|
本帖最后由 ftfei1991 于 2018-1-12 19:50 编辑
我使用的是OpenVPN客户端进行连接爱快的OpenVPN,提示三个问题,两个是警告,一个是路由添加失败(已经使用了管理员权限运行)官方和大神们,这个三个问题怎么解决额?
如图 (如果图看不清我把日志贴上来)
里边的IP、端口 和网卡的MAC我已经隐藏,用XXX代表
相关配置
client
dev-type tun
dev tunx
proto tcp
tun-mtu 1500
cipher AES-256-CBC
comp-lzo
remote XXX.XXX.XXX.XXX xxxx
resolv-retry infinite
nobind
persist-key
persist-tun
verb 3
auth-user-pass
script-security 2
<ca>
-----BEGIN CERTIFICATE-----
AwwPaUt1 隐藏部分 3DQEBCwUAMDcxCzAJBgNV
AwwPaUt1Y 隐藏部分 WkgRGV2aWNlIENB
LMAkGA1U 隐藏部分 EBhMCQ04x
A9pS3Vha 隐藏部分 SBEZXZpY2UgQ0EwggEiMA0G
T7awCpkG 隐藏部分 XpcHTND6g1MBzYT
NJqrSCmzQ 隐藏部分 lJNEPjQV8
GHXHvDZjT 隐藏部分 RfkVywWnleWWhs
E6WgchyBc 隐藏部分 rqcfGPyEdKoAGVzlHf9Ng
OY7dWiTAfB 隐藏部分 gNVHSMEGDAWgBRZ
DIqosY2Z5u 隐藏部分 TIsVlBBA0Z0tPLri
AeAQXt5uxFO 隐藏部分 xQpS2mjO0ZkOj/yIF+AY
kOdku3UUwp 隐藏部分 Tc9RScINwXM/p/e3K8
-----END CERTIFICATE-----
</ca>
# redirect-gateway def1 bypass-dns # uncomment to set as default gateway
# route-nopull # uncomment to disable server route push
#
相关日志
Fri Jan 12 13:24:54 2018 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Fri Jan 12 13:24:54 2018 Windows version 6.1 (Windows 7) 64bit
Fri Jan 12 13:24:54 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Enter Management Password:
Fri Jan 12 13:24:54 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Fri Jan 12 13:24:54 2018 Need hold release from management interface, waiting...
Fri Jan 12 13:24:55 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Fri Jan 12 13:24:55 2018 MANAGEMENT: CMD 'state on'
Fri Jan 12 13:24:55 2018 MANAGEMENT: CMD 'log all on'
Fri Jan 12 13:24:55 2018 MANAGEMENT: CMD 'echo all on'
Fri Jan 12 13:24:55 2018 MANAGEMENT: CMD 'hold off'
Fri Jan 12 13:24:55 2018 MANAGEMENT: CMD 'hold release'
Fri Jan 12 13:25:00 2018 MANAGEMENT: CMD 'username "Auth" "123"'
Fri Jan 12 13:25:00 2018 MANAGEMENT: CMD 'password [...]'
Fri Jan 12 13:25:00 2018 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Fri Jan 12 13:25:00 2018 MANAGEMENT: >STATE:1515734700,RESOLVE,,,,,,
Fri Jan 12 13:25:00 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]42.XXX.XXX.XX:XXXX
Fri Jan 12 13:25:00 2018 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Jan 12 13:25:00 2018 Attempting to establish TCP connection with [AF_INET]42.XXX.XXX.XX:XXXX [nonblock]
Fri Jan 12 13:25:00 2018 MANAGEMENT: >STATE:1515734700,TCP_CONNECT,,,,,,
Fri Jan 12 13:25:01 2018 TCP connection established with [AF_INET]42.XXX.XXX.XX:XXXX
Fri Jan 12 13:25:01 2018 TCP_CLIENT link local: (not bound)
Fri Jan 12 13:25:01 2018 TCP_CLIENT link remote: [AF_INET]42.XXX.XXX.XX:XXXX
Fri Jan 12 13:25:01 2018 MANAGEMENT: >STATE:1515734701,WAIT,,,,,,
Fri Jan 12 13:25:01 2018 MANAGEMENT: >STATE:1515734701,AUTH,,,,,,
Fri Jan 12 13:25:01 2018 TLS: Initial packet from [AF_INET]42.XXX.XXX.XX:XXXX, sid=12c913fc b067a6aa
Fri Jan 12 13:25:01 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Jan 12 13:25:02 2018 VERIFY OK: depth=1, C=CN, O=iKuai, CN=iKuai Device CA
Fri Jan 12 13:25:02 2018 VERIFY OK: depth=0, C=CN, O=iKuai, CN=iKuai OpenVPN Server
Fri Jan 12 13:25:02 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Jan 12 13:25:02 2018 [iKuai OpenVPN Server] Peer Connection Initiated with [AF_INET]42.XXX.XXX.XX:XXXX
Fri Jan 12 13:25:03 2018 MANAGEMENT: >STATE:1515734703,GET_CONFIG,,,,,,
Fri Jan 12 13:25:03 2018 SENT CONTROL [iKuai OpenVPN Server]: 'PUSH_REQUEST' (status=1)
