I'm attempting to connect to a company vpn. I have 3 machines running:
OSX: connects fine via tunnelblick
Windows: connects fine via OpenVPN client gui
ArchLinux: using openvpn, authenticates succeeds, but does not allow me to access the company LAN, or at least not web traffic.
I've disabled both router and computer firewalls with no success.
All 3 machines are using this config:
Code:
auth SHA256
auth-nocache
auth-user-pass
ca /etc/openvpn/client/ca.crt
cipher AES-256-CBC
client
dev tun
hand-window 15
mute 20
mute-replay-warnings
nobind
persist-key
persist-tun
remote vpn.myvpn.io 1194 udp
remote vpn.myvpn.io 443 tcp-client
remote-cert-tls server
resolv-retry infinite
tls-crypt /etc/openvpn/client/tc.key
verb 3
verify-x509-name *.myvpn.io name
Code:
sudo openvpn /etc/openvpn/client/client.conf
yields
Code:
Tue Apr 16 13:49:14 2019 WARNING: file '/etc/openvpn/client/tc.key' is group or others accessible
Tue Apr 16 13:49:14 2019 OpenVPN 2.4.7 [git:makepkg/2b8aec62d5db2c17+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
Tue Apr 16 13:49:14 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
Enter Auth Username: dan
Enter Auth Password: ****************
Tue Apr 16 13:49:17 2019 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Tue Apr 16 13:49:17 2019 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Apr 16 13:49:17 2019 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Tue Apr 16 13:49:17 2019 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Apr 16 13:49:17 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]52.2.209.3:1194
Tue Apr 16 13:49:17 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Apr 16 13:49:17 2019 UDP link local: (not bound)
Tue Apr 16 13:49:17 2019 UDP link remote: [AF_INET]52.2.209.3:1194
Tue Apr 16 13:49:17 2019 TLS: Initial packet from [AF_INET]52.2.209.3:1194, sid=d26b565d 82d80d65
Tue Apr 16 13:49:17 2019 VERIFY OK: depth=2, C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA
Tue Apr 16 13:49:17 2019 VERIFY OK: depth=1, C=BE, O=GlobalSign nv-sa, CN=AlphaSSL CA - SHA256 - G2
Tue Apr 16 13:49:17 2019 VERIFY KU OK
Tue Apr 16 13:49:17 2019 Validating certificate extended key usage
Tue Apr 16 13:49:17 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects
TLS Web Server Authentication
Tue Apr 16 13:49:17 2019 VERIFY EKU OK
Tue Apr 16 13:49:17 2019 VERIFY X509NAME OK: OU=Domain Control Validated, CN=*.myvpn.io
Tue Apr 16 13:49:17 2019 VERIFY OK: depth=0, OU=Domain Control Validated, CN=*.myvpn.io
Tue Apr 16 13:49:18 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Tue Apr 16 13:49:18 2019 [*.mpvpn.io] Peer Connection Initiated with [AF_INET]52.2.209.3:1194
Tue Apr 16 13:49:19 2019 SENT CONTROL [*.myvpn.io]: 'PUSH_REQUEST' (status=1)
Tue Apr 16 13:49:19 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 172.20.0.2,dhcp-option DOMAIN myvpn.io,route 10.0.80.0 255.255.255.128,route 10.106.157.0 255.255.255.240,route 10.106.196.64 255.255.255.192,route 10.32.16.0 255.255.255.248,route 10.32.180.128 255.255.255.248,route 10.32.20.48 255.255.255.248,route 10.32.80.128 255.255.255.192,route 172.20.0.0 255.255.0.0,route 172.23.16.0 255.255.254.0,route-gateway 172.23.1.1,topology subnet,ping 10,ping-restart 120,ifconfig 172.23.1.24 255.255.255.128,peer-id 12,cipher AES-256-GCM'
Tue Apr 16 13:49:19 2019 OPTIONS IMPORT: timers and/or timeouts modified
Tue Apr 16 13:49:19 2019 OPTIONS IMPORT: --ifconfig/up options modified
Tue Apr 16 13:49:19 2019 OPTIONS IMPORT: route options modified
Tue Apr 16 13:49:19 2019 OPTIONS IMPORT: route-related options modified
Tue Apr 16 13:49:19 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Apr 16 13:49:19 2019 OPTIONS IMPORT: peer-id set
Tue Apr 16 13:49:19 2019 OPTIONS IMPORT: adjusting link_mtu to 1624
Tue Apr 16 13:49:19 2019 OPTIONS IMPORT: data channel crypto options modified
Tue Apr 16 13:49:19 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 16 13:49:19 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 16 13:49:19 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 16 13:49:19 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp3s0 HWADDR=30:9c:23:1b:07:0d
Tue Apr 16 13:49:19 2019 TUN/TAP device tun0 opened
Tue Apr 16 13:49:19 2019 TUN/TAP TX queue length set to 100
Tue Apr 16 13:49:19 2019 /usr/bin/ip link set dev tun0 up mtu 1500
Tue Apr 16 13:49:19 2019 /usr/bin/ip addr add dev tun0 172.23.1.24/25 broadcast 172.23.1.127
Tue Apr 16 13:49:19 2019 /usr/bin/ip route add 10.0.80.0/25 via 172.23.1.1
Tue Apr 16 13:49:19 2019 /usr/bin/ip route add 10.106.157.0/28 via 172.23.1.1
Tue Apr 16 13:49:19 2019 /usr/bin/ip route add 10.106.196.64/26 via 172.23.1.1
Tue Apr 16 13:49:19 2019 /usr/bin/ip route add 10.32.16.0/29 via 172.23.1.1
Tue Apr 16 13:49:19 2019 /usr/bin/ip route add 10.32.180.128/29 via 172.23.1.1
Tue Apr 16 13:49:19 2019 /usr/bin/ip route add 10.32.20.48/29 via 172.23.1.1
Tue Apr 16 13:49:19 2019 /usr/bin/ip route add 10.32.80.128/26 via 172.23.1.1
Tue Apr 16 13:49:19 2019 /usr/bin/ip route add 172.20.0.0/16 via 172.23.1.1
Tue Apr 16 13:49:19 2019 /usr/bin/ip route add 172.23.16.0/23 via 172.23.1.1
Tue Apr 16 13:49:19 2019 Initialization Sequence Completed
Thanks in advance for any help!