truglodite
Regular Contributor
I am not sure if this has anything to do with my change from tls-auth to tls-crypt, or configuring openvpn and the webgui with custom certs... but my router refuses to automatically start openvpn server instance 2 after reboot. I have to log in to the webgui, and "apply" advanced settings of server2 for it to work after reboot. Everything else is working as it is supposed to: n66u, 380_67, absolution-sh (3.9)... and I've got dnssec enabled. Not sure what else to add to this... maybe logs after reboot (server2 frozen on "applying config")... and logs after applying server2 advanced settings (gets server2 going):
After reboot (server2 isn't started... line5 looks interesting):
Then, after "applying" server2 advanced settings (the server is now started):
Any ideas if I'm doing something wrong with my config, or something else (perhaps bug with tls-crypt implementation)?
Fortunately it's not the end of the world... if I'm away from my house and the power goes down (router reset), I can still access through server1. However it's quite annoying when I discover server2 down... and I figure I'll learn something if I can fix it.
Thanks,
Kevin
After reboot (server2 isn't started... line5 looks interesting):
Code:
Jul 27 20:52:04 rc_service: ntp 868:notify_rc restart_upnp
Jul 27 20:52:04 rc_service: waitting "start_vpnserver1" via udhcpc ...
Jul 27 20:52:12 kernel: tun: Universal TUN/TAP device driver, 1.6
Jul 27 20:52:12 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Jul 27 20:52:13 rc_service: skip the event: start_vpnserver2.
Jul 27 20:52:13 kernel: device tun21 entered promiscuous mode
Jul 27 20:52:13 openvpn-routing: Refreshing policy rules for client 1
Jul 27 20:52:14 openvpn-routing: Allow WAN access to all VPN clients
Jul 27 20:52:14 openvpn-routing: Refreshing policy rules for client 2
Jul 27 20:52:14 openvpn-routing: Allow WAN access to all VPN clients
Jul 27 20:52:14 openvpn-routing: Refreshing policy rules for client 3
Jul 27 20:52:14 openvpn-routing: Allow WAN access to all VPN clients
Jul 27 20:52:14 openvpn-routing: Refreshing policy rules for client 4
Jul 27 20:52:14 openvpn-routing: Allow WAN access to all VPN clients
Jul 27 20:52:14 openvpn-routing: Refreshing policy rules for client 5
Jul 27 20:52:14 openvpn-routing: Allow WAN access to all VPN clients
Jul 27 20:52:14 ddns_update: ez-ipupdate: starting...
Jul 27 20:52:15 ddns_update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
Jul 27 20:52:15 ddns_update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Fri, 28 Jul 2017 03:52:14 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
Jul 27 20:52:15 ddns_update: retval= 0, ddns_return_code (,200)
Jul 27 20:52:15 ddns_update: asusddns_update: 0
Jul 27 20:52:15 ddns: ddns update ok
Jul 27 20:52:15 dhcp_client: bound XXX.XXX.XXX.XXX via XXX.XXX.XXX.XXX during 259200 seconds.
