < Bushmills> 10.196.129.0 is your vpn net? 21:36 < JodaX> server 10.8.0.0 255.255.255.0 21:36 < JodaX> client says i have the ip 10.8.0.6 21:37 < Bushmills> you aren't connect to server, according route table. 21:37 < Bushmills> connected 21:37 < JodaX> the openvpn gui tells me i am 21:37 < JodaX> icon is green 21:38 < Bushmills> what OS is that? 21:38 < Bushmills> what version of windows, i mean 21:38 < JodaX> win7 64bit 21:38 < JodaX> professional 21:39 -!- tjz2 [n=tjz@bb116-15-75-62.singnet.com.sg] has quit ["bbl"] 21:39 -!- tjz [n=tjz@bb116-15-75-62.singnet.com.sg] has joined ##openvpn 21:39 < Bushmills> do you have any route statement in server config? such as route 10.8.0.0 255.255.255.0 ? 21:40 < JodaX> no 21:41 < JodaX> i pasted the server config below the other paste 21:41 < JodaX> and client config below that 21:44 < JodaX> that is strange tho 21:44 < JodaX> the ip on the tun interface is not 10.8. 21:44 < JodaX> its 10.196.129 21:45 < Bushmills> you have redirect-gateway in both client and pushed by server 21:45 < JodaX> so 21:45 < Bushmills> once with, once without def1 21:46 < JodaX> removing the one from the client 21:46 < Bushmills> i'd remove the server one for now, and add def1 to client# 21:46 -!- HazardX [n=HazardX3@pool-96-252-45-198.bstnma.fios.verizon.net] has joined ##openvpn 21:47 < Bushmills> 10.196.129.0 as vpn net is more consistent with routing table. it also means that redirect-gateway is effective 21:48 -!- rawDawg2 [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 21:49 < JodaX> but i do not have 10.196.129.0 set on server side 21:49 < Bushmills> have you reloaded server config after editing? 21:50 < Bushmills> !tcp 21:50 < vpnHelper> Bushmills: "tcp" is Sometimes you cannot avoid tunneling over tcp, but if you can avoid it, DO. Why TCP Over TCP Is A Bad Idea: http://sites.inka.de/~bigred/devel/tcp-tcp.html 21:50 < JodaX> oh wait its erroring about that 21:50 < JodaX> Sat Jan 16 04:49:27 2010 Route: Waiting for TUN/TAP interface to come up... 21:50 < JodaX> Sat Jan 16 04:49:28 2010 TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down 21:50 < JodaX> Sat Jan 16 04:49:28 2010 NOTE: unable to redirect default gateway -- VPN gateway parameter (--route-gateway or --ifconfig) is missing 21:50 < JodaX> SYSTEM ROUTING TABLE 21:50 < JodaX> and i am using tcp already 21:50 < Bushmills> that's why i sent you that factoid 21:50 < Bushmills> just read it carefully again 21:51 < JodaX> i added redirect-gateway def1 21:51 < Bushmills> to client? 21:52 < JodaX> yes 21:52 < JodaX> and i removed the push on the server 21:53 -!- dli [n=dli@dsl-69-172-118-139.acanac.net] has quit [Remote closed the connection] 21:54 < Bushmills> client-to-client should make little sense if there is no mode server in server config 21:54 < Bushmills> no sense, actually 21:55 < JodaX> do i make it mode server ? 21:56 < Bushmills> if planning for more than one client, yes 21:56 < JodaX> not 21:56 < JodaX> just needs to work now 21:56 < JodaX> do i need to ifconfig the ips on server and client ? 21:57 < Bushmills> so what will the other clients be you're enabling client-to-client comm with? 21:57 < JodaX> ? 21:57 < JodaX> i removed that 21:57 < Bushmills> your server config says client-to-client 21:57 < JodaX> yeah 21:57 < Bushmills> funny with server configured to allow one client only 21:58 < JodaX> edited it when you said it was nonsensical 21:58 < JodaX> but that isn't the problem 21:58 < Bushmills> i haven't tested conflicting options well. 21:58 < Bushmills> and that was one 21:58 < JodaX> Sat Jan 16 04:56:08 2010 TEST ROUTES: 0/0 succeeded len=0 ret=0 a=0 u/d=down 21:58 < JodaX> Sat Jan 16 04:56:08 2010 Route: Waiting for TUN/TAP interface to come up... 21:58 < JodaX> still that 21:59 < Bushmills> i suppose routing table of your client is pretty messed up now 21:59 < Bushmills> after disconnect, not able to restore old default route 22:00 -!- rawDawg2 [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit ["( www.nnscript.com :: NoNameScript 4.22 :: www.esnation.com )"] 22:00 < Bushmills> did you reload server config? 22:00 < JodaX> i restarted the server 22:00 < JodaX> that not enough ? 22:01 < Bushmills> enough. 22:02 < Bushmills> why is there ifconfig 10.8.0.2 10.8.0.1 in client config? 22:02 < JodaX> tried it because it was mentionned somewhere 22:03 < ecrist> mithridates: aside from guis for DD-WRT, FreeNAS, and some others, that's all you get 22:03 < ecrist> pay me, and I'll write one in PHP for you 22:03 < Bushmills> remove it or use different addresses. higher 22:03 < JodaX> ok 22:03 < JodaX> but one general thing 22:03 < JodaX> shouldn't the tun interface have a 10.8 ip ? 22:03 < Bushmills> yes, it should 22:04 < JodaX> well, it does not 22:04 < JodaX> it gets a windows autoconfig ip 22:04 < JodaX> still the gui tells me i got 10.8.0.6 22:04 < Bushmills> that's why we eliminated some config glitches. 22:05 < Bushmills> you can check server ip address of tun device 22:05 < JodaX> tun0 Link encap:UNSPEC Hardware Adresse 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 22:05 < JodaX> inet Adresse:10.8.0.1 P-z-P:10.8.0.2 Maske:255.255.255.255 22:06 < Bushmills> see why i asked to change or remove client ifconfig 22:06 < Bushmills> try to reboot client, or restart networking so that your route is clean again 22:06 < JodaX> it didn't change anything tho 22:06 < Bushmills> before starting openvpn 22:06 < JodaX> route is clean as far as i can see 22:07 < rob0> A clean route is a happy route. 22:08 < JodaX> oi 22:08 < JodaX> no 22:08 < JodaX> ok 22:08 < Bushmills> you may want to ask somebody with windows 7 exposure whether any special requirements for openvpn apply. 22:08 < JodaX> i had 22:08 < JodaX> dev tap 22:08 < JodaX> in config 22:08 < Bushmills> ah 22:09 < Bushmills> true 22:09 < JodaX> whats the difference ? 22:09 < JodaX> between tun and tap ? 22:09 < Bushmills> !tunortap 22:09 < vpnHelper> Bushmills: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 22:09 < vpnHelper> Bushmills: against you over the vpn 22:10 < JodaX> yup all works 22:10 < rob0> tun is OSI layer 3, IP; tap is layer 2, link layer (virtual Ethernet.) 22:12 -!- Dougy [n=me@ool-435033e6.dyn.optonline.net] has joined ##openvpn 22:12 < Dougy> hai 22:15 < JodaX> would it work if i just changed both to tap ? 22:16 < Bushmills> !tunortap 22:16 < vpnHelper> Bushmills: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 22:16 < vpnHelper> Bushmills: against you over the vpn 22:18 < vpnHelper> New forum entry openvpnforum: Server Administration :: OpenVPN for QNX :: Author ob1 22:25 < Dougy> oh snap 22:25 < Dougy> they got the forum bot working 22:25 < Dougy> fantastic 22:25 -!- mithridates [n=mithrida@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has quit ["Leaving."] 23:31 -!- tjz2 [n=tjz@bb116-15-75-62.singnet.com.sg] has joined ##openvpn 23:31 -!- tjz [n=tjz@unaffiliated/tjz] has quit [Nick collision from services.] 23:31 -!- tjz2 is now known as tjz 23:36 < ecrist> Dougy: pm? --- Day changed Sat Jan 16 2010 00:13 -!- EricInBNE [n=Eric@203-206-187-157.perm.iinet.net.au] has joined ##openvpn 00:24 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 00:27 -!- EricInBNE [n=Eric@203-206-187-157.perm.iinet.net.au] has left ##openvpn ["Leaving"] 00:33 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 00:41 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [] 00:49 -!- Leila [i=d9dae562@gateway/web/freenode/x-iecbqqawoljawtgd] has joined ##openvpn 00:49 -!- Leila [i=d9dae562@gateway/web/freenode/x-iecbqqawoljawtgd] has left ##openvpn [] 01:36 < ecrist> dammit jim 01:52 -!- frone [n=sammy@rotterdam.perfect-privacy.com] has joined ##openvpn 01:53 < frone> i have openvpn running in the background but cannot find it in my system monitor. im running ubuntu 9.10. how do I stop the sucker? 02:08 < ecrist> ps auxwww | grep openvpn 02:19 < frone> ecrist: what does that command do? 02:21 < ecrist> it searches for all running commands for 'openvpn' 02:22 < ecrist> man ps and man grep 02:28 < frone> thanks ecrist 02:28 -!- frone [n=sammy@rotterdam.perfect-privacy.com] has quit [Client Quit] 03:07 -!- master_of_master [i=master_o@p57B57DF5.dip.t-dialin.net] has joined ##openvpn 03:20 -!- master_o1_master [n=master_o@87.181.81.117] has quit [Read error: 110 (Connection timed out)] 03:44 -!- eightfold [n=eightfol@c213-89-114-50.bredband.comhem.se] has joined ##openvpn 04:14 < eightfold> howdy, i'm running debian and i have openvpn installed. i have the conf files provided here: http://ivacy.com/en/doc/user/setup/winxp_openvpn saved to example file names at that site (ie. Ivacy-client.ovpn etc) and i want to connect to that vpn using the terminal. what is the command? 04:14 < vpnHelper> Title: OpenVPN connection setup for Windows XP (at ivacy.com) 04:49 -!- ScriptFan [i=vincent@2a01:240:fe35:0:21a:70ff:fea3:44ab] has joined ##openvpn 04:49 -!- ScriptFanix [i=vincent@Tuluk.riquer.fr] has quit [Remote closed the connection] 05:00 -!- sdh [n=steve@steve.st] has quit [Remote closed the connection] 05:06 -!- ScriptFan [i=vincent@2a01:240:fe35:0:21a:70ff:fea3:44ab] has quit [Network is unreachable] 05:25 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has joined ##openvpn 06:16 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has joined ##openvpn 06:33 < DarkAnt> Sat Jan 16 07:31:28 2010 us=924411 UDPv4 WRITE [14] to 24.63.224.114:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0 06:33 < DarkAnt> Sat Jan 16 07:31:29 2010 us=4078 read UDPv4 [EHOSTUNREACH]: No route to host (code=113) 06:33 < DarkAnt> Sat Jan 16 07:31:29 2010 us=4529 UDPv4 READ [0] from [undef]: DATA UNDEF len=-1 06:33 < DarkAnt> oops 06:33 < DarkAnt> well, I meant to paste that in a pastebin, but I'm getting that error 06:37 < DarkAnt> I am receiving packets, so I think it isn't my firewall 06:37 < DarkAnt> why isn't my server responding then? 06:38 < JodaX> use tcp 06:39 < DarkAnt> ok 06:39 < DarkAnt> I'll try that 06:41 < DarkAnt> I'm still failing with no route to host 06:43 < JodaX> then there really is no route to the host 06:43 < JodaX> try pinging it 06:43 < JodaX> see if you can open a connection to it 06:46 < DarkAnt> k 06:47 < DarkAnt> well, that's odd 06:47 < DarkAnt> I can't ping it 06:48 < DarkAnt> but I can still ssh into it and whatnot 06:50 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has joined ##openvpn 06:55 < DarkAnt> ugh, the router was set up to drop pings 06:57 < DarkAnt> ok, I can ping it 06:59 < DarkAnt> so if I can see it with tcpdump its getting through the server firewall 06:59 < DarkAnt> I can see the machine 07:00 < DarkAnt> why am I still getting no route to host... 07:03 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 104 (Connection reset by peer)] 07:03 -!- buntfalke_ [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 07:08 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [Connection timed out] 07:10 < DarkAnt> I'm using the example configs, I'm kinda stuck as to how to proceed debugging this 07:29 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has quit [] 07:29 -!- le0_ [n=itsle0@82.16.123.181] has quit [Read error: 110 (Connection timed out)] 07:31 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has joined ##openvpn 07:40 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has quit [] 07:57 -!- Artio [n=_@port-12648.pppoe.wtnet.de] has joined ##openvpn 08:16 < HazardX> I know you can ssh into it, as if you couldn't it couldn't be connected to you so you couldn't be comendeering said test box.... 08:17 < DarkAnt> yeah, but only you and I knew that 08:17 < HazardX> Full disclosure, when you've got no idea what's going on, fill in the blanks that aren't default knowns, then sometimes some other crazy person wanders by that's done it all before. 08:18 < HazardX> (I know I've been on both sides of that exact series of events) 08:18 < DarkAnt> fair enough 08:22 * DarkAnt flails about 08:22 * HazardX lols 08:24 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has joined ##openvpn 08:28 < Dougy> http://www.newegg.com/Product/Product.aspx?Item=N82E16820227502 08:28 < Dougy> asdfgadfgsfaf 08:28 < vpnHelper> Title: Newegg.com - OCZ Colossus Series OCZSSD2-1CLS1T 3.5 1TB SATA II MLC Internal Solid State Drive SSD - Solid State Disks (at www.newegg.com) 08:28 < Dougy> woah 08:30 < DarkAnt> that's pretty impressive 08:30 < DarkAnt> but I am way too poor to afford that 08:31 < DarkAnt> I could have 4 brand new computers for that drive 08:31 < Dougy> me too 08:31 < Dougy> lol 08:31 < Dougy> i could ahve more 08:31 < Dougy> like 6 08:32 < DarkAnt> still, its nice to know that in 4 years I'll have a 1TB solid state drive in my computer 08:39 < NickWebHA> I am very, very stuck. Can someone please help me? http://blog.lifebloodnetworks.com/?p=163 (Since it was a lot of information I posted it on my blog to make it easier for whoever is helping me.) 08:40 -!- ScriptFan [i=vincent@2a01:240:fe35:0:21a:70ff:fea3:44ab] has joined ##openvpn 08:41 < DarkAnt> NickWebHA: set a higher verb 08:41 < JodaX> DarkAnt, they will still be expensive in 4 years 08:41 < DarkAnt> but if it makes you feel any better, I'm still trying to get openvpn to work too :P 08:41 < DarkAnt> JodaX: yes, but they won't be 4K expensive 08:41 < NickWebHA> Alright. 08:42 < JodaX> hmm, propably still 500$ 08:42 < JodaX> ratio will only get marginally better 08:43 < DarkAnt> why do you think the price will stay so high? 08:43 < JodaX> you will get a 10tb normal drive for 200$ at that time 08:43 < JodaX> DarkAnt, asume halfing the price every year, thats overly optimistic but will still leave you with 250$ 08:43 < ecrist> NickWebHA: see here: 08:44 < ecrist> !logs 08:44 < vpnHelper> ecrist: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 08:44 < ecrist> !goal 08:44 < vpnHelper> ecrist: "goal" is Please clearly state your goal for your vpn: example, I would like to access the lan behind the server , I would like to access the internet over my vpn , I just want a secure connection between 2 computers , etc 08:44 * ecrist goes and makes breakfast 08:44 < NickWebHA> Will do. 08:46 < JodaX> DarkAnt, you don't believe they will be as cheap as normal disks in just 4 years, do you ? 08:47 < DarkAnt> no, but I'd expect them to be in the $500 or less range 08:47 < DarkAnt> or at least hope :D 08:47 < JodaX> 1tb for 500$ ? 08:47 < JodaX> sure 08:48 < JodaX> but at the same time you will get 10tb for well under 200 08:48 < JodaX> normal disk 08:48 < DarkAnt> yeah, but they don't have the read speed of solid state 08:49 < JodaX> aren't ssd's still about as fast as normal disks when it comes to read (no seek) speeds ? 08:49 < DarkAnt> I don't think so 08:49 < DarkAnt> wikipedia has a good article on them 08:49 < DarkAnt> let me check 08:50 < JodaX> everything under a order of magnitude is neglible 08:50 < DarkAnt> yeah, way faster read times 08:50 < DarkAnt> and by that I mean much faster seek times 08:50 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has quit ["Leaving."] 08:51 < JodaX> seek times obviously 08:51 < JodaX> but read times compare 08:51 < JodaX> seek times aren't that important 08:51 < JodaX> since there is still a very huge factor to ram 08:52 < DarkAnt> 250 MB/s read/write 08:52 < JodaX> outnumbering the costs of ram to hd space still by much 08:52 < JodaX> thats about 2x what a slow normal hd does 08:52 < JodaX> my server disks here do 120 08:52 < JodaX> and thats real speed, not lab test results 08:52 < DarkAnt> in fact I know a professor who is trying to figure out how solid state drives can play a role in some sort of swap setup 08:52 < JodaX> ... 08:53 < JodaX> professor microsoft ? 08:53 < Dougy> good bye mzima 08:53 < JodaX> whats their tech called, readyboost ? 08:53 < JodaX> -_- 08:53 < DarkAnt> no, just at my school 08:53 < DarkAnt> he's doing work with...umm 08:53 < JodaX> http://de.wikipedia.org/wiki/ReadyBoost 08:53 < vpnHelper> Title: ReadyBoost – Wikipedia (at de.wikipedia.org) 08:53 < DarkAnt> its some supercomputing place 08:55 < DarkAnt> but anyway, openvpn and why it will not play nice 08:56 < DarkAnt> no route to host :/ 08:57 < JodaX> if you got it on tcp 08:57 < JodaX> see if you can telnet that port 08:57 < DarkAnt> ok 08:57 < DarkAnt> well I can see the packets on both sides with tcpdump 08:57 < JodaX> forget tcpdump, see if you can telnet the port 08:57 < DarkAnt> ok 08:58 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has joined ##openvpn 08:59 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has quit [Client Quit] 09:00 -!- dauergast [n=sag@g226237107.adsl.alicedsl.de] has joined ##openvpn 09:00 < DarkAnt> hehe, my test machine didn't have telnet 09:04 < DarkAnt> no route to host 09:04 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 09:04 < DarkAnt> excellent 09:04 < DarkAnt> ok, I can work on this problem from here for a bit 09:04 < DarkAnt> thanks JodaX :) 09:05 < JodaX> flush iptables 09:05 < DarkAnt> that's going to kill my ssh session isn't it 09:05 < DarkAnt> well, here goes 09:06 < JodaX> well, not if you connectivity doesn't depend on iptables (nat, forwarding) 09:06 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 60 (Operation timed out)] 09:09 < DarkAnt> hehe 09:10 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has joined ##openvpn 09:10 < DarkAnt> TY JodaX :) 09:10 < JodaX> problem solved ? 09:10 < DarkAnt> <.< 09:10 < DarkAnt> I don't want to talk about it :P 09:10 < JodaX> ... 09:10 < DarkAnt> but yeah, problem solved 09:10 < DarkAnt> haha 09:10 < DarkAnt> thanks again 09:10 < NickWebHA> After a nice long trek through my apartment building to steal WiFi for this test I have returned with the logs: http://blog.lifebloodnetworks.com/?p=163 09:11 < NickWebHA> Also I put on pants for this so you know I am serious. 09:12 -!- nixfreak [i=d872c45a@gateway/web/freenode/x-oetmdjucanzpbzgi] has joined ##openvpn 09:13 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has joined ##openvpn 09:14 < nixfreak> Is there a way to script openVPN into a client that automatically connects to a server ? 09:14 < krzee> huh? 09:14 < NickWebHA> You mean include an OpenVPN client in another script or program? 09:14 < krzee> you mean like have it auto-connect on boot? 09:14 < nixfreak> yes 09:15 < NickWebHA> You could always do something like exec("open [configfile"); 09:15 < DarkAnt> nixfreak: put it in your bashrc 09:15 < nixfreak> include an openvpn client into a program 09:15 < krzee> bashrc? 09:15 < DarkAnt> oh, windows 09:15 < krzee> heh 09:15 < nixfreak> most clients use windows 09:15 < NickWebHA> Er, exec("openvpn [config]") 09:15 < krzee> just run it as a windows service 09:15 < krzee> it'll connect on boot 09:16 < NickWebHA> krzee: I think nix wants to write a program that will connect. 09:16 < nixfreak> its going to be a program that users download and just start 09:16 < nixfreak> yes NickWebHA 09:16 < krzee> just start, thats the windows gui app 09:16 < Dougy> hey jeff 09:16 < krzee> they just click it from the taskbar 09:16 < krzee> then it connects 09:16 < NickWebHA> nix: I remember reading something in the HOWTO about software that will package it for you. Check there. 09:17 < krzee> sup doug 09:17 < nixfreak> on the openvpn site ? 09:17 < krzee> !download 09:17 < vpnHelper> krzee: "download" is www.openvpn.net/download to download openvpn 09:17 < krzee> there 09:17 < Dougy> not shit 09:17 < Dougy> you 09:17 < NickWebHA> Yes. If not in the HOWTO somewhere on the page. 09:17 < NickWebHA> ^ site 09:17 < nixfreak> k thanks 09:17 < NickWebHA> My brain is going too many things right now. 09:17 < NickWebHA> ^ doing! 09:17 < krzee> doug, im drunk as shit, just woke up in someone elses bed with my girlfriend 09:17 < krzee> lol 09:18 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has quit [] 09:19 < NickWebHA> Can anyone look at my logs and tell me if they see anything strange? Nothing is jumping out at me: http://blog.lifebloodnetworks.com/?p=163 09:21 < Bushmills> dev tap is strange 09:21 < NickWebHA> How so? The HOWTO says it should be tap and not tun. 09:21 < krzee> !tunortap 09:21 < vpnHelper> krzee: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 09:21 < vpnHelper> krzee: against you over the vpn 09:22 < Bushmills> moin krzee 09:22 < krzee> moin moin bro 09:22 < Bushmills> submarine time? 09:22 < krzee> it would be a good idea 09:22 < krzee> ...i dont go to work for 5 1/2 hours 09:22 < Bushmills> http://forthfreak.net/snap/submarine.png 09:22 < krzee> i should at least get a beer 09:23 < NickWebHA> I need it for boardcasts (games, mostly). 09:23 < Bushmills> autotranslated 09:23 < krzee> im thinking zintronensaft didnt translate 09:24 < Bushmills> lemon juice. 09:24 < Bushmills> spelling error in it 09:24 < krzee> ahh 09:24 < Bushmills> stockbesoffen approximates to dead drunk 09:25 < NickWebHA> Anything else stand out? 09:25 < krzee> !ipp 09:25 < vpnHelper> krzee: "ipp" is (#1) the option --ifconfig-pool-persist ipp.txt does NOT create static ips, or (#2) Note that the entries in this file are treated by OpenVPN as suggestions only, based on past associations between a common name and IP address. They do not guarantee that the given common name will always receive the given IP address. If you want guaranteed assignment, see !iporder and !static 09:26 < NickWebHA> I do not care which IPs the clients grab. That is just in there because it was in the sample config which the HOWTO implied I should start with. 09:26 < Bushmills> i think you need mode server for multiple clients 09:27 < NickWebHA> I will try it. It was not in the sample config. Also right now I am just testing with a single client. 09:27 < krzee> nah server-bridge inclues mode server 09:27 < krzee> includes 09:27 < Bushmills> ah, ok 09:27 < krzee> it looks good to me if you bridged right and whatnot 09:28 < krzee> however, if all you need is bcasts 09:28 < krzee> !bcast 09:28 < vpnHelper> krzee: "bcast" is pptp source tree has bcrelay in it, bcrelay can be used to relay broadcasts over a tun setup 09:28 < NickWebHA> In Windows you just select the two adapters, bridge, and set the LAN IP on the bridged adapter that the LAN adapter had? 09:28 < krzee> dunno bout the ip part, but yes 09:29 < Bushmills> don't let your girlfriend read that, krzee. she might take offense at the giant tomcat 09:30 < NickWebHA> Right now I say broadcasts because I want to be able to give some friends the ability to share files and play games. I also like the idea of the bridge because it gives me the ability to do whatever crazy ideas I might get in the future. You know, instead of setting up specific cases now. 09:30 < Bushmills> some can be a bit touchy when seemingly referred to in conjunction with the word "giant" 09:33 < krzee> !wins 09:33 < vpnHelper> krzee: "wins" is http://oreilly.com/catalog/samba/chapter/book/ch07_03.html is a good link for seeing how to run WINS on samba 09:35 < JodaX> using openvpn to mitm people xD 09:35 < JodaX> funny idea 09:35 < krzee> done it 09:35 < krzee> so dont think it hasnt happened 09:35 < krzee> ;] 09:35 < JodaX> i could tell by what you said that you did 09:37 < NickWebHA> I am unclear about what my next step is. Why can I not get this working? 09:37 < JodaX> hmm, this 09:37 < JodaX> Sat Jan 16 16:36:47 2010 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up 09:37 < JodaX> is taking about 5 seconds, is there any way i can have it skip the test ? 09:38 < krzee> the wait is likely agood thing 09:38 < krzee> without it the routes prolly wouldnt work 09:42 < NickWebHA> I just thought of something; It appears to me that once connected to the server the client is trying to route all traffic through it. How so I configure the server and client to not do that? 09:43 < JodaX> remove redirect-gateway 09:45 -!- reiffert [n=thomas@mail.webersheim.de] has joined ##openvpn 09:46 < nixfreak> NickWebHA is this what your talking about http://openvpn.se/files/howto/openvpn-howto_roll_your_own_installation_package.html 09:46 < vpnHelper> Title: HowTo Roll Your Own OpenVPN Windows Installation Package (at openvpn.se) 09:46 < reiffert> !welcome 09:46 < vpnHelper> reiffert: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 09:46 < reiffert> !goal 09:46 < vpnHelper> reiffert: "goal" is Please clearly state your goal for your vpn: example, I would like to access the lan behind the server , I would like to access the internet over my vpn , I just want a secure connection between 2 computers , etc 09:46 < reiffert> I just wanna have world domination. 09:47 < nixfreak> !goal connect multiple vpn clients to a server to access an internal network 09:47 < vpnHelper> nixfreak: Error: "goal" is not a valid command. 09:47 < NickWebHA> nix: It about about a week ago but I think that might have been it. I think the one I saw was more recent than 2005, however. 09:48 < krzee> !route 09:48 < vpnHelper> krzee: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 09:50 < nixfreak> http://darkness.codefu.org/wordpress/2007/06/14/279 09:50 < vpnHelper> Title: Disgusting way to roll your own OpenVPN 2.1rc4 Windows installer | darkness (at darkness.codefu.org) 09:50 -!- caution [n=caution@unaffiliated/caution] has joined ##openvpn 09:51 < krzee> http://torrentfreak.com/oink-admin-found-not-guilty-walks-free-100115/ 09:51 < vpnHelper> Title: OiNK Admin Found Not Guilty, Walks Free | TorrentFreak (at torrentfreak.com) 09:51 < krzee> sweet 09:52 < krzee> openvpn2009, your irc handle is outdated ;] 09:52 < caution> heh 09:53 * krzee registers openvpn2010 with nickserv! 09:53 < krzee> hehe 09:54 < DarkAnt> sniped 09:55 < caution> on linux as the gateway, how do I forward a port from WAN to my openvpn LAN IP? 09:55 * reiffert registers openvpn-next-century with DNS registrar. 09:55 < reiffert> caution: using netfilter. 09:55 < krzee> caution, NAT 09:56 < krzee> err listen to reiffert over me 09:56 < krzee> hes likely less drunk 09:56 < reiffert> krzee: just guessing eh? 09:56 < krzee> yup 09:56 < krzee> i just woke up in someone else's bed with surprise... 09:56 < krzee> its an educated guess, lol 09:57 < reiffert> it was a boy? 09:57 < caution> will anyone help me out with the iptables syntax? 09:57 < krzee> yes, but he was on the floor and my girlfriend was in the bed with me 09:57 < reiffert> obvious surprise ;) 09:57 < krzee> (thank god) 09:58 < caution> I just need to know what roughly to look for on the man page 09:58 < reiffert> caution: !linnat 09:58 < caution> !linnat 09:58 < vpnHelper> caution: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 09:58 < reiffert> ah, stop, sorry, my fault. 09:58 < reiffert> you are looking for portforwarding, is it? 09:58 < caution> yeah 09:58 < caution> I'm already using linnat 09:58 < reiffert> manpage DNAT 09:59 < krzee> well the howto linked to at the end likely has it 09:59 < krzee> #3 09:59 < krzee> At the end of the two week trial the jury returned a unanimous verdict (12 to 0). Alan Ellis is not guilty of Conspiracy to Defraud the music industry. He walked out of Teesside Crown Court a free man today, his name cleared. 10:00 < krzee> oink, not guilty, i love it 10:00 < caution> expensive solicitors 10:01 < nixfreak> sweet he got off 10:01 < caution> he can afford them with his £20,000 month donations 10:02 < nixfreak> Torrent sites need to be more secure 10:02 < nixfreak> like scene top sites 10:03 < reiffert> secure like everybody can get an account. 10:03 < NickWebHA> I am taking a break. I have no idea what I should be doing and perhaps a fresh pair of eyes later will help me see something I am missing. 10:03 < NickWebHA> Thanks for the help, guys. I bet you will be seeing me again in the future. :-P 10:04 < nixfreak> no need more private torrent sits 10:04 < nixfreak> sites 10:04 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has quit ["Leaving."] 10:14 -!- G-Script50 [n=sag@g230099182.adsl.alicedsl.de] has joined ##openvpn 10:15 -!- G-Script50 [n=sag@g230099182.adsl.alicedsl.de] has quit [Read error: 104 (Connection reset by peer)] 10:32 -!- dauergast [n=sag@g226237107.adsl.alicedsl.de] has quit [Read error: 110 (Connection timed out)] 10:40 -!- Beira [n=_@port-12648.pppoe.wtnet.de] has joined ##openvpn 10:42 < DarkAnt> I'll assume the client isn't supposed to be restarting every 5 seconds 10:42 < reiffert> feature. 10:42 < DarkAnt> haha 10:47 -!- ScriptFan [i=vincent@2a01:240:fe35:0:21a:70ff:fea3:44ab] has quit [Remote closed the connection] 10:48 -!- Artio [n=_@port-12648.pppoe.wtnet.de] has quit [Connection timed out] 10:48 -!- Beira is now known as Artio 10:48 -!- ScriptFan [i=vincent@2a01:240:fe35:0:21a:70ff:fea3:44ab] has joined ##openvpn 10:53 -!- Artio [n=_@port-12648.pppoe.wtnet.de] has quit [" HydraIRC -> http://www.hydrairc.com <- \o/"] 10:59 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has joined ##openvpn 11:01 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 11:03 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 11:04 -!- napcae [n=napcae@i59F779EF.versanet.de] has joined ##openvpn 11:04 < napcae> hi 11:04 < napcae> can someone explain this?WARNING: potential route subnet conflict between local LAN 11:04 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Client Quit] 11:04 < napcae> clients can connect,but after disconnect they doens't have any connection anymore 11:08 < napcae> no one? 11:09 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has joined ##openvpn 11:15 -!- xeviox [n=ben@dslb-088-064-006-039.pools.arcor-ip.net] has joined ##openvpn 11:15 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 11:16 < xeviox> hi guys, I've setup openvpn with routing on my server, but it seems that I have a routing error somewhere (no firewall problem, I've checked that) 11:16 < caution> maybe your lan and openvpn lan are using the same subnet and maybe that's not a good idea 11:16 < krzee> !route 11:16 < vpnHelper> krzee: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 11:17 < xeviox> someone told me that but my problem is little bit strange, let me explain 11:17 < krzee> if you have same subnets anywhere, its a problem 11:17 < xeviox> I have a remote subnet of 192.168.115.x at the client location 11:18 < xeviox> and the subnet at the servers location is 192.168.0.x (don't equals the clients one) 11:18 < krzee> then the vpn subnet cannot be that, nor can any subnet being shared over the vpn 11:18 < xeviox> krzee: why there can't be shared any subnet over the vpn? 11:18 < krzee> all that matters is the vpn subnet, and all subnets being routed over the vpn 11:18 < xeviox> vpn is left at default settings 11:18 < xeviox> the 10.8.0.x 11:18 < krzee> there ARE no default settings 11:19 < krzee> werd 11:19 < krzee> any subnet can be shared over the vpn, but then whatever subnet is shared over the vpn must not conflict with any others 11:19 -!- caution [n=caution@unaffiliated/caution] has quit [] 11:19 < napcae> i don't geht why my local LAN is 10.8.0.0 11:19 < napcae> local LAN [10.8.0.0/255.255.255.0] and remote VPN [10.8.0.0/255.255.255.0] 11:19 -!- napcae [n=napcae@i59F779EF.versanet.de] has quit [Remote closed the connection] 11:19 < xeviox> in my case there are no conflicts, am I wrong? 11:19 -!- napcae [n=napcae@i59F779EF.versanet.de] has joined ##openvpn 11:19 < krzee> so if you share the 192.168.0.x subnet, no client in his own 192.168.0.x may use the vpn 11:20 < xeviox> thats clear 11:20 < xeviox> the client has a subnet of 192.168.115.x 11:20 < krzee> napcae, your lan at home is 10.8.0.0? 11:20 < xeviox> when I create the tunnel (works without any problem) 11:20 < xeviox> I can ping 10.8.0.1 11:20 < krzee> xeviox, cool 11:20 < krzee> so wheres the problem 11:20 < xeviox> and 10.8.0.6 (which was the clients ip) 11:21 < xeviox> also I can ping the servers local address (not lan address) from the client which is for example 192.168.0.50 11:21 < xeviox> but the problem is 11:21 < xeviox> that I can't ping any of the other computers in the servers lan 11:21 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has quit ["Leaving"] 11:21 < xeviox> like another server at 192.168.0.51 11:21 -!- napcae [n=napcae@i59F779EF.versanet.de] has quit [Read error: 54 (Connection reset by peer)] 11:22 < xeviox> the server pushes a route to 192.168.0.x 11:22 < xeviox> but that seems to just work for the servers local address 11:22 < xeviox> not for any other computers 11:22 < xeviox> in that subnet 11:22 -!- napcae [n=napcae@i59F779EF.versanet.de] has joined ##openvpn 11:22 < napcae> !welcome 11:22 < vpnHelper> napcae: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 11:22 < xeviox> so there seems to be a routing error 11:22 < xeviox> somewhere .. 11:23 < krzee> [13:22] the server pushes a route to 192.168.0.x 11:23 < napcae> my home subnet is 192.168.0.1 11:23 < napcae> my home subnet is 192.168.0.0 11:23 < krzee> 'so you can have no clients from that subnet connect 11:23 < xeviox> krzee, yes it does 11:23 < napcae> and not 10.8.0.0 11:24 < xeviox> krzee, sure, like I've said, the client is at the subnet 192.168.115.x 11:24 < xeviox> but the client should get a connection to the servers subnet through the tunnel, right? 11:24 < krzee> no road warriors 11:25 < xeviox> the client is one 11:25 < krzee> then you should change your server subnet 11:25 < xeviox> server @ company (192.168.0.x) / client @ home (192.168.115.x) 11:25 < xeviox> why? 11:25 < xeviox> is there any conflict? 11:26 < krzee> you saidclient is road warrior 11:26 < xeviox> sorry I'm not that experienced with routing and networks .. 11:26 < krzee> he will find himself on a 192.168.0.0, its basically the most common subnet 11:26 < krzee> when he does, the vpn will break his routing 11:26 < xeviox> ok that's clear 11:26 < Bushmills> i wager a penny on 192.168.1.0 being the most common one 11:27 < xeviox> but the client has the subnet (192.168.115.x) which doesn't break the routing (afaik) 11:27 -!- napcae [n=napcae@i59F779EF.versanet.de] has quit [Remote closed the connection] 11:27 < xeviox> ^^ 11:27 < krzee> Bushmills, i bet a beer when we meet one day 11:27 < krzee> xeviox, correct 11:27 < xeviox> ok 11:27 -!- napcae [n=napcae@i59F779EF.versanet.de] has joined ##openvpn 11:27 < xeviox> and the routing works for the servers local address 11:27 < Bushmills> beer agains penny - i'd be a fool not to take you on on that 11:27 < xeviox> but not for any other pc's 11:28 < xeviox> *computers 11:28 < krzee> beer against beer, i was raising the stakes ;] 11:28 < xeviox> so 11:28 < xeviox> any ideas what can couse such an error? 11:28 < xeviox> *cause 11:28 < krzee> xeviox, what error? 11:28 < xeviox> that the client couldn't reach other local addresses than the servers one 11:28 < napcae> any ideas why my tunnelblick client says that my localsubnet is 10.8.0.0? 11:29 < Bushmills> taken. penny is just dead weight. beer is active weight. 11:29 < krzee> did you read !route? 11:29 < xeviox> napcae, maybe that's the ip the vpn tunnel uses 11:29 < krzee> napcae, tunnelblick is reporting the vpn subnet 11:29 < xeviox> krzee: yes, which doesn't mean I've understand all .. 11:29 < krzee> which makes sense, its a vpn app... 11:29 < krzee> xeviox, 11:29 < xeviox> but like I said the server pushes a route to its local subnet 11:29 < napcae> so its my wrong server config? 