can not reroute on my other network

Business solution to host your own OpenVPN server with web management interface and bundled clients.
Post Reply
libyano
OpenVpn Newbie
Posts: 1
Joined: Wed Apr 16, 2014 2:02 pm

can not reroute on my other network

Post by libyano » Wed Sep 03, 2014 12:54 pm

Greetings,

I have setup my openvpn server on 41.208.70.19 but using the client I can not take that IP .

I'm using Windows 7

and here is the log file

Tue Sep 02 18:07:17 2014 OpenVPN 2.3.4 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 7 2014
Tue Sep 02 18:07:17 2014 library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
Enter Management Password:
Tue Sep 02 18:07:17 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Tue Sep 02 18:07:17 2014 Need hold release from management interface, waiting...
Tue Sep 02 18:07:17 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Tue Sep 02 18:07:17 2014 MANAGEMENT: CMD 'state on'
Tue Sep 02 18:07:17 2014 MANAGEMENT: CMD 'log all on'
Tue Sep 02 18:07:17 2014 MANAGEMENT: CMD 'hold off'
Tue Sep 02 18:07:17 2014 MANAGEMENT: CMD 'hold release'
Tue Sep 02 18:07:20 2014 MANAGEMENT: CMD 'username "Auth" "openvpn"'
Tue Sep 02 18:07:20 2014 MANAGEMENT: CMD 'password [...]'
Tue Sep 02 18:07:21 2014 Control Channel Authentication: tls-auth using INLINE static key file
Tue Sep 02 18:07:21 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:07:21 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:07:21 2014 Socket Buffers: R=[8192->100000] S=[8192->100000]
Tue Sep 02 18:07:21 2014 UDPv4 link local: [undef]
Tue Sep 02 18:07:21 2014 UDPv4 link remote: [AF_INET]41.208.70.19:1194
Tue Sep 02 18:07:21 2014 MANAGEMENT: >STATE:1409674041,WAIT,,,
Tue Sep 02 18:07:25 2014 Server poll timeout, restarting
Tue Sep 02 18:07:25 2014 SIGUSR1[soft,server_poll] received, process restarting
Tue Sep 02 18:07:25 2014 MANAGEMENT: >STATE:1409674045,RECONNECTING,server_poll,,
Tue Sep 02 18:07:25 2014 Control Channel Authentication: tls-auth using INLINE static key file
Tue Sep 02 18:07:25 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:07:25 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:07:25 2014 Socket Buffers: R=[8192->100000] S=[8192->100000]
Tue Sep 02 18:07:25 2014 UDPv4 link local: [undef]
Tue Sep 02 18:07:25 2014 UDPv4 link remote: [AF_INET]41.208.70.19:1194
Tue Sep 02 18:07:25 2014 MANAGEMENT: >STATE:1409674045,WAIT,,,
Tue Sep 02 18:07:29 2014 Server poll timeout, restarting
Tue Sep 02 18:07:29 2014 SIGUSR1[soft,server_poll] received, process restarting
Tue Sep 02 18:07:29 2014 MANAGEMENT: >STATE:1409674049,RECONNECTING,server_poll,,
Tue Sep 02 18:07:29 2014 Control Channel Authentication: tls-auth using INLINE static key file
Tue Sep 02 18:07:29 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:07:29 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:07:29 2014 Socket Buffers: R=[8192->100000] S=[8192->100000]
Tue Sep 02 18:07:29 2014 Attempting to establish TCP connection with [AF_INET]41.208.70.19:443
Tue Sep 02 18:07:29 2014 MANAGEMENT: >STATE:1409674049,TCP_CONNECT,,,
Tue Sep 02 18:07:29 2014 TCP connection established with [AF_INET]41.208.70.19:443
Tue Sep 02 18:07:29 2014 TCPv4_CLIENT link local: [undef]
Tue Sep 02 18:07:29 2014 TCPv4_CLIENT link remote: [AF_INET]41.208.70.19:443
Tue Sep 02 18:07:29 2014 MANAGEMENT: >STATE:1409674049,WAIT,,,
Tue Sep 02 18:07:29 2014 MANAGEMENT: >STATE:1409674049,AUTH,,,
Tue Sep 02 18:07:29 2014 TLS: Initial packet from [AF_INET]41.208.70.19:443, sid=192e6bfe b601dbac
Tue Sep 02 18:07:29 2014 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Tue Sep 02 18:07:29 2014 VERIFY OK: depth=1, CN=OpenVPN CA
Tue Sep 02 18:07:29 2014 VERIFY OK: nsCertType=SERVER
Tue Sep 02 18:07:29 2014 VERIFY OK: depth=0, CN=OpenVPN Server
