Skip to content

Instantly share code, notes, and snippets.

@pwl
Created May 17, 2017 09:31
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save pwl/3759b87262396712e6102deca7315aff to your computer and use it in GitHub Desktop.
Save pwl/3759b87262396712e6102deca7315aff to your computer and use it in GitHub Desktop.
Logs from openvpn
[root@vps411446 ~]# docker run -v $OVPN_DATA:/etc/openvpn -p 1194:1194/udp --privileged -e DEBUG=1 kylemanna/openvpn
+ set -e
+ cd /etc/openvpn
+ USER_ARGS=("${@}")
+ ARGS=()
+ addArg --config /etc/openvpn/openvpn.conf
+ local arg=--config
+ '[' 2 -ge 1 ']'
+ local val=/etc/openvpn/openvpn.conf
+ hasArg --config
+ local element
+ return 1
+ ARGS+=("${arg}")
+ '[' 2 -ge 1 ']'
+ ARGS+=("${val}")
+ source /etc/openvpn/ovpn_env.sh
++ declare -x OVPN_ADDITIONAL_CLIENT_CONFIG
++ declare -x OVPN_AUTH
++ declare -x OVPN_CIPHER
++ declare -x OVPN_CLIENT_TO_CLIENT=1
++ declare -x OVPN_CN=xxx.xxx.xxx.xxx
++ declare -x OVPN_COMP_LZO=0
++ declare -x OVPN_DEFROUTE=1
++ declare -x OVPN_DEVICE=tun
++ declare -x OVPN_DISABLE_PUSH_BLOCK_DNS=0
++ declare -x OVPN_DNS=1
++ declare -x OVPN_ENV=/etc/openvpn/ovpn_env.sh
++ declare -x OVPN_FRAGMENT
++ declare -x OVPN_MTU
++ declare -x OVPN_NAT=0
++ declare -x OVPN_OTP_AUTH
++ declare -x OVPN_PORT=1194
++ declare -x OVPN_PROTO=udp
++ declare -x OVPN_PUSH
++ declare -x OVPN_ROUTES
++ declare -x OVPN_SERVER=192.168.255.0/24
++ declare -x OVPN_SERVER_URL=udp://xxx.xxx.xxx.xxx
++ declare -x OVPN_TLS_CIPHER
+ mkdir -p /dev/net
+ '[' '!' -c /dev/net/tun ']'
+ '[' -d /etc/openvpn/ccd ']'
+ addArg --client-config-dir /etc/openvpn/ccd
+ local arg=--client-config-dir
+ '[' 2 -ge 1 ']'
+ local val=/etc/openvpn/ccd
+ hasArg --client-config-dir
+ local element
+ return 1
+ ARGS+=("${arg}")
+ '[' 2 -ge 1 ']'
+ ARGS+=("${val}")
+ '[' -z '' ']'
+ OVPN_NATDEVICE=eth0
+ '[' 1 '!=' 0 ']'
+ setupIptablesAndRouting
+ iptables -t nat -C POSTROUTING -s 192.168.255.0/24 -o eth0 -j MASQUERADE
iptables: No chain/target/match by that name.
+ iptables -t nat -A POSTROUTING -s 192.168.255.0/24 -o eth0 -j MASQUERADE
+ '[' /etc/openvpn/pki/crl.pem -nt /etc/openvpn/crl.pem ']'
+ '[' -r /etc/openvpn/crl.pem ']'
+ addArg --crl-verify /etc/openvpn/crl.pem
+ local arg=--crl-verify
+ '[' 2 -ge 1 ']'
+ local val=/etc/openvpn/crl.pem
+ hasArg --crl-verify
+ local element
+ return 1
+ ARGS+=("${arg}")
+ '[' 2 -ge 1 ']'
+ ARGS+=("${val}")
+ ip -6 route show default
+ '[' 0 = 0 ']'
+ echo 'Enabling IPv6 Forwarding'
+ sysctl -w net.ipv6.conf.all.disable_ipv6=0
Enabling IPv6 Forwarding
net.ipv6.conf.all.disable_ipv6 = 0
net.ipv6.conf.default.forwarding = 1
net.ipv6.conf.all.forwarding = 1
+ sysctl -w net.ipv6.conf.default.forwarding=1
+ sysctl -w net.ipv6.conf.all.forwarding=1
+ echo 'Running '\''openvpn --config' /etc/openvpn/openvpn.conf --client-config-dir /etc/openvpn/ccd --crl-verify '/etc/openvpn/crl.pem '\'''
+ exec openvpn --config /etc/openvpn/openvpn.conf --client-config-dir /etc/openvpn/ccd --crl-verify /etc/openvpn/crl.pem
Running 'openvpn --config /etc/openvpn/openvpn.conf --client-config-dir /etc/openvpn/ccd --crl-verify /etc/openvpn/crl.pem '
Wed May 17 09:30:00 2017 OpenVPN 2.3.14 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Dec 18 2016
Wed May 17 09:30:00 2017 library versions: LibreSSL 2.4.4, LZO 2.09
Wed May 17 09:30:00 2017 Diffie-Hellman initialized with 2048 bit key
Wed May 17 09:30:00 2017 Control Channel Authentication: using '/etc/openvpn/pki/ta.key' as a OpenVPN static key file
Wed May 17 09:30:00 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed May 17 09:30:00 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed May 17 09:30:00 2017 Socket Buffers: R=[212992->212992] S=[212992->212992]
Wed May 17 09:30:00 2017 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Wed May 17 09:30:00 2017 TUN/TAP device tun0 opened
Wed May 17 09:30:00 2017 TUN/TAP TX queue length set to 100
Wed May 17 09:30:00 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed May 17 09:30:00 2017 /sbin/ip link set dev tun0 up mtu 1500
Wed May 17 09:30:00 2017 /sbin/ip addr add dev tun0 local 192.168.255.1 peer 192.168.255.2
Wed May 17 09:30:00 2017 /sbin/ip route add 192.168.254.0/24 via 192.168.255.2
Wed May 17 09:30:00 2017 /sbin/ip route add 192.168.255.0/24 via 192.168.255.2
Wed May 17 09:30:00 2017 GID set to nogroup
Wed May 17 09:30:00 2017 UID set to nobody
Wed May 17 09:30:00 2017 UDPv4 link local (bound): [undef]
Wed May 17 09:30:00 2017 UDPv4 link remote: [undef]
Wed May 17 09:30:00 2017 MULTI: multi_init called, r=256 v=256
Wed May 17 09:30:00 2017 IFCONFIG POOL: base=192.168.255.4 size=62, ipv6=0
Wed May 17 09:30:00 2017 Initialization Sequence Completed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment