[email protected]
Members-
Posts
14 -
Joined
-
Last visited
Content Type
Profiles
Forums
Downloads
Store
Gallery
Bug Reports
Documentation
Landing
Everything posted by [email protected]
-
How to install utilities in terminal
[email protected] replied to [email protected]'s topic in General Support
Thanks a lot! -
How to install utilities in terminal
[email protected] replied to [email protected]'s topic in General Support
So my ultimate goal is trying to run "git pull" in the directory "mnt/cahce/Auto/nzbToMedia" but I get "git: command not found". Please tell me what I'm missing. Thanks in advance! -
Hi, This is a super basic question, but I ssh into my server but when I am in the command line, I cannot use commands like git, pip, or python. What is the process of installing these utilities? Thanks!
-
No, I can't really verify that all traffic is going though the vpn. However I want to make sure that as much of it is going though it since I will have to go to a place where there is a web filter. I want to make sure I do everything I can to make sure I can access my home network since once I get there since I won't come back(to my home network to change vpn settings) for a couple months. The only thing is know is that port 80 and port 443 are open. Any suggestions to improve my chances? Thanks again,
-
So I didn't understand the 3rd code block, I currently have this: remote [WAN IP] cipher aes-256-cbc auth sha512 client dev tun proto udp port 80 resolv-retry infinite tls-client nobind persist-key persist-tun remote-cert-tls server tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-DHE-RSA-WITH-AES-128-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA comp-lzo adaptive verb 3 route-delay 2 key-direction 1 Should I do this? remote [WAN IP] cipher aes-256-cbc auth sha512 client dev tun proto udp port 80 resolv-retry infinite tls-client nobind persist-key persist-tun remote-cert-tls server tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-DHE-RSA-WITH-AES-128-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA comp-lzo adaptive verb 3 route-delay 2 key-direction 1 redirect-gateway def1 push "dhcp-option DNS 10.8.0.1" push "dhcp-option DNS 192.168.3.111" push "dhcp-option DNS 192.168.3.1" push "dhcp-option DNS 8.8.8.8" or should I only add one of the lines with push "dhcp-option DNS ....." Thanks,
-
Hi Again Peter, I just noticed that whenever I connect to the openvpn server, it docent change my ip address on sites like "whatismyipadress.com". I read on other sites that whenever you connect to a openvpn server it is supposed to change your ip address to the same one as your home network. Also I tried reinstalling the plugin but that doesn't seem to help. Please help, Thanks!
-
