Есть сервер OpenVPN на убунте и клиенты на платформах Linux, Android и Win разных версий.
На nix и android проблем никаких, на большинстве win-машин тоже. Но есть несколько win-машин с такой проблемой: при подключении к vpn по началу все норм, но рандомно через какое-то время сайты (не все) перестают открываться. При этом на пинги продолжают отвечать. Бегло погуглив, пришел таки к выводу, что дело в MTU на конкретных машинах, но как я с ним не экспериментировал, рабочего результата так и не достиг.
MTU провайдера у этих машин 1492 (ADSL).
Конфиг сервера:
local aaa.bbb.xxx.yyy
push "redirect-gateway def1 bypass-dhcp"
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
client-to-client
tls-auth ta.key 0
crl-verify crl.pem
port 9852
proto udp
dev tun
ca ca.crt
cert server.crt
key server.key # This file should be kept secret
dh dh2048.pem
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
keepalive 10 120
comp-lzo
persist-key
persist-tun
status openvpn-status.log
verb 3
Конфиг проблемного клиента:
remote aaa.bbb.xxx.yyy 9852
comp-lzo yes
client
dev tun
ping 10
proto udp
tls-client
remote-cert-tls server
pkcs12 "c:\\Program Files\\OpenVPN\\config\\vpn.work1.p12"
tls-auth "c:\\Program Files\\OpenVPN\\config\\ta.key" 1
verb 3
pull
Лог подключения с клиента (ip было лень уже замазывать):
C:\Windows\system32>"C:\Program Files\OpenVPN\bin\openvpn.exe" --config "c:\Prog
ram Files\OpenVPN\config\myvpnconfig.ovpn"
Wed Jul 29 09:23:16 2015 OpenVPN 2.3.7 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO]
[PKCS11] [IPv6] built on Jul 9 2015
Wed Jul 29 09:23:16 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Enter Private Key Password:
Wed Jul 29 09:23:20 2015 WARNING: this configuration may cache passwords in memo
ry -- use the auth-nocache option to prevent this
Wed Jul 29 09:23:20 2015 Control Channel Authentication: using 'c:\Program Files
\OpenVPN\config\ta.key' as a OpenVPN static key file
Wed Jul 29 09:23:20 2015 Outgoing Control Channel Authentication: Using 160 bit
message hash 'SHA1' for HMAC authentication
Wed Jul 29 09:23:20 2015 Incoming Control Channel Authentication: Using 160 bit
message hash 'SHA1' for HMAC authentication
Wed Jul 29 09:23:20 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Jul 29 09:23:20 2015 UDPv4 link local (bound): [undef]
Wed Jul 29 09:23:20 2015 UDPv4 link remote: [AF_INET]109.234.38.113:9852
Wed Jul 29 09:23:20 2015 TLS: Initial packet from [AF_INET]109.234.38.113:9852,
sid=981eb7c4 1766a3de
Wed Jul 29 09:23:21 2015 VERIFY OK: depth=1, C=RU, ST=59, L=Orda, O=vpnorda.tk,
OU=OrdaVpnServer, CN=vpnorda.tk, name=EasyRSA, emailAddress=root@vpnorda.tk
Wed Jul 29 09:23:21 2015 Validating certificate key usage
Wed Jul 29 09:23:21 2015 ++ Certificate has key usage 00a0, expects 00a0
Wed Jul 29 09:23:21 2015 VERIFY KU OK
Wed Jul 29 09:23:21 2015 Validating certificate extended key usage
Wed Jul 29 09:23:21 2015 ++ Certificate has EKU (str) TLS Web Server Authenticat
ion, expects TLS Web Server Authentication
Wed Jul 29 09:23:21 2015 VERIFY EKU OK
Wed Jul 29 09:23:21 2015 VERIFY OK: depth=0, C=RU, ST=59, L=Orda, O=vpnorda.tk,
OU=OrdaVpnServer, CN=vpnorda.tk, name=EasyRSA, emailAddress=root@vpnorda.tk
Wed Jul 29 09:23:23 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with
128 bit key
Wed Jul 29 09:23:23 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1'
for HMAC authentication
Wed Jul 29 09:23:23 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with
128 bit key
Wed Jul 29 09:23:23 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1'
for HMAC authentication
Wed Jul 29 09:23:23 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES2
56-SHA, 2048 bit RSA
Wed Jul 29 09:23:23 2015 [vpnorda.tk] Peer Connection Initiated with [AF_INET]10
9.234.38.113:9852
Wed Jul 29 09:23:26 2015 SENT CONTROL [vpnorda.tk]: 'PUSH_REQUEST' (status=1)
Wed Jul 29 09:23:26 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-ga
teway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.
8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.18 1
0.8.0.17'
Wed Jul 29 09:23:26 2015 OPTIONS IMPORT: timers and/or timeouts modified
Wed Jul 29 09:23:26 2015 OPTIONS IMPORT: --ifconfig/up options modified
Wed Jul 29 09:23:26 2015 OPTIONS IMPORT: route options modified
Wed Jul 29 09:23:26 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options
modified
Wed Jul 29 09:23:26 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Jul 29 09:23:26 2015 open_tun, tt->ipv6=0
Wed Jul 29 09:23:26 2015 TAP-WIN32 device [Подключение по локаÐ
»ÑŒÐ½Ð¾Ð¹ Ñети 2] opened: \\.\Global\{125CBAA8-B6E0-400C-A292-C8FEDA657477}.
tap
Wed Jul 29 09:23:26 2015 TAP-Windows Driver Version 9.21
Wed Jul 29 09:23:26 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of
10.8.0.18/255.255.255.252 on interface {125CBAA8-B6E0-400C-A292-C8FEDA657477} [
DHCP-serv: 10.8.0.17, lease-time: 31536000]
Wed Jul 29 09:23:26 2015 Successful ARP Flush on interface [16] {125CBAA8-B6E0-4
00C-A292-C8FEDA657477}
Wed Jul 29 09:23:31 2015 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Wed Jul 29 09:23:31 2015 C:\Windows\system32\route.exe ADD 109.234.38.113 MASK 2
55.255.255.255 192.168.0.13
Wed Jul 29 09:23:31 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMet
ric1=20 and dwForwardType=4
Wed Jul 29 09:23:31 2015 Route addition via IPAPI succeeded [adaptive]
Wed Jul 29 09:23:31 2015 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.
0 10.8.0.17
Wed Jul 29 09:23:31 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMet
ric1=20 and dwForwardType=4
Wed Jul 29 09:23:31 2015 Route addition via IPAPI succeeded [adaptive]
Wed Jul 29 09:23:31 2015 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.
0.0 10.8.0.17
Wed Jul 29 09:23:31 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMet
ric1=20 and dwForwardType=4
Wed Jul 29 09:23:31 2015 Route addition via IPAPI succeeded [adaptive]
Wed Jul 29 09:23:31 2015 C:\Windows\system32\route.exe ADD 10.8.0.0 MASK 255.255
.255.0 10.8.0.17
Wed Jul 29 09:23:31 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMet
ric1=20 and dwForwardType=4
Wed Jul 29 09:23:31 2015 Route addition via IPAPI succeeded [adaptive]
Wed Jul 29 09:23:31 2015 Initialization Sequence Completed
Какие есть соображения?