Until last week, we had a company router RT-N66U running the latest Merlin firmware. On this router we ran an OpenVPN server, connecting two off-site devices:
· 1 x RT N66U running merlin firmware, connecting as a client
· 1 x Yealink phone T21P, connecting as a client.
We migrated our company router from a RT N66U to a RT AC86U. I installed the latest Merlin firmware on this router (384.5) I exported the settings from the RT-N66U to the RT-AC86U. Everything worked fine, both OpenVPN clients connected again after the upgrade.
However, there was one problem. There was no traffic between the phone and the new router. I could not reach the web interface of the phone from the new router. The phone did not connect to our PBX behind the new router.
Strange thing is that the off-site RT-N66U connects fine to the new RT-AC86U. I can reach the Web Interface through the VPN, and also all devices behind that router without any problems.
It is just the phone that is the problem.
Settings on the RT-AC86U are as follows:
Interface type: TAP
Protocol: UTP
Server port 1194
Authorization mode: TLS
Username/password: no
TLS control channel security: disable
HMAC Authorization: default
Allocate from DHCP: no
Clien pool address: 192.168.1.200 192.168.1.240
Advertise DNS to clients: yes
Cipher Negotiation: Enable with fallback
Negotiable Ciphers: AES-128-GCM:AES-256-GCM:AES-128-CBC:AES-256-CBC
Legacy/fallback cipher: BF-CBC
Compression LZO
Log verbosity 3
Manage client-Specific Options yes
Allow client-client yes
Allow only specified clients no
Custom configuration
keepalive 1 180
duplicate-cn
----------------------------------end of OpenVPN Server Settings---------------------
IP Address RT-N66U /client: 5.x.x.96 (received IP address 192.168.1.201, as shown below)
IP address Yealink phone /client: 86.x.x.20 (received IP address 192.168.1.202, as shown below)
This is the most recent log file of the RT-AC86U for both client devices:
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 TLS: Initial packet from [AF_INET]5.x.x.96:42532, sid=405b7669 f773c715
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-N66U, emailAddress=me@myhost.mydomain
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
Jun 30 16:53:23 ovpn-server1[28225]: client/158.181.97.120:1029 MULTI: Learn: 00:ff:e5:c1:24:23 -> client/158.181.97.120:1029
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_VER=2.4.3
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_PLAT=linux
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_PROTO=2
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_NCP=2
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_LZ4=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_LZ4v2=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_LZO=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_COMP_STUB=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_COMP_STUBv2=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_TCPNL=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 [client] Peer Connection Initiated with [AF_INET]5.x.x.96:42532
Jun 30 16:53:23 ovpn-server1[28225]: client/5.x.x.96:42532 MULTI_sva: pool returned IPv4=192.168.1.201, IPv6=(Not enabled)
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 PUSH: Received control message: 'PUSH_REQUEST'
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 SENT CONTROL [client]: 'PUSH_REPLY,dhcp-option DNS 192.168.1.1,route-gateway 192.168.1.1,ping 1,ping-restart 180,ifconfig 192.168.1.201 255.255.255.0,peer-id 2,cipher AES-128-GCM' (status=1)
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 Data Channel: using negotiated cipher 'AES-128-GCM'
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Jun 30 16:53:26 ovpn-server1[28225]: client/5.x.x.96:42532 MULTI: Learn: e0:3f:49:6a:e0:c0 -> client/5.x.x.96:42532
Jun 30 16:53:26 ovpn-server1[28225]: client/5.x.x.96:42532 MULTI: Learn: 00:ff:51:e6:bb:c8 -> client/5.x.x.96:42532
Jun 30 16:53:26 ovpn-server1[28225]: client/5.x.x.96:42532 MULTI: Learn: 00:0e:08:dd:ea:65 -> client/5.x.x.96:42532
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-N66U, emailAddress=me@myhost.mydomain
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Outgoing Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Incoming Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 [client] Peer Connection Initiated with [AF_INET]86.x.x.20:1030
Jun 30 16:53:31 ovpn-server1[28225]: client/86.x.x.20:1030 MULTI_sva: pool returned IPv4=192.168.1.202, IPv6=(Not enabled)
Jun 30 16:53:33 ovpn-server1[28225]: client/86.x.x.20:1030 PUSH: Received control message: 'PUSH_REQUEST'
Jun 30 16:53:33 ovpn-server1[28225]: client/86.x.x.20:1030 SENT CONTROL [client]: 'PUSH_REPLY,dhcp-option DNS 192.168.1.1,route-gateway 192.168.1.1,ping 1,ping-restart 180,ifconfig 192.168.1.202 255.255.255.0' (status=1)
Jun 30 16:53:34 ovpn-server1[28225]: client/86.x.x.20:1030 MULTI: Learn: 00:ff:68:f9:93:24 -> client/86.x.x.20:1030
------------end of log file--------------------------
Note: I realize that the Yealink uses an old encryption method that can be hacked with the SWEET32 method. However, the phone does not support SHA256, and from what I understand a hacker can decipher text as a “man in the middle”. This is just audio traffic so nothing secret. It is the plan to replace the phones at one point, but not now.
Question: why does the Yealink phone log on properly, is assigned an IP address but there is no traffic?
Thanks in advance!!
· 1 x RT N66U running merlin firmware, connecting as a client
· 1 x Yealink phone T21P, connecting as a client.
