Score:0

OpenVPN client block SSH and remote access

jp flag

When I connect openvpn client to IPvanish server via ubuntu 18.04, I am unable to keep alive SSH And remote desktop(xRDP) connection remotely. Please help me.

Here is netplan config:

network:
  version: 2
  renderer: networkd
  ethernets:
    eno1:
      addresses:
        - 88.198.59.8x/32
        - 2a01:4xx:222:752::2/64
      routes:
        - on-link: true
          to: 0.0.0.0/0
          via: 88.198.59.65
      gateway6: fe80::1
      nameservers:
        addresses:
          - 185.12.64.1
          - 2a01:4ff:ff00::add:1
          - 185.12.64.2

ip r output:

default via 88.198.59.65 dev eno1 proto static onlink

netstat -rn output:

Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
0.0.0.0         88.198.59.65    0.0.0.0         UG        0 0          0 eno1

OpenVPN Client log:

Thu Dec 16 21:57:39 2021 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Thu Dec 16 21:57:39 2021 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 19 2021
Thu Dec 16 21:57:39 2021 library versions: OpenSSL 1.1.1  11 Sep 2018, LZO 2.08
Enter Auth Username: **********
Enter Auth Password: **********
Thu Dec 16 21:57:47 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Dec 16 21:57:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]185.147.212.65:443
Thu Dec 16 21:57:47 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Thu Dec 16 21:57:47 2021 UDP link local: (not bound)
Thu Dec 16 21:57:47 2021 UDP link remote: [AF_INET]185.147.212.65:443
Thu Dec 16 21:57:47 2021 TLS: Initial packet from [AF_INET]185.147.212.65:443, sid=a77a2fa6 8da170e6
Thu Dec 16 21:57:47 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Dec 16 21:57:47 2021 VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, [email protected]
Thu Dec 16 21:57:47 2021 VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=par-a13.ipvanish.com, [email protected]
Thu Dec 16 21:57:47 2021 VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=par-a13.ipvanish.com, [email protected]
Thu Dec 16 21:57:47 2021 WARNING: 'dev-type' is used inconsistently, local='dev-type tap', remote='dev-type tun'
Thu Dec 16 21:57:47 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1602', remote='link-mtu 1570'
Thu Dec 16 21:57:47 2021 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500'
Thu Dec 16 21:57:47 2021 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Thu Dec 16 21:57:47 2021 [par-a13.ipvanish.com] Peer Connection Initiated with [AF_INET]185.147.212.65:443
Thu Dec 16 21:57:48 2021 SENT CONTROL [par-a13.ipvanish.com]: 'PUSH_REQUEST' (status=1)
Thu Dec 16 21:57:48 2021 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 198.18.0.1,dhcp-option DNS 198.18.0.2,rcvbuf 493216,sndbuf 493216,explicit-exit-notify 5,comp-lzo no,route-gateway 172.21.24.1,topology subnet,ping 20,ping-restart 40,ifconfig 172.21.24.171 255.255.254.0,peer-id 16,cipher AES-256-GCM'
Thu Dec 16 21:57:48 2021 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:6 is ignored by previous <connection> blocks 
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: timers and/or timeouts modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: explicit notify parm(s) modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: compression parms modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Dec 16 21:57:48 2021 Socket Buffers: R=[212992->425984] S=[212992->425984]
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: --ifconfig/up options modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: route options modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: route-related options modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: peer-id set
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: adjusting link_mtu to 1657
Thu Dec 16 21:57:48 2021 OPTIONS IMPORT: data channel crypto options modified
Thu Dec 16 21:57:48 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Dec 16 21:57:48 2021 NCP: overriding user-set keysize with default
Thu Dec 16 21:57:48 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 16 21:57:48 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 16 21:57:48 2021 ROUTE_GATEWAY 88.198.59.65
Thu Dec 16 21:57:48 2021 TUN/TAP device tap0 opened
Thu Dec 16 21:57:48 2021 TUN/TAP TX queue length set to 100
Thu Dec 16 21:57:48 2021 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Dec 16 21:57:48 2021 /sbin/ip link set dev tap0 up mtu 1500
Thu Dec 16 21:57:48 2021 /sbin/ip addr add dev tap0 172.21.24.171/23 broadcast 172.21.25.255
Thu Dec 16 21:57:48 2021 ./up.sh tap0 1500 1585 172.21.24.171 255.255.254.0 init
RTNETLINK answers: File exists
Error: Nexthop has invalid gateway.
Thu Dec 16 21:57:48 2021 WARNING: Failed running command (--up/--down): external program exited with error status: 2
Thu Dec 16 21:57:48 2021 Exiting due to fatal error

OpenVPN client config:

client
dev tap
proto udp
remote par-a13.ipvanish.com 443
resolv-retry infinite
nobind
persist-key
persist-tun
persist-remote-ip
ca ca.ipvanish.com.crt
verify-x509-name par-a13.ipvanish.com name
auth-user-pass
comp-lzo
verb 3
auth SHA256
cipher AES-256-CBC
keysize 256
tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-DSS-WITH-AES-256-CBC-SHA:TLS-RSA-WIT$
script-security 2
up ./up.sh

up.sh script (I think it's wrong):

#!/bin/sh

ip rule add from 88.198.59.8x table 128

ip route add table 128 to 0.0.0.0/0  dev eno1

ip route add table 128 default via 88.198.59.65 
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.