Hi, I am running an open solaris (OpenSolaris 2009.06 snv_111b X86) instance in vmware (don't know if this will be relevant or not) and trying to get an openvpn client to connect to an openvpn server.
I setup my client and openvpn as per this thread: http://opensolaris.org/jive/thread.jspa?threadID=117605 My client configuration file is setup as such: client dev tun proto udp remote ext.petravm.com 1194 resolv-retry infinite nobind persist-key persist-tun ca ca.crt cert client1.crt key client1.key comp-lzo verb 3 I start up the client and here is what I get: m...@opensolaris:/etc/csw/openvpn# /usr/local/sbin/openvpn --config client.conf Tue Jun 29 23:03:35 2010 OpenVPN 2.1_rc20 i386-pc-solaris2.11 [SSL] [LZO2] built on Jun 29 2010 Tue Jun 29 23:03:35 2010 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Tue Jun 29 23:03:35 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Tue Jun 29 23:03:35 2010 LZO compression initialized Tue Jun 29 23:03:35 2010 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ] Tue Jun 29 23:03:35 2010 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ] Tue Jun 29 23:03:35 2010 Local Options hash (VER=V4): '41690919' Tue Jun 29 23:03:35 2010 Expected Remote Options hash (VER=V4): '530fdded' Tue Jun 29 23:03:35 2010 Socket Buffers: R=[57344->65536] S=[57344->65536] Tue Jun 29 23:03:35 2010 UDPv4 link local: [undef] Tue Jun 29 23:03:35 2010 UDPv4 link remote: 67.137.64.26:1194 Tue Jun 29 23:03:35 2010 TLS: Initial packet from 67.137.64.26:1194, sid=c5cb57ce 9164e934 Tue Jun 29 23:03:36 2010 VERIFY OK: depth=1, /C=US/ST=WA/L=Seattle/O=PetraVM/CN=PetraVM_CA/emailaddress=i...@petravm.com Tue Jun 29 23:03:36 2010 VERIFY OK: depth=0, /C=US/ST=WA/L=Seattle/O=PetraVM/CN=server/emailaddress=i...@petravm.com Tue Jun 29 23:03:38 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Tue Jun 29 23:03:38 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jun 29 23:03:38 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Tue Jun 29 23:03:38 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Jun 29 23:03:38 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA Tue Jun 29 23:03:38 2010 [server] Peer Connection Initiated with 67.137.64.26:1194 Tue Jun 29 23:03:41 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Tue Jun 29 23:03:41 2010 PUSH: Received control message: 'PUSH_REPLY,route 192.168.192.0 255.255.248.0,dhcp-option DNS 192.168.192.5,dhcp-option DOMAIN petravm.com,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.58 10.8.0.57' Tue Jun 29 23:03:41 2010 OPTIONS IMPORT: timers and/or timeouts modified Tue Jun 29 23:03:41 2010 OPTIONS IMPORT: --ifconfig/up options modified Tue Jun 29 23:03:41 2010 OPTIONS IMPORT: route options modified Tue Jun 29 23:03:41 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Tue Jun 29 23:03:41 2010 ROUTE: default_gateway=UNDEF Tue Jun 29 23:03:41 2010 TUN/TAP device tun0 opened Tue Jun 29 23:03:41 2010 /usr/sbin/ifconfig tun0 10.8.0.58 10.8.0.57 mtu 1500 up Tue Jun 29 23:03:41 2010 /usr/sbin/ifconfig tun0 netmask 255.255.255.255 Tue Jun 29 23:03:41 2010 /usr/sbin/route add 192.168.192.0 -netmask 255.255.248.0 10.8.0.57 add net 192.168.192.0: gateway 10.8.0.57 Tue Jun 29 23:03:41 2010 /usr/sbin/route add 10.8.0.1 -netmask 255.255.255.255 10.8.0.57 add net 10.8.0.1: gateway 10.8.0.57 Tue Jun 29 23:03:41 2010 Initialization Sequence Completed And then it just sits there (until the inactivity timeout occurs and the sequence starts again). Thanks in advance for your help! Matt -- This message posted from opensolaris.org _______________________________________________ opensolaris-help mailing list opensolaris-help@opensolaris.org