VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Scripts to manage certificates or generate config files

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 11:41 am

Here only the openvpn messages

Code: Select all

Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=814ae35d 7fc55e96 
Jul  6 11:40:29	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=06c1d44f 5515ae94 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=d9046ee9 fd6fc390 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=598b0910 b2e19b18 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8224a858 2d9ee304 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8f53f417 973d81fd 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=095d414e 11363a7e 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=b18d7e9e ff8d3643 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:51	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=cdc31237 61f3e019 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=16c1360b 23370cd4 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=0df4e633 3b8efbb4 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=9e3f7031 c267d87b 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=048d0914 c9889807 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=35dec57d dd2f6bcc 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=83b38c21 58301f0e 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 


thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 11:54 am

Only openvpn messages

Code: Select all

Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=814ae35d 7fc55e96 
Jul  6 11:40:29	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=06c1d44f 5515ae94 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=d9046ee9 fd6fc390 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=598b0910 b2e19b18 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8224a858 2d9ee304 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8f53f417 973d81fd 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=095d414e 11363a7e 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=b18d7e9e ff8d3643 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:51	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=cdc31237 61f3e019 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=16c1360b 23370cd4 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=0df4e633 3b8efbb4 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=9e3f7031 c267d87b 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=048d0914 c9889807 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:04	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=35dec57d dd2f6bcc 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:04	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:04	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:06	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:06	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=83b38c21 58301f0e 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:07	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:07	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 


TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Wed Jul 06, 2016 11:57 am

Try this in your client config:

Code: Select all

log /etc/openvpn/client.log
verb 4

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 12:00 pm

sorry but i have no ssh access to the phone. i can only use the syslog output.

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 12:08 pm

Here only the syslog openvpn entries

Code: Select all

Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:29	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=814ae35d 7fc55e96 
Jul  6 11:40:29	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:30	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:30	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=06c1d44f 5515ae94 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:32	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:32	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:34	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=d9046ee9 fd6fc390 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:35	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:35	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:37	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=598b0910 b2e19b18 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:37	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:38	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:38	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8224a858 2d9ee304 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:40	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:40	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:42	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=8f53f417 973d81fd 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:43	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:43	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=095d414e 11363a7e 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:45	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:45	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:47	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=b18d7e9e ff8d3643 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:48	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:48	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:50	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:51	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=cdc31237 61f3e019 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:52	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:52	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=16c1360b 23370cd4 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:54	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:54	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:56	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=0df4e633 3b8efbb4 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:57	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:57	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=9e3f7031 c267d87b 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:40:59	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:40:59	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info. 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/client.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	warning	openvpn[592]	WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Socket Buffers: R=[112640->131072] S=[112640->131072] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Local Options hash (VER=V4): '70f5b3af' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	Expected Remote Options hash (VER=V4): 'a2e2498c' 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link local: [undef] 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	UDPv4 link remote: 217.92.25.211:1194 
Jul  6 11:41:01	192.168.1.121		daemon	notice	openvpn[592]	TLS: Initial packet from 217.92.25.211:1194, sid=048d0914 c9889807 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS object -> incoming plaintext read error 
Jul  6 11:41:02	192.168.1.121		daemon	err	openvpn[592]	TLS Error: TLS handshake failed 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	TCP/UDP: Closing socket 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	SIGUSR1[soft,tls-error] received, process restarting 
Jul  6 11:41:02	192.168.1.121		daemon	notice	openvpn[592]	Restart pause, 2 second(s) 




TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Wed Jul 06, 2016 12:56 pm

A quick review:
thomaslauer wrote:My openvpn server is the kylemanna/docker-openvpn
I have not tried it but you say it works.
thomaslauer wrote:with windows an ios client i have no problems
Good.
thomaslauer wrote:when i use the yealink phone i must generate a .tar file with keys an vpn.cnf
Then this is probably the step that goes wrong .. try again but copy the .tar file to windows client and unpack it then see if you get an error like the phone. You could also try this with inline certificates in the config.

Out of curiosity, how do you install openvpn on the phone or is it pre-installed and what openvpn version is it ?

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 1:22 pm

I test my windows client with this konfig

Code: Select all

client
verb 4
nobind
dev tun
dev-type tun
remote-cert-tls server



remote asawhp.mydomain.net 1194 udp

redirect-gateway def1
ca ca.crt
cert client.crt
key client.key
tls-auth ta.key 1

an it runs is use the same certificates

the open vpn is preinstalled

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Wed Jul 06, 2016 1:33 pm

I think you will have to take this to the yealink phone support channel.

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 2:44 pm

I have already tried . Unfortunately, I 've been waiting 2 weeks for a response

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 06, 2016 2:58 pm

i find in the yealink support forum this information:
for this issue, make sure that the signature algorithm of the certificates are correct , VPN of T46 doesn't support SHA256, it should use SHA1 or MD5, you can change it in "openssl.cnf" file , change sentence :

"default_md = sha256"

change to :

"default_md = md5"

"openssl.cnf" file in windows: Open VPN --- easy-rsa --- the file begin with openssl, it may be openssl-1.1.1.cnf or some like this
"openssl.cnf" file in linux: easy-rsa or the subdirectories under it ,also begin with openssl
do you think that might solve my problem ?
must i create all certificates new?

best regards
Thomas

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Wed Jul 06, 2016 7:13 pm

It certainly looks like the problem you are experiencing.

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 13, 2016 7:54 pm

HI,

i have now change my config for md5 certificate signature. The error messages on the phone now

Code: Select all

Message: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) 
Message: TLS Error: TLS handshake failed
my clent config file is

Code: Select all

client
nobind
dev tun
#remote-cert-tls server

remote xxxxxx.net 1194 udp



#key-direction 1

redirect-gateway def1
ca /config/openvpn/keys/ca.crt
cert /config/openvpn/keys/client.crt
key /config/openvpn/keys/client.key
best regards
Thomas

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Wed Jul 13, 2016 8:04 pm

thomaslauer wrote:i have now change my config for md5 certificate signature
and you created an all new PKI ?

thomaslauer
OpenVPN User
Posts: 20
Joined: Tue Jul 05, 2016 1:10 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by thomaslauer » Wed Jul 13, 2016 8:08 pm

yes i create a new pki

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA

Post by TinCanTech » Wed Jul 13, 2016 8:38 pm

thomaslauer wrote:The error messages on the phone now

Code: Select all

Message: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Message: TLS Error: TLS handshake failed
This usually means your network is blocking you ..

Note:
  • The better the information you provide the better we can help.
  • Please do not post publicly identifiable data, like DNS host names or host names as the name of certificates.

Post Reply