Allereerst mijn complimenten voor deze tutorial! Super duidelijk beschreven!
Helaas heb ik het zelf (nog) niet aan de praat en loop tegen het probleem aan dat de client(s) niet kunnen connecten met de server.
Ik heb vanaf een frisse start, alle stappen van de tutorial doorlopen en krijg bij het connecten met de server de volgende error in de openvpn.log op de server.
Fri Feb 12 15:38:42 2016 us=486294 MULTI: multi_create_instance called
Fri Feb 12 15:38:42 2016 us=486453 62.140.132.44:7508 Re-using SSL/TLS context
Fri Feb 12 15:38:42 2016 us=517408 62.140.132.44:7508 LZO compression initialized
Fri Feb 12 15:38:42 2016 us=517633 62.140.132.44:7508 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
Fri Feb 12 15:38:42 2016 us=517688 62.140.132.44:7508 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Feb 12 15:38:42 2016 us=517989 62.140.132.44:7508 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
Fri Feb 12 15:38:42 2016 us=518071 62.140.132.44:7508 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
Fri Feb 12 15:38:42 2016 us=518139 62.140.132.44:7508 Local Options hash (VER=V4): '162b04de'
Fri Feb 12 15:38:42 2016 us=518190 62.140.132.44:7508 Expected Remote Options hash (VER=V4): '9e7066d2'
Fri Feb 12 15:38:42 2016 us=518273 62.140.132.44:7508 TLS: Initial packet from [AF_INET]62.140.132.44:7508, sid=5e1458ec 44de9ac1
Fri Feb 12 15:38:48 2016 us=894780 62.140.132.44:7508 VERIFY OK: depth=1, CN=CA
Fri Feb 12 15:38:48 2016 us=896201 62.140.132.44:7508 Validating certificate key usage
Fri Feb 12 15:38:48 2016 us=896264 62.140.132.44:7508 ++ Certificate has key usage 00a0, expects 0080
Fri Feb 12 15:38:48 2016 us=896300 62.140.132.44:7508 ++ Certificate has key usage 00a0, expects 0008
Fri Feb 12 15:38:48 2016 us=896334 62.140.132.44:7508 ++ Certificate has key usage 00a0, expects 0088
Fri Feb 12 15:38:48 2016 us=896367 62.140.132.44:7508 VERIFY KU ERROR
Fri Feb 12 15:38:48 2016 us=896480 62.140.132.44:7508 TLS_ERROR: BIO read tls_read_plaintext error: error:140890B2:lib(20):func(137):reason(178)
Fri Feb 12 15:38:48 2016 us=896519 62.140.132.44:7508 TLS Error: TLS object -> incoming plaintext read error
Fri Feb 12 15:38:48 2016 us=899685 62.140.132.44:7508 SYNO_ERR_CERT
Fri Feb 12 15:38:48 2016 us=899772 62.140.132.44:7508 TLS Error: TLS handshake failed
Fri Feb 12 15:38:48 2016 us=899998 62.140.132.44:7508 SIGUSR1[soft,tls-error] received, client-instance restarting
Getest vanaf iOS met OpenVPN client en vanaf Windows 10 met OpenVPN client naar Synology DS1813+ met DSM 5.2-5644 Update 3.
Mvg,
Ray