Thanks. I tried remiving that line but still no go. Here all my logs and config files.. Beware long post!!
openwrt openvpn config, /etc/config/openvpn
config openvpn 'vpnserver'
option enabled '1'
option dev_type 'tun'
option dev 'ovpns0'
option port '1194'
option comp_lzo 'no'
option keepalive '10 120'
option persist_key '1'
option persist_tun '1'
option ca '/etc/openvpn/ca.crt'
option cert '/etc/openvpn/my-server.crt'
option key '/etc/openvpn/my-server.key'
option dh '/etc/openvpn/dh2048.pem'
option tls_auth '/etc/openvpn/tls-auth.key 0'
option mode 'server'
option tls_server '1'
option server '192.168.200.0 255.255.255.0'
option topology 'subnet'
option route_gateway 'dhcp'
option log '/tmp/openvpn.log'
option client_to_client '1'
list push 'comp-lzo yes'
list push 'persist-key'
list push 'persist-tun'
list push 'topology subnet'
list push 'redirect-gateway def1'
list push 'route 192.168.200.0 255.255.255.0'
list push 'dhcp-option DNS 10.0.0.1'
list push 'dhcp-option DNS 192.168.1.1'
Client side config file my-server.ovpn
client
dev tun
proto udp # Warning : Sometimes u need to declare udp4 or udp6
fast-io
remote my_dynamic_dns 1194
remote-cert-tls server
nobind
persist-key
persist-tun
comp-lzo no
verb 3
key-direction 1
<ca>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
-----BEGIN OpenVPN Static key V1-----
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
-----END OpenVPN Static key V1-----
</tls-auth>
client
dev tun
proto udp # Warning : Sometimes u need to declare udp4 or udp6
fast-io
remote my_dynamic_dns 1194
remote-cert-tls server
nobind
persist-key
persist-tun
comp-lzo no
verb 3
key-direction 1
<ca>
-----BEGIN CERTIFICATE-----
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
-----END CERTIFICATE-----
openwrt Router firewall
root@OpenWrt:/# cat /etc/config/firewall
config defaults
option syn_flood '1'
option output 'ACCEPT'
option forward 'REJECT'
option input 'DROP'
config zone
option name 'lan'
option input 'ACCEPT'
option output 'ACCEPT'
option forward 'ACCEPT'
option network 'lan'
config zone
option name 'wan'
option forward 'DROP'
option output 'ACCEPT'
option masq '1'
option network 'wan wan6'
option mtu_fix '1'
option input 'DROP'
config rule
option name 'Allow-DHCP-Renew'
option src 'wan'
option proto 'udp'
option dest_port '68'
option target 'ACCEPT'
option family 'ipv4'
config rule
option name 'Allow-Ping'
option src 'wan'
option proto 'icmp'
option icmp_type 'echo-request'
option family 'ipv4'
option target 'ACCEPT'
option enabled '0'
config rule
option name 'Allow-IGMP'
option src 'wan'
option proto 'igmp'
option family 'ipv4'
option target 'ACCEPT'
config rule
option name 'Allow-DHCPv6'
option src 'wan'
option proto 'udp'
option src_ip 'fc00::/6'
option dest_ip 'fc00::/6'
option dest_port '546'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-MLD'
option src 'wan'
option proto 'icmp'
option src_ip 'fe80::/10'
list icmp_type '130/0'
list icmp_type '131/0'
list icmp_type '132/0'
list icmp_type '143/0'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Input'
option src 'wan'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
list icmp_type 'router-solicitation'
list icmp_type 'neighbour-solicitation'
list icmp_type 'router-advertisement'
list icmp_type 'neighbour-advertisement'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-ICMPv6-Forward'
option src 'wan'
option dest '*'
option proto 'icmp'
list icmp_type 'echo-request'
list icmp_type 'echo-reply'
list icmp_type 'destination-unreachable'
list icmp_type 'packet-too-big'
list icmp_type 'time-exceeded'
list icmp_type 'bad-header'
list icmp_type 'unknown-header-type'
option limit '1000/sec'
option family 'ipv6'
option target 'ACCEPT'
config rule
option name 'Allow-IPSec-ESP'
option src 'wan'
option dest 'lan'
option proto 'esp'
option target 'ACCEPT'
config rule
option name 'Allow-ISAKMP'
option src 'wan'
option dest 'lan'
option dest_port '500'
option target 'ACCEPT'
option proto 'udp'
config include
option path '/etc/firewall.user'
config forwarding
option dest 'wan'
option src 'lan'
config rule
option name 'Allow-OpenVPN-Inbound'
option target 'ACCEPT'
option src '*'
option dest_port '1194'
option proto 'tcp udp'
config zone
option name 'vpnserver'
option input 'ACCEPT'
option output 'ACCEPT'
option masq '1'
option network 'vpnserver'
option forward 'REJECT'
config forwarding
option src 'vpnserver'
option dest 'wan'
config forwarding
option src 'vpnserver'
option dest 'lan'
Server side log when the client connects:
Note that i've tried setting "comp-lzo" to no and even removing that line from server and client side config files, but the message remains in the server side log.
I have been unable to figure out how to set MTU. I tried using both the "mssfix" and "tun-mtu" to set the mtu value but with either of those in the config file, the server does not even start.
