hello all,

I am working with openwrt kamikaze 2.6.25.20 and try to configure openvpn as a client, the version used is 2.0.9 i386-linux [SSL] [LZO] built on July 17, 2010 and this is my configuration file:
        option enable 1
        option client 1
        option dev tun
        option proto udp
        list remote xxx.xxx.xxx.xxx 1194
        option resolv_retry infinite
        option persist_key 1
        option persist_tun 1
    option ca /etc/openvpn/ca.crt
        option cert /etc/openvpn/prueba.crt
        option key /etc/openvpn/prueba.key
        option comp_lzo 1
        option verb 3


When I start up the service tun0 interface and reviewing logs shows me the following:

Sep 11 17:22:13 openvpn daemon.notice warriors (sample_client) [22 687]: OpenVPN 2.0.9 i386-linux [SSL] [LZO] built on July 17, 2010
Sep 11 17:22:13 openvpn daemon.warn warriors (sample_client) [22 687]: IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and Earlier Used as the default port 5000.
Sep 11 17:22:13 openvpn daemon.warn warriors (sample_client) [22 687]: WARNING: No server certificate verification method has-been enabled. See http://openvpn.net/howto.html # MITM for more info.
Sep 11 17:22:13 openvpn daemon.notice warriors (sample_client) [22 687]: LZO compression initialized
Sep 11 17:22:13 openvpn daemon.notice warriors (sample_client) [22 687]: Control C
Hannele MTU parms [L: 1542 D: 138 EF: 38 EB: 0 ET: 0 EL: 0]
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: Data Channel MTU parms [L: 1542 D: 1450 EF: 42 EB: 135 ET: 0 EL: 0 AF: 3 / 1]
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: Local Opt
ions hash (VER = V4): '41690919 '
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: Expected
Remote Options hash (VER = V4): '530fdded '
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: UDPv4 lin
local k: [undef]
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: UDPv4 lin
k remote: xxx.xxx.xxx.xxx: 1194
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: TLS: Init
ial packet from 189.254.89.114:1194, sid = d398038c ba528fa9
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: VERIFY OK: depth = 1, / C = MX / ST = MX / L = MEXICO / O = VPN-Warriors/OU = Warriors-Defender / CN = warriors / emailAddress = xxxxxxxxxxxxxxxxxxxxxxxxxx
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: VERIFY OK: depth = 0, / C = MX / ST = MX / O = VPN-Warriors/OU = Warriors-Defender/CN = server / emailAddress = xXxXxXxXxXxXxXxXxXx
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: Control C
Hannele: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sep 11 17:22:14 openvpn daemon.notice warriors (sample_client) [22 687]: [server]
Peer Connection Initiated with xxx.xxx.xxx.xxx: 1194
Sep 11 17:22:15 openvpn daemon.notice warriors (sample_client) [22 687]: SENT CONTROL [server]: 'PUSH_REQUEST' (status = 1)
Sep 11 17:22:15 openvpn daemon.notice warriors (sample_client) [22 687]: PUSH: Received control message: 'PUSH_REPLY, route 10.2.1.0 255.255.255.0, route 10.8.0.0 255.255.255.0, ping 10, ping-restart 120, ifconfig 10.8.0.22 10.8.0.21 '
Sep 11 17:22:15 openvpn daemon.notice warriors (sample_client) [22 687]: OPTIONS IMPORT: timers and / or timeouts modified
Sep 11 17:22:15 openvpn daemon.notice warriors (sample_client) [22 687]: OPTIONS IMPORT: --ifconfig/up modified options
Sep 11 17:22:15 openvpn daemon.notice warriors (sample_client) [22 687]: OPTIONS IMPORT: route options modified
Sep 11 17:22:15 openvpn daemon.warn warriors (sample_client) [22 687]: Note: Can not TUNSETIFF tun ioctl: Inappropriate ioctl for device (errno = 25)
Sep 11 17:22:15 openvpn daemon.notice warriors (sample_client) [22 687]: Note: Att
empting fallback to kernel 2.2 TUN / TAP interface
Sep 11 17:22:15 openvpn daemon.notice warriors (sample_client) [22 687]: TUN / TAP device / dev/tun0 Opened
Sep 11 17:22:15 openvpn daemon.notice warriors (sample_client) [22 687]: / sbin / ifc
pointopoint onfig 10.8.0.22 10.8.0.21 tun0 mtu 1500
Sep 11 17:22:15 openvpn daemon.err warriors (sample_client) [22 687]: Linux ifconf
ig failed: shell command exited with error status: 1
Sep 11 17:22:15 openvpn daemon.notice warriors (sample_client) [22 687]: Exiting

reviewing this response seems to be connected, but ultimately does not.

Anyone know how to solve this problem, I read in some forums that may be a problem of compatibility with the kernel or is about configuration,

I welcome your comments

Thanks!
Escuchar
Leer fonéticamente