Fri Jan 12 13:25:03 2018 PUSH: Received control message: 'PUSH_REPLY,route 192.168.6.0 255.255.255.0,route 192.168.6.0 255.255.255.0,topology net30,ping 10,ping-restart 60,ifconfig 192.168.6.6 192.168.6.5'
Fri Jan 12 13:25:03 2018 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jan 12 13:25:03 2018 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jan 12 13:25:03 2018 OPTIONS IMPORT: route options modified
Fri Jan 12 13:25:03 2018 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Jan 12 13:25:03 2018 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jan 12 13:25:03 2018 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Jan 12 13:25:03 2018 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Jan 12 13:25:03 2018 interactive service msg_channel=0
Fri Jan 12 13:25:03 2018 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=70:XX:XX:XX:XX:XX
Fri Jan 12 13:25:03 2018 open_tun
Fri Jan 12 13:25:03 2018 TAP-WIN32 device [OpenVPN] opened: \\.\Global\{75E088E7-3BFB-4008-B2B7-16E71C7F81BB}.tap
Fri Jan 12 13:25:03 2018 TAP-Windows Driver Version 9.21
Fri Jan 12 13:25:03 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.6.6/255.255.255.252 on interface {75E088E7-3BFB-4008-B2B7-16E71C7F81BB} [DHCP-serv: 192.168.6.5, lease-time: 31536000]
Fri Jan 12 13:25:03 2018 Successful ARP Flush on interface [13] {75E088E7-3BFB-4008-B2B7-16E71C7F81BB}
Fri Jan 12 13:25:03 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Fri Jan 12 13:25:03 2018 MANAGEMENT: >STATE:1515734703,ASSIGN_IP,,192.168.6.6,,,,
Fri Jan 12 13:25:09 2018 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up
Fri Jan 12 13:25:09 2018 MANAGEMENT: >STATE:1515734709,ADD_ROUTES,,,,,,
Fri Jan 12 13:25:09 2018 C:\Windows\system32\route.exe ADD 192.168.6.0 MASK 255.255.255.0 192.168.6.5
Fri Jan 12 13:25:09 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Fri Jan 12 13:25:09 2018 Route addition via IPAPI succeeded [adaptive]
Fri Jan 12 13:25:09 2018 C:\Windows\system32\route.exe ADD 192.168.6.0 MASK 255.255.255.0 192.168.6.5
Fri Jan 12 13:25:09 2018 ROUTE: route addition failed using CreateIpForwardEntry: 对象已存在。 [status=5010 if_index=13]
Fri Jan 12 13:25:09 2018 Route addition via IPAPI failed [adaptive]
Fri Jan 12 13:25:09 2018 Route addition fallback to route.exe
Fri Jan 12 13:25:09 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
Fri Jan 12 13:25:09 2018 Initialization Sequence Completed
Fri Jan 12 13:25:09 2018 MANAGEMENT: >STATE:1515734709,CONNECTED,SUCCESS,192.168.6.6,42.236.237.43,1194,192.168.1.2,54771
Fri Jan 12 13:37:04 2018 C:\Windows\system32\route.exe DELETE 192.168.6.0 MASK 255.255.255.0 192.168.6.5
Fri Jan 12 13:37:04 2018 Route deletion via IPAPI succeeded [adaptive]
Fri Jan 12 13:37:04 2018 C:\Windows\system32\route.exe DELETE 192.168.6.0 MASK 255.255.255.0 192.168.6.5
Fri Jan 12 13:37:04 2018 ROUTE: route deletion failed using DeleteIpForwardEntry: 找不到元素。
Fri Jan 12 13:37:04 2018 Route deletion via IPAPI failed [adaptive]
Fri Jan 12 13:37:04 2018 Route deletion fallback to route.exe
Fri Jan 12 13:37:04 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
Fri Jan 12 13:37:04 2018 Closing TUN/TAP interface
Fri Jan 12 13:37:04 2018 TAP: DHCP address released
Fri Jan 12 13:37:04 2018 SIGTERM[hard,] received, process exiting
Fri Jan 12 13:37:04 2018 MANAGEMENT: >STATE:1515735424,EXITING,SIGTERM,,,,,
|
|