Tue Sep 02 18:07:29 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Sep 02 18:07:29 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:07:29 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Sep 02 18:07:29 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:07:29 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Tue Sep 02 18:07:29 2014 [OpenVPN Server] Peer Connection Initiated with [AF_INET]41.208.70.19:443
Tue Sep 02 18:07:30 2014 MANAGEMENT: >STATE:1409674050,GET_CONFIG,,,
Tue Sep 02 18:07:31 2014 SENT CONTROL [OpenVPN Server]: 'PUSH_REQUEST' (status=1)
Tue Sep 02 18:07:31 2014 PUSH: Received control message: 'PUSH_REPLY,explicit-exit-notify,topology subnet,route-delay 5 30,dhcp-pre-release,dhcp-renew,dhcp-release,route-metric 101,ping 12,ping-restart 50,socket-flags TCP_NODELAY,auth-token SESS_ID,comp-lzo yes,redirect-gateway def1,redirect-gateway bypass-dhcp,redirect-gateway autolocal,route-gateway 172.27.224.1,dhcp-option DNS 62.240.32.5,register-dns,block-ipv6,ifconfig 172.27.225.96 255.255.248.0'
Tue Sep 02 18:07:31 2014 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:1 is ignored by previous <connection> blocks
Tue Sep 02 18:07:31 2014 Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:19: block-ipv6 (2.3.4)
Tue Sep 02 18:07:31 2014 OPTIONS IMPORT: timers and/or timeouts modified
Tue Sep 02 18:07:31 2014 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Tue Sep 02 18:07:31 2014 OPTIONS IMPORT: LZO parms modified
Tue Sep 02 18:07:31 2014 OPTIONS IMPORT: --socket-flags option modified
Tue Sep 02 18:07:31 2014 OPTIONS IMPORT: --ifconfig/up options modified
Tue Sep 02 18:07:31 2014 OPTIONS IMPORT: route options modified
Tue Sep 02 18:07:31 2014 OPTIONS IMPORT: route-related options modified
Tue Sep 02 18:07:31 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Sep 02 18:07:31 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Sep 02 18:07:31 2014 MANAGEMENT: >STATE:1409674051,ASSIGN_IP,,172.27.225.96,
Tue Sep 02 18:07:31 2014 open_tun, tt->ipv6=0
Tue Sep 02 18:07:31 2014 TAP-WIN32 device [Local Area Connection 5] opened: \\.\Global\{75A2481E-2B4A-425F-A678-AE7F6F124ACE}.tap
Tue Sep 02 18:07:31 2014 TAP-Windows Driver Version 9.21
Tue Sep 02 18:07:31 2014 Set TAP-Windows TUN subnet mode network/local/netmask = 172.27.224.0/172.27.225.96/255.255.248.0 [SUCCEEDED]
Tue Sep 02 18:07:31 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 172.27.225.96/255.255.248.0 on interface {75A2481E-2B4A-425F-A678-AE7F6F124ACE} [DHCP-serv: 172.27.231.254, lease-time: 31536000]
Tue Sep 02 18:07:31 2014 Successful ARP Flush on interface [23] {75A2481E-2B4A-425F-A678-AE7F6F124ACE}
Tue Sep 02 18:07:31 2014 NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: An address has not yet been associated with the network endpoint. (code=1228)
Tue Sep 02 18:07:31 2014 TAP: DHCP address renewal succeeded
Tue Sep 02 18:07:36 2014 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Sep 02 18:07:36 2014 C:\Windows\system32\route.exe ADD 41.208.70.19 MASK 255.255.255.255 172.23.33.1
Tue Sep 02 18:07:36 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:07:36 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:07:36 2014 C:\Windows\system32\route.exe ADD 172.23.33.254 MASK 255.255.255.255 172.23.33.1 IF 11
Tue Sep 02 18:07:36 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:07:36 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:07:36 2014 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:07:36 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:07:36 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:07:36 2014 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:07:36 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:07:36 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:07:36 2014 Initialization Sequence Completed
Tue Sep 02 18:07:36 2014 MANAGEMENT: >STATE:1409674056,CONNECTED,SUCCESS,172.27.225.96,41.208.70.19
Tue Sep 02 18:07:36 2014 Start net commands...