11:29 < krzee> !ipforward 11:29 < vpnHelper> krzee: "ipforward" is please choose between !linipforward !winipforward and !fbsdipforward 11:30 < xeviox> so this is what works / not works 11:30 < krzee> xeviox, did you read the section "ROUTES TO ADD OUTSIDE OPENVPN" 11:30 < xeviox> client (192.168.115.50) -> server (192.168.0.50) works 11:30 < krzee> sounds like thats the part you missed 11:30 < xeviox> k, I'll recheck :D 11:31 < krzee> basically, did you add a route to your router manually 11:31 < xeviox> !routing 11:31 < vpnHelper> xeviox: Error: "routing" is not a valid command. 11:31 < krzee> if not, thats the problem 11:31 < xeviox> !route 11:31 < krzee> !route 11:31 < vpnHelper> xeviox: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 11:31 < vpnHelper> krzee: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 11:31 < xeviox> a single route to the router at the server location or at my local location? 11:32 < krzee> Bushmills, and i actually think you're right, but i like beer and would happily buy you one when we find ourselves in the same location 11:32 < krzee> ;] 11:32 < napcae> i don't get it.. 11:32 < napcae> i'll begin with a new server.conf, maybe thats help.. 11:32 < xeviox> napcae: as openvpn uses a virtual network it has its own subnet which is 10.8.0.x by default (afaik) 11:32 < Bushmills> good beer available here and in some neighbouring countries 11:33 < xeviox> you'll find good beer here in germany :P 11:33 < krzee> napcae, you dont have a problem 11:33 < krzee> tunnelblick SHOULD be talking about your vpn subnet 11:33 < Bushmills> with the neighbouring countries being czech republic, belgium, and to some extent, poland too nowadays. 11:34 < napcae> i have a problem 11:34 < napcae> when i disconnect from vpn 11:34 < napcae> then i don't have any connection to internet 11:34 < krzee> xeviox, there is no default 11:35 < krzee> it just is the subnet commonly used in examples 11:35 < xeviox> k 11:35 < krzee> maybe germany is the next country i go to 11:35 < napcae> but why i get this warning message? 11:35 < Bushmills> napcae: i assume your default route was deleted 11:35 < krzee> when is summer Bushmills ? 11:35 < napcae> hmm 11:35 < krzee> napcae, what warning? 11:35 < Bushmills> so it couldn't be restored after disconnect 11:35 < Bushmills> !def1 11:35 < vpnHelper> Bushmills: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 11:35 < Bushmills> napcae: ^^^^^ 11:36 < xeviox> so if I get it right, I have to give the router add the server location a route to the vpn subnet (10.8.0.x for me).. 11:36 < krzee> correct 11:36 < napcae> already tried, that doesnt work either 11:36 < xeviox> think I've done that already, but I'm not sure if it works 11:36 < krzee> the router needs to know that 10.8.0.0 exists behind the gateway 192.168.0.50 11:36 < xeviox> is there a way to check if that's the problem? 11:37 < krzee> xeviox, a packet sniffer... 11:37 < xeviox> k sounds great :D 11:37 < xeviox> k, I'll use a packet sniffer on the server, if there is comming traffic back from another client, the route on the router should work, right? 11:37 < Bushmills> napcae: check your client route. if there's no default to your original/usual gateway, add it manually, or restart networking. 11:38 < Bushmills> then connect and disconnect openvpn again. 11:38 < xeviox> if there is no traffic coming back, it seems that the routing does not work .. 11:38 < Bushmills> test connectivity after that 11:38 < xeviox> k, thank you guys, will check that and maybe be back later 11:39 < xeviox> and check "Augustiner" beer if you are in Germany (Munich) ;) 11:39 < Bushmills> acceptable 11:39 < Bushmills> though i prefer andechser 11:39 < xeviox> ^^ 11:40 < xeviox> ah ok, yes may be better but not that common as it's a smaller "company" (imho) 11:40 < Bushmills> i lived for a year close to the monastery :) 11:40 < xeviox> k, again: thank you, bbl 11:40 < napcae> the problem isn't dissapearing 11:40 < xeviox> ah cool 11:40 < Bushmills> was the locally available beer there 11:41 < napcae> after disconnect from vpn, no internetconnection 11:41 < xeviox> which city? 11:41 < Bushmills> bad kohlgrub 11:41 < napcae> netstat -nr does not show anything remakeble 11:41 < Bushmills> close to ogau 11:41 < Bushmills> (oberammergau) 11:41 < krzee> i still dont understand what the problem is napcae 11:41 < xeviox> ^^ 11:41 < krzee> as in, what is the symptom 11:41 < xeviox> k heard of it but never was there ^^ 11:41 < xeviox> cu later ;) 11:41 < xeviox> bye 11:42 -!- xeviox [n=ben@dslb-088-064-006-039.pools.arcor-ip.net] has quit ["Ex-Chat"] 11:42 < napcae> problem: after disconnecting from vpn, no internet here 11:42 < krzee> ahh 11:42 < krzee> !def1 11:42 < vpnHelper> krzee: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 11:42 < napcae> already added! 11:42 < krzee> reboot, test 11:43 < napcae> sudo /etc/init.d/openvpn stop ; start 11:43 < krzee> negative 11:43 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 11:43 < krzee> you still dont have the route to default already 11:43 < napcae> reboot? 11:43 < krzee> from when you didnt have def1 11:43 < napcae> client or server 11:43 < krzee> well reboot or manually fix routing table first 11:43 < krzee> reboot is easier for me to know you did it right ;] 11:43 < krzee> the client, thats the only thing with an issue right? 11:44 < Bushmills> krzee: actually, reiffert intriduced me to a local brand of beer, which is quite good. 11:44 < krzee> and if you're pushing def1 be sure you restarted openvpn as you said above 11:44 < napcae> okay i reboot the client 11:44 < krzee> Bushmills, i believe all local beer (local to you) is good 11:44 < Bushmills> i think thar's his preferred beer here now, when he has the opportunity to get some of it 11:44 < napcae> cya 11:44 -!- napcae [n=napcae@i59F779EF.versanet.de] has quit ["Lost terminal"] 11:44 < krzee> the beer here is good, but they only have pilsner 11:45 < Bushmills> that's Volkerbräu, IIRC 11:45 < krzee> which does get old 11:45 < krzee> but better than costa rica... they only had pilsner and it sucked 11:45 < krzee> i could def go for some pale ale 11:45 < krzee> or some heffe 11:46 < Bushmills> hefe. the brand xeviox mentioned makes some good hefe 11:46 < krzee> mmm 11:46 < Bushmills> but actually, one of the cheapest mass-produced beer here is actually quite acceptable 11:47 < krzee> the mass produced stuff from usa is complete crap 11:47 < krzee> but the smaller places ave some good stuff 11:47 < Bushmills> they don't advertise for their brew 11:48 < Bushmills> oh well we can do a blind test on that brand with you 11:48 < krzee> yesyes! 11:48 < Bushmills> i reckon you'll be surprised to find out which one was the cheap brew 11:48 < krzee> dude come out here sometime and we'll rock the super blind rum taste test 11:48 < krzee> my rum collection is growing 11:49 < krzee> brought some back from costa rica dutyfree from guatemala and nicaragua 11:49 < Bushmills> hehe. i am just working on a bottle of rum 11:49 < krzee> and of course im stocked on caribbean rum 11:49 < Bushmills> actually, the cause why we weren't admitted to a local club 11:49 < Bushmills> had my flask full with it 11:49 < krzee> the keychain flask? 11:49 < krzee> or a real one 11:50 -!- napcae [n=napcae@i59F779EF.versanet.de] has joined ##openvpn 11:50 < napcae> okay still not working 11:50 < Bushmills> no, there was cognac in that one. a larger one, 8 oz. 11:50 < krzee> napcae, logs? 11:50 < napcae> client? 11:50 < Bushmills> the one which has to come to rescue with poor coffee or tea 11:50 < krzee> both 11:51 < napcae> client http://pastebin.com/m713fc8fe 11:51 < napcae> where can i find the log for server? 11:51 < krzee> Bushmills, they search you when you enter? 11:51 < Bushmills> there they did 11:51 < napcae> because theres nothing in openvpn-status.log 11:51 < krzee> they dont even do that in usa 11:51 < krzee> openvpn-status isnt a log 11:51 < Bushmills> didn't find my ceramic blade knife, but the flask they did 11:51 < krzee> its a status file 11:52 < napcae> okay 11:52 < krzee> Bushmills, what makes me laugh is airports taking my water but leaving me my fully charged laptop battery 11:52 < Bushmills> ah, yes. their metal detectors are also not 100% 11:52 < krzee> client is on 192.168.0.0 subnet? 11:52 < Bushmills> on a flight they missed my (forgotten to take it off) leatherman 11:53 < Bushmills> was just carrying it on my belt 11:53 < krzee> my laptop battery holds as much stored energy as a hand grenade 11:53 < krzee> just make the wrong connection and BOOM 11:53 < krzee> but i cant have my water 11:53 < krzee> must buy their $2 water, lol 11:53 < Bushmills> yeah. energy densitiy is higher than that of dynamite 11:54 < krzee> napcae, client is on 192.168.0.0 subnet? 11:54 < Bushmills> though the "boom" is more like a "woooosh" 11:54 < napcae> jep 11:54 < krzee> there the problem 11:54 < napcae> gateway(router) is 192.168.0.1 11:54 < krzee> 2010-01-16 18:47:30 /sbin/route add -net 192.168.0.0 10.8.0.5 255.255.255.0 11:54 < krzee> you're trying to route that subnet over the vpn 11:54 < napcae> okay 11:55 < krzee> which breaks your routing 11:55 < krzee> you either have route 192.168.0.0 in your client config, or you push it from server config 11:55 < krzee> is the server on a lan of 192.168.0.0? 11:55 < napcae> yes 11:55 < krzee> and you want to use that lan over the vpn? 11:55 < napcae> yes 11:56 < napcae> it worked yet 11:56 < krzee> you must change the server lan 11:56 < krzee> the subnet 11:56 < napcae> but why i have to do that now?it already worked before.. 11:56 < krzee> to something uncommon 11:56 < napcae> thats so strange 11:56 < krzee> when it worked you werent on a conflicting subnet 11:56 < krzee> or you didnt push that subnet to the client 11:56 < krzee> 1 of the 2 11:59 < DarkAnt> VERIFY ERROR: depth=1, error=self signed certificate in certificate chain 11:59 < krzee> DarkAnt, you messed up when making your certs 11:59 < DarkAnt> yeah, I figured as much 11:59 < krzee> do it again using the howto as your guide, OR use ssl-admin 11:59 < krzee> !howto 11:59 < vpnHelper> krzee: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 11:59 < krzee> !ssl-admin 11:59 < DarkAnt> but I followed the howto 11:59 < vpnHelper> krzee: "ssl-admin" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN_Server, or (#2) svn co https://www.secure-computing.net/svn/trunk/ to grab it from svn, or (#3) if you use freebsd, it is in ports 11:59 < krzee> hence the word 'again' ;] 12:00 < DarkAnt> haha 12:00 < DarkAnt> ok 12:00 < napcae> so i have to change my subnet now? 12:01 -!- DelphiWorld [n=Miranda@41.104.68.129] has joined ##openvpn 12:01 < DelphiWorld> hi dear all 12:01 < krzee> napcae, correct 12:01 < napcae> side note: my friend is sitting here; he#s got a netbook and he can join from the same network 12:01 < DelphiWorld> any web gui to build an VPN based on openvpn? 12:01 < napcae> he has also a connection 12:01 < napcae> and after disconnection vpn, he s still got a internet connection 12:01 < krzee> DelphiWorld, openvpnAS uses a web gui, but we dont support it here 12:02 < krzee> napcae, his logs? 12:02 < napcae> jap 12:02 < krzee> napcae, and regardless of anything you say, YOU CAN NOT PUSH YOUR LOCAL LAN SUBNET OVER THE VPN WITHOUT UNWANTED SIDE-EFFECTS 12:02 < krzee> just to be extra clear ;] 12:02 < DelphiWorld> krphop: ok 12:03 < krzee> DelphiWorld, but you likely dont need a gui 12:03 < krzee> see this: 12:03 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has quit ["Leaving"] 12:03 < krzee> !sample 12:03 < vpnHelper> krzee: "sample" is (#1) http://www.ircpimps.org/openvpn.configs for a working sample config, or (#2) DO NOT use these configs until you understand the commands in them, read up on each first column of the configs in the manpage (see !man) 12:03 < krzee> !howto 12:03 < vpnHelper> krzee: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 12:03 < krzee> howto for generating the keys 12:03 < DelphiWorld> krphop: ok thx 12:03 < krzee> sample is a good starting point, is a basic vpn connection just to connect to the single machine 12:03 < DelphiWorld> my problem is only linux accessibility;) 12:03 < krzee> to build on that: 12:03 < krzee> !goal 12:03 < vpnHelper> krzee: "goal" is Please clearly state your goal for your vpn: example, I would like to access the lan behind the server , I would like to access the internet over my vpn , I just want a secure connection between 2 computers , etc 12:03 * DelphiWorld is blind 12:04 < krzee> you dont need linux 12:04 < DelphiWorld> and i think krphop you know me allready;) 12:04 < krzee> it works on linux,bsd,windows,osx,solaris 12:04 < DelphiWorld> krphop: i have a VPS in linux 12:04 < krzee> im krzee ;] 12:04 < krzee> i know you? 12:04 < krzee> from here? 12:04 < napcae> http://pastebin.com/m75abea11 12:04 < DelphiWorld> krphop: algeria 12:04 < krzee> i mean this channel 12:04 < DelphiWorld> krphop: i see your nick allready before, and i think we talked allready 12:05 < napcae> since i changed my server.conf, he also don't have internetconnection while is connected to the vpn; but after disconnecting 12:05 < krzee> cool 12:05 < krzee> right 12:05 < krzee> napcae, exactly 12:06 < napcae> after disconnection, he has internetconnection again 12:06 < krzee> he doesnt ACTUALLY have a connection to the vpn 12:06 < krzee> he connects and loses his route to the internet 12:06 < krzee> which means he loses his connection to the vpn 12:06 < napcae> hmm 12:08 * krzee loves ssh'ing to his mac when his girlfriend is on it and using the say command 12:08 < krzee> freaks her out 12:08 < krzee> i need to remember to setup a vpn to home to do that to her when im not home 12:10 < napcae> .. 12:10 < napcae> okay the warning dissapears 12:11 < napcae> without changing the subnet 12:11 < krzee> sure, by not pushing the route 12:11 < DelphiWorld> krzee: thx 12:11 -!- DelphiWorld [n=Miranda@41.104.68.129] has left ##openvpn ["I'm a happy Miranda IM user! Get it here: http://miranda-im.org"] 12:11 < napcae> jep 12:13 < napcae> -.-' thats so strange.. 12:13 < napcae> okay gotta go, thank u guys 12:13 < krzee> its only a problem when you push the route 12:13 < krzee> but if you need to access server lan, you need to change that subnet 12:13 < krzee> then push the route 12:13 < krzee> then add a route to that lans router 12:13 < napcae> hm 12:13 < krzee> (assuming the server isnt on the router) 12:14 < napcae> i don't get, becuase it really worked 100%gg 12:14 < napcae> with the same configuration.. 12:16 < krzee> lol 12:16 < krzee> listen to me or dont 12:16 < krzee> but the only way to have it working right is by listening ;] 12:16 < DarkAnt> *shrugs* it works now 12:16 < krzee> (i assume thats why you're here) 12:16 < DarkAnt> oh 12:16 < DarkAnt> I know what I did 12:16 < DarkAnt> ok 12:16 < DarkAnt> I didn't delete the old certs and stuff 12:17 < DarkAnt> I just used clean-all 12:17 < napcae> jep, i'll 12:17 < napcae> thank u again 12:17 < napcae> gotta go!! 12:17 < napcae> bye 12:17 -!- napcae [n=napcae@i59F779EF.versanet.de] has quit ["leaving"] 12:17 < DarkAnt> things are working now 12:17 < DarkAnt> huzza! 12:17 < krzee> cool what did you change? 12:18 < DarkAnt> clean-all doesn't delete the stuff in /ect/openvpn 12:18 < DarkAnt> it just gets the stuff in /etc/openvpn/easy-rsa/keys 12:18 < krzee> right 12:19 < DarkAnt> well now we both know :P 12:23 -!- stony [n=ol@77-21-120-206-dynip.superkabel.de] has joined ##openvpn 12:23 < stony> hi 12:23 < stony> i know this is a weird question but can i create a connection without encryption ? 12:23 < reiffert> stony: hi. yes you can. 12:24 < stony> reiffert: only disallowing all encryption ciphers ? 12:24 < reiffert> stony: I'm not into it, but I've read that it will work. Guess it was when reading the manpage. 12:25 < stony> ok, i'll recheck the manpage 12:25 < stony> other question: can i use environmental variables inside the openvpn config file ? 12:25 < stony> eg $USER order %USERNAME% on winodow ? 12:26 < reiffert> You might wanna read the chapter about environmental variables. 12:27 < stony> reiffert: but this section only applies to vars exported by openvpn to the env the script is run in 12:27 < stony> i need vars inside the openvpn config file 12:27 < reiffert> Think about the time when you need the vars and have them in the scripts that run at this particular time. 12:29 < stony> reiffert: i would need cryptopapicert "SUBJ:%USERNAME%" 12:29 < stony> in the client config file 12:29 < reiffert> I can't find cryptopapicert in the manpage. 12:30 < stony> http://www.openvpn.net/index.php/open-source/documentation/manuals/69-openvpn-21.html 12:30 < vpnHelper> Title: OpenVPN 2.1 (at www.openvpn.net) 12:30 < reiffert> I cant find that word there neither 12:31 < stony> eer? 12:31 < reiffert> "cryptopapicert" 12:32 < stony> ah you found a typo 12:32 < stony> my hero ;) 12:32 < stony> try "cryptoapicert" 12:33 < reiffert> api vs papi ;) 12:40 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: krzie, Dougy, mrnice1 12:46 -!- krzie [n=krzee@unaffiliated/krzee] has joined ##openvpn 12:46 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 12:48 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: krzie, mrnice1 12:48 -!- krzie_ [n=krzee@butters.secure-computing.net] has joined ##openvpn 12:49 -!- Netsplit over, joins: mrnice1 12:51 -!- McManiaC [n=McManiaC@n-sch.de] has joined ##openvpn 12:51 < McManiaC> hey, is it possible to limit traffic of client xy with openvpn? 12:52 < stony> McManiaC: sure - use traffic shaping 12:52 < stony> qos/cos/tos are the magic words on linux :) 12:52 < McManiaC> okay 12:52 < McManiaC> and is it possible to split that traffic over several vpn servers? 12:53 < McManiaC> or use server a until traffic limit is reached, then change to server b? 12:53 < stony> McManiaC: do you mean channel bonding or load balancing ? 12:53 < stony> you can define more than one connection profile on the "client"-side 12:53 < stony> and if the traffic limit on server a is reached, deny the connection 12:53 < stony> then the client will automagically connect to server b 12:54 < McManiaC> can you tell the client which server to use? 12:54 < McManiaC> serverside 12:54 < stony> McManiaC: either by roundrobin or by sequential testing 12:54 < stony> McManiaC: you can use the tags to do this 12:55 < stony> McManiaC: check it out at the top of the manual: http://www.openvpn.net/index.php/open-source/documentation/manuals/69-openvpn-21.html 12:55 < vpnHelper> Title: OpenVPN 2.1 (at www.openvpn.net) 12:55 < stony> no that's not possible 12:55 < stony> as you can't push options that execute scripts this won't work 12:57 < McManiaC> that qos stuff, is that part of vpn? or do you need iptables/whatever? 12:58 < krzee> --shaper is in the vpn 12:58 < stony> McManiaC: it's mostly done through the "tc" command 12:58 < krzee> iptables or whatever will get more done 12:58 < krzee> but --shaper does exist 12:58 < krzee> !man 12:58 < vpnHelper> krzee: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 12:58 < stony> krzee is right - there is a way to do this on the openvpn side :) 12:59 < McManiaC> ok 13:01 < McManiaC> what do you need to connect two servers? 13:01 < stony> ? 13:01 < McManiaC> so they share the same network, like for example irc servers work 13:01 < stony> I don't really get what you mean 13:01 < McManiaC> is it possible to setup one vpn using two servers? 13:02 < krzee> you can create another vpn connection between the servers 13:02 < McManiaC> so you can connect to either the one or the other server 13:02 < stony> sure 13:02 < stony> best way to do this would be to use a pki 13:02 < krzee> dont think of it as connecting 2 vpn servers 13:02 < krzee> think of it as connecting those 2 computers 13:02 < krzee> then its just another vpn connection ;] 13:02 < krzee> however, why would you need that? 13:02 < stony> krzee: i guess what he meant is to have two systems that provide access to the same subnet on the other side 13:03 < McManiaC> well thats not exactly what I'm looking for 13:03 < stony> for failover/loadbalancing :) 13:03 < McManiaC> yup 13:03 < nixfreak> is there a limit on how many client you can have connected to a openVPN server ? 13:03 < krzee> wouldnt carp on server side be better? 13:03 < stony> McManiaC: problem can be routing/brouting to the vpn-access-machines 13:03 < stony> McManiaC: but if you handle this, there shouldn't be any problem 13:04 < stony> McManiaC: the sky is the limit, or better your hardware and it's performance 13:04 < nixfreak> do accel cards help out a lot for that 13:07 < McManiaC> well, my problem is that my servers all have limited traffic… and with vpn all the traffic between clients would cause the vpn servers traffic to go up a lot 13:09 < McManiaC> so I want to share that traffic over my servers to allow a greater total number of traffic 13:09 < stony> McManiaC: i would try to find a connection with better conditions 13:11 < McManiaC> hmm 13:12 < krzee> McManiaC, 13:12 < krzee> is most your traffic gunna be between clients? 13:12 < McManiaC> yes 13:12 < krzee> you might want a different vpn solution 13:12 < krzee> hamachi and ipsec handle clients talking direct 13:12 < Bushmills> why would traffic between servers go up a lot with openvpn, unless it is additional traffic, instead of migrated from non-vpn to vpn traffic? 13:12 < krzee> (i basically NEVER say anything like that) 13:13 < krzee> however for your exact situation, much easier to use one of those and not have client to client traffic travel over the server 13:13 -!- ruied [n=ruied@bl7-213-7.dsl.telepac.pt] has joined ##openvpn 13:13 < McManiaC> hmkay 13:13 < stony> my "vpn bridgeheads" are dedicated servers... 13:14 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has joined ##openvpn 13:16 < McManiaC> is hamachi available for linux? i thought it was a windows tool ^^ 13:18 < krzee> no idea 13:18 < Bushmills> doesn't matter, there is openvpn for linux 13:19 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has quit [Client Quit] 13:20 < krzee> Bushmills, his traffic is heavy on client to client, which will cause his server to run out of bandwidth 13:20 < krzee> his orig question is how to balance that over multiple servers 13:20 < krzee> however i told him that if he doesnt use openvpn he can get client to client traffic direct without it going over the server 13:20 < krzee> for him that sounds like the better solution 13:21 < McManiaC> yeah… 13:21 < krzee> better than hacking up some convoluted balancing act with ovpn 13:21 < Bushmills> giving up one traffic-limited server, and taking a (probably cheaper) unlimited one may be the easiest solution 13:21 < Bushmills> McManiaC: how much do you pay for one? 13:21 < stony> yeah a dedicated one with unlimited bandwith :) 13:22 < McManiaC> I'm actually looking for a unlimited bandwith one 13:22 < Bushmills> less than 50 €? 13:22 < McManiaC> but most of them are either very expensiv or more like "yeh, we dont charge you but we'll cut down your general bandwith" 13:22 < stony> in germoney you get at least 10tb/month for 50€ 13:23 -!- sigi [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Read error: 104 (Connection reset by peer)] 13:23 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 13:24 < Bushmills> unlimited *traffic* or unlimited *bandwidth* ??? 13:24 -!- DelphiWorld [n=Miranda@41.104.68.129] has joined ##openvpn 13:24 < DelphiWorld> hi 13:24 < DelphiWorld> krzee: do we support win32 here? 13:24 < stony> Bushmills: unlimited bandwith with 10tb traffic/month 13:24 < krzee> in regards to openvpn, yes 13:24 < DelphiWorld> krzee: i am connected now; good info krzee! 13:25 < krzee> =] 13:25 < DelphiWorld> krzee: but the trafic in win32 is not going troug openvpn tunnel... why? 13:25 < Bushmills> i think practical limits are at 10 gbit per second bandwidth right now. unlimited may be out of reach. 13:25 < stony> DelphiWorld: routing wrong 13:25 < krzee> !redirect 13:25 < vpnHelper> krzee: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 13:25 < stony> Bushmills: yeah - but i guess your cpu power won't stand 10gbit/s if it's encoded and routed through one or more vpn tunnels 13:26 < DelphiWorld> krzee: how to plz in an windows machine? 13:26 < krzee> !winipforward 13:26 < vpnHelper> krzee: "winipforward" is http://support.microsoft.com/kb/315236 to enable ip forwarding on windows 13:26 < krzee> !winnat 13:26 < vpnHelper> krzee: "winnat" is http://support.microsoft.com/kb/306126 for windows nat (windows calls it internet connection sharing aka ICS) 13:26 < Bushmills> and many routers still work with 100 mbit/sec. conflicting even more with unlimited bandwidth 13:26 < krzee> Bushmills, he means traffic limit 13:27 < Bushmills> that's why i asked 13:27 < Bushmills> but he insists on bandwidth 13:27 < krzee> he'ld prolly get it right in german ;] 13:27 < stony> are you talking about me ? 13:27 < Bushmills> no 13:27 < krzee> whoever insists on the word bandwidth 13:28 < Bushmills> about McManiaC 13:28 < krzee> out of who is active right now im the only non german 13:28 < Bushmills> we can adopt you 13:28 < krzee> yay! 13:28 < krzee> whens summer there? 13:28 < krzee> august or feb? 13:28 < stony> krzee: we're in the mittle of winter now 13:28 < stony> -17°C a few days ago 13:28 < McManiaC> Bushmills: traffic 13:28 < stony> august 13:28 < Bushmills> or declare you honarary German 13:28 < stony> s/mittle/middle 13:29 < krzee> Bushmills, i need to prove myself with beer first dont i? 13:29 < stony> we could assimilate him - then he wouldn't care about summer/winter :D 13:29 < Bushmills> about july is when summer scorches 13:29 < Bushmills> better that than with a sample devouring of nieuwe haring 13:30 < krzee> sweet 13:30 < stony> the german purity law is the oldest law we have :) so beer shouldn't be a problem ;) 13:30 < krzee> i get a vacation in august 13:30 < krzee> i will hafta try to make it out there if you and reif will be around 13:30 < Bushmills> very likely 13:32 < krzee> i know some girls out there too, will hafta see what part they're in 13:32 < krzee> they were in san diego 13:32 < krzee> fun chicks 13:33 < krzee> is english pretty common there? 13:33 < Bushmills> yes, lot of folks speak english 13:33 < Bushmills> though you don't hear it frequently. not much opportunity to use it 13:34 < Bushmills> some sound a bit like the TV crook of german origin 13:34 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 13:34 < Bushmills> menny problems wiz ze "th" 13:35 < Bushmills> reiffert likes the idea too he says 13:35 < Bushmills> i just drew his attention on your intention 13:36 < Bushmills> he's affirmatively not opposed against the notion of lifting some pints 13:37 < krzee> yesyes! 13:37 < reiffert> I enjoy it, whatever it takes :) 13:37 < reiffert> got to run, bbl 13:44 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has joined ##openvpn 13:50 -!- LobbyZ [n=default@main.lobbyzffs.com] has quit ["Free FTW"] 13:50 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 13:51 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Read error: 104 (Connection reset by peer)] 13:51 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 13:54 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Remote closed the connection] 13:55 -!- DelphiWorld [n=Miranda@41.104.68.129] has quit [Read error: 110 (Connection timed out)] 13:55 -!- gallatin [n=gallatin@dslb-092-073-078-087.pools.arcor-ip.net] has joined ##OpenVPN 13:56 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 13:58 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Read error: 60 (Operation timed out)] 13:58 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 14:06 -!- LobbyZ` [n=default@main.lobbyzffs.com] has joined ##openvpn 14:08 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Remote closed the connection] 14:08 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 14:09 < DarkAnt> rock out! I totally have openvpn working. Thanks for all of the help everyone :) 14:09 < krzee> =] 14:11 < DarkAnt> now I just need to figure out how to get the firewall rules to play nice in centos 14:11 < DarkAnt> The iptables stuff seems to be handled by system-config-securitylevel 14:12 < DarkAnt> because when I thought I was punching holes through my firewall, I was not 14:12 < DarkAnt> that program controls the iptables stuff I guess :/ 14:19 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Remote closed the connection] 14:19 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 14:26 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Read error: 60 (Operation timed out)] 14:27 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 14:37 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Remote closed the connection] 14:37 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 14:47 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Remote closed the connection] 14:47 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 14:55 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Read error: 60 (Operation timed out)] 14:55 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 14:56 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Read error: 104 (Connection reset by peer)] 14:56 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 15:06 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Remote closed the connection] 15:06 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 15:06 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Read error: 104 (Connection reset by peer)] 15:07 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 15:07 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Read error: 104 (Connection reset by peer)] 15:07 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has joined ##openvpn 15:20 -!- mithridates [n=chatzill@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 15:21 < mithridates> hey guys 15:21 < mithridates> what do you recommend me ? openbsd or centos for installing on my server 15:22 < stony> debian 15:22 < mithridates> no 15:22 < stony> then get bsd 15:22 < mithridates> I have two options 1-centos 2-openbsd 15:24 < mithridates> I have two options 1-centos 2-openbsd 15:26 -!- ruied [n=ruied@bl7-213-7.dsl.telepac.pt] has left ##openvpn [] 15:43 < DarkAnt> are you going to do anything else with this server? 15:43 < DarkAnt> if you are, you might want centos, if not, use openbsd 15:43 -!- Optic [n=Optic@miso.capybara.org] has left ##openvpn [] 15:45 < mithridates> DarkAnt: :( I told them to install centos 15:45 < mithridates> yest just I wanted to serve vpn 15:46 < DarkAnt> well if the server is just a toy it really doesn't matter 15:47 < mithridates> no it's not a toy 15:47 < DarkAnt> I would have gone with openbsd then 15:47 < mithridates> DarkAnt: I want to serve openvpn for more than 100 clients 15:48 < mithridates> I don't like rpm based distros but I don't know about bsd systems 15:48 < mithridates> DarkAnt: do you know any web based certificate management system? 15:48 < mithridates> I want to manage my certificates 15:49 < DarkAnt> to be honest I'm not sure centos has an rpm for openvpn. I got mine from DAG 15:49 < DarkAnt> mithridates: sorry, I just got my openvpn server going 15:49 < DarkAnt> I'm a newbie 15:49 < DarkAnt> its just a toy for me 15:49 * stony advises debian (sid) 15:49 < mithridates> DarkAnt: doesn't matter I know how to install openvpn 15:49 < mithridates> aha ok 15:49 < DarkAnt> well where were you when I was having all of that trouble?! :P 15:51 < mithridates> did you install it ? 15:51 < mithridates> you should enable epel and remi repositories on your centos 15:52 < mithridates> then you can install openvpn but that's not the official version for centos 15:52 < mithridates> but it works 15:53 < mithridates> !openssl 15:53 < vpnHelper> mithridates: Error: "openssl" is not a valid command. 15:53 < mithridates> !ssl 15:53 < vpnHelper> mithridates: Error: "ssl" is not a valid command. 16:04 -!- buntfalke_ is now known as buntfalke 16:16 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has joined ##openvpn 16:23 -!- Dougy [n=me@ool-435033e6.dyn.optonline.net] has joined ##openvpn 16:26 -!- nixfreak [i=d872c45a@gateway/web/freenode/x-oetmdjucanzpbzgi] has quit ["Page closed"] 16:27 < krzie_> DarkAnt: do you know any web based certificate management system? 16:27 < krzie_> there is SOMETHING on sourceforge 16:27 < krzie_> but its way old and i havnt heard good things bout it 16:28 < krzie_> you might find you like ssl-admin tho 16:28 < krzie_> perl menu driven system for managing certs 16:31 < krzie_> but if you decide to go with a web system for that, be very careful 16:31 < krzie_> make sure that specific webserver has no inet access 16:31 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 16:31 < krzie_> your CA machine is the most important piece of your vpn's security 16:31 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 16:32 < krzie_> i suggest giving it no network access whatsoever 16:32 -!- krzie_ is now known as krzie 16:32 -!- krzie [n=krzee@unaffiliated/krzee] has left ##openvpn [] 16:32 -!- krzie [n=krzee@unaffiliated/krzee] has joined ##openvpn 16:34 < Bushmills> i think you could connect to a vnc server with a java applet from a web browser, and start a shell there. even though that's not exactly web based, it is at least usable through web browser. there, in that shell, you can administrate certificates as you please. 16:35 < Bushmills> i just assume that "web based" means "usable through web browser" 16:36 < krzie> and if the problem is people dont know unix, you can either automate it in bash or give them an account which automaticly runs ssl-admin, copies the new zip of certs + config to usb, and exits 16:36 < krzie> youd just put the commands in their .profile 16:36 < krzie> i personally do that for the people in this office to use that 3000+ line shell script i wrote 16:36 < Bushmills> this approach has the advantage that it can be use without browser in identical way 16:37 < krzie> oops when i said automate in bash i meant in batch, like windows scripting 16:37 < mithridates> let me to read what you've written 16:39 -!- gallatin [n=gallatin@dslb-092-073-078-087.pools.arcor-ip.net] has quit [Read error: 113 (No route to host)] 16:40 < mithridates> krzie: thus, there is no web based app for this purpose . how can I know the structure of openssl and the relation with openvpn 16:40 < mithridates> I used to easy-rsa 16:40 < krzie> http://sourceforge.net/projects/openvpn-admin/ 16:40 < vpnHelper> Title: Multiplatform Admin GUI for OpenVPN | Get Multiplatform Admin GUI for OpenVPN at SourceForge.net (at sourceforge.net) 16:40 < mithridates> I've seen that krzie 16:40 < krzie> but ive heard bad things bout it 16:41 < krzie> mithridates i dont understand the question 16:41 < mithridates> krzie: it couldn't satisfy me 16:41 < mithridates> I wanna know the relation between openvpn and openssl 16:42 < krzie> openssl generates the certs and handles all encryption 16:42 < mithridates> what about easy-rsa 16:42 < krzie> openvpn doesnt do any of its own encryption, openssl does 16:42 < mithridates> easy-rsa is a script which make it easier? 