Yes I am using the inline file, I just cut out the certificate part in the last post. Here is the whole inline client file: remote WANIP cipher aes-256-cbc auth sha512 client dev tun proto udp port 1194 resolv-retry infinite tls-client nobind persist-key persist-tun remote-cert-tls server tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-DHE-RSA-WITH-AES-128-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA comp-lzo adaptive verb 3 route-delay 2 key-direction 1 <ca> -----BEGIN CERTIFICATE----- MIIDNTCCAh2gAwIBAgIJAOeT5fx1t6eTMA0GCSqGSIb3DQEBCwUAMBYxFDASBgNV BAMMC0Vhc3ktUlNBIENBMB4XDTE2MDgxNTEzMjA0NVoXDTI2MDgxMzEzMjA0NVow FjEUMBIGA1UEAwwLRWFzeS1SU0EgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw ggEKAoIBAQDb/W+HZu9Gn2WaGiWfHuGlFjJ7OfCyWNPqVlhOImyrdnHpJ1qKyRLo llK9NtdnQKrNm9RuuYpQfekEPbPfzjcED6lol0JhzAQdafevXTlZm7IO25P18meLuY/ OfFO2ab+vLvcBnscvZ/nnQ+GMEMEeqoDOpFsEDlPOXKoWJ5IjHJuTe4kzod1YWVp 6jQk5Mubjiounn66YbuRCxcyjoMfMNHaMdjzIMVNxThjpEulEaexlXF2i6BWbbj3 6jqU01R+47HxTpgJEwN+pE1p0aiG8aoKQDiSz0wcSom8bb2gcQ/9MIXUBx5MB5zv DMz6+KtgIP1Fj9PtIvNbUZ9woRnRIfLTAgMBAAGjgYUwgYIwHQYDVR0OBBYEFKg3 ooJzBkeUk6YvSvVJRnJxEYGA1UdIwQ/MD2AFKg3ooJzBkeUk6YvSvVJRnJx xMRjoRqkGDAWMRQwEgYDVQQDDAtFYXN5LVJTQSBDQYIJAOeT5fx1t6eTMAwGA1Ud EwQFMAMBAf8wCwYDVR0PBAQDAgEGMA0GCSqGSIb3DQEBCwUAA4IBAQA5NbtkonV9 J8+N7ebQby/GBajcJCGTtRaXQwQ8E1IRx9qm4SJfnBV1dsAQge2P0k7hEx5+nsHM dnloEL46ctTPRjB8EpAsgQVVWMVmzbJmb41vgLdknVIM4NDjBIpKo4wC1TAi0uAG drCGNvhyIDLCL8jOuO5GxydAg2w0qlmJ7ImC+QKOvtwlT4lc1pRX9aDd2LeYa7Xf Ginv2DUajYPmJUo2GoDmmIZVt0fBVuaysKNE5vdW+QLyjBVGcbmHxfr/Ax4wQ0oA Xtwg5osmG/036ZLzWsHPXgyPr5fxRmz5h7keETAJcBU/M4Kdr6yIHrELLZl1cqtq WqVGAD8stNJL -----END CERTIFICATE----- </ca> <cert> -----BEGIN CERTIFICATE----- MIIDTzCCAjegAwIBAgIQR5lbeNuWIGFtwOLw5VuSiTANBgkqhkiG9w0BAQsFADAW MRQwEgYDVQQDDAtFYXN5LVJTQSBDQTAeFw0xNjA4MTUxMzIxMjZaFw0yNjA4MTMx MzIxMjZaMBcxFTATBgNVBAMMDGtvaG1thZG95YTCCASIwDQYJKoZIhvcNAQEB BQADggEPADCCAQoCggEBALbUdPjCKS4by/ALYHDjeUHGj82eIP8utjKJL1pqu2o3 rJUs0zOeeeLaIQracuf4ieeBfnpk5ltyKilH/HypUCSMjACvvTn/v9DZudW07ESwG 64l0kGGe52WEcI4YeyJDkiC6gIELeK43eWJ86Ed4Jjd0CZYLu9+2cObJK8zQx4RP I5buHwq+ytPC0gAGYsOtxBtXJkAQAlUUk4BncprosXl8zB68F7ThZj5XX2rcBujM PD5EicsKLzBd1k8HWSFTwtaaQwFxpN7T/CwYzknSZDWKyz588haXZFFhbISmnHWV 2JV6aio374QPjvPIjX7eht/2yRXiOlFyGs8yiWMKtJMCAwEAAaOBlzCBlDAJBgNV HRMEAjAAMB0GA1UdDgQWBBTnOad0NMiVV2E0VH713mk6cpMCUDBGBgNVHSMEPzA9 gBSoN6KCcwZHlJOmL0r1SUZyccTEY6EapBgwFjEUMBIGA1UEAwwLRWFzeS1SU0Eg Q0GCCQDnk+X8dbenkzATBgNVHSUEDDAKBggrBgEFBQcDAjALBgNVHQ8EBAMCB4Aw DQYJKoZIhvcNAQELBQADggEBAEXf0TwPaVKUxbT7vqqyg8DwtetnBIytuRYeMA/+ /WHXHiJDwtEIeGMhzvNkQA00Or7CtXdBQ9GlEKnDS9++Q0Xd3Ko/cU9UA8/OFkTK u4zqXW9dlrIoh3JCkAyX+O3Tqzt1S9cLwACJc+JZhmQWjX8xkmhcKNT2mUUW7kr9 uYBIPZ1xMbA1QiIolc2hRtZxVIHd7Hzg9SOaBggOQsLsZoBnedEoXWRtFCD4PWcY