I am trying to configure my server using this guide https://openvpn.net/community-resources/static-key-mini-howto/ also here https://blog.eldernode.com/setup-an-ope ... ntu-22-04/
Everything works fine, both the server and the client are connected, but something is missing. The client still has the same IP as before, yes it can ping the IP of the server, but that's about it. I tried adding --push "redirect-gateway def1" which I got it from here https://openvpn.net/community-resources/how-to/#routing-all-client-traffic-including-web-traffic-through-the-vpn into the middle of the server side code, but nothing changes.
Edit : Adding logs
This is the log from the server side
2023-02-16 08:06:12 Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
2023-02-16 08:06:12 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-02-16 08:06:12 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-02-16 08:06:12 WARNING: INSECURE cipher (BF-CBC) with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Support for these insecure ciphers will be removed in OpenVPN 2.7.
2023-02-16 08:06:12 WARNING: INSECURE cipher (BF-CBC) with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Support for these insecure ciphers will be removed in OpenVPN 2.7.
2023-02-16 08:06:12 WARNING: INSECURE cipher (BF-CBC) with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Support for these insecure ciphers will be removed in OpenVPN 2.7.
2023-02-16 08:06:12 TUN/TAP device tun0 opened
2023-02-16 08:06:12 net_iface_mtu_set: mtu 1500 for tun0
2023-02-16 08:06:12 net_iface_up: set tun0 up
2023-02-16 08:06:12 net_addr_ptp_v4_add: 10.8.0.1 peer 10.8.0.2 dev tun0
2023-02-16 08:06:12 Could not determine IPv4/IPv6 protocol. Using AF_INET
2023-02-16 08:06:12 UDPv4 link local (bound): [AF_INET][undef]:1194
2023-02-16 08:06:12 UDPv4 link remote: [AF_UNSPEC]
2023-02-16 08:08:23 Peer Connection Initiated with [AF_INET]:My_IP:1194
2023-02-16 08:08:24 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-02-16 08:08:24 Initialization Sequence Completed`
This is the log from Client side
2023-02-16 10:45:17 Cipher negotiation is disabled since neither P2MP client nor server mode is enabled
2023-02-16 10:45:17 WARNING: file 'static-OpenVPN.key' is group or others accessible
2023-02-16 10:45:17 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-02-16 10:45:17 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
2023-02-16 10:45:17 WARNING: INSECURE cipher (BF-CBC) with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Support for these insecure ciphers will be removed in OpenVPN 2.7.
2023-02-16 10:45:17 WARNING: INSECURE cipher (BF-CBC) with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Support for these insecure ciphers will be removed in OpenVPN 2.7.
2023-02-16 10:45:17 WARNING: INSECURE cipher (BF-CBC) with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Support for these insecure ciphers will be removed in OpenVPN 2.7.
2023-02-16 10:45:17 TUN/TAP device tun0 opened
2023-02-16 10:45:17 net_iface_mtu_set: mtu 1500 for tun0
2023-02-16 10:45:17 net_iface_up: set tun0 up
2023-02-16 10:45:17 net_addr_ptp_v4_add: 10.8.0.2 peer 10.8.0.1 dev tun0
2023-02-16 10:45:17 TCP/UDP: Preserving recently used remote address: [AF_INET]My_Server_IP:1194
2023-02-16 10:45:17 UDP link local (bound): [AF_INET][undef]:1194
2023-02-16 10:45:17 UDP link remote: [AF_INET]My_Server_IP:1194
2023-02-16 10:45:20 Peer Connection Initiated with [AF_INET]My_Server_IP:1194
2023-02-16 10:45:21 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-02-16 10:45:21 Initialization Sequence Completed