openvpn-install/FAQ.md
2020-10-21 13:59:49 +02:00

3.9 KiB

FAQ

Q: The script has been updated since I installed OpenVPN. How do I update?

A: You can't. Managing updates and new features from the script would require way too much work. Your only solution is to uninstall OpenVPN and reinstall with the updated script.

You can, of course, it's even recommended, update the openvpn package with your package manager.


Q: How do I check for DNS leaks?

A: Go to browserleaks.com or ipleak.net (both perform IPv4 and IPv6 check) with your browser. Only your server's IP should show up.


Q: How do I fix DNS leaks?

A: On Windows 10 DNS leaks are blocked by default with the block-outside-dns option. On Linux you need to add these lines to your .ovpn file based on your Distribution.

Debian 9, 10 and Ubuntu 16.04, 18.04

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

Centos 6, 7

script-security 2
up /usr/share/doc/openvpn-2.4.8/contrib/pull-resolv-conf/client.up
down /usr/share/doc/openvpn-2.4.8/contrib/pull-resolv-conf/client.down

Centos 8, Fedora 30, 31

script-security 2
up /usr/share/doc/openvpn/contrib/pull-resolv-conf/client.up
down /usr/share/doc/openvpn/contrib/pull-resolv-conf/client.down

Arch Linux

script-security 2
up /usr/share/openvpn/contrib/pull-resolv-conf/client.up
down /usr/share/openvpn/contrib/pull-resolv-conf/client.down

Q: Can I use an OpenVPN 2.3 client?

A: Yes. I really recommend using an up-to-date client, but if you really need it, choose the following options:

  • No compression or LZ0
  • RSA certificate
  • DH Key
  • AES CBC
  • tls-auth

If your client is <2.3.3, remove tls-version-min 1.2 from your /etc/openvpn/server.conf and .ovpn files.


Q: IPv6 is not working on my Hetzner VM

A: This an issue on their side. See https://angristan.xyz/fix-ipv6-hetzner-cloud/


Q: DNS is not working on my Linux client

A: See "How do I fix DNS leaks?" question


Q: What syctl and iptables changes are made by the script?

A: Iptables rules are saved at /etc/iptables/add-openvpn-rules.sh and /etc/iptables/rm-openvpn-rules.sh. They are managed by the service /etc/systemd/system/iptables-openvpn.service

Sysctl options are at /etc/sysctl.d/20-openvpn.conf


Q: How can I access other clients connected to the same OpenVPN server?

A: Add client-to-client to your server.conf


Q: My router can't connect

A:

  • Options error: No closing quotation (") in config.ovpn:46 :

    type yes when asked to customize encryption settings and choose tls-auth

  • Options error: Unrecognized option or missing parameter(s) in config.ovpn:36: tls-version-min (2.3.2) :

    see question "Can I use an OpenVPN 2.3 client?"


Q: How can I access computers the OpenVPN server's remote LAN?

A: Add a route with the subnet of the remote network to /etc/openvpn/server.conf and restart openvpn. Example: push "route 192.168.1.0 255.255.255.0" if the server's LAN is 192.168.1.0/24


Q: How can I add multiple users in one go?

A: Here is a sample bash script to achieve this:

userlist=(user1 user2 user3)

for i in ${userlist[@]};do
   MENU_OPTION=1 CLIENT=$i PASS=1 ./openvpn-install.sh
done

Q: How do I change the default .ovpn file created for future clients?

A: You can edit the template out of which .ovpn files are created by editing /etc/openvpn/client-template.txt


Q: For my clients - I want to set my internal network to pass through the VPN and the rest to go through my internet?

A: You would need to edit the .ovpn file. You can edit the template out of which those files are created by editing /etc/openvpn/client-template.txt file and adding

route-nopull
route 10.0.0.0 255.0.0.0

So for example - here it would route all traffic of 10.0.0.0/8 to the vpn. And the rest through the internet.