biterbyter
Goto Top

Zertifikate unter Turnkey OpenVPN Linux erstellen

Hallo Forumteilnehmer.

Ich hab einen TurnkeyOpenVPN Server (Linux) aufgesetzt. Die TurnKey Installation war eine Vorgabe - komme also nicht drumherum.
Die Installation läuft automatisiert ab. Da kann ich nichts einstellen (Serverzertifikaterstellung läuft automatisiert ab)
Ist ein DEBIAN Linux

Nach Abschluss der Installation wird mir eine Seite mit einer URL angezeigt (SSH URL...).

Das Ziel soll sein, dass ich auf meinem Client eine Verbindung zu dem Server herstellen kann und auch aus dem entsprechenden Netz eine Webseite aufrufen kann.
Vom OpenVPN Server aus ist der Rechner, den ich erreichen soll auch pingbar.

Was ich aber im Moment nicht weiß, ist folgendes:

• Wie erstelle ich die Zertifikate und exportiere sie auf meinen Client?

In Windows wüsste ich wie vorgehen kann - hier hab ich auch mehrfach OpenVPN installiert...

Aber auf dem TurnKey Linux OpenVPN...
Bin per SSH eingelogt und kann auch die Verzeichnisse sehen. Weiß aber nicht weiter.

Hat jemand von Euch einen Ansatz?
Vielen Dank schon mal vorab (sollte etwas unklar sein werde ich diese Fragen gerne beantworten).

Content-Key: 399659

Url: https://administrator.de/contentid/399659

Printed on: April 26, 2024 at 08:04 o'clock

Mitglied: 129580
129580 Jan 28, 2019 updated at 12:57:49 (UTC)
Goto Top
Hallo,

• Wie erstelle ich die Zertifikate und exportiere sie auf meinen Client?

ganz gewöhnlich über die Easy-RSA Skripte. Ob diese bei diesem Image bereits installiert sind, musst du in der Dokumentation prüfen.
Tutorials zu den Easy-RSA Skripten findest du massenhaft im Netz.

Alternativ kannst du die CA und die Schlüssel direkt mit OpenSSL generieren. Auch dazu findest du zahlreiche Tutorials.

Die Schlüssel einfach mit SCP kopieren.

P.S. Fertige Images sind immer mit Vorsicht zu genießen, da man nie weiß, was der Anbieter in diesen Image an Änderungen vorgenommen hat.

Viele Grüße,
Exception
Member: BiterByter
BiterByter Jan 28, 2019 at 14:11:07 (UTC)
Goto Top
Vielen Dank. Das bringt mich schonmal weiter. Es ist schon vorhanden (das Verzeichnis Easy RSA).

Ich versuche jetzt ein Clientzertifikat zu erzeugen, scheitere jedoch daran, dass die Meldung erscheint "Command not found"

In Windows wechsel ich in das Verzeichnis Easy-RSA, lade die Datei vars.bat, danach erstelle ich ein Zertifikat mit build-key-pkcs12.bat und kopiere das in das config Verzeichnis (mit der Config Datei des Clients) des Windos Clients.

Wie mache ich das bei Linux?
Ich hab schon mal in verschiedenen Foren geschaut, aber nicht das gefunden was ich suche. Es muss doch auch zuerst die vars Datei und dann die Datei build-key-pkcs12 aufgerufen werden in Linux, oder? Wenn ja wie?

Danke schon mal vorab
Member: BiterByter
BiterByter Jan 28, 2019 at 14:45:28 (UTC)
Goto Top
OK. Hab jetzt die Zertifikate wie hier beschrieben erzeugt.

https://blog.doenselmann.com/openvpn-zertifikate-unter-linux-erzeugen/
Mitglied: 129580
129580 Jan 28, 2019 updated at 16:28:13 (UTC)
Goto Top
Wie mache ich das bei Linux?

Funktioniert exakt gleich. Der einzigste Unterschied liegt an den Skriptsprachen.
Unter Windows ist das ein Batch und unter Linux ein Bash Script. Sonst gibts da keine Unterschiede.

