Now, this very OPENVPN is giving me a hard time here with.



SERVER SIDE cENTOS 5.2:

V=OpenVPN 2.0.9

============================================================================

port 1194 # (1194 is the default but on some APN networks this is blocked)
proto tcp
dev tun
ca /etc/openvpn/easy-rsa/2.0/keys/ca.crt
cert /etc/openvpn/easy-rsa/2.0/keys/server.crt
key /etc/openvpn/easy-rsa/2.0/keys/server.key
dh /etc/openvpn/easy-rsa/2.0/keys/dh1024.pem
server 172.16.0.0 255.255.255.0
push "dhcp-option DNS 192.168.168.1"
push "dhcp-option DNS 168.210.2.2"
#push "dhcp-option WINS 192.168.1.2"
push "route 192.168.168.0 255.255.255.0"
ifconfig-pool-persist ipp.txt
keepalive 10 120
comp-lzo
user nobody
group users
persist-key
persist-tun
status openvpn-status.log
verb 3
client-to-client
duplicate-cn # (this means several users can use the same key)


CLIENT SIDE - Win XP:


dev tun
client
ns-cert-type server
port 1194
proto tcp
remote server-ip-address
ca ca.crt
cert server.crt
key server.key

tun-mtu 1500
tun-mtu-extra 32
mssfix 1450

dev-node OVPN

cipher AES-256-CBC

comp-lzo
verb 4
mute 10


============================================================================

nobody   12196  0.0  0.2   5820  1996 ?        Ss   13:30   0:00 /usr/sbin/openvpn --daemon --writepid /var/run/openvpn/openvpn.pid --config openvpn.conf --cd /etc/openvpn


Dec 11 13:31:46 kkk openvpn[12196]: TCPv4_SERVER link local: [undef]
Dec 11 13:31:46 kkk openvpn[12196]: TCPv4_SERVER link remote: 1.2.3.4:1616
Dec 11 13:31:46 kkk openvpn[12196]: 1.2.3.4:1616 TLS: Initial packet from 1.2.3.4:1616, sid=60b859ab ccd278c7
Dec 11 13:31:46 kkk openvpn[12196]: 1.2.3.4:1616 VERIFY ERROR: depth=0, error=unsupported certificate purpose: /C=KE/ST=NBO/L=NAIROBI/O=IAL/OU=n_x08c/CN=WILSON/emailAddress=lixton@gmail.com
Dec 11 13:31:46 kkk openvpn[12196]: 1.2.3.4:1616 TLS_ERROR: BIO read tls_read_plaintext error: error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned
Dec 11 13:31:46 kkk openvpn[12196]: 1.2.3.4:1616 TLS Error: TLS object -> incoming plaintext read error
Dec 11 13:31:46 kkk openvpn[12196]: 1.2.3.4:1616 TLS Error: TLS handshake failed
Dec 11 13:31:46 kkk openvpn[12196]: 1.2.3.4:1616 Fatal TLS error (check_tls_errors_co), restarting
Dec 11 13:31:46 kkk openvpn[12196]: 1.2.3.4:1616 SIGUSR1[soft,tls-error] received, client-instance restarting
Dec 11 13:31:46 kkk openvpn[12196]: TCP/UDP: Closing socket




SERVER SIDE cENTOS 5.2:

port 1194 # (1194 is the default but on some APN networks this is blocked)
proto tcp
dev tun
ca /etc/openvpn/easy-rsa/2.0/keys/ca.crt
cert /etc/openvpn/easy-rsa/2.0/keys/server.crt
key /etc/openvpn/easy-rsa/2.0/keys/server.key
dh /etc/openvpn/easy-rsa/2.0/keys/dh1024.pem
server 172.16.0.0 255.255.255.0
push "dhcp-option DNS 192.168.168.1"
push "dhcp-option DNS 168.210.2.2"
#push "dhcp-option WINS 192.168.1.2"
push "route 192.168.168.0 255.255.255.0"
ifconfig-pool-persist ipp.txt
keepalive 10 120
comp-lzo
user nobody
group users
persist-key
persist-tun
status openvpn-status.log
verb 3
client-to-client
duplicate-cn # (this means several users can use the same key)


CLIENT SIDE - Win XP:

Vercion= 2.1


dev tun
client
ns-cert-type server
port 1194
proto tcp
remote server-ip-address
ca ca.crt
cert server.crt
key server.key

tun-mtu 1500
tun-mtu-extra 32
mssfix 1450

dev-node OVPN

cipher AES-256-CBC

comp-lzo
verb 4
mute 10


--
Wilson