freelan-developers / freelan

The main freelan repository.
http://www.freelan.org
Other
1.35k stars 200 forks source link

Cannot ping remote host or connection #82

Closed ghost closed 9 years ago

ghost commented 9 years ago

I am currently trying to setup a peer-to-peer VPN environment between 2 nodes (for now). However, after connecting the 2, I am unable to ping both sides (ping 9.0.0.x). Here is my setup (fake IPs are used):

Side notes: No WiFi Fresh OS installations No separate VPN connection Port 12000 are opened on both ends (NAT)

[Node1] [Azure VM/cloud] Windows Server 2012 R2 FreeLan V2.0 IP: 192.169.226.73:12000 Executed command: freelan --security.passphrase "my secret" -d

[Node2] [Office] Windows Server 2012 R2 FreeLan V2.0 IP: 213.169.226.73:12000 Executed command: freelan --security.passphrase "my secret" --fscp.co ntact 192.169.226.73:12000 --tap_adapter.ipv4_address_prefix_length 9.0.0.2/24 -d

[Log] [Node1] C:\Program Files\FreeLAN\bin>freelan --security.passphrase "my secret" -d 2015-07-14T11:16:41.934040 [INFORMATION] Reading configuration file at: "C:\Prog ram Files\FreeLAN/config/freelan.cfg" 2015-07-14T11:16:41.965291 [INFORMATION] Deriving pre-shared key from passphrase ... 2015-07-14T11:16:41.980912 [DEBUG] Opening core... 2015-07-14T11:16:41.980912 [INFORMATION] Enabling pre-shared key authentication. 2015-07-14T11:16:41.980912 [INFORMATION] Starting FSCP server... 2015-07-14T11:16:41.980912 [IMPORTANT] Core set to listen on: 0.0.0.0:12000 2015-07-14T11:16:42.027787 [INFORMATION] Building CA store... 2015-07-14T11:16:42.027787 [INFORMATION] FSCP server started. 2015-07-14T11:16:42.043413 [IMPORTANT] Tap adapter "Local Area Connection" opene d in mode tap with a MTU set to: 1446 2015-07-14T11:16:42.043413 [IMPORTANT] MSS override enabled with a value of: 139 2 2015-07-14T11:16:42.043413 [INFORMATION] IPv4 address: 9.0.0.1/24 2015-07-14T11:16:42.043413 [INFORMATION] IPv6 address: 2aa1::1/8 2015-07-14T11:16:42.184039 [INFORMATION] Setting interface metric to: 3 2015-07-14T11:16:42.184039 [INFORMATION] Putting interface into the connected st ate. 2015-07-14T11:16:42.184039 [INFORMATION] The DHCP proxy is enabled. 2015-07-14T11:16:42.184039 [INFORMATION] Not advertising any routes. 2015-07-14T11:16:42.199664 [INFORMATION] Not advertising any DNS servers. 2015-07-14T11:16:42.199664 [DEBUG] Core opened. 2015-07-14T11:16:42.199664 [INFORMATION] Using 1 thread(s). 2015-07-14T11:16:42.199664 [IMPORTANT] Execution started. 2015-07-14T11:16:42.215289 [INFORMATION] Starting tap adapter's thread... 2015-07-14T11:16:42.215289 [DEBUG] Thread #0 started. 2015-07-14T11:17:17.667038 [DEBUG] Received HELLO_REQUEST from 213.169.226.73:4 6048. 2015-07-14T11:17:17.825999 [DEBUG] Received PRESENTATION from 213.169.226.73:46 048 using pre-shared key authentication. 2015-07-14T11:17:17.832319 [INFORMATION] Accepting PRESENTATION from 213.125.129 .122:46048 for pre-shared key authentication: first presentation. 2015-07-14T11:17:17.832319 [DEBUG] Sending SESSION_REQUEST to 213.169.226.73:46 048. 2015-07-14T11:17:17.926084 [TRACE] Sending session request message to 213.125.12 9.122:46048 (next_session_number: 0, local_host_identifier: 6ef7d64f76b6e141d7c1 67034223914cf16e142a36434297be4b0af48c9874a2) 2015-07-14T11:17:17.957354 [DEBUG] Received SESSION_REQUEST from 213.169.226.73 :46048 (default: accept). 2015-07-14T11:17:17.957354 [DEBUG] Cipher suites capabilities: ecdhe_rsaaes256 gcm_sha384 ecdhe_rsa_aes128_gcm_sha256 2015-07-14T11:17:17.972955 [DEBUG] Elliptic curve capabilities: sect571k1 secp38 4r1 2015-07-14T11:17:17.972955 [TRACE] Received a SESSION_REQUEST from 213.125.129.1 22:46048 with session number 0 and cipher suite ecdhe_rsa_aes256_gcm_sha384_sect 571k1. No current session exist: preparing one and sending it. 2015-07-14T11:17:18.004204 [TRACE] Sending session message to 213.169.226.73:46 048 (session number: 0, cipher suite: ecdhe_rsa_aes256_gcm_sha384, elliptic curv e: sect571k1). 2015-07-14T11:17:18.149678 [DEBUG] Received SESSION from 213.169.226.73:46048 ( default: accept). 2015-07-14T11:17:18.149678 [DEBUG] Cipher suite: ecdhe_rsa_aes256_gcm_sha384 2015-07-14T11:17:18.149678 [DEBUG] Elliptic curve: sect571k1 2015-07-14T11:17:18.165314 [TRACE] Session established with 213.169.226.73:4604

