I am not able to connect to my VPN server successfully, please help.
Most of the steps, I am following this guide,
http://www.howtogeek.com/60774/conne...pn-and-tomato/
Server Log
iptable of my VPN Server
Most of the steps, I am following this guide,
http://www.howtogeek.com/60774/conne...pn-and-tomato/
Server Log
Quote:
Sep 25 08:39:59 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:8683 Sep 25 08:39:59 openvpn[25399]: 116.226.231.34:8683 TLS: Initial packet from [AF_INET]116.226.231.34:8683, sid=24399a2d a364bc2f Sep 25 08:40:23 openvpn[25399]: 116.226.231.34:8683 VERIFY OK: depth=1, C=CN, ST=HK, L=HongKong, O=CCH, CN=CCH, emailAddress=bearchui@gmail.com Sep 25 08:40:23 openvpn[25399]: 116.226.231.34:8683 VERIFY OK: depth=0, C=CN, ST=HK, O=CCH, CN=adam, emailAddress=bearchui@gmail.com Sep 25 08:40:26 openvpn[25399]: 116.226.231.34:8683 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key Sep 25 08:40:26 openvpn[25399]: 116.226.231.34:8683 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sep 25 08:40:26 openvpn[25399]: 116.226.231.34:8683 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key Sep 25 08:40:26 openvpn[25399]: 116.226.231.34:8683 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Sep 25 08:40:27 openvpn[25399]: 116.226.231.34:8683 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA Sep 25 08:40:27 openvpn[25399]: 116.226.231.34:8683 [adam] Peer Connection Initiated with [AF_INET]116.226.231.34:8683 Sep 25 08:40:27 openvpn[25399]: adam/116.226.231.34:8683 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled) Sep 25 08:40:27 openvpn[25399]: adam/116.226.231.34:8683 MULTI: Learn: 10.8.0.6 -> adam/116.226.231.34:8683 Sep 25 08:40:27 openvpn[25399]: adam/116.226.231.34:8683 MULTI: primary virtual IP for adam/116.226.231.34:8683: 10.8.0.6 Sep 25 08:40:28 openvpn[25399]: adam/116.226.231.34:8683 PUSH: Received control message: 'PUSH_REQUEST' Sep 25 08:40:28 openvpn[25399]: adam/116.226.231.34:8683 send_push_reply(): safe_cap=940 Sep 25 08:40:28 openvpn[25399]: adam/116.226.231.34:8683 SENT CONTROL [adam]: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 10.8.0.1,topology net30,ping 15,ping-restart 60,ifconfig 10.8.0.6 10.8.0.5' (status=1) Sep 25 08:41:00 openvpn[25399]: adam/116.226.231.34:8683 read TCPv4_SERVER: Connection timed out (code=145) Sep 25 08:41:00 openvpn[25399]: adam/116.226.231.34:8683 Connection reset, restarting [0] Sep 25 08:41:00 openvpn[25399]: adam/116.226.231.34:8683 SIGUSR1[soft,connection-reset] received, client-instance restarting Sep 25 08:41:43 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:8820 Sep 25 08:41:43 openvpn[25399]: 116.226.231.34:8820 TLS: Initial packet from [AF_INET]116.226.231.34:8820, sid=52a7fa46 e301ee06 Sep 25 08:42:34 openvpn[25399]: 116.226.231.34:8820 VERIFY OK: depth=1, C=CN, ST=HK, L=HongKong, O=CCH, CN=CCH, emailAddress=bearchui@gmail.com Sep 25 08:42:34 openvpn[25399]: 116.226.231.34:8820 VERIFY OK: depth=0, C=CN, ST=HK, O=CCH, CN=adam, emailAddress=bearchui@gmail.com Sep 25 08:42:43 openvpn[25399]: 116.226.231.34:8820 Connection reset, restarting [0] Sep 25 08:42:43 openvpn[25399]: 116.226.231.34:8820 SIGUSR1[soft,connection-reset] received, client-instance restarting Sep 25 08:42:48 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:8894 Sep 25 08:42:48 openvpn[25399]: 116.226.231.34:8894 TLS: Initial packet from [AF_INET]116.226.231.34:8894, sid=111cc2af eb95fe4a Sep 25 08:43:05 openvpn[25399]: 