Code: Select all
Jul 6 11:40:29 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:29 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:29 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=814ae35d 7fc55e96
Jul 6 11:40:29 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:30 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:30 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:30 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:30 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:30 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:30 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:32 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:32 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:32 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:32 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=06c1d44f 5515ae94
Jul 6 11:40:32 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:32 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:32 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:32 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:32 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:34 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:34 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:34 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:34 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:34 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=d9046ee9 fd6fc390
Jul 6 11:40:35 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:35 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:35 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:35 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:35 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:35 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:35 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:37 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:37 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:37 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:37 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:37 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=598b0910 b2e19b18
Jul 6 11:40:37 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:37 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:38 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:38 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:38 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:38 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:38 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:40 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:40 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:40 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:40 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=8224a858 2d9ee304
Jul 6 11:40:40 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:40 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:40 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:40 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:40 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:42 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:42 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:42 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:42 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:42 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=8f53f417 973d81fd
Jul 6 11:40:43 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:43 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:43 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:43 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:43 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:43 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:43 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:45 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:45 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:45 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:45 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=095d414e 11363a7e
Jul 6 11:40:45 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:45 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:45 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:45 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:45 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:47 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:47 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:48 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:48 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=b18d7e9e ff8d3643
Jul 6 11:40:48 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:48 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:48 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:48 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:48 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:50 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:50 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:50 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:50 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:50 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:51 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=cdc31237 61f3e019
Jul 6 11:40:52 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:52 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:52 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:52 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:52 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:52 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:52 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:54 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:54 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:54 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:54 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=16c1360b 23370cd4
Jul 6 11:40:54 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:54 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:54 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:54 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:54 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:56 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:56 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:56 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:56 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:56 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=0df4e633 3b8efbb4
Jul 6 11:40:57 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:57 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:57 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:57 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:57 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:57 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:57 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:40:59 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:40:59 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:40:59 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:40:59 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=9e3f7031 c267d87b
Jul 6 11:40:59 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:40:59 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:40:59 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:40:59 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:40:59 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:41:01 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:41:01 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:41:01 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:41:01 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:41:01 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=048d0914 c9889807
Jul 6 11:41:02 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:41:02 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:41:02 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:41:02 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:41:02 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:41:02 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:41:02 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:41:04 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:41:04 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:41:04 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:41:04 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=35dec57d dd2f6bcc
Jul 6 11:41:04 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:41:04 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:41:04 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:41:04 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:41:04 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)
Jul 6 11:41:06 192.168.1.121 daemon warning openvpn[592] WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Jul 6 11:41:06 192.168.1.121 daemon warning openvpn[592] NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Jul 6 11:41:06 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/client.key' is group or others accessible
Jul 6 11:41:06 192.168.1.121 daemon warning openvpn[592] WARNING: file '/config/openvpn/keys/ta.key' is group or others accessible
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Control Channel Authentication: using '/config/openvpn/keys/ta.key' as a OpenVPN static key file
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Control Channel MTU parms [ L:1541 D:166 EF:66 EB:0 ET:0 EL:0 ]
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Socket Buffers: R=[112640->131072] S=[112640->131072]
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Local Options hash (VER=V4): '70f5b3af'
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] Expected Remote Options hash (VER=V4): 'a2e2498c'
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] UDPv4 link local: [undef]
Jul 6 11:41:06 192.168.1.121 daemon notice openvpn[592] UDPv4 link remote: 217.92.25.211:1194
Jul 6 11:41:07 192.168.1.121 daemon notice openvpn[592] TLS: Initial packet from 217.92.25.211:1194, sid=83b38c21 58301f0e
Jul 6 11:41:07 192.168.1.121 daemon err openvpn[592] VERIFY ERROR: depth=1, error=certificate signature failure: /CN=Easy-RSA_CA
Jul 6 11:41:07 192.168.1.121 daemon err openvpn[592] TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Jul 6 11:41:07 192.168.1.121 daemon err openvpn[592] TLS Error: TLS object -> incoming plaintext read error
Jul 6 11:41:07 192.168.1.121 daemon err openvpn[592] TLS Error: TLS handshake failed
Jul 6 11:41:07 192.168.1.121 daemon notice openvpn[592] TCP/UDP: Closing socket
Jul 6 11:41:07 192.168.1.121 daemon notice openvpn[592] SIGUSR1[soft,tls-error] received, process restarting
Jul 6 11:41:07 192.168.1.121 daemon notice openvpn[592] Restart pause, 2 second(s)