We migrated our company router from a RT N66U to a RT AC86U. I installed the latest Merlin firmware on this router (384.5) I exported the settings from the RT-N66U to the RT-AC86U. Everything worked fine, both OpenVPN clients connected again after the upgrade.
However, there was one problem. There was no traffic between the phone and the new router. I could not reach the web interface of the phone from the new router. The phone did not connect to our PBX behind the new router.
Strange thing is that the off-site RT-N66U connects fine to the new RT-AC86U. I can reach the Web Interface through the VPN, and also all devices behind that router without any problems.
It is just the phone that is the problem.
Settings on the RT-AC86U are as follows:
Interface type: TAP
Protocol: UTP
Server port 1194
Authorization mode: TLS
Username/password: no
TLS control channel security: disable
HMAC Authorization: default
Allocate from DHCP: no
Clien pool address: 192.168.1.200 192.168.1.240
Advertise DNS to clients: yes
Cipher Negotiation: Enable with fallback
Negotiable Ciphers: AES-128-GCM:AES-256-GCM:AES-128-CBC:AES-256-CBC
Legacy/fallback cipher: BF-CBC
Compression LZO
Log verbosity 3
Manage client-Specific Options yes
Allow client-client yes
Allow only specified clients no
Custom configuration
keepalive 1 180
duplicate-cn
----------------------------------end of OpenVPN Server Settings---------------------
IP Address RT-N66U /client: 5.x.x.96 (received IP address 192.168.1.201, as shown below)
IP address Yealink phone /client: 86.x.x.20 (received IP address 192.168.1.202, as shown below)
This is the most recent log file of the RT-AC86U for both client devices:
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 TLS: Initial packet from [AF_INET]5.x.x.96:42532, sid=405b7669 f773c715
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-N66U, emailAddress=me@myhost.mydomain
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
Jun 30 16:53:23 ovpn-server1[28225]: client/158.181.97.120:1029 MULTI: Learn: 00:ff:e5:c1:24:23 -> client/158.181.97.120:1029
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_VER=2.4.3
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_PLAT=linux
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_PROTO=2
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_NCP=2
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_LZ4=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_LZ4v2=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_LZO=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_COMP_STUB=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_COMP_STUBv2=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 peer info: IV_TCPNL=1
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Jun 30 16:53:23 ovpn-server1[28225]: 5.x.x.96:42532 [client] Peer Connection Initiated with [AF_INET]5.x.x.96:42532
Jun 30 16:53:23 ovpn-server1[28225]: client/5.x.x.96:42532 MULTI_sva: pool returned IPv4=192.168.1.201, IPv6=(Not enabled)
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 PUSH: Received control message: 'PUSH_REQUEST'
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 SENT CONTROL [client]: 'PUSH_REPLY,dhcp-option DNS 192.168.1.1,route-gateway 192.168.1.1,ping 1,ping-restart 180,ifconfig 192.168.1.201 255.255.255.0,peer-id 2,cipher AES-128-GCM' (status=1)
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 Data Channel: using negotiated cipher 'AES-128-GCM'
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Jun 30 16:53:24 ovpn-server1[28225]: client/5.x.x.96:42532 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Jun 30 16:53:26 ovpn-server1[28225]: client/5.x.x.96:42532 MULTI: Learn: e0:3f:49:6a:e0:c0 -> client/5.x.x.96:42532
Jun 30 16:53:26 ovpn-server1[28225]: client/5.x.x.96:42532 MULTI: Learn: 00:ff:51:e6:bb:c8 -> client/5.x.x.96:42532
Jun 30 16:53:26 ovpn-server1[28225]: client/5.x.x.96:42532 MULTI: Learn: 00:0e:08:dd:ea:65 -> client/5.x.x.96:42532
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-N66U, emailAddress=me@myhost.mydomain
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=client, emailAddress=me@myhost.mydomain
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Outgoing Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Incoming Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Jun 30 16:53:31 ovpn-server1[28225]: 86.x.x.20:1030 [client] Peer Connection Initiated with [AF_INET]86.x.x.20:1030
Jun 30 16:53:31 ovpn-server1[28225]: client/86.x.x.20:1030 MULTI_sva: pool returned IPv4=192.168.1.202, IPv6=(Not enabled)
Jun 30 16:53:33 ovpn-server1[28225]: client/86.x.x.20:1030 PUSH: Received control message: 'PUSH_REQUEST'
Jun 30 16:53:33 ovpn-server1[28225]: client/86.x.x.20:1030 SENT CONTROL [client]: 'PUSH_REPLY,dhcp-option DNS 192.168.1.1,route-gateway 192.168.1.1,ping 1,ping-restart 180,ifconfig 192.168.1.202 255.255.255.0' (status=1)
Jun 30 16:53:34 ovpn-server1[28225]: client/86.x.x.20:1030 MULTI: Learn: 00:ff:68:f9:93:24 -> client/86.x.x.20:1030
------------end of log file--------------------------
Note: I realize that the Yealink uses an old encryption method that can be hacked with the SWEET32 method. However, the phone does not support SHA256, and from what I understand a hacker can decipher text as a “man in the middle”. This is just audio traffic so nothing secret. It is the plan to replace the phones at one point, but not now.
Question: why does the Yealink phone log on properly, is assigned an IP address but there is no traffic?
Thanks in advance!!