tT77sDIqDQYvoAJOiep95wPcdHStFfxwtIwsiIu4zVEeQephLZlq53H03f+sW3g5 CEUbsMxiT1YGFELO0KkG+ebMz/3cBmhfXohxq7VMPvFN9E8= -----END CERTIFICATE----- </cert> <key> -----BEGIN PRIVATE KEY----- MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQC21HT4wikuG8vw C2Bw43lBxo/NniD/LrYyiS9aartqN6yVLNMznnni2iEK2nLn+InngX56ZOZbcioh /x8qVAkjIwAr705/7/Q2bnVtOxEsBuuJdJBhnudlhHCOGHsiQ5IguoCBC3iuN3li fOhHeCY3dAmWC7vSvM0MeETyOW7h8KvsrTwtIABmLDrcQbVyZAEAJVFJOA Z3Ka6LF5fMwevBe04WY+V19q3AbozDw+RInLCi8wXdZPB1khU8LWmkMBcaTe0/ws GM5J0mQ1iss+fPIWl2RRYWyEppx1ldiVemoqN++ED47zyI1+3obf9skV4jpRchrP MoljCrSTAgMBAAECggEBAKQjh0RRZBEeKXA/dnzC6/jOYAo0feE7OZ2TJe0hx1Ir 24gtrws3qqusM2AAEIsLyhsKWddeQKU2kHbnCT7CJVXjNWM8PBiF/5TihA/lqJwD NnC4MmtB8vJj/XzEo792NHmnlnjEKLsX2KVACHUpe/3q8jRAIpJMw32ee/EsOwMf V1wx3hqg06piBYc9StYHxdn+y0KjmCISB55jzsBJQQOKFYIRgz0oH3onWXcRyfOH r5kZNzpHbDiYBA1hkC+Xz5uCrUaB8J8klolrZZMV6kjWOOfYK2+8tiEgr/Y5Au4oezc +SqU1x7TEHcRMaXYVkba16f5LzOGdyLOGhZVtXUpa4ECgYEA7dJMoVqh9vU3Q2tm icoyFj8UaYHwGWioE5UiyXZAf5AKs5pryiw4vM5Po5N0QTHFSw9yt1cLTLdw2qNA dfTWmiVH4xLE9HbLcQ5VQEgTbyVNXEcHM8av8tpWLi7y0dcaf6Ijs9J1Dy0JlO+o XvqrjuTgKAizXtwxnATB7nI9IMECgYEAxM4UiNiadQwHDUfY7ZRZn9Vxt+KT9xVJ qZzkR/D9I2gTrcTHLxq2NUgykRLWxmjjlvPlEK3Ti+Z++muoZ/l0vArXqhBdCxyE G9bmPtV4VyKb1xlCmWD3l83z0o/l/HdjdLqyg/E3Sl+R+K4g0QD46Tf6Ht3LGVLh 3903IAIIllMCgYEAiCKIwRiLfD1dsf0bABvytJWh4uGWLsLwM+63rLRHfe2Bg9jQNpV d36G3/VNezpuIt+lq0jlhvOpwTmEvXMT9DG6IrTSiLZ2zeWuoUHuJQTdMxNsTDVQ dx/2GhNHn9o6H0p9nbAntcj0P0KtqHbjr7LYP8zeT6xjWRq8vy2uAZudSEECgYAj nwFMe5gJU3H7T2POLKnEKkf49oO9lxbMIl+XPeEzhWT6cMF0nysXnce5RmWlZ9q5 uc9eI3hEvCWDgfTrTNV6K6Q5XdjZaAHpYA4wlUbAzrzSQ/ov9MMbsOVO2UjRV3Ki 8B/bjc9qIL40+p9p9PkYjU8yQwa9wKitckbF/lg7jQKBgG8hvV/nsagP5Fe31Tir 3TiXIpQi7wdSaaHJtGPru6KBprgfPgVfDRb4l1riuLixFq7Px6tm8iYSiRUTpOgD szuVitUgAL6i8sS2QYozgJdLIzOK2u9EGpKRAJAlfCOz4QgQNRYLW0oVgXriet3F EYK9LC3v1P7hgAFhfRM6ZhOS -----END PRIVATE KEY----- </key> <tls-auth> -----BEGIN OpenVPN Static key V1----- 0c5fd51289dc64fa6b787e58c3c98645 6622d546c59b2ca4e6d44d00893d6689 3679f2001b7f9ed1be81cf21c5bf494c 9b33a91772d1c0ecd5b7ca72a4383ed8 2217e80033de617036cbd231e01ed8cf bc4c85db99072963f61387ef202a62e2 ba47e4c5d7ff3168fcd777431e8ce9bd f7932709be01f5a7130627b8c8b4ac13 7e24c0d0f37b653fb56f02578ea3b518 076edc1d6242174148fde6b36962b36e 8dc51b38e93245aa395fb92ca624f 6f919ce7a5e48cd58a5ab6dbbad55063 006aaadeaf4eb560e0531ca2a70fc877 8583fe4e74c907b87d8426ae1571a228 f3b48f5f78f4b60ea1ef11e185fc327f 7004a46dd157d43c3e0090ddb39867ca -----END OpenVPN Static key V1----- </tls-auth> Here are the server logs: Wed Aug 17 15:21:23 2016 OpenVPN 2.3.11 x86_64-slackware-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on May 10 2016 Wed Aug 17 15:21:23 2016 library versions: OpenSSL 1.0.1s 1 Mar 2016, LZO 2.03 Wed Aug 17 15:21:23 2016 