OpenVPN (ProtonVPN) Running But Not Functioning
Posted: Fri Aug 28, 2020 8:29 am
I have a WE826-T2 with an MC7455. I am using WiFiX-WE826GO with GoldenOrb_2020-05-16. I am feeding this to a TP-Link Archer C3150 (though I am hard-wired to the 826 for debugging/setup purposes).
I have set up the OpenVPN, using ProtonVPN built-in, service and have it started successfully. The system log looks ok as far as I can tell (posted below). However, I get no IP change on the client. The client still has internet but it still uses my ISP IP and not the VPN IP (thus I am not behind the VPN).
I am still learning the ins-and-outs of networking with this router setup so maybe I'm just missing something? Any thoughts or ideas?
I have set up the OpenVPN, using ProtonVPN built-in, service and have it started successfully. The system log looks ok as far as I can tell (posted below). However, I get no IP change on the client. The client still has internet but it still uses my ISP IP and not the VPN IP (thus I am not behind the VPN).
I am still learning the ins-and-outs of networking with this router setup so maybe I'm just missing something? Any thoughts or ideas?
Code: Select all
Fri Aug 28 08:14:34 2020 daemon.err uhttpd[1770]: uci: Entry not found
Fri Aug 28 08:14:34 2020 user.notice OpenVPN : : Add Instance ProtonVPN /var/etc openvpn-ProtonVPN.conf
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: OpenVPN 2.4.5 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: library versions: OpenSSL 1.0.2u 20 Dec 2019, LZO 2.10
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: TCP/UDP: Preserving recently used remote address: [AF_INET]89.187.175.145:1194
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: Socket Buffers: R=[163840->163840] S=[163840->163840]
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: UDP link local: (not bound)
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: UDP link remote: [AF_INET]89.187.175.145:1194
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: TLS: Initial packet from [AF_INET]89.187.175.145:1194, sid=fdb93db2 b680b740
Fri Aug 28 08:14:34 2020 daemon.warn openvpn(ProtonVPN)[29090]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA
Fri Aug 28 08:14:34 2020 daemon.notice openvpn(ProtonVPN)[29090]: VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1
Fri Aug 28 08:14:35 2020 daemon.notice openvpn(ProtonVPN)[29090]: VERIFY KU OK
Fri Aug 28 08:14:35 2020 daemon.notice openvpn(ProtonVPN)[29090]: Validating certificate extended key usage
Fri Aug 28 08:14:35 2020 daemon.notice openvpn(ProtonVPN)[29090]: ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Server Authentication
Fri Aug 28 08:14:35 2020 daemon.notice openvpn(ProtonVPN)[29090]: ++ Certificate has EKU (oid) 1.3.6.1.5.5.7.3.2, expects TLS Web Server Authentication
Fri Aug 28 08:14:35 2020 daemon.notice openvpn(ProtonVPN)[29090]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Aug 28 08:14:35 2020 daemon.notice openvpn(ProtonVPN)[29090]: VERIFY EKU OK
Fri Aug 28 08:14:35 2020 daemon.notice openvpn(ProtonVPN)[29090]: VERIFY OK: depth=0, CN=us-tx-10.protonvpn.com
Fri Aug 28 08:14:35 2020 daemon.warn openvpn(ProtonVPN)[29090]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1602', remote='link-mtu 1634'
Fri Aug 28 08:14:35 2020 daemon.warn openvpn(ProtonVPN)[29090]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1532'
Fri Aug 28 08:14:35 2020 daemon.notice openvpn(ProtonVPN)[29090]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Fri Aug 28 08:14:35 2020 daemon.notice openvpn(ProtonVPN)[29090]: [us-tx-10.protonvpn.com] Peer Connection Initiated with [AF_INET]89.187.175.145:1194
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: SENT CONTROL [us-tx-10.protonvpn.com]: 'PUSH_REQUEST' (status=1)
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.20.0.1,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.20.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.0.2 255.255.0.0,peer-id 262145,cipher AES-256-GCM'
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: timers and/or timeouts modified
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: explicit notify parm(s) modified
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: compression parms modified
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: Socket Buffers: R=[163840->327680] S=[163840->327680]
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: --ifconfig/up options modified
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: route options modified
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: route-related options modified
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: peer-id set
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: adjusting link_mtu to 1625
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: OPTIONS IMPORT: data channel crypto options modified
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Aug 28 08:14:36 2020 daemon.notice netifd: Interface 'VPN' is enabled
Fri Aug 28 08:14:36 2020 daemon.notice netifd: Network device 'tun0' link is up
Fri Aug 28 08:14:36 2020 daemon.notice netifd: Interface 'VPN' has link connectivity
Fri Aug 28 08:14:36 2020 daemon.notice netifd: Interface 'VPN' is setting up now
Fri Aug 28 08:14:36 2020 daemon.notice openvpn(ProtonVPN)[29090]: TUN/TAP device tun0 opened
Fri Aug 28 08:14:37 2020 daemon.notice openvpn(ProtonVPN)[29090]: TUN/TAP TX queue length set to 100
Fri Aug 28 08:14:37 2020 daemon.notice openvpn(ProtonVPN)[29090]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Fri Aug 28 08:14:37 2020 daemon.notice netifd: Interface 'VPN' is now up
Fri Aug 28 08:14:37 2020 daemon.notice openvpn(ProtonVPN)[29090]: /sbin/ifconfig tun0 10.20.0.2 netmask 255.255.0.0 mtu 1500 broadcast 10.20.255.255
Fri Aug 28 08:14:37 2020 daemon.notice openvpn(ProtonVPN)[29090]: /sbin/route add -net 89.187.175.145 netmask 255.255.255.255 gw 25.94.15.10
Fri Aug 28 08:14:37 2020 daemon.notice openvpn(ProtonVPN)[29090]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.20.0.1
Fri Aug 28 08:14:37 2020 daemon.notice openvpn(ProtonVPN)[29090]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.20.0.1
Fri Aug 28 08:14:37 2020 daemon.notice openvpn(ProtonVPN)[29090]: Initialization Sequence Completed
Fri Aug 28 08:14:37 2020 user.notice URL-DEBUG: hotplug (iface): action='ifup' interface='VPN'
Fri Aug 28 08:14:39 2020 user.notice firewall: Reloading firewall due to ifup of VPN (tun0)