@4-Real
danke für die conf. Ich hab noch "log /etc/openvpn/LOG.txt" eingefügt und pass.txt in hide.login umgeändert. Beim Start kommt: OpenVPN starting successfully, aber bei Status steht dann: openvpn is not running. Ich häng mal die Log an:
Spoiler anzeigen
Fri Dec 30 11:07:42 2016 OpenVPN 2.3.6 mipsel-oe-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Nov 27 2016
Fri Dec 30 11:07:42 2016 library versions: OpenSSL 1.0.2a 19 Mar 2015, LZO 2.09
Fri Dec 30 11:07:42 2016 WARNING: file '/etc/openvpn/hide.login' is group or others accessible
Fri Dec 30 11:07:42 2016 Control Channel Authentication: tls-auth using INLINE static key file
Fri Dec 30 11:07:42 2016 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Dec 30 11:07:42 2016 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Dec 30 11:07:42 2016 Socket Buffers: R=[163840->131072] S=[163840->131072]
Fri Dec 30 11:07:42 2016 UDPv4 link local: [undef]
Fri Dec 30 11:07:42 2016 UDPv4 link remote: [AF_INET]109.201.143.215:4000
Fri Dec 30 11:07:42 2016 TLS: Initial packet from [AF_INET]109.201.143.215:4000, sid=922e00c3 85b9573b
Fri Dec 30 11:07:42 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Dec 30 11:07:42 2016 VERIFY OK: depth=2, C=MY, ST=Wilayah Persekutuan, L=Labuan, O=eVenture Limited, OU=Certificate Authority, CN=Hide.Me Root CA
Fri Dec 30 11:07:42 2016 VERIFY OK: depth=1, C=MY, ST=Wilayah Persekutuan, L=Labuan, O=eVenture Limited, OU=Certificate Authority, CN=Hide.Me Server CA #1
Fri Dec 30 11:07:42 2016 Validating certificate key usage
Fri Dec 30 11:07:43 2016 ++ Certificate has key usage 00a0, expects 00a0
Fri Dec 30 11:07:43 2016 VERIFY KU OK
Fri Dec 30 11:07:43 2016 Validating certificate extended key usage
Fri Dec 30 11:07:43 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Dec 30 11:07:43 2016 VERIFY EKU OK
Fri Dec 30 11:07:43 2016 VERIFY X509NAME OK: C=MY, ST=Wilayah Persekutuan, L=Labuan, O=eVenture Limited, OU=Certificate Authority, CN=*.hide.me
Fri Dec 30 11:07:43 2016 VERIFY OK: depth=0, C=MY, ST=Wilayah Persekutuan, L=Labuan, O=eVenture Limited, OU=Certificate Authority, CN=*.hide.me
Fri Dec 30 11:07:45 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Dec 30 11:07:45 2016 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Dec 30 11:07:45 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Dec 30 11:07:45 2016 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Dec 30 11:07:45 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 8192 bit RSA
Fri Dec 30 11:07:45 2016 [*.hide.me] Peer Connection Initiated with [AF_INET]109.201.143.215:4000
Fri Dec 30 11:07:47 2016 SENT CONTROL [*.hide.me]: 'PUSH_REQUEST' (status=1)
Fri Dec 30 11:07:47 2016 AUTH: Received control message: AUTH_FAILED
Fri Dec 30 11:07:47 2016 SIGTERM[soft,auth-failure] received, process exiting
danke für die conf. Ich hab noch "log /etc/openvpn/LOG.txt" eingefügt und pass.txt in hide.login umgeändert. Beim Start kommt: OpenVPN starting successfully, aber bei Status steht dann: openvpn is not running. Ich häng mal die Log an:
Fri Dec 30 11:07:42 2016 OpenVPN 2.3.6 mipsel-oe-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Nov 27 2016
Fri Dec 30 11:07:42 2016 library versions: OpenSSL 1.0.2a 19 Mar 2015, LZO 2.09
Fri Dec 30 11:07:42 2016 WARNING: file '/etc/openvpn/hide.login' is group or others accessible
Fri Dec 30 11:07:42 2016 Control Channel Authentication: tls-auth using INLINE static key file
Fri Dec 30 11:07:42 2016 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Dec 30 11:07:42 2016 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Dec 30 11:07:42 2016 Socket Buffers: R=[163840->131072] S=[163840->131072]
Fri Dec 30 11:07:42 2016 UDPv4 link local: [undef]
Fri Dec 30 11:07:42 2016 UDPv4 link remote: [AF_INET]109.201.143.215:4000
Fri Dec 30 11:07:42 2016 TLS: Initial packet from [AF_INET]109.201.143.215:4000, sid=922e00c3 85b9573b
Fri Dec 30 11:07:42 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Dec 30 11:07:42 2016 VERIFY OK: depth=2, C=MY, ST=Wilayah Persekutuan, L=Labuan, O=eVenture Limited, OU=Certificate Authority, CN=Hide.Me Root CA
Fri Dec 30 11:07:42 2016 VERIFY OK: depth=1, C=MY, ST=Wilayah Persekutuan, L=Labuan, O=eVenture Limited, OU=Certificate Authority, CN=Hide.Me Server CA #1
Fri Dec 30 11:07:42 2016 Validating certificate key usage
Fri Dec 30 11:07:43 2016 ++ Certificate has key usage 00a0, expects 00a0
Fri Dec 30 11:07:43 2016 VERIFY KU OK
Fri Dec 30 11:07:43 2016 Validating certificate extended key usage
Fri Dec 30 11:07:43 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Dec 30 11:07:43 2016 VERIFY EKU OK
Fri Dec 30 11:07:43 2016 VERIFY X509NAME OK: C=MY, ST=Wilayah Persekutuan, L=Labuan, O=eVenture Limited, OU=Certificate Authority, CN=*.hide.me
Fri Dec 30 11:07:43 2016 VERIFY OK: depth=0, C=MY, ST=Wilayah Persekutuan, L=Labuan, O=eVenture Limited, OU=Certificate Authority, CN=*.hide.me
Fri Dec 30 11:07:45 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Dec 30 11:07:45 2016 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Dec 30 11:07:45 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Dec 30 11:07:45 2016 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Dec 30 11:07:45 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 8192 bit RSA
Fri Dec 30 11:07:45 2016 [*.hide.me] Peer Connection Initiated with [AF_INET]109.201.143.215:4000
Fri Dec 30 11:07:47 2016 SENT CONTROL [*.hide.me]: 'PUSH_REQUEST' (status=1)
Fri Dec 30 11:07:47 2016 AUTH: Received control message: AUTH_FAILED
Fri Dec 30 11:07:47 2016 SIGTERM[soft,auth-failure] received, process exiting