  1. Sending acknowledgement session message back. 2015-07-14T11:17:18.165314 [TRACE] Sending session message to 213.169.226.73:46 048 (session number: 0, cipher suite: ecdhe_rsa_aes256_gcm_sha384, elliptic curv e: sect571k1). 2015-07-14T11:17:18.180938 [IMPORTANT] Session established with 213.169.226.73:
  2. 2015-07-14T11:17:18.196563 [INFORMATION] Cipher suite: ecdhe_rsa_aes256_gcm_sha3 84 2015-07-14T11:17:18.196563 [INFORMATION] Elliptic curve: sect571k1 2015-07-14T11:17:18.196563 [DEBUG] Sending routes request to 213.169.226.73:460

  3. 2015-07-14T11:17:18.212188 [INFORMATION] Added system route: Network interface # 11 - 213.169.226.73/32 => 100.76.110.1 - metric 0 2015-07-14T11:17:18.227813 [TRACE] Received a SESSION from 213.169.226.73:46048 with session number 0 and cipher suite ecdhe_rsa_aes256_gcm_sha384. A session c urrently exists and has the same number and cipher suite. Ignoring. 2015-07-14T11:17:18.259082 [DEBUG] Received routes request from 213.169.226.73:

  4. Replying with version 0: 2015-07-14T11:17:18.259082 [DEBUG] Sending routes and DNS servers to 213.125.129 .122:46048: version 0 (), (). 2015-07-14T11:19:41.986268 [DEBUG] Sending routes request to all hosts. 2015-07-14T11:20:17.337609 [DEBUG] Received routes request from 213.169.226.73:
  5. Replying with version 0: 2015-07-14T11:20:17.337609 [DEBUG] Sending routes and DNS servers to 213.125.129 .122:46048: version 0 (), (). 2015-07-14T11:22:41.992947 [DEBUG] Sending routes request to all hosts. 2015-07-14T11:23:17.323782 [DEBUG] Received routes request from 213.169.226.73:
  6. Replying with version 0: 2015-07-14T11:23:17.338905 [DEBUG] Sending routes and DNS servers to 213.125.129 .122:46048: version 0 (), ().