16:42 < krzie> easy-rsa is a suitce of scripts for using openssl to make certs 16:42 < krzie> suite 16:43 < krzie> ssl-admin is my favorite alternative to easy-rsa 16:43 < mithridates> do u recommend it? 16:43 < mithridates> !ssl-admin 16:43 < vpnHelper> mithridates: "ssl-admin" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN_Server, or (#2) svn co https://www.secure-computing.net/svn/trunk/ to grab it from svn, or (#3) if you use freebsd, it is in ports 16:43 < krzie> which i think ive recommended to you a couple times ;] 16:43 < mithridates> yes 16:44 < mithridates> but it didn't have any documentation 16:44 < mithridates> does it have? 16:44 < krzie> it comes with a man page 16:44 < mithridates> I thought it is an app without good support 16:44 < mithridates> aah ok 16:44 < mithridates> what about installation document? 16:44 < krzie> well the author helps run this channel 16:44 < mithridates> because I wanna install it on centos 16:44 < krzie> and is very active here 16:44 < mithridates> I think you are the author 16:45 < krzie> (ecrist) 16:45 < mithridates> aah ecrist 16:45 < krzie> nope, i just use it and love it 16:45 < mithridates> yes 16:45 < mithridates> :) 16:45 < mithridates> so I'm gonna use it too 16:45 < krzie> im not much of a coder, reiffert will back up that statement ;] 16:45 < mithridates> is it possible to install it on centos? 16:46 < krzie> i hope so 16:46 < krzie> i hacked up the linux install, never tested on centos 16:46 < krzie> grab it, then ./configure and then make 16:46 < mithridates> aah ok 16:46 < krzie> its really ugly but as i said im not a coder 16:47 < krzie> if i was i woulda made the Makefile right instead of using ./configure 16:47 < krzie> maybe we can convince bushmills to help with that part sometime ;] 16:48 < mithridates> :D 16:48 < mithridates> oh by the way 16:48 < Bushmills> nothing wring with autoconfig 16:48 < Bushmills> wrong 16:48 < mithridates> I saw a perl script over there 16:48 < krzie> check out what i did to ssl-admin sometime if you get a chance bushmills, it'll hurt to look at 16:49 < krzie> i made the ./configure and the Makefile to work with it 16:49 < Bushmills> generating a Makefile is often better than writing one yourself, when you need to take account of what is available on a system 16:49 -!- mintaka [n=kosmic@thefuckin.net] has quit [SendQ exceeded] 16:49 -!- Zordrak_ [n=jaz@87-194-141-163.bethere.co.uk] has quit [Read error: 60 (Operation timed out)] 16:49 < krzie> gotchya, but im still sure my way is notn only ugly but also wrong 16:49 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 110 (Connection timed out)] 16:49 < krzie> but it worked on all systems i tested it on! 16:49 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 16:50 < mithridates> krzie: do you recommend me to install it on my centos? 16:50 < mithridates> I'm wondering about it 16:50 < krzie> yes, and pls lemme know how that goes 16:50 < krzie> and read the link in !ssl-admin 16:50 < krzie> !ssl-admin 16:50 < vpnHelper> krzie: "ssl-admin" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN_Server, or (#2) svn co https://www.secure-computing.net/svn/trunk/ to grab it from svn, or (#3) if you use freebsd, it is in ports 16:50 < krzie> #1 16:51 < krzie> theres some dependancies 16:51 < krzie> like zip 16:51 -!- Zordrak [n=jaz@87-194-141-163.bethere.co.uk] has joined ##openvpn 16:51 < mithridates> aah ok 16:51 < krzie> oh that link doesnt list them 16:51 < mithridates> so help me plz if I get problem in installation 16:51 < krzie> im sure it'll complain about the deps tho 16:52 < krzie> sure, thats what we do here =] 16:52 < mithridates> there is no even a tar.gz package :) 16:52 < krzie> nope, subversion 16:52 < Bushmills> mithridates: what are the companies which you are targetting doing in Iran? 16:52 < krzie> svn co 16:54 < mithridates> Bushmills: it's not a company, it's an illegal job for getting internet access without filtering to some people 16:59 < rob0> in other words, subversion! :) 17:01 -!- EwanMcLean [n=ewanmcle@89.241.235.97] has joined ##openvpn 17:03 < krzie> oooo who made the RIPRouting doc!?? 17:04 -!- EwanMcLean [n=ewanmcle@89.241.235.97] has left ##openvpn [] 17:04 < krzie> thats coolness of them to document it 17:04 < krzie> !learn rip as http://www.secure-computing.net/wiki/index.php/OpenVPN/RIPRouting for a writeup on using RIP in openvpn 17:04 < vpnHelper> krzie: Error: You don't have the factoids.learn capability. If you think that you should have this capability, be sure that you are identified before trying again. The 'whoami' command can tell you if you're identified. 17:05 < krzie> !learn rip as http://www.secure-computing.net/wiki/index.php/OpenVPN/RIPRouting for a writeup on using RIP in openvpn 17:05 < vpnHelper> krzie: Joo got it. 17:06 < krzie> !learn mesh as see !rip 17:06 < vpnHelper> krzie: Joo got it. 17:09 < mithridates> krzie: I did : ./configure then make install 17:09 < mithridates> krzie: is it installed? 17:10 < mithridates> krzie: :D yes I think it has installed 17:10 < krzie> well it should be 17:10 < krzie> try man ssl-admin 17:11 < mithridates> yes I saw that 17:11 < mithridates> :) 17:14 < mithridates> krzie: I got it "Did you copy the sample from /etc/ssl-admin/ssl-admin.conf.sample?" but there is just one file :/etc/ssl-admin/ssl-admin.conf.default 17:15 -!- Dougy [n=me@ool-435033e6.dyn.optonline.net] has quit [] 17:15 < krzie> just copy that file to not have .sample and modify it to your needs 17:21 < vpnHelper> New forum entry openvpnforum: Wishlist :: adaptive tls-server / tls-client :: Author krzee 17:25 < krzie> i shoulkda moved that bot to ecrists network long ago! 17:30 < mithridates> krzie: # These values must match what's in your root CA certificate. what does it mean? 17:30 < mithridates> krzie: does it mean that the root CA will have same values which are in ssl-admin.conf ? 17:32 < krzie> always keep those values the same 17:32 < mithridates> krzie: so when I want to make certificate for my clients 17:33 < mithridates> should I do the same? 17:33 < krzie> set them in ssl-admin.conf and they'll be there 17:33 < stony> n8 guys 17:33 < krzie> all you do is set the clients common-name and if you want email 17:33 -!- stony [n=ol@77-21-120-206-dynip.superkabel.de] has quit ["n8"] 17:33 < krzie> then you make it 17:35 < mithridates> krzie: If I set password protect for clients then should they login by password when they want to connect by openvpn client? 17:35 < krzie> it will secure their key from local access 17:35 < krzie> they will need that password to have the real key, so they wont even try to make a connection to the server without that pass 17:35 < krzie> for a password to connect see !authpass 17:36 < mithridates> !authpass 17:36 < vpnHelper> mithridates: "authpass" is (#1) please see --auth-user-pass-verify in the manual to learn how to force clients to use passwords in addition to certs, or (#2) or to ONLY use passwords (no certs, highly NOT recommended) also use --client-cert-not-required, or (#3) and if you want the login name to be used as the common-name for things like ccd entries, use --username-as-common-name 17:41 < mithridates> krzie: first bug : I wrote no for the password part which I asked you then I got this : string is too long, it needs to be less than 2 bytes long 17:43 < mithridates> does ssl-admin have a log file? 17:46 -!- tommyd3mdi [n=tommyd@f053097062.adsl.alicedsl.de] has left ##openvpn [] 17:50 < krzie> hehe yup thats a bug, email it to ecrist 17:50 < krzie> writing no would set a pw of no btw 17:50 < krzie> leave it blank to not set one 17:51 < krzie> not sure if it logs, if it does the log would be in the same dir 17:51 < krzie> the ssl-admin dir 17:57 -!- bandini [n=bandini@host128-110-dynamic.16-79-r.retail.telecomitalia.it] has joined ##openvpn 18:15 -!- bandini [n=bandini@host128-110-dynamic.16-79-r.retail.telecomitalia.it] has quit ["Ex-Chat"] 18:22 < mithridates> krzie: didn't work 18:23 < krzie> care to expand on that? 18:24 < mithridates> yes, but not now 18:24 < mithridates> I don't have enough time for my jobs :( 18:25 < krzie> !learn qnx as http://ovpnforum.com/viewtopic.php?f=4&t=2449 for the qnx6 port of openvpn 18:25 < vpnHelper> krzie: Joo got it. 18:33 < mithridates> I go back to easy-rsa 18:36 < mithridates> does the make uninstall work on ssl-admin? 18:36 < krzie> dunno 18:37 < krzie> if so theres a section in the Makefile for it 18:37 < krzie> if not, should be rather easy to see what to delete 18:37 < krzie> (in the Makefile) 18:37 < krzie> if you dont understand it, post the Makefile and ill tell ya what files 18:37 < mithridates> ok 18:37 < mithridates> tnx 18:37 < mithridates> krzie: no I can understand it 18:37 < mithridates> :D 18:38 < krzie> ok ;] 19:15 < DarkAnt> ok, so I have a little discrepancy between what's in my ipp.txt file and what my client think's his ip address is 19:15 < krzie> !ipp 19:15 < vpnHelper> krzie: "ipp" is (#1) the option --ifconfig-pool-persist ipp.txt does NOT create static ips, or (#2) Note that the entries in this file are treated by OpenVPN as suggestions only, based on past associations between a common name and IP address. They do not guarantee that the given common name will always receive the given IP address. If you want guaranteed assignment, see !iporder and !static 19:15 < DarkAnt> thank you 19:15 < krzie> yw 19:16 < DarkAnt> but if I have two clients on a routed network they should be able to ping each other right? 19:16 < DarkAnt> because I can get the clients to ping the server 19:17 < DarkAnt> but the server can't ping the clients 19:17 < reiffert> 6cm snow in 4 hours rounded up by 30 mins rain, driving is lots of fun right now 19:17 < krzie> firewall 19:17 < krzie> 1 way pinging points to firewall 19:18 < DarkAnt> ok, I'll drop the firewall and check 19:18 < krzie> reiffert sounds sloshy 19:20 < reiffert> cars are driving between 20 to 40 mph, depending on the drivers drunkeness and their courage ;) 19:20 < DarkAnt> no, its not the firewall 19:22 < DarkAnt> ipp.txt is supposed to have past associations, but my clients never had those ip addresses 19:23 < krzie> erase ipp.txt and try again 19:23 < DarkAnt> ok 19:23 < krzie> or just dont use it, its rather pointless 19:23 < DarkAnt> right 19:23 < DarkAnt> but either way, I can't ping my clients 19:23 < krzie> if you want them to have static ips, give them static ips 19:23 < krzie> windows clients? 19:24 < DarkAnt> one is windows, the other is linux(debian) 19:24 < DarkAnt> I can't ping either of them 19:24 < DarkAnt> but both of them can ping the server 19:24 < krzie> on the windows one tell windows firewall to not firewall tap interface 19:25 < krzie> or turn it off all together and test again 19:25 < krzie> also, what ip are you trying to ping for the client? 19:25 < reiffert> or allow 0.0.0.0/0.0.0.0 19:25 < DarkAnt> well my windows box is reporting that it has 10.8.0.10 19:25 < krzie> yup 19:25 < krzie> .6 .10 .14 etc 19:25 < DarkAnt> and my linux box is reporting 10.8.0.5 19:25 < krzie> nah linux is .6 19:26 < DarkAnt> huh? 19:27 < krzie> !/30 19:27 < vpnHelper> krzie: "/30" is (#1) http://openvpn.net/index.php/open-source/faq.html#slash30 explains why routed clients each use 4 ips, or (#2) you can avoid this behavior with by reading !topology 19:28 < DarkAnt> niffty 19:30 < DarkAnt> ok, I turned off the windows firewall and I'm still not getting pings 19:30 < DarkAnt> pings from server-->client that is 19:31 < krzie> interesting 19:31 < krzie> but i do assure you, if you have 1 way ping you have a firewall issue somewhere 19:31 < krzie> its the only way that can happen 19:32 < DarkAnt> I'm certain I do 19:33 < DarkAnt> well, my server firewall is down 19:33 < DarkAnt> my windows firewall is down 19:33 < DarkAnt> maybe my router? 19:33 < DarkAnt> the windows box and the router are on the same lan 19:34 < krzie> nope not the router 19:34 < DarkAnt> doesn't look like it 19:34 < krzie> the router doesnt see a ping, just a vpn tunnel 19:34 < krzie> the server firewall might need to be up with rules set to allow stuff specificly 19:35 < krzie> no idea why that would be the case, but iive had people say it was down then when they enter the right rules it magicly works 19:35 < krzie> !firewall 19:35 < vpnHelper> krzie: "firewall" is (#1) please see http://openvpn.net/man#lbBD for more info, or (#2) see http://www.secure-computing.net/wiki/index.php/OpenVPN/Firewall for brief notes on disabling firewall rulesets. 19:35 < krzie> link #1 19:35 < DarkAnt> $IPTABLES -A INPUT -p icmp --icmp-type echo-request -j ACCEPT 19:36 < krzie> iptables -A INPUT -i tun+ -j ACCEPT 19:36 < krzie> iptables -A FORWARD -i tun+ -j ACCEPT 19:36 < DarkAnt> yeah, I have those 19:37 < krzie> hrm, that should be enough 19:38 < krzie> Kasx openvpn2009, can you get the web guys to fix rewrite on the manual? 19:38 < krzie> http://openvpn.net/man#lbBD loses the #lbBD after url rewrites 19:38 < DarkAnt> this is from the linux box(not on the lan): 19:38 < DarkAnt> traceroute to 10.8.0.1 (10.8.0.1), 30 hops max, 40 byte packets 19:38 < DarkAnt> 1 10.8.0.1 (10.8.0.1) 84.647 ms 88.276 ms * 19:39 < DarkAnt> this is when I try to ping the windows box 19:39 < DarkAnt> traceroute to 10.8.0.10 (10.8.0.10), 30 hops max, 40 byte packets 19:39 < DarkAnt> 1 172.16.1.1 (172.16.1.1) 0.992 ms 1.200 ms * 19:39 < DarkAnt> 2 * * * 19:39 < DarkAnt> 3 * * * 19:39 < krzie> well that looks right... 19:39 < krzie> ohh so you're saying they can ping the server, but not eachother 19:39 < DarkAnt> yeah, the route to the server is fine 19:39 < DarkAnt> yes 19:39 < DarkAnt> and the server can't ping them 19:39 < krzie> oh ok so i did understand you right 19:39 < krzie> are you using --client-to-client? 19:39 < DarkAnt> but they can ping the server 19:40 < krzie> if not you need ip forwarding enabled 19:40 < krzie> for them to ping eachother 19:40 < krzie> !c2c 19:40 < vpnHelper> krzie: "c2c" is "client-to-client" is with this option packets from 1 client to another are routed inside the server process. without it packets leave the server process, hit the kernel (firewall, routing table) and if allowed by firewall and routed back to server process, they go to the client. you use this option when you do not want to use selective firewall rules on what clients can access things 19:40 < vpnHelper> krzie: behind other clients 19:40 < DarkAnt> is client to client in the server.conf? 19:40 < krzie> thats my question, yes 19:41 < DarkAnt> :) 19:44 < DarkAnt> hmm 19:44 < DarkAnt> It was off, I turned it on 19:44 < DarkAnt> and nothing still 19:44 < krzie> that only realtes to them pinging eachother 19:44 < krzie> the server not pinging them is totally seperate 19:44 < DarkAnt> yeah, they still can't ping each other 19:44 < krzie> well may be, but for sure cant be fixed by that option 19:45 < krzie> ok so now both causes are likely the same 19:45 < krzie> best thing i can suggest is pastebin all the firewall rules and maybe a linux guy in here can spot something 19:45 < DarkAnt> this is from linux box --> windows box 19:45 < DarkAnt> traceroute to 10.8.0.10 (10.8.0.10), 30 hops max, 40 byte packets 19:45 < DarkAnt> 1 * * * 19:46 < DarkAnt> ok 19:46 < Section58> stars are not always a bad thing 19:47 < krzie> Kasx openvpn2009, the funny thing bout that rewrite thing i mentioned is that in the web manual the links at the bottom go to the short version that i use, so none of them are working currently 19:48 < DarkAnt> iptables: http://pastebin.im/1635 19:48 < DarkAnt> stars are bad when you have 11 of them 19:49 < DarkAnt> 30 hops max reached 19:49 < krzie> # 19:49 < krzie> -A RH-Firewall-1-INPUT -p udp -m state --state NEW -m udp --dport 1194 -j ACCEPT 19:49 < krzie> UDP state? 19:50 < Section58> DarkAnt 19:50 < Section58> yey spaces 19:50 < Section58> erm 19:50 < Section58> the route to 10.8.0.1 from your windows box is mashed 19:50 < Section58> this is why you can't ping back 19:50 < krzie> wrong Section58 19:50 < Section58> *10.8.0.10 19:50 < krzie> he can ping 1 way 19:50 < krzie> proving routes are right 19:50 < krzie> its his firewall 19:50 < Section58> just cause you can ping in, doesn't mean your routes are all good 19:50 < Section58> it will use the connect it came in on 19:50 < Section58> from windows however 19:51 < krzie> umm no 19:51 < reiffert> krzie: state on udp? 19:51 < krzie> reiffert can you look at his firewall? 19:51 < Section58> it doesn't send it thu the tap 19:51 < reiffert> krzie: sure. where? 19:51 < krzie> iptables: http://pastebin.im/1635 19:51 < DarkAnt> that rule was made by system-config-securitylevel btw(the server is a centos box) 19:51 < reiffert> krzie: in short: omg. 19:52 < krzie> i guess maybe iptables attempts to keep state on a stateless protocol 19:52 < reiffert> DarkAnt: iptables -P INPUT ACCEPT 19:52 < reiffert> DarkAnt: iptables -P FORWARD ACCEPT 19:52 < reiffert> DarkAnt: iptables -P OUTPUT ACCEPT 19:52 < reiffert> iptables -I INPUT -p udp --dport 1194 -j ACCEPT 19:53 < reiffert> iptables -I FORWARD -i tun0 -j ACCEPT 19:53 < reiffert> iptables -I FORWARD -o tun0 -j ACCEPT 19:53 < DarkAnt> I assume you're calling out the ones I need to keep 19:53 < reiffert> iptables -I INPUT -i tun0 -j ACCEPT 19:54 < reiffert> just copy paste that stuff. 19:54 < krzie> well it looks like you have some NAT in there too for your LAN 19:54 < krzie> so just paste what hes giving you 19:54 < DarkAnt> ok 19:54 < reiffert> krzie: problem with his firewall: 19:54 < reiffert> krzie: first rule jumps to RH-Firewall-1-INPUT 19:54 < reiffert> krzie: last rule in there does: 19:54 < reiffert> krzie: reject 19:54 < krzie> ohhh 19:55 < krzie> so everything in between is ignored 19:55 < reiffert> krzie: -A means: adding 19:55 < reiffert> krzie: -I means: inserting 19:55 < rob0> oh my, tmi 19:56 < reiffert> -A (adding) means: put at the end of the rules in that particular chain 19:56 < krzie> that makes me so glad i chose the bsd world 19:56 < reiffert> -I inserting means: put it as rule no 1 19:56 < reiffert> krzie: come on, you can have bullshit firewalls on BSD as well. 19:56 < reiffert> krzie: do they have nat in kernel space nowadays or still natd? 19:56 < krzie> oh for sure, but the syntax is more humanlike to me 19:57 * rob0 runs in terror from the sight of RH-Firewall-1-INPUT 19:57 < DarkAnt> ok, so let me try this 19:57 < DarkAnt> yeah, me too 19:57 < krzie> kernel via pf 19:57 < krzie> ipfw still would use natd 19:58 < krzie> and ipf would still use ipnat or whatever it was 19:58 < reiffert> ah 19:58 < DarkAnt> still can't ping the clients 19:58 < reiffert> nice to know, I should try on pf soon. 19:58 < reiffert> DarkAnt: use the swiss army knife: tcpdump 19:59 < krzie> as should i, i havnt played with pf for a longtime 19:59 < reiffert> tcpdump -n -i INTERFACE proto ICMP 19:59 < reiffert> INTERACE in tun0, eth0, whatever 19:59 < DarkAnt> yeah, I've been using tcpdump all day :P 20:02 < DarkAnt> its what, tcpdump 'icmp[icmptype] = icmp-ping'? 20:02 < reiffert> no, cause you will be missing the those stuff here: 20:02 < reiffert> # 20:02 < reiffert> -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited 20:02 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 20:03 < DarkAnt> yes, I just noticed that sucker 20:03 < DarkAnt> could that be the problem? 20:03 < reiffert> tcpdump will tell you. 20:03 < reiffert> get rid of that firewall, it keeps you from progress. 20:03 < DarkAnt> ok 20:04 < DarkAnt> I'm sorry, what filter do I want on tcpdump? 20:05 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 20:05 < reiffert> the read filter 20:05 < reiffert> 02:59 < reiffert> tcpdump -n -i INTERFACE proto ICMP 20:06 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 20:06 < reiffert> 02:59 < reiffert> INTERACE in tun0, eth0, whatever 20:06 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 20:06 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Excess Flood] 20:07 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 20:07 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 20:07 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 20:07 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Excess Flood] 20:08 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 20:09 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Excess Flood] 20:09 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 20:10 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Excess Flood] 20:10 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 20:10 < DarkAnt> yeah, I'm not seeing anything on either client 20:10 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 20:10 < mithridates> !ip 20:10 < vpnHelper> mithridates: Error: "ip" is not a valid command. 20:10 < DarkAnt> when I ping from the server 20:11 < mithridates> !factoids search ip 20:11 < vpnHelper> mithridates: 'tls-cipher', 'iporder', 'winipforward', '2.1-winpass-script', 'iptables', 'linipforward', 'ipv6', 'ipp', 'ipforward', 'fbsdipforward', 'win_ipfail', 'iphone', and 'rip' 20:11 < mithridates> !iporder 20:11 < vpnHelper> mithridates: "iporder" is (#1) OpenVPN's internal client IP address selection algorithm works as follows: 1 -- Use --client-connect script generated file for static IP (first choice)., or (#2) Use --client-config-dir file for static IP (next choice) !static for more info, or (#3) Use --ifconfig-pool allocation for dynamic IP (last choice), or (#4) if you use --ifconfig-pool-persist see !ipp 20:11 < mithridates> !ipforward 20:11 < vpnHelper> mithridates: "ipforward" is please choose between !linipforward !winipforward and !fbsdipforward 20:11 < mithridates> !linipforward 20:11 < vpnHelper> mithridates: "linipforward" is echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution (til reboot) or set net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 20:12 < mithridates> !ipp.txt 20:12 < vpnHelper> mithridates: Error: "ipp.txt" is not a valid command. 20:12 < mithridates> !factoids search ipp 20:12 < vpnHelper> mithridates: "ipp" is (#1) the option --ifconfig-pool-persist ipp.txt does NOT create static ips, or (#2) Note that the entries in this file are treated by OpenVPN as suggestions only, based on past associations between a common name and IP address. They do not guarantee that the given common name will always receive the given IP address. If you want guaranteed assignment, see !iporder and !static 20:13 < mithridates> !mgmt 20:13 < vpnHelper> mithridates: "mgmt" is (#1) http://openvpn.net/index.php/documentation/miscellaneous/management-interface.html, or (#2) http://svn.openvpn.net/projects/openvpn/branches/BETA21/openvpn/management/management-notes.txt 20:14 < mithridates> hey guys, how can I use management console? can I put management in config file? 20:14 < krzie> see --management in the manual 20:14 -!- McManiaC [n=McManiaC@n-sch.de] has left ##openvpn [] 20:15 < mithridates> krzie: I saw that, but they didn't point out about openvpn configuration file 20:15 < mithridates> they said just use openvpn --management 20:15 < mithridates> I use service openvpn start 20:15 < krzie> in the start of the manual it says that all options can be put in the config after removing the leading -- 20:15 < mithridates> do I need to add it to the init script? 20:15 < mithridates> aah ok 20:15 < mithridates> tnx krzie :) 20:16 < krzie> np 20:16 < mithridates> do u like this management console? 20:16 < mithridates> is it fine? 20:16 < reiffert> mithridates: how far have you gotten to webgui? 20:16 < krzie> never used it, but i do know it wasnt designed with humans in mind 20:16 < DarkAnt> heh 20:16 < krzie> its more for coding an app to use the management interface 20:17 < mithridates> reiffert: I'm in canada and webgui is in the moon 20:17 < krzie> satelite relay? 20:17 < krzie> ;] 20:17 < mithridates> reiffert: I'm not really good in programming and I don't have time to make it :( 20:17 < reiffert> mithridates: so .. pay someone to do it? 20:18 < DarkAnt> 21:17:53.049474 IP 10.8.0.1 > 10.8.0.10: ICMP echo request, id 46097, seq 1, length 64 20:18 < DarkAnt> my server is sending out the pings to the correct ip 20:18 < reiffert> .1 and .10, wtf? 20:18 < krzie> reif, /30 20:18 < krzie> .10 is client2 20:18 < reiffert> krzie: 1-10 != /30 20:19 < DarkAnt> .10 is the windows box 20:19 < krzie> 1 is server 20:19 < reiffert> Ah, that makes more sense. 20:19 < DarkAnt> which should be client2 20:19 < reiffert> 1 - 6 works? 20:19 < mithridates> reiffert: no, I wanna just solve my problems by terminal for myself, then I like to start an opensource project for this purpose 20:19 < DarkAnt> reiffert: no 20:19 < DarkAnt> the linux box is .5 and I can't send a ping to it 20:19 < DarkAnt> *linux client 20:19 < krzie> its not .5! 20:19 < reiffert> DarkAnt: got rid of that firewall drama yet? 20:20 < DarkAnt> yeah, the firewall has been down for some time now 20:20 < krzie> or if it actually thinks its .5 theres your problem, lol 20:20 < reiffert> DarkAnt: proof! 20:20 < krzie> (its .6) 20:20 < reiffert> doh, this word is getting me sick 20:20 < reiffert> to prove, the proof? 20:20 < krzie> yup 20:20 < DarkAnt> <.< 20:20 < DarkAnt> frack 20:20 < krzie> proof is a noun, prove is a verb 20:21 < mithridates> what's the best value for unstable networks in these fields : keepalive , verb 20:21 < mithridates> what's the best value for unstable networks in these fields : keepalive , verb? 20:21 < reiffert> DarkAnt: so prove! 20:21 < DarkAnt> I kept reading this: P-t-P:10.8.0.5 20:21 < krzie> well proof can be a verb, but thats to check spelling and grammer, proof reading 20:21 < DarkAnt> instead of this: addr:10.8.0.6 20:21 < reiffert> DarkAnt: paste ifconfig -a 20:21 < krzie> DarkAnt, yup ;] 20:21 < reiffert> DarkAnt: while at it, paste route -n 20:22 < reiffert> DarkAnt: just do like the following command tells you: 20:22 < reiffert> !interfaces 20:22 < vpnHelper> reiffert: Error: "interfaces" is not a valid command. 20:22 < reiffert> !interface 20:22 < vpnHelper> reiffert: "interface" is (#1) paste interface configuration from both client and server, while being disconnected and when beeing connected. Be sure to also add the routing tables for both situations from client and from server, or (#2) in windows: ipconfig /all - unix: ifconfig -a , and for routing tables: netstat -rn 20:22 < mithridates> what's the best value for unstable networks in these fields : keepalive , verb? 20:22 < reiffert> DarkAnt: you are running openvpn-2.1.1? 20:22 < DarkAnt> route -n: http://pastebin.im/1636 20:22 < mithridates> who knows about it? 20:23 < krzie> mithridates verb doesnt matter unless debugging 20:23 < reiffert> DarkAnt: http://pastebin.im/1636 20:23 < reiffert> DarkAnt: thats the server? 20:23 < krzie> mithridates and read about keepalive to figure out a good setting for you, its actually a couple commands rolled into 1 20:23 < krzie> (read in manual) 20:23 < mithridates> I found it in the man page 20:23 < mithridates> tnx 20:23 < DarkAnt> reiffert: yes 20:24 < DarkAnt> that's the server 20:24 < reiffert> krzie: check out the link, is it supposed to be like this? http://pastebin.im/1636 20:24 < DarkAnt> the ping to the linux box works when I actually type the right IP address 20:24 < DarkAnt> who knew... 20:24 < krzie> umm, weird 20:25 < krzie> # 20:25 < krzie> 10.8.0.2 0.0.0.0 255.255.255.255 UH 0 0 0 tun0 20:25 < krzie> just dont seem right to me 20:25 < reiffert> yeah 20:25 < krzie> did you play with routes by hand DarkAnt ? 20:25 < DarkAnt> hell no 20:25 < reiffert> Destination Gateway Genmask Flags Metric Ref Use Iface 20:25 < reiffert> 10.10.0.2 0.0.0.0 255.255.255.255 UH 0 0 0 tun2 20:25 < reiffert> got this at my place. 20:25 < reiffert> 10.9.0.2 0.0.0.0 255.255.255.255 UH 0 0 0 tun1 20:25 < DarkAnt> I played with the firewall by hand and that's off now 20:25 < reiffert> 10.8.0.2 0.0.0.0 255.255.255.255 UH 0 0 0 tun0 20:25 < reiffert> 10.10.0.0 10.10.0.2 255.255.255.0 UG 0 0 0 tun2 20:25 < reiffert> 10.8.0.0 10.8.0.2 255.255.255.0 UG 0 0 0 tun0 20:25 < reiffert> 10.9.0.0 10.9.0.2 255.255.255.0 UG 0 0 0 tun1 20:25 < krzie> show us routing table and ifconfig -a when no vpn proc running 20:26 < reiffert> so it looks okay. 20:26 < DarkAnt> ok 20:26 < krzie> oh ok, mine dont have that 20:26 < krzie> but im bsd ;] 20:26 < reiffert> sup sup sup 20:27 < krzie> 10.8/24 10.8.1.2 UGS 0 0 tun0 20:27 < krzie> 10.8.1/24 10.8.1.2 UGS 0 2200116 tun0 20:27 < krzie> 10.8.1.2 10.8.1.1 UH 2 0 tun0 20:27 < DarkAnt> ifconfig -a with openvpn shut down: http://pastebin.im/1637 20:27 < reiffert> DarkAnt: route -n as well 20:28 < reiffert> DarkAnt: well, thsats only part of ifconfig -a 20:28 < DarkAnt> route -n with openvpn shut down: http://pastebin.im/1638 20:29 < reiffert> DarkAnt: iptables -L -v -n 20:29 < DarkAnt> oh woops 20:29 < DarkAnt> sorry, it got cut off 20:29 < krzie> ok so we know routing table is fine (which i deduced from 1 way pings working) 20:30 < krzie> im still hard core that its the firewall 20:30 < krzie> in fact with a 1 way ping i dont believe its possible to be something else 20:30 < reiffert> he's going to prove that. 20:30 < DarkAnt> ifconfig -a, not cut off this time: http://pastebin.im/1639 20:30 < reiffert> krzie: what is the opposite of "to prove", is it "to dis-aprove"? 20:31 < krzie> to prove wrong 20:31 < krzie> i guess disprove 20:31 < DarkAnt> its disprove 20:31 < mithridates> !factoids value persist-key 20:31 < vpnHelper> mithridates: Error: The "Factoids" plugin is loaded, but there is no command named "value" in it. Try "list Factoids" to see the commands in the "Factoids" plugin. 20:31 < mithridates> !factoids --value persist-key 20:31 < krzie> but not disaprove, thats to say you dont agree with something someone said or did 20:31 < vpnHelper> mithridates: Error: The "Factoids" plugin is loaded, but there is no command named "--value" in it. Try "list Factoids" to see the commands in the "Factoids" plugin. 20:31 < mithridates> !factoids search persist 20:31 < vpnHelper> mithridates: No keys matched that query. 20:31 < mithridates> :( 20:31 < reiffert> krzie: thanks 20:32 < reiffert> so he's going to prove us wrong ... 20:32 < krzie> hes gunna try, i wont believe its anything other than the firewall until he fixes it without needing to change his fw 20:32 < krzie> lol 20:33 < krzie> the big plus, hes not arguing that its not his firewall, i hate when people do that when we know it is 20:33 < reiffert> Well, he is argueing, well kind of: 20:33 < krzie> then hours later they go "oh hey it was my firewall" 20:33 < mithridates> can I assign port 80 to openvpn server, then will clients have any problem with web ? 20:34 < reiffert> 03:25 < DarkAnt> I played with the firewall by hand and that's off now 20:34 < reiffert> DarkAnt: paste online: iptables -L -v -n 20:34 < DarkAnt> http://pastebin.im/1640 20:34 < krzie> mithridates as long as you dont run a web server on port 80 on that ip already thats fine, are you using TCP as your transport layer? if you are using UDP you might want port 53 instead 20:35 < krzie> if you're trying to bypass firewalls by using port 80 20:35 < reiffert> the fireall is off, wow. 20:35 < DarkAnt> yeah 20:35 < mithridates> krzie: I'm using udp, and I want to bypass firewall by using port 80 20:36 < krzie> you'll get better luck with 53 20:36 < krzie> port 80 is normally tcp 20:36 < krzie> port 53 is udp, its the DNS port 20:36 < mithridates> krzie: but if they block all port except of 80 20:36 < mithridates> ? 20:36 < krzie> it would be weird for them to allow 80 UDP 20:36 < DarkAnt> hey guys, I really need to crash 20:36 < DarkAnt> I've been up for way too long with no food 20:36 < krzie> g'nite and g'luck DarkAnt 20:36 < mithridates> I got it 20:37 < mithridates> tnx :) 20:37 < DarkAnt> thanks for all of the help, I owe this channel some considerable troubleshooting time 20:37 < mithridates> will it cause any conflict for client side? 20:37 < krzie> mithridates no 20:37 < mithridates> :) 20:38 < krzie> also, if you do need a tcp port go for 443 instead of 80, thats the web port for ssl 20:38 < reiffert> DarkAnt: once you made it work, feel free to help others on this channel :) 20:38 < krzie> so the traffic is expected to be encrypted ;] 20:38 < DarkAnt> hehe, yes :) 20:40 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 20:42 -!- Dougy [n=me@ool-435033e6.dyn.optonline.net] has joined ##openvpn 20:44 < mithridates> # In how many days should certificates expire? 20:44 < mithridates> export KEY_EXPIRE=3650 20:44 < mithridates> is it for client's key? 20:45 < krzie> and servers, yes 20:46 < mithridates> how can I list certificates which I made for clients? 20:46 < Dougy> man 20:46 < Dougy> you are still asking questions? 20:46 < Dougy> jesus 20:46 < mithridates> Dougy: what's wrong with asking question? :D 20:46 < Dougy> nothing 20:46 < Dougy> but you are the epitome of the energizer bunny 20:47 < krzie> wow dougy 20:47 < Dougy> sup krazy 20:47 < Dougy> ? 20:47 < reiffert> hi Dougy 20:47 < Dougy> howdy 20:47 < Dougy> :) 20:47 < reiffert> snow. plenty :) 20:47 < krzie> i couldnt believe i saw that come from #3 on the stats page who has never actually helped someone in here 20:47 < krzie> lol 20:47 < Dougy> ROFL 20:47 * Dougy shoots daggers at krzie 20:48 < Dougy> I just liven it up.. doesn't mean I'm good for anything 20:48 < krzie> lol 20:48 < Dougy> actually i lied 20:48 < Dougy> i'm good for getting people servers to put VPN's on 20:48 < Dougy> ehehe 20:48 < Dougy> you did get the info for your box, ta? 20:48 < reiffert> http://mzcam.kunden-mediamachine.de/markt/bild_popup.htm 20:48 < vpnHelper> Title: Mainz Online: Dom St. Martin und Mainzer Markt. (at mzcam.kunden-mediamachine.de) 20:49 < krzie> oh ya, i totally forgot bout it 20:49 < krzie> lol 20:49 < Dougy> LOL 20:49 < Dougy> its using $25/mo worth of my electri 20:49 < Dougy> you better put it to use, LOL 20:49 < reiffert> http://www.mainzerring.de/webcam/webcam_set.html 20:50 < Dougy> win 20:50 < Dougy> no snow here thankfully 20:50 < krzie> bro you can power it down if you wanna, i literally have nothing i need it for at the moment 20:50 < Dougy> haha 20:50 < mithridates> reiffert: hey it's like where I'm living , saint john has a rail like this , with snow :)) 20:50 < Dougy> krzie: i got the spare power 20:50 < krzie> i will want it again tho ;] 20:51 < Dougy> but it makes me sad that its wasting away 20:51 < krzie> ok 20:51 < Dougy> well actually i dont have the spare power now, but its besides the point 20:51 < Dougy> if i need another amp ill shut it down 20:51 < krzie> dont worry ill try to find a use for it 20:51 < Dougy> irc box 20:51 < Dougy> lols 20:51 < krzie> already have a couple of those 20:51 < krzie> ;] 20:51 < Dougy> who doesnt 20:51 * Dougy raises his hand 20:52 < krzie> maybe ill throw it into the mix as a hop in a openvpn-chain 20:52 < krzie> i havnt done that for awhile 20:52 < krzie> maybe ill document it this time 20:52 < Dougy> this guy from indonesia ordered from me 20:52 < Dougy> i made a few calls.. 