VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Scripts to manage certificates or generate config files

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Tue Jul 05, 2016 1:19 pm

Hi,

i want to connect a yealink T46G phne to a openvpn server. My openvpn server is the kylemanna/docker-openvpn (https://github.com/kylemanna/docker-openvpn) it is easy to install and word with windows an ios clients very good.

when i use the yealink phone i must generate a .tar file with keys an vpn.cnf.

the vpn.cnf ist the client.ovpn file.

My client file is:

Code: Select all

client
nobind
dev tun
dev-type tun
remote-cert-tls server

remote xxxxxx.net 1194 udp

redirect-gateway def1
ca /config/openvpn/keys/ca.crt
cert /config/openvpn/keys/client.crt
key /config/openvpn/keys/client.key
tls-auth /config/openvpn/keys/ta.key 1
my server openvpn.conf is:

Code: Select all

server 192.168.255.0 255.255.255.0
verb 3
key /etc/openvpn/pki/private/xxxxxx.net.key
ca /etc/openvpn/pki/ca.crt
cert /etc/openvpn/pki/issued/xxxxxx.net.crt
dh /etc/openvpn/pki/dh.pem
tls-auth /etc/openvpn/pki/ta.key
key-direction 0
keepalive 10 60
persist-key
persist-tun

proto udp
# Rely on Docker to do port mapping, internally always 1194
port 1194
dev tun0
status /tmp/openvpn-status.log
log-append /var/log/openvpn.log


user nobody
group nogroup
push dhcp-option DNS 8.8.8.8
push dhcp-option DNS 8.8.4.4
route 192.168.254.0 255.255.255.0
script-security 3

The Error on the client is:

Code: Select all

VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
TLS Error: TLS object -> incoming plaintext read error 
TLS Error: TLS handshake failed 
the Log on the Server Say:

Code: Select all

Tue Jul  5 15:19:10 2016 192.168.163.1:49723 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:19:10 2016 192.168.163.1:49723 TLS Error: TLS handshake failed
Tue Jul  5 15:19:10 2016 192.168.163.1:49723 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:19:10 2016 192.168.163.1:38898 TLS: Initial packet from [AF_INET]192.168.163.1:38898, sid=ae2045d9 78a012f0
Tue Jul  5 15:19:13 2016 192.168.163.1:59266 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:19:13 2016 192.168.163.1:59266 TLS Error: TLS handshake failed
Tue Jul  5 15:19:13 2016 192.168.163.1:59266 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:19:13 2016 192.168.163.1:47729 TLS: Initial packet from [AF_INET]192.168.163.1:47729, sid=10a6ae4f efe025fd
Tue Jul  5 15:19:15 2016 192.168.163.1:58004 TLS: Initial packet from [AF_INET]192.168.163.1:58004, sid=8cd1d392 ed546d5d
Tue Jul  5 15:19:16 2016 192.168.163.1:53506 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:19:16 2016 192.168.163.1:53506 TLS Error: TLS handshake failed
Tue Jul  5 15:19:16 2016 192.168.163.1:53506 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:19:18 2016 192.168.163.1:37118 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:19:18 2016 192.168.163.1:37118 TLS Error: TLS handshake failed
Tue Jul  5 15:19:18 2016 192.168.163.1:37118 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:19:18 2016 192.168.163.1:55150 TLS: Initial packet from [AF_INET]192.168.163.1:55150, sid=1d0517dc 8a0ab0c7
Tue Jul  5 15:19:20 2016 192.168.163.1:49834 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:19:20 2016 192.168.163.1:49834 TLS Error: TLS handshake failed
Tue Jul  5 15:19:20 2016 192.168.163.1:49834 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:19:20 2016 192.168.163.1:42365 TLS: Initial packet from [AF_INET]192.168.163.1:42365, sid=34bc0b8e 9f34d1a0
Tue Jul  5 15:19:23 2016 192.168.163.1:55069 TLS: Initial packet from [AF_INET]192.168.163.1:55069, sid=df79b322 65bf93b6
Tue Jul  5 15:19:24 2016 192.168.163.1:35411 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:19:24 2016 192.168.163.1:35411 TLS Error: TLS handshake failed
Tue Jul  5 15:19:24 2016 192.168.163.1:35411 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:19:26 2016 192.168.163.1:56406 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:19:26 2016 192.168.163.1:56406 TLS Error: TLS handshake failed
Tue Jul  5 15:19:26 2016 192.168.163.1:56406 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:19:26 2016 192.168.163.1:37661 TLS: Initial packet from [AF_INET]192.168.163.1:37661, sid=033b
Best regards
Thomas ;)

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Tue Jul 05, 2016 1:41 pm

Hi,

i have this error messages on the client

Code: Select all

VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
TLS Error: TLS object -> incoming plaintext read error 
TLS Error: TLS handshake failed 
My server is the kylemanna/docker-openvpn Docker Container.
The Server config is

Code: Select all

server 192.168.255.0 255.255.255.0
verb 3
key /etc/openvpn/pki/private/xxxxxx.net.key
ca /etc/openvpn/pki/ca.crt
cert /etc/openvpn/pki/issued/xxxxxx.net.crt
dh /etc/openvpn/pki/dh.pem
tls-auth /etc/openvpn/pki/ta.key
key-direction 0
keepalive 10 60
persist-key
persist-tun

proto udp
# Rely on Docker to do port mapping, internally always 1194
port 1194
dev tun0
status /tmp/openvpn-status.log
log-append /var/log/openvpn.log


user nobody
group nogroup
push dhcp-option DNS 8.8.8.8
push dhcp-option DNS 8.8.4.4
route 192.168.254.0 255.255.255.0
script-security 3


My client is a yealink t46g with this config:

Code: Select all

client
nobind
dev tun
dev-type tun
remote-cert-tls server

remote xxxxxx.net 1194 udp

redirect-gateway def1
ca /config/openvpn/keys/ca.crt
cert /config/openvpn/keys/client.crt
key /config/openvpn/keys/client.key
tls-auth /config/openvpn/keys/ta.key 1
the server log say this:

