Okay so i'm slowly learning, wanting to enable a vpn, I have the vpnclient.ovpn (provided by provider) in /etc/openvpn
I have user pass in /etc/openvpn/vpnclient.auth
I have vpnclient instance which I can start and a vpnclient(tun0) interface, trouble is 0 pkts recieved or sent.
Here are logs
Wed Nov 7 21:53:56 2018 daemon.notice openvpn(vpnclient)[8341]: VERIFY OK: dept h=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=c hangeme, emailAddress=mail@host.domain
Wed Nov 7 21:53:57 2018 daemon.notice openvpn(vpnclient)[8341]: Control Channel : TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Nov 7 21:53:57 2018 daemon.notice openvpn(vpnclient)[8341]: [server] Peer C onnection Initiated with [AF_INET]46.101.59.8:1194
Wed Nov 7 21:53:58 2018 daemon.notice openvpn(vpnclient)[8341]: SENT CONTROL [s erver]: 'PUSH_REQUEST' (status=1)
Wed Nov 7 21:53:58 2018 daemon.notice openvpn(vpnclient)[8341]: AUTH: Received control message: AUTH_FAILED
Wed Nov 7 21:53:58 2018 daemon.notice openvpn(vpnclient)[8341]: SIGTERM[soft,au th-failure] received, process exiting
Wed Nov 7 21:53:58 2018 daemon.err openvpn(openvpn)[8342]: Options error: --nob ind doesn't make sense unless used with --remote
Wed Nov 7 21:53:58 2018 daemon.warn openvpn(openvpn)[8342]: Use --help for more information.
Wed Nov 7 21:54:03 2018 daemon.notice openvpn(vpnclient)[8343]: OpenVPN 2.4.5 m ips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed Nov 7 21:54:03 2018 daemon.notice openvpn(vpnclient)[8343]: library version s: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
Wed Nov 7 21:54:03 2018 daemon.warn openvpn(vpnclient)[8343]: WARNING: No serve r certificate verification method has been enabled. See http://openvpn.net/howt o.html#mitm for more info.
Wed Nov 7 21:54:03 2018 daemon.notice openvpn(vpnclient)[8343]: TCP/UDP: Preser ving recently used remote address: [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:03 2018 daemon.notice openvpn(vpnclient)[8343]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Wed Nov 7 21:54:03 2018 daemon.notice openvpn(vpnclient)[8343]: UDP link local: (not bound)
Wed Nov 7 21:54:03 2018 daemon.notice openvpn(vpnclient)[8343]: UDP link remote : [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:03 2018 daemon.notice openvpn(vpnclient)[8343]: TLS: Initial pa cket from [AF_INET]46.101.59.8:1194, sid=dc51f72d 71d53ac6
Wed Nov 7 21:54:03 2018 daemon.notice openvpn(vpnclient)[8343]: VERIFY OK: dept h=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=changeme, name =changeme, emailAddress=mail@host.domain
Wed Nov 7 21:54:03 2018 daemon.notice openvpn(vpnclient)[8343]: VERIFY OK: dept h=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=c hangeme, emailAddress=mail@host.domain
Wed Nov 7 21:54:03 2018 daemon.err openvpn(openvpn)[8344]: Options error: --nob ind doesn't make sense unless used with --remote
Wed Nov 7 21:54:03 2018 daemon.warn openvpn(openvpn)[8344]: Use --help for more information.
Wed Nov 7 21:54:04 2018 daemon.notice openvpn(vpnclient)[8343]: Control Channel : TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Nov 7 21:54:04 2018 daemon.notice openvpn(vpnclient)[8343]: [server] Peer C onnection Initiated with [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:05 2018 daemon.notice openvpn(vpnclient)[8343]: SENT CONTROL [s erver]: 'PUSH_REQUEST' (status=1)
Wed Nov 7 21:54:05 2018 daemon.notice openvpn(vpnclient)[8343]: AUTH: Received control message: AUTH_FAILED
Wed Nov 7 21:54:05 2018 daemon.notice openvpn(vpnclient)[8343]: SIGTERM[soft,au th-failure] received, process exiting
Wed Nov 7 21:54:08 2018 daemon.err openvpn(openvpn)[8345]: Options error: --nob ind doesn't make sense unless used with --remote
Wed Nov 7 21:54:08 2018 daemon.warn openvpn(openvpn)[8345]: Use --help for more information.