20:52 < Dougy> he was going thru 6 VPN's 20:52 < Dougy> when he ordered from me 20:52 < krzie> lol 20:52 < Dougy> with a domain that had 'vcc' in it 20:53 < Dougy> and was about virtual credit cards 20:53 < Dougy> i shut him off as soon as i saw it 20:53 < krzie> why? sounds legit! 20:53 < krzie> lol 20:53 < Dougy> yeaaaaa! 20:53 < Dougy> no. 20:53 < krzie> and you've never talked to me without me going through AT LEAST 1 vpn 20:53 < reiffert> n8, afk 20:53 < krzie> then again i still owe you $50 so maybe im not the best example 20:53 < krzie> later reif 20:54 < Dougy> later redfox 20:54 < Dougy> er 20:54 < Dougy> reiffert 20:54 < Dougy> tab guys, how can I see certificates which I made by scripts in easy-rsa ? ( if Dougy is not mad at me for asking Q please answer me) 20:56 < Dougy> of course not 20:56 < Dougy> ask all you want 20:56 < mithridates> :D 20:56 < Dougy> i am not mad either, i was just amazed you're still asking questions 20:56 < Dougy> lol 20:57 < mithridates> tnx question counter 20:57 < Dougy> krzie: i've found a job for myself 20:57 < Dougy> question counter 20:57 < mithridates> lol 20:58 < krzie> lol 20:59 < krzie> mithridates asking questions is fine, assuming you've tried to answer them from the docs 20:59 < Dougy> dougy just asks, he doesnt try to figure them out himself 20:59 < Dougy> :X 20:59 < krzie> seeing certs you've made, you need to save the CSR 20:59 < krzie> so you can later make a crl if needed 20:59 < krzie> !crl 20:59 < vpnHelper> krzie: "crl" is (#1) --crl-verify A CRL (certificate revocation list) is used when a particular key is compromised but when the overall PKI is still intact. The only time when it would be necessary to rebuild the entire PKI from scratch would be if the root certificate key itself was compromised., or (#2) you can make use of CRL by using the revoke-full script in easy-rsa (packaged with openvpn) 20:59 < vpnHelper> krzie: that will create the CRL file for you. ssl-admin will also build a crl for you 21:01 < mithridates> ummm tnx 21:02 < mithridates> no I don't use anyone to solve my problem :( I need to have just the clue then I can find doc and read it . when I don't know that's related to CSR how can I read that doc? 21:03 < krzie> i wasnt saying anything about you, that was an 'in general' answer 21:04 < krzie> just dont delete anything on the CA box 21:04 * Dougy is writing a little perl thing 21:07 -!- LobbyZ [n=im@c83-251-23-194.bredband.comhem.se] has quit [Client Quit] 21:12 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 21:13 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 21:16 -!- poningru [n=poningru@dsl093-236-026.hfd1.dsl.speakeasy.net] has joined ##openvpn 21:24 -!- HazardX [n=HazardX3@pool-96-252-45-198.bstnma.fios.verizon.net] has quit [Read error: 60 (Operation timed out)] 21:36 < mithridates> is there any document for everything about openssl and openvpn? 21:36 < krzie> openssl has a manpage 21:37 < krzie> but an overview, as i said earlier, EVERYTHING related to encryption is done by openssl 21:37 < krzie> openvpn doesnt handle its own encryption, openssl does 21:37 < krzie> which i think is great 21:37 < mithridates> man openssl? 21:37 < Dougy> krzie: i just had a 7 minute 600mbps burst 21:37 < Dougy> and my graphs didnt even show it 21:37 < Dougy> LOL 21:38 < krzie> hah 21:38 < krzie> well it wasnt me! 21:38 < Dougy> it was me 21:38 < Dougy> hmm it wasnt 600, yeah, more like 400 21:38 < Dougy> http://www.scottburns.org/temp/fingergraph.png <-- that was the box i spiked to 21:38 < krzie> mithridates that will give you the manual for the openssl application 21:38 < krzie> same as man 8 openssl 21:39 < mithridates> ok 21:39 < mithridates> I'm reading that 21:39 < krzie> mmm port Gi goodness 21:41 < rob0> openssl(1) ... section 1 here 21:42 < krzie> ahh ya i was wrong 22:14 -!- kyrix [n=ashley@chello213047159139.33.11.univie.teleweb.at] has quit ["Leaving"] 22:17 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 23:05 -!- Dougy [n=me@ool-435033e6.dyn.optonline.net] has quit [Read error: 113 (No route to host)] 23:05 < mithridates> I've created a build-key client4 two times by a mistake 23:05 < mithridates> how can I remove one of them? 23:06 < mithridates> just by removing the line in index.txt? 23:07 < mithridates> how can I remove a certificate? by revoke-full script? 23:23 -!- buntfalke [n=nobody@openvpn-p1-ipv6-1033.triple-a.uni-kl.de] has joined ##openvpn 23:38 < ecrist> dazo_afk: interesting email 23:42 < ecrist> dammit Dougy 23:55 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has joined ##openvpn --- Day changed Sun Jan 17 2010 00:10 -!- Irssi: ##openvpn: Total of 88 nicks [2 ops, 0 halfops, 0 voices, 86 normal] 00:18 < mithridates> !factoids search tls 00:18 < vpnHelper> mithridates: 'tls-verify', 'tls-cipher', and 'tls-auth' 00:37 -!- StewartSmalls [n=StewartS@173-146-143-20.pools.spcsdns.net] has joined ##openvpn 00:37 < StewartSmalls> !welcome 00:37 < vpnHelper> StewartSmalls: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 00:38 < StewartSmalls> just to clarify.. before I begin reading.. my openvpn gui is always yellow.. 00:38 < StewartSmalls> Im assuming it works on the stoplight system.. green is what im shooting for? 00:38 < StewartSmalls> !howto 00:38 < vpnHelper> StewartSmalls: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 00:40 < StewartSmalls> !route 00:40 < vpnHelper> StewartSmalls: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 00:41 < mithridates> us=129145 VERIFY ERROR: depth=1, error=certificate is not yet valid: /C= 00:41 < mithridates> why is this happening to me? 00:41 < mithridates> date? 00:42 < mithridates> !verify 00:42 < vpnHelper> mithridates: Error: "verify" is not a valid command. 00:42 < mithridates> !factoids search verify 00:42 < vpnHelper> mithridates: 'tls-verify' and 'certverify' 00:42 < mithridates> !certverify 00:42 < vpnHelper> mithridates: "certverify" is verify your certs are signed correctly by running `openssl verify -CAfile ` for client.crt and server.crt 00:42 < mithridates> I used easy-rsa 00:43 < mithridates> should I verify certificates after creating? 00:44 < StewartSmalls> If I goto a port check utility on the web.. should it show that port 1194 is open? or should it only be open to the 10.8.x.x subnet I laid out in my configs? 00:58 < mithridates> why easy-rsa-crazy creates certificate for 4 hours later 00:58 < mithridates> ? 00:58 < mithridates> how can I change it? :( 01:02 < mithridates> openssl x509 -in client1.crt -noout -startdate 01:02 < mithridates> notBefore=Jan 17 08:15:39 2010 GMT 01:03 < mithridates> # date 01:03 < mithridates> Sun Jan 17 05:03:20 EST 2010 01:03 < mithridates> why? 01:07 < krzee> EST vs GMT 01:08 < krzee> mithridates, you dont need to edit the easy-rsa scripts 01:08 < krzee> just use them as shown in the howto 01:08 < krzee> many people have used that guide exactly as is and had working vpns 01:16 < StewartSmalls> i followed the static-key mini-HOWTO and just cannot get a valid connection 01:16 < StewartSmalls> my openvpn gui stays yellow 01:20 < krzee> what page is that? 01:20 -!- StewartSmalls [n=StewartS@173-146-143-20.pools.spcsdns.net] has quit [] 01:29 < mithridates> krzee: I couldn't find it in openssl.conf 01:31 < mithridates> krzee: how can I change it ? 01:34 < krzee> change what? 01:34 < krzee> check that the time is correct for the set timezone on each computer 01:34 < krzee> ntpdate time.nist.gov should work in any nix 01:35 < krzee> windows is easy to check both 02:02 < mithridates> krzee: I changed the timezone of both to GMT but it still doesn't work 02:04 < mithridates> I changed the timezone of both to GMT but it still doesn't work 02:07 < mithridates> it worked :P just 15 minutes =)))) loool 02:07 < mithridates> crazy world 02:08 < krzee> lol 02:19 -!- Centaur [n=Sorry@202-89-174-157.static.dsl.amnet.net.au] has joined ##openvpn 02:19 < Centaur> Hi Folks 02:19 < Centaur> I have been using the latest version of open vpn lately and I cannot connect a client externally. 02:20 < Centaur> I am more than familiar with port forwarding and it has certainly worked before. 02:20 < Centaur> I have tested between two internal subnet and it works great. 02:20 < Centaur> All other port forwarding or my dmz function are working fine. 02:21 < Centaur> But port 1194 UDP is just dead from the interent. 02:21 < Centaur> Is this me? 02:22 < Centaur> !Welcome 02:22 < vpnHelper> Centaur: "Welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 02:23 < Centaur> Using bridging, Not using that subnet at all and my configuration is the same as when I last had it running. 02:24 < Centaur> Currently testng between XP Pro system, the only major difference is the new version of OPEN VPN 02:24 < Centaur> I guess my most direct question is 02:25 < Centaur> Are ISPs Blocking this port or others for that matter, if we are sure that they are not, then I guess I will have to lok deeper into my configuration 02:25 < mithridates> krzee: I feel some conflicts for name resolving in my client 02:26 < krzee> Centaur, netcat will show if its blocked, check the firewalls and any NAT the server is behind 02:27 < Centaur> I will try netcat now, but I have changed the routers again and again, I have culled the setup down to one router and a simple XP box. 02:27 < Centaur> Thanks krzee 02:28 < krzee> oh ya netcat is unix, dunno if theres a win version 02:28 < Centaur> Yeh there is should be cool but I have linux here as well. 02:28 < Centaur> Thanks mate 02:29 < krzee> np 02:29 < mithridates> !keep-alive 02:29 < vpnHelper> mithridates: Error: "keep-alive" is not a valid command. 02:30 < mithridates> krzee: do I need to set keep-alive option in my client configuration file? 02:30 < krzee> not if you have it in server 02:30 < krzee> if you read --keepalive you'll know why 02:31 < mithridates> ok tnx 02:36 < mithridates> krzee: it's strange that openvpn doesn't work as well as port 1194 when I set 53 UDP 02:37 < krzee> maybe your ISP rate limits your udp 53 02:37 < krzee> it is just for DNS, and there are DNS amplification attacks 02:37 < mithridates> may be 02:37 < krzee> using misconfigured DNS servers to amplify and hide an attack 02:37 < krzee> so rate limiting udp 53 could make sense to an ISP 02:38 < mithridates> what else do you recommend me krzee? 02:38 < krzee> trial and error 02:38 < krzee> find common udp ports and check it out 02:38 < mithridates> aah ok 03:00 -!- teddymills [n=teddy@208.92.235.227] has quit [Read error: 104 (Connection reset by peer)] 03:01 -!- teddymills [n=teddy@208.92.235.227] has joined ##openvpn 03:05 < Centaur> Thanks Fellas 03:05 < Centaur> Netcat helped me fixed the problem, a firewall at the other site. 03:05 < Centaur> Cheers 03:05 < Centaur> Filtered to the hilt it was 03:06 -!- Centaur [n=Sorry@202-89-174-157.static.dsl.amnet.net.au] has quit [Remote closed the connection] 03:07 -!- Dougy [n=me@ool-435033e6.dyn.optonline.net] has joined ##openvpn 03:07 -!- master_o1_master [n=master_o@p57B570F2.dip.t-dialin.net] has joined ##openvpn 03:19 -!- master_of_master [i=master_o@p57B57DF5.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:21 < krzee> !/30 03:21 < vpnHelper> krzee: "/30" is (#1) http://openvpn.net/index.php/open-source/faq.html#slash30 explains why routed clients each use 4 ips, or (#2) you can avoid this behavior with by reading !topology 03:21 < krzee> !topology 03:21 < vpnHelper> krzee: "topology" is is it is possible to avoid the !/30 behavior if you use 2.1 with the option: topology subnet http://osdir.com/ml/network.openvpn.devel/2005-09/msg00020.html This will end up being default in later versions. 03:39 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 03:41 -!- roentgen [n=HaRT@miranda/user/roentgen] has joined ##openvpn 04:48 < mithridates> who knows Mathias Sundman ? 04:50 -!- roentgen [n=HaRT@miranda/user/roentgen] has quit [Read error: 104 (Connection reset by peer)] 06:28 < DarkAnt> morning all 06:29 < DarkAnt> I got another linux box on my lan connected to my server. This means its entirely the windows box's fault(also on the lan) 06:29 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 06:34 < DarkAnt> and that magically works now 06:34 < DarkAnt> I'm really happy it works 06:34 < DarkAnt> I have no friggen clue why 06:34 < DarkAnt> which makes me much less happy 06:38 < DarkAnt> oh fuck you windows security model 06:38 < DarkAnt> you shouldn't let services silently fail because they didn't have privs 06:39 < DarkAnt> I wasn't running as admin 06:40 < DarkAnt> which apparently allows me to ping the server, but not have the server ping back 06:40 < DarkAnt> awesome 06:47 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit ["I am off"] 06:49 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 06:53 < DarkAnt> once again, thank you guys so much. You were exceptionally helpful 06:57 < theDoc> Hi all. 07:10 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 08:06 < eightfold> i want to connect to a vpn using openvpn via the debian command line. i have the following conf files: http://ivacy.com/en/doc/user/setup/winxp_openvpn 08:06 < vpnHelper> Title: OpenVPN connection setup for Windows XP (at ivacy.com) 08:07 < eightfold> i've been trying to come up with something read the man, but not really getting there 08:10 * Dougy opens link 08:10 < Dougy> did fyou modify the 'remote' line 08:10 < Dougy> oh hmm 08:10 < Dougy> what is ivacy? 08:11 < Dougy> !logs 08:11 < vpnHelper> Dougy: "logs" is (#1) is please pastebin your logfiles from both client and server with verb set to 6, or (#2) In Tunnelblick, right-click and select copy to copy log text to clipboard. 08:12 < Dougy> oh wow 08:13 < Dougy> dug up an old friend of mine 08:13 < Dougy> now in Koeln, DE 08:15 -!- Leila [i=d9dae562@gateway/web/freenode/x-yrlhvdcoegoluufq] has joined ##openvpn 08:15 < theDoc> heya doug, ;) 08:15 -!- Leila [i=d9dae562@gateway/web/freenode/x-yrlhvdcoegoluufq] has left ##openvpn [] 08:17 < theDoc> Wow, generic certificate for ivacy? Is that even a good idea? :? 08:17 < eightfold> theDoc: better than nothing i guess :) 08:18 < eightfold> eightfold: but i think that's how most vpn providers do, i might be wrong though 08:18 < theDoc> eightfold> Not true, I have generated per-user certs. 08:18 < Dougy> theDoc: i thought the same 08:18 < eightfold> theDoc: whatdo you pay for the service? which provider do you use? 08:19 < theDoc> Sounds like some one doesn't know how to generate per-user certs and manage them. 08:19 < theDoc> eightfold> I run a provider ;p 08:19 < eightfold> theDoc: ha, ok, that explains it :) 08:19 < theDoc> eightfold> I'm just saying that generic certs are not the best way to handle this and I don't see a reason to use it. 08:20 < eightfold> theDoc: all in all i think it works pretty well though. speedwise (you can chose from servers in russian, uk and usa) 08:20 < eightfold> and it has got a nifty payment system, and easy port forwarding 08:21 < theDoc> eightfold> I've no comments for that, since I don't use their services. 08:22 < eightfold> theDoc: up until recently you could create an account and use 100 mb for free. i think they removed that feature though. 08:22 < theDoc> eightfold> Hm, ok ;p 08:23 < eightfold> theDoc: have you can any instruction for connecting to you via openvpn commandline on *nix? 08:24 < eightfold> theDoc: that might be used ivacy, that is 08:24 < eightfold> perhaps that would be different as you're not using generic certificates? 08:24 < theDoc> eightfold> openvpn /path/to/config/file 08:25 < theDoc> eightfold> That should start it. 08:27 < eightfold> theDoc: and the certificates from here [ http://ivacy.com/en/doc/user/setup/winxp_openvpn ] should just be saved in the same folder? 08:27 < vpnHelper> Title: OpenVPN connection setup for Windows XP (at ivacy.com) 08:27 < eightfold> as ca.crt, client.crt, client.key and tls.key etc? 08:31 < theDoc> eightfold> I'm not quite keen on providing support for this, mainly because it's a paid-for service and the respective helpdesk should do it but your config file should point to the correct directories where the certs are residing. 08:31 < theDoc> That's roughly what you need. 08:32 < eightfold> sorry, saw that the paths for the crt and key files where in the ovpn file. 08:34 -!- LobbyZ` is now known as LobbyZ 08:42 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 08:45 < eightfold> where would be proper place the ovpn config files? /etc/openvpn/config? 08:47 < Bushmills> if you like that, sure. or /etc/openvpn. 08:50 -!- ecrist changed the topic of ##openvpn to: OpenVPN 2.1.1 Most Current || Your problem is your firewall, really. || Type !welcome before asking your questions. || We need forum moderators, email openvpn@secure-computing.net to volunteer. 08:52 < JodaX> ecrist, hmm, what about having openvpn clearly state that the problem is the firewall and how it is 08:54 < vpnHelper> New forum entry openvpnforum: Server Administration :: Re: working standard TUN config :: Reply by dustin.mann9 || Server Administration :: Re: help with OpenVPN for Ubuntu :: Reply by dustin.mann9 || Server Administration :: Re: help with OpenVPN for Ubuntu :: Reply by dustin.mann9 hey eric 08:55 < Dougy> how are you 08:56 -!- mintaka [n=kosmic@thefuckin.net] has joined ##openvpn 08:57 < ecrist> good morning. 08:57 < ecrist> JodaX: I don't understand. 08:58 < JodaX> well, error messages are there for a reason 08:58 < JodaX> make them easyer to understand 08:58 < ecrist> OpenVPN has no definitive method to determine firewall problems. 08:59 < Bushmills> bo, they're meant to intimidate the user, so he calls professional help 08:59 < JodaX> can't connect => firewall problem 08:59 < ecrist> the vast majority of people who come here seeking help have firewall problems. 08:59 < ecrist> nope 08:59 < Dougy> !tun 08:59 < vpnHelper> Dougy: Error: "tun" is not a valid command. 08:59 < Dougy> !tunortap 08:59 < vpnHelper> Dougy: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 08:59 < vpnHelper> Dougy: against you over the vpn 08:59 < ecrist> the usual problem is the users opens 1194, but fails to pass VPN IPs through the firewall. As such, the VPN connects, but users cannot access systems/services within the VPN. 09:00 < ecrist> OpenVPN would have no knowledge about this. 09:00 < Dougy> !wins 09:00 < vpnHelper> Dougy: "wins" is http://oreilly.com/catalog/samba/chapter/book/ch07_03.html is a good link for seeing how to run WINS on samba 09:00 < ecrist> Dougy: !factoids 09:00 < Dougy> !factoids 09:00 < vpnHelper> Dougy: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 09:00 < Dougy> ahha 09:01 < Dougy> ecrist: i'm actualyl being useful 09:01 < Dougy> being 09:01 < Dougy> I put some good stuff on the forum 09:01 < Dougy> LOL 09:01 < ecrist> excellent. 09:01 < Dougy> not very much 09:01 < Dougy> but some 09:03 < Dougy> win 09:03 < Dougy> congrats on moderator theDoc 09:06 < theDoc> <3 09:07 < Dougy> i think i am gonna troll Andrew from OpenVPN to link to the forum on the opensource page 09:13 -!- eightfold [n=eightfol@c213-89-114-50.bredband.comhem.se] has quit [Read error: 60 (Operation timed out)] 09:13 -!- eightfold [n=eightfol@85.249.223.23] has joined ##openvpn 09:25 < vpnHelper> New forum entry openvpnforum: Server Administration :: Re: help with OpenVPN for Ubuntu :: Reply by Douglas || Server Administration :: Re: help with OpenVPN for Ubuntu :: Reply by Douglas || Server Administration :: Re: working standard TUN config :: Reply by Douglas what's going on my favorite IRC channel ? 10:37 < Dougy> nothing 10:38 < mithridates> hi Dougy 10:38 < Dougy> hi 10:43 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 110 (Connection timed out)] 10:46 -!- Otacon22 [n=otacon22@93-36-88-88.ip59.fastwebnet.it] has left ##openvpn ["Part"] 10:50 <@Kasx> Dougy: this is Andrew from openvpn, we will be linking to you, we will be doing a lot of work in the community area these next 1-2 months. 10:51 < Bushmills> how's trac progressing? 10:52 <@Kasx> Not sure, thats a question for Samuli/mattock 10:53 < Dougy> oh shit 10:53 < Dougy> hi Kasx 10:53 < Dougy> :) 10:53 <@Kasx> Hey Dougy! 10:53 < Dougy> How ya doin 10:53 <@Kasx> good man, and you? 10:53 < Dougy> decent 10:53 < Dougy> I guess I should get a different skin for the forum to liven it up eh 10:54 <@Kasx> Your choice :-) 10:54 < Dougy> I will hunt 10:54 < Dougy> it is kind of dull now 10:54 < Dougy> so hey whats up with the openvpn site now 10:54 < Dougy> it hides the open source 10:54 <@Kasx> I will send an e-mail to Samuli and see if we could put your link at the link you sent me in that pm 10:55 < Dougy> k 10:55 < Dougy> also 10:55 <@Kasx> as far as open-source turning into Community? 10:55 < Dougy> why does the index page only have links to access server except for the one tab for community software 10:55 < Dougy> but theres tons of info about the AS 10:55 <@Kasx> PM? 10:56 < Dougy> you can always PM me 10:56 < Dougy> !tap 10:56 < vpnHelper> Dougy: "tap" is "bridge" is (#1) http://openvpn.net/index.php/documentation/faq.html#bridge1, or (#2) http://openvpn.net/index.php/documentation/miscellaneous/ethernet-bridging.html, or (#3) Bridging looks like a good choice to people who don't know how to set up IP routing, but to learn routing is generally far better., or (#4) useful for windows sharing (without wins server) and LAN gaming, anything 10:56 < vpnHelper> Dougy: where the protocol uses MAC addresses instead of IP addresses. 10:56 < Dougy> !tunortap 10:56 < vpnHelper> Dougy: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 10:56 < vpnHelper> Dougy: against you over the vpn 11:04 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 11:06 < Dougy> eyo krzee 11:06 < krzee> hey 11:08 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 110 (Connection timed out)] 11:14 -!- BoomSie [n=gideon@84-245-27-118.dsl.cambrium.nl] has joined ##openvpn 11:25 < vpnHelper> New forum entry openvpnforum: Server Administration :: Re: help with OpenVPN for Ubuntu :: Reply by dustin.mann9 || Server Administration :: Re: working standard TUN config :: Reply by Douglas 11:41 -!- kyrix [n=ashley@91-114-134-188.adsl.highway.telekom.at] has joined ##openvpn 11:44 -!- ScriptFan is now known as ScriptFanix 11:51 < reiffert> how to say that in english when a person leaves a company? 11:51 < krzee> to quit 11:51 < krzee> or if forced to leave, to be fired 11:52 < reiffert> the man is planning to leave the company 11:52 < krzee> is planning to quit 11:52 < reiffert> I want to write smth like: I really regret your plan to quit the company 11:52 < krzee> that you plan to quit the company 11:52 < krzee> but ya 11:53 < krzee> yours is right, just not how ild say it 11:53 < reiffert> :) 11:53 < reiffert> thanks! 11:55 < vpnHelper> New forum entry openvpnforum: Server Administration :: Re: working standard TUN config :: Reply by krzee 11:55 < Dougy> krphop 11:56 < Dougy> krzee 11:56 < Dougy> thats my other job 11:56 < Dougy> comic relief 11:56 < Dougy> :D 11:56 < Dougy> !wins 11:56 < vpnHelper> Dougy: "wins" is http://oreilly.com/catalog/samba/chapter/book/ch07_03.html is a good link for seeing how to run WINS on samba 12:00 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 12:02 < krzee> also, you can do windows shares by IP without needing WINS at all. 12:05 < Dougy> i just nuked those posts 12:05 < Dougy> lol 12:06 < krzee> lame 12:06 < krzee> that might have helped someone 12:06 < Dougy> i doubt it 12:06 < Dougy> http://www.ovpnforum.com/viewtopic.php?f=4&p=2863 12:06 < Dougy> ^ 12:06 < vpnHelper> Title: OpenVPN Forum View topic - help with OpenVPN for Ubuntu (at www.ovpnforum.com) 12:06 < krzee> how so? 12:07 < Dougy> i dont know how to answer him 12:07 < krzee> you obviously didnt know the wins stuff, im sure you arent the only one 12:07 < Dougy> because krzee if they actually read the bot output (unlike me) they would understand 12:07 < Dougy> i didnt know cuz i didnt read the bot's clear explanation 12:07 < Dougy> lol 12:07 < krzee> you clearly had read it, just not understand 12:07 < Dougy> i skimmed it 12:07 < Dougy> no, i skimmed 12:07 < Dougy> saw tap somewhere in there and then replied about it 12:07 < Dougy> lol 12:07 < krzee> its 3.5 lines 12:08 < krzee> a skim would catch it 12:08 < krzee> :-p 12:08 < Dougy> i dont read read, i really skim 12:08 < Dougy> to the point i just said 12:09 -!- kyrix [n=ashley@91-114-134-188.adsl.highway.telekom.at] has quit [Read error: 110 (Connection timed out)] 12:10 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 12:10 < Dougy> Gaines Adams dies 12:10 < Dougy> Bears DE Gaines Adams, 26, died Sunday due to cardiac arrest caused by an enlarged heart, coroner says 12:10 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 12:16 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 12:17 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 12:17 < krzee> Dougy, 12:17 < krzee> If you want the clients to interface with one another, you need to add 'client-to-client' to the server configuration. 12:17 < krzee> see !c2c 12:18 < krzee> thats only somewhat true 12:18 < Dougy> correct me 12:18 < Dougy> in the thread obv 12:18 < krzee> doesnt need to be done in that one 12:18 < krzee> !c2c 12:18 < vpnHelper> krzee: "c2c" is "client-to-client" is with this option packets from 1 client to another are routed inside the server process. without it packets leave the server process, hit the kernel (firewall, routing table) and if allowed by firewall and routed back to server process, they go to the client. you use this option when you do not want to use selective firewall rules on what clients can access things 12:18 < vpnHelper> krzee: behind other clients 12:21 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Remote closed the connection] 12:21 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 12:25 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Remote closed the connection] 12:26 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 12:31 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Remote closed the connection] 12:31 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 12:47 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 12:48 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 12:48 -!- BoomSie [n=gideon@84-245-27-118.dsl.cambrium.nl] has quit [Read error: 110 (Connection timed out)] 12:55 < vpnHelper> New forum entry openvpnforum: Server Administration :: Re: help with OpenVPN for Ubuntu :: Reply by krzee 13:11 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Excess Flood] 13:11 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 13:19 -!- mithridates [n=chatzill@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has quit [Connection timed out] 13:24 -!- mithridates [n=chatzill@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has joined ##openvpn 13:25 < vpnHelper> New forum entry openvpnforum: Off Topic, Related :: OpenVPN Technologies & OpenVPN Community Relationship :: Author ecrist 13:31 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Connection timed out] 13:32 < krzee> _________________ 13:32 < krzee> "You cannot invade the mainland United States. There would be a rifle behind each blade of grass." 13:32 < krzee> "A brilliant man would find a way not to fight a war." 13:32 < krzee> -- Admiral Isoroku Yamamoto 13:32 < krzee> love that quote 13:32 < Dougy> me too 13:32 < krzee> lets just hope the republicrats dont take away all our guns 13:33 < krzee> well all your guns, i left ;] 13:33 < Dougy> pussy 13:33 < krzee> is that an "you are what you eat" type thing? 13:33 < Dougy> yeah 13:33 < Dougy> you've got 2 lips and inside is warm, so i guess so 13:34 < krzee> erm 13:34 < Dougy> ROFL 13:34 < krzee> o...k... 13:34 < Dougy> you started it 13:36 -!- bewst [n=bewst@207-172-223-249.c3-0.smr-ubr3.sbo-smr.ma.static.cable.rcn.com] has joined ##openvpn 13:37 < bewst> !welcome 13:37 < vpnHelper> bewst: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 13:37 < krzee> !goal 13:37 < bewst> !redirect 13:37 < vpnHelper> krzee: "goal" is Please clearly state your goal for your vpn: example, I would like to access the lan behind the server , I would like to access the internet over my vpn , I just want a secure connection between 2 computers , etc 13:37 < vpnHelper> bewst: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 13:38 -!- Sord444 [n=Sord444@user-12l2jcd.cable.mindspring.com] has joined ##openvpn 13:40 < bewst> Goal: route /all/ client traffic through server. Symptom: works fine if I set up manual IP/gateway on client. Using DHCP I keep getting a gateway address of 10.8.0.5 when it should be 10.8.0.1 13:41 < Sord444> Heh I came in to ask for help, but I just realized my pf firewall wasn't passing in/out on tun0... 13:41 < krzee> .1 is for the server 13:41 < krzee> .6 of first client 13:41 < krzee> .5 is internal to openvpn, its the gateway for the client 13:41 < krzee> !/30 13:41 < vpnHelper> krzee: "/30" is (#1) http://openvpn.net/index.php/open-source/faq.html#slash30 explains why routed clients each use 4 ips, or (#2) you can avoid this behavior with by reading !topology 13:42 < Dougy> Sord444: lols 13:42 < krzee> Sord444, good job 13:42 < krzee> Sord444, did the topic help? 13:42 < bewst> kzree: .5 may be gateway for client, but I have to set the gateway to .1 if I want it to work 13:43 < krzee> bewst, 13:43 < krzee> !configs 13:43 < vpnHelper> krzee: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 13:44 < bewst> kzree: server: http://dpaste.com/146559/ 13:45 < krzee> you shouldnt need to manually change anything 13:45 < krzee> lets see the client log at verb 5 13:46 < krzee> (2 lines up assumes nothing goofy in client config) 13:46 < bewst> kzree: client: http://dpaste.com/146560/ 13:46 < bewst> kzree: coming up 13:47 < krzee> ok nothing goofy going on there, i want proof of what you say not working 13:47 < Sord444> krzee, lol no i didnt even see that. just as i joined i was tweaking pf and thought oh i wonder if thats the problem 13:54 < bewst> krzee: http://dpaste.com/146563/ sorry it took so long 13:54 < bewst> kzree: the client can't browse when connected 13:54 < bewst> I have done the MASQUERADE dance 13:55 < krzee> bewst, that is setup correct 13:55 < krzee> !linnat 13:55 < vpnHelper> krzee: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 13:55 < krzee> !linipforward 13:55 < vpnHelper> krzee: "linipforward" is echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution (til reboot) or set net.ipv4.ip_forward = 1 in sysctl.conf for perm solution 13:56 < bewst> krzee: didn't know about that last thing 13:56 < rob0> That factoid assumes that sysctl.conf(5) is being used. Slackware by default does not. 13:57 < Dougy> oh hey 13:57 < Dougy> that was my contribution 13:57 < Dougy> i remember that 13:57 < Dougy> hehe 13:57 < krzee> rob0, then how in slack? 13:58 < bewst> krzee: whoo hoo! 13:58 < rob0> there is a /etc/rc.d/rc.ip_forward which can be made executable. 13:58 < krzee> =] 13:58 < Dougy> openvpn has always been a bit of a pain for me 13:58 < bewst> krzee: just to be double sure: how can I confirm that the windows client is going through the VPN and not using its other 'net connection directly? 13:58 < krzee> rob0, once you +x it ip forward is enabled on boot? 13:58 < Dougy> i need to find a good way to make it start on boot 13:58 < krzee> bewst, whatismyip.com 13:58 < rob0> Very Painful Networking :) 13:58 < krzee> or secure-computing.net 13:58 < bewst> krzee, excellent 13:59 < rob0> krzee, correct 13:59 < krzee> http://secure-computing.net/ip.php 13:59 < vpnHelper> Title: SCN: SCN (at secure-computing.net) 13:59 < Dougy> ecrist how do i get to awstats aain 13:59 < Dougy> again 13:59 < Dougy> oh 13:59 < Dougy> secure-computing.net has 13:59 < krzee> !learn linipforward as chmod +x /etc/rc.d/rc.ip_forward for perm solution in slackware 13:59 < vpnHelper> krzee: Error: You don't have the factoids.learn capability. If you think that you should have this capability, be sure that you are identified before trying again. The 'whoami' command can tell you if you're identified. 14:00 < krzee> !learn linipforward as chmod +x /etc/rc.d/rc.ip_forward for perm solution in slackware 14:00 < vpnHelper> krzee: Joo got it. 14:06 < Dougy> now to make openvpn start on boot 14:10 < Dougy> krzee: ever done that before 14:11 < krzee> of course, theres countless ways on each OS 14:29 -!- Sord444 [n=Sord444@user-12l2jcd.cable.mindspring.com] has quit ["Leaving"] 14:32 < Dougy> Mon Jan 18 07:34:21 2010 Note: Cannot open TUN/TAP dev /dev/net/tun: No such device (errno=19) 14:32 < Dougy> Mon Jan 18 07:34:21 2010 Note: Attempting fallback to kernel 2.2 TUN/TAP interface 14:32 < Dougy> Mon Jan 18 07:34:21 2010 Cannot allocate TUN/TAP dev dynamically 14:32 < Dougy> Mon Jan 18 07:34:21 2010 Exiting 14:32 < Dougy> [root@vpn openvpn]# ls -al /dev/net/tun 14:32 < Dougy> crw------- 1 root root 10, 200 Jan 18 07:33 /dev/net/tun 14:32 < Dougy> afdgklkdfja 14:32 < Dougy> really 14:32 < Dougy> openvz eat m 14:32 < Dougy> e 14:33 < Dougy> oh fixed 14:33 < krzee> isnt there openvz specific stuff you did? 14:34 < krzee> if so, go make a writeup for the wiki! 14:34 < Dougy> yeah my CP that does it didnt work right 14:34 < Dougy> so i modprobe'd tun 14:34 < Dougy> and it worked 14:34 < Dougy> hehe 14:34 < krzee> lol 14:34 < krzee> but i mean openvz specific 14:34 < Dougy> yes there is stuff 14:34 < krzee> that was just loading tun module 14:34 < Dougy> http://wiki.openvz.org/VPN_via_the_TUN/TAP_device 14:34 < vpnHelper> Title: VPN via the TUN/TAP device - OpenVZ Wiki (at wiki.openvz.org) 14:35 < krzee> !learn openvz as http://wiki.openvz.org/VPN_via_the_TUN/TAP_device to learn bout openvz specific stuff with regards to openvpn 14:35 < vpnHelper> krzee: Joo got it. 14:36 < krzee> thx 14:41 < Dougy> !ipforward 14:41 < vpnHelper> Dougy: "ipforward" is please choose between !linipforward !winipforward and !fbsdipforward 14:41 < Dougy> !linipforward 14:41 < vpnHelper> Dougy: "linipforward" is (#1) echo 1 > /proc/sys/net/ipv4/ip_forward for a temp solution (til reboot) or set net.ipv4.ip_forward = 1 in sysctl.conf for perm solution, or (#2) chmod +x /etc/rc.d/rc.ip_forward for perm solution in slackware 14:56 < Dougy> gah wtf 14:56 < Dougy> openvz pissing me off 15:10 -!- bewst [n=bewst@207-172-223-249.c3-0.smr-ubr3.sbo-smr.ma.static.cable.rcn.com] has quit ["Leaving."] 15:12 -!- Dougy [n=me@ool-435033e6.dyn.optonline.net] has quit [] 15:12 -!- Dougy [n=me@vpn.douglashaber.com] has joined ##openvpn 15:13 < Dougy> hooah vpn 15:15 -!- HazardX [n=HazardX3@pool-96-252-45-198.bstnma.fios.verizon.net] has joined ##openvpn 15:21 < poningru> I had a question 15:22 < poningru> ok more of a feature request 15:22 < poningru> can openvpn client have a cisco mode? 15:22 < poningru> for their new ssl vpn 15:23 < poningru> I mean all it is just a messed up ssl implementation 15:23 < rob0> probably not 15:23 < poningru> rob0, any reason why? 15:24 < rob0> totally different implementation of a SSL VPN? Maybe a proprietary specification? Lots of reasons why. 15:25 < rob0> If Cisco wanted it to be openvpn-compatible, they easily could have made it so. 15:25 < poningru> rob0, err they are just using openssl 15:26 < poningru> granted an older one but still 15:26 -!