Code: Select all

Tue Jul  5 15:39:04 2016 192.168.163.1:38510 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:39:04 2016 192.168.163.1:34801 TLS: Initial packet from [AF_INET]192.168.163.1:34801, sid=d539b666 95e55e2c
Tue Jul  5 15:39:05 2016 192.168.163.1:48482 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:39:05 2016 192.168.163.1:48482 TLS Error: TLS handshake failed
Tue Jul  5 15:39:05 2016 192.168.163.1:48482 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:39:06 2016 192.168.163.1:48100 TLS: Initial packet from [AF_INET]192.168.163.1:48100, sid=575f10e5 ea6ad9ad
Tue Jul  5 15:39:08 2016 192.168.163.1:38067 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:39:08 2016 192.168.163.1:38067 TLS Error: TLS handshake failed
Tue Jul  5 15:39:08 2016 192.168.163.1:38067 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:39:09 2016 192.168.163.1:36027 TLS: Initial packet from [AF_INET]192.168.163.1:36027, sid=379397ee 4cd90286
Tue Jul  5 15:39:11 2016 192.168.163.1:53753 TLS: Initial packet from [AF_INET]192.168.163.1:53753, sid=ce88336c 022faa95
Tue Jul  5 15:39:11 2016 192.168.163.1:40667 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:39:11 2016 192.168.163.1:40667 TLS Error: TLS handshake failed
Tue Jul  5 15:39:11 2016 192.168.163.1:40667 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:39:14 2016 192.168.163.1:43150 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:39:14 2016 192.168.163.1:43150 TLS Error: TLS handshake failed
Tue Jul  5 15:39:14 2016 192.168.163.1:43150 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:39:14 2016 192.168.163.1:59296 TLS: Initial packet from [AF_INET]192.168.163.1:59296, sid=71421be0 83dc1187
Tue Jul  5 15:39:16 2016 192.168.163.1:48295 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:39:16 2016 192.168.163.1:48295 TLS Error: TLS handshake failed
Tue Jul  5 15:39:16 2016 192.168.163.1:48295 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Jul  5 15:39:16 2016 192.168.163.1:55698 TLS: Initial packet from [AF_INET]192.168.163.1:55698, sid=3f672f74 b1d04ebf
Tue Jul  5 15:39:18 2016 192.168.163.1:52256 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jul  5 15:39:18 2016 192.168.163.1:52256 TLS Error: TLS handshake failed
with windows an ios client i have no problems.

best regards
Thomas

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Tue Jul 05, 2016 2:40 pm

thomaslauer wrote:with windows an ios client i have no problems
Please post the config file of a working client.

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Tue Jul 05, 2016 2:45 pm

Config file from a working client

Code: Select all

client
nobind
dev tun
remote-cert-tls server

remote xxxxxx.net 1194 udp


<key>
-----BEGIN PRIVATE KEY-----
MIIEvwIB....
-----END PRIVATE KEY-----
</key>
<cert>
-----BEGIN CERTIFICATE-----
MIIDPTC....
-----END CERTIFICATE-----
</cert>
<ca>
-----BEGIN CERTIFICATE-----
MIIDN....
-----END CERTIFICATE-----
</ca>
<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
67ac...
-----END OpenVPN Static key V1-----
</tls-auth>
key-direction 1

redirect-gateway def1

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Tue Jul 05, 2016 2:52 pm

Try removing this
thomaslauer wrote:

Code: Select all

remote-cert-tls server
from your broken client config:

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Tue Jul 05, 2016 3:02 pm

thanks for your reply.
i remove the line but i have the same problem.

i recieve this warning
WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Tue Jul 05, 2016 3:35 pm

What version of Easy-RSA did you use to create your PKI ?

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Tue Jul 05, 2016 3:42 pm

Where Can i see my easy rsa Version?

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Tue Jul 05, 2016 3:57 pm

Don't worry about it .. according to the git-docker pages, you appear to be using v3, which is good.

The only advice I can offer is to set verb 4 in your yealink phone client config and then post the complete log.

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Tue Jul 05, 2016 7:52 pm

Jul 5 19:06:13 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:13 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:13 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:13 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:13 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:15 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:15 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:16 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:16 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:16 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:16 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:16 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:16 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:16 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:16 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:16 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:18 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:18 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:18 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:18 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:18 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:18 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:18 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:18 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:18 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:18 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:18 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:20 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:21 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:21 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:21 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:21 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:21 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:21 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:21 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:21 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:21 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:21 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:23 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:23 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:23 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:23 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:23 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:23 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:23 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:23 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:23 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:23 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:23 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:25 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:25 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:25 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:25 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:25 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:25 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:26 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:26 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:26 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:26 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:26 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:28 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:28 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:28 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:28 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:28 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:28 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:28 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:28 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:28 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:28 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:28 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:30 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:30 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:30 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:30 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:31 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:31 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:31 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:31 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:31 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:31 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:31 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:33 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:33 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:33 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:33 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:33 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:33 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:33 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:33 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:33 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:33 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:33 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:35 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:35 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:35 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:35 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:35 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:35 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:36 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:36 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:36 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:36 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:36 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:38 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:38 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:38 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:38 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:38 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:38 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:38 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:38 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:38 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:38 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:38 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:40 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:40 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:40 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:40 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:40 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:40 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:41 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:41 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:41 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:41 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:41 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:43 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:43 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:43 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:43 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:43 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:43 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:43 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:43 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:43 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:43 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:43 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:45 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:45 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:45 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:45 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:45 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:45 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:46 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:46 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:46 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:46 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:46 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:48 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:48 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:48 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:48 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:48 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:48 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194
Jul 5 19:06:48 192.168.1.121 daemon err openvpn[572] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 5 19:06:48 192.168.1.121 daemon err openvpn[572] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 5 19:06:48 192.168.1.121 daemon err openvpn[572] TLS Error: TLS object -> incoming plaintext read error
Jul 5 19:06:48 192.168.1.121 daemon err openvpn[572] TLS Error: TLS handshake failed
Jul 5 19:06:48 192.168.1.121 daemon notice openvpn[572] SIGUSR1[soft,tls-error] received, process restarting
Jul 5 19:06:50 192.168.1.121 daemon warning openvpn[572] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 5 19:06:51 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 5 19:06:51 192.168.1.121 daemon warning openvpn[572] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 5 19:06:51 192.168.1.121 daemon notice openvpn[572] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 5 19:06:51 192.168.1.121 daemon notice openvpn[572] UDPv4 link local: [undef]
Jul 5 19:06:51 192.168.1.121 daemon notice openvpn[572] UDPv4 link remote: 217.92.25.211:1194

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Tue Jul 05, 2016 8:55 pm

I was more interested in the part you chose not to post ..