Wed Nov 7 21:54:10 2018 daemon.notice openvpn(vpnclient)[8346]: OpenVPN 2.4.5 m ips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed Nov 7 21:54:10 2018 daemon.notice openvpn(vpnclient)[8346]: library version s: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
Wed Nov 7 21:54:10 2018 daemon.warn openvpn(vpnclient)[8346]: WARNING: No serve r certificate verification method has been enabled. See http://openvpn.net/howt o.html#mitm for more info.
Wed Nov 7 21:54:10 2018 daemon.notice openvpn(vpnclient)[8346]: TCP/UDP: Preser ving recently used remote address: [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:10 2018 daemon.notice openvpn(vpnclient)[8346]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Wed Nov 7 21:54:10 2018 daemon.notice openvpn(vpnclient)[8346]: UDP link local: (not bound)
Wed Nov 7 21:54:10 2018 daemon.notice openvpn(vpnclient)[8346]: UDP link remote : [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:10 2018 daemon.notice openvpn(vpnclient)[8346]: TLS: Initial pa cket from [AF_INET]46.101.59.8:1194, sid=2375e87b 14ec9486
Wed Nov 7 21:54:10 2018 daemon.notice openvpn(vpnclient)[8346]: VERIFY OK: dept h=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=changeme, name =changeme, emailAddress=mail@host.domain
Wed Nov 7 21:54:10 2018 daemon.notice openvpn(vpnclient)[8346]: VERIFY OK: dept h=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=c hangeme, emailAddress=mail@host.domain
Wed Nov 7 21:54:11 2018 daemon.notice openvpn(vpnclient)[8346]: Control Channel : TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Nov 7 21:54:11 2018 daemon.notice openvpn(vpnclient)[8346]: [server] Peer C onnection Initiated with [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:13 2018 daemon.notice openvpn(vpnclient)[8346]: SENT CONTROL [s erver]: 'PUSH_REQUEST' (status=1)
Wed Nov 7 21:54:13 2018 daemon.notice openvpn(vpnclient)[8346]: AUTH: Received control message: AUTH_FAILED
Wed Nov 7 21:54:13 2018 daemon.notice openvpn(vpnclient)[8346]: SIGTERM[soft,au th-failure] received, process exiting
Wed Nov 7 21:54:13 2018 daemon.err openvpn(openvpn)[8347]: Options error: --nob ind doesn't make sense unless used with --remote
Wed Nov 7 21:54:13 2018 daemon.warn openvpn(openvpn)[8347]: Use --help for more information.
Wed Nov 7 21:54:18 2018 daemon.notice openvpn(vpnclient)[8348]: OpenVPN 2.4.5 m ips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed Nov 7 21:54:18 2018 daemon.notice openvpn(vpnclient)[8348]: library version s: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
Wed Nov 7 21:54:18 2018 daemon.warn openvpn(vpnclient)[8348]: WARNING: No serve r certificate verification method has been enabled. See http://openvpn.net/howt o.html#mitm for more info.