- kyrix [n=ashley@91-114-134-188.adsl.highway.telekom.at] has joined ##openvpn 15:26 < rob0> Did you ask the Cisco folks if their thing is openvpn-compatible? 15:26 < poningru> ... 15:26 < poningru> I know it isnt 15:27 < poningru> there are no 'cisco folk' to ask 15:27 < poningru> there is a client called openconnect that does the job 15:27 < rob0> Oh, if you are a paying customer, they surely have support? 15:28 < poningru> just for brevity's sake it would be awesome if openvpn's client had similar support 15:28 < rob0> Then what you are asking is for openvpn to implement openconnect all in the same binary? 15:28 < poningru> pretty much yeah 15:29 < poningru> it isnt a big deal at all... it is dead simple to have either or 15:30 < poningru> but... would be nice if openconnect or something similar came under the awesome community that is openvpn 15:30 < Dougy> hmm 15:30 < Dougy> time to open a new location for VPS sales 15:30 < rob0> I doubt that would be practical. You can ask James on the -devel mailing list, but I'm betting the answer would be no. 15:30 * Dougy sends email to announce NJ location 15:31 < poningru> rob0, fair enough 15:32 < poningru> Dougy, vps sales? 15:32 < Dougy> yes? 15:32 < poningru> Dougy, selling virtualization? 15:32 < Dougy> yes 15:33 < poningru> god I need to get into the business of taking stupid peoples money 15:33 < Dougy> poningru: ? 15:33 < poningru> 2 hours of research and you can setup virtualization at no cost to you (other than hardware) 15:34 < poningru> and yet... people spend money on consultants 15:34 < Dougy> ya, thats the whole point of renting some virtualized stuff 15:34 < Dougy> people are happy to pay me $20 to rent 512MB RAM and a chunk of a quadcore 15:34 < poningru> oh... I guess that is different 15:35 < poningru> I was thinking you were setting up virtualization for companies 15:35 < poningru> nvm 15:35 < Dougy> oh 15:35 < Dougy> i get paid a fortune for that 15:35 < poningru> ... 15:35 < Dougy> i have a guy paying me $7500/month for a dual quadcore esxi machine.. cost me $2500 to build it 15:35 < Dougy> and i manage it for him 15:35 < poningru> sigh... 15:35 < poningru> see my company does something similar 15:36 < poningru> I think they pay something like 100K per year to sugarcrm to manage/custom code our pos crm 15:36 < poningru> and it is HORRIBLE too 15:36 < Dougy> lol 15:36 < Dougy> fail. 15:36 < poningru> seriously 15:36 < poningru> I need to get into consultancy 15:37 < poningru> I should probably get a few certifications 15:37 < Dougy> that company is nice 15:37 < Dougy> they pay for me to have a full rack in the dc 15:37 < Dougy> and a full gige for myself 15:37 < Dougy> loo 15:37 < Dougy> l 15:37 < poningru> who's data center? 15:37 < Dougy> Switch&Data 15:38 < poningru> whose* 15:38 < Dougy> its not quite my rack though 15:38 < Dougy> i just got a few U brocolo 15:38 < Dougy> company got the rest 15:38 < Dougy> i have a rack in another datacenter. 15:38 < poningru> I was thinking about creating a datacenter actually 15:38 < Dougy> i hope you have DEEP pockets 15:39 < poningru> hehe 15:39 < Dougy> caps for emphasis on how incredibly deep you need 15:39 < Dougy> now a days 20+mil for a smalll one 15:39 < poningru> if you are talking about hvac and power then it isnt that bad actually 15:39 < poningru> just^ 15:40 < Dougy> 20+ mil for a very small d 15:40 < Dougy> c 15:40 < poningru> if you are talking about with the boxen then yes that makes sense 15:40 < Dougy> everything 15:40 < Dougy> but really a decent sized one is close to 3 digit millions 15:42 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 54 (Connection reset by peer)] 15:43 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 15:46 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 15:57 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 16:08 < Dougy> ecrist 16:09 < Dougy> how did you set up moderated posts for first 2 posts 16:18 < ecrist> let me lok 16:18 < Dougy> all new users i have set to go to group A 16:19 < Dougy> which can't post w/o approval it says 16:19 < Dougy> so maybe now i just need to set it to move them at X post count 16:20 < ecrist> under user registration settings 16:20 < ecrist> New member post limit 16:20 < Dougy> New member post limit: 16:20 < Dougy> New members are within the Newly Registered Users group until they reach this number of posts. You can use this group to keep them from using the PM system or to review their posts. A value of 0 disables this feature. 16:20 < Dougy> just set that, and after they hit 2 16:20 < Dougy> for example 16:20 < Dougy> they can post freely? 16:20 < ecrist> yep 16:21 < Dougy> win 16:21 < ecrist> you have to setup the groups properly 16:21 < Dougy> in what sense 16:21 < Dougy> permissions? 16:21 < ecrist> yes 16:22 < Dougy> can you clue me in on what exactly? 16:22 * Dougy seems to think it looks like it'll work fine 16:22 < ecrist> group settings, which forums the 'newly registered users' can post to 16:22 < Dougy> oh taht 16:22 < Dougy> ok 16:22 < ecrist> are you setting up another forum or something? 16:22 < Dougy> yeah 16:25 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 16:34 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 16:37 -!- newmember_ [n=chatzill@S010600036d1139bb.cg.shawcable.net] has joined ##openvpn 16:42 -!- newmember_ [n=chatzill@S010600036d1139bb.cg.shawcable.net] has quit [Client Quit] 16:51 < ecrist> Dougy: data centers don't have to cost that much. 16:52 < ecrist> sans rent, I can build a superb data center for a few hundred thousand 16:52 < ecrist> it really all depends on the size of the DC you're talking 16:54 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has quit [Read error: 110 (Connection timed out)] 16:59 -!- kyrixpower [n=ashley@80-121-0-254.adsl.highway.telekom.at] has joined ##openvpn 17:16 -!- kyrix [n=ashley@91-114-134-188.adsl.highway.telekom.at] has quit [Read error: 110 (Connection timed out)] 17:26 < vpnHelper> New forum entry openvpnforum: Wishlist :: Re: Statistics Offloading :: Reply by ecrist 17:46 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Remote closed the connection] 18:02 -!- SkyX [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 18:07 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 18:11 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 18:13 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 18:14 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Remote closed the connection] 18:18 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [Connection timed out] 18:32 -!- kyrixpower [n=ashley@80-121-0-254.adsl.highway.telekom.at] has quit [Client Quit] 18:33 -!- kyrix [n=ashley@80-121-0-254.adsl.highway.telekom.at] has joined ##openvpn 18:43 -!- SkyX [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [Read error: 104 (Connection reset by peer)] 18:49 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 19:02 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 104 (Connection reset by peer)] 19:08 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 19:17 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 19:31 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: rawDawg, jfkw, master_o1_master, Dougy, mithridates, ScriptFanix, poningru, LobbyZ 19:32 -!- fnbrier [n=fbrier@adsl-190-181-181.asm.bellsouth.net] has joined ##openvpn 19:34 < fnbrier> !welcome 19:34 < vpnHelper> fnbrier: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 19:36 -!- kyrix [n=ashley@80-121-0-254.adsl.highway.telekom.at] has quit [Remote closed the connection] 19:38 < fnbrier> I am willing to post all my logs and configs, but I am not sure it is necessary... 19:39 < fnbrier> I do not believe my problem is OpenVPN related... 19:40 < fnbrier> I can connect to my OpenVPN server from Windows XP. The Windows XP box can ping the OpenVPN server. 19:41 < fnbrier> I can ping the Windows XP client from another system on my network and see the network traffic on the Windows XP box. 19:42 < fnbrier> However, if I attempt to "ping -I tun0 10.27.1.20" (my DNS server on my server side LAN), from the OpenVPN server, it fails. 19:43 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn 19:44 < fnbrier> So unless the tun0 interface handles ping weirdly, this seems to indicate OpenVPN is not the problem, correct? 19:44 < theDoc> !forum 19:44 < vpnHelper> theDoc: "forum" is The unofficial OpenVPN support forum is available at http://www.ovpnforum.com 19:45 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 19:45 < fnbrier> What command or configuration do I need to have tun0 packets be forwarded to the eth0 interface? 19:46 < fnbrier> !route 19:46 < vpnHelper> fnbrier: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 19:53 -!- Netsplit over, joins: Dougy, mithridates, jfkw, master_o1_master, poningru, LobbyZ, rawDawg, ScriptFanix 19:55 < reiffert> fnbrier: 19:55 < reiffert> !linnat 19:55 < vpnHelper> reiffert: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 20:08 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 20:09 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 20:09 -!- ggamer [n=ggamer@steinsel.perfect-privacy.com] has joined ##openvpn 20:09 < ggamer> hi 20:10 < ggamer> could anyone help me with a technical question? 20:10 < krzee> !ask 20:10 < vpnHelper> krzee: "ask" is (#1) don't ask to ask, just ask your question please, or (#2) http://www.latinsud.com/answer/, or (#3) http://www.catb.org/~esr/faqs/smart-questions.html to learn how to get help 20:10 < Dougy> fuck 20:10 < Dougy> krzee you beat me to it 20:10 < Dougy> i had !as typed 20:10 < krzee> quick on the draw ;] 20:10 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 20:11 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 20:12 < ggamer> my VPN provider has a feature that routes *all* traffic through the VPN, even flash and java and anything else you could think of. what is this feature called and does anyone know of any other VPN providers that have it? 20:12 < krzee> !def1 20:12 < vpnHelper> krzee: "def1" is (#1) used in redirect-gateway, Add the def1 flag to override the default gateway by using 0.0.0.0/1 and 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of overriding but not wiping out the original default gateway., or (#2) please see --redirect-gateway in the man page ( !man ) to fully understand 20:12 < krzee> !redirect 20:12 < vpnHelper> krzee: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 20:13 < krzee> its not application based, its route based, so it in fact does like you said, routes EVERYTHING 20:13 < krzee> as far as a name, i guess default routing over the vpn *shrug* 20:13 < krzee> im not 1 for marketing buzzwords i guess 20:14 < krzee> theDoc runs a company that does it, but that would be a subject for private msg 20:14 < ggamer> krzee: so it isn't one single thing im describing but a collection of things? 20:14 < Dougy> its a single thing 20:14 < Dougy> one line 20:14 < krzee> well its a single thing 20:14 < Dougy> push 'redirect-gateway def1 bypass-dhcp' 20:14 < krzee> 3 things to do to impliment it, 1 of them are in openvpn 20:14 < ggamer> then what is it called please? 20:14 < Dougy> !redirect 20:14 < vpnHelper> Dougy: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 20:14 < Dougy> ^ 20:14 < krzee> did you read what my bot told you? 20:15 < krzee> --redirect-gateway is the openvpn option 20:15 < rob0> I thought the bot was talking to me! 20:15 < ggamer> it's called "redirect-gateway def1 bypass-dhcp?" 20:15 < krzee> def1 bypass-dhcp are optional flags to send to the redirect-gateway command 20:15 -!- HazardX [n=HazardX3@pool-96-252-45-198.bstnma.fios.verizon.net] has quit [Read error: 110 (Connection timed out)] 20:17 < ggamer> i want a complete 100% "redirect" so nothing gets through my computer's connection except through the VPN 20:17 -!- jaek_ [n=jaek@c-71-202-163-230.hsd1.ca.comcast.net] has quit [Read error: 104 (Connection reset by peer)] 20:17 < reiffert> why would anyone use bypass-dhcp on redirect-gateway? 20:17 < theDoc> 'sup? 20:17 < theDoc> I heard my name. 20:17 < Dougy> ayo 20:17 < Dougy> whats good 20:17 < Dougy> tD 20:17 < krzee> reiffert, did you read that flag? 20:17 < reiffert> krzee: no. 20:18 < ggamer> is that possible? 20:18 < ggamer> what flags would i use? 20:18 < Dougy> ggamer 20:18 < krzee> ggamer, none, you dont run the server 20:18 < Dougy> we just told you twice ... 20:18 < ggamer> im asking so I can go vpn shopping 20:18 < Dougy> talk to theDoc 20:18 < krzee> all will do it 20:18 < Dougy> he'll sell it to you 20:19 < Dougy> yo krzee 20:19 < Dougy> you on OS X? 20:19 < Bushmills> ggamer: the openvpn connection itself goes through your normal connection ... 20:19 < ggamer> Bushmills: no way 20:19 < krzee> dougy, yes 20:19 < Dougy> http://zoomvps.com/forum/index.php 20:19 < vpnHelper> Title: ZoomVPS Forums Index page (at zoomvps.com) 20:19 < Dougy> how does that integration look 20:19 < Dougy> lines up ok? 20:20 < ggamer> Dougy: you told me all kinds of different flags 20:20 < Bushmills> ggamer: unless you tunnel openvpn over another openvpn 20:20 < krzee> yes 20:20 < Dougy> sweet 20:20 < ggamer> Bushmills: you mean you can chain openvpns? 20:20 < krzee> sure, but not how bush just said 20:20 < reiffert> krzee: been reading it, still no idea why anyone wants to use bypass-dhcp. 20:20 < Bushmills> wouldn't call it chaining, but nesting 20:21 < krzee> they can be chained as well, but thats different 20:21 < krzee> reiffert, ive never needed it either, but i guess it fixes some lamesauce where dhcp servers overwrite the ip 20:21 -!- HazardX [n=HazardX3@pool-96-237-60-245.bstnma.fios.verizon.net] has joined ##openvpn 20:22 -!- HazardX [n=HazardX3@pool-96-237-60-245.bstnma.fios.verizon.net] has quit [Remote closed the connection] 20:23 < krzee> oh no i have it backwards 20:24 < reiffert> ?sdrawkcab 20:24 < Bushmills> ecuasemal 20:24 < Dougy> liaf 20:26 < theDoc> ggamer> What do you need? 20:26 < theDoc> There was something about a vpn and all? ;p 20:27 < reiffert> better talk to openvpn2009 or Kasx. 20:27 < ggamer> i wonder why you cant do redirect with tor 20:28 < krzee> you can, by using tor 20:28 < krzee> lol 20:28 < krzee> along with an app like proxifier 20:28 < ggamer> you don't know very much about tor krzee 20:28 < krzee> oh really? 20:28 < krzee> lol 20:28 < theDoc> Tor is horrible. 20:28 < theDoc> ;p 20:28 < Dougy> lol who the hell does this joke think he is 20:28 < Dougy> krzee will shit in your cereal 20:28 < krzee> hes trolling 20:29 < fnbrier> May I ask for some help? 20:29 < Dougy> don't ask 20:29 < krzee> go ahead dougy 20:29 < Dougy> if you can ask 20:29 < Dougy> just ask 20:29 < ggamer> he's not asking 20:29 < ggamer> he's asking to ask 20:29 < fnbrier> I think I am missing a route command. 20:29 < ggamer> :) 20:29 < Dougy> ggamer: shut it 20:29 < reiffert> fnbrier: I already gave you: 20:29 < Dougy> smart ass 20:29 < reiffert> !linnat 20:29 < vpnHelper> reiffert: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 20:30 < fnbrier> Okay. I went to that web page. I guess I just did not get it. 20:31 < fnbrier> My configuration is not a NAT, is it? 20:31 < reiffert> fnbrier: just copy paste that first command, done. 20:31 < fnbrier> I am using OpenVPN with routing, not bridging. 20:31 < krzee> lulz 20:31 < krzee> ok im outtahere guys, enjoy :) 20:32 < ggamer> is that for my chinese food 20:32 < krzee> oh but before i go 20:33 -!- mode/##openvpn [+o krzee] by ChanServ 20:33 < Dougy> uh oh 20:33 -!- mode/##openvpn [+b *!*@steinsel.perfect-privacy.com] by krzee 20:33 -!- ggamer was kicked from ##openvpn by krzee [krzee] 20:33 < Dougy> hahahahahaa krzee <3 20:33 <@krzee> bibi 20:33 -!- mode/##openvpn [-o krzee] by krzee 20:33 < Dougy> bye 20:34 < rob0> Copy/paste of that command might not work. It assumes that eth0 is the external interface. 20:35 < theDoc> Wow, perfect privacy customer? 20:35 < reiffert> rob0: he was saying so. 20:35 < theDoc> Way to go, troll. 20:35 < rob0> oh 20:36 < fnbrier> So the -s (source) 10.8.0.0/24 refers to the tun0 interface? So if my tun0 for the client was 10.27.8.0, I would type: "iptables -t nat -A POSTROUTING -s 10.27.8.0/24 -o eth0 -j MASQUERADE" 20:36 < fnbrier> ? 20:36 < Dougy> sounds right 20:41 < fnbrier> Hmm... Did not work... I hate not understanding. My test to see if this is working is to ping -I tun0 10.27.1.20 (my DNS server), which fails and just failed. Is that a valid test? 20:41 < fnbrier> And the ping is being run on the OpenVPN server. 20:45 < reiffert> fnbrier: run tcpdump. 20:45 < rob0> How about you describe the goal a bit better? 20:45 < reiffert> while letting the ping run from client to dns server: 20:45 < reiffert> on the openvpn server: 20:45 < reiffert> tcpdump -n -i tun0 proto ICMP 20:45 < reiffert> see anything? 20:45 < reiffert> rob0: he already did. 20:45 < fnbrier> I am SO close. I can ping the client from a machine on the OpenVPN LAN. The client can ping both the OpenVPN server's tun0 IP and its eth0 IP. But it cannot ping servers on the OpenVPN LAN. 20:46 < fnbrier> Will do reiffert. And thank you SO much for the help. 20:46 < reiffert> fnbrier: ah, stop it. 20:47 < reiffert> fnbrier: 1. remove that iptables rule we gave you. 20:47 < reiffert> fnbrier: iptables -t nat -L POSTROUTING --line-numbers -v -n 20:47 < reiffert> fnbrier: iptables -t nat -D POSTROUTING 12345 20:47 < reiffert> where 12345 is the line-number. 20:48 < rob0> (or just change the -A to -D) 20:48 < rob0> (in the original rule you typed) 20:48 < reiffert> fnbrier: 2. add a static route to your OpenVPN LAN's gateway, routing packets with destination 10.27.1.0/24 back to your OpenVPN Server. 20:48 < reiffert> fnbrier: done. 20:49 < reiffert> fnbrier: means: 20:49 < reiffert> fnbrier: paket from client to server travels from client to openvpn server to server 20:50 < reiffert> but how about the way back: 20:50 < reiffert> from server to server's gateway and dropped there. 20:50 < fnbrier> Sorry. Having a bit of trouble removing the iptables rule 20:50 < reiffert> adding a static route, hands those pakets back to the openvpn server 20:50 < reiffert> rob0: you get the idea? 20:51 < reiffert> fnbrier: what trouble is it? 20:52 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 20:52 < reiffert> fnbrier: just a question inbetween: OpenVPN LAN's gateway is running Linux or Cisco? 20:52 < fnbrier> When I try to list the POSTROUTING rules, nothing shows up. 20:52 < reiffert> iptables -t nat -L POSTROUTING 20:52 < reiffert> nothing shows up? 20:52 < reiffert> like e.g. 20:53 < reiffert> mail:/home/thomas# iptables -t nat -L POSTROUTING 20:53 < reiffert> Chain POSTROUTING (policy ACCEPT) 20:53 < reiffert> target prot opt source destination 20:53 < fnbrier> Nada. Yup. 20:53 < reiffert> ok, so it's gone already, or never was active. 20:53 < fnbrier> Now when I ran the ping from the client I received: 20:53 < reiffert> back to the question of inbetween: 20:54 < reiffert> u first 20:54 < fnbrier> 21:54:32.672867 IP 10.27.8.5 > 10.27.1.20: ICMP echo request, id 1024, seq 13312, length 40 20:55 < fnbrier> 4 times, once for each ping (which shows as failing on the client). 20:55 < fnbrier> No I did not add the static route yet. 20:56 < reiffert> great, let the ping run, then stop the tcpdump and run another one: 20:56 < reiffert> on the openvpn server: tcpdump -n -i eth0 proto ICMP 20:56 < reiffert> what do you get here? 20:56 < reiffert> should be somth like 20:56 < reiffert> 10.27.8.5 > 10.27.1.20: ICMP echo request 20:56 < reiffert> stop the tcpdump and run another one: 20:56 < reiffert> on the openvpn server: tcpdump -n -i eth0 proto ICMP 20:56 < reiffert> should get you somth like 20:56 < reiffert> 10.27.8.5 > 10.27.1.20: ICMP echo request 20:56 < reiffert> is it? 20:58 < reiffert> just gimme a yes or no. 20:58 < fnbrier> Not sure what is different.. 20:58 < fnbrier> Same result. 20:58 < reiffert> great. 20:58 < reiffert> openvpn server is member of a lan. 20:59 < fnbrier> Ran the same tcpdump and ping. 20:59 < reiffert> what is the gateway of that lan? 20:59 < fnbrier> I did not get your response. 20:59 < reiffert> no, the 2nd command was different: 20:59 < reiffert> 2nd command: tcpdump -n -i eth0 proto ICMP 20:59 < fnbrier> 21:57:02.758222 IP 10.27.8.5 > 10.27.1.20: ICMP echo request, id 1024, seq 14336, length 40 20:59 < reiffert> 1st command: tcpdump -n -i tun0 proto ICMP 21:00 < fnbrier> Yes. 21:00 < reiffert> ok. stop running tcpdump here. 21:00 < reiffert> 03:58 < reiffert> openvpn server is member of a lan. 21:00 < fnbrier> Sorry. Typed what you said. First tun0 and then eth0. 21:00 < reiffert> 03:59 < reiffert> what is the gateway of that lan? 21:00 < fnbrier> Got the same result. 21:00 < reiffert> great news (same result) 21:00 < fnbrier> 10.27.1.1 21:01 < reiffert> 10.27.1.1 is running linux? 21:01 < fnbrier> It is a Linksys router. 21:01 < reiffert> sigh. 21:01 < reiffert> Which one? 21:01 < fnbrier> I did buy a box to put OpenWRT on, but have not gotten around to it yet. 21:02 < fnbrier> Just a sec. Put the model numbers on my twiki,. 21:02 < fnbrier> BEFSX41 21:02 < fnbrier> Firmware 1.52.15 21:03 < fnbrier> I tried creating a static routing on the Linksys. 21:04 < reiffert> "tried"? 21:04 < fnbrier> The routing table on the Linksys shows Dest IP 10.27.8.0, Mask 255.255.255.0 GW 10.27.8.1, HOP 0, Iface LAN. 21:05 < reiffert> http://downloads.linksysbycisco.com/downloads/BEFSX41_V21_UG_B-WEB,0.pdf 21:05 < reiffert> page 7 21:05 < reiffert> Setup > Advanced Routing 21:05 < reiffert> This screen is used to set up the Router.s advanced 21:05 < reiffert> functions. Dynamic Routing automatically adjusts how 21:05 < reiffert> packets travel on your network. Static Routing sets up a 21:05 < reiffert> fixed route to another network destination. 21:05 < reiffert> wrong. 21:05 < reiffert> it should show: 21:05 < reiffert> Dest IP 10.27.8.0, Mask 255.255.255.0 GW 10.27.1.IP_OF_OPENVPN_SERVER 21:06 < reiffert> what is the IP OF YOUR OPENVPN SERVER? 21:06 < fnbrier> Okay. I can change that. 21:06 < fnbrier> 10.27.1.19 21:06 < reiffert> put it there. 21:06 < fnbrier> What should the hop count be? 0 does not seem right. 21:07 < reiffert> all the linksys knows about is the 10.27.1.0/24 net, he doesnt know how to reach 10.27.8.1 21:07 < reiffert> let it blank, choose 0 or whatever 21:07 < reiffert> Hop Count Enter the maximum number of steps between 21:07 < reiffert> network nodes that data packets will travel. A node is any 21:07 < reiffert> device on the network, such as a computer, print server, 21:07 < reiffert> or router. 21:07 < reiffert> take '1' 21:08 < reiffert> or 0, or 30 21:08 < Bushmills> reiffert: do you remember HB-Männchen? 21:08 < reiffert> Bushmills: sure I do 21:08 < reiffert> http://www.dasauge.de/medien/aktuell/g1150449348.jpeg 21:09 < Bushmills> :D 21:09 < Dougy> damn germans 21:09 < Dougy> go to sleep 21:09 < Dougy> its late 21:09 < reiffert> Bushmills: I allready got one in my mouth, waiting for fnbrier's confirmation 21:09 < reiffert> Dougy: no. it's early. 21:09 < Bushmills> http://www.youtube.com/watch?v=78W7s4beAvI 21:09 < vpnHelper> Title: YouTube - HB Männchen - Der Flugpionier (at www.youtube.com) 21:11 < reiffert> :))) 21:11 < Bushmills> i was just picturing go going ballistic a similar way 21:11 < Bushmills> you going ... 21:11 < reiffert> fnbrier: come one 'saving changes' shouldnt take that long. 21:12 < reiffert> Bushmills: fnbrier is slow. I dont like being slow. 21:12 < reiffert> Bushmills: which doesnt mean that I dont like him, or dont want to help him. 21:12 < reiffert> well, guess he already made it. 21:12 < Bushmills> http://www.youtube.com/watch?v=Uh9dkHdQOAg&NR=1 21:12 < vpnHelper> Title: YouTube - HB Männchen Fliege (at www.youtube.com) 21:13 < reiffert> now watching pakets as they arrive and as they leave the interfaces ;) 21:21 < reiffert> fnbrier: does it work? yes/no/maybe/dontknow? 21:24 -!- fnbrier [n=fbrier@adsl-190-181-181.asm.bellsouth.net] has quit [Read error: 110 (Connection timed out)] 21:25 -!- fnbrier [n=fbrier@adsl-190-180-224.asm.bellsouth.net] has joined ##openvpn 21:25 < reiffert> fnbrier: success? 21:25 < fnbrier> reiffert? 21:26 < fnbrier> Not yet... I added a tcpdump to the DNS server and the pings do not make it there. 21:26 < reiffert> you said that they leave the eth0 interface on you openvpn server, didnt you? 21:26 < fnbrier> I have read that some people have had problems with VMWare, which I am not using. 21:27 < fnbrier> They are all my servers... 21:27 < reiffert> let's prove again: on openvpn server do: 21:27 < reiffert> tcpdump -n -i eth0 proto ICMP 21:27 < fnbrier> The OpenVPN server is a KVM VM on Fedora 11. 21:27 < reiffert> do you see the packets? 21:28 < fnbrier> Yes. 21:29 < fnbrier> And I just saw them on the DNS server too. 21:29 < fnbrier> !!! 21:29 < vpnHelper> fnbrier: Error: "!!" is not a valid command. 21:29 < reiffert> allright. 21:29 < fnbrier> Ping still failed on the Windows XP client. 21:29 < reiffert> on the dns server do: 21:29 < reiffert> tcpdump -n -i eth0 proto ICMP 21:29 < reiffert> paste what you see 21:29 < reiffert> paste to http://pastebin.ca/ 21:29 < fnbrier> I was just doing that. 21:29 < reiffert> use copy and paste 21:29 < fnbrier> 22:28:08.826597 IP 10.27.8.5 > 10.27.1.20: ICMP echo request, id 1024, seq 19968, length 40 21:30 < reiffert> allright, disable the firewall on your DNS Server. 21:31 < fnbrier> After the above line repeated 4 times, the following line appeared 6 times: 21:31 < fnbrier> 22:30:06.662667 IP 10.27.1.20 > 10.27.1.154: ICMP host 10.27.1.20 unreachable - admin prohibited, length 60 21:31 < reiffert> 04:30 < reiffert> allright, disable the firewall on your DNS Server. 21:32 < fnbrier> Well, 4 times the length was 60 and 2 it was 56. 21:32 < fnbrier> Will do. 21:32 < reiffert> fnbrier: what is 1.254 doing here instead of 1.1? 21:32 < reiffert> 04:00 < reiffert> 03:59 < reiffert> what is the gateway of that lan? 21:32 < reiffert> 04:00 < fnbrier> 10.27.1.1 21:33 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [Client Quit] 21:34 < fnbrier> Sorry. 21:35 < fnbrier> I was wondering where those packets were coming from. 21:35 < reiffert> fnbrier: they are coming from your firewall. the question is where are they heading to. 21:36 < fnbrier> 154 is my wife's laptop. 21:37 < reiffert> 254 21:37 < reiffert> oh, 154, my fault, forget about that. 21:37 < reiffert> how far did you get for disabling the firewall on .20? 21:37 < rob0> "admin prohibited" 21:38 < fnbrier> It is disabled. 21:38 < fnbrier> That was relatively easy. 21:39 < reiffert> copy paste what tcpdump shows. 21:40 < fnbrier> [root@derecho ~]# tcpdump -n -i eth0 proto ICMP 21:40 < fnbrier> tcpdump: WARNING: eth0: no IPv4 address assigned 21:40 < fnbrier> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode 21:40 < fnbrier> listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 21:40 < fnbrier> 22:39:28.358989 IP 10.27.8.5 > 10.27.1.20: ICMP echo request, id 1024, seq 23040, length 40 21:40 < fnbrier> 22:39:33.761364 IP 10.27.8.5 > 10.27.1.20: ICMP echo request, id 1024, seq 23296, length 40 21:40 < fnbrier> 22:39:38.775541 IP 10.27.8.5 > 10.27.1.20: ICMP echo request, id 1024, seq 23552, length 40 21:40 < fnbrier> 22:39:43.775618 IP 10.27.8.5 > 10.27.1.20: ICMP echo request, id 1024, seq 23808, length 40 21:40 < reiffert> ping pakets get to your DNS Server, it does not answer them. 21:41 < fnbrier> I have never used pastebin.ca before... Need to learn about it... 21:41 < fnbrier> So why might it not answer them? 21:42 < reiffert> firewall. 21:42 < reiffert> icmp disabled 21:42 < fnbrier> Hmmm.... 21:42 < Bushmills> 10.27.8.x and 10.27.1.x same subnet? otherwise return route on server? 21:43 < reiffert> Bushmills: tcpdump -n -i eth0 proto ICMP should show the echo replys. 21:43 < Bushmills> on eth0? 21:43 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 21:43 < Bushmills> shouldn't those go to tun? 21:44 < reiffert> Bushmills: dns server no tun0 21:44 < Bushmills> CMP echo request 21:44 < fnbrier> Maybe I did not turn off the firewall... I used the system-config-firewall gui and disabled/applied. 21:44 < Bushmills> ICMP 21:44 < reiffert> fnbrier: paste: iptables -L -v -n 21:44 < reiffert> to pastebin. 21:44 < reiffert> a 21:44 < reiffert> c 21:44 < reiffert> http://pastebin.ca 21:44 < reiffert> Bushmills: "ICMP echo request" saying what? 21:45 < Bushmills> (04:43:04) reiffert: Bushmills: tcpdump -n -i eth0 proto ICMP should show the echo replys. 21:45 < Bushmills> why replies on eth0? 21:45 < reiffert> Bushmills: dns server only got eth0. 21:46 < Bushmills> ah. dns problem. not openvpn problem? 21:46 < fnbrier> http://pastebin.ca/1755576 21:46 < Bushmills> didn't read all the backlog 21:46 < reiffert> fnbrier: fine, firewall's been turned off. 21:46 < Bushmills> assumed 10.x.x.x is openvpn, and ping not returning 21:46 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 21:46 < reiffert> Bushmills: client -> server -> dns 21:46 < reiffert> Bushmills: ping gets to dns 21:46 < reiffert> Bushmills: dns doesnt send reply 21:47 < fnbrier> http://pastebin.ca/1755577 21:47 < reiffert> Bushmills: firewall's off 21:47 < reiffert> fnbrier: route -n 21:47 < fnbrier> The DNS server does not seem to have a route to the 10.27.8.0 21:47 < reiffert> fnbrier: cat /proc/sys/net/ipv4/icmp_echo_ignore_all 21:48 < fnbrier> http://pastebin.ca/1755578 21:48 < reiffert> fnbrier: we will care about that later, once your dns send out an icmp paket. 21:48 < fnbrier> 0 21:49 < reiffert> fnbrier: let me logon to your dns as root. 21:49 < reiffert> fnbrier: paste: ifconfig -a 21:49 < fnbrier> Well, that would be difficult unless I port forward into it. 21:49 < reiffert> (from dns) 21:50 < fnbrier> It is behind the firewall. 21:50 < fnbrier> The router. 21:50 < reiffert> fnbrier: paste: ifconfig -a 21:51 < fnbrier> http://pastebin.ca/1755583 21:51 < reiffert> paste: brctl show 21:51 < reiffert> fnbrier: allright: run another tcpdump on the dns: 21:51 < reiffert> tcpdump -n -i br0 proto ICMP 21:51 < reiffert> paste what it shows please 21:52 < fnbrier> http://pastebin.ca/1755584 21:53 < fnbrier> http://pastebin.ca/1755585 21:53 < reiffert> welcome to virtual world problems. 21:53 < reiffert> your DNS doesnt reply to the icmp ping pakets. 21:53 < reiffert> it should reply. 21:54 < reiffert> can you ping 10.27.1.154 from the openvpn client? 21:54 < fnbrier> http://pastebin.ca/1755587 21:55 < reiffert> vortex is? 21:55 < fnbrier> It will respond from other servers on the network. 21:55 < fnbrier> vortex is the OpenVPN server. 21:55 < reiffert> but it does not reply to requests from servers outside your network. 21:55 < fnbrier> derecho is the DNS server. 21:56 < fnbrier> It won't respond if I ping it using the tun0 interface 21:56 < reiffert> it does not reply to requests from servers outside your network. 21:57 < reiffert> it is supposed to answer them. 21:57 < reiffert> but it does not. 21:57 < fnbrier> Okay... Hmmm... 21:57 < reiffert> and I have no idea why it doesnt do it. 21:57 < reiffert> thats why I was asking: 21:57 < reiffert> 04:54 < reiffert> can you ping 10.27.1.154 from the openvpn client? 21:57 < fnbrier> You have been amazing... I have learned a lot even if I haven't solved the problem. 21:58 < fnbrier> No. It is not responding. 21:58 < reiffert> turn off the firewall on 10.27.1.154 21:58 < reiffert> which is the laptop of your girl. 21:58 < fnbrier> Yah. 21:59 < fnbrier> But the box is now not responding from internal boxes. 21:59 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 22:00 < reiffert> turn it on. 22:00 < fnbrier> I just figured out what you were asking and tried it with a different box than the DNS server. 22:00 < fnbrier> The HDHomeRun embedded box is responding to pings over the OpenVPN link from the client. 22:01 < reiffert> great. it's not a virtual box I guess? 22:01 < reiffert> so you made it work finally, enjoy! 22:01 < fnbrier> No. It is an embedded video capture box. 22:02 < fnbrier> And I can ping cyclone which is another Fedora11 host box with the same bridged networking. 22:02 < reiffert> cyclone is the host rather than a vm guest? 22:02 < fnbrier> Yes. 22:03 < fnbrier> But snow is a VM on cyclone and I can ping it too! 22:03 < reiffert> damn, reboot the nameserver... 22:04 < reiffert> are they on the same vm host? snow and derecho 22:04 < fnbrier> I can ping ice which is a VM on the host derecho! 22:04 < fnbrier> Again from the client. 22:05 < fnbrier> derecho is the only d@mn thing I cannot ping. 22:05 < fnbrier> So reboot derecho. 22:05 < fnbrier> Okay. I can do that. 22:05 < reiffert> the only and that of your girl 22:06 < fnbrier> Yeah, but it is a Vista box :). 22:06 < reiffert> Excusing what, the firewall? 22:07 < reiffert> cyclone: paste ifconfig -a and brctl show 22:08 < fnbrier> I am rebooting derecho which is a VM host and also the DNS server for the network. It is running dnsmasq. I switch from bind 6 months ago. 22:08 < reiffert> ah, found the problem on derecho 22:08 < reiffert> netmask is wrong 22:08 < reiffert> # 22:08 < reiffert> [root@derecho ~]# ifconfig -a 22:08 < reiffert> # 22:08 < reiffert> br0 Link encap:Ethernet HWaddr 00:26:18:F1:89:02 22:08 < reiffert> # inet addr:10.27.1.20 Bcast:10.27.15.255 Mask:255.255.240.0 22:10 < reiffert> let say it's too big. 22:11 < fnbrier> Yeah. I did not realize it was 240... 22:12 < fnbrier> brb 22:12 < reiffert> Im to bed, bye 22:14 -!- jMyles [n=justin@user-160uq6b.cable.mindspring.com] has joined ##openvpn 22:14 < jMyles> Hello everyone. 22:15 < jMyles> I'm getting "read UDPv4 [ECONNREFUSED|ECONNREFUSED]: Connection refused (code=111)" on my server. I have googled and applied iptables rules, but the problem persists. 22:17 < fnbrier> reiffert! Thank you!!! 22:17 < reiffert> you are welcome 22:17 < fnbrier> It works!!! 22:17 < fnbrier> I can ping the DNS server. 22:17 < fnbrier> Man, I feel really sheepish. 22:18 < fnbrier> I cannot believe you spotted that. 22:18 < reiffert> feel free to send money to my paypal account. 22:18 < fnbrier> What is your paypal account? 22:18 < reiffert> I sent a privmsg 22:22 < rawDawg> are you really gonna pay him? 22:30 < jMyles> I am trying to use the same certificate which I use for apache, which is signed. Is this a good idea? I get the following message: unable to get local issuer certificate 22:32 -!- Dougy [n=me@vpn.douglashaber.com] has quit [Read error: 110 (Connection timed out)] 22:49 -!- linucks [n=linucks@loft4610.serverloft.com] has joined ##openvpn 22:51 < linucks> Hi I am trying to set up a VPN on a VPS, I simply want my traffic to be forwarded from my computer via the VPN through the VPS to it's default gateway. What's the best way to do this? I am getting a bit confused. 22:52 < linucks> !welcome 22:52 < vpnHelper> linucks: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 22:52 < linucks> !redirect 22:53 < vpnHelper> linucks: "redirect" is to make all inet traffic flow through the vpn, you will need --redirect-gateway (see !def1), as well as IP forwarding (see !ipforward) and NAT (see !nat) enabled on the server. 