Jul 27 20:52:20 openvpn[1022]: OpenVPN 2.4.3 mipsel-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 16 2017
Jul 27 20:52:20 openvpn[1022]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Jul 27 20:52:20 openvpn[1024]: PLUGIN_INIT: POST /usr/lib/openvpn-plugin-auth-pam.so '[/usr/lib/openvpn-plugin-auth-pam.so] [openvpn]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
Jul 27 20:52:20 openvpn[1024]: Diffie-Hellman initialized with 4096 bit key
Jul 27 20:52:20 openvpn[1024]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Jul 27 20:52:20 openvpn[1024]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Jul 27 20:52:20 openvpn[1024]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Jul 27 20:52:20 openvpn[1024]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Jul 27 20:52:21 rc_service: ntp 868:notify_rc restart_diskmon
Jul 27 20:52:21 disk_monitor: Finish
Jul 27 20:52:21 disk_monitor: be idle
Jul 27 20:52:23 crond[295]: time disparity of 1047112 minutes detected
Jul 27 20:52:35 openvpn[1024]: TUN/TAP device tun21 opened
Jul 27 20:52:35 openvpn[1024]: TUN/TAP TX queue length set to 100
Jul 27 20:52:35 openvpn[1024]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Jul 27 20:52:35 openvpn[1024]: /usr/sbin/ip link set dev tun21 up mtu 1500
Jul 27 20:52:35 openvpn[1024]: /usr/sbin/ip addr add dev tun21 10.8.0.X/24 broadcast 10.8.0.255
Jul 27 20:52:35 openvpn[1024]: Could not determine IPv4/IPv6 protocol. Using AF_INET
Jul 27 20:52:35 openvpn[1024]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jul 27 20:52:35 openvpn[1024]: Listening for incoming TCP connection on [AF_INET]XXX.XXX.XXX.XXX:443
Jul 27 20:52:35 openvpn[1024]: TCPv4_SERVER link local (bound): [AF_INET]XXX.XXX.XXX.XXX:443
Jul 27 20:52:35 openvpn[1024]: TCPv4_SERVER link remote: [AF_UNSPEC]
Then, after "applying" server2 advanced settings (the server is now started):
Code:
Jul 27 20:55:41 rc_service: httpds 293:notify_rc restart_chpass;restart_vpnserver2
Jul 27 20:55:43 kernel: device tun22 entered promiscuous mode
Jul 27 20:55:47 openvpn[1295]: OpenVPN 2.4.3 mipsel-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 16 2017
Jul 27 20:55:47 openvpn[1295]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
Jul 27 20:55:47 openvpn[1297]: PLUGIN_INIT: POST /usr/lib/openvpn-plugin-auth-pam.so '[/usr/lib/openvpn-plugin-auth-pam.so] [openvpn]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
Jul 27 20:55:47 openvpn[1297]: Diffie-Hellman initialized with 4096 bit key
Jul 27 20:55:47 openvpn[1297]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Jul 27 20:55:47 openvpn[1297]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Jul 27 20:55:47 openvpn[1297]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Jul 27 20:55:47 openvpn[1297]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Jul 27 20:55:47 openvpn[1297]: TUN/TAP device tun22 opened
Jul 27 20:55:47 openvpn[1297]: TUN/TAP TX queue length set to 100
Jul 27 20:55:47 openvpn[1297]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Jul 27 20:55:47 openvpn[1297]: /usr/sbin/ip link set dev tun22 up mtu 1500
Jul 27 20:55:47 openvpn[1297]: /usr/sbin/ip addr add dev tun22 XXX.XXX.XXX.XXX/24 broadcast 10.16.0.255
Jul 27 20:55:47 openvpn[1297]: Could not determine IPv4/IPv6 protocol. Using AF_INET
Jul 27 20:55:47 openvpn[1297]: Socket Buffers: R=[118784->118784] S=[118784->118784]
Jul 27 20:55:47 openvpn[1297]: UDPv4 link local (bound): [AF_INET]XXX.XXX.XXX.XXX:1194
Jul 27 20:55:47 openvpn[1297]: UDPv4 link remote: [AF_UNSPEC]
Jul 27 20:55:47 openvpn[1297]: MULTI: multi_init called, r=256 v=256
Jul 27 20:55:47 openvpn[1297]: IFCONFIG POOL: base=XXX.XXX.XXX.XXX size=252, ipv6=0
Jul 27 20:55:47 openvpn[1297]: Initialization Sequence Completed
Any ideas if I'm doing something wrong with my config, or something else (perhaps bug with tls-crypt implementation)?
Fortunately it's not the end of the world... if I'm away from my house and the power goes down (router reset), I can still access through server1. However it's quite annoying when I discover server2 down... and I figure I'll learn something if I can fix it.
Thanks,
Kevin