I cannot seem to get the client to work (not sure if I need the server plugin or not). Basically I just want to have all internet connections on my unraid box go through a VPN I have through usenetserver. I attached the ovpn file that I have selected in the settings.
Does anyone have any advice in how I can get this working? I've been spending many hours trying other options with docker containers in getting openvpn to work and nothing seems to work. I really think this is the cleanest option, so any help in pointing me in the right direction would be greatly appreciated!
I did verify I am using the right username/password set on the settings page.
Here are my log files:
Thu Apr 9 09:42:57 2015 OpenVPN 2.3.6 x86_64-slackware-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on Dec 10 2014
Thu Apr 9 09:42:57 2015 library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.03
Thu Apr 9 09:42:57 2015 WARNING: file '/boot/config/plugins/openvpnclient/password.txt' is group or others accessible
Thu Apr 9 09:42:57 2015 Socket Buffers: R=[212992->131072] S=[212992->131072]
Thu Apr 9 09:42:57 2015 UDPv4 link local: [undef]
Thu Apr 9 09:42:57 2015 UDPv4 link remote: [AF_INET]173.245.202.3:1194
Thu Apr 9 09:42:57 2015 TLS: Initial packet from [AF_INET]173.245.202.3:1194, sid=d7e393c0 e1108365
Thu Apr 9 09:42:57 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Apr 9 09:42:58 2015 VERIFY OK: depth=1, C=US, ST=VPN, L=VPN, O=VPN, OU=VPN, CN=VPN, name=VPN, emailAddress=VPN
Thu Apr 9 09:42:58 2015 Validating certificate key usage
Thu Apr 9 09:42:58 2015 ++ Certificate has key usage 00a0, expects 00a0
Thu Apr 9 09:42:58 2015 VERIFY KU OK
Thu Apr 9 09:42:58 2015 Validating certificate extended key usage
Thu Apr 9 09:42:58 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Apr 9 09:42:58 2015 VERIFY EKU OK
Thu Apr 9 09:42:58 2015 VERIFY OK: depth=0, C=US, ST=VPN, L=VPN, O=VPN, OU=VPN, CN=vpn, name=VPN
Thu Apr 9 09:43:04 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Apr 9 09:43:04 2015 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Thu Apr 9 09:43:04 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Apr 9 09:43:04 2015 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Thu Apr 9 09:43:04 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Thu Apr 9 09:43:04 2015 [vpn] Peer Connection Initiated with [AF_INET]173.245.202.3:1194
Thu Apr 9 09:43:06 2015 SENT CONTROL [vpn]: 'PUSH_REQUEST' (status=1)
Thu Apr 9 09:43:06 2015 AUTH: Received control message: AUTH_FAILED
Thu Apr 9 09:43:06 2015 SIGTERM[soft,auth-failure] received, process exiting
default via 192.168.1.1 dev eth0 metric 206
127.0.0.0/8 dev lo scope link
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.42.1
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.131
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.131 metric 206
192.168.1.131 via 127.0.0.1 dev lo metric 206
default via 192.168.1.1 dev eth0 metric 206
127.0.0.0/8 dev lo scope link
172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.42.1
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.131
192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.131 metric 206
192.168.1.131 via 127.0.0.1 dev lo metric 206
chi-a04.txt