Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- penvpn]# iptables -t nat -A POSTROUTING -s 10.8.0.0/24 ! -d 10.8.0.0/24 -j SNAT --to 213.166.70.25
- [root@vm1053630 openvpn]# service iptables save
- iptables: Saving firewall rules to /etc/sysconfig/iptables:[ OK ]
- [root@vm1053630 openvpn]# nano /etc/sysconfig/iptables
- [root@vm1053630 openvpn]# nano /etc/openvpn/server
- [root@vm1053630 openvpn]# nano /etc/openvpn/server.conf
- [root@vm1053630 openvpn]# nano /etc/openvpn/ipp.txt
- [root@vm1053630 openvpn]# sudo openvpn --config /root/client.ovpn
- Fri May 1 20:30:57 2020 Unrecognized option or missing or extra parameter(s) in /root/client.ovpn:14: block-outside-dns (2.4.8)
- Fri May 1 20:30:57 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov 1 2019
- Fri May 1 20:30:57 2020 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Fri May 1 20:30:57 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Fri May 1 20:30:57 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Fri May 1 20:30:57 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.166.70.25:13555
- Fri May 1 20:30:57 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
- Fri May 1 20:30:57 2020 UDP link local: (not bound)
- Fri May 1 20:30:57 2020 UDP link remote: [AF_INET]213.166.70.25:13555
- Fri May 1 20:30:57 2020 TLS: Initial packet from [AF_INET]213.166.70.25:13555, sid=71f6799f 32f2c99b
- Fri May 1 20:30:57 2020 VERIFY OK: depth=1, CN=ChangeMe
- Fri May 1 20:30:57 2020 VERIFY KU OK
- Fri May 1 20:30:57 2020 Validating certificate extended key usage
- Fri May 1 20:30:57 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri May 1 20:30:57 2020 VERIFY EKU OK
- Fri May 1 20:30:57 2020 VERIFY OK: depth=0, CN=server
- Fri May 1 20:30:57 2020 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri May 1 20:30:57 2020 [server] Peer Connection Initiated with [AF_INET]мой_внешний_ip:13555
- Fri May 1 20:30:58 2020 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Fri May 1 20:30:58 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Fri May 1 20:30:58 2020 OPTIONS IMPORT: timers and/or timeouts modified
- Fri May 1 20:30:58 2020 OPTIONS IMPORT: --ifconfig/up options modified
- Fri May 1 20:30:58 2020 OPTIONS IMPORT: route options modified
- Fri May 1 20:30:58 2020 OPTIONS IMPORT: route-related options modified
- Fri May 1 20:30:58 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Fri May 1 20:30:58 2020 OPTIONS IMPORT: peer-id set
- Fri May 1 20:30:58 2020 OPTIONS IMPORT: adjusting link_mtu to 1624
- Fri May 1 20:30:58 2020 OPTIONS IMPORT: data channel crypto options modified
- Fri May 1 20:30:58 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
- Fri May 1 20:30:58 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Fri May 1 20:30:58 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Fri May 1 20:30:58 2020 ROUTE_GATEWAY 213.166.70.1/255.255.255.0 IFACE=eth0 HWADDR=52:20:00:41:c7:01
- Fri May 1 20:30:58 2020 TUN/TAP device tun1 opened
- Fri May 1 20:30:58 2020 TUN/TAP TX queue length set to 100
- Fri May 1 20:30:58 2020 /sbin/ip link set dev tun1 up mtu 1500
- Fri May 1 20:30:58 2020 /sbin/ip addr add dev tun1 10.8.0.2/24 broadcast 10.8.0.255
- Fri May 1 20:30:58 2020 /sbin/ip route add 213.166.70.25/32 dev eth0
- Fri May 1 20:30:58 2020 /sbin/ip route add 0.0.0.0/1 via 10.8.0.1
- Fri May 1 20:30:58 2020 /sbin/ip route add 128.0.0.0/1 via 10.8.0.1
Add Comment
Please, Sign In to add comment