Hi all!
I am trying to use BlackVPN using my custom image of OpenWRT as suggested in this post:
Install OpenWrt on Archer c50.
It worked flawlessly. However, when following the BlackVPN guide at BlackVPN I am getting lots of errors.
First of all, I used my created image that is named as follows:
openwrt ramips mt76x8 tplink c50 v4 squashfs sysupgrade
Then I had to install the Chaos Calmer version 15.05.1 from ramips - t7628 - packages - luci
And finally, I am running the OpenVPN version using "force-depends" because the Kernel wasn't compatible...
I am getting errors and I got the following LOG...Hope someone can help me out, as BlackVPN support crew told me to look around here.
Fri Apr 5 16:30:34 2019 daemon.notice openvpn(blackvpn)[13506]: UDP link remote: [AF_INET]
Fri Apr 5 16:30:35 2019 daemon.notice openvpn(blackvpn)[13506]: TLS: Initial packet from [AF_INET][93.190.141.187:443, sid=dab041be ba60cf74
Fri Apr 5 16:30:35 2019 daemon.warn openvpn(blackvpn)[13506]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Apr 5 16:30:35 2019 daemon.notice openvpn(blackvpn)[13506]: VERIFY OK: depth=1, C=HK, ST=HK, L=HongKong, O=blackVPN, CN=blackVPN CA, emailAddress=[staff@blackvpn.com]
Fri Apr 5 16:30:35 2019 daemon.notice openvpn(blackvpn)[13506]: VERIFY OK: depth=0, C=HK, ST=HK, L=HongKong, O=blackVPN, CN=nl, emailAddress=[staff@blackvpn.com]
Fri Apr 5 16:30:35 2019 daemon.notice openvpn(blackvpn)[13506]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Apr 5 16:30:35 2019 daemon.notice openvpn(blackvpn)[13506]: [nl] Peer Connection Initiated with [AF_INET](http://93.190.141.187:443/)
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: SENT CONTROL [nl]: 'PUSH_REQUEST' (status=1)
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 172.17.63.1,route 172.17.63.1,topology net30,ping 10,ping-restart 60,ifconfig 172.17.63.214 172.17.63.213,peer-id 3,cipher AES-256-GCM'
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: OPTIONS IMPORT: timers and/or timeouts modified
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: OPTIONS IMPORT: --ifconfig/up options modified
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: OPTIONS IMPORT: route options modified
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: OPTIONS IMPORT: peer-id set
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: OPTIONS IMPORT: adjusting link_mtu to 1625
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: OPTIONS IMPORT: data channel crypto options modified
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Apr 5 16:30:36 2019 daemon.err openvpn(blackvpn)[13506]: ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2)
Fri Apr 5 16:30:36 2019 daemon.notice openvpn(blackvpn)[13506]: Exiting due to fatal error
Fri Apr 5 16:30:42 2019 daemon.notice openvpn(blackvpn)[13645]: OpenVPN 2.4.7 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Apr 5 16:30:42 2019 daemon.notice openvpn(blackvpn)[13645]: library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
Fri Apr 5 16:30:42 2019 daemon.warn openvpn(blackvpn)[13645]: WARNING: using --pull/--client and --ifconfig together is probably not what you want
Fri Apr 5 16:30:42 2019 daemon.warn openvpn(blackvpn)[13645]: WARNING: No server certificate verification method has been enabled. See openvpn. net howto #mitm for more info.
Fri Apr 5 16:30:42 2019 daemon.notice openvpn(blackvpn)[13645]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Apr 5 16:30:42 2019 daemon.notice openvpn(blackvpn)[13645]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Apr 5 16:30:42 2019 daemon.notice openvpn(blackvpn)[13645]: TCP/UDP: Preserving recently used remote address: [AF_INET][93.190.141.187:443]
Fri Apr 5 16:30:42 2019 daemon.notice openvpn(blackvpn)[13645]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Fri Apr 5 16:30:42 2019 daemon.notice openvpn(blackvpn)[13645]: UDP link local: (not bound)
Fri Apr 5 16:30:42 2019 daemon.notice openvpn(blackvpn)[13645]: UDP link remote: [AF_INET][93.190.141.187:443]