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Tue Jul 05, 2016 8:59 pm

It always the same. The Log has 10000 Lines.

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Tue Jul 05, 2016 9:48 pm

Stop and start openvpn then stop again after 2 minutes .. it will start the log from scratch and not be so long ..

Or reboot the phone .. whatever works.

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 11:36 am

Ok here the first 300 Lines

Code: Select all

Jul  6 00:00:23	192.168.1.121	GUI	user	warning	[444]	WEB <4+warnin>ListenerContainer::onRequest End.result = false 
Jul  6 11:31:21	192.168.1.121		local0	info	netS[379]	SRV <6+info  >  to set time dst result=9988119 
Jul  6 11:31:21	192.168.1.121	GUI	user	emerg	[538]	ANY <0+emerg >GUI  log :sys=1,cons=0,time=0,sock=0,E=3,W=4,N=5,I=6,D=7 
Jul  6 11:31:21	192.168.1.121	GUI	user	emerg	[538]	ANY <0+emerg >ANY =5 
Jul  6 11:31:22	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 50 s.... 
Jul  6 11:31:22	192.168.1.121		local0	err	auto[394]	ATP <3+error > network isn't complete! 
Jul  6 11:31:22	192.168.1.121		local0	info	netS[379]	SRV <6+info  > reset time [2016-07-06 11:31:21] from ntp server:192.168.1.52 
Jul  6 11:31:22	192.168.1.121	GUI	user	warning	[444]	WEB <4+warnin>ListenerContainer::onRequest End.result = false 
Jul  6 11:31:22	192.168.1.121	GUI	user	emerg	[538]	ANY <0+emerg >682.928.858:GUI  log :sys=1,cons=0,time=1,sock=0,E=3,W=4,N=5,I=6,D=7 
Jul  6 11:31:22	192.168.1.121	GUI	user	emerg	[538]	ANY <0+emerg >682.932.601:ANY =6 
Jul  6 11:31:22	192.168.1.121	GUI	user	warning	[444]	WEB <4+warnin>ListenerContainer::onRequest End.result = false 
Jul  6 11:31:23	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 49 s.... 
Jul  6 11:31:23	192.168.1.121	ATP	local0	emerg	[394]	ANY <0+emerg > ATP log :sys=1,cons=1,time=0,E=3,W=4,N=5,I=6,D=7 
Jul  6 11:31:23	192.168.1.121	ATP	local0	emerg	[394]	ANY <0+emerg > ANY =6 
Jul  6 11:31:23	192.168.1.121	TR9	local0	info	[606]	TR9 <6+info  > find port 7547 in url http://192.168.1.121:7547/ 
Jul  6 11:31:23	192.168.1.121	TR9	local0	info	[606]	TR9 <6+info  > HTTP Connection Req URL: http://192.168.1.121:7547/ 
Jul  6 11:31:23	192.168.1.121	TR9	local0	info	[606]	TR9 <6+info  > ProductClass:[ $DEVNAME ] 
Jul  6 11:31:23	192.168.1.121	TR9	local0	info	[606]	TR9 <6+info  > ModelName:[ $DEVNAME ] 
Jul  6 11:31:23	192.168.1.121	TR9	local0	info	[606]	TR9 <6+info  > ManufacturerOUI:[ 001565 ] 
Jul  6 11:31:24	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link local: [undef] 
Jul  6 11:31:24	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:31:24	192.168.1.121	TR9	local0	info	[606]	TR9 <6+info  > cwmp use CA certs trust certs path 
Jul  6 11:31:24	192.168.1.121	TR9	local0	info	[606]	TR9 <6+info  > cwmp use client cert device cert path 
Jul  6 11:31:24	192.168.1.121	TR9	local0	info	[606]	TR9 <6+info  > Waiting Message Queue! 
Jul  6 11:31:24	192.168.1.121	TR9	local0	info	[606]	TR9 <6+info  > find port 7547 in url http://192.168.1.121:7547/ 
Jul  6 11:31:24	192.168.1.121		daemon	notice	openvpn[572]	TLS: Initial packet from 217.92.25.211:1194, sid=be52dce0 0678cdd7 
Jul  6 11:31:24	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > Init download lib... 
Jul  6 11:31:24	192.168.1.121		local0	emerg	LIBD[394]	DANY<0+emerg > LIBD log :sys=1,cons=0,time=0,E=3,W=4,N=5,I=6,D=7 
Jul  6 11:31:24	192.168.1.121		local0	emerg	LIBD[394]	DANY<0+emerg > LIBD log :sys=1,cons=1,time=0,E=3,W=4,N=5,I=6,D=7 
Jul  6 11:31:24	192.168.1.121		local0	emerg	LIBD[394]	DANY<0+emerg > DANY=6 
Jul  6 11:31:24	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > file state check fail! 
Jul  6 11:31:24	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > autop upgrade by pnp url 
Jul  6 11:31:24	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > Upgrade from com.cfg 
Jul  6 11:31:24	192.168.1.121		local0	info	LIBD[394]	DCMN<6+info  > Connecting 192.168.1.52:50080 
Jul  6 11:31:24	192.168.1.121		local0	info	LIBD[394]	DCMN<6+info  > Connecting IP = 192.168.1.52, Port = 50080 
Jul  6 11:31:24	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Request Line: GET /ap/yealink/y000000000028.cfg HTTP/1.1 
Jul  6 11:31:24	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Host: 192.168.1.52:50080 
Jul  6 11:31:24	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > User-Agent: Yealink SIP-T46G 28.73.150.3 28.2.0.128.0.0.0 00:15:65:a1:4c:63 
Jul  6 11:31:24	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > process response 
Jul  6 11:31:24	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> response code: 200 
Jul  6 11:31:24	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Content-Length: 6429 
Jul  6 11:31:24	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> response process finish! 
Jul  6 11:31:24	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> recv : 6429 bytes 
Jul  6 11:31:24	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > need_cmp_md5=1 
Jul  6 11:31:24	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > cfg md5 same! 
Jul  6 11:31:24	192.168.1.121		daemon	err	openvpn[572]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:31:24	192.168.1.121		daemon	err	openvpn[572]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:31:24	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:31:24	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS handshake failed 
Jul  6 11:31:24	192.168.1.121		daemon	notice	openvpn[572]	TCP/UDP: Closing socket 
Jul  6 11:31:24	192.168.1.121		daemon	notice	openvpn[572]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:31:24	192.168.1.121		daemon	notice	openvpn[572]	Restart pause, 2 second(s) 
Jul  6 11:31:24	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 48 s.... 
Jul  6 11:31:24	192.168.1.121	ATP	local0	warning	[394]	ATP <4+warnin> error: redirect.enable 
Jul  6 11:31:25	192.168.1.121		local0	info	LIBD[394]	DCMN<6+info  > Connecting 192.168.1.52:50080 
Jul  6 11:31:25	192.168.1.121		local0	info	LIBD[394]	DCMN<6+info  > Connecting IP = 192.168.1.52, Port = 50080 
Jul  6 11:31:25	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Request Line: GET /downloads/yealink/logo/yealink-t46/t46g.jpg HTTP/1.1 
Jul  6 11:31:25	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Host: 192.168.1.52:50080 
Jul  6 11:31:25	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > User-Agent: Yealink SIP-T46G 28.73.150.3 28.2.0.128.0.0.0 00:15:65:a1:4c:63 
Jul  6 11:31:25	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > process response 
Jul  6 11:31:25	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> response code: 200 
Jul  6 11:31:25	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Content-Length: 118245 
Jul  6 11:31:25	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> response process finish! 
Jul  6 11:31:25	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> recv : 118245 bytes 
Jul  6 11:31:25	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > System do: scale image file by script 
Jul  6 11:31:25	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 47 s.... 
Jul  6 11:31:25	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >685.773.663:RegisterMsgHandle Success 
Jul  6 11:31:25	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >685.812.138:RegisterMsgHandle Success 
Jul  6 11:31:25	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >685.813.083:RegisterMsgHandle Success 
Jul  6 11:31:25	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >685.813.875:RegisterMsgHandle Success 
Jul  6 11:31:25	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >685.814.664:RegisterMsgHandle Success 
Jul  6 11:31:25	192.168.1.121	GUI	user	info	[538]	BKLT<6+info  >685.933.768:DoEvent ActiveLevel[8] 
Jul  6 11:31:25	192.168.1.121	GUI	user	info	[538]	BKLT<6+info  >685.934.877:BackLight Set light(80) 
