ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Internet access through OpenVPN

    Scheduled Pinned Locked Moved IT Discussion
    openvpnvpnubuntulinux
    14 Posts 2 Posters 3.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      Okay, so port 946 is what we need to have open. It is definitely listening for something, so that is a good start.

      1 Reply Last reply Reply Quote 0
      • AmbarishrhA
        Ambarishrh
        last edited by

        I am just trying to figure out what firewall is being used in this box. OpenVPN client connects without me opening any ports. Its only that the client that is connected is not routing internet through the VPN

        1 Reply Last reply Reply Quote 0
        • AmbarishrhA
          Ambarishrh
          last edited by

          And its the port 1194- for openvpn. 946 is the PID.
          7-1-2015 11-27-00 AM.png

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller
            last edited by

            Oh yeah, 4am here. Haven't had much sleep for days. Pretty blurry here.

            1 Reply Last reply Reply Quote 0
            • AmbarishrhA
              Ambarishrh
              last edited by

              All ok now? And I think you really need some rest!

              1 Reply Last reply Reply Quote 0
              • AmbarishrhA
                Ambarishrh
                last edited by Ambarishrh

                Ok the command I was typing for ufw was wrong!
                root@openvpn:~# ufw --help

                ufw.png
                root@openvpn:~# ufw disable
                Firewall stopped and disabled on system startup
                root@openvpn:~# ufw status
                Status: inactive

                1 Reply Last reply Reply Quote 0
                • AmbarishrhA
                  Ambarishrh
                  last edited by

                  On syslog, I could see that the connection starts, and also see the openvpn sending the defaults set on the server.conf
                  Jul 1 04:16:53 openvpn ovpn-server[1518]: openvpn/80.227.101.130:27531 MULTI: primary virtual IP for openvpn/80.227.101.130:27531: 10.8.0.6
                  Jul 1 04:16:55 openvpn ovpn-server[1518]: openvpn/80.227.101.130:27531 PUSH: Received control message: 'PUSH_REQUEST'
                  Jul 1 04:16:55 openvpn ovpn-server[1518]: openvpn/80.227.101.130:27531 send_push_reply(): safe_cap=960
                  Jul 1 04:16:55 openvpn ovpn-server[1518]: openvpn/80.227.101.130:27531 SENT CONTROL [openvpn]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
                  Jul 1 04:16:55 openvpn ovpn-server[1518]: openvpn/80.227.101.130:27531 Bad LZO decompression header byte: 96
                  Jul 1 04:16:57 ovpn-server[1518]: last message repeated 4 times
                  Jul 1 04:16:57 openvpn ovpn-server[1518]: openvpn/80.227.101.130:27531 Bad LZO decompression header byte: 69
                  Jul 1 04:16:58 ovpn-server[1518]: last message repeated 11 times
                  Jul 1 04:16:58 openvpn ovpn-server[1518]: openvpn/80.227.101.130:27531 Bad LZO decompression header byte: 96
                  Jul 1 04:16:59 openvpn ovpn-server[1518]: openvpn/80.227.101.130:27531 Bad LZO decompression header byte: 69
                  Jul 1 04:17:00 ovpn-server[1518]: last message repeated 6 times

                  1 Reply Last reply Reply Quote 0
                  • AmbarishrhA
                    Ambarishrh
                    last edited by Ambarishrh

                    That error is gone after commenting comp-lzo on server.conf

                    Enable compression on the VPN link.

                    If you enable it here, you must also

                    enable it in the client config file.

                    ;comp-lzo

                    But still trying to figure out routing internet through vpn

                    1 Reply Last reply Reply Quote 0
                    • AmbarishrhA
                      Ambarishrh
                      last edited by

                      Fixed!

                      All i had to do is to add the IPtables entry
                      iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -j SNAT --to xxx.xx.xx.xx (ServerIP)

                      Now connected and internet routing through VPN 🙂

                      1 Reply Last reply Reply Quote 1
                      • AmbarishrhA
                        Ambarishrh
                        last edited by

                        Now I need to save this to load the rule on start up and checking on it now!

                        1 Reply Last reply Reply Quote 1
                        • AmbarishrhA
                          Ambarishrh
                          last edited by

                          Found it.
                          First run the iptables entry
                          iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -j SNAT --to xxx.xx.xx.xx

                          Then run sudo apt-get install iptables-persistent, and follow the prompts. When it asks to save the current rules, hit "Yes" at both prompts. Now, on reboots, your iptables rules will be restored.
                          All done, working fine! 🙂

                          1 Reply Last reply Reply Quote 1
                          • 1 / 1
                          • First post
                            Last post