Ich versuche jetzt ein Clientzertifikat zu erzeugen, scheitere jedoch daran, dass die Meldung erscheint "Command not found"

Dann hast du nicht das entsprechende Script aufgerufen sondern irgendwas anderes, was von der Shell als Command interpretiert wird.
Eigentlich super einfach:

1) . vars Datei editieren und Variablen in die aktuelle Shell Sitzung importieren: source ./vars
2) /clean-all ausführen
3) CA Zert und DH-Key erstellen
-> ./build-ca
-> ./build-dh
4) Server Cert erstellen: /build-key-server <server common name>
5) Client Cert erstellen: ./build-key <client common name>
Member: BiterByter
BiterByter Jan 28, 2019 at 15:31:01 (UTC)
Goto Top
Vielen Dank. Wahrscheinlich muss ich mich erstmal daran gewöhnen. Ich hab jetzt das Zertifikat erstellt, bekomme jetzt diese Fehler.

Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'


Ich hap PKCS12 Zertifikate erstellt, da wir unter Windows auch solche verwenden.

Meine Client Config sieht so aus:
client
pull
dev tun
dev-node OpenVPN
proto udp
remote IP ADRESSE 1194
resolv-retry infinite
nobind
persist-key
persist-tun
auth-nocache
ca ca.crt
cipher AES-256-CBC
comp-lzo
verb 5
remote-cert-tls server
pkcs12 "C:\\Program Files\\OpenVPN\\config\\CLIENT.p12"


Meine Server Config sieht so aus.
port 1194
proto udp
dev tun

comp-lzo
keepalive 10 120

persist-key
persist-tun
user nobody
group nogroup

chroot /etc/openvpn/easy-rsa/keys/crl.jail
crl-verify crl.pem

ca /etc/openvpn/easy-rsa/keys/ca.crt
dh /etc/openvpn/easy-rsa/keys/dh2048.pem
tls-auth /etc/openvpn/easy-rsa/keys/ta.key 0
key /etc/openvpn/easy-rsa/keys/server.key
cert /etc/openvpn/easy-rsa/keys/server.crt

ifconfig-pool-persist /var/lib/openvpn/server.ipp
client-config-dir /etc/openvpn/server.ccd
status /var/log/openvpn/server.log
verb 4

  1. virtual subnet unique for openvpn to draw client addresses from
  2. the server will be configured with x.x.x.1
  3. important: must not be used on your network
server XXXXXXXXXXX 255.255.255.0

  1. push routes to clients to allow them to reach private subnets
push "route XXXXXXXXXXX 255.255.255.0"
push "route XXXXXXXXXXX 255.255.255.0"
push "route XXXXXXXXXXX 255.255.255.0"
push "route XXXXXXXXXXX 255.255.255.0"
push "route XXXXXXXXXXX 255.255.255.0"

cipher AES-256-CBC
Mitglied: 129580
129580 Jan 28, 2019 updated at 16:37:17 (UTC)
Goto Top
Hallo,

das ist kein Fehler. Bitte mal das vollständige Log posten und ggf. das Log Level erhöhen.

P.S. Bitte nutze die Code Tags für Code, Config und Log Ausgaben.

VG
Exception
Member: BiterByter
BiterByter Jan 29, 2019 at 09:53:54 (UTC)
Goto Top
Danke...

Hab das Log Level auf 6 erhöht. Ich hoffe das reicht aus.

Hab einmal die Zertifikate neu erstellt (pkcs12 Zertifikate), dann erscheint das untere Log.


