View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0006044 | Kali Linux | General Bug | public | 2020-01-31 02:26 | 2020-01-31 08:07 |
| Reporter | redkomodo437 | Assigned To | rhertzog | ||
| Priority | normal | Severity | major | Reproducibility | always |
| Status | closed | Resolution | won't fix | ||
| Product Version | 2020.1 | ||||
| Summary | 0006044: openvpn connection issues | ||||
| Description | can not establish a lasting openvpn connection with kali linux 2020.1. please advise.. see images. I try to connect and it tries to establish, then fails.. | ||||
| Steps To Reproduce | see images and logs | ||||
| Additional Information | see partial logs here (see attached file for full logs): kali@kali:~/Downloads$ sudo openvpn redkomodo437.ovpn | ||||
| Attached Files | openvpn issue logs.txt (15,879 bytes)
kali@kali:~/Downloads$ sudo openvpn redkomodo437.ovpn Thu Jan 30 21:22:45 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 20 2019 Thu Jan 30 21:22:45 2020 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10 Thu Jan 30 21:22:45 2020 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Thu Jan 30 21:22:45 2020 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Thu Jan 30 21:22:45 2020 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Thu Jan 30 21:22:45 2020 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Thu Jan 30 21:22:45 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]5.44.235.19:443 Thu Jan 30 21:22:45 2020 Socket Buffers: R=[131072->131072] S=[16384->16384] Thu Jan 30 21:22:45 2020 Attempting to establish TCP connection with [AF_INET]5.44.235.19:443 [nonblock] Thu Jan 30 21:22:46 2020 TCP connection established with [AF_INET]5.44.235.19:443 Thu Jan 30 21:22:46 2020 TCP_CLIENT link local: (not bound) Thu Jan 30 21:22:46 2020 TCP_CLIENT link remote: [AF_INET]5.44.235.19:443 Thu Jan 30 21:22:46 2020 TLS: Initial packet from [AF_INET]5.44.235.19:443, sid=9af9420e d34899c8 Thu Jan 30 21:22:46 2020 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected] Thu Jan 30 21:22:46 2020 VERIFY KU OK Thu Jan 30 21:22:46 2020 Validating certificate extended key usage Thu Jan 30 21:22:46 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Jan 30 21:22:46 2020 VERIFY EKU OK Thu Jan 30 21:22:46 2020 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected] Thu Jan 30 21:22:47 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Thu Jan 30 21:22:47 2020 [htb] Peer Connection Initiated with [AF_INET]5.44.235.19:443 Thu Jan 30 21:22:48 2020 SENT CONTROL [htb]: 'PUSH_REQUEST' (status=1) Thu Jan 30 21:22:48 2020 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1040/64 dead:beef:4::1,ifconfig 10.10.16.66 255.255.254.0,peer-id 0,cipher AES-256-GCM' Thu Jan 30 21:22:48 2020 OPTIONS IMPORT: timers and/or timeouts modified Thu Jan 30 21:22:48 2020 OPTIONS IMPORT: --ifconfig/up options modified Thu Jan 30 21:22:48 2020 OPTIONS IMPORT: route options modified Thu Jan 30 21:22:48 2020 OPTIONS IMPORT: route-related options modified Thu Jan 30 21:22:48 2020 OPTIONS IMPORT: peer-id set Thu Jan 30 21:22:48 2020 OPTIONS IMPORT: adjusting link_mtu to 1627 Thu Jan 30 21:22:48 2020 OPTIONS IMPORT: data channel crypto options modified Thu Jan 30 21:22:48 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Thu Jan 30 21:22:48 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:22:48 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:22:48 2020 ROUTE_GATEWAY 192.168.88.2/255.255.255.0 IFACE=eth0 HWADDR=00:0c:29:20:37:65 Thu Jan 30 21:22:48 2020 GDG6: remote_host_ipv6=n/a Thu Jan 30 21:22:48 2020 ROUTE6: default_gateway=UNDEF Thu Jan 30 21:22:48 2020 TUN/TAP device tun2 opened Thu Jan 30 21:22:48 2020 TUN/TAP TX queue length set to 100 Thu Jan 30 21:22:48 2020 /sbin/ip link set dev tun2 up mtu 1500 Thu Jan 30 21:22:48 