Diffie-Hellman initialized with 2048 bit key openvpn: symbol lookup error: openvpn: undefined symbol: SSL_CTX_get0_certificate part 2 (server logs) default via 192.168.3.1 dev eth0 metric 1 127.0.0.0/8 dev lo scope link 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.42.1 192.168.3.0/24 dev eth0 proto kernel scope link src 192.168.3.111 and the clients logs from my iPhone: Its a big long so here is pasebin link: http://pastebin.com/8jdnYdpL Otherwise my post is over 20000 words. Thanks again EDIT: I saw that my iOS app was associating my wan ip with a DDNS web address that i used before (which docent exits anymore) so I deleted the app and tried connecting again. Here are the logs: http://pastebin.com/S1DXBpgR
-
Hi, Here is the file, server 10.8.0.0 255.255.255.0 local 192.168.3.111 dev tun port 1194 proto udp dh /mnt/user/Automation/docker/apps/vpnserver/dh.pem ca /mnt/user/Automation/docker/apps/vpnserver/ca.crt cert /mnt/user/Automation/docker/apps/vpnserver/server.crt key /mnt/user/Automation/docker/apps/vpnserver/server.key ifconfig-pool-persist /boot/config/plugins/openvpnserver/ipp.txt push "dhcp-option DNS 8.8.8.8" tls-server verb 3 tls-version-min 1.2 tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-DHE-RSA-WITH-AES-128-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA tls-auth /mnt/user/Automation/docker/apps/vpnserver/ta.key 0 persist-key persist-tun keepalive 10 120 user nobody group users cipher aes-256-cbc auth sha512 comp-lzo adaptive push "route 192.168.3.0 255.255.255.0" push "resolv-retry infinite" status /var/log/openvpnserver-status.log 5 log-append /var/log/openvpnserver.log status-version 2 and here is my clients file remote (WAN IP) cipher aes-256-cbc auth sha512 client dev tun proto udp port 1194 resolv-retry infinite tls-client nobind persist-key persist-tun remote-cert-tls server tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA:TLS-DHE-RSA-WITH-AES-128-CBC-SHA:TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA comp-lzo adaptive verb 3 route-delay 2 key-direction 1 I have tried with both tunnelblick on my mac connected to the same lan network as the server, and the iOS app connected to my carrier's network. Thanks,
-
Hi peter (or anyone else who can help me), I port forwarded port 1194 to my unraid's static ip, (192.168.3.111) but when I tried to connect using it a openvpn client it gives me a time out error. When I scan ports using a website it says that port 1194 is closed. And I am pretty sure that port forwarding is done correctly. (please check the attachments to make sure) One interesting thing is that when i change the port openvpn server uses to 80, and run the server the website says that the port is open. Thanks in advance for the help.