VPN konekcija u lokalu

Dobar dan,

zelim Vas zamoliti za malu pomoc u koliko imate par minuta pogledati ovu poruku, rec je o sledecem, uspeo sam podignuti i konfigurisati openvpn server i openvpn client na istom kompu tj. serveru, medjutim, kada pokusam pristupiti sa drugog kompa iz iste mreze koji je na ubuntu 7.10 i ima pptp config kao klijent za pristupanje vpn tunelima jednostavno nije moguce, ovo je poruka koju dobijam kada unesem sve parametre i kliknem na start, takodje ne mogu pristupiti ni sa windowsa:

anon warn[open_inetsock:pptp_callmgr.c:326]: connect: Connection refused
anon fatal[callmgr_main:pptp_callmgr.c:124]: Could not open control connection to 192.168.1.3
anon fatal[open_callmgr:pptp.c:426]: Call manager exited with error 256
Couldn’t get channel number: Input/output error
pptpconfig: pppd process terminated by signal 1 (failed)
pptpconfig: SIGHUP

Ovo su poruke koje na terminalu dobijem kada pokrenem openvpn server i client na samoj serverskoj masini, molim za komentar da li je po Vama ovo u redu i jos moram napomenuti da imam dinamicku ip, modem adsl koji sam nat-ovao tako da sada glumi ruter, inace svi kompovi u mrezi su na switchu DLink koji automatski dodeljuje adrese, server ima lokalni ip 192.168.1.3:

root@server:/etc/openvpn/examples/sample-config-files# openvpn server.conf

Sun Feb 3 13:51:29 2008 OpenVPN 2.0.9 i486-pc-linux-gnu [SSL] [LZO] [EPOLL] built on May 21 2007
Sun Feb 3 13:51:29 2008 Diffie-Hellman initialized with 1024 bit key
Sun Feb 3 13:51:29 2008 Control Channel Authentication: using ‘/etc/openvpn/examples/easy-rsa/ta.key’ as a OpenVPN static key file
Sun Feb 3 13:51:29 2008 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sun Feb 3 13:51:29 2008 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sun Feb 3 13:51:29 2008 TLS-Auth MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Sun Feb 3 13:51:29 2008 TUN/TAP device tap0 opened
Sun Feb 3 13:51:29 2008 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Sun Feb 3 13:51:29 2008 GID set to nogroup
Sun Feb 3 13:51:29 2008 UID set to nobody
Sun Feb 3 13:51:29 2008 UDPv4 link local (bound): 192.168.1.3:1194
Sun Feb 3 13:51:29 2008 UDPv4 link remote: [undef]
Sun Feb 3 13:51:29 2008 MULTI: multi_init called, r=256 v=256
Sun Feb 3 13:51:29 2008 IFCONFIG POOL: base=10.8.0.50 size=51
Sun Feb 3 13:51:29 2008 IFCONFIG POOL LIST
Sun Feb 3 13:51:29 2008 Initialization Sequence Completed
Sun Feb 3 13:52:05 2008 MULTI: multi_create_instance called
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Re-using SSL/TLS context
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 LZO compression initialized
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Control Channel MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Local Options hash (VER=V4): 'c5677ab3’
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Expected Remote Options hash (VER=V4): 'a7133b47’
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 TLS: Initial packet from 192.168.1.3:32769, sid=396101ba 9de67f11
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 VERIFY OK: depth=1, /C=RS/ST=NI/L=Nis/O=OpenVPN-TEST/CN=server/emailAddress=info@mojdomen.net
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 VERIFY OK: depth=0, /C=RS/ST=NI/L=Nis/O=OpenVPN-TEST/CN=server/emailAddress=info@mojdomen.net
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Data Channel Encrypt: Cipher ‘AES-128-CBC’ initialized with 128 bit key
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Data Channel Encrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Data Channel Decrypt: Cipher ‘AES-128-CBC’ initialized with 128 bit key
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Data Channel Decrypt: Using 160 bit message hash ‘SHA1’ for HMAC authentication
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sun Feb 3 13:52:05 2008 192.168.1.3:32769 [server] Peer Connection Initiated with 192.168.1.3:32769
Sun Feb 3 13:52:06 2008 server/192.168.1.3:32769 PUSH: Received control message: 'PUSH_REQUEST’
Sun Feb 3 13:52:06 2008 server/192.168.1.3:32769 SENT CONTROL [server]: ‘PUSH_REPLY,route 192.168.10.0 255.255.255.0,route 192.168.20.0 255.255.255.0,route-gateway 10.8.0.4,ping 10,ping-restart 120,ifconfig 10.8.0.50 255.255.255.0’ (status=1)
Sun Feb 3 13:52:06 2008 server/192.168.1.3:32769 MULTI: Learn: 00:ff:8b:0e:05:63 -> server/192.168.1.3:32769

root@server:/etc/openvpn/examples/sample-config-files# openvpn client.conf

Sun Feb 3 13:51:57 2008 OpenVPN 2.0.9 i486-pc-linux-gnu [SSL] [LZO] [EPOLL] built on May 21 2007
Enter Auth Username: dora
Enter Auth Password:
Sun Feb 3 13:52:05 2008 Control Channel Authentication: using ‘/etc/openvpn/examples/easy-rsa/ta.key’ as a OpenVPN static key file
Sun Feb 3 13:52:05 2008 LZO compression initialized
Sun Feb 3 13:52:05 2008 UDPv4 link local: [undef]
Sun Feb 3 13:52:05 2008 UDPv4 link remote: 192.168.1.3:1194
Sun Feb 3 13:52:05 2008 [yulink] Peer Connection Initiated with 192.168.1.3:1194
Sun Feb 3 13:52:06 2008 TUN/TAP device tap1 opened
Sun Feb 3 13:52:06 2008 ifconfig tap1 10.8.0.50 netmask 255.255.255.0 mtu 1500 broadcast 10.8.0.255
Sun Feb 3 13:52:06 2008 Initialization Sequence Completed

Molim Vas u koliko mozete da mi pomognete kako da se sa drugog kompa putem vpn-a ulogujem na server.

Pozdrav svima.

Hajd za početak sa OpenVPN stranice:

[quote]Does OpenVPN support IPSec or PPTP?

There are three major families of VPN implementations in wide usage today: SSL, IPSec, and PPTP. OpenVPN is an SSL VPN and as such is not compatible with IPSec, L2TP, or PPTP.[/quote]
Da nije možda to problem, pokušavaš koristit pptp klijent?