Jul  6 11:31:25	192.168.1.121	GUI	user	info	[538]	DEVL<6+info  >685.938.298:level(80) 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	DEVL<6+info  >686.018.021:Keypad dev: /dev/keypad0 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >686.041.924:RegisterMsgHandle Success 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >686.043.152:Led Lamp:All light off! 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >686.071.571:Ledlamp: post event(1, 0, 0, 0, 0) 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >686.093.219:ACD Light is 0, 0, 0, -1, 0.  EnableQueueStatusLight(0) 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >686.094.063:Ledlamp: post event(35, 0, 0, 0, 0) 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >686.095.167:Ledlamp: post event(38, 0, 0, 0, 0) 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >686.162.632:Ledlamp: post event(39, 0, 0, 0, 0) 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >686.163.683:Ledlamp: post event(2, 0, 0, 0, 0) 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >686.203.261:RegisterMsgHandle Success 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >686.204.164:RegisterMsgHandle Success 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >686.204.977:RegisterMsgHandle Success 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >686.220.273:RegisterMsgHandle Success 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >686.248.320:RegisterMsgHandle Success 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >686.249.205:RegisterMsgHandle Success 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >686.252.572:Ledlamp: post event(4, 0, 0, 0, 0) 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >686.254.040:Ledlamp: post event(37, 0, 0, 0, 0) 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >686.255.108:RegisterMsgHandle Success 
Jul  6 11:31:26	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >686.270.933:RegisterMsgHandle Success 
Jul  6 11:31:26	192.168.1.121		daemon	warning	openvpn[572]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:31:26	192.168.1.121		daemon	warning	openvpn[572]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:31:26	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:31:26	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 46 s.... 
Jul  6 11:31:26	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link local: [undef] 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:31:26	192.168.1.121		daemon	notice	openvpn[572]	TLS: Initial packet from 217.92.25.211:1194, sid=f20db6cd 980a8998 
Jul  6 11:31:27	192.168.1.121		daemon	err	openvpn[572]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:31:27	192.168.1.121		daemon	err	openvpn[572]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:31:27	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:31:27	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS handshake failed 
Jul  6 11:31:27	192.168.1.121		daemon	notice	openvpn[572]	TCP/UDP: Closing socket 
Jul  6 11:31:27	192.168.1.121		daemon	notice	openvpn[572]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:31:27	192.168.1.121		daemon	notice	openvpn[572]	Restart pause, 2 second(s) 
Jul  6 11:31:27	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 45 s.... 
Jul  6 11:31:28	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > yaffs2 file system, decrease 384K 
Jul  6 11:31:28	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > AUTOP: wallpaper_upload.url [Success]. 
Jul  6 11:31:28	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > send start provision!! 
Jul  6 11:31:28	192.168.1.121		local0	info	LIBD[394]	DCMN<6+info  > Connecting 192.168.1.52:50080 
Jul  6 11:31:28	192.168.1.121		local0	info	LIBD[394]	DCMN<6+info  > Connecting IP = 192.168.1.52, Port = 50080 
Jul  6 11:31:28	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Request Line: GET /ap/downloads/yealink/accesscontrol/WebItemslevel.cfg HTTP/1.1 
Jul  6 11:31:28	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Host: 192.168.1.52:50080 
Jul  6 11:31:28	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > User-Agent: Yealink SIP-T46G 28.73.150.3 28.2.0.128.0.0.0 00:15:65:a1:4c:63 
Jul  6 11:31:28	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > process response 
Jul  6 11:31:28	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> response code: 200 
Jul  6 11:31:28	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Content-Length: 9678 
Jul  6 11:31:28	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> response process finish! 
Jul  6 11:31:28	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> recv : 9678 bytes 
Jul  6 11:31:28	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > MD5 is same 
Jul  6 11:31:28	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > AUTOP: web_item_level.url [Fail]. 
Jul  6 11:31:28	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 44 s.... 
Jul  6 11:31:29	192.168.1.121		daemon	warning	openvpn[572]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:31:29	192.168.1.121		daemon	warning	openvpn[572]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:31:29	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:31:29	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link local: [undef] 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	TLS: Initial packet from 217.92.25.211:1194, sid=98e1cba2 f095a04e 
Jul  6 11:31:29	192.168.1.121		daemon	err	openvpn[572]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:31:29	192.168.1.121		daemon	err	openvpn[572]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:31:29	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:31:29	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS handshake failed 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	TCP/UDP: Closing socket 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:31:29	192.168.1.121		daemon	notice	openvpn[572]	Restart pause, 2 second(s) 
Jul  6 11:31:29	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 43 s.... 
Jul  6 11:31:30	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 42 s.... 
Jul  6 11:31:31	192.168.1.121		daemon	warning	openvpn[572]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:31:31	192.168.1.121		daemon	warning	openvpn[572]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:31:31	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:31:31	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link local: [undef] 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:31:31	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 41 s.... 
Jul  6 11:31:31	192.168.1.121		daemon	notice	openvpn[572]	TLS: Initial packet from 217.92.25.211:1194, sid=7a3f1f89 c5f71de7 
Jul  6 11:31:32	192.168.1.121		daemon	err	openvpn[572]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:31:32	192.168.1.121		daemon	err	openvpn[572]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:31:32	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:31:32	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS handshake failed 
Jul  6 11:31:32	192.168.1.121		daemon	notice	openvpn[572]	TCP/UDP: Closing socket 
Jul  6 11:31:32	192.168.1.121		daemon	notice	openvpn[572]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:31:32	192.168.1.121		daemon	notice	openvpn[572]	Restart pause, 2 second(s) 
Jul  6 11:31:32	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 40 s.... 
Jul  6 11:31:33	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 39 s.... 
Jul  6 11:31:34	192.168.1.121		daemon	warning	openvpn[572]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:31:34	192.168.1.121		daemon	warning	openvpn[572]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:31:34	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:31:34	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link local: [undef] 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	TLS: Initial packet from 217.92.25.211:1194, sid=28e2848e 21dd1162 