Tue Jan 29 10:45:52 2019 us=536058 Current Parameter Settings:
Tue Jan 29 10:45:52 2019 us=536058   config = 'C:\Program Files\OpenVPN\config\XX1.ovpn'  
Tue Jan 29 10:45:52 2019 us=536058   mode = 0
Tue Jan 29 10:45:52 2019 us=536558   show_ciphers = DISABLED
Tue Jan 29 10:45:52 2019 us=536558   show_digests = DISABLED
Tue Jan 29 10:45:52 2019 us=536558   show_engines = DISABLED
Tue Jan 29 10:45:52 2019 us=536558   genkey = DISABLED
Tue Jan 29 10:45:52 2019 us=536558   key_pass_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=536558   show_tls_ciphers = DISABLED
Tue Jan 29 10:45:52 2019 us=536558   connect_retry_max = 0
Tue Jan 29 10:45:52 2019 us=541548 Connection profiles :
Tue Jan 29 10:45:52 2019 us=542047   proto = udp
Tue Jan 29 10:45:52 2019 us=542047   local = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=542047   local_port = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=542047   remote = '123.456.789.111'  
Tue Jan 29 10:45:52 2019 us=542047   remote_port = '1194'  
Tue Jan 29 10:45:52 2019 us=542047   remote_float = DISABLED
Tue Jan 29 10:45:52 2019 us=542047   bind_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=542546   bind_local = DISABLED
Tue Jan 29 10:45:52 2019 us=542546   bind_ipv6_only = DISABLED
Tue Jan 29 10:45:52 2019 us=542546   connect_retry_seconds = 5
Tue Jan 29 10:45:52 2019 us=542546   connect_timeout = 120
Tue Jan 29 10:45:52 2019 us=542546   socks_proxy_server = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=542546   socks_proxy_port = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=542546   tun_mtu = 1500
Tue Jan 29 10:45:52 2019 us=543046   tun_mtu_defined = ENABLED
Tue Jan 29 10:45:52 2019 us=543046   link_mtu = 1500
Tue Jan 29 10:45:52 2019 us=543046   link_mtu_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=543046   tun_mtu_extra = 0
Tue Jan 29 10:45:52 2019 us=543046   tun_mtu_extra_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=543547   mtu_discover_type = -1
Tue Jan 29 10:45:52 2019 us=544043   fragment = 0
Tue Jan 29 10:45:52 2019 us=544542   mssfix = 1450
Tue Jan 29 10:45:52 2019 us=545540   explicit_exit_notification = 0
Tue Jan 29 10:45:52 2019 us=546040 Connection profiles END
Tue Jan 29 10:45:52 2019 us=546539   remote_random = DISABLED
Tue Jan 29 10:45:52 2019 us=547537   ipchange = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=548036   dev = 'tun'  
Tue Jan 29 10:45:52 2019 us=548535   dev_type = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=549033   dev_node = 'OpenVPN'  
Tue Jan 29 10:45:52 2019 us=555523   lladdr = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=556520   topology = 1
Tue Jan 29 10:45:52 2019 us=557018   ifconfig_local = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=557518   ifconfig_remote_netmask = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=558516   ifconfig_noexec = DISABLED
Tue Jan 29 10:45:52 2019 us=558516   ifconfig_nowarn = DISABLED
Tue Jan 29 10:45:52 2019 us=559015   ifconfig_ipv6_local = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=559514   ifconfig_ipv6_netbits = 0
Tue Jan 29 10:45:52 2019 us=560013   ifconfig_ipv6_remote = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=560512   shaper = 0
Tue Jan 29 10:45:52 2019 us=560512   mtu_test = 0
Tue Jan 29 10:45:52 2019 us=561012   mlock = DISABLED
Tue Jan 29 10:45:52 2019 us=561511   keepalive_ping = 0
Tue Jan 29 10:45:52 2019 us=562009   keepalive_timeout = 0
Tue Jan 29 10:45:52 2019 us=562510   inactivity_timeout = 0
Tue Jan 29 10:45:52 2019 us=563009   ping_send_timeout = 0
Tue Jan 29 10:45:52 2019 us=563507   ping_rec_timeout = 0
Tue Jan 29 10:45:52 2019 us=564005   ping_rec_timeout_action = 0
Tue Jan 29 10:45:52 2019 us=567998   ping_timer_remote = DISABLED
Tue Jan 29 10:45:52 2019 us=568995   remap_sigusr1 = 0
Tue Jan 29 10:45:52 2019 us=569495   persist_tun = ENABLED
Tue Jan 29 10:45:52 2019 us=569495   persist_local_ip = DISABLED
Tue Jan 29 10:45:52 2019 us=569495   persist_remote_ip = DISABLED
Tue Jan 29 10:45:52 2019 us=569994   persist_key = ENABLED
Tue Jan 29 10:45:52 2019 us=570493   passtos = DISABLED
Tue Jan 29 10:45:52 2019 us=570992   resolve_retry_seconds = 1000000000
Tue Jan 29 10:45:52 2019 us=570992   resolve_in_advance = DISABLED
Tue Jan 29 10:45:52 2019 us=571491   username = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=571990   groupname = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=572489   chroot_dir = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=572988   cd_dir = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=573487   writepid = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=573487   up_script = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=573986   down_script = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=574485   down_pre = DISABLED
Tue Jan 29 10:45:52 2019 us=574984   up_restart = DISABLED
Tue Jan 29 10:45:52 2019 us=575484   up_delay = DISABLED
Tue Jan 29 10:45:52 2019 us=575484   daemon = DISABLED
Tue Jan 29 10:45:52 2019 us=575982   inetd = 0
Tue Jan 29 10:45:52 2019 us=576482   log = DISABLED
