openvpn.vpnserver.proto='udp4'
also didn't help. I still cannot ping 192.168.200.1 or 192.168.1.1.
I also tried tcp instead of udp, but no change...
Client config is:
verb 7
nobind
dev tun
client
remote x.de 1194 udp
fast-io
compress lzo
auth-nocache
remote-cert-tls server
<tls-crypt>
-----BEGIN OpenVPN Static key V1-----
...
-----END OpenVPN Static key V1-----
</tls-crypt>
<ca>
-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
...
-----END ENCRYPTED PRIVATE KEY-----
</key>
new log:
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: OpenVPN 2.4.5 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: Diffie-Hellman initialized with 2048 bit key
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: TLS-Auth MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: TUN/TAP device tun0 opened
Sun Jan 13 12:45:09 2019 daemon.notice openvpn(vpnserver)[8755]: TUN/TAP TX queue length set to 100
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: /sbin/ifconfig tun0 192.168.200.1 pointopoint 192.168.200.2 mtu 1500
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: /sbin/route add -net 192.168.200.0 netmask 255.255.255.0 gw 192.168.200.2
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: UDPv4 link local (bound): [AF_INET][undef]:1194
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: UDPv4 link remote: [AF_UNSPEC]
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: MULTI: multi_init called, r=256 v=256
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: IFCONFIG POOL: base=192.168.200.4 size=62, ipv6=0
Sun Jan 13 12:45:10 2019 daemon.notice openvpn(vpnserver)[8755]: Initialization Sequence Completed
Sun Jan 13 12:45:35 2019 daemon.notice openvpn(vpnserver)[8755]: MULTI: multi_create_instance called
Sun Jan 13 12:45:35 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 Re-using SSL/TLS context
Sun Jan 13 12:45:35 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 LZO compression initializing
Sun Jan 13 12:45:35 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Jan 13 12:45:35 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sun Jan 13 12:45:35 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Sun Jan 13 12:45:35 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Sun Jan 13 12:45:35 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 TLS: Initial packet from [AF_INET]109.41.64.x:31820, sid=9fb60ccf 2b068445
Sun Jan 13 12:45:36 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
Sun Jan 13 12:45:36 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 VERIFY OK: depth=0, CN=vpnclient
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_VER=3.2
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_PLAT=ios
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_NCP=2
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_TCPNL=1
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_PROTO=2
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_LZO_STUB=1
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_COMP_STUB=1
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_COMP_STUBv2=1
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_AUTO_SESS=1
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 peer info: IV_BS64DL=1
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: 109.41.64.x:31820 [vpnclient] Peer Connection Initiated with [AF_INET]109.41.64.x:31820
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: vpnclient/109.41.64.x:31820 MULTI_sva: pool returned IPv4=192.168.200.6, IPv6=(Not enabled)
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: vpnclient/109.41.64.x:31820 MULTI: Learn: 192.168.200.6 -> vpnclient/109.41.64.x:31820
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: vpnclient/109.41.64.x:31820 MULTI: primary virtual IP for vpnclient/109.41.64.x:31820: 192.168.200.6
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: vpnclient/109.41.64.x:31820 PUSH: Received control message: 'PUSH_REQUEST'
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: vpnclient/109.41.64.x:31820 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route 192.168.200.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 192.168.200.6 192.168.200.5,peer-id 0,cipher AES-256-GCM' (status=1)
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: vpnclient/109.41.64.x:31820 Data Channel: using negotiated cipher 'AES-256-GCM'
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: vpnclient/109.41.64.x:31820 Data Channel MTU parms [ L:1550 D:1450 EF:50 EB:406 ET:0 EL:3 ]
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: vpnclient/109.41.64.x:31820 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Jan 13 12:45:37 2019 daemon.notice openvpn(vpnserver)[8755]: vpnclient/109.41.64.x:31820 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
my iphone openvpn app statistics show that tunneled packets go out, but no tunneled packets come in.