#!/bin/bash
#
# Reference: https://forums.openvpn.net/topic11401.html
#
# Sleep is necessary cause network has to be up at the time of following commands
# Otherwise the network will not work at all
#
sleep 15
#
/usr/sbin/sysctl -w net.inet.ip.fw.enable=1
/usr/sbin/sysctl -w net.inet.ip.forwarding=1
/usr/sbin/natd -interface en0
/sbin/ipfw add divert natd ip from any to any via en0
natd: Unable to bind divert socket.: Address already in use
sudo vi /etc/pf.conf
--
You received this message because you are subscribed to a topic in the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/tunnelblick-discuss/nsRZGp37RAM/unsubscribe.
To unsubscribe from this group and all its topics, send an email to tunnelblick-dis...@googlegroups.com.
Visit this group at http://groups.google.com/group/tunnelblick-discuss.
For more options, visit https://groups.google.com/groups/opt_out.
If someone knows how to get a reliable "block all" default firewall, please post the pf.conf. You can see the blocked packets using the commands
To unsubscribe from this group and all its topics, send an email to tunnelblick-discuss+unsub...@googlegroups.com.
--
Hi Randy -- thanks. I suspect this is some simple issue with adding the correct route command at bootup or a redirirect in pfctl, but I'm not sure where to start. I'd appreciate any pointers, even if it's suggesting the right questions to ask over at OpenVPN.
Here's what I've got:
With VPN server up and running:
sudo netstat -rn
Routing tables
Internet:
Destination Gateway Flags Refs Use Netif Expire
default 10.0.1.1 UGSc 141 0 en0
10 link#4 UCS 7 0 en0
10.0.1.1 xx:xx:xx:xx:xx:xx UHLWIir 145 3452 en0 527
10.0.1.2 x:xx:xx:xx:xx:xx UHLWI 0 494243 en0 741
10.0.1.3 127.0.0.1 UHS 27 83892 lo0
10.0.1.101 xx:xx:xx:xx:xx:xx UHLWI 0 1 en0 827
10.0.1.112 xx:xx:xx:xx:xx:xx UHLWI 0 9 en0 460
10.0.1.113 xx:xx:xx:xx:xx:xx UHLWIi 3 1265 en0 705
10.0.1.114 xx:xx:xx:xx:xx:xx UHLWIi 1 4877 en0 529
10.255.255.255 ff:ff:ff:ff:ff:ff UHLWbI 0 4 en0
127 127.0.0.1 UCS 0 0 lo0
127.0.0.1 127.0.0.1 UH 39 709196 lo0
169.254 link#4 UCS 1 0 en0
169.254.102.138 xx:xx:xx:xx:xx:xx UHLSW 0 6 en0
Internet6:
Destination Gateway Flags Netif Expire
::1 ::1 UHL lo0
fe80::%lo0/64 fe80::1%lo0 UcI lo0
fe80::1%lo0 link#1 UHLI lo0
fe80::%en0/64 link#4 UCI en0
fe80::xxx:xxxx:xxxx:xxxx%en0 xx:xx:xx:xx:xx:xx UHLWI en0
fe80::xxx:xxxx:xxxx:xxxx%en0 xx:xx:xx:xx:xx UHLWI en0
fe80::xxx:xxxx:xxxx:xxxx%en0 xx:xx:xx:xx:xx:xx UHLWI en0
fe80::xxxx:xxxx:xxxx:xxxx%en0 xx:xx:xx:xx:xx:xx UHLWIi en0
fe80::xxxx:xxxx:xxxx:xxxx%en0 xx:xx:xx:xx:xx:xx UHLWIi en0
fe80::xxxx:xxxx:xxxx:xxxx%en0 x:xx:xx:xx:xx:xx UHLWI en0
fe80::xxxx:xxxx:xxxx:xxxx%en0 xx:xx:xx:xx:xx:xx UHLWI en0
fe80::xxxx:xxxx:xxxx:xxx%en0 xx:xx:xx:xx:xx UHLI lo0
ff01::%lo0/32 ::1 UmCI lo0
ff01::%en0/32 link#4 UmCI en0
ff02::%lo0/32 ::1 UmCI lo0
ff02::%en0/32 link#4 UmCI en0
With VPN server down and all OpenVPN processes shut down:
sudo netstat -rn
Routing tables
Internet:
Destination Gateway Flags Refs Use Netif Expire
default 10.0.1.1 UGSc 114 0 en0
10 link#4 UCS 7 0 en0
10.0.1.1 xx:xx:xx:xx:xx:xx UHLWIir 119 3815 en0 881
10.0.1.2 xx:xx:xx:xx:xx:xx UHLWI 0 494245 en0 623
10.0.1.5 xx:xx:xx:xx:xx UHLWI 0 2 en0 437
10.0.1.98 127.0.0.1 UHS 29 203620 lo0
--
You received this message because you are subscribed to the Google Groups "tunnelblick-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tunnelblick-dis...@googlegroups.com.