Bonjour Mips,
Je tourne sur un RPI4 + SSD
Ci dessous les logs récupérés de OpenVPN :
0000|Sat Mar 5 15:29:16 2022 WARNING: file '/tmp/jeedom/openvpn/openvpn_auth_IFUc8RCpkfZlidvIZOOSYykmOKW0ZX.conf' is group or others accessible
0001|Sat Mar 5 15:29:16 2022 OpenVPN 2.4.7 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 28 2021
0002|Sat Mar 5 15:29:16 2022 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
0003|Sat Mar 5 15:29:16 2022 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
0004|Sat Mar 5 15:29:16 2022 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1300)
0005|Sat Mar 5 15:29:16 2022 TCP/UDP: Preserving recently used remote address: [AF_INET]135.125.10.213:1200
0006|Sat Mar 5 15:29:16 2022 UDP link local: (not bound)
0007|Sat Mar 5 15:29:16 2022 UDP link remote: [AF_INET]135.125.10.213:1200
0008|Sat Mar 5 15:29:16 2022 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
0009|Sat Mar 5 15:29:16 2022 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0010|Sat Mar 5 15:29:16 2022 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0011|Sat Mar 5 15:29:16 2022 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0012|Sat Mar 5 15:29:16 2022 [server] Peer Connection Initiated with [AF_INET]135.125.10.213:1200
0013|Sat Mar 5 15:29:17 2022 Data Channel: using negotiated cipher 'AES-256-GCM'
0014|Sat Mar 5 15:29:17 2022 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0015|Sat Mar 5 15:29:17 2022 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0016|Sat Mar 5 15:29:17 2022 TUN/TAP device tun0 opened
0017|Sat Mar 5 15:29:17 2022 /sbin/ip link set dev tun0 up mtu 1300
0018|Sat Mar 5 15:29:17 2022 /sbin/ip addr add dev tun0 local 10.15.6.198 peer 10.15.6.197
0019|Sat Mar 5 15:29:17 2022 Initialization Sequence Completed
0020|Sat Mar 5 17:37:09 2022 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0021|Sat Mar 5 17:37:09 2022 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0022|Sat Mar 5 17:37:09 2022 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0023|Sat Mar 5 17:37:09 2022 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0024|Sat Mar 5 17:37:09 2022 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0025|Sat Mar 5 18:37:10 2022 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0026|Sat Mar 5 18:37:10 2022 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0027|Sat Mar 5 18:37:10 2022 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0028|Sat Mar 5 18:37:10 2022 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0029|Sat Mar 5 18:37:10 2022 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0030|Sat Mar 5 19:37:11 2022 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0031|Sat Mar 5 19:37:11 2022 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0032|Sat Mar 5 19:37:11 2022 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0033|Sat Mar 5 19:37:11 2022 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0034|Sat Mar 5 19:37:11 2022 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0035|Sat Mar 5 20:37:11 2022 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com
0036|Sat Mar 5 20:37:11 2022 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com
0037|Sat Mar 5 20:37:11 2022 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0038|Sat Mar 5 20:37:11 2022 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
0039|Sat Mar 5 20:37:11 2022 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA
0040|Sat Mar 5 21:37:12 2022 NOTE: --mute triggered...
Depuis ce week-end, j’ai récupéré une connexion externe fonctionnelle à 100%, mais je ne sais pas pourquoi au final puisque je n’ai pas changé grand chose en lien avec ce problème.
Je bascule de ma box 4G vers ma box ADSL généralement en fin de mois (forfait 4G épuisé) - Tout mon réseau LAN est géré par un système ORBI donc mes adresses IP ne sont pas impactées.Cependant mon adresse IP externe change forcément.
Est ce que cela pourrait générer des problèmes avec OpenVPN ? Sachant que j’effectue cette opération régulièrement depuis 1 an et que cela n’a jamais posé de problème dans le passé.
PS : Merci pour la note sur les droits, j’étais passé au travers.