Tue Sep 02 18:07:36 2014 C:\Windows\system32\net.exe stop dnscache
Tue Sep 02 18:07:38 2014 C:\Windows\system32\net.exe start dnscache
Tue Sep 02 18:07:40 2014 C:\Windows\system32\ipconfig.exe /flushdns
Tue Sep 02 18:07:40 2014 C:\Windows\system32\ipconfig.exe /registerdns
Tue Sep 02 18:07:43 2014 End net commands...
Tue Sep 02 18:50:15 2014 write TCPv4_CLIENT: Software caused connection abort (WSAECONNABORTED) (code=10053)
Tue Sep 02 18:50:15 2014 Connection reset, restarting [-1]
Tue Sep 02 18:50:15 2014 C:\Windows\system32\route.exe DELETE 41.208.70.19 MASK 255.255.255.255 172.23.33.1
Tue Sep 02 18:50:15 2014 Route deletion via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:15 2014 C:\Windows\system32\route.exe DELETE 172.23.33.254 MASK 255.255.255.255 172.23.33.1
Tue Sep 02 18:50:15 2014 Route deletion via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:15 2014 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:50:15 2014 Route deletion via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:15 2014 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:50:15 2014 Route deletion via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:15 2014 Closing TUN/TAP interface
Tue Sep 02 18:50:15 2014 TAP: DHCP address released
Tue Sep 02 18:50:15 2014 SIGUSR1[soft,connection-reset] received, process restarting
Tue Sep 02 18:50:15 2014 MANAGEMENT: >STATE:1409676615,RECONNECTING,connection-reset,,
Tue Sep 02 18:50:15 2014 Restart pause, 5 second(s)
Tue Sep 02 18:50:20 2014 Control Channel Authentication: tls-auth using INLINE static key file
Tue Sep 02 18:50:20 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:50:20 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:50:20 2014 Socket Buffers: R=[8192->100000] S=[8192->100000]
Tue Sep 02 18:50:20 2014 Attempting to establish TCP connection with [AF_INET]41.208.70.19:443
Tue Sep 02 18:50:20 2014 MANAGEMENT: >STATE:1409676620,TCP_CONNECT,,,
Tue Sep 02 18:50:29 2014 TCP connection established with [AF_INET]41.208.70.19:443
Tue Sep 02 18:50:29 2014 TCPv4_CLIENT link local: [undef]
Tue Sep 02 18:50:29 2014 TCPv4_CLIENT link remote: [AF_INET]41.208.70.19:443
Tue Sep 02 18:50:29 2014 MANAGEMENT: >STATE:1409676629,WAIT,,,
Tue Sep 02 18:50:29 2014 MANAGEMENT: >STATE:1409676629,AUTH,,,
Tue Sep 02 18:50:29 2014 TLS: Initial packet from [AF_INET]41.208.70.19:443, sid=2da1b926 f063d628
Tue Sep 02 18:50:29 2014 VERIFY OK: depth=1, CN=OpenVPN CA
Tue Sep 02 18:50:29 2014 VERIFY OK: nsCertType=SERVER
Tue Sep 02 18:50:29 2014 VERIFY OK: depth=0, CN=OpenVPN Server
Tue Sep 02 18:50:29 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Sep 02 18:50:29 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:50:29 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Sep 02 18:50:29 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:50:29 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Tue Sep 02 18:50:29 2014 [OpenVPN Server] Peer Connection Initiated with [AF_INET]41.208.70.19:443
Tue Sep 02 18:50:30 2014 MANAGEMENT: >STATE:1409676630,GET_CONFIG,,,
Tue Sep 02 18:50:31 2014 SENT CONTROL [OpenVPN Server]: 'PUSH_REQUEST' (status=1)
