Проблема после подключение нет интернета в чем проблема? интернет по кабелю если с телефона раздавать интернет то в большинстве случаев работает
команды
Код: Выделить всё
wget https://git.io/vpn -O openvpn-install.sh && bash openvpn-install.sh
sudo scp root@ip:~/имя.ovpn /home/user/Downloads
sudo openvpn /home/user/Downloads/имяконфига.ovpn
лог
Код: Выделить всё
sudo openvpn /home/user/Загрузки/one.ovpn
Sat Mar 31 16:29:23 2018 Unrecognized option or missing parameter(s) in /home/user/Загрузки/one.ovpn:15: block-outside-dns (2.3.10)
Sat Mar 31 16:29:23 2018 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
Sat Mar 31 16:29:23 2018 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
Sat Mar 31 16:29:23 2018 Control Channel Authentication: tls-auth using INLINE static key file
Sat Mar 31 16:29:23 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sat Mar 31 16:29:23 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sat Mar 31 16:29:23 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sat Mar 31 16:29:23 2018 UDPv4 link local: [undef]
Sat Mar 31 16:29:23 2018 UDPv4 link remote: [AF_INET]ip
Sat Mar 31 16:29:23 2018 TLS: Initial packet from [AF_INET]ip, sid=afbabdf6 ebb12a04
Sat Mar 31 16:29:23 2018 VERIFY OK: depth=1, CN=ChangeMe
Sat Mar 31 16:29:23 2018 Validating certificate key usage
Sat Mar 31 16:29:23 2018 ++ Certificate has key usage 00a0, expects 00a0
Sat Mar 31 16:29:23 2018 VERIFY KU OK
Sat Mar 31 16:29:23 2018 Validating certificate extended key usage
Sat Mar 31 16:29:23 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Mar 31 16:29:23 2018 VERIFY EKU OK
Sat Mar 31 16:29:23 2018 VERIFY OK: depth=0, CN=server
Sat Mar 31 16:29:24 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Mar 31 16:29:24 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Sat Mar 31 16:29:24 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Mar 31 16:29:24 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Sat Mar 31 16:29:24 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sat Mar 31 16:29:24 2018 [server] Peer Connection Initiated with [AF_INET]ip
Sat Mar 31 16:29:26 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sat Mar 31 16:29:26 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0'
Sat Mar 31 16:29:26 2018 OPTIONS IMPORT: timers and/or timeouts modified
Sat Mar 31 16:29:26 2018 OPTIONS IMPORT: --ifconfig/up options modified
Sat Mar 31 16:29:26 2018 OPTIONS IMPORT: route options modified
Sat Mar 31 16:29:26 2018 OPTIONS IMPORT: route-related options modified
Sat Mar 31 16:29:26 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Mar 31 16:29:26 2018 ROUTE_GATEWAY 10.0.2.2/255.255.255.0 IFACE=enp0s3 HWADDR=08:00:27:5d:16:14
Sat Mar 31 16:29:26 2018 TUN/TAP device tun0 opened
Sat Mar 31 16:29:26 2018 TUN/TAP TX queue length set to 100
Sat Mar 31 16:29:26 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Mar 31 16:29:26 2018 /sbin/ip link set dev tun0 up mtu 1500
Sat Mar 31 16:29:26 2018 /sbin/ip addr add dev tun0 10.8.0.2/24 broadcast 10.8.0.255
Sat Mar 31 16:29:26 2018 /sbin/ip route add ip/32 via 10.0.2.2
Sat Mar 31 16:29:26 2018 /sbin/ip route add 0.0.0.0/1 via 10.8.0.1
Sat Mar 31 16:29:26 2018 /sbin/ip route add 128.0.0.0/1 via 10.8.0.1
Sat Mar 31 16:29:26 2018 Initialization Sequence Completed