[Log] [Node2] C:\Program Files\FreeLAN\bin>freelan --security.passphrase "my secret" --fscp.co ntact 192.169.226.73:12000 --tap_adapter.ipv4_address_prefix_length 9.0.0.2/24 -d 2015-07-14T04:17:51.381500 [INFORMATION] Reading configuration file at: "C:\Prog ram Files\FreeLAN/config/freelan.cfg" 2015-07-14T04:17:51.397075 [INFORMATION] Deriving pre-shared key from passphrase ... 2015-07-14T04:17:51.412705 [DEBUG] Opening core... 2015-07-14T04:17:51.428367 [INFORMATION] Enabling pre-shared key authentication. 2015-07-14T04:17:51.428367 [INFORMATION] Starting FSCP server... 2015-07-14T04:17:51.443999 [IMPORTANT] Core set to listen on: 0.0.0.0:12000 2015-07-14T04:17:51.459608 [INFORMATION] Building CA store... 2015-07-14T04:17:51.459608 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:17:51.475248 [INFORMATION] FSCP server started. 2015-07-14T04:17:51.490849 [IMPORTANT] Tap adapter "Local Area Connection" opene d in mode tap with a MTU set to: 1446 2015-07-14T04:17:51.506491 [IMPORTANT] MSS override enabled with a value of: 139 2 2015-07-14T04:17:51.522085 [INFORMATION] IPv4 address: 9.0.0.2/24 2015-07-14T04:17:51.537703 [INFORMATION] IPv6 address: 2aa1::1/8 2015-07-14T04:17:51.678372 [INFORMATION] Setting interface metric to: 3 2015-07-14T04:17:51.678372 [INFORMATION] Putting interface into the connected st ate. 2015-07-14T04:17:51.678372 [INFORMATION] The DHCP proxy is enabled. 2015-07-14T04:17:51.693997 [INFORMATION] Not advertising any routes. 2015-07-14T04:17:51.693997 [INFORMATION] Not advertising any DNS servers. 2015-07-14T04:17:51.693997 [DEBUG] Core opened. 2015-07-14T04:17:51.693997 [INFORMATION] Using 4 thread(s). 2015-07-14T04:17:51.693997 [INFORMATION] Starting tap adapter's thread... 2015-07-14T04:17:51.709622 [IMPORTANT] Execution started. 2015-07-14T04:17:51.725224 [DEBUG] Thread #1 started. 2015-07-14T04:17:51.725224 [DEBUG] No session exists with 192.169.226.73:12000 (at 192.169.226.73:12000). Contacting... 2015-07-14T04:17:51.740871 [DEBUG] Sending HELLO to 192.169.226.73:12000 2015-07-14T04:17:51.725224 [DEBUG] Thread #0 started. 2015-07-14T04:17:51.725224 [DEBUG] Thread #2 started. 2015-07-14T04:17:51.725224 [DEBUG] Thread #3 started. 2015-07-14T04:17:51.865873 [DEBUG] Received PRESENTATION from 192.169.226.73:12 000 using pre-shared key authentication. 2015-07-14T04:17:51.865873 [DEBUG] Received HELLO_RESPONSE from 192.169.226.73: 12000 at 192.169.226.73:12000. Latency: 00:00:00.125002 2015-07-14T04:17:51.881482 [INFORMATION] Accepting PRESENTATION from 191.238.149 .167:12000 for pre-shared key authentication: first presentation. 2015-07-14T04:17:51.928358 [DEBUG] Sending SESSION_REQUEST to 192.169.226.73:12 000. 2015-07-14T04:17:52.022121 [TRACE] Sending session request message to 191.238.14 9.167:12000 (next_session_number: 0, local_host_identifier: ea634949e570fd2bc5a8 04faf55d298a86fe420633e73f9fae50aa02bebeff3a) 2015-07-14T04:17:52.147126 [DEBUG] Received SESSION_REQUEST from 192.169.226.73 :12000 (default: accept). 2015-07-14T04:17:52.147126 [DEBUG] Cipher suites capabilities: ecdhe_rsaaes256 gcm_sha384 ecdhe_rsa_aes128_gcm_sha256 2015-07-14T04:17:52.162751 [DEBUG] Elliptic curve capabilities: sect571k1 secp38 4r1 2015-07-14T04:17:52.178319 [TRACE] Received a SESSION_REQUEST from 191.238.149.1 67:12000 with session number 0 and cipher suite ecdhe_rsa_aes256_gcm_sha384_sect 571k1. No current session exist: preparing one and sending it. 2015-07-14T04:17:52.209621 [TRACE] Sending session message to 192.169.226.73:12 000 (session number: 0, cipher suite: ecdhe_rsa_aes256_gcm_sha384, elliptic curv e: sect571k1). 2015-07-14T04:17:52.225215 [DEBUG] Received SESSION from 192.169.226.73:12000 ( default: accept). 2015-07-14T04:17:52.240873 [DEBUG] Cipher suite: ecdhe_rsa_aes256_gcm_sha384 2015-07-14T04:17:52.240873 [DEBUG] Elliptic curve: sect571k1 2015-07-14T04:17:52.272125 [TRACE] Session established with 192.169.226.73:1200