Tue Jan 29 10:45:52 2019 us=580474   suppress_timestamps = DISABLED
Tue Jan 29 10:45:52 2019 us=580973   machine_readable_output = DISABLED
Tue Jan 29 10:45:52 2019 us=581472   nice = 0
Tue Jan 29 10:45:52 2019 us=581971   verbosity = 5
Tue Jan 29 10:45:52 2019 us=582470   mute = 0
Tue Jan 29 10:45:52 2019 us=582969   gremlin = 0
Tue Jan 29 10:45:52 2019 us=583469   status_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=583469   status_file_version = 1
Tue Jan 29 10:45:52 2019 us=583968   status_file_update_freq = 60
Tue Jan 29 10:45:52 2019 us=584467   occ = ENABLED
Tue Jan 29 10:45:52 2019 us=584965   rcvbuf = 0
Tue Jan 29 10:45:52 2019 us=585465   sndbuf = 0
Tue Jan 29 10:45:52 2019 us=585465   sockflags = 0
Tue Jan 29 10:45:52 2019 us=585964   fast_io = DISABLED
Tue Jan 29 10:45:52 2019 us=586463   comp.alg = 2
Tue Jan 29 10:45:52 2019 us=586962   comp.flags = 1
Tue Jan 29 10:45:52 2019 us=587461   route_script = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=587960   route_default_gateway = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=587960   route_default_metric = 0
Tue Jan 29 10:45:52 2019 us=588459   route_noexec = DISABLED
Tue Jan 29 10:45:52 2019 us=592451   route_delay = 5
Tue Jan 29 10:45:52 2019 us=592951   route_delay_window = 30
Tue Jan 29 10:45:52 2019 us=592951   route_delay_defined = ENABLED
Tue Jan 29 10:45:52 2019 us=593450   route_nopull = DISABLED
Tue Jan 29 10:45:52 2019 us=593948   route_gateway_via_dhcp = DISABLED
Tue Jan 29 10:45:52 2019 us=594447   allow_pull_fqdn = DISABLED
Tue Jan 29 10:45:52 2019 us=594946   management_addr = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=594946   management_port = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=595446   management_user_pass = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=595945   management_log_history_cache = 250
Tue Jan 29 10:45:52 2019 us=596444   management_echo_buffer_size = 100
Tue Jan 29 10:45:52 2019 us=596943   management_write_peer_info_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=596943   management_client_user = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=597442   management_client_group = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=597941   management_flags = 0
Tue Jan 29 10:45:52 2019 us=598440   shared_secret_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=598939   key_direction = not set
Tue Jan 29 10:45:52 2019 us=599438   ciphername = 'AES-256-CBC'  
Tue Jan 29 10:45:52 2019 us=599937   ncp_enabled = ENABLED
Tue Jan 29 10:45:52 2019 us=600437   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'  
Tue Jan 29 10:45:52 2019 us=600437   authname = 'SHA1'  
Tue Jan 29 10:45:52 2019 us=604428   prng_hash = 'SHA1'  
Tue Jan 29 10:45:52 2019 us=604928   prng_nonce_secret_len = 16
Tue Jan 29 10:45:52 2019 us=605427   keysize = 0
Tue Jan 29 10:45:52 2019 us=605926   engine = DISABLED
Tue Jan 29 10:45:52 2019 us=606425   replay = ENABLED
Tue Jan 29 10:45:52 2019 us=606924   mute_replay_warnings = DISABLED
Tue Jan 29 10:45:52 2019 us=606924   replay_window = 64
Tue Jan 29 10:45:52 2019 us=607423   replay_time = 15
Tue Jan 29 10:45:52 2019 us=607922   packet_id_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=608421   use_iv = ENABLED
Tue Jan 29 10:45:52 2019 us=608920   test_crypto = DISABLED
Tue Jan 29 10:45:52 2019 us=608920   tls_server = DISABLED
Tue Jan 29 10:45:52 2019 us=609419   tls_client = ENABLED
Tue Jan 29 10:45:52 2019 us=609919   key_method = 2
Tue Jan 29 10:45:52 2019 us=610417   ca_file = 'ca.crt'  
Tue Jan 29 10:45:52 2019 us=610916   ca_path = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=610916   dh_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=611416   cert_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=611915   extra_certs_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=612413   priv_key_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=615906   pkcs12_file = 'C:\Program Files\OpenVPN\config\XX3XX.p12'  
Tue Jan 29 10:45:52 2019 us=616406   cryptoapi_cert = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=616906   cipher_list = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=617404   tls_cert_profile = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=617903   tls_verify = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=618402   tls_export_cert = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=618402   verify_x509_type = 0
Tue Jan 29 10:45:52 2019 us=618901   verify_x509_name = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=619400   crl_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=619899   ns_cert_type = 0
Tue Jan 29 10:45:52 2019 us=620399   remote_cert_ku[i] = 65535
