openvpn vtun0 { encryption aes256 hash sha512 local-address 10.255.0.2 { } local-port 1195 mode site-to-site remote-address 10.255.0.1 remote-host ********** (IP of OPNsense WAN interface) remote-port 1195 shared-secret-key-file /config/auth/secret}
disabling NCP mode (--ncp-disable) because not in P2MP client or server modeWARNING: file '/config/auth/secret' is group or others accessibleOpenVPN 2.4.7 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 22 2022library versions: OpenSSL 1.0.2u 20 Dec 2019, LZO 2.08Outgoing Static Key Encryption: Cipher 'AES-256-CBC' initialized with 256 bit keyOutgoing Static Key Encryption: Using 512 bit message hash 'SHA512' for HMAC authenticationIncoming Static Key Encryption: Cipher 'AES-256-CBC' initialized with 256 bit keyIncoming Static Key Encryption: Using 512 bit message hash 'SHA512' for HMAC authenticationTUN/TAP device vtun0 openedTUN/TAP TX queue length set to 100/sbin/ip link set dev vtun0 up mtu 1500/sbin/ip addr add dev vtun0 local 10.255.0.2 peer 10.255.0.1TCP/UDP: Preserving recently used remote address: [AF_INET]**********:1195Socket Buffers: R=[294912->294912] S=[294912->294912]UDP link local (bound): [AF_INET][undef]:1195UDP link remote: [AF_INET]**********:1195/usr/bin/vtysh-set -c configure terminal -c router rip -c network vtun0 failed: 10752
OpenVPN 2.4.7 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 22 2022library versions: OpenSSL 1.0.2u 20 Dec 2019, LZO 2.08Originally developed by James YonanCopyright (C) 2002-2018 OpenVPN Inc <sales@openvpn.net>Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto=yes enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dependency_tracking=no enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=yes enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_maintainer_mode=no enable_management=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=yes enable_plugin_down_root=yes enable_plugins=yes enable_port_share=yes enable_selinux=no enable_server=yes enable_shared=yes enable_shared_with_static_runtimes=no enable_silent_rules=no enable_small=no enable_static=yes enable_strict=no enable_strict_options=no enable_systemd=yes enable_werror=no enable_win32_dll=yes enable_x509_alt_username=yes with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes with_mem_check=no with_sysroot=no
PUSH: No common cipher between server and client. Server data-ciphers: 'AES-256-GCM', client supports cipher 'AES-256-CBC'
/usr/sbin/openvpn --show-ciphersThe following ciphers and cipher modes are available for usewith OpenVPN. Each cipher shown below may be use as aparameter to the --cipher option. The default key size isshown as well as whether or not it can be changed with the--keysize directive. Using a CBC or GCM mode is recommended.In static key mode only CBC mode is allowed.AES-128-CBC (128 bit key, 128 bit block)AES-128-CFB (128 bit key, 128 bit block, TLS client/server mode only)AES-128-CFB1 (128 bit key, 128 bit block, TLS client/server mode only)AES-128-CFB8 (128 bit key, 128 bit block, TLS client/server mode only)AES-128-GCM (128 bit key, 128 bit block, TLS client/server mode only)AES-128-OFB (128 bit key, 128 bit block, TLS client/server mode only)AES-192-CBC (192 bit key, 128 bit block)AES-192-CFB (192 bit key, 128 bit block, TLS client/server mode only)AES-192-CFB1 (192 bit key, 128 bit block, TLS client/server mode only)AES-192-CFB8 (192 bit key, 128 bit block, TLS client/server mode only)AES-192-GCM (192 bit key, 128 bit block, TLS client/server mode only)AES-192-OFB (192 bit key, 128 bit block, TLS client/server mode only)AES-256-CBC (256 bit key, 128 bit block)AES-256-CFB (256 bit key, 128 bit block, TLS client/server mode only)AES-256-CFB1 (256 bit key, 128 bit block, TLS client/server mode only)AES-256-CFB8 (256 bit key, 128 bit block, TLS client/server mode only)AES-256-GCM (256 bit key, 128 bit block, TLS client/server mode only)AES-256-OFB (256 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-128-CBC (128 bit key, 128 bit block)CAMELLIA-128-CFB (128 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-128-CFB1 (128 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-128-CFB8 (128 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-128-OFB (128 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-192-CBC (192 bit key, 128 bit block)CAMELLIA-192-CFB (192 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-192-CFB1 (192 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-192-CFB8 (192 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-192-OFB (192 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-256-CBC (256 bit key, 128 bit block)CAMELLIA-256-CFB (256 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-256-CFB1 (256 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-256-CFB8 (256 bit key, 128 bit block, TLS client/server mode only)CAMELLIA-256-OFB (256 bit key, 128 bit block, TLS client/server mode only)SEED-CBC (128 bit key, 128 bit block)SEED-CFB (128 bit key, 128 bit block, TLS client/server mode only)SEED-OFB (128 bit key, 128 bit block, TLS client/server mode only)The following ciphers have a block size of less than 128 bits,and are therefore deprecated. Do not use unless you have to.BF-CBC (128 bit key by default, 64 bit block)BF-CFB (128 bit key by default, 64 bit block, TLS client/server mode only)BF-OFB (128 bit key by default, 64 bit block, TLS client/server mode only)CAST5-CBC (128 bit key by default, 64 bit block)CAST5-CFB (128 bit key by default, 64 bit block, TLS client/server mode only)CAST5-OFB (128 bit key by default, 64 bit block, TLS client/server mode only)DES-CBC (64 bit key, 64 bit block)DES-CFB (64 bit key, 64 bit block, TLS client/server mode only)DES-CFB1 (64 bit key, 64 bit block, TLS client/server mode only)DES-CFB8 (64 bit key, 64 bit block, TLS client/server mode only)DES-EDE-CBC (128 bit key, 64 bit block)DES-EDE-CFB (128 bit key, 64 bit block, TLS client/server mode only)DES-EDE-OFB (128 bit key, 64 bit block, TLS client/server mode only)DES-EDE3-CBC (192 bit key, 64 bit block)DES-EDE3-CFB (192 bit key, 64 bit block, TLS client/server mode only)DES-EDE3-CFB1 (192 bit key, 64 bit block, TLS client/server mode only)DES-EDE3-CFB8 (192 bit key, 64 bit block, TLS client/server mode only)DES-EDE3-OFB (192 bit key, 64 bit block, TLS client/server mode only)DES-OFB (64 bit key, 64 bit block, TLS client/server mode only)DESX-CBC (192 bit key, 64 bit block)RC2-40-CBC (40 bit key by default, 64 bit block)RC2-64-CBC (64 bit key by default, 64 bit block)RC2-CBC (128 bit key by default, 64 bit block)RC2-CFB (128 bit key by default, 64 bit block, TLS client/server mode only)RC2-OFB (128 bit key by default, 64 bit block, TLS client/server mode only)
configureset interfaces openvpn vtun0 config-file /config/site-to-site.ovpncommit
data-ciphers AES-256-GCM:AES-128-GCM:AES-256-CBCdata-ciphers-fallback AES-256-CBC
I have tested it with a /29 subnet and it also doesn't work
Unfortunately it is refused to see this obvious bug
all log output when debug logs were enabled
The "Instances" menu doesn't help me, because you can there only create server and client modes, but not the site-to-site mode of OpenVPN.
I will not discuss any further