Jul  6 11:31:34	192.168.1.121		daemon	err	openvpn[572]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:31:34	192.168.1.121		daemon	err	openvpn[572]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:31:34	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:31:34	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS handshake failed 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	TCP/UDP: Closing socket 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:31:34	192.168.1.121		daemon	notice	openvpn[572]	Restart pause, 2 second(s) 
Jul  6 11:31:34	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 38 s.... 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.154.971:PostMSGToVPM: Post Msg[7000e] to VPM[1][0]! 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.161.506:0, 0 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.162.358:[CVolumeManager::SetVolumeToVPM] eType=8, Logic Volume=0 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.163.148:PostMSGToVPM: Post Msg[70014] to VPM[1][0]! 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.164.041:PostMSGToVPM: Post Msg[70006] to VPM[0][1]! 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.164.913:PostMSGToVPM: Post Msg[7000c] to VPM[1][0]! 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.167.060:PostMSGToVPM: Post Msg[7000d] to VPM[1][0]! 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.171.690:8, 8 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.172.492:[VOICE] CVolumeManager::SetVolume iVolume=8 eType=7 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.173.211:[CVolumeManager::SetVolumeToVPM] eType=7, Logic Volume=8 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.173.974:PostMSGToVPM: Post Msg[70014] to VPM[1][8]! 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.174.938:PostMSGToVPM: Post Msg[70001] to VPM[-2][458752]! 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.247.723:[CVoiceManager::OpenIdleChannel] [0][0][0] 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.248.658:[CVoiceManager::OpenHandset] 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >695.254.858:Ledlamp: post event(32, 0, 0, 0, 0) 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.257.180:PostMSGToVPM: Post Msg[7000c] to VPM[1][0]! 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.258.436:8, 8 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.259.169:[VOICE] CVolumeManager::SetVolume iVolume=8 eType=7 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	VOIC<6+info  >695.259.850:[VOICE] Volume is same as before! 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >695.264.169:Ledlamp: post event(29, 0, 0, 0, 0) 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	LEDL<6+info  >695.267.411:Ledlamp: post event(32, 0, 0, 0, 0) 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.269.014:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.269.852:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.270.709:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.281.488:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.284.692:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.286.688:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.290.344:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.291.451:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.292.278:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.293.041:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.293.794:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.294.565:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.295.356:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.297.394:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.298.622:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.299.486:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	ipp	local0	notice	[567]	IIPP<5+notice> SET_VOLUNE,00000001 00000000 
Jul  6 11:31:35	192.168.1.121	ipp	local0	notice	[567]	IIPP<5+notice> PLAY_LOCAL_DTMF,00000000 00000001 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.384.703:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	ipp	local0	notice	[567]	IIPP<5+notice> OPEN_HANDSET_MODE,00000001 00000000 
Jul  6 11:31:35	192.168.1.121		local0	emerg	LIBD[538]	DANY<0+emerg > LIBD log :sys=1,cons=0,time=0,E=3,W=4,N=5,I=6,D=7 
Jul  6 11:31:35	192.168.1.121		local0	emerg	LIBD[538]	DANY<0+emerg > LIBD log :sys=1,cons=1,time=0,E=3,W=4,N=5,I=6,D=7 
Jul  6 11:31:35	192.168.1.121		local0	emerg	LIBD[538]	DANY<0+emerg > DANY=6 
Jul  6 11:31:35	192.168.1.121	ipp	local0	notice	[567]	IIPP<5+notice> OPEN_HANDFREE_MODE,00000001 00000000 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	TASK<6+info  >695.641.886:InitDownloadLib end 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >695.644.318:release auto provision code 
Jul  6 11:31:35	192.168.1.121	ipp	local0	notice	[567]	IIPP<5+notice> SET_VOLUNE,00000001 00000008 
Jul  6 11:31:35	192.168.1.121	ipp	local0	notice	[567]	IIPP<5+notice> TALK_START,fffffffe 00070000 
Jul  6 11:31:35	192.168.1.121	ipp	local0	notice	[567]	IIPP<5+notice> OPEN_HANDSET_MODE,00000001 00000000 
Jul  6 11:31:35	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 37 s.... 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.879.310:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.881.421:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.882.530:RegisterMsgHandle Success 
Jul  6 11:31:35	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >695.883.405:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.280.671:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.281.758:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.282.630:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >696.325.081:Update WatchDog Interval(10). 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.332.064:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.333.937:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.351.205:RemainFwdType:0 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.352.574:bChange = 0 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.353.352:bChange = 0 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.354.034:bChange = 0 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.357.755:RemainFwdType:0 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.361.728:bChange = 0 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.364.089:bChange = 0 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.368.926:bChange = 1 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.369.722:New type:0 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.371.504:CFWDMng::OnFWDDataChanged([1],[1],[255],[1]) 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.391.060:CFWDMng::UpdateDSSKeyStatusByFWDChanged end 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.392.710:CFWDMng::UpDateDSSKeyCustomFWDLight end 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.394.194:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.395.073:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.397.303:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	FWDD<6+info  >696.404.001:CDNDMng::OnDNDDataChanged([1],[1],[255],[4369]) 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.408.195:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.409.106:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.409.877:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.420.792:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.500.700:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.501.648:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.502.468:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.504.241:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.519.399:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.521.494:RegisterMsgHandle Success