Tue Sep 02 18:50:31 2014 PUSH: Received control message: 'PUSH_REPLY,explicit-exit-notify,topology subnet,route-delay 5 30,dhcp-pre-release,dhcp-renew,dhcp-release,route-metric 101,ping 12,ping-restart 50,socket-flags TCP_NODELAY,auth-token SESS_ID,comp-lzo yes,redirect-gateway def1,redirect-gateway bypass-dhcp,redirect-gateway autolocal,route-gateway 172.27.224.1,dhcp-option DNS 62.240.32.5,register-dns,block-ipv6,ifconfig 172.27.225.96 255.255.248.0'
Tue Sep 02 18:50:31 2014 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:1 is ignored by previous <connection> blocks
Tue Sep 02 18:50:31 2014 Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:19: block-ipv6 (2.3.4)
Tue Sep 02 18:50:31 2014 OPTIONS IMPORT: timers and/or timeouts modified
Tue Sep 02 18:50:31 2014 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Tue Sep 02 18:50:31 2014 OPTIONS IMPORT: LZO parms modified
Tue Sep 02 18:50:31 2014 OPTIONS IMPORT: --socket-flags option modified
Tue Sep 02 18:50:31 2014 OPTIONS IMPORT: --ifconfig/up options modified
Tue Sep 02 18:50:31 2014 OPTIONS IMPORT: route options modified
Tue Sep 02 18:50:31 2014 OPTIONS IMPORT: route-related options modified
Tue Sep 02 18:50:31 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Sep 02 18:50:31 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Sep 02 18:50:31 2014 MANAGEMENT: >STATE:1409676631,ASSIGN_IP,,172.27.225.96,
Tue Sep 02 18:50:31 2014 open_tun, tt->ipv6=0
Tue Sep 02 18:50:31 2014 TAP-WIN32 device [Local Area Connection 5] opened: \\.\Global\{75A2481E-2B4A-425F-A678-AE7F6F124ACE}.tap
Tue Sep 02 18:50:31 2014 TAP-Windows Driver Version 9.21
Tue Sep 02 18:50:31 2014 Set TAP-Windows TUN subnet mode network/local/netmask = 172.27.224.0/172.27.225.96/255.255.248.0 [SUCCEEDED]
Tue Sep 02 18:50:31 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 172.27.225.96/255.255.248.0 on interface {75A2481E-2B4A-425F-A678-AE7F6F124ACE} [DHCP-serv: 172.27.231.254, lease-time: 31536000]
Tue Sep 02 18:50:31 2014 Successful ARP Flush on interface [23] {75A2481E-2B4A-425F-A678-AE7F6F124ACE}
Tue Sep 02 18:50:31 2014 NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: An address has not yet been associated with the network endpoint. (code=1228)
Tue Sep 02 18:50:34 2014 TAP: DHCP address renewal succeeded
Tue Sep 02 18:50:39 2014 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Sep 02 18:50:39 2014 C:\Windows\system32\route.exe ADD 41.208.70.19 MASK 255.255.255.255 172.23.33.1
Tue Sep 02 18:50:39 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:50:39 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:39 2014 C:\Windows\system32\route.exe ADD 172.23.33.254 MASK 255.255.255.255 172.23.33.1 IF 11
Tue Sep 02 18:50:39 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:50:39 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:39 2014 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:50:39 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:50:39 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:39 2014 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:50:39 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:50:39 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:39 2014 Initialization Sequence Completed
Tue Sep 02 18:50:39 2014 MANAGEMENT: >STATE:1409676639,CONNECTED,SUCCESS,172.27.225.96,41.208.70.19
Tue Sep 02 18:50:39 2014 Start net commands...