23:19 < jMyles> I'm very new to openvpn - when I connect, should my client show a new tun0 device in ifconfig? 23:36 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit ["( www.nnscript.com :: NoNameScript 4.22 :: www.esnation.com )"] 23:43 -!- theDoc [n=hex@unaffiliated/thedoc] has joined ##openvpn --- Day changed Mon Jan 18 2010 00:00 -!- magic_1 [n=magic@unaffiliated/magic1/x-836121] has quit [] 00:15 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 00:18 -!- jMyles [n=justin@user-160uq6b.cable.mindspring.com] has quit [Remote closed the connection] 00:19 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit [Read error: 110 (Connection timed out)] 00:34 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 00:44 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 00:45 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 00:46 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 00:47 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 00:47 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has quit [Excess Flood] 00:49 -!- mrnice1 [i=bouncer@ip077244250141.rev.nessus.at] has joined ##openvpn 00:53 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 01:15 -!- rawDawg2 [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 01:19 < Bushmills> yes 01:21 < Bushmills> linucks: "want my traffic to be forwarded from my computer via the VPN through the VPS to it's default gateway." how does that involve openvpn? 01:21 < Bushmills> i mean, where is server, where is client? 01:22 < Bushmills> and what traffic do you want to reroute where to? 01:27 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 01:27 -!- mode/##openvpn [+o mattock] by ChanServ 01:30 -!- dunc [n=dunc@fenchurch.wlan.sandown.ipv6.braddon.org.uk] has quit [Read error: 113 (No route to host)] 01:32 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit [Read error: 110 (Connection timed out)] 01:45 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 54 (Connection reset by peer)] 01:49 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 01:53 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 01:58 -!- arvind [n=arvind@114.143.216.131] has joined ##openvpn 02:06 < arvind> http://pastebin.com/d9c2e3a8 02:06 < arvind> !welcome 02:07 < vpnHelper> arvind: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 02:07 < arvind> !goal 02:07 < vpnHelper> arvind: "goal" is Please clearly state your goal for your vpn: example, I would like to access the lan behind the server , I would like to access the internet over my vpn , I just want a secure connection between 2 computers , etc 02:08 < arvind> !howto 02:08 < vpnHelper> arvind: "howto" is OpenVPN comes with a great howto, PLEASE READ IT! http://openvpn.net/howto 02:08 < arvind> !route 02:08 < vpnHelper> arvind: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 02:14 < arvind> Goal: My VPN Server is on the Internet. I need LAN1(remote) to be able to talk to LAN2(also remote) through the VPN server. 1 machine on either LAN should act as the gateway for the respective LAN's. All the other machines must communicate through these. 02:15 < arvind> The 2 gateways can both connect to OpenVPN server and ping each other. 02:16 < arvind> LAN1 however cannot even ping the VPN server which is on the Internet. 02:16 < arvind> details are here - http://pastebin.com/d9c2e3a8 02:29 < jmm> hi. 02:34 -!- d12fk [n=heiko@vpn.astaro.de] has quit [Remote closed the connection] 02:56 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has joined ##openvpn 02:57 -!- cityLights [i=nobody@bzq-84-111-46-151.red.bezeqint.net] has joined ##openvpn 03:00 -!- teddymills [n=teddy@208.92.235.227] has quit [Read error: 104 (Connection reset by peer)] 03:00 -!- teddymills [n=teddy@208.92.235.227] has joined ##openvpn 03:03 -!- tjz2 [n=tjz@bb116-15-75-62.singnet.com.sg] has joined ##openvpn 03:04 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 60 (Operation timed out)] 03:04 < cityLights> hi all , where can I ask about bridging? 03:08 -!- master_of_master [i=master_o@p57B562BF.dip.t-dialin.net] has joined ##openvpn 03:12 < eightfold> i open a vpn connection using this openvpn config file [ http://paste.debian.net/56985 ]. i want the applications run under the user account "vpn" on my debian install to only have access to the internets via tun0 (openvpn), the "vpn" user should be able to access the eth0 connection. i want all the other users accounts to default to _not_ using the vpn connection, i want them to use eth0. 03:12 < eightfold> the tunnel works but per default it redirects all traffic via tun0. if i add these lines to iptables [ http://paste.debian.net/56940/ ] the applications not running via the user "vpn" can't access the intarwebs (like firefox). i suppose that is because they try to use the tun0 connection, but the iptables lines says they can not. 03:13 < eightfold> how do i get openvpn to not by default be "system wide"? i just want to redirect the user account on my computer with the name "vpn" to be forced to use the tunnel. i have been looking at "redirect-gateway" in the .ovpn file. def1 seems to force connection to be system wide. right now that is what seems to happen even though i don't have that setting. ideas? 03:18 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 03:18 -!- master_o1_master [n=master_o@p57B570F2.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:20 -!- tjz [n=tjz@unaffiliated/tjz] has quit [Read error: 110 (Connection timed out)] 03:24 < eightfold> sorry, the first of those above three lines should say "the "vpn" user should NOT be able to access the eth0 connetction" 03:25 -!- arvind [n=arvind@114.143.216.131] has quit ["Leaving"] 03:25 < JodaX> tl;dr, eightfold 03:26 < eightfold> hmm, sawry. 03:28 < eightfold> in short: i want to connect to a openvpn tunnel but i don't want it (tun0) to become the default system wide network interface. 03:39 < JodaX> why would it become that ? 03:39 < JodaX> no other interfaces, using redirect-gateway or some push route somewhere ? 03:40 < eightfold> JodaX: my conf: http://paste.debian.net/56985 03:41 < eightfold> JodaX: could it be the redirect-gateway line? 03:41 < JodaX> thats client conf, server conf can also push stuff 03:41 < JodaX> but you gotz dat redirect-gateway in dere, remove dat 03:43 -!- cityLights [i=nobody@bzq-84-111-46-151.red.bezeqint.net] has quit [Remote closed the connection] 03:55 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 113 (No route to host)] 04:23 -!- cityLights [n=cityLigh@bzq-84-111-46-151.red.bezeqint.net] has joined ##openvpn 04:24 -!- theDoc [n=hex@unaffiliated/thedoc] has quit [Read error: 110 (Connection timed out)] 04:25 < eightfold> JodaX: can't try right now, but will test later. is there a way to override settings pushed by server? 04:30 < cityLights> hi, how can I block dhcp request from a client subnet reaching the servers subnet 04:30 -!- buntfalke [n=nobody@openvpn-p0-122.triple-a.uni-kl.de] has joined ##openvpn 04:31 -!- buntfalke is now known as Guest18307 04:33 -!- dazo_afk is now known as dazo 04:38 -!- Guest18307 [n=nobody@openvpn-p0-122.triple-a.uni-kl.de] has quit [Remote closed the connection] 04:38 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 04:42 -!- polaru [n=polaru@93.113.192.70] has quit [Excess Flood] 04:42 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 04:44 -!- polaru [n=polaru@93.113.192.70] has quit [Excess Flood] 04:44 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 04:45 -!- polaru [n=polaru@93.113.192.70] has quit [Excess Flood] 04:45 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 04:46 -!- polaru [n=polaru@93.113.192.70] has quit [Excess Flood] 04:47 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 04:48 -!- polaru [n=polaru@93.113.192.70] has quit [Excess Flood] 04:48 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 04:49 -!- polaru [n=polaru@93.113.192.70] has quit [Excess Flood] 04:50 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 04:51 -!- polaru [n=polaru@93.113.192.70] has quit [Excess Flood] 04:51 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 04:54 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [SendQ exceeded] 04:54 -!- buntfalke [n=nobody@openvpn-p0-122.triple-a.uni-kl.de] has joined ##openvpn 04:55 -!- buntfalke is now known as Guest21937 05:00 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Remote closed the connection] 05:02 -!- Guest21937 [n=nobody@openvpn-p0-122.triple-a.uni-kl.de] has quit [Client Quit] 05:02 -!- Guest21937 [n=nobody@openvpn-p0-122.triple-a.uni-kl.de] has joined ##openvpn 05:02 -!- Guest21937 [n=nobody@openvpn-p0-122.triple-a.uni-kl.de] has quit [Remote closed the connection] 05:02 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 05:04 -!- YaManicKill [n=ali@130.159.141.69] has joined ##openvpn 05:05 < YaManicKill> when trying to push dns options through openvpn, what should i use as the ip? 05:13 < reiffert> those of your nameservers. 05:17 < YaManicKill> and if i dont have an internal nameserver, can i put an external one? (such as 8.8.8.8) 05:19 -!- MrJK [n=jezu@194.199.166.96] has quit [Read error: 104 (Connection reset by peer)] 05:20 < kisom> YaManicKill: provided that the client will be able to access an external DNS server, yes you an put it there 05:21 < YaManicKill> hmmm ok, well for some reason it isnt working. and i know its dns, cause i can go to website when i enter the ip address 05:22 < kisom> YaManicKill: Do you redirect client traffic thru the VPN? 05:23 < YaManicKill> server conf - http://pastebin.com/f1f59c692 05:24 < YaManicKill> kisom: i'm pretty sure i do. push "redirect-gateway" does that, yeah? 05:24 < kisom> yes it does. make sure you enable masquerade mode in iptables and tell the kernel to forward packets 05:25 < kisom> im sorry, but i have to go, got a plane to catch 05:25 < kisom> good luck with your VPN 05:39 -!- JodaX [n=NOTOKAY@ks22848.kimsufi.com] has quit [Read error: 60 (Operation timed out)] 05:50 < le0> !nat 05:50 < vpnHelper> le0: "nat" is (#1) http://openvpn.net/howto.html#redirect for an explanation of NAT as it applies to openvpn, or (#2) http://www.secure-computing.net/wiki/index.php/OpenVPN/FAQ#Traffic_forwarding_doesn.27t_work_when_using_client_specific_access_rules, or (#3) dont forget to turn on ip forwarding, or (#4) please choose between !linnat and !fbsdnat for specific howto 06:09 < YaManicKill> ok, what would i need to do for this http://pastebin.com/d7c91675b to allow openvpn connections? 06:09 < YaManicKill> (thats my iptables) 06:14 < DarkAnt> YaManicKill: I'm just curious what linnat and fbsdnat are 06:14 < DarkAnt> !linnat 06:14 < vpnHelper> DarkAnt: "linnat" is (#1) for a basic iptables NAT where 10.8.0.x is the vpn network: iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j MASQUERADE, or (#2) to choose what IP address to NAT as, you can use iptables -t nat -I POSTROUTING -o eth0 -j SNAT --to , or (#3) http://netfilter.org/documentation/HOWTO//NAT-HOWTO.html for more info 06:15 < DarkAnt> !fbsdnat 06:15 < vpnHelper> DarkAnt: "fbsdnat" is see http://cavanantha.wordpress.com/2007/09/16/nat-on-freebsd-using-pf/ for a basic howto for NAT on FreeBSD 06:15 < DarkAnt> ok, I run a linux nat 06:16 < DarkAnt> !staicip 06:16 < vpnHelper> DarkAnt: Error: "staicip" is not a valid command. 06:16 < DarkAnt> !staic-ip 06:16 < vpnHelper> DarkAnt: Error: "staic-ip" is not a valid command. 06:17 < DarkAnt> !staticip 06:17 < vpnHelper> DarkAnt: Error: "staticip" is not a valid command. 06:17 < DarkAnt> !static-ip 06:17 < vpnHelper> DarkAnt: Error: "static-ip" is not a valid command. 06:17 < DarkAnt> bah 06:17 < YaManicKill> lol 06:17 < reiffert> !factoids search --values static 06:17 < vpnHelper> reiffert: 'static', 'iporder', 'hmac', 'ipp', 'ipp', and 'iporder' 06:17 < DarkAnt> ah, niffty 06:18 < DarkAnt> !static 06:18 < YaManicKill> !iptables 06:18 < vpnHelper> DarkAnt: "static" is (#1) use --ifconfig-push in a ccd entry for a static ip for the vpn client, or (#2) example: ifconfig-push 10.8.0.6 255.255.255.0, or (#3) also see !ccd and !iporder 06:18 < vpnHelper> YaManicKill: "iptables" is (#1) o test if iptables is your problem, disable all rules or put the defaults to accept: iptables -P INPUT ACCEPT; iptables -P OUTPUT ACCEPT; iptables -P FORWARD ACCEPT;, or (#2) then run iptables -F, iptables -Z after being SURE policies are set to accept, or (#3) please see http://openvpn.net/man#lbBD for more info, or (#4) see http://www.secure- 06:18 < vpnHelper> YaManicKill: computing.net/wiki/index.php/OpenVPN/Firewall 06:18 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 110 (Connection timed out)] 06:20 < DarkAnt> !iporder 06:20 < vpnHelper> DarkAnt: "iporder" is (#1) OpenVPN's internal client IP address selection algorithm works as follows: 1 -- Use --client-connect script generated file for static IP (first choice)., or (#2) Use --client-config-dir file for static IP (next choice) !static for more info, or (#3) Use --ifconfig-pool allocation for dynamic IP (last choice), or (#4) if you use --ifconfig-pool-persist see !ipp 06:29 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 06:32 < DarkAnt> what actually goes into a client connect script. I'm having trouble finding the documentation for it 06:36 < DarkAnt> oh, there's a lot going on with that script 06:39 < DarkAnt> and its all scattered about in the documentation as far as I can tell :/ 06:43 < DarkAnt> !factoids search --values script 06:43 < vpnHelper> DarkAnt: 'iporder', 'mitm', 'crl', 'ipv6', and 'pushdns' 06:46 < dazo> DarkAnt: what exactly are you looking for? 06:52 < DarkAnt> I'm trying to figure out how to hand out static ip addresses 06:53 < DarkAnt> actually, my end goal is to have some form of a dns 06:56 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 06:59 -!- cityLights [n=cityLigh@bzq-84-111-46-151.red.bezeqint.net] has quit ["Leaving"] 07:02 -!- tjz2 [n=tjz@bb116-15-75-62.singnet.com.sg] has quit ["bbl"] 07:02 -!- tjz [n=tjz@bb116-15-75-62.singnet.com.sg] has joined ##openvpn 07:13 < DarkAnt> so that I can type "ssh some_server" and I'll be able to log in 07:14 < DarkAnt> uh oh, I've to shovel snow. I'll be sure to read whatever anyone types when I get back 07:18 -!- mithridates [n=chatzill@CPE001c103c6b61-CM001ac317c0ba.cpe.net.cable.rogers.com] has quit [Read error: 110 (Connection timed out)] 07:34 < ecrist> good morning 07:34 < reiffert> rawDawg2: I wrote "feel free" which is what I meant. 07:35 < reiffert> rawDawg2: so if he's going to get me some bucks I'll feel happy. If he doesnt I'll feel happy as well. 07:36 < reiffert> hi ecrist 07:39 < dazo> g'afternoon 07:39 < reiffert> hi dazo 07:39 < dazo> :) 07:40 < reiffert> ecrist: do we have graphviz (especially: dot plugin) on the wiki !route is living at? 07:40 < ecrist> not sure what you mean 07:41 < reiffert> !route 07:41 < vpnHelper> reiffert: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 07:41 < ecrist> is graphiz a plugin for mediawiki? 07:41 < reiffert> it's a mediawiki, is it? 07:41 < ecrist> yes, the wiki is mediawiki 07:41 < reiffert> http://www.mediawiki.org/wiki/Extension:Graphviz 07:41 < vpnHelper> Title: Extension:Graphviz - MediaWiki (at www.mediawiki.org) 07:42 < ecrist> it's not installed yet, but I can do that for you, if you'd like. 07:42 < reiffert> graphviz example: http://www.graphviz.org/Gallery/directed/unix.html 07:42 < vpnHelper> Title: Graphviz Example: UNIX Family 'Tree' (at www.graphviz.org) 07:42 < reiffert> ecrist: I really like to have graphviz there. I like it for drawing network maps. 07:43 < ecrist> Since I've discontinued my personal wiki, there's no download at the moment. I might decide to put the code online again on my new page at a later time, but for the moment, I'm sorry. 07:44 < reiffert> "no download" of what in particular? 07:44 < ecrist> the extension 07:44 < ecrist> the php code to include graphviz in mediawiki 07:44 < reiffert> so the secure-computing.net wiki is running at what place? 07:45 < reiffert> (I still dont get it right I think) 07:46 < ecrist> it is running at my home, in my server room, on a freebsd 7.2p2 system 07:46 < reiffert> but you cannot download the graphviz extension because you have stopped your personal wiki? 07:47 < ecrist> no, I pasted what is under the 'Download' section of the mediawiki link you gave me 07:47 < ecrist> sorry, I wasn't clear with my paste. 07:48 < ecrist> I need GraphvizExtension.php to include it in mediawiki, but there's no download link available 07:49 < ecrist> http://www.mediawiki.org/wiki/Extension:GraphViz 07:49 < vpnHelper> Title: Extension:GraphViz - MediaWiki (at www.mediawiki.org) 07:49 < ecrist> that might be a better page 07:49 < ecrist> it has a download link 07:50 < reiffert> "Of course the only requisite for this plugin to work is the graphviz program; you can download it from here" 07:50 < reiffert> pkg_add -r graphiv or similar 07:51 < reiffert> then click on 07:51 < reiffert> Install instructions 07:51 < reiffert> 1. Download Graphviz.php. 07:51 < reiffert> getting you here: http://mwextensions.cvs.sourceforge.net/*checkout*/mwextensions/mediawikiextensions/Graphviz.php 07:51 < reiffert> or choose http://www.mediawiki.org/wiki/Extension_talk:GraphViz#Improvement 07:51 < vpnHelper> Title: Extension talk:GraphViz - MediaWiki (at www.mediawiki.org) 07:51 < reiffert> 2. Copy Graphviz.php to the $mediawiki/extensions directory. 07:52 < reiffert> add stuff to localsettings.php, check if it works, done, thanks 07:52 < reiffert> :) 07:53 < ecrist> working on getting it installed now, reiffert 08:01 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has joined ##openvpn 08:03 < newmember> I can use and and in the client config file, what is the syntax for using a "secret passphrase"? 08:04 < ecrist> when asked, type it in 08:08 < dazo> newmember: you can also use --auth-user-pass ... 08:08 < dazo> ecrist: a good feature to factoid would be to look up sections in the openvpn man page ..... !man --auth-user-pass ... 08:09 < dazo> newmember: that argument takes a file name, where you have saved username and password .... but it won't help for certificates 08:10 < dazo> newmember: for certificate ... --askpass is the argument, I believe 08:11 < ecrist> reiffert: graphviz is installed and working. 08:12 < ecrist> dazo: that sounds like a lot of work. 08:12 < ecrist> dazo: do you know python? 08:13 < dazo> ecrist: yeah, but my available time is limited :-P 08:14 < ecrist> here are my two suggestions: write the plugin for supybot, and I'll install it for vpnHelper, or parse the man pages and send me the result, and I'll write a plugin for the upcoming OpenVPN bot 08:14 < ecrist> OpenVPN bot may replace, or augment vpnHelper, not sure at this point. 08:14 < dazo> ecrist: I'd like to help out writing a parser ... no prob! I just know I won't manage it the first 2 weeks 08:15 < ecrist> no rush 08:15 < ecrist> if you can automate the parsing (i.e. pull from website, parse data), we can give it an auto-update feel by using cron to update the db as the web page is updated. 08:16 < ecrist> once I have that, I'll write the code for the bot 08:16 < dazo> ecrist: even better ... and htmlised man page is easier to parse as well ... that's just to use libxml2 and XPath queries 08:17 < ecrist> if you did that, it would give me motivation to work on the other bot. 08:17 < ecrist> :) 08:17 < ecrist> dazo: did you see my post on ovpnforum about comp -> community relationship? 08:17 < dazo> No, I haven't been there for a few days 08:17 * dazo pokes 08:17 < newmember> Maybe to restate, I am trying to use "Shared key" and I would like to put the "Shared key" in the config.opvn file, I used for a ca, what would go around a "Shared key"? 08:18 < ecrist> http://www.ovpnforum.com/viewtopic.php?f=1&t=2467 08:18 < vpnHelper> Title: OpenVPN Forum View topic - OpenVPN Technologies & OpenVPN Community Relationship (at www.ovpnforum.com) 08:18 < ecrist> I omitted contents of your email, as it was semi-private, but feel free to comment on the thread. ;) 08:18 < dazo> newmember: --key can also contain a password string for a static password 08:19 < dazo> ecrist: sure, thx! 08:22 < newmember> Hmmm, the client keeps asking for the ca 08:23 -!- steelnwool [n=jeff@204-232-209-119.static.cloud-ips.com] has joined ##openvpn 08:23 < steelnwool> on ubuntu, is the recommend way to increase the mtu, via /etc/defaults/openvpn ? 08:24 -!- rawDawg2 [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit [Read error: 113 (No route to host)] 08:26 -!- tiav [n=tiav@mx.fr.smartjog.net] has joined ##openvpn 08:29 -!- LongInt [n=LongInt@41.219.248.160] has joined ##openvpn 08:29 -!- YaManicKill [n=ali@130.159.141.69] has left ##openvpn [] 08:30 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 08:36 -!- slonbg [n=chatzill@216.17.90.91] has quit ["ChatZilla 0.9.86 [Firefox 3.6b5/2009120400]"] 08:38 < reiffert> steelnwool: go and ask ubuntu guys. 08:47 -!- LongInt [n=LongInt@41.219.248.160] has quit [" HydraIRC -> http://www.hydrairc.com <- The professional IRC Client :D"] 08:48 < le0> steelnwool, i have not had to alter MTU settings on an ubuntu based server.... 08:48 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 08:50 < steelnwool> le0: i do. :) thanks tho. 08:50 < dazo> well, if you struggle with fragmentation issues ... playing with the MTU can improve the situation ... but it also depends on "which MTU" you're playing with as well ... is the t he MTU inside the tunnel, or the packets which openvpn corks up before encrypting them and sending them to the wire? 08:51 < steelnwool> my goal was just to see how to set them.. which i've now realized i can do with the config file, so i'm good. thanks. 08:51 < steelnwool> 1400 works much better for vmware vhspere client i find. 08:52 < ecrist> !mtu 08:52 < vpnHelper> ecrist: "mtu" is see --mtu-test to learn how to test your MTU settings. Basically you just use --mtu-test in your normal client config 08:52 < steelnwool> aye. 08:59 < vpnHelper> New forum entry openvpnforum: Configuration :: Advice on troubleshooting possible network problem :: Author Simon B 09:00 < ecrist> we need new forum software 09:01 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 09:01 < ecrist> I think this month I'll scrounge up the dough to get a vbulletin license. 09:01 -!- newmember [n=chatzill@S010600036d1139bb.cg.shawcable.net] has quit [Read error: 110 (Connection timed out)] 09:02 < steelnwool> phpbb not up to the task? 09:02 < steelnwool> or is that what yer using already? 09:02 < ecrist> it is, but take a look at that link. 09:02 < ecrist> that's what we're using now 09:02 < steelnwool> gotcha. 09:03 < ecrist> it has ugly links, phpbb3 insists on putting session id in the URL 09:03 < ecrist> phpbb isn't optimized for search engines, either 09:03 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 09:03 < reiffert> ecrist: thanks! 09:04 < steelnwool> evert seen phorum? 09:04 < ecrist> that link, on vbulletin, would be something like http://www.ovpnforum.com/server-administration/configuration/advice-on-troubleshooting-possible-network-problem 09:04 < steelnwool> i could never quite get the allure of it. 09:04 < reiffert> ecrist: I'm currently creating a wiki account. 09:04 < reiffert> ecrist: it says: To help protect against automated account creation, please enter the words that appear below in the box (more info): 09:05 < reiffert> ecrist: I cant see any "words" 09:05 * ecrist looks 09:05 < ecrist> crappy 09:05 < ecrist> must be a broken lib. let me fix 09:07 < ecrist> I guess it's been pretty effective against spam accounts. :) 09:07 < reiffert> ecrist: 09:07 < reiffert> Access Forbidden

Access Forbidden

Can't view captcha image a second time.

09:07 < reiffert> doh. forget that. 09:09 < DarkAnt> heh 09:09 < reiffert> Now I have Interal Error, requesting a bogus image. 09:10 < ecrist> reiffert: I removed the captcha, create your account and I'll put it back in for now. 09:11 < reiffert> created, thanks 09:11 < reiffert> There is no user by the name "reiffert". Check your spelling, or create a new account. 09:11 < reiffert> guess I need some email approval, let the greylisting timeout. 09:12 < reiffert> Welcome, Reiffert! 09:12 < reiffert> ah! 09:14 < reiffert> ecrist: http://www.secure-computing.net/wiki/index.php/Graph ... 09:14 < vpnHelper> Title: Graph - Secure Computing Wiki (at www.secure-computing.net) 09:15 < rob0> Damn spammers. A tiny group of nasty bastards, and they have in effect gotten away with mass murder (considering the time that each and every Internet user has lost to them.) 09:17 < Bushmills> no wonder if many mail server are configured with the equivalent of a sign, saying "stab here" 09:17 < ecrist> reiffert: http://www.mediawiki.org/wiki/Extension:GraphViz 09:17 < vpnHelper> Title: Extension:GraphViz - MediaWiki (at www.mediawiki.org) 09:17 < ecrist> the examples at the bottom worked forme. 09:17 < ecrist> s/forme./for me./ 09:17 < reiffert> ecrist: It _is_ the example from the bottom. 09:18 < ecrist> refresh your page 09:18 < ecrist> my example should show up, and it's working. 09:18 < reiffert> hrmn... 09:19 < ecrist> are you on the Graphviz page or GraphViz page? 09:19 < ecrist> two different, upper 'V' is correct. 09:19 -!- theDoc [n=hex@69.10.59.166] has joined ##openvpn 09:19 -!- steelnwool [n=jeff@204-232-209-119.static.cloud-ips.com] has left ##openvpn [] 09:20 < theDoc> Morn' all. 09:21 < ecrist> reiffert: http://www.wikischool.de/wiki/WikiSchool:Graphviz 09:21 < vpnHelper> Title: WikiSchool:Graphviz – WikiSchool (at www.wikischool.de) 09:21 -!- newmember [n=chatzill@static-66-11-81-77.ptr.terago.net] has joined ##openvpn 09:21 < ecrist> those also seem to all work fine. 09:21 < reiffert> now it works, I just was following the example code too hard. 09:22 < reiffert> (copy paste) 09:31 < reiffert> http://www.secure-computing.net/wiki/index.php/Graph will fill it up later, gtg 09:31 < vpnHelper> Title: Graph - Secure Computing Wiki (at www.secure-computing.net) 09:36 -!- hyper_ch [n=hyper_ch@91.121.147.34] has quit [Excess Flood] 09:37 -!- hyper_ch [n=hyper_ch@ks357331.kimsufi.com] has joined ##openvpn 09:37 < buntfalke> berniv6: Greenie writes on his v6 page you host the patch in git - where? 09:37 < buntfalke> berniv6: please leave me a memo in case i'm offline 09:39 < ecrist> nice, reiffert 09:44 < dazo> buntfalke: which/what v6 patch? 09:46 < buntfalke> dazo: http://www.greenie.net/ipv6/openvpn.html 09:46 < vpnHelper> Title: Gert Döring - IPv6 Payload Patch for OpenVPN (at www.greenie.net) 09:46 < buntfalke> IPv6-within-tun 09:46 < buntfalke> in contrast to jjo's ipv6-to-server patch 09:47 < dazo> buntfalke: yeah, that was what I was wondering about :) 09:48 < buntfalke> :-) 09:55 -!- newmember [n=chatzill@static-66-11-81-77.ptr.terago.net] has quit [Read error: 110 (Connection timed out)] 09:57 -!- hvnqke_work [n=per@90.184.203.29] has joined ##openvpn 09:58 < hvnqke_work> 10.0.30.2 (the vpn server) is accessible by the client, but others on the subnet (10.0.30.10 for example) is not. How come? 09:59 < dazo> hvnqke_work: do you mean that other clients cannot access the server? or that server cannot access clients? Or that clients cannot access other clients? 10:00 < hvnqke_work> that I, from the client, can't access the other machine on the same network as the VPN-server. 10:01 < hvnqke_work> 10.0.30.2 and 10.0.30.10 are next to each other, but the client can only access 10.0.30.2 10:01 < Bushmills> that's right 10:02 < Bushmills> it comes because openvpn has no reason to talk to machines connected to another interface 10:02 < hvnqke_work> what good is vpn if I don't get a network? 10:03 < Bushmills> you need to give openvpn a reason 10:03 < hvnqke_work> and how would I do that? 10:03 < dazo> hvnqke_work: it's not easy to understand what you try to achieve .... but it sounds like you haven't set up routing 10:03 < Bushmills> !route 10:03 < vpnHelper> Bushmills: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 10:03 -!- Kasx [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Read error: 104 (Connection reset by peer)] 10:03 < Bushmills> also read about client-to-client 10:04 < hvnqke_work> dazo, I have a number of servers on the subnet 10.0.30.*. 10.0.30.2 is acting vpn-server. I want to be able to access each server from anywhere in the world through openvpn with ssh root@10.0.30.*. 10:05 < dazo> hvnqke_work: good! That's a pretty normal setup .... is 10.0.30.2 also a default gateway in your network? 10:05 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has quit [Read error: 104 (Connection reset by peer)] 10:06 -!- sigius [n=sigius@93-125-185-45.dsl.alice.nl] has joined ##openvpn 10:06 < reiffert> do it by nat. 10:06 < hvnqke_work> dazo, they are virtual servers, so the gateway for the respective machines are the virtual interfaces. however, I have this line: up route add -net 10.9.0.0 netmask 255.255.255.0 gw 10.0.30.2 in my /etc/network/interfaces 10:07 < hvnqke_work> (openvpn is set to push to 10.9...) 10:07 -!- Kas [n=Kasx@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 10:07 -!- mode/##openvpn [+v Kas] by ChanServ 10:07 < dazo> hvnqke_work: goodie .... then you also probably just need to push "route 10.0.30.0 255.255.255.0" in server config as well 10:08 < dazo> hvnqke_work: another trap people fall in is also the firewall .... check that the openvpn don't have any rules which would block the VPN traffic to hit your network 10:09 < dazo> hvnqke_work: but basically, !route gives a pretty good overview over how the routing works and can be setup ... you won't need all these features described here, but it's a good source to grab the functionality 10:10 < hvnqke_work> I've got the following lines in server.conf : http://pastebin.ca/1756139 -- I've set iptables on the "host" of the virtual machines to route all port 1194 traffic to 10.0.30.2 10:11 < dazo> hvnqke_work: iptables must also allow "native" IP traffic to pass from the tun/tap device and to the network segments you allow VPN clients to reach 10:12 < dazo> hvnqke_work: this is needed in the FORWARD chain 10:13 < dazo> hvnqke_work: you'll usually find people testing out with iptables -I FORWARD -i tun+ -j ACCEPT ; iptables -I FORWARD -o tun+ -j ACCEPT .... if you're using tun devices 10:14 < krzee> Kas, you here? 10:14 <+Kas> Yes sir, Whats up? 10:14 < hvnqke_work> dazo, http://pastebin.ca/1756148 10:14 < dazo> hvnqke_work: for more debugging, you'll probably find tcpdump -n -i tun0 invaluable, running on the server ... then you see how the traffic flow 10:15 < dazo> hvnqke_work: yeah, that'll disable the firewall for the tun+ devices 10:15 < hvnqke_work> hmm. It hits me - there's no tun-devices on the host-system, only the guest system holding the vpn-server 10:15 < krzee> Kas, some links for the web manual dont work 10:15 <+Kas> could you please point me to an example 10:15 < dazo> hvnqke_work: also make sure sysctl net.ipv4.ip_forward is 1 10:15 < krzee> !firewall 10:15 < vpnHelper> krzee: "firewall" is (#1) please see http://openvpn.net/man#lbBD for more info, or (#2) see http://www.secure-computing.net/wiki/index.php/OpenVPN/Firewall for brief notes on disabling firewall rulesets. 10:16 < krzee> link #1 10:16 < krzee> then go to the bottom and try ANY of them 10:16 < krzee> the redirect loses the #location 10:16 < hvnqke_work> dazo, on which system? 10:16 < dazo> hvnqke_work: on your openvpn server 10:17 < hvnqke_work> it's 1 10:17 < hvnqke_work> should the host-system have a tun device? 10:17 <+Kas> krzee, You are correct, I will talk with our web developer now. 10:17 < krzee> thanx 10:18 < dazo> hvnqke_work: yes, it should .... either tun or tap ... depending on your config .... you might have renamed the device in the openvpn config? 10:19 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has joined ##openvpn 10:19 < hvnqke_work> hvnqke_work, the openvpn-server has a tun device, but the host has not 10:19 < dazo> hvnqke_work: ahh ... only the server needs it 10:20 < hvnqke_work> right. the iptables rules regarding tun, should the be duplicated in the vpn-server? 10:20 < hvnqke_work> *they be 10:20 < dazo> hvnqke_work: those rules needs to be on the vpn-server yes 10:21 < dazo> hvnqke_work: your vpn-server is in this case a router .... routing traffic between a virtual interface (tun+) and the "physical" local network 10:21 -!- theDoc [n=hex@unaffiliated/thedoc] has quit ["Leaving"] 10:22 < dazo> hvnqke_work: openvpn only reads and writes unencrypted data to/from the tun device .... and reads/write encrypted data on to the remote openvpn node 10:22 < hvnqke_work> right, thanks. I've opened for tun in the vpn-server too, still no dice though 10:23 < dazo> hvnqke_work: please, can you share your complete config? ... without comments ..... grep -e "^#" 10:23 < dazo> grep -v 10:23 < dazo> !configs 10:23 < vpnHelper> dazo: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 10:23 < dazo> !config 10:23 < vpnHelper> dazo: (config []) -- If is given, sets the value of to . Otherwise, returns the current value of . You may omit the leading "supybot." in the name if you so choose. 10:23 < dazo> grep -vE '^#|^;|^$' server.conf ... that's a nicer one :) 10:24 < hvnqke_work> dazo, http://pastebin.ca/1756158 10:24 < hvnqke_work> just for the record, clients can access the vpn-server through 10.0.30.2 easily 10:25 < dazo> hvnqke_work: oki, shouldn't change anything ... have you tried to run tcpdump on the vpn-server? .... tcpdump -i tun0 -n 10:26 < dazo> and then try to ping one of the servers "behind" the VPN server? 10:26 < hvnqke_work> it spams a hell of a lot output 10:27 < dazo> okey? Do you ssh to the vpn server via the VPN? 10:27 < dazo> can you grab me a few lines? .... normally, it should not spew out much on an idle link 10:28 < dazo> (2-3 lines is enough right now) 10:29 < hvnqke_work> http://pastebin.ca/1756164 10:30 < hvnqke_work> and it just goes on like that forever 10:30 < dazo> 10.9.0.6 ... that's a VPN client, I presume? 10:30 < dazo> 10.0.30.2 ... and that's the vpn-server behind the VPN, I believe 10:31 < dazo> you can do ... tcpdump -i tun0 -n port ! 22 .... that'll make it more quiet 10:31 < hvnqke_work> dazo, I logged out from ssh and went into it through xen instead 10:31 < hvnqke_work> now it's quiet 10:32 < hvnqke_work> when I ping 10.0.30.* it responds in tcpdump 10:32 < dazo> hvnqke_work: do you get both icmp request and response? 10:33 < hvnqke_work> and yes, 10.9.0.6 appears to be me. 10.0.30.2 is the server. 10:33 < hvnqke_work> there's a lot of requests, but II don't see any reply/response 10:33 < dazo> 11:33:45.315258 IP 192.168.99.40 > 192.168.99.1: ICMP echo request, id 27515, seq 1, length 64 10:33 < dazo> 11:33:45.315329 IP 192.168.99.1 > 192.168.99.40: ICMP echo reply, id 27515, seq 1, length 64 10:34 < dazo> hvnqke_work: that's a typical ping sequence 10:34 < hvnqke_work> yeah, I see reply when I ping the server, and no reply when I ping the .10 machine 10:34 < dazo> hvnqke_work: good ... which eth interface is the .10 machine available on? 10:35 < dazo> hvnqke_work: on your vpn-server 10:35 < hvnqke_work> it's own interface is eth0, which is using vif17.0 as gateway, which gets traffic from the host system's eth2 10:35 < hvnqke_work> on the vpn-server? how that? 10:36 < dazo> hvnqke_work: whohaa ... that I didn't catch .... when you ping the .10 machine on the vpn-server .... which interface will it use on the vpn-server to access that machine? 