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 11:38 am

Here Line 301 to 600

Code: Select all

Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.524.023:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.549.878:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.550.907:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121		daemon	warning	openvpn[572]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:31:36	192.168.1.121		daemon	warning	openvpn[572]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:31:36	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:31:36	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link local: [undef] 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.687.191:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.702.179:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121		daemon	notice	openvpn[572]	TLS: Initial packet from 217.92.25.211:1194, sid=245c04bf a52a5bf8 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >696.753.805:Init adapter successful 
Jul  6 11:31:36	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >696.763.561:RegisterMsgHandle Success 
Jul  6 11:31:36	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 36 s.... 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.036.968:CContactBroadSoftManager::PreLoad() 
Jul  6 11:31:37	192.168.1.121		daemon	err	openvpn[572]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:31:37	192.168.1.121		daemon	err	openvpn[572]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:31:37	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:31:37	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS handshake failed 
Jul  6 11:31:37	192.168.1.121		daemon	notice	openvpn[572]	TCP/UDP: Closing socket 
Jul  6 11:31:37	192.168.1.121		daemon	notice	openvpn[572]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:31:37	192.168.1.121		daemon	notice	openvpn[572]	Restart pause, 2 second(s) 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.112.439:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.113.735:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.122.319:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.123.197:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.123.959:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.134.165:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121		local0	emerg	LDAP[538]	ANY <0+emerg > LDAP log :sys=1,cons=0,time=0,E=3,W=4,N=5,I=6,D=7 
Jul  6 11:31:37	192.168.1.121		local0	emerg	LDAP[538]	ANY <0+emerg > ANY =3 
Jul  6 11:31:37	192.168.1.121		local0	emerg	LDAP[538]	ANY <0+emerg > MEM =3 
Jul  6 11:31:37	192.168.1.121		local0	emerg	LDAP[538]	ANY <0+emerg > LDAP =3 
Jul  6 11:31:37	192.168.1.121		local0	err	LDAP[538]	LDAP<3+error > Init config! libldap Ver:3.2.0.3 
Jul  6 11:31:37	192.168.1.121		local0	emerg	LDAP[538]	ANY <0+emerg > LDAP log :sys=1,cons=1,time=0,E=3,W=4,N=5,I=6,D=7 
Jul  6 11:31:37	192.168.1.121		local0	emerg	LDAP[538]	ANY <0+emerg > ANY =6 
Jul  6 11:31:37	192.168.1.121		local0	emerg	LDAP[538]	ANY <0+emerg > MEM =6 
Jul  6 11:31:37	192.168.1.121		local0	emerg	LDAP[538]	ANY <0+emerg > LDAP =6 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	LDAP<6+info  >697.189.733:Current CallBackThread[(nil)] 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	LDAP<6+info  >697.193.579:Current CallBackThread[(nil)] 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.194.563:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	SPSH<6+info  >697.221.554:MyClearResult-----------LOCK----------------- 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	SPSH<6+info  >697.222.911:MyClearResult----------- UN LOCK----------------- 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.227.407:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.234.974:Load remote config file [/config/data/remote_phonebook_list.xml] 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.243.249:CContactRemoteModel::MyAddNodeByUrl Node[<URL>All] add empty child[]! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.248.297:CContactRemoteModel::MyAddNodeByUrl Node[<URL>All] add empty child[]! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.249.308:CContactRemoteModel::MyAddNodeByUrl Node[<URL>All] add duplicate child[]! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.250.370:CContactRemoteModel::MyAddNodeByUrl Node[<URL>All] add empty child[]! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.251.275:CContactRemoteModel::MyAddNodeByUrl Node[<URL>All] add duplicate child[]! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.252.096:CContactRemoteModel::MyAddNodeByUrl Node[<URL>All] add empty child[]! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.252.836:CContactRemoteModel::MyAddNodeByUrl Node[<URL>All] add duplicate child[]! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.253.588:CContactRemoteModel::MyAddNodeByUrl Node[<URL>All] add empty child[]! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	DIR <6+info  >697.254.808:CContactRemoteModel::MyAddNodeByUrl Node[<URL>All] add duplicate child[]! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.259.348:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.298.193:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.299.103:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.299.885:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.308.977:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.309.894:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.329.806:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.330.845:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.331.751:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.332.538:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.333.979:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	EMSG<6+info  >697.334.800:RegisterMsgHandle Success 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >697.338.196:Default Account(0), Max Account Count(17) 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >697.340.321:CAccountManager::LoadAllLineAccount 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >697.399.454:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(0, 4, 4)! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >697.404.209:Handle Account(0) Status(4-->4). Send CallWaiting Code. 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	SET <6+info  >697.406.900:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	SET <6+info  >697.410.609:Handle Account(0) Status(4-->4) Change anoymous sync 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >697.416.925:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(1, 0, 0)! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >697.422.770:Handle Account(1) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	SET <6+info  >697.423.829:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	SET <6+info  >697.428.564:Handle Account(1) Status(0-->0) Change anoymous sync 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >697.719.591:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(10, 0, 0)! 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >697.724.898:Handle Account(10) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	SET <6+info  >697.727.222:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:37	192.168.1.121	GUI	user	info	[538]	SET <6+info  >697.730.970:Handle Account(10) Status(0-->0) Change anoymous sync 
Jul  6 11:31:37	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 35 s.... 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >698.023.040:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(11, 0, 0)! 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >698.030.868:Handle Account(11) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	SET <6+info  >698.031.987:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	SET <6+info  >698.034.817:Handle Account(11) Status(0-->0) Change anoymous sync 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >698.329.372:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(12, 0, 0)! 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >698.334.700:Handle Account(12) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	SET <6+info  >698.336.126:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	SET <6+info  >698.340.175:Handle Account(12) Status(0-->0) Change anoymous sync 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >698.642.585:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(13, 0, 0)! 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >698.651.131:Handle Account(13) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	SET <6+info  >698.652.020:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	SET <6+info  >698.654.616:Handle Account(13) Status(0-->0) Change anoymous sync 
Jul  6 11:31:38	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 34 s.... 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >698.953.750:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(14, 0, 0)! 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >698.960.358:Handle Account(14) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	SET <6+info  >698.961.399:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:38	192.168.1.121	GUI	user	info	[538]	SET <6+info  >698.964.103:Handle Account(14) Status(0-->0) Change anoymous sync 
Jul  6 11:31:39	192.168.1.121		daemon	warning	openvpn[572]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:31:39	192.168.1.121		daemon	warning	openvpn[572]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:31:39	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:31:39	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link local: [undef] 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	TLS: Initial packet from 217.92.25.211:1194, sid=ab045cc2 7946393e 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >699.311.136:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(15, 0, 0)! 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >699.318.681:Handle Account(15) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.319.492:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.322.075:Handle Account(15) Status(0-->0) Change anoymous sync 
Jul  6 11:31:39	192.168.1.121		daemon	err	openvpn[572]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:31:39	192.168.1.121		daemon	err	openvpn[572]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:31:39	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:31:39	192.168.1.121		daemon	err	openvpn[572]	TLS Error: TLS handshake failed 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	TCP/UDP: Closing socket 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:31:39	192.168.1.121		daemon	notice	openvpn[572]	Restart pause, 2 second(s) 
Jul  6 11:31:39	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > Upgrade from mac.cfg 
Jul  6 11:31:39	192.168.1.121		local0	info	LIBD[394]	DCMN<6+info  > Connecting 192.168.1.52:50080 
Jul  6 11:31:39	192.168.1.121		local0	info	LIBD[394]	DCMN<6+info  > Connecting IP = 192.168.1.52, Port = 50080 
Jul  6 11:31:39	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Request Line: GET /ap/yealink/001565a14c63.cfg HTTP/1.1 
Jul  6 11:31:39	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Host: 192.168.1.52:50080 
Jul  6 11:31:39	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > User-Agent: Yealink SIP-T46G 28.73.150.3 28.2.0.128.0.0.0 00:15:65:a1:4c:63 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >699.682.435:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(2, 0, 0)! 