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_GUI_VER=OC30Android
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_VER=3.2
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_PLAT=android
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_NCP=2
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_TCPNL=1
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_PROTO=2
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_LZO=1
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_LZO_SWAP=1
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_LZ4=1
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_LZ4v2=1
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_COMP_STUB=1
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_COMP_STUBv2=1
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_AUTO_SESS=1
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 peer info: IV_BS64DL=1
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1541', remote='link-mtu 1542'
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Mon Jun 18 19:53:53 2018 204.48.78.161:53918 [my-client] Peer Connection Initiated with [AF_INET]204.48.78.161:53918
Mon Jun 18 19:53:53 2018 MULTI_sva: pool returned IPv4=192.168.200.2, IPv6=(Not enabled)
Mon Jun 18 19:54:02 2018 my-client/204.48.78.161:53918 IP packet with unknown IP version=15 seen
Client side log. Openvpn Android app
19:53:51.737 -- ----- OpenVPN Start -----
19:53:51.738 -- EVENT: CORE_THREAD_ACTIVE
19:53:51.739 -- Frame=512/2048/512 mssfix-ctrl=1250
19:53:51.747 -- UNUSED OPTIONS
0 [client]
1 [dev] [tun]
2 [proto] [udp]
3 [fast-io]
5 [remote-cert-tls] [server]
6 [nobind]
7 [persist-key]
8 [persist-tun]
9 [comp-lzo] [no]
10 [verb] [3]
11 [key-direction] [1]
13 [cert] [Certificate: Data: Version: 3 (0x2) Serial N...]
14 [key] [-----BEGIN PRIVATE KEY----- MIIJQwIBADANBgkqxxxxxxxxxxxxxxxx...]
15 [tls-auth] [# # 2048 bit OpenVPN static key # -----BEGIN OpenVPN Static key ...]
19 [fast-io]
22 [nobind]
23 [persist-key]
24 [persist-tun]
26 [verb] [3]
19:53:51.748 -- EVENT: RESOLVE
19:53:51.752 -- Contacting my_dynamic_dns_IP:1194 via UDP
19:53:51.752 -- EVENT: WAIT
19:53:51.755 -- Connecting to [my_dynamic_dns_hostname]:1194 (my_dynamic_dns_IP) via UDPv4
19:53:51.821 -- EVENT: CONNECTING
19:53:51.824 -- Tunnel Options:V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client
19:53:51.825 -- Creds: UsernameEmpty/PasswordEmpty
19:53:51.825 -- Peer Info:
IV_GUI_VER=OC30Android
IV_VER=3.2
IV_PLAT=android
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_LZ4v2=1
IV_COMP_STUB=1
IV_COMP_STUBv2=1
IV_AUTO_SESS=1
IV_BS64DL=1
19:53:52.201 -- VERIFY OK : depth=1
cert. version : 3
serial number : DF:BC:CD:87:B6:2E:69:EB
issuer name : C=GB, ST=London, O=WWW Ltd.
subject name : C=GB, ST=London, O=WWW Ltd.
issued on : 2018-06-17 14:45:37
expires on : 2028-06-14 14:45:37
signed using : RSA with SHA-256
RSA key size : 4096 bits
basic constraints : CA=true
19:53:52.203 -- VERIFY OK : depth=0
cert. version : 3
serial number : 10:00
issuer name : C=GB, ST=London, O=WWW Ltd.
subject name : CN=my-server
issued on : 2018-06-17 14:45:54
expires on : 2028-06-14 14:45:54
signed using : RSA with SHA-256
RSA key size : 4096 bits
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication
19:53:52.624 -- SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
19:53:52.626 -- Session is ACTIVE
19:53:52.627 -- EVENT: GET_CONFIG
19:53:52.631 -- Sending PUSH_REQUEST to server...
19:53:52.668 -- OPTIONS:
0 [comp-lzo] [yes]
1 [persist-key]
2 [persist-tun]
3 [topology] [subnet]
4 [redirect-gateway] [def1]
5 [route] [192.168.200.0] [255.255.255.0]
6 [dhcp-option] [DNS] [10.0.0.1]
7 [dhcp-option] [DNS] [192.168.1.1]
8 [route-gateway] [192.168.200.1]
9 [topology] [subnet]
10 [ping] [10]
11 [ping-restart] [120]
12 [ifconfig] [192.168.200.2] [255.255.255.0]
13 [peer-id] [0]
14 [cipher] [AES-256-GCM]
19:53:52.669 -- PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: SHA1
compress: LZO
peer ID: 0
19:53:52.669 -- EVENT: ASSIGN_IP
19:53:52.772 -- Connected via tun
19:53:52.773 -- LZO-ASYM init swap=0 asym=0
19:53:52.774 -- EVENT: CONNECTED info='@my_dynamic_dns_hostname:1194 (my_dynamic_dns_IP) via /UDPv4 on tun/192.168.200.2/ gw=[192.168.200.1/]' trans=TO_CONNECTED
19:54:01.550 -- EVENT: DISCONNECTED trans=TO_DISCONNECTED
19:54:01.553 -- EVENT: CORE_THREAD_INACTIVE
19:54:01.553 -- Tunnel bytes per CPU second: 0
19:54:01.553 -- ----- OpenVPN Stop -----
Route on the server side:
10.0.0.x is the internal LAN
192.168.200.x is the openvpn network.
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 74.58.65.1 0.0.0.0 UG 0 0 0 eth1.2
10.0.0.0 0.0.0.0 255.255.255.0 U 0 0 0 br-lan
74.58.65.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1.2
192.168.200.0 0.0.0.0 255.255.255.0 U 0 0 0 ovpns0