10:37 < hvnqke_work> oh, right, I think we've talked past each other. I'm tcpdumping on the vpn-server, while pinging from my client machine 10:37 < dazo> hvnqke_work: yeah, and t that is right! 10:37 < hvnqke_work> right, then I'm lost. What do you mean? 10:37 < dazo> hvnqke_work: okay ... can you give me the output of: route -n from vpn-server? 10:38 < hvnqke_work> http://pastebin.ca/1756179 10:39 < dazo> now, on the vpn-server .... try tcpdump -i eth0 -n host 10.9.0.6 .... and then do the pinging like you did earlier 10:39 < dazo> against .10 10:40 < hvnqke_work> http://pastebin.ca/1756180 10:40 < dazo> hvnqke_work: cool! This means something very important! 10:40 < hvnqke_work> awesome! 10:41 < dazo> hvnqke_work: the vpn-server does the correct routing ..... but! the .10 machine does not route the traffic back via 10.30.0.2 10:41 < hvnqke_work> I see 10:41 < hvnqke_work> so safe to assume that it's one silly configuration somewhere that's wrong? 10:42 < dazo> hvnqke_work: on the .10 box ... make sure you have a route which routes traffic to 10.9.0.0/24 via 10.30.0.2 ... I believe that's basically it 10:42 -!- Remowylliams [n=Mare@204.180.233.74] has joined ##openvpn 10:42 < Remowylliams> hello all. openvpn has gone commercial? 10:42 < dazo> hvnqke_work: unless you need some extra firewall rules to allow traffic from the 10.9.0.0/24 network to be accepted 10:42 < dazo> Remowylliams: no, not completely .... just parts of it .... the Access Server 10:43 < hvnqke_work> hmm. sounds like the right answer. I'm not completely sure how. Until last friday my experience with iptables was limited to that I'd heard of it before 10:44 -!- zykes- [i=zykes@zykes.themariachi.info] has quit [Read error: 110 (Connection timed out)] 10:44 < Remowylliams> Ah clearly you have to be aware of 'terminology' and look to the 'community' panel 10:45 < dazo> Remowylliams: yeah .... people have commented that "a couple" of times before as well 10:45 < dazo> Kas: openvpn2009 ^^^ 10:45 < Remowylliams> I would think so. it's become very realplayer ish 10:45 <+Kas> Hello 10:46 < Remowylliams> even on the community download page there's this big sidebar that says '2 free licenses' 10:47 < hvnqke_work> dazo, how would you make that rule? 10:47 < dazo> Kas: just pointing out another one commenting the same as you've heard some times recently .... confusion about where the F/OSS version of openvpn is 10:48 < dazo> hvnqke_work: Can you do a complete iptables-dump on that .10 box for me? .... easier to see what you have and what you need then 10:48 <+Kas> Oh, gotcha, I plan on discussing this today with the team. 10:48 < dazo> Remowylliams: yeah, that's the Access Server ..... which is commercial 10:48 < hvnqke_work> dazo, seems there are no iptables rules on the machine as of yet 10:49 < hvnqke_work> iptables-save v1.4.2: Unable to open /proc/net/ip_tables_names: No such file or directory 10:49 < dazo> hvnqke_work: then you don't have much to worry about :) Then you most probably miss a routing entry 10:49 < dazo> hvnqke_work: that error usually means that you don't have iptables support enabled 10:50 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["Leaving"] 10:50 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 10:50 < hvnqke_work> dazo, I should have. I just haven't added any iptables entries to it 10:50 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Client Quit] 10:50 < dazo> hvnqke_work: if you get that error .... that's something really wrong then 10:50 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 10:51 < dazo> hvnqke_work: that really indicates that some iptables modules are missing ... really ... 10:51 < Remowylliams> so I'm guessing this will be sold to Cisco in a year or 2 10:52 < hvnqke_work> I tried adding a dummy rule: http://pastebin.ca/1756198 10:52 < Remowylliams> still thank you very much for the info. 10:52 < dazo> Remowylliams: Cisco? ... nah .... Oracle, HP or Microsoft :-P 10:53 < Remowylliams> dazo: mysql was sold to Sun.. so maybe HP or Microsoft first then to Cisco. LOL 10:53 < dazo> Remowylliams: no worries, the important piece for most openvpn users are free .... so whatever happens, it will always be a free version available 10:54 < hvnqke_work> dazo, I'll admit I don't know much about iptables, but after I added that dummy rule the error is gone 10:54 < dazo> hvnqke_work: can you get more sensible results now with iptables-dump? 10:54 < hvnqke_work> yeah: http://pastebin.ca/1756198 10:55 < dazo> hvnqke_work: yeah ... iptables was not loaded ... thus not blocking anything on that box 10:55 < dazo> hvnqke_work: have a look at route -n on that box first 10:56 < hvnqke_work> dazo, http://pastebin.ca/1756209 10:56 < dazo> hvnqke_work: try to add: route add -net 10.9.0.0 255.255.255.0 gw 10.0.30.2 10:56 < dazo> hvnqke_work: and then do the ping 10:57 < hvnqke_work> I get the "usage" message 10:58 < hvnqke_work> nevermind, got it working. 10:59 < hvnqke_work> or, that is, I get "SIOCADDRT: No such process" now 10:59 < dazo> hvnqke_work: ahh ... sorry about the wrong syntax ... hmmmmm 10:59 * dazo thinks 10:59 < dazo> ahh 10:59 < dazo> ugh 11:00 < dazo> hvnqke_work: this is on 10.30.0.10 ? 11:00 < hvnqke_work> yeah 11:00 < dazo> 10.0.30.10, I meant .... okay ... go to 10.0.30.9, as all packets are routed via that box 11:00 < dazo> and please share the route table here as well 11:01 < hvnqke_work> there is no 10.0.30.9 box. it's the virtual interface on the host system that the .10 machine is hooked up to 11:01 < dazo> hvnqke_work: ahh ... cool ... nice 11:01 < dazo> hvnqke_work: the you need to go to dom0 .... and have a look at the route table here 11:02 < hvnqke_work> going to dom0, stand by... 11:02 < hvnqke_work> http://pastebin.ca/1756227 11:03 < hvnqke_work> err 11:03 < hvnqke_work> that last one is eth2 too 11:04 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has joined ##openvpn 11:04 < hvnqke_work> dazo, just highlighting here, pardon me if I'm too eager 11:04 < dazo> hvnqke_work: now here .... you need to add the route ... 10.9.0.0 netmask 255.255.255.0 goes to 10.0.30.2 11:06 -!- Remowylliams [n=Mare@204.180.233.74] has quit ["Leaving."] 11:06 < hvnqke_work> awesome, that did it 11:07 < hvnqke_work> thanks a lot man 11:07 < dazo> hvnqke_work: sure no prob! 11:07 < hvnqke_work> to recap; what do I need to do to get, say, a new .12 machine on the vpn? anything at all 11:08 < hvnqke_work> ? 11:08 < dazo> hvnqke_work: you need to make sure that the dom0 in your case routes the traffic to the 10.9.0.0/24 network via 10.0.30.2 ... that's the key point 11:09 < hvnqke_work> right. but I need to do this only once, right? 11:09 < dazo> hvnqke_work: you're openvpn server is working .... you just had a routing issue ..... 11:09 < dazo> hvnqke_work: you should now have a consistent setup, so accessing other boxes should not change anything now 11:10 < dazo> hvnqke_work: just make sure that this last route we added are enabled on reboots 11:10 < hvnqke_work> right, thanks again. I just got a whole lot more enlightened. 11:10 < hvnqke_work> dazo, how that? is there a standardized way or should I write a script? 11:11 < dazo> hvnqke_work: without that last route .... vpn client -> vpn-server -> dom0 -> 10.0.30.10 -> dom0 -> internet (via default gateway) ....... 11:11 < dazo> hvnqke_work: but with that last route: vpn client -> vpn-server -> dom0 -> 10.0.30.10 -> dom0 -> vpn-server -> vpn client 11:12 < dazo> hvnqke_work: what kind of Linux distro are you running? 11:12 < hvnqke_work> Debian 11:13 < dazo> hvnqke_work: Not sure how Debian does that .... but I'd ask some virtualisation guys in some debian channels 11:13 < dazo> hvnqke_work: but I'm sure debian has a standard way how to add such static routes 11:13 < hvnqke_work> righto. I was just thinking about putting all the iptables and route stuff into a script and have it be run at boot 11:14 < dazo> hvnqke_work: yeah, there is definitely standard ways how to do that .... and I recommend you to follow these paths, it helps others to pick up after you in the future as well 11:15 < hvnqke_work> right. it's just because there isn't really a standardized way of doing the iptables thing. most people do a iptables-save > /etc/somethingorother and then have it loaded at boot somehow 11:20 -!- tiav [n=tiav@mx.fr.smartjog.net] has quit [Remote closed the connection] 11:20 < Bushmills> hvnqke_work: there's a debian package which adds run level links and start/kill script for iptables into /etc/init.d 11:21 < Bushmills> (not that one can't do that by hand, of course, of use up and down script 11:21 < hvnqke_work> nice 11:21 < Bushmills> ) 11:22 < Bushmills> or use ... 11:27 -!- polaru [n=polaru@93.113.192.70] has quit [Remote closed the connection] 11:28 < hvnqke_work> anyway, thanks for the help. It's great with some earnest advice that doesn't treat me like a moron ;) 11:29 < Bushmills> /etc/network/interfaces is the place to add up or down scripts per interface 11:31 <+Kas> Krzee: We fixed the linking issue on that Manual (http://openvpn.net/index.php/open-source/documentation/manuals/65-openvpn-20x-manpage.html) 11:31 < vpnHelper> Title: OpenVPN 2.0.x (at openvpn.net) 11:31 < berniv6> buntfalke: git://git.birkenwald.de/openvpn.git 11:31 <+Kas> Thanks for letting me know about that :-) 11:32 < buntfalke> berniv6: thanks 11:33 < buntfalke> berniv6: you might want to tell greenie he forgot to link this; my next mail is not yet in sight, i barely had time to grab the latest patchset 11:33 < berniv6> buntfalke: branch gert-ipv6 comes from git://git.birkenwald.de/openvpn-gert.git (directly maintained by Gert Doering) 11:33 < krzee> and betaman? 11:33 < berniv6> I'll do an official announcement in -devel and -users in the next few days anyway 11:35 < krzee> !man 11:35 < vpnHelper> krzee: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 11:35 < reiffert> krzee: come on, after 3 years of 2.0 you cant expect people to accept 2.1 that soon. 11:35 < krzee> lol 11:36 < krzee> kas, http://openvpn.net/man-beta#lbBD 11:37 <+Kas> Oh, didn;t see that link earlier, will have him fix that now! 11:37 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has joined ##openvpn 11:38 < krzee> i didnt mention it, thought it was obvious ;] 11:38 -!- rawDawg [n=rawDawg@cpe-76-188-26-242.neo.res.rr.com] has quit [Client Quit] 11:38 <+Kas> :/ 11:42 -!- hvnqke_work [n=per@90.184.203.29] has quit ["Leaving"] 11:48 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has quit [Read error: 60 (Operation timed out)] 11:49 < DarkAnt> !ipp 11:49 < vpnHelper> DarkAnt: "ipp" is (#1) the option --ifconfig-pool-persist ipp.txt does NOT create static ips, or (#2) Note that the entries in this file are treated by OpenVPN as suggestions only, based on past associations between a common name and IP address. They do not guarantee that the given common name will always receive the given IP address. If you want guaranteed assignment, see !iporder and !static 11:50 < DarkAnt> !iporder 11:50 < vpnHelper> DarkAnt: "iporder" is (#1) OpenVPN's internal client IP address selection algorithm works as follows: 1 -- Use --client-connect script generated file for static IP (first choice)., or (#2) Use --client-config-dir file for static IP (next choice) !static for more info, or (#3) Use --ifconfig-pool allocation for dynamic IP (last choice), or (#4) if you use --ifconfig-pool-persist see !ipp 11:50 < DarkAnt> !static 11:50 < vpnHelper> DarkAnt: "static" is (#1) use --ifconfig-push in a ccd entry for a static ip for the vpn client, or (#2) example: ifconfig-push 10.8.0.6 255.255.255.0, or (#3) also see !ccd and !iporder 11:50 < DarkAnt> !ccd 11:50 < vpnHelper> DarkAnt: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 11:50 < krzee> kas, thank you 11:51 -!- jmm [n=jmm@LPuteaux-156-14-28-187.w82-127.abo.wanadoo.fr] has quit [Read error: 60 (Operation timed out)] 11:53 -!- Dougy [n=me@vpn.douglashaber.com] has joined ##openvpn 11:53 < Dougy> ecrist: for future moderators 11:53 < Dougy> you me and krzee can discuss 11:54 -!- jmm [n=jmm@LPuteaux-156-14-28-187.w82-127.abo.wanadoo.fr] has joined ##openvpn 11:54 < dazo> !route 11:54 < vpnHelper> dazo: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 11:54 < Dougy> hey dazo 11:54 < dazo> Dougy: hi! 11:59 -!- Auz [n=Auz@ext00.education.com] has joined ##openvpn 12:00 < Auz> g'day 12:00 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has quit [Client Quit] 12:02 -!- buntfalke [n=nobody@unaffiliated/buntfalke] has joined ##openvpn 12:16 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 12:29 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 12:44 -!- krzee [i=nobody@unaffiliated/krzee] has quit [Read error: 104 (Connection reset by peer)] 12:45 -!- LobbyZ [n=default@main.lobbyzffs.com] has quit [Read error: 110 (Connection timed out)] 12:47 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 12:48 -!- krzee [i=nobody@unaffiliated/krzee] has quit [Client Quit] 12:49 -!- Dougy [n=me@vpn.douglashaber.com] has quit [Read error: 110 (Connection timed out)] 12:52 -!- anamorph [i=nicolas@paris.office.anamor.ph] has joined ##openvpn 12:52 < anamorph> hello 12:52 < anamorph> i seem to have an issue with openvpn 12:53 < anamorph> i have alot of WRWRWRRWWWWRWRWRWWRWRWRWRWRWRWRWRWRW in my server logs 12:54 < anamorph> anybody know where this could come from ? 12:55 < dazo> anamorph: decrease your verb log level 12:56 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 12:56 * dazo gueses verb 4 is being used 12:56 < anamorph> dazo: to like 4 12:56 < anamorph> yeah, ok 12:56 < dazo> anamorph: in production, go no higher than 3, even that's quite verbose 12:57 < krzee> hell on some boxes i dont use any 12:57 < krzee> unless of course theres something to debug 12:58 < anamorph> well to be honest 12:58 < anamorph> i have some speed issues 12:59 < anamorph> and i increased log level to debug some 12:59 < anamorph> basically, 3 clients on the vpn is apparently too much tohandle 13:00 < anamorph> on two different source lan 13:00 < anamorph> (server is on a dedicated box, running on unmetered 100mbps) 13:01 < reiffert> you can use slurm or iptraf for metering 13:02 -!- krzee [i=nobody@unaffiliated/krzee] has quit [Read error: 104 (Connection reset by peer)] 13:02 < anamorph> reiffert: i don't really see how three clients on dsl lines can pump 100mbps over a vpn 13:03 < reiffert> anamorph: maybe a metering program can help you with this. 13:04 < reiffert> getting some numbers >> "speed issues" 13:04 < anamorph> i tweaked a little the keepalive directive though 13:04 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 13:05 < anamorph> the server is windows .. i think that doesn't help too 13:05 < anamorph> ^^ 13:05 < reiffert> keep guessing issues then. 13:06 < anamorph> slurm/iptraf is for unixes; let me find something for win32 13:08 < anamorph> this looks good: http://lastbit.com/trafmeter/ 13:08 < vpnHelper> Title: TrafMeter: IP network traffic meter and traffic monitor; network bandwidth viewer and packet filtering firewall for Windows (at lastbit.com) 13:08 < hyper_ch> good evening 13:08 -!- aar [n=yxc@85.249.223.22] has joined ##openvpn 13:12 < aar> how can i set a defaut route without redirect-gateway command? 13:13 < hyper_ch> aar: create a ccd and push the route from there 13:15 < reiffert> aar: by reading the text that stands right next to "--redirect-gateway" here: http://openvpn.net/index.php/open-source/documentation/manuals/69-openvpn-21.html 13:15 < vpnHelper> Title: OpenVPN 2.1 (at openvpn.net) 13:24 < aar> hyper_ch: how ccd stand for? reiffert: without redirect-gateway any idea? theres only the flag options 13:24 < hyper_ch> custom client directory 13:25 < hyper_ch> you can setup different behaviour for different clients in there.. like assigning static ips and custom routes 13:25 < hyper_ch> (and probably a whole lot more things= 13:30 -!- aar [n=yxc@85.249.223.22] has quit [Remote closed the connection] 13:31 -!- dazo is now known as dazo_afk 14:04 -!- corretico__ [n=laguilar@201.201.46.106] has joined ##openvpn 14:06 -!- aar [n=yxc@85.249.223.22] has joined ##openvpn 14:09 < aar> ROUTE: default_gateway=UNDEF with push command default route does not set 14:10 -!- Gnewt [n=hackerle@li57-94.members.linode.com] has quit [Remote closed the connection] 14:13 < krzie> !ccd 14:13 < vpnHelper> krzie: "ccd" is entries that are basically included into server.conf, but only for the specified client based on common-name. use --client-config-dir to enable it, then put the config options for the client in /common-name 14:15 -!- crazygir [n=jason@unaffiliated/crazygir] has quit [Read error: 104 (Connection reset by peer)] 14:15 -!- Gnewt [n=hackerle@li57-94.members.linode.com] has joined ##openvpn 14:17 -!- crazygir [n=jason@li14-82.members.linode.com] has joined ##openvpn 14:19 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 14:19 -!- corretico [n=laguilar@201.201.46.106] has joined ##openvpn 14:23 -!- corretico__ [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 14:25 < aar> anyone an idea what dows it mean? 14:25 < krzie> aar: 14:26 < krzie> !configs 14:26 < vpnHelper> krzie: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 14:30 < aar> ok so i will post this on another time 14:30 -!- eightfold [n=eightfol@c213-89-114-50.bredband.comhem.se] has quit ["I quit."] 14:31 -!- APTX| [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 14:32 -!- aar [n=yxc@85.249.223.22] has left ##openvpn ["Konversation terminated!"] 14:37 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit ["Leaving."] 14:38 -!- APTX [n=APTX@phpBB/developer/APTX] has quit [Read error: 110 (Connection timed out)] 14:39 -!- APTX| [n=APTX@chello089076052083.chello.pl] has quit [Client Quit] 14:39 -!- APTX [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 14:50 -!- LobbyZ [n=default@main.lobbyzffs.com] has joined ##openvpn 15:09 -!- MadTBone [n=MadTBone@160.39.238.196] has joined ##openvpn 15:28 -!- fnbrier [n=fbrier@adsl-190-180-224.asm.bellsouth.net] has left ##openvpn ["Leaving"] 15:37 -!- newmember [n=chatzill@static-66-11-81-77.ptr.terago.net] has joined ##openvpn 15:43 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 15:50 -!- Dougy [n=me@vpn.douglashaber.com] has joined ##openvpn 16:06 < reiffert> krzie: 16:06 < reiffert> Dougy: 16:06 < reiffert> dazo_afk: 16:06 < reiffert> ecrist: 16:06 < reiffert> Bushmills: 16:06 < reiffert> http://www.secure-computing.net/wiki/index.php/Graph 16:06 < vpnHelper> Title: Graph - Secure Computing Wiki (at www.secure-computing.net) 16:07 -!- mikkel [n=mikkel@84-238-113-66.u.parknet.dk] has quit ["Leaving"] 16:07 < krzie> nice 16:07 < reiffert> Feel free to improve, add it to !route once it is looking nice and is mentioning the static route on the gateway. 16:07 < reiffert> krzie: check out the wiki source! 16:07 < reiffert> you can have URL's behind everything etc. 16:07 < reiffert> http://www.graphviz.org/doc/info/attrs.html#d:labeljust 16:07 < krzie> that looks great, only thing that could be added is a note of what src and dst is 16:07 < vpnHelper> Title: Node, Edge and Graph Attributes (at www.graphviz.org) 16:08 < krzie> but that was a great idea for an image 16:08 < reiffert> krzie: feel free to add that: label="foo\nsrc: 343434\ndst:34234" 16:08 < krzie> it will be added to !route 16:09 < reiffert> it's not an image, it's a graph made with the help of graphviz, like I said, check that wiki source. 16:09 < reiffert> it's editable. 16:09 < krzie> its an image if i capture it ;] 16:10 < krzie> where would i put that label? 16:10 < reiffert> http://pastebin.ca/1756647 16:10 < krzie> ya i see the src in the wiki, coolstuff 16:10 < krzie> i had never heard of graphviz 16:11 < reiffert> there are lots of examples in the docs 16:14 < krzie> there 16:14 < krzie> http://www.secure-computing.net/wiki/index.php/Graph 16:14 < vpnHelper> Title: Graph - Secure Computing Wiki (at www.secure-computing.net) 16:15 < krzie> a lil note at the bottom now 16:17 < reiffert> I'm not sure if we should mention the icmp redirection paket and the following shortcut. 16:17 < krzie> ild go with no, it wouldnt help any and would serve to confuse people 16:18 < krzie> this is only for as things relate to openvpn 16:18 < krzie> (right?) 16:18 < reiffert> I see it that way as well, too much confusion 16:19 < krzie> im setting up ovpn in a jail now, glad ive been hangin around here for so long 16:19 < krzie> !fbsdjail 16:19 < vpnHelper> krzie: "fbsdjail" is krzie: if you are interested in the solution: I needed to add to hosts rc.conf the creation of tun0 device, create a special devfs ruleset with tun0 unhiden, configure that it is used in the devfs mount point inside chroot in my jail and specify openvpn --dev tun0 parameter and it seems that this is it... so, thank you for assistance and ideas 16:19 < krzie> =] 16:23 < krzie> maybe ill make a lil writeup on it after i finish 16:24 < reiffert> krzie: http://www.google.de/search?hl=de&client=firefox-a&rls=org.mozilla%3Ade%3Aofficial&hs=9X0&q=+jail+openvpn&btnG=Suche&meta=&aq=f&oq= 16:24 < vpnHelper> Title: jail openvpn - Google-Suche (at www.google.de) 16:26 < krzie> nothing overly useful there, but everything i need is in !fbsdjail 16:28 < krzie> well there and the fbsd handbook of course 16:48 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: ScriptFanix 16:49 -!- Netsplit over, joins: ScriptFanix 16:52 -!- eightfold [n=eightfol@c213-89-114-50.bredband.comhem.se] has joined ##openvpn 16:54 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has joined ##openvpn 16:54 < eightfold> my vpn connection works fine when the line "redirect-gateway" is in the opvn conf file. 16:54 < eightfold> but, that line also makes the vpn connection the default interface (system wide). 16:57 < eightfold> when i remove "redirect-gateway" default is not the vpn connection. i try to make applications run under the user account "vpn" to use the open tun0 tunnel with these firewall settings: http://paste.debian.net/57056/ , but "sudo -u vpn lynx http://www.google.com/" wont work. 16:57 < eightfold> ideas? 16:58 < Dougy> hm 16:58 -!- Sky[x] [n=SkyB0x@tm.213.143.85.148.dc.telemach.net] has quit [Client Quit] 16:58 < Dougy> nope 16:58 < eightfold> darn 16:58 < Dougy> its ok 16:59 < Dougy> i've been here a ton and talked even more 16:59 < krzie> !routebyapp 16:59 < Dougy> i never hel panyone 16:59 < vpnHelper> krzie: "routebyapp" is if you want to send only certain apps over the VPN you need to run a socks server on the internal VPN subnet (see !sockd) then get an app like proxifier (google it) to selectively route traffic over the socks proxy based on port/app/subnet or any combination. 16:59 < Dougy> i am useless 16:59 < krzie> you cant have a seperate routing table based on user 16:59 < Dougy> krzie: you know i was tyhinking about that 16:59 < Dougy> but i did not want to say something wrong 17:00 < eightfold> krzie: you're saying those iptables lines are no workie? 17:00 < krzie> your firewall rule ALLOWS traffic to leave from that account on that interface 17:00 < krzie> but the routing table doesnt have the packets attempting to do it 17:01 < krzie> you can route based on subnet using ovpn, or based on application using my !routebyapp solution (i use it) 17:01 < eightfold> krzie: hmm, you're right about that 17:02 < eightfold> krzie: proxifier seems to be available for linux, but i guess there's some equivalent. 17:02 -!- corretico_ [n=laguilar@216.194.173.25] has joined ##openvpn 17:02 < eightfold> seems _not_ 17:03 -!- corretico__ [n=laguilar@201.201.46.106] has joined ##openvpn 17:03 < krzie> socksify or something 17:04 < krzie> also a xen virtual machine would have its own routing table 17:04 < krzie> or a vmware machine 17:04 < krzie> (any vm or vps software really) 17:05 < krzie> !google socksify linux 17:05 < vpnHelper> krzie: TranSocks - Transparent SOCKSifying Proxy: ; The Answer Guy 48: Linux Workstations Behind a Proxy/Firewall: ; [sldev] Socksifying linux client via LD_PRELOAD: 17:06 < eightfold> hmmm, was running a virtual machine on windows that went through vpn. but didn't want to have a virtual machine running all the time. so, no i have a debian server. 17:06 < eightfold> i want rtorrent to only connect via vpn. 17:07 < krzie> so just socksify rtorrent 17:08 < krzie> http://www.cis.upenn.edu/~maoy/faqs/socks.html 17:08 < vpnHelper> Title: Socksify applications (at www.cis.upenn.edu) 17:09 < krzie> for some reason that was #2 on my search and not on my bots 17:09 < krzie> i know you use debian so not rpm, but im sure you can figure that part out ;] 17:10 < eightfold> krzie: so, the idea is to start this transocks daemon, set rtorrent to use localhost and the transocks port as proxy? 17:10 < krzie> thats kinda funny, my !routebyapp solution was exact opposite, the only things i DONT want over my vpn is torrents 17:10 < krzie> nah i meant this link: http://www.cis.upenn.edu/~maoy/faqs/socks.html 17:10 < vpnHelper> Title: Socksify applications (at www.cis.upenn.edu) 17:10 < krzie> then you just runsocks rtorrent 17:12 < eightfold> krzie: sorry for stupidness, but how does runsocks know that it should be using tun0? 17:15 < reiffert> allright, who got some ipv6 test host for me, for trying that ipv6 patch from -devel? 17:17 < Dougy> i have a /64 of ipv6 but it's not configured at switch yet 17:17 < Dougy> ;]\ 17:17 < Dougy> ;\ 17:18 < eightfold> krzie: build date sep 25 year 2000. http://rpmfind.net//linux/RPM/falsehope/home/gomez/socks5/runsocks-1.0r11-3.i386.html . wonder how much luck i will have with that :) 17:18 < vpnHelper> Title: runsocks-1.0r11-3.i386 RPM (at rpmfind.net) 17:19 -!- corretico [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 17:20 < krzie> it prolly hasnt needed any mods 17:21 < krzie> but arent rpms for redhat derivitives only? 17:21 < krzie> didnt think debian used them 17:22 -!- corretico_ [n=laguilar@216.194.173.25] has quit [Read error: 113 (No route to host)] 17:22 < krzie> see if its in apt_cache 17:23 < krzie> or whatever the debian way for checking is, i dont use linux often 17:26 -!- corretico__ [n=laguilar@201.201.46.106] has quit [Read error: 110 (Connection timed out)] 17:26 < reiffert> cron2: I would like to see a ./configure'able flag like --enable-ipv6 or similar. 17:30 < eightfold> krzie: i found "tsocks". should do the same thing 17:30 < krzie> cool 17:31 < krzie> regardless, you got the idea 17:31 < reiffert> cron2: compiler error in mroute.c 17:31 < reiffert> mroute.c:115: error: 'const struct in6_addr' has no member named '__in6_u' 17:31 < krzie> reiffert what'd cron2 make? 17:31 < reiffert> he wrote that patch. 17:32 < krzie> for ovpn to run over an ipv6 connection? 17:32 < reiffert> no, vice versa. 17:33 < krzie> oh the patch that was implimented time ago? 17:33 < reiffert> That one already exists. 17:33 < krzie> tun-ipv6 or whatever it is 17:33 < reiffert> http://www.greenie.net/ipv6/openvpn.html 17:33 < vpnHelper> Title: Gert Döring - IPv6 Payload Patch for OpenVPN (at www.greenie.net) 17:33 < eightfold> krzie: i do "sudo -u vpn tsocks rtorrent" now. but somehow i need to get the socksifying "tsocks" app to use tun0 the vpn tunnel, right? 17:34 < krzie> if the socks is running inside ovpn, you reach it via vpn ip, it goes through tun0 17:34 < krzie> by inside ovpn i mean only needs to listen on vpn ip 17:35 < krzie> --tun-ipv6 17:35 < krzie> Build a tun link capable of forwarding IPv6 traffic. Should be used in conjunction with --dev tun or --dev tunX. A warning will be displayed if no specific IPv6 TUN support for your OS has been compiled into OpenVPN. 17:35 < krzie> hows that different reiffert, or did he write that? 17:35 < reiffert> cron2: my fault, I was choosing the wrong patch (31.12) instead of (14.01) 17:35 < krzie> (its in 2.0) 17:37 < reiffert> cron2: oh, send greetings to thomas glanzmann ;) 17:38 < eightfold> krzie: should i set socks to be running "inside openvpn" by specifying something in the client.ovpn config file? 17:38 < reiffert> krzie: have a look on "The Features" 17:47 < eightfold> !sockd 17:47 < vpnHelper> eightfold: "sockd" is if you want !routebyapp you can use this dante config www.ircpimps.org/sockd.conf but BE SURE TO ONLY RUN THIS ON THE INTERNAL VPN IP! otherwise you will be an open proxy. that config has no security because its expected to run inside openvpn 17:51 -!- newmember [n=chatzill@static-66-11-81-77.ptr.terago.net] has quit [Read error: 60 (Operation timed out)] 17:51 -!- eightfold [n=eightfol@c213-89-114-50.bredband.comhem.se] has left ##openvpn ["irssi"] 17:54 -!- eightfold [n=eightfol@c213-89-114-50.bredband.comhem.se] has joined ##openvpn 18:02 < Auz> anyone familiar with tunnelblick? 18:04 < krzie> personally i havnt used it, but i believe its a osx gui that you just give a normal ovpn config and you can start/stop the vpn from that gui 18:05 < Auz> right, and it works fine, but the down script ends up running with different privileges as the up script... there is a work around, but its not documented, trying to figure it out 18:06 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 18:06 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 18:12 < reiffert> Auz: how did you prove that? 18:12 < Auz> heh, well my down script could not really do anything.... let me find the posts on it 18:13 < reiffert> paste what comes out here: 18:13 < reiffert> ls -al /Applications/Tunnelblick.app/Contents/Resources/*.sh ; ps auxwwww | grep -i [t]unne 18:15 < Auz> moment, got to fire up a mac 18:15 < krzie> actually thats to be expected if you drop permissions with --user / --group 18:15 < krzie> --up has root, --down does not 18:16 < Auz> they added a plugin, openvpn-down-root.so 18:16 < krzie> hrm, never hearda that 18:16 < reiffert> "they"? 18:17 < Auz> the tunnelblick devs 18:17 < reiffert> Auz: plural? Since when is that? 18:17 < reiffert> it's angelolaub who's accepting 5% of all bugs. 18:18 < reiffert> bugreports 18:18 < Auz> I was guessing more than one, but I havent looked 18:18 < reiffert> but who didnt manage to fix that crappy up script when you get other than one nameserver for years. 18:19 < reiffert> But now he gets a openvpn-down-root.so 18:19 < reiffert> sigh. 18:19 < Auz> http://groups.google.com/group/tunnelblick-discuss/browse_thread/thread/63b272f1e6253abe 18:19 < vpnHelper> Title: Tunnelblick 3.0b20 doesnt call client.down.osx.sh on OSX 10.6.1 - tunnelblick-discuss | Google Groups (at groups.google.com) 18:19 < reiffert> krzie: using shell directly or that payware gui? 18:20 < krzie> shell directly, open it via stacks shortcut 18:20 < krzie> i never understood why people want a gui for openvpn in osx 18:20 < krzie> shell scripts become clickable in osx when you save with .command 18:20 < krzie> toss it in stacks and you're done 18:21 < krzie> i toss a shortcut to it in stacks cause you cant change icons on .command in stacks but you can on shortcuts 18:21 < Dougy> meh. 18:21 < Dougy> bored out of my mind. 18:21 < Dougy> maybe i should do something cool like read a manua 18:21 < Dougy> l 18:25 < reiffert> krzie: will I get 'names' in the stacks as well? 18:25 < krzie> sure 18:25 < krzie> filenames 18:25 < reiffert> How to create a stack? 18:25 < krzie> they are standard on osx 10.5 and 10.6 18:25 < krzie> on the bottom right 18:25 < reiffert> removed mine 18:25 < krzie> ahh 18:25 < krzie> drag a dir to there 18:26 < reiffert> uhhhh, scary 18:26 < krzie> scary? 18:27 < reiffert> impressive. 18:27 -!- APTX [n=APTX@phpBB/developer/APTX] has quit [Read error: 60 (Operation timed out)] 18:27 < krzie> oh ;] 18:28 < reiffert> can I have stacks at the upper menu bar, e.g. where you get the WirelessLAN Icon, Time/Date and such? 18:28 -!- APTX [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 18:28 < krzie> not without some hackery 18:28 < krzie> i mean, its not an option 18:29 < krzie> but by digging in and hacking some stuffs ild assume its POSSIBLE 18:29 < Auz> that openvpn-down-root.so works 18:30 < reiffert> Auz: anything special that your downscript has to do for you? 18:30 < Auz> not too much, the up script mounts a samba share, the down removes it 18:31 < krzie> you could always work around with a +s script 18:31 < reiffert> it will work with the help of sudo as well. 18:31 < krzie> owned by group of nvpn process 18:32 < vpnHelper> New forum entry openvpnforum: Configuration :: TUN connection up between Centos and ASUS 520gu (Tomato VPN) :: Author bobapoka 18:32 < reiffert> sudo is a bit more restrictive on who runs what. 18:32 < krzie> oh thats true, i always forget you can remove PW restriction with sudo 18:33 < krzie> reif's way is definitely better than what i said 18:35 < krzie> eightfold 18:35 < krzie> eightfold if you look at that socks config, it only listens on the internal vpn ip 18:36 < krzie> therefor it cant be reached unless you are already in the vpn 18:36 < krzie> reif, 18:36 < krzie> The connection has timed out 18:36 < krzie> 18:36 < krzie> 18:36 < krzie> 18:36 < krzie> 18:36 < krzie> 18:36 < krzie> 18:36 < krzie> 18:36 < krzie> 18:36 < krzie> The server at www.greenie.net is taking too long to respond. 18:36 < krzie> bleh sorry bout that 18:36 < Auz> heh 18:37 -!- mode/##openvpn [+o krzie] by ChanServ 18:37 -!- krzie was kicked from ##openvpn by krzie [flooder!] 18:37 -!- krzie [n=krzee@unaffiliated/krzee] has joined ##openvpn 18:37 < reiffert> let's run some ascii art 18:37 < krzie> ;] 18:37 < reiffert> http://www.asciipr0n.com/pr0n/ 18:37 < vpnHelper> Title: ascii pr0n archive (at www.asciipr0n.com) 18:37 < DarkAnt> hey, how do you guys handle tld hijacks (by comcast and the like)? 18:38 < reiffert> /exec -o echo "ASCII" | figlet 18:38 < Auz> dont use their name servers? 18:38 < krzie> DarkAnt i run my own NS's 18:39 < reiffert> My Lan Gateway sends all nameservice request over a openvpn tunnel to my personal bind running outside. 18:39 < DarkAnt> yeah, that's what I was trying to avoid 18:39 < krzie> http://www.glassgiant.com/ascii/ascii.php?sample=mona 18:41 < reiffert> :) 18:42 < krzie> new hobby, take all my facebook pics, ascii them, capture the ascii as jpg, reupload 18:42 < DarkAnt> haha 18:43 < DarkAnt> you've seen ascii star wars right? 18:48 < krzie> yup 18:50 < reiffert> telnet towel.blinkenlights.nl 18:58 -!- Heyraj [n=heyraj20@173.70.169.104] has joined ##openvpn 18:59 < Heyraj> Hi 18:59 < Heyraj> Does anyone know whom I should contact for windows GUI client customization 19:01 < Auz> what customization did you have in mind? 19:04 < Heyraj> Now the GUI client is not user friendly. The end user has to configure where he needs to be admin sought to do those functions 19:04 < Heyraj> I was mainly looking for something simple for a end user to use 19:07 < Auz> I usually recompile the openvpn-gui to have the config + certs, make a custom installer for them 19:09 < Heyraj> can u please explain more 19:09 -!