2020 /sbin/ip addr add dev tun2 10.10.16.66/23 broadcast 10.10.17.255 Thu Jan 30 21:22:48 2020 /sbin/ip -6 addr add dead:beef:4::1040/64 dev tun2 Thu Jan 30 21:22:48 2020 /sbin/ip route add 10.10.10.0/24 via 10.10.16.1 RTNETLINK answers: File exists Thu Jan 30 21:22:48 2020 ERROR: Linux route add command failed: external program exited with error status: 2 Thu Jan 30 21:22:48 2020 add_route_ipv6(dead:beef::/64 -> dead:beef:4::1 metric -1) dev tun2 Thu Jan 30 21:22:48 2020 /sbin/ip -6 route add dead:beef::/64 dev tun2 RTNETLINK answers: File exists Thu Jan 30 21:22:48 2020 ERROR: Linux route -6/-A inet6 add command failed: external program exited with error status: 2 Thu Jan 30 21:22:48 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Thu Jan 30 21:22:48 2020 Initialization Sequence Completed Thu Jan 30 21:22:54 2020 Connection reset, restarting [0] Thu Jan 30 21:22:54 2020 SIGUSR1[soft,connection-reset] received, process restarting Thu Jan 30 21:22:54 2020 Restart pause, 5 second(s) Thu Jan 30 21:22:59 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]5.44.235.19:443 Thu Jan 30 21:22:59 2020 Socket Buffers: R=[131072->131072] S=[16384->16384] Thu Jan 30 21:22:59 2020 Attempting to establish TCP connection with [AF_INET]5.44.235.19:443 [nonblock] Thu Jan 30 21:23:00 2020 TCP connection established with [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:00 2020 TCP_CLIENT link local: (not bound) Thu Jan 30 21:23:00 2020 TCP_CLIENT link remote: [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:00 2020 TLS: Initial packet from [AF_INET]5.44.235.19:443, sid=b4b31187 1a3e820f Thu Jan 30 21:23:00 2020 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected] Thu Jan 30 21:23:00 2020 VERIFY KU OK Thu Jan 30 21:23:00 2020 Validating certificate extended key usage Thu Jan 30 21:23:00 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Jan 30 21:23:00 2020 VERIFY EKU OK Thu Jan 30 21:23:00 2020 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected] Thu Jan 30 21:23:00 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Thu Jan 30 21:23:00 2020 [htb] Peer Connection Initiated with [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:01 2020 SENT CONTROL [htb]: 'PUSH_REQUEST' (status=1) Thu Jan 30 21:23:02 2020 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1040/64 dead:beef:4::1,ifconfig 10.10.16.66 255.255.254.0,peer-id 0,cipher AES-256-GCM' Thu Jan 30 21:23:02 2020 OPTIONS IMPORT: timers and/or timeouts modified Thu Jan 30 21:23:02 2020 OPTIONS IMPORT: --ifconfig/up options modified Thu Jan 30 21:23:02 2020 OPTIONS IMPORT: route options modified Thu Jan 30 21:23:02 2020 OPTIONS IMPORT: route-related options modified Thu Jan 30 21:23:02 2020 OPTIONS IMPORT: peer-id set Thu Jan 30 21:23:02 2020 OPTIONS IMPORT: adjusting link_mtu to 1627 Thu Jan 30 21:23:02 2020 OPTIONS IMPORT: data channel crypto options modified Thu Jan 30 21:23:02 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Thu Jan 30 21:23:02 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:23:02 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:23:02 2020 Preserving previous TUN/TAP instance: tun2 Thu Jan 30 21:23:02 2020 Initialization Sequence Completed Thu Jan 30 21:23:07 2020 Connection reset, restarting [0] Thu Jan 30 21:23:07 2020 SIGUSR1[soft,connection-reset] received, process restarting Thu Jan 30 21:23:07 2020 Restart pause, 5 second(s) Thu Jan 30 21:23:12 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:12 2020 Socket Buffers: R=[131072->131072] S=[16384->16384] Thu Jan 30 21:23:12 2020 Attempting to establish TCP connection with [AF_INET]5.44.235.19:443 [nonblock] Thu Jan 30 21:23:13 2020 TCP connection established with [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:13 2020 TCP_CLIENT link local: (not bound) Thu