Tue Jan 29 10:45:52 2019 us=620399   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=620898   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=621397   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=621895   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=622395   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=622395   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=622894   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=623393   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=623892   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=624391   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=624391   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=628884   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=628884   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=629383   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=629881   remote_cert_ku[i] = 0
Tue Jan 29 10:45:52 2019 us=630380   remote_cert_eku = 'TLS Web Server Authentication'  
Tue Jan 29 10:45:52 2019 us=630879   ssl_flags = 0
Tue Jan 29 10:45:52 2019 us=631378   tls_timeout = 2
Tue Jan 29 10:45:52 2019 us=631877   renegotiate_bytes = -1
Tue Jan 29 10:45:52 2019 us=631877   renegotiate_packets = 0
Tue Jan 29 10:45:52 2019 us=632376   renegotiate_seconds = 3600
Tue Jan 29 10:45:52 2019 us=632875   handshake_window = 60
Tue Jan 29 10:45:52 2019 us=633374   transition_window = 3600
Tue Jan 29 10:45:52 2019 us=633873   single_session = DISABLED
Tue Jan 29 10:45:52 2019 us=633873   push_peer_info = DISABLED
Tue Jan 29 10:45:52 2019 us=634372   tls_exit = DISABLED
Tue Jan 29 10:45:52 2019 us=634872   tls_auth_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=635370   tls_crypt_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=635870   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=636369   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=636369   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=636868   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=641155   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=641155   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=641655   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=642156   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=642653   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=643152   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=643651   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=644150   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=644150   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=645147   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=645645   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=645645   pkcs11_protected_authentication = DISABLED
Tue Jan 29 10:45:52 2019 us=646525   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=646525   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=647026   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=647526   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=648025   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=648524   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=649023   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=649023   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=649522   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=650021   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=654013   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=654512   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=655012   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=655510   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=655510   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=656010   pkcs11_private_mode = 00000000
Tue Jan 29 10:45:52 2019 us=656509   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=657007   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=657506   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=657506   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=658006   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=658504   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=659004   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=659502   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=659502   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=660002   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=660501   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=661000   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=661499   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=661499   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=661997   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=662497   pkcs11_cert_private = DISABLED
Tue Jan 29 10:45:52 2019 us=662996   pkcs11_pin_cache_period = -1
Tue Jan 29 10:45:52 2019 us=666988   pkcs11_id = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=667487   pkcs11_id_management = DISABLED
Tue Jan 29 10:45:52 2019 us=667986   server_network = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=668486   server_netmask = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=668486   server_network_ipv6 = ::
Tue Jan 29 10:45:52 2019 us=668985   server_netbits_ipv6 = 0