Jul  6 11:31:39	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > process response 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >699.691.238:Handle Account(2) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.692.742:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.695.108:Handle Account(2) Status(0-->0) Change anoymous sync 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >699.706.934:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(3, 0, 0)! 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >699.712.718:Handle Account(3) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.713.515:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.717.103:Handle Account(3) Status(0-->0) Change anoymous sync 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >699.723.502:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(4, 0, 0)! 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >699.730.100:Handle Account(4) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.731.046:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.733.714:Handle Account(4) Status(0-->0) Change anoymous sync 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >699.741.045:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(5, 0, 0)! 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >699.748.932:Handle Account(5) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.749.745:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.752.616:Handle Account(5) Status(0-->0) Change anoymous sync 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >699.761.413:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(6, 0, 0)! 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >699.768.376:Handle Account(6) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.769.220:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:39	192.168.1.121	GUI	user	info	[538]	SET <6+info  >699.772.052:Handle Account(6) Status(0-->0) Change anoymous sync 
Jul  6 11:31:39	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> response code: 200 
Jul  6 11:31:39	192.168.1.121		local0	info	LIBD[394]	HTTP<6+info  > Content-Length: 29206 
Jul  6 11:31:39	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> response process finish! 
Jul  6 11:31:39	192.168.1.121		local0	notice	LIBD[394]	HTTP<5+notice> recv : 29206 bytes 
Jul  6 11:31:39	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 33 s.... 
Jul  6 11:31:40	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > need_cmp_md5=1 
Jul  6 11:31:40	192.168.1.121	ATP	local0	info	[394]	ATP <6+info  > cfg md5 same! 
Jul  6 11:31:40	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >700.140.782:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(7, 0, 0)! 
Jul  6 11:31:40	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >700.157.063:Handle Account(7) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:40	192.168.1.121	GUI	user	info	[538]	SET <6+info  >700.158.659:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:40	192.168.1.121	GUI	user	info	[538]	SET <6+info  >700.161.255:Handle Account(7) Status(0-->0) Change anoymous sync 
Jul  6 11:31:40	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >700.774.539:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(8, 0, 0)! 
Jul  6 11:31:40	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >700.792.018:Handle Account(8) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:40	192.168.1.121	GUI	user	info	[538]	SET <6+info  >700.792.847:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:40	192.168.1.121	GUI	user	info	[538]	SET <6+info  >700.807.825:Handle Account(8) Status(0-->0) Change anoymous sync 
Jul  6 11:31:40	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 32 s.... 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.369.618:EtlMsgHandler_NotifyApp ACCOUNT_STATUS_CHANGED(9, 0, 0)! 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >701.388.310:Handle Account(9) Status(0-->0). Send CallWaiting Code. 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	SET <6+info  >701.389.133:CAnonymousCallController::MyHandleAccountStatusMessage 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	SET <6+info  >701.392.105:Handle Account(9) Status(0-->0) Change anoymous sync 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.394.912:Account List Size(16) 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.407.920:$$$$$$$$PrintAccoutInfo$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.409.296:Account ID[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.410.228:Account State[4] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.411.875:DTMF Type[1] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.413.403:Account Name[0001] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.414.272:Server Name[192.168.163.250] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.429.202:Display Name[99 Administra..] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.430.023:Fail Id[0], Fail Info[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.431.757:Voice Mail Number[pbxvm], OldCount[0], NewCount[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.433.243:Direct IP[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.447.089:Auto Answer[0], Auto Answer Time[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.448.784:Open Local Video[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.450.836:Account Ring File[Common] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.451.703:$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.452.394:$$$$$$$$PrintAccoutInfo$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.453.048:Account ID[1] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.453.718:Account State[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.455.051:DTMF Type[1] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.468.435:Account Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.469.611:Server Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.471.735:Display Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.472.501:Fail Id[0], Fail Info[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.473.809:Voice Mail Number[], OldCount[0], NewCount[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.475.325:Direct IP[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.499.605:Auto Answer[0], Auto Answer Time[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.500.752:Open Local Video[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.502.166:Account Ring File[Common] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.502.924:$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.503.638:$$$$$$$$PrintAccoutInfo$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.504.288:Account ID[2] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.504.948:Account State[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.508.357:DTMF Type[1] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.510.222:Account Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.511.131:Server Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.512.856:Display Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.513.596:Fail Id[0], Fail Info[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.526.889:Voice Mail Number[], OldCount[0], NewCount[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.528.958:Direct IP[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.531.066:Auto Answer[0], Auto Answer Time[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.532.183:Open Local Video[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.533.819:Account Ring File[Common] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.534.836:$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.536.772:$$$$$$$$PrintAccoutInfo$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.538.002:Account ID[3] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.538.713:Account State[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.540.031:DTMF Type[1] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.541.613:Account Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.542.389:Server Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.543.671:Display Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.544.421:Fail Id[0], Fail Info[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.557.933:Voice Mail Number[], OldCount[0], NewCount[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.559.544:Direct IP[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.562.109:Auto Answer[0], Auto Answer Time[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.563.102:Open Local Video[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.564.443:Account Ring File[Common] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.565.245:$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.577.713:$$$$$$$$PrintAccoutInfo$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.578.468:Account ID[4] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.579.133:Account State[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.580.622:DTMF Type[1] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.582.092:Account Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.582.864:Server Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.584.468:Display Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.587.119:Fail Id[0], Fail Info[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.589.396:Voice Mail Number[], OldCount[0], NewCount[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.591.055:Direct IP[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.593.616:Auto Answer[0], Auto Answer Time[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.594.637:Open Local Video[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.608.010:Account Ring File[Common] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.608.877:$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.609.623:$$$$$$$$PrintAccoutInfo$$$$$$$$ 
Jul  6 11:31:41	192.168.1.121		daemon	warning	openvpn[572]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:31:41	192.168.1.121		daemon	warning	openvpn[572]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:31:41	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:31:41	192.168.1.121		daemon	warning	openvpn[572]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.627.001:Account ID[5] 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.636.111:Account State[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.639.634:DTMF Type[1] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.640.879:Account Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.641.400:Server Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.642.332:Display Name[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.642.737:Fail Id[0], Fail Info[] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.643.692:Voice Mail Number[], OldCount[0], NewCount[0] 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >701.644.777:Direct IP[0] 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:31:41	192.168.1.121	SIP	local0	notice	[597]	SIP <5+notice> [SIP] wait for ui thread sync, max wait for 31 s.... 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link local: [undef] 
Jul  6 11:31:41	192.168.1.121		daemon	notice	openvpn[572]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >701.976.977:Load Bluetooth file 
Jul  6 11:31:41	192.168.1.121	GUI	user	info	[538]	CUIT<6+info  >701.978.517:InitDongle 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.002.432:Auto Answer[0], Auto Answer Time[0] 
Jul  6 11:31:42	192.168.1.121		daemon	notice	openvpn[572]	TLS: Initial packet from 217.92.25.211:1194, sid=8bf38f98 2c3bd209 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.037.164:Open Local Video[0] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.039.906:Account Ring File[Common] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.041.510:$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.042.632:$$$$$$$$PrintAccoutInfo$$$$$$$$ 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.043.514:Account ID[6] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.044.834:Account State[0] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.058.930:DTMF Type[1] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.061.241:Account Name[] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.062.777:Server Name[] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.064.781:Display Name[] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.078.326:Fail Id[0], Fail Info[] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.080.716:Voice Mail Number[], OldCount[0], NewCount[0] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.083.443:Direct IP[0] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.099.074:Auto Answer[0], Auto Answer Time[0] 
Jul  6 11:31:42	192.168.1.121	GUI	user	info	[538]	ACCU<6+info  >702.100.989:Open Local Video[0]