Jan 30 21:23:13 2020 TCP_CLIENT link remote: [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:13 2020 TLS: Initial packet from [AF_INET]5.44.235.19:443, sid=26035881 377ecbf4 Thu Jan 30 21:23:13 2020 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected] Thu Jan 30 21:23:13 2020 VERIFY KU OK Thu Jan 30 21:23:13 2020 Validating certificate extended key usage Thu Jan 30 21:23:13 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Jan 30 21:23:13 2020 VERIFY EKU OK Thu Jan 30 21:23:13 2020 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected] Thu Jan 30 21:23:14 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Thu Jan 30 21:23:14 2020 [htb] Peer Connection Initiated with [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:15 2020 SENT CONTROL [htb]: 'PUSH_REQUEST' (status=1) Thu Jan 30 21:23:15 2020 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1040/64 dead:beef:4::1,ifconfig 10.10.16.66 255.255.254.0,peer-id 0,cipher AES-256-GCM' Thu Jan 30 21:23:15 2020 OPTIONS IMPORT: timers and/or timeouts modified Thu Jan 30 21:23:15 2020 OPTIONS IMPORT: --ifconfig/up options modified Thu Jan 30 21:23:15 2020 OPTIONS IMPORT: route options modified Thu Jan 30 21:23:15 2020 OPTIONS IMPORT: route-related options modified Thu Jan 30 21:23:15 2020 OPTIONS IMPORT: peer-id set Thu Jan 30 21:23:15 2020 OPTIONS IMPORT: adjusting link_mtu to 1627 Thu Jan 30 21:23:15 2020 OPTIONS IMPORT: data channel crypto options modified Thu Jan 30 21:23:15 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Thu Jan 30 21:23:15 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:23:15 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:23:15 2020 Preserving previous TUN/TAP instance: tun2 Thu Jan 30 21:23:15 2020 Initialization Sequence Completed Thu Jan 30 21:23:21 2020 Connection reset, restarting [0] Thu Jan 30 21:23:21 2020 SIGUSR1[soft,connection-reset] received, process restarting Thu Jan 30 21:23:21 2020 Restart pause, 5 second(s) Thu Jan 30 21:23:26 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:26 2020 Socket Buffers: R=[131072->131072] S=[16384->16384] Thu Jan 30 21:23:26 2020 Attempting to establish TCP connection with [AF_INET]5.44.235.19:443 [nonblock] Thu Jan 30 21:23:27 2020 TCP connection established with [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:27 2020 TCP_CLIENT link local: (not bound) Thu Jan 30 21:23:27 2020 TCP_CLIENT link remote: [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:27 2020 TLS: Initial packet from [AF_INET]5.44.235.19:443, sid=4e42cac4 ca62b1a9 Thu Jan 30 21:23:27 2020 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected] Thu Jan 30 21:23:27 2020 VERIFY KU OK Thu Jan 30 21:23:27 2020 Validating certificate extended key usage Thu Jan 30 21:23:27 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Jan 30 21:23:27 2020 VERIFY EKU OK Thu Jan 30 21:23:27 2020 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected] Thu Jan 30 21:23:27 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Thu Jan 30 21:23:27 2020 [htb] Peer Connection Initiated with [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:28 2020 SENT CONTROL [htb]: 'PUSH_REQUEST' (status=1) Thu Jan 30 21:23:29 2020 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1040/64 dead:beef:4::1,ifconfig 10.10.16.66 255.255.254.0,peer-id 0,cipher AES-256-GCM' Thu Jan 30 21:23:29 2020 OPTIONS IMPORT: timers and/or timeouts modified Thu Jan 30 21:23:29 2020 OPTIONS IMPORT: --ifconfig/up options modified Thu Jan 30 21:23:29 2020 OPTIONS IMPORT: route options modified Thu Jan 30 21:23:29 2020 OPTIONS IMPORT: route-related options modified Thu Jan 30 21:23:29 2020 OPTIONS IMPORT: peer-id set Thu Jan 30 21:23:29 2020 OPTIONS IMPORT: adjusting link_mtu to 1627 Thu Jan 30 21:23:29 2020 OPTIONS IMPORT: data channel crypto