Mon serveur YunoHost
Matériel: Vieil ordinateur à la maison
Version de YunoHost: 4.3.6.2
J’ai accès à mon serveur : En SSH | Par la webadmin
Êtes-vous dans un contexte particulier ou avez-vous effectué des modificiations particulières sur votre instance ? : non
Le serveur ne dispose pas d’une adresse IPv4.
Le Diagnostique me dis que je n’ai plus d’adresse IPv4. Pourtant j’accède bien au serveur, le ping répond.
J’utilise un vpn d’Ilysse depuis quelques années. Je suspecte vpn_client d’être la source du problème ou c’est une erreur du diagnosis ?
Je n’ai jamais eu ce soucis auparavant !
voici des logs de openvpn-client.log
Tue Mar 8 19:46:33 2022 event_wait : Interrupted system call (code=4)
Tue Mar 8 19:46:33 2022 SIGTERM received, sending exit notification to peer
Tue Mar 8 19:46:34 2022 /sbin/ip route del XX.XXX.XXX.3/32
Tue Mar 8 19:46:34 2022 /sbin/ip route del 0.0.0.0/1
Tue Mar 8 19:46:34 2022 /sbin/ip route del 128.0.0.0/1
Tue Mar 8 19:46:34 2022 delete_route_ipv6(2000::/3)
Tue Mar 8 19:46:34 2022 /sbin/ip -6 route del 2000::/3 dev tun0
Tue Mar 8 19:46:34 2022 Closing TUN/TAP interface
Tue Mar 8 19:46:34 2022 /sbin/ip addr del dev tun0 XX.XXX.XXX.172/25
Tue Mar 8 19:46:34 2022 /sbin/ip -6 addr del 2a00:5881:4008:1e00::42/64 dev tun0
Tue Mar 8 19:46:34 2022 SIGTERM[soft,exit-with-notification] received, process exiting
Tue Mar 8 19:47:23 2022 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 28 2021
Tue Mar 8 19:47:23 2022 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
Tue Mar 8 19:47:23 2022 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
Tue Mar 8 19:47:23 2022 TCP/UDP: Preserving recently used remote address: [AF_INET6]2a00:XXXX:XXXX::3:1194
Tue Mar 8 19:47:23 2022 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Mar 8 19:47:23 2022 UDP link local: (not bound)
Tue Mar 8 19:47:23 2022 UDP link remote: [AF_INET6]2a00:XXXX:XXXX::3:1194
Tue Mar 8 19:47:23 2022 TLS: Initial packet from [AF_INET6]2a00:XXXX:XXXX::3:1194, sid=c11afa3d 5a04254e
Tue Mar 8 19:47:23 2022 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Tue Mar 8 19:47:24 2022 VERIFY OK: depth=1, C=FR, ST=RHA, L=Villeurbanne, O=ILLYSE, OU=openvpn, CN=illyse-openvpn-ca, name=ILLYSE, emailAddress=abuse@illyse.org
Tue Mar 8 19:47:24 2022 VERIFY OK: nsCertType=SERVER
Tue Mar 8 19:47:24 2022 VERIFY KU OK
Tue Mar 8 19:47:24 2022 Validating certificate extended key usage
Tue Mar 8 19:47:24 2022 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Mar 8 19:47:24 2022 NOTE: --mute triggered...
Tue Mar 8 19:47:24 2022 3 variation(s) on previous 5 message(s) suppressed by --mute
Tue Mar 8 19:47:24 2022 [changeme] Peer Connection Initiated with [AF_INET6]2a00:XXXX:XXXX::3:1194
Tue Mar 8 19:47:25 2022 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Tue Mar 8 19:47:25 2022 PUSH: Received control message: 'PUSH_REPLY,tun-ipv6,dhcp-option DNS XX.XXX.XXX.2,dhcp-option DNS XX.XXX.XXX.1,explicit-exit-notify,route-gateway XX.XXX.XXX.129,topology subnet,ping 10,ping-restart 30,ifconfig-ipv6 2a00:5881:4008:1e00::42/64 2a00:XXXX:XXXX::1,ifconfig XX.XXX.XXX.172 255.255.255.128,peer-id 6,cipher AES-128-GCM'
Tue Mar 8 19:47:25 2022 OPTIONS IMPORT: timers and/or timeouts modified
Tue Mar 8 19:47:25 2022 OPTIONS IMPORT: explicit notify parm(s) modified
Tue Mar 8 19:47:25 2022 OPTIONS IMPORT: --ifconfig/up options modified
Tue Mar 8 19:47:25 2022 NOTE: --mute triggered...
Tue Mar 8 19:47:25 2022 5 variation(s) on previous 5 message(s) suppressed by --mute
Tue Mar 8 19:47:25 2022 Data Channel: using negotiated cipher 'AES-128-GCM'
Tue Mar 8 19:47:25 2022 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Tue Mar 8 19:47:25 2022 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
Tue Mar 8 19:47:25 2022 ROUTE_GATEWAY 192.168.0.254/255.255.255.0 IFACE=enp5s0 HWADDR=e8:de:27:a7:2a:ed
Tue Mar 8 19:47:25 2022 GDG6: remote_host_ipv6=2a00:XXXX:XXXX::3
Tue Mar 8 19:47:25 2022 ROUTE6_GATEWAY fe80::207:cbff:fe9a:5d02 IFACE=enp5s0
Tue Mar 8 19:47:25 2022 ROUTE6: 2000::/3 overlaps IPv6 remote 2a00:XXXX:XXXX::3, adding host route to VPN endpoint
Tue Mar 8 19:47:25 2022 TUN/TAP device tun0 opened
Tue Mar 8 19:47:25 2022 TUN/TAP TX queue length set to 100
Tue Mar 8 19:47:25 2022 /sbin/ip link set dev tun0 up mtu 1500
Tue Mar 8 19:47:25 2022 /sbin/ip addr add dev tun0 XX.XXX.XXX.172/25 broadcast XX.XXX.XXX.255
Tue Mar 8 19:47:25 2022 /sbin/ip -6 addr add 2a00:5881:4008:1e00::42/64 dev tun0
Tue Mar 8 19:47:27 2022 ROUTE remote_host protocol differs from tunneled
Tue Mar 8 19:47:27 2022 /sbin/ip route add 0.0.0.0/1 via XX.XXX.XXX.129
Tue Mar 8 19:47:27 2022 /sbin/ip route add 128.0.0.0/1 via XX.XXX.XXX.129
Tue Mar 8 19:47:27 2022 add_route_ipv6(2a00:XXXX:XXXX::3/128 -> fe80::207:cbff:fe9a:5d02 metric 1) dev enp5s0
Tue Mar 8 19:47:27 2022 /sbin/ip -6 route add 2a00:XXXX:XXXX::3/128 dev enp5s0 via fe80::207:cbff:fe9a:5d02 metric 1
Tue Mar 8 19:47:27 2022 add_route_ipv6(2000::/3 -> 2a00:XXXX:XXXX::1 metric -1) dev tun0
Tue Mar 8 19:47:27 2022 /sbin/ip -6 route add 2000::/3 dev tun0
Tue Mar 8 19:47:27 2022 Initialization Sequence Completed