  1. Sending acknowledgement session message back. 2015-07-14T04:17:52.287698 [TRACE] Sending session message to 192.169.226.73:12 000 (session number: 0, cipher suite: ecdhe_rsa_aes256_gcm_sha384, elliptic curv e: sect571k1). 2015-07-14T04:17:52.303371 [IMPORTANT] Session established with 192.169.226.73:
  2. 2015-07-14T04:17:52.318999 [INFORMATION] Cipher suite: ecdhe_rsa_aes256_gcm_sha3 84 2015-07-14T04:17:52.318999 [INFORMATION] Elliptic curve: sect571k1 2015-07-14T04:17:52.334621 [DEBUG] Sending routes request to 192.169.226.73:120

  3. 2015-07-14T04:17:52.334621 [INFORMATION] Added system route: Network interface # 14 - 192.169.226.73/32 => 192.168.1.2 - metric 0 2015-07-14T04:17:52.428372 [TRACE] Received a SESSION from 192.169.226.73:12000 with session number 0 and cipher suite ecdhe_rsa_aes256_gcm_sha384. A session c urrently exists and has the same number and cipher suite. Ignoring. 2015-07-14T04:17:52.428372 [DEBUG] Received routes request from 192.169.226.73:

  4. Replying with version 0: 2015-07-14T04:17:52.459624 [DEBUG] Sending routes and DNS servers to 191.238.149 .167:12000: version 0 (), (). 2015-07-14T04:18:21.412765 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:18:21.412765 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:18:51.412777 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:18:53.178407 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:19:23.178422 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:19:23.178422 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:19:53.178438 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:19:53.178438 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:20:16.194073 [DEBUG] Received routes request from 192.169.226.73:
  5. Replying with version 0: 2015-07-14T04:20:16.209699 [DEBUG] Sending routes and DNS servers to 191.238.149 .167:12000: version 0 (), (). 2015-07-14T04:20:23.178452 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:20:23.178452 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:20:51.412844 [DEBUG] Sending routes request to all hosts. 2015-07-14T04:20:53.178469 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:20:53.178469 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:21:23.178487 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:21:23.178487 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:21:53.178502 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:21:53.178502 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:22:23.178516 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:22:23.178516 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:22:53.178531 [DEBUG] Resolving 192.169.226.73:12000 for potential contact... 2015-07-14T04:22:53.178531 [DEBUG] A session already exists with 192.169.226.73 :12000 (at 192.169.226.73:12000). Not contacting again. 2015-07-14T04:23:16.209786 [DEBUG] Received routes request from 192.169.226.73:
  6. Replying with version 0: 2015-07-14T04:23:16.209786 [DEBUG] Sending routes and DNS servers to 191.238.149 .167:12000: version 0 (), ().
ereOn commented 9 years ago

From your logs it seems the connection was successfully established. We can see for instance that "routes requests" messages are sent and received, which mean the VPN tunnel is functional.

I would suspect that at least one of the host has firewall restrictions on the VPN interface (not the physical one, or the VPN connection would not have been established) : this happens very often on Windows.

Can you check that ?

ghost commented 9 years ago

After checking out your suggestions, it works. Many thanks for your quick response!

ereOn commented 9 years ago

@MHamburg You are most welcome !

Glad I could help.