options modified Thu Jan 30 21:23:29 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Thu Jan 30 21:23:29 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:23:29 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:23:29 2020 Preserving previous TUN/TAP instance: tun2 Thu Jan 30 21:23:29 2020 Initialization Sequence Completed Thu Jan 30 21:23:34 2020 Connection reset, restarting [0] Thu Jan 30 21:23:34 2020 SIGUSR1[soft,connection-reset] received, process restarting Thu Jan 30 21:23:34 2020 Restart pause, 5 second(s) Thu Jan 30 21:23:39 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:39 2020 Socket Buffers: R=[131072->131072] S=[16384->16384] Thu Jan 30 21:23:39 2020 Attempting to establish TCP connection with [AF_INET]5.44.235.19:443 [nonblock] Thu Jan 30 21:23:40 2020 TCP connection established with [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:40 2020 TCP_CLIENT link local: (not bound) Thu Jan 30 21:23:40 2020 TCP_CLIENT link remote: [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:40 2020 TLS: Initial packet from [AF_INET]5.44.235.19:443, sid=d31826fc 9285067e Thu Jan 30 21:23:40 2020 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected] Thu Jan 30 21:23:40 2020 VERIFY KU OK Thu Jan 30 21:23:40 2020 Validating certificate extended key usage Thu Jan 30 21:23:40 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Jan 30 21:23:40 2020 VERIFY EKU OK Thu Jan 30 21:23:40 2020 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected] Thu Jan 30 21:23:41 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Thu Jan 30 21:23:41 2020 [htb] Peer Connection Initiated with [AF_INET]5.44.235.19:443 Thu Jan 30 21:23:42 2020 SENT CONTROL [htb]: 'PUSH_REQUEST' (status=1) Thu Jan 30 21:23:42 2020 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1040/64 dead:beef:4::1,ifconfig 10.10.16.66 255.255.254.0,peer-id 0,cipher AES-256-GCM' Thu Jan 30 21:23:42 2020 OPTIONS IMPORT: timers and/or timeouts modified Thu Jan 30 21:23:42 2020 OPTIONS IMPORT: --ifconfig/up options modified Thu Jan 30 21:23:42 2020 OPTIONS IMPORT: route options modified Thu Jan 30 21:23:42 2020 OPTIONS IMPORT: route-related options modified Thu Jan 30 21:23:42 2020 OPTIONS IMPORT: peer-id set Thu Jan 30 21:23:42 2020 OPTIONS IMPORT: adjusting link_mtu to 1627 Thu Jan 30 21:23:42 2020 OPTIONS IMPORT: data channel crypto options modified Thu Jan 30 21:23:42 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Thu Jan 30 21:23:42 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:23:42 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Thu Jan 30 21:23:42 2020 Preserving previous TUN/TAP instance: tun2 Thu Jan 30 21:23:42 2020 Initialization Sequence Completed Thu Jan 30 21:23:48 2020 Connection reset, restarting [0] Thu Jan 30 21:23:48 2020 SIGUSR1[soft,connection-reset] received, process restarting Thu Jan 30 21:23:48 2020 Restart pause, 5 second(s) | ||||
|
Thank you for your interest in Kali but this is not a bug report. It looks like that you need help and guidance to perform some task. We have community support forums on http://forums.kali.org or on IRC with the #kali-linux channel on irc.freenode.net), please post your questions there. |
|
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2020-01-31 02:26 | redkomodo437 | New Issue | |
| 2020-01-31 02:26 | redkomodo437 | File Added: image.png | |
| 2020-01-31 02:26 | redkomodo437 | File Added: image-2.png | |
| 2020-01-31 02:26 | redkomodo437 | File Added: openvpn issue logs.txt | |
| 2020-01-31 02:26 | redkomodo437 | File Added: image-3.png | |
| 2020-01-31 08:07 | rhertzog | Assigned To | => rhertzog |
| 2020-01-31 08:07 | rhertzog | Status | new => closed |
| 2020-01-31 08:07 | rhertzog | Resolution | open => won't fix |
| 2020-01-31 08:07 | rhertzog | Note Added: 0011987 |