Wed Nov 7 21:54:18 2018 daemon.notice openvpn(vpnclient)[8348]: TCP/UDP: Preser ving recently used remote address: [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:18 2018 daemon.notice openvpn(vpnclient)[8348]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Wed Nov 7 21:54:18 2018 daemon.notice openvpn(vpnclient)[8348]: UDP link local: (not bound)
Wed Nov 7 21:54:18 2018 daemon.notice openvpn(vpnclient)[8348]: UDP link remote : [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:18 2018 daemon.notice openvpn(vpnclient)[8348]: TLS: Initial pa cket from [AF_INET]46.101.59.8:1194, sid=b0d0829b dae6b52f
Wed Nov 7 21:54:18 2018 daemon.notice openvpn(vpnclient)[8348]: VERIFY OK: dept h=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=changeme, name =changeme, emailAddress=mail@host.domain
Wed Nov 7 21:54:18 2018 daemon.notice openvpn(vpnclient)[8348]: VERIFY OK: dept h=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=c hangeme, emailAddress=mail@host.domain
Wed Nov 7 21:54:18 2018 daemon.err openvpn(openvpn)[8349]: Options error: --nob ind doesn't make sense unless used with --remote
Wed Nov 7 21:54:18 2018 daemon.warn openvpn(openvpn)[8349]: Use --help for more information.
Wed Nov 7 21:54:19 2018 daemon.notice openvpn(vpnclient)[8348]: Control Channel : TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Nov 7 21:54:19 2018 daemon.notice openvpn(vpnclient)[8348]: [server] Peer C onnection Initiated with [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:20 2018 daemon.notice openvpn(vpnclient)[8348]: SENT CONTROL [s erver]: 'PUSH_REQUEST' (status=1)
Wed Nov 7 21:54:20 2018 daemon.notice openvpn(vpnclient)[8348]: AUTH: Received control message: AUTH_FAILED
Wed Nov 7 21:54:20 2018 daemon.notice openvpn(vpnclient)[8348]: SIGTERM[soft,au th-failure] received, process exiting
Wed Nov 7 21:54:23 2018 daemon.err openvpn(openvpn)[8350]: Options error: --nob ind doesn't make sense unless used with --remote
Wed Nov 7 21:54:23 2018 daemon.warn openvpn(openvpn)[8350]: Use --help for more information.
Wed Nov 7 21:54:25 2018 daemon.notice openvpn(vpnclient)[8351]: OpenVPN 2.4.5 m ips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Wed Nov 7 21:54:25 2018 daemon.notice openvpn(vpnclient)[8351]: library version s: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
Wed Nov 7 21:54:25 2018 daemon.warn openvpn(vpnclient)[8351]: WARNING: No serve r certificate verification method has been enabled. See http://openvpn.net/howt o.html#mitm for more info.
Wed Nov 7 21:54:25 2018 daemon.notice openvpn(vpnclient)[8351]: TCP/UDP: Preser ving recently used remote address: [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:25 2018 daemon.notice openvpn(vpnclient)[8351]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Wed Nov 7 21:54:25 2018 daemon.notice openvpn(vpnclient)[8351]: UDP link local: (not bound)
Wed Nov 7 21:54:25 2018 daemon.notice openvpn(vpnclient)[8351]: UDP link remote : [AF_INET]46.101.59.8:1194
Wed Nov 7 21:54:25 2018 daemon.notice openvpn(vpnclient)[8351]: TLS: Initial pa cket from [AF_INET]46.101.59.8:1194, sid=2d318295 44caf531
Wed Nov 7 21:54:25 2018 daemon.notice openvpn(vpnclient)[8351]: VERIFY OK: dept h=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=changeme, name =changeme, emailAddress=mail@host.domain
Wed Nov 7 21:54:25 2018 daemon.notice openvpn(vpnclient)[8351]: VERIFY OK: dept h=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=c hangeme, emailAddress=mail@host.domain
opvn file starts like so certificate section removed
client
dev tun
proto udp
remote 46.101.59.8 1194
resolv-retry infinite
nobind
tun-mtu 1500
tun-mtu-extra 32
mssfix 1450
persist-key
persist-tun
auth-user-pass
comp-lzo
reneg-sec 0
verb 3
<ca>
-----BEGIN CERTIFICATE-----