Tue Jan 29 10:45:52 2019 us=669484   server_bridge_ip = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=669983   server_bridge_netmask = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=670481   server_bridge_pool_start = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=670481   server_bridge_pool_end = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=670981   ifconfig_pool_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=671480   ifconfig_pool_start = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=671979   ifconfig_pool_end = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=672477   ifconfig_pool_netmask = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=672477   ifconfig_pool_persist_filename = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=672977   ifconfig_pool_persist_refresh_freq = 600
Tue Jan 29 10:45:52 2019 us=673476   ifconfig_ipv6_pool_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=673975   ifconfig_ipv6_pool_base = ::
Tue Jan 29 10:45:52 2019 us=674473   ifconfig_ipv6_pool_netbits = 0
Tue Jan 29 10:45:52 2019 us=674473   n_bcast_buf = 256
Tue Jan 29 10:45:52 2019 us=678467   tcp_queue_limit = 64
Tue Jan 29 10:45:52 2019 us=679157   real_hash_size = 256
Tue Jan 29 10:45:52 2019 us=679660   virtual_hash_size = 256
Tue Jan 29 10:45:52 2019 us=679660   client_connect_script = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=680159   learn_address_script = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=680657   client_disconnect_script = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=681156   client_config_dir = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=681655   ccd_exclusive = DISABLED
Tue Jan 29 10:45:52 2019 us=682154   tmp_dir = 'C:\Users\SASCHA~1.GRA\AppData\Local\Temp\'  
Tue Jan 29 10:45:52 2019 us=682154   push_ifconfig_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=682654   push_ifconfig_local = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=683153   push_ifconfig_remote_netmask = 0.0.0.0
Tue Jan 29 10:45:52 2019 us=683652   push_ifconfig_ipv6_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=683652   push_ifconfig_ipv6_local = ::/0
Tue Jan 29 10:45:52 2019 us=684151   push_ifconfig_ipv6_remote = ::
Tue Jan 29 10:45:52 2019 us=684650   enable_c2c = DISABLED
Tue Jan 29 10:45:52 2019 us=685149   duplicate_cn = DISABLED
Tue Jan 29 10:45:52 2019 us=685647   cf_max = 0
Tue Jan 29 10:45:52 2019 us=686147   cf_per = 0
Tue Jan 29 10:45:52 2019 us=686147   max_clients = 1024
Tue Jan 29 10:45:52 2019 us=686646   max_routes_per_client = 256
Tue Jan 29 10:45:52 2019 us=687145   auth_user_pass_verify_script = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=691138   auth_user_pass_verify_script_via_file = DISABLED
Tue Jan 29 10:45:52 2019 us=691637   auth_token_generate = DISABLED
Tue Jan 29 10:45:52 2019 us=692136   auth_token_lifetime = 0
Tue Jan 29 10:45:52 2019 us=692635   client = ENABLED
Tue Jan 29 10:45:52 2019 us=692635   pull = ENABLED
Tue Jan 29 10:45:52 2019 us=693134   auth_user_pass_file = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=693633   show_net_up = DISABLED
Tue Jan 29 10:45:52 2019 us=694132   route_method = 0
Tue Jan 29 10:45:52 2019 us=694631   block_outside_dns = DISABLED
Tue Jan 29 10:45:52 2019 us=694631   ip_win32_defined = DISABLED
Tue Jan 29 10:45:52 2019 us=695130   ip_win32_type = 3
Tue Jan 29 10:45:52 2019 us=695629   dhcp_masq_offset = 0
Tue Jan 29 10:45:52 2019 us=696128   dhcp_lease_time = 31536000
Tue Jan 29 10:45:52 2019 us=696626   tap_sleep = 0
Tue Jan 29 10:45:52 2019 us=696626   dhcp_options = DISABLED
Tue Jan 29 10:45:52 2019 us=697126   dhcp_renew = DISABLED
Tue Jan 29 10:45:52 2019 us=697625   dhcp_pre_release = DISABLED
Tue Jan 29 10:45:52 2019 us=698124   domain = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=698622   netbios_scope = '[UNDEF]'  
Tue Jan 29 10:45:52 2019 us=698622   netbios_node_type = 0
Tue Jan 29 10:45:52 2019 us=699122   disable_nbt = DISABLED
Tue Jan 29 10:45:52 2019 us=703115 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Tue Jan 29 10:45:52 2019 us=703614 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Jan 29 10:45:52 2019 us=704113 library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
Enter Private Key Password:
Tue Jan 29 10:46:01 2019 us=447622 LZO compression initializing
Tue Jan 29 10:46:01 2019 us=447622 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Tue Jan 29 10:46:01 2019 us=448121 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Tue Jan 29 10:46:01 2019 us=449120 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'  
Tue Jan 29 10:46:01 2019 us=449618 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'  
Tue Jan 29 10:46:01 2019 us=451116 TCP/UDP: Preserving recently used remote address: [AF_INET]123.456.789.111:1194
Tue Jan 29 10:46:01 2019 us=453111 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Jan 29 10:46:01 2019 us=453611 UDP link local: (not bound)
Tue Jan 29 10:46:01 2019 us=454609 UDP link remote: [AF_INET]123.456.789.111:1194
WWWW
Mitglied: 129580
129580 Jan 30, 2019 at 13:18:01 (UTC)
Goto Top
Hi,

hm seltsam. Schon mal im Log des OpenVPN Servers geschaut, ob es überhaupt eine Verbindung vom Client an den Server gab?

VG
Exception