- Optic [n=Optic@miso.capybara.org] has joined ##openvpn 19:10 < Auz> openvpn gui provides the NSIS installer source 19:11 < Heyraj> where can i find more info on this regards 19:11 < Auz> http://openvpn.se/files/howto/openvpn-howto_roll_your_own_installation_package.html 19:11 < vpnHelper> Title: HowTo Roll Your Own OpenVPN Windows Installation Package (at openvpn.se) 19:12 < Heyraj> thanks 19:12 < Heyraj> let me take a look 19:17 < mintaka> how can i supply the username and password in the conf file 19:17 < mintaka> i cant re enter both every hour, really. 19:17 < mintaka> need an easier way to do it! 19:18 < mintaka> wait! 19:18 < mintaka> found out how to do it from the manual 19:20 < mintaka> nice. it worked. ;) 19:22 < Dougy> gah 19:22 < Dougy> everyne in here winks 19:22 < Dougy> krzee creeps me out with that 19:22 < DarkAnt> ;) 19:23 < krzie> ;] 19:23 < Dougy> asdffg;kjkdfgkahfjj 19:24 -!- Heyraj [n=heyraj20@173.70.169.104] has quit [] 20:06 -!- Run32dll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 20:10 -!- Rundll [n=thomas@ppp105-140.static.internode.on.net] has quit [Read error: 113 (No route to host)] 20:12 -!- Run32dll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 20:12 -!- Run32dll [n=thomas@ppp105-140.static.internode.on.net] has joined ##openvpn 20:23 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has quit [Read error: 60 (Operation timed out)] 20:34 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has joined ##openvpn 20:34 < NickWebHA> !welcome 20:34 < vpnHelper> NickWebHA: "welcome" is We need !goal !logs and !configs and maybe !interface to help you. || See !howto for beginners. || See !route for lans behind openvpn. || !redirect for sending inet traffic through the server. || Also interesting: !man !/30 !topology !iporder !forum !wiki !mitm || Don't use 192.168.1.0/24 or 192.168.0.0/24 (too much potential for conflict) 20:35 < NickWebHA> !route 20:35 < vpnHelper> NickWebHA: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 20:38 < NickWebHA> The more I read the more I am becoming very confused on a very important point. Pages (like http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing) say the tun interface is routed while the sample configs say the tap interface is routed. 20:38 < vpnHelper> Title: OpenVPN/Routing - Secure Computing Wiki (at www.secure-computing.net) 20:38 < NickWebHA> Which is it? 20:39 -!- Rolybrau [n=Rolybrau@unaffiliated/rolybrau] has joined ##openvpn 20:43 < Bushmills> tun is for routed configs, tap for bridged 20:48 < Dougy> !tunortap 20:48 < vpnHelper> Dougy: "tunortap" is (#1) you ONLY want tap if you need to pass layer2 traffic over the vpn (traffic destined for a MAC address). If you are using IP traffic you want tun. Dont waste the extra overhead., or (#2) and if your reason for wanting tap is windows shares, see !wins, or (#3) also remember that if someone gets access to any side of a tap vpn they can use layer2 attacks like arp poisoning 20:48 < vpnHelper> Dougy: against you over the vpn 20:54 < NickWebHA> Aaahhh that is where I was confusing myself. 20:54 < NickWebHA> Thanks. 20:54 < Dougy> You got it 20:55 < NickWebHA> Is !route what I should be reading if the clients can see the server but not the LAN the server is on? 20:55 < Dougy> hm 20:55 < Dougy> I'm tired from studying 8 hours 20:55 < NickWebHA> This does not seem to be answering any of my questions so I think I may be reading the wrong thing. 20:55 < Dougy> but that sounds right 20:55 < Dougy> !route 20:55 < vpnHelper> Dougy: "route" is (#1) http://www.secure-computing.net/wiki/index.php/OpenVPN/Routing if you have lans behind openvpn, read it DONT SKIM IT, or (#2) READ IT DONT SKIM IT 20:55 < Dougy> ^ 20:55 < NickWebHA> That is what I am reading. Thanks. 20:55 -!- mode/##openvpn [+o ecrist] by ChanServ 20:55 -!- mode/##openvpn [+v ecrist] by ecrist 20:55 < Dougy> uh oh 20:55 < NickWebHA> I hear you. I woke up at 6:00AM after my girlfriend tossed and turned all night. 20:55 < Dougy> im getting banned 20:55 -!- mode/##openvpn [-o ecrist] by ecrist 20:55 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 20:56 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 20:56 -!- mode/##openvpn [+o ecrist] by ChanServ 20:56 -!- mode/##openvpn [-o ecrist] by ecrist 20:56 < NickWebHA> Sure is taking a while... 20:56 < rob0> tap is virtual Ethernet, tun is IP only. tun=routed, tap=bridged 20:56 < Dougy> !factoids 20:56 < vpnHelper> Dougy: "factoids" is A semi-regularly updated dump of factoids database is available at http://www.secure-computing.net/factoids.php 20:56 < Dougy> NickWebHA: skim that over 20:56 < Dougy> might be useful 20:57 -!- mode/##openvpn [+o ecrist] by ChanServ 20:57 < NickWebHA> Just for my own sanity, bridged allows me to use IPX, right? 20:57 -!- mode/##openvpn [-v ecrist] by ecrist 20:57 -!- mode/##openvpn [-o ecrist] by ecrist 20:57 < NickWebHA> Alright. 20:57 -!- Irssi: ##openvpn: Total of 84 nicks [1 ops, 0 halfops, 1 voices, 82 normal] 20:57 < rob0> IPX is doable on a bridge yes. 20:58 < rob0> not sure if there is any way to do IPX-over-IP 20:59 < NickWebHA> I just got my first client to see the server after a week. I am considering tonight a win even if my mother called with the sole purposing of telling me she hates me! 21:01 < Dougy> LOL 21:02 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 21:04 < rob0> ouch 21:05 < rob0> Are you my brother or something? :) 21:16 -!- APTX [n=APTX@phpBB/developer/APTX] has quit [Read error: 60 (Operation timed out)] 21:19 -!- APTX [n=APTX@chello089076052083.chello.pl] has joined ##openvpn 21:20 < NickWebHA> This article only addresses using a tun interface while I am using a tap interface. 21:21 < mintaka> Tue Jan 19 05:15:10 2010 us=490637 Cannot allocate TUN/TAP dev dynamically 21:21 < mintaka> Tue Jan 19 05:15:10 2010 us=490693 Exiting 21:21 < mintaka> why does that happen 21:21 < mintaka> it should be reconnecting !!!!! 21:21 < NickWebHA> I just confirmed the packets are getting through the WAN, through OpenVPN and onto my local LAN but not able to get back to the "pinger." 21:21 < NickWebHA> mintaka: Try sudo. 21:21 < NickWebHA> Or su... whatever gives you root. 21:21 < mintaka> well it is root 21:21 < mintaka> but i do downgrade to nobody 21:22 < NickWebHA> It downgrades after it connects. Not sure that it ever brings its privileges back up. 21:22 < NickWebHA> Try without the down. 21:22 < mintaka> well that will work but people constantly say its not advised to run it as root 21:23 < mintaka> :/ 21:23 < NickWebHA> Sorry, this well is dry. 21:23 < rob0> What OS is it? 21:24 < mintaka> linux 21:24 < rob0> try "modprobe -v tun" 21:24 < rob0> and then start the vpn 21:25 < NickWebHA> OK, so Wireshark shows me a "Who has 10.8.0.4? Tell 10.8.0.51" when an OpenVPN client tried to ping an internal LAN address. How do I configure OpenVPN to set a route back to the client? 21:25 < mintaka> done. 21:26 < rob0> you don't set routes, you're bridging 21:26 < rob0> you bridged into your LAN? 21:26 < NickWebHA> Yes. I have a push "route 10.0.0.0 255.255.255.128" in there (which is my local LAN). 21:27 < NickWebHA> The traffic is getting to me but not back out via OpenVPN. That article does not deal with bridged as far as I can gather. 21:29 < NickWebHA> I am so close! I can taste it! 21:29 < rob0> you should have set an address for the bridge in 10.0.0.0/24 21:30 < NickWebHA> I am just using the sample configs. Once I get it working I will change the OpenVPN network to be 10.0.0.128/25. 21:30 < rob0> oh /25 21:31 < NickWebHA> My local is 10.0.0.0/25 while (when I am done) OpenVPN will be 10.0.0.128/25. 21:31 < rob0> well, bridged means the network is shared like a single segment ... you seem intent on splitting it 21:31 < NickWebHA> Really now? 21:31 < NickWebHA> One moment. 21:36 < mintaka> what if i were to have the vpn shut down on disconnect 21:36 < mintaka> end the program. but then rerun it automatically 21:36 < mintaka> through bash 21:46 < mintaka> yeah that should work 21:52 < NickWebHA> Alright. The server now has a 10.0.0.20 IP and the clients are pulling an IP on the same network (10.0.0.0/25). 21:53 < NickWebHA> They still can only ping the server and not the LAN. 21:57 < rob0> server is Linux? 21:57 < NickWebHA> Both my server and client are Windows. 21:58 < NickWebHA> Yet another thing to do when I get this working in an environment I know the most about. :-P 21:59 < rob0> ah, well, good luck then 21:59 < NickWebHA> While on a computer on the local LAN running WireShark I do see a "who has 10.0.0.100? tell 10.0.0.1" but 10.0.0.1 is my router while the client who did the ping was 10.0.0.50. 21:59 < mintaka> fixed it 22:00 < NickWebHA> Why would the packet source be the router while OpenVPN is running on a Windows box? 22:00 < mintaka> while :; do openvpn; done 22:00 < mintaka> it downgrades and restarts successfully 22:11 < NickWebHA> Thanks for everyones help. I need sleep. 22:12 < NickWebHA> Be back later. My mother has yet to call (scroll up). 22:12 -!- NickWebHA [n=nick@pool-74-108-117-104.nycmny.fios.verizon.net] has quit ["Leaving."] 22:25 -!- Dougy [n=me@vpn.douglashaber.com] has quit [] 22:35 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 22:58 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has quit ["leaving"] 23:04 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 23:15 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 23:29 < mintaka> will connect-retry 0 simply not attempt reconnection 23:29 < mintaka> or will 0 run it through infinity ;) --- Day changed Tue Jan 19 2010 00:03 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 00:47 -!- Run32dll [n=thomas@ppp105-140.static.internode.on.net] has quit [Remote closed the connection] 01:50 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 01:51 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 02:15 < jmm> hi. 02:35 -!- aditsu [n=aditsu@n11211876136.netvigator.com] has joined ##openvpn 02:36 < aditsu> hi, where can I get an openvpn client for mac os? 02:40 < jmm> I think you can use openvpn + tunnelblick. 02:42 -!- krzee [i=nobody@unaffiliated/krzee] has quit ["This computer has gone to sleep"] 02:43 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 02:56 -!- dazo_afk is now known as dazo 02:59 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 03:01 -!- Diffen2 [n=diffen2@c-737de555.042-17-73746f11.cust.bredbandsbolaget.se] has quit [Client Quit] 03:04 < aditsu> jmm: thanks 03:08 -!- master_o1_master [n=master_o@p57B56789.dip.t-dialin.net] has joined ##openvpn 03:12 < jmm> yw. 03:17 -!- aditsu [n=aditsu@n11211876136.netvigator.com] has quit ["Chatzilla 0.9.75.1 [SeaMonkey 1.1.18/2009100623]"] 03:17 -!- ruied [n=ruied@bl9-254-142.dsl.telepac.pt] has joined ##openvpn 03:19 -!- master_of_master [i=master_o@p57B562BF.dip.t-dialin.net] has quit [Read error: 110 (Connection timed out)] 03:24 -!- linucks is now known as linucks[afk] 03:26 -!- mattock [n=samuli@dyn55-11.yok.fi] has joined ##openvpn 03:26 -!- mode/##openvpn [+o mattock] by ChanServ 03:31 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has joined ##openvpn 03:34 -!- Diffen2 [n=diffen2@226.234.241.83.in-addr.dgcsystems.net] has joined ##openvpn 04:17 -!- kyrix [n=ashley@mail.ic-vienna.at] has joined ##openvpn 04:20 -!- teddymills [n=teddy@208.92.235.227] has quit ["Ex-Chat"] 04:24 -!- teddymills [n=teddy@208.92.235.227] has joined ##openvpn 04:52 -!- polaru [n=polaru@93.113.192.70] has quit [Remote closed the connection] 04:54 -!- ruied [n=ruied@bl9-254-142.dsl.telepac.pt] has quit [Read error: 110 (Connection timed out)] 04:59 -!- anamorph [i=nicolas@paris.office.anamor.ph] has left ##openvpn [] 05:10 -!- polaru [n=polaru@93.113.192.70] has joined ##openvpn 05:26 -!- Diffen2 [n=diffen2@226.234.241.83.in-addr.dgcsystems.net] has quit ["This computer has gone to sleep"] 05:38 -!- cpm [n=Chip@pdpc/supporter/active/cpm] has joined ##openvpn 05:50 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 60 (Operation timed out)] 06:26 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 06:33 -!- jfkw [n=jtk@24-216-241-93.dhcp.mdfd.or.charter.com] has joined ##openvpn 06:41 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 06:48 -!- BoomSie [n=gideon@dw77242112238.amsterdam-tc.dataweb.net] has joined ##openvpn 07:08 < ecrist> good morning 07:08 < jmm> hi. 07:19 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 07:20 -!- dunc [n=dunc@fenchurch.ipv6.braddon.org.uk] has quit [Client Quit] 07:21 < dazo> g'afternoon 07:22 < havoc> morning 07:22 -!- Diffen2 [n=diffen2@226.234.241.83.in-addr.dgcsystems.net] has joined ##openvpn 07:33 -!- saftsack [n=oliver@p4FF0D1AD.dip.t-dialin.net] has joined ##openvpn 07:34 < saftsack> hi, how can i set the start time for a certificate in easy-rsa? i want to create a certificate which connects on a system without ntpdate and easy-rsa 07:34 < saftsack> sorry not without easy-rsa i mean rtc 07:34 < vpnHelper> New forum entry openvpnforum: Configuration :: OpenVpn configuration :: Author m_ab_malik 07:35 < ecrist> saftsack: it is always a good idea to have a correct date/time on a given system 07:36 < dazo> especially when SSL and certificates are involved 07:36 < saftsack> ecrist, yes but directly after booting on a remote device first priority is it to get it reachable. 07:36 < ecrist> but, if you must, read the man page for openssl 07:36 < ecrist> saftsack: first priority should be to mount the drives and set date/time 07:37 < ecrist> otherwise your logs will be skewed 07:37 < dazo> saftsack: why not just call ntpdate first? 07:37 < saftsack> i found something which is called KEY_EXPIRE 07:37 < ecrist> saftsack: man openssl 07:38 < dazo> and man x509 07:41 < saftsack> that is the only option there: -days arg 07:41 < saftsack> startdate is just as displayoption listed 07:42 < ecrist> there you go 07:43 < dazo> saftsack: you might also want to look at man ca as well, but I presume you'll need to hack the easy-rsa script a bit 07:43 < saftsack> that's no problem if openssl is offering me an option to modify the startdate. the last time i set the clock of the easy-rsa computer to 1970 but i dont think that this is a good solution 07:44 < saftsack> -startdate date that seems to be nice ;) 07:44 * dazo still considers it safer and more safe to do a ntpdate against a public NTP server before doing anything else ... but that's merely his opinion 07:45 < dazo> and more *sane* 07:46 * dazo goes back to study the usage of boolean variables in openvpn 07:47 < |Mike|> plz do :p 07:47 -!- mattock [n=samuli@dyn55-11.yok.fi] has quit ["Leaving."] 07:49 < rob0> "ntpd -q" is supposed to take the place of ntpdate, but yeah, I agree, if your hardware clock sucks as bad as most of them seem to, you should set it before you let ntpd handle adjustments. 07:50 < |Mike|> xen? 07:52 < rob0> If you're running virtualization, the host computer should maintain time with ntpdate+ntpd, then the guests should be fine. 07:53 < dazo> not necessarily .... it sounds logic, but it might not be that the clock ticks are synchronised with the host OS 07:53 < dazo> the hwclock is read upon boot, and then the kernel does the rest 08:00 < saftsack> rob0, this computer has no battery ... so no rtc ;) 08:01 < rob0> btdt :) 08:11 * |Mike| j'adores ==> /bin/echo 'xen.independent_wallclock = 1' >> '/etc/sysctl.conf' 08:19 < ecrist> o.O 08:19 < ecrist> what does that do, mike? 08:19 < ecrist> the sysctl, I mean 08:19 < |Mike|> it unset hwclock on xen domU's, so you can run ntp without a problem :) 08:19 < ecrist> nm, I can read a man page 08:20 < |Mike|> (as far as i remember, i created that puppet module months ago) 08:27 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 08:27 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 08:28 -!- kyrix [n=ashley@mail.ic-vienna.at] has quit ["Leaving"] 08:30 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 08:34 < vpnHelper> New forum entry openvpnforum: Installation Help :: OpenVPN on Windows XP - Cant install TAP-Win32 device driver :: Author leo2308 08:37 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 08:38 < ecrist> anyone have a vbulleting 4.0 forum license they want to donate? 08:41 < ecrist> vbulletin, even 08:55 -!- Diffen2 [n=diffen2@226.234.241.83.in-addr.dgcsystems.net] has quit ["This computer has gone to sleep"] 08:58 -!- le0 [n=itsle0@cpc1-bele5-0-0-cust948.belf.cable.ntl.com] has quit ["Leaving"] 09:20 -!- trox [i=c345d00c@gateway/web/freenode/x-qancqbszwcwdgynp] has joined ##openvpn 09:21 < trox> possible to create a vpn while both server and client are behind NAT ? 09:21 < endre> sure 09:21 < trox> as in both of them dont have a remote ip 09:21 < trox> endre , how ? 09:21 < endre> they need a portforward a dyndns hostname 09:22 < endre> they need a portforward and a dyndns hostname 09:23 < trox> endre : cant do port forwarding. the router thats causing the NAT is at the isp's side, and they refuse to do port forwarding for anyone. 09:23 < ecrist> then that user must be a client 09:23 < trox> endre : still possible ? 09:23 < endre> then you need some tricking 09:23 < endre> cheat isp's conntrack table 09:23 < endre> pretend both nodes as talking to each other 09:26 < trox> endre : what do you mean by the user must be a client ? 09:27 < endre> trox: however, both of our nickname starts with 'e', i'm definitely not ecrist. 09:29 < ecrist> endre is MUCH better looking 09:29 < ecrist> ;) 09:29 < trox> :S 09:29 < trox> sorry about that migraine attack taking place atm 09:30 < trox> its good that i can at least read whats being said :) 09:30 < ecrist> trox: are both of the systems you want a VPN for behind the same NAT issue? 09:31 < endre> i also have a migraine attack right now 09:31 < trox> same issue, not the same router thats causing the NAT. 09:31 < endre> that's bad 09:31 < ecrist> trox: use a third-party, then. 09:31 < ecrist> get a VPS, or Hamachi 09:31 < endre> find/make a node on the net taht you can connect both nodes to 09:31 < endre> yup 09:31 < ecrist> run a server off-net 09:34 < trox> does openvpn have to be installed system wide ? 09:35 < trox> could it be installed on some shell ? 09:36 < endre> you need to be root to configure ip 09:36 < endre> as well as open up tunnel interfaces 09:37 < trox> i dont have root access to any vps atm :( 09:37 < trox> this is starting to look bad :P 09:51 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has quit ["This computer has gone to sleep"] 10:00 -!- Diffen [n=diffen2@c-ef75e555.042-17-73746f11.cust.bredbandsbolaget.se] has joined ##openvpn 10:14 < |Mike|> krzie: awake? 10:14 < |Mike|> !ubuntu 10:14 < vpnHelper> |Mike|: "ubuntu" is dont use network manager! 10:14 < |Mike|> Who has a good alternative for Network Manager ? 10:15 < dazo> |Mike|: gopenvpn is pretty good for OpenVPN 10:15 < |Mike|> gnome openvpn that is? :) 10:15 < dazo> |Mike|: GTK? GNU? Garage? Garbage? who knows .... 10:16 < |Mike|> God ! :D 10:16 < rob0> Gargantuan 10:16 < rob0> Gangrenous 10:16 * dazo is using a self patched gopenvpn for Fedora 11 10:16 < rob0> gorilla 10:16 < dazo> Gottafindadarnlongwordwhichbeatsall 10:16 < |Mike|> Argh, there is no Ubuntu package... :( 10:18 < rob0> GoshIGottaCompileItOrGiveUp 10:19 * |Mike| utters something about packages and databases 10:22 -!- krzee [i=nobody@unaffiliated/krzee] has joined ##openvpn 10:33 < ecrist> sup, krzee? 10:35 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 10:38 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 10:39 -!- polaru [n=polaru@93.113.192.70] has quit [Remote closed the connection] 10:41 -!- Netsplit lindbohm.freenode.net <-> irc.freenode.net quits: stein0, dmarkey, _dren, Holister, tompaw, LowKey, Intensity, krphop, plundra, drue, (+2 more, use /NETSPLIT to show all of them) 10:41 -!- stein0_ [n=stein@mail.vgnett.no] has joined ##openvpn 10:41 -!- plndra [i=404@article.se] has joined ##openvpn 10:41 -!- dmarkey_ [n=dmarkey@dmarkey.xen.prgmr.com] has joined ##openvpn 10:41 -!- drue [n=drue@64.251.23.23] has joined ##openvpn 10:41 -!- Netsplit over, joins: Holister 10:41 -!- krphop [n=krphop@38.108.177.113] has joined ##openvpn 10:41 -!- Netsplit over, joins: Cap_J_L_Picard 10:41 -!- tompaw [n=tompaw@91.121.184.63] has joined ##openvpn 10:42 -!- Netsplit over, joins: LowKey 10:51 < krzee> wassup! 10:52 -!- codeswing [n=codeswin@unaffiliated/codeswing] has joined ##openvpn 10:52 < codeswing> Hi guys 10:53 < codeswing> guys 10:53 < codeswing> stuck at http://pastie.org/private/5t5e4qfjjrovf97or5jgq 10:54 < codeswing> help 10:54 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has quit [Read error: 54 (Connection reset by peer)] 10:54 < codeswing> Kas: you there 10:54 <+Kas> Yes sir, whats up? 10:55 < codeswing> Kas: http://pastie.org/private/5t5e4qfjjrovf97or5jgq 10:55 < codeswing> not able to connect to vpn 10:55 -!- _trine [n=psybnc_a@trine1-1-pt.tunnel.tserv5.lon1.ipv6.he.net] has joined ##openvpn 10:56 < krzee> increase verbosity to 5 and paste both logs (server / client) 10:56 < codeswing> krzee: I can't send server logs 10:56 < krzee> and why is that 10:57 < codeswing> krzee: I am at hoem 10:57 < codeswing> home 10:57 < krzee> i guess it'll have to wait til you can access both sides =/ 10:58 < krzee> that log tells nothing 10:58 < codeswing> krzee: http://pastie.org/private/5t5e4qfjjrovf97or5jgq 10:58 < codeswing> updated the pastie 10:58 < krzee> yup saw it 10:58 < krzee> but it doesnt help me 10:59 < krzee> there must be something after as well 10:59 < ecrist> krzee: you don't happen to have vbulletin license laying around, do you? 10:59 < ecrist> 4.0? 10:59 < krzee> it times out or what? 10:59 < krzee> negative ecrist 10:59 < krzee> dougy might 10:59 -!- ecrist changed the topic of ##openvpn to: OpenVPN 2.1.1 Most Current || Your problem is your firewall, really. || Type !welcome before asking your questions. || Web Forum: http://ovpnforum.com 11:00 < codeswing> krzee: it's stopped at the point 11:00 < krzee> codeswing, so the next thing it does is timeout? 11:00 < krzee> no R's or W's? 11:00 < krzee> i KNOW it does SOMETHING after 11:01 < codeswing> hmm 11:01 < codeswing> it's stopped there :) 11:01 < krzee> maybe for a certain amount of time... 11:02 < krzee> !configs 11:02 < vpnHelper> krzee: "configs" is (#1) please pastebin your client and server configs (with comments removed, you can use `grep -vE '^#|^;|^$' server.conf`), also include which OS and version of openvpn., or (#2) dont forget to include any ccd entries 11:03 < krzee> ecrist, did you see riproute on the wiki? i just noticed it, way cool of the guy to make that writeup (its now !rip) 11:04 < ecrist> !rip 11:04 < vpnHelper> ecrist: "rip" is http://www.secure-computing.net/wiki/index.php/OpenVPN/RIPRouting for a writeup on using RIP in openvpn 11:04 < codeswing> krzee: what should I do? 11:04 < krzee> codeswing, paste both configs without comments and come back when you have access to the server 11:04 < codeswing> hmm 11:05 < ecrist> krzee: that's pretty cool 11:05 < krzee> ya man 11:06 < krzee> i remember explaining iroute to him and whatnot, but he figured the solution himself and was cool enough to document it 11:06 < krzee> i just realized he had documented it, lol 11:09 < ecrist> there have been a few people with interesting configurations that would have been nice to have them document stuff, and they never do. 11:10 < krzee> yup 11:10 < krzee> was cool to see an exception to that =] 11:10 < krzee> ill be making a writeup on chaining vpns soon 11:12 < krzee> a group of friends is all doing 1 writeup within these 2 weeks, i chose VPN chaining (which was my orig motivation for learning everything that led to writing !route) 11:12 < ecrist> I sent dougy an email about vbulletin. if I have to, I'll just buy a license and run with it. once I obtain that, I'm hoping to make a more uniform site, including the wiki 11:12 < krzee> i setup X servers, in a linear line with 1 client between each server in the chain, the client connects to both servers and routes between it 11:13 < ecrist> not sure if I want to move the wiki, giving openvpn it's own, or simply make the wiki seem part of ovpnforum.com 11:14 < codeswing> openvpn suck 11:16 < krzee> ecrist, i like idea 2 more 11:17 < ecrist> codeswing? 11:17 < codeswing> yeah 11:17 < ecrist> krzee: as in, move the wiki to ovpnforum.com? 11:17 < codeswing> it's not simple 11:17 < krzee> or have it accessible from the forum somehow 11:17 < krzee> so that people who find the forum from google can find the wiki easily 11:18 < ecrist> my only 'problem', krzee, is right now it's intermingled with my other articles. 11:18 < codeswing> what does it mean "2010-01-19 22:30:45 pkcs11_protected_authentication = DISABLED" 11:18 < ecrist> I suppose we could just have links directly in to the articles from the forum site 11:18 < krzee> *shrug* its all knowledge, but isnt there a openvpn specific link you could use? 11:18 < codeswing> krzee: 2010-01-19 22:30:45 pkcs11_protected_authentication = DISABLED 11:19 < krzee> http://www.secure-computing.net/wiki/index.php/OpenVPN 11:19 < vpnHelper> Title: OpenVPN - Secure Computing Wiki (at www.secure-computing.net) 11:19 < codeswing> what does the line mean 11:19 < krzee> codeswing, it means paste those configs or stop wasting time 11:19 < krzee> lol 11:19 < codeswing> hmm.. I can't access server logs .. 11:19 < codeswing> it's protected 11:19 < krzee> did i just say logs? 11:19 < codeswing> the server is secure 11:20 < codeswing> I can't send server configs too 11:20 < krzee> come back when you can 11:20 < krzee> if you dont have access to the server, get support from the company that runs it 11:20 < krzee> if you do but not at this moment, please return with the needed info 11:21 < rob0> "openvpn suck"? 11:22 -!- NickWebHA [n=nick@mail.webhse.com] has joined ##openvpn 11:22 < NickWebHA> Hello everyone and welcome back me! 11:22 < krzee> lol, sup NickWebHA 11:22 < NickWebHA> I am in a pretty good mood and to top it all off food is on its way! 11:22 < NickWebHA> The only thing better is food being here. 11:23 < rob0> krzee, I'd suggest a "!sweet" factoid for visitors such as codeswing: http://sweet.nodns4.us/ 11:23 < vpnHelper> Title: S.W.E.E.T.: Stop Wasting Everyone Else's Time (at sweet.nodns4.us) 11:23 -!- BoomSie [n=gideon@dw77242112238.amsterdam-tc.dataweb.net] has quit [Client Quit] 11:23 < codeswing> krzee: the same configs are connecting from my friends machine 11:23 < rob0> ah crap 11:23 < krzee> codeswing, then the server log should tell us your problem 11:23 < rob0> leave off the "http://" part :) 11:23 < codeswing> krzee: it's stuck 11:24 < krzee> codeswing, we dont often sit here and guess what we need, come back when you have the server logs at verb 5 11:24 < NickWebHA> So I made some major headway in my OpenVPN-related Struggle Time (tm). Everyone can connect to the server and they can ping it! They just can not see the local LAN behind the OpenVPN server. I read !route but that does not apply to bridged configurations. 11:24 < krzee> codeswing, im starting to think you might be trolling... 11:24 < codeswing> hmm 11:24 < codeswing> nope 11:25 < codeswing> krzee: the same config used to connect some while ago (1 month back) 11:25 < codeswing> now it is not connecting 11:25 < krzee> ahh bridged configs, someone besides myself will need to help with that NickWebHA, but may i ask why you need bridge? 11:25 < krzee> codeswing, THEN COME BACK WHEN YOU HAVE SERVER LOG 11:25 < krzee> if i say that again its in a kick message 11:25 < codeswing> krzee: my boss won't allow me to access our openvpn server 11:25 < rob0> Nick is using IPX 11:25 < krzee> rob0, ahh =] 11:25 < rob0> codeswing: http://sweet.nodns4.us/ 11:25 < vpnHelper> Title: S.W.E.E.T.: Stop Wasting Everyone Else's Time (at sweet.nodns4.us) 11:26 < NickWebHA> Old video games. Really old video games. 11:27 < krzee> NickWebHA, valid reason... ild help if i used bridged mode 11:27 < krzee> but do stick around, others here know bridged mode better than i 11:27 < NickWebHA> I may not be an OpenVPN issue at all. While running Wireshark I see the packets hitting the machine on the local LAN but it can not find its way back. 11:27 < rob0> codeswing: when you say things such as "openvpn suck" in here, you defined yourself as someone who is not worth my time and effort. I would have no interest in helping you even if you did come back with information to make help possible. Just thought you might benefit from some feedback. 11:28 < codeswing> okay 11:28 < codeswing> sorry.. 11:28 < NickWebHA> It also find it odd that a connected OpenVPN client does not have a gateway listed on the virtual adapter. 11:28 < NickWebHA> codeswing: Shame on you. These people are here because they want to be here. If they kick your ass out you have no one to blame but yourself. 11:28 < krzee> the bridge script does need a gateway added at the end, i do remember that 11:28 < codeswing> rob0: sorry ... could you tell me what might be the problem I am facing 11:29 < krzee> oh boy... 11:29 < rob0> I accept the apology, but as krzee said, it's pretty near impossible to guess. 11:29 < NickWebHA> Unless you guys are working off tech-related prison offenses. Than I suppose you will never do that again. :-P 11:29 < krzee> rob0, you just saved him from a /kb come back with server logs if we unban you 11:30 < NickWebHA> Given your limited bridge experience, would you say "server-bridge 10.0.0.20 255.255.255.128 10.0.0.50 10.0.0.99 10.0.0.20" looks right? 10.0.0.20 is the local IP of the server running OpenVPN. 11:30 < krzee> LOL NickWebHA thats a great idea 11:30 < codeswing> rob0: okay .. np 11:30 < krzee> instead of jail time for hacking they should be monitored while supporting software on IRC 11:30 < krzee> lol 11:31 < NickWebHA> I know this is way off topic but I was just reminded of http://www.youtube.com/watch?v=VfCYZ3pks48 . 11:31 < vpnHelper> Title: YouTube - Sex Offender Shuffle (at www.youtube.com) 11:31 < NickWebHA> Oh, neat. I remember my old IRC bot-making days. 11:32 < krzee> NickWebHA, and whats an address they cant ping on the lan? 11:32 < NickWebHA> Anything other that the IP of the server itself. For example, I have a NAS array at 10.0.0.2 which is pingable but from from a client. 11:32 < NickWebHA> They also can not ping other connected clients. 11:32 < NickWebHA> I do have the client-to-client directive in there. 11:33 < krzee> --server-bridge gateway netmask pool-start-IP pool-end-IP 11:33 < krzee> pls see --server-bridge in !man 11:33 < krzee> !man 11:33 < vpnHelper> krzee: "man" is (#1) http://openvpn.net/man for 2.0 manual, or (#2) http://openvpn.net/man-beta.html for 2.1 manual, or (#3) the man pages are your friend! 11:34 < NickWebHA> I will check it out. I was going by what was in the sample (these configs are almost verbatim the samples just for testing purposes). 11:35 < vpnHelper> New forum entry openvpnforum: Installation Help :: Re: OpenVPN on Windows XP - Cant install TAP-Win32 device driver :: Reply ... || Installation Help :: Re: Connect to Cisco vpn concentrator :: Reply by krzee 11:35 < krzee> knowing how it expands may help you NickWebHA 11:35 < krzee> its just a helper directive, its actually a couple commands in 1 11:36 < NickWebHA> I see. Hitting the books. I will cover myself in fire retardant for when I make it explode. 11:37 < krzee> its actually not much to read, i think it could help =] 11:38 < krzee> also, you want to give the clients a netmask that goes with what the LAN uses, but only a pool of IPs that the LAN knows to never use themselves 11:38 < krzee> so if ou have DHCP on that lan, the DHCP server needs to set aside those ips to not hand out 11:40 < krzee> !learn sweet as http://sweet.nodns4.us/ =[ 11:40 < vpnHelper> krzee: Error: Missing "]". You may want to quote your arguments with double quotes in order to prevent extra brackets from being evaluated as nested commands. 11:40 < NickWebHA> I have that part all done. 10.0.0.50 to 10.0.0.99 is all set aside for the VPN clients to use. There is not much equipment on my home network that requires a static IP by design so most of the range is for dynamic addresses. 11:40 < krzee> !learn sweet as http://sweet.nodns4.us/ =( 11:40 < vpnHelper> krzee: Joo got it. 11:42 < ecrist> may not be suitable for work: http://secure-computing.net/files/booty.gif 11:42 < NickWebHA> You know, I see no reason to have OpenVPN dishing out the IPs. Perhaps I should let my local DHCP do it... I am going to look into that. 11:42 < NickWebHA> You have no idea where I work. 11:42 < NickWebHA> I may get more money for that one. :-P 11:43 -!- Diffen2 [n=diffen2@202.138.241.83.in-addr.dgcsystems.net] has joined ##openvpn 11:43 -!- teddymills [n=teddy@208.92.235.227] has quit ["Ex-Chat"] 11:43 < NickWebHA> The gateway I am sending to the clients should be the local IP of the OpenVPN server, no? 11:45 < ecrist> NickWebHA: did you wait for it to download completely? 11:45 < ecrist> it's a 2MB gif 11:47 < krzee> ecrist, she just walks away, right 11:47 < krzee> ? 11:47 < ecrist> yeah 11:48 -!- Znuff [n=ibm86@89.165.131.103] has joined ##openvpn 11:48 < Znuff> Hi. 11:48 < Znuff> I'm having an issue configuring openvpn on a windows 2008 server 11:49 < Znuff> Basically it says it can't load the server.crt, even tough the path is correct :-/ 11:50 < krzee> show me the line you used 11:50 < krzee> (@znuff) 11:51 < Znuff> sec, I'm trying to build the keys again 11:51 < krzee> you still have the line in your config... 11:53 < NickWebHA> We have company-sanctioned Boob Hour (tm) on Fridays. I let it download. :-P 11:53 < krzee> sounds like where i work 11:53 < Znuff> krzee, the slashes were escaped properly 11:54 < krzee> Znuff, and quoted? 11:54 < krzee> "" 11:54 < Znuff> yes 11:54 < Znuff> just that my .crt was empty 11:54 < Znuff> just recreated all the keys from scratch and it worked 11:54 < krzee> when someone has a nekkid girl on msn at my office people (including the boss) gather to watch 11:54 < krzee> lol 11:54 < krzee> Znuff, sounds good =] 12:05 < vpnHelper> New forum entry openvpnforum: Configuration :: Re: OpenVpn configuration :: Reply by krzee 12:10 -!- Znuff [n=ibm86@89.165.131.103] has left ##openvpn ["Leaving"] 12:14 -!- Serideru [n=GTWebste@wsip-24-249-157-93.tu.ok.cox.net] has joined ##openvpn 12:14 -!- codeswing [n=codeswin@unaffiliated/codeswing] has left ##openvpn ["Leaving..."] 12:24 < NickWebHA> I have figured out my problem! Just one catch... 12:25 < NickWebHA> ... "server-bridge 10.0.0.20 255.255.255.128 10.0.0.50 10.0.0.99" does not push the proper gateway to the clients. When I set it manually everything works. 12:26 -!- cp7 [n=neo@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has joined ##openvpn 12:26 -!- mode/##openvpn [+v cp7] by ChanServ 12:27 -!- cp7 [n=neo@adsl-71-140-186-190.dsl.pltn13.pacbell.net] has quit [Client Quit] 12:30 -!- adam_ [i=5d3092bb@gateway/web/freenode/x-rznvjxistnkfemfl] has joined ##openvpn 12:31 < krzee> ahh nice NickWebHA 12:31 < krzee> you can run the command to set it manually from bridge script or from --up