When I connect openvpn client to IPvanish server via ubuntu 18.04, I am unable to keep alive SSH And remote desktop(xRDP) connection remotely. Please help me.
Here is netplan config:
network:
version: 2
renderer: networkd
ethernets:
eno1:
addresses:
- 88.198.59.8x/32
- 2a01:4xx:222:752::2/64
routes:
- on-link: true
to: 0.0.0.0/0
via: 88.198.59.65
gateway6: fe80::1
nameservers:
addresses:
- 185.12.64.1
- 2a01:4ff:ff00::add:1
- 185.12.64.2
ip r output:
default via 88.198.59.65 dev eno1 proto static onlink
netstat -rn output:
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 88.198.59.65 0.0.0.0 UG 0 0 0 eno1
OpenVPN Client log:
Thu Dec 16 21:57:39 2021 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Thu Dec 16 21:57:39 2021 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 19 2021
Thu Dec 16 21:57:39 2021 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.08
Enter Auth Username: **********
Enter Auth Password: **********
Thu Dec 16 21:57:47 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Dec 16 21:57:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]185.147.212.65:443
Thu Dec 16 21:57:47 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Thu Dec 16 21:57:47 2021 UDP link local: (not bound)
Thu Dec 16 21:57:47 2021 UDP link remote: [AF_INET]185.147.212.65:443
Thu Dec 16 21:57:47 2021 TLS: Initial packet from [AF_INET]185.147.212.65:443, sid=a77a2fa6 8da170e6
Thu Dec 16 21:57:47 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Dec 16 21:57:47 2021 VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, [email protected]
Thu Dec 16 21:57:47 2021 VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=par-a13.ipvanish.com, [email protected]
Thu Dec 16 21:57:47 2021 VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=par-a13.ipvanish.com, [email protected]
Thu Dec 16 21:57:47 2021 WARNING: 'dev-type' is used inconsistently, local='dev-type tap', remote='dev-type tun'
Thu Dec 16 21:57:47 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1602', remote='link-mtu 1570'
Thu Dec 16 21:57:47 2021 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500'
Thu Dec 16 21:57:47 2021 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Thu Dec 16 21:57:47 2021 [par-a13.ipvanish.com] Peer Connection Initiated with [AF_INET]185.147.212.65:443
Thu Dec 16 21:57:48 2021 SENT CONTROL [par-a13.ipvanish.com]: 'PUSH_REQUEST' (status=1)
Thu Dec 16 21:57:48 2021 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 198.18.0.1,dhcp-option DNS 198.18.0.2,rcvbuf 493216,sndbuf 493216,explicit-exit-notify 5,comp-lzo no,route-gateway 172.21.24.1,topology subnet,ping 20,ping-restart 40,ifconfig 172.21.24.171 255.255.254.0,peer-id 16,cipher AES-256-GCM'
Thu Dec 16 21:57:48 2021 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:6 is ignored by previous <connection> blocks
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: explicit notify parm(s) modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: compression parms modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 16 21:57:48 2021 Socket Buffers: R=[212992->425984] S=[212992->425984]
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: route options modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: route-related options modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: peer-id set
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: data channel crypto options modified
Thu Dec 16 21:57:48 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 16 21:57:48 2021 NCP: overriding user-set keysize with default
Thu Dec 16 21:57:48 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 16 21:57:48 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 16 21:57:48 2021 ROUTE_GATEWAY 88.198.59.65
Thu Dec 16 21:57:48 2021 TUN/TAP device tap0 opened
Thu Dec 16 21:57:48 2021 TUN/TAP TX queue length set to 100
Thu Dec 16 21:57:48 2021 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Dec 16 21:57:48 2021 /sbin/ip link set dev tap0 up mtu 1500
Thu Dec 16 21:57:48 2021 /sbin/ip addr add dev tap0 172.21.24.171/23 broadcast 172.21.25.255
Thu Dec 16 21:57:48 2021 ./up.sh tap0 1500 1585 172.21.24.171 255.255.254.0 init
RTNETLINK answers: File exists
Error: Nexthop has invalid gateway.
Thu Dec 16 21:57:48 2021 WARNING: Failed running command (--up/--down): external program exited with error status: 2
Thu Dec 16 21:57:48 2021 Exiting due to fatal error
OpenVPN client config:
client
dev tap
proto udp
remote par-a13.ipvanish.com 443
resolv-retry infinite
nobind
persist-key
persist-tun
persist-remote-ip
ca ca.ipvanish.com.crt
verify-x509-name par-a13.ipvanish.com name
auth-user-pass
comp-lzo
verb 3
auth SHA256
cipher AES-256-CBC
keysize 256
tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-DSS-WITH-AES-256-CBC-SHA:TLS-RSA-WIT$
script-security 2
up ./up.sh
up.sh script (I think it's wrong):
#!/bin/sh
ip rule add from 88.198.59.8x table 128
ip route add table 128 to 0.0.0.0/0 dev eno1
ip route add table 128 default via 88.198.59.65