chrisroane

Members
  • Posts

    5
  • Joined

  • Last visited

Converted

  • Gender
    Undisclosed

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

chrisroane's Achievements

Noob

Noob (1/14)

0

Reputation

  1. Thanks for the info. I may just pay with a different vpn service. Thanks for pointing this out though! I would hate for my unraid box to get hacked.
  2. I cannot seem to get the client to work (not sure if I need the server plugin or not). Basically I just want to have all internet connections on my unraid box go through a VPN I have through usenetserver. I attached the ovpn file that I have selected in the settings. Does anyone have any advice in how I can get this working? I've been spending many hours trying other options with docker containers in getting openvpn to work and nothing seems to work. I really think this is the cleanest option, so any help in pointing me in the right direction would be greatly appreciated! I did verify I am using the right username/password set on the settings page. Here are my log files: Thu Apr 9 09:42:57 2015 OpenVPN 2.3.6 x86_64-slackware-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on Dec 10 2014 Thu Apr 9 09:42:57 2015 library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.03 Thu Apr 9 09:42:57 2015 WARNING: file '/boot/config/plugins/openvpnclient/password.txt' is group or others accessible Thu Apr 9 09:42:57 2015 Socket Buffers: R=[212992->131072] S=[212992->131072] Thu Apr 9 09:42:57 2015 UDPv4 link local: [undef] Thu Apr 9 09:42:57 2015 UDPv4 link remote: [AF_INET]173.245.202.3:1194 Thu Apr 9 09:42:57 2015 TLS: Initial packet from [AF_INET]173.245.202.3:1194, sid=d7e393c0 e1108365 Thu Apr 9 09:42:57 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Thu Apr 9 09:42:58 2015 VERIFY OK: depth=1, C=US, ST=VPN, L=VPN, O=VPN, OU=VPN, CN=VPN, name=VPN, emailAddress=VPN Thu Apr 9 09:42:58 2015 Validating certificate key usage Thu Apr 9 09:42:58 2015 ++ Certificate has key usage 00a0, expects 00a0 Thu Apr 9 09:42:58 2015 VERIFY KU OK Thu Apr 9 09:42:58 2015 Validating certificate extended key usage Thu Apr 9 09:42:58 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Apr 9 09:42:58 2015 VERIFY EKU OK Thu Apr 9 09:42:58 2015 VERIFY OK: depth=0, C=US, ST=VPN, L=VPN, O=VPN, OU=VPN, CN=vpn, name=VPN Thu Apr 9 09:43:04 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Apr 9 09:43:04 2015 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication Thu Apr 9 09:43:04 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Apr 9 09:43:04 2015 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication Thu Apr 9 09:43:04 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Thu Apr 9 09:43:04 2015 [vpn] Peer Connection Initiated with [AF_INET]173.245.202.3:1194 Thu Apr 9 09:43:06 2015 SENT CONTROL [vpn]: 'PUSH_REQUEST' (status=1) Thu Apr 9 09:43:06 2015 AUTH: Received control message: AUTH_FAILED Thu Apr 9 09:43:06 2015 SIGTERM[soft,auth-failure] received, process exiting default via 192.168.1.1 dev eth0 metric 206 127.0.0.0/8 dev lo scope link 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.42.1 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.131 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.131 metric 206 192.168.1.131 via 127.0.0.1 dev lo metric 206 default via 192.168.1.1 dev eth0 metric 206 127.0.0.0/8 dev lo scope link 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.42.1 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.131 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.131 metric 206 192.168.1.131 via 127.0.0.1 dev lo metric 206 chi-a04.txt