116.226.231.34:8894 VERIFY OK: depth=1, C=CN, ST=HK, L=HongKong, O=CCH, CN=CCH, emailAddress=bearchui@gmail.com Sep 25 08:43:05 openvpn[25399]: 116.226.231.34:8894 VERIFY OK: depth=0, C=CN, ST=HK, O=CCH, CN=adam, emailAddress=bearchui@gmail.com Sep 25 08:43:48 openvpn[25399]: 116.226.231.34:8894 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Sep 25 08:43:48 openvpn[25399]: 116.226.231.34:8894 TLS Error: TLS handshake failed Sep 25 08:43:48 openvpn[25399]: 116.226.231.34:8894 Fatal TLS error (check_tls_errors_co), restarting Sep 25 08:43:48 openvpn[25399]: 116.226.231.34:8894 SIGUSR1[soft,tls-error] received, client-instance restarting Sep 25 08:44:20 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:8985 Sep 25 08:44:20 openvpn[25399]: 116.226.231.34:8985 TLS: Initial packet from [AF_INET]116.226.231.34:8985, sid=d713a149 f90e8d07 Sep 25 08:45:20 openvpn[25399]: 116.226.231.34:8985 Connection reset, restarting [-1] Sep 25 08:45:20 openvpn[25399]: 116.226.231.34:8985 SIGUSR1[soft,connection-reset] received, client-instance restarting Sep 25 08:45:29 openvpn[25399]: TCP connection established with [AF_INET]116.226.231.34:9096 Sep 25 08:45:29 openvpn[25399]: 116.226.231.34:9096 TLS: Initial packet from [AF_INET]116.226.231.34:9096, sid=334f0cef 07312ce1 Sep 25 08:46:29 openvpn[25399]: 116.226.231.34:9096 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Sep 25 08:46:29 openvpn[25399]: 116.226.231.34:9096 TLS Error: TLS handshake failed Sep 25 08:46:29 openvpn[25399]: 116.226.231.34:9096 Fatal TLS error (check_tls_errors_co), restarting Sep 25 08:46:29 openvpn[25399]: 116.226.231.34:9096 SIGUSR1[soft,tls-error] received, client-instance restarting |
Quote:
Chain INPUT (policy ACCEPT) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ACCEPT tcp -- anywhere anywhere tcp dpt:1194 ACCEPT all -- anywhere anywhere ACCEPT tcp -- anywhere anywhere tcp dpt:1194 DROP all -- anywhere anywhere state INVALID ACCEPT all -- anywhere anywhere state RELATED,ESTAB LISHED ACCEPT all -- anywhere anywhere state NEW DROP tcp -- anywhere anywhere tcp dpt:5916 ACCEPT all -- anywhere anywhere state NEW ACCEPT udp -- anywhere anywhere udp spt:bootps dpt: bootpc ACCEPT tcp -- anywhere router.asus.com tcp dpt:www ACCEPT tcp -- anywhere router.asus.com tcp dpt:8443 ACCEPT tcp -- anywhere anywhere tcp dpt:8082 ACCEPT tcp -- anywhere anywhere tcp dpt:https ACCEPT tcp -- anywhere anywhere tcp dpt:1723 ACCEPT gre -- anywhere anywhere DROP all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/S YN TCPMSS clamp to PMTU ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTAB LISHED DROP all -- anywhere anywhere DROP all -- anywhere anywhere state INVALID ACCEPT all -- anywhere anywhere DROP icmp -- anywhere anywhere ACCEPT all -- anywhere anywhere ctstate DNAT ACCEPT all -- anywhere anywhere Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain FUPNP (0 references) target prot opt source destination ACCEPT tcp -- anywhere 192.168.1.2 tcp dpt:51413 Chain PControls (0 references) target prot opt source destination ACCEPT all -- anywhere anywhere Chain logaccept (0 references) target prot opt source destination LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `ACCEPT ' ACCEPT all -- anywhere anywhere Chain logdrop (0 references) target prot opt source destination LOG all -- anywhere anywhere state NEW LOG level warning tcp-sequence tcp-options ip-options prefix `DROP' DROP all -- anywhere anywhere |