linux openvpn 无法ping不通br0,很奇怪的问题:openv p n 连接后,ping不通v p n server的ip?...
Mon Apr 23 16:07:43 2018 OpenV*P*N 2.4.5 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Mar1 2018Mon Apr 23 16:07:43 2018 Windows version 6.1 (Windows 7) 64bitMon Apr 23 16:..
Mon Apr 23 16:07:43 2018 OpenV*P*N 2.4.5 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Mar 1 2018
Mon Apr 23 16:07:43 2018 Windows version 6.1 (Windows 7) 64bit
Mon Apr 23 16:07:43 2018 library versions: OpenSSL 1.1.0f 25 May 2017, LZO 2.10
Enter Management Password:
Mon Apr 23 16:07:43 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Mon Apr 23 16:07:43 2018 Need hold release from management interface, waiting...
Mon Apr 23 16:07:44 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'state on'
Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'log all on'
Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'echo all on'
Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'bytecount 5'
Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'hold off'
Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'hold release'
Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'password [...]'
Mon Apr 23 16:07:44 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Apr 23 16:07:44 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Apr 23 16:07:44 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Apr 23 16:07:44 2018 MANAGEMENT: >STATE:1524470864,RESOLVE,,,,,,
Mon Apr 23 16:07:44 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]123.8.218.45:1194
Mon Apr 23 16:07:44 2018 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Apr 23 16:07:44 2018 UDP link local: (not bound)
Mon Apr 23 16:07:44 2018 UDP link remote: [AF_INET]123.8.218.45:1194
Mon Apr 23 16:07:44 2018 MANAGEMENT: >STATE:1524470864,WAIT,,,,,,
Mon Apr 23 16:07:44 2018 MANAGEMENT: >STATE:1524470864,AUTH,,,,,,
Mon Apr 23 16:07:44 2018 TLS: Initial packet from [AF_INET]192.168.1.1:1194, sid=e83cc83f 27275027
Mon Apr 23 16:07:44 2018 VERIFY OK: depth=1, CN=changjian
Mon Apr 23 16:07:44 2018 VERIFY KU OK
Mon Apr 23 16:07:44 2018 Validating certificate extended key usage
Mon Apr 23 16:07:44 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Apr 23 16:07:44 2018 VERIFY EKU OK
Mon Apr 23 16:07:44 2018 VERIFY OK: depth=0, CN=server
Mon Apr 23 16:07:44 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Mon Apr 23 16:07:44 2018 [server] Peer Connection Initiated with [AF_INET]192.168.1.1:1194
Mon Apr 23 16:07:45 2018 MANAGEMENT: >STATE:1524470865,GET_CONFIG,,,,,,
Mon Apr 23 16:07:45 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Apr 23 16:07:45 2018 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DNS 8.8.8.8,route 10.9.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.9.0.6 10.9.0.5,peer-id 0,cipher AES-256-GCM'
Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: timers and/or timeouts modified
Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: --ifconfig/up options modified
Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: route options modified
Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: peer-id set
Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: adjusting link_mtu to 1625
Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: data channel crypto options modified
Mon Apr 23 16:07:45 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Apr 23 16:07:45 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Apr 23 16:07:45 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Apr 23 16:07:45 2018 interactive service msg_channel=0
Mon Apr 23 16:07:45 2018 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=18 HWADDR=34:13:e8:28:7d:0a
Mon Apr 23 16:07:45 2018 open_tun
Mon Apr 23 16:07:45 2018 TAP-WIN32 device [本地连接 2] opened: \\.\Global\{96D61DFF-7EE2-4A6F-8CCB-C8018D5DB869}.tap
Mon Apr 23 16:07:45 2018 TAP-Windows Driver Version 9.21
Mon Apr 23 16:07:45 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.6/255.255.255.252 on interface {96D61DFF-7EE2-4A6F-8CCB-C8018D5DB869} [DHCP-serv: 10.9.0.5, lease-time: 31536000]
Mon Apr 23 16:07:45 2018 Successful ARP Flush on interface [17] {96D61DFF-7EE2-4A6F-8CCB-C8018D5DB869}
Mon Apr 23 16:07:45 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Mon Apr 23 16:07:45 2018 MANAGEMENT: >STATE:1524470865,ASSIGN_IP,,10.9.0.6,,,,
Mon Apr 23 16:07:50 2018 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up
Mon Apr 23 16:07:50 2018 MANAGEMENT: >STATE:1524470870,ADD_ROUTES,,,,,,
Mon Apr 23 16:07:50 2018 C:\Windows\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 10.9.0.5
Mon Apr 23 16:07:50 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Mon Apr 23 16:07:50 2018 Route addition via IPAPI succeeded [adaptive]
Mon Apr 23 16:07:50 2018 C:\Windows\system32\route.exe ADD 10.9.0.0 MASK 255.255.255.0 10.9.0.5
Mon Apr 23 16:07:50 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Mon Apr 23 16:07:50 2018 Route addition via IPAPI succeeded [adaptive]
Mon Apr 23 16:07:50 2018 Initialization Sequence Completed
Mon Apr 23 16:07:50 2018 MANAGEMENT: >STATE:1524470870,CONNECTED,SUCCESS,10.9.0.6,192.168.1.1,1194,,
魔乐社区(Modelers.cn) 是一个中立、公益的人工智能社区,提供人工智能工具、模型、数据的托管、展示与应用协同服务,为人工智能开发及爱好者搭建开放的学习交流平台。社区通过理事会方式运作,由全产业链共同建设、共同运营、共同享有,推动国产AI生态繁荣发展。
更多推荐



所有评论(0)