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 11:41 am

Here only the openvpn messages

Code: Select all

Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=814ae35d 7fc55e96 
Jul  6 11:40:29	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=06c1d44f 5515ae94 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=d9046ee9 fd6fc390 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=598b0910 b2e19b18 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8224a858 2d9ee304 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8f53f417 973d81fd 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=095d414e 11363a7e 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=b18d7e9e ff8d3643 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:51	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=cdc31237 61f3e019 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=16c1360b 23370cd4 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=0df4e633 3b8efbb4 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=9e3f7031 c267d87b 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=048d0914 c9889807 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=35dec57d dd2f6bcc 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=83b38c21 58301f0e 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 


thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 11:54 am

Only openvpn messages

Code: Select all

Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=814ae35d 7fc55e96 
Jul  6 11:40:29	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=06c1d44f 5515ae94 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=d9046ee9 fd6fc390 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=598b0910 b2e19b18 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8224a858 2d9ee304 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8f53f417 973d81fd 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=095d414e 11363a7e 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=b18d7e9e ff8d3643 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:51	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=cdc31237 61f3e019 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=16c1360b 23370cd4 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=0df4e633 3b8efbb4 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=9e3f7031 c267d87b 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=048d0914 c9889807 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=35dec57d dd2f6bcc 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=83b38c21 58301f0e 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 


TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Wed Jul 06, 2016 11:57 am

Try this in your client config:

Code: Select all

log /etc/openvpn/client.log
verb 4

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 12:00 pm

sorry but i have no ssh access to the phone. i can only use the syslog output.

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 12:08 pm

Here only the syslog openvpn entries

Code: Select all

Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=814ae35d 7fc55e96 
Jul  6 11:40:29	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=06c1d44f 5515ae94 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=d9046ee9 fd6fc390 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=598b0910 b2e19b18 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8224a858 2d9ee304 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8f53f417 973d81fd 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=095d414e 11363a7e 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=b18d7e9e ff8d3643 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:51	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=cdc31237 61f3e019 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=16c1360b 23370cd4 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=0df4e633 3b8efbb4 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=9e3f7031 c267d87b 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=048d0914 c9889807 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 




Post Reply