VPN Problem

Hey,
ive set up a new system for 3 or 4 days. first thing was mint wasnt able to get the wlan chip so ive found a tutorial in the internet how to set it up, ive done it --> works now. but there is one problem i dont get the full speed, i just get 8mbit download and upload but on my other devices i get 300mbit and 50 up.. but its not important just want to say it, because maybe my problem can come from this.
so my vpn problem is, that i got a fatal error. here the complete text:

Tue Jan 29 19:24:22 2019 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018
Tue Jan 29 19:24:22 2019 library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08
Tue Jan 29 19:24:22 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Jan 29 19:24:22 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Tue Jan 29 19:24:22 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]88.198.233.171:1337
Tue Jan 29 19:24:22 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 29 19:24:22 2019 UDP link local: (not bound)
Tue Jan 29 19:24:22 2019 UDP link remote: [AF_INET]88.198.233.171:1337
Tue Jan 29 19:24:22 2019 TLS: Initial packet from [AF_INET]88.198.233.171:1337, sid=bd211f72 5a436920
Tue Jan 29 19:24:22 2019 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected]
Tue Jan 29 19:24:22 2019 VERIFY KU OK
Tue Jan 29 19:24:22 2019 Validating certificate extended key usage
Tue Jan 29 19:24:22 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 29 19:24:22 2019 VERIFY EKU OK
Tue Jan 29 19:24:22 2019 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected]
Tue Jan 29 19:25:22 2019 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 29 19:25:22 2019 TLS Error: TLS handshake failed
Tue Jan 29 19:25:22 2019 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 29 19:25:22 2019 Restart pause, 5 second(s)
Tue Jan 29 19:25:27 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]88.198.233.171:1337
Tue Jan 29 19:25:27 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 29 19:25:27 2019 UDP link local: (not bound)
Tue Jan 29 19:25:27 2019 UDP link remote: [AF_INET]88.198.233.171:1337
Tue Jan 29 19:25:27 2019 TLS: Initial packet from [AF_INET]88.198.233.171:1337, sid=8e819705 c138e0e4
Tue Jan 29 19:25:27 2019 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, [email protected]
Tue Jan 29 19:25:27 2019 VERIFY KU OK
Tue Jan 29 19:25:27 2019 Validating certificate extended key usage
Tue Jan 29 19:25:27 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 29 19:25:27 2019 VERIFY EKU OK
Tue Jan 29 19:25:27 2019 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, [email protected]
Tue Jan 29 19:25:28 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Tue Jan 29 19:25:28 2019 [htb] Peer Connection Initiated with [AF_INET]88.198.233.171:1337
Tue Jan 29 19:25:29 2019 SENT CONTROL [htb]: 'PUSH_REQUEST' (status=1)
Tue Jan 29 19:25:29 2019 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.12.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:2::11b3/64 dead:beef:2::1,ifconfig 10.10.13.181 255.255.252.0,peer-id 4,cipher AES-256-GCM'
Tue Jan 29 19:25:29 2019 Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.
Tue Jan 29 19:25:29 2019 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 29 19:25:29 2019 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 29 19:25:29 2019 OPTIONS IMPORT: route options modified
Tue Jan 29 19:25:29 2019 OPTIONS IMPORT: route-related options modified
Tue Jan 29 19:25:29 2019 OPTIONS IMPORT: peer-id set
Tue Jan 29 19:25:29 2019 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 29 19:25:29 2019 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 29 19:25:29 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 29 19:25:29 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 29 19:25:29 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 29 19:25:29 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=wlo1 HWADDR=d4:6a:6a:0a:c0:8b
Tue Jan 29 19:25:29 2019 GDG6: remote_host_ipv6=n/a
Tue Jan 29 19:25:29 2019 ROUTE6: default_gateway=UNDEF
Tue Jan 29 19:25:29 2019 TUN/TAP device tun0 opened
Tue Jan 29 19:25:29 2019 TUN/TAP TX queue length set to 100
Tue Jan 29 19:25:29 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=1
Tue Jan 29 19:25:29 2019 /sbin/ip link set dev tun0 up mtu 1500
Tue Jan 29 19:25:29 2019 /sbin/ip addr add dev tun0 10.10.13.181/22 broadcast 10.10.15.255
Tue Jan 29 19:25:29 2019 /sbin/ip -6 addr add dead:beef:2::11b3/64 dev tun0
RTNETLINK answers: Permission denied
Tue Jan 29 19:25:29 2019 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 29 19:25:29 2019 Exiting due to fatal error

sorry for the complete text but before i forget to copy anything i would get sure there is everything, and sorry for my bad english, but its not my main language and i think it should be enough to do a conversation :).

Tagged:
Sign In to comment.