Tue Sep 02 18:50:39 2014 C:\Windows\system32\net.exe stop dnscache
Tue Sep 02 18:50:42 2014 C:\Windows\system32\net.exe start dnscache
Tue Sep 02 18:50:44 2014 C:\Windows\system32\ipconfig.exe /flushdns
Tue Sep 02 18:50:45 2014 C:\Windows\system32\ipconfig.exe /registerdns
Tue Sep 02 18:50:48 2014 End net commands...
Tue Sep 02 18:50:53 2014 Connection reset, restarting [-1]
Tue Sep 02 18:50:53 2014 C:\Windows\system32\route.exe DELETE 41.208.70.19 MASK 255.255.255.255 172.23.33.1
Tue Sep 02 18:50:53 2014 Route deletion via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:53 2014 C:\Windows\system32\route.exe DELETE 172.23.33.254 MASK 255.255.255.255 172.23.33.1
Tue Sep 02 18:50:53 2014 Route deletion via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:53 2014 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:50:53 2014 Route deletion via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:53 2014 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:50:53 2014 Route deletion via IPAPI succeeded [adaptive]
Tue Sep 02 18:50:53 2014 Closing TUN/TAP interface
Tue Sep 02 18:50:53 2014 TAP: DHCP address released
Tue Sep 02 18:50:53 2014 SIGUSR1[soft,connection-reset] received, process restarting
Tue Sep 02 18:50:53 2014 MANAGEMENT: >STATE:1409676653,RECONNECTING,connection-reset,,
Tue Sep 02 18:50:53 2014 Restart pause, 5 second(s)
Tue Sep 02 18:50:58 2014 Control Channel Authentication: tls-auth using INLINE static key file
Tue Sep 02 18:50:58 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:50:58 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:50:58 2014 Socket Buffers: R=[8192->100000] S=[8192->100000]
Tue Sep 02 18:50:58 2014 Attempting to establish TCP connection with [AF_INET]41.208.70.19:443
Tue Sep 02 18:50:58 2014 MANAGEMENT: >STATE:1409676658,TCP_CONNECT,,,
Tue Sep 02 18:51:01 2014 TCP connection established with [AF_INET]41.208.70.19:443
Tue Sep 02 18:51:01 2014 TCPv4_CLIENT link local: [undef]
Tue Sep 02 18:51:01 2014 TCPv4_CLIENT link remote: [AF_INET]41.208.70.19:443
Tue Sep 02 18:51:01 2014 MANAGEMENT: >STATE:1409676661,WAIT,,,
Tue Sep 02 18:51:01 2014 MANAGEMENT: >STATE:1409676661,AUTH,,,
Tue Sep 02 18:51:01 2014 TLS: Initial packet from [AF_INET]41.208.70.19:443, sid=8d02cd46 f6f2a6ec
Tue Sep 02 18:51:01 2014 VERIFY OK: depth=1, CN=OpenVPN CA
Tue Sep 02 18:51:01 2014 VERIFY OK: nsCertType=SERVER
Tue Sep 02 18:51:01 2014 VERIFY OK: depth=0, CN=OpenVPN Server
Tue Sep 02 18:51:01 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Sep 02 18:51:01 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:51:01 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Sep 02 18:51:01 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Sep 02 18:51:01 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Tue Sep 02 18:51:01 2014 [OpenVPN Server] Peer Connection Initiated with [AF_INET]41.208.70.19:443
Tue Sep 02 18:51:03 2014 MANAGEMENT: >STATE:1409676663,GET_CONFIG,,,
Tue Sep 02 18:51:04 2014 SENT CONTROL [OpenVPN Server]: 'PUSH_REQUEST' (status=1)
Tue Sep 02 18:51:04 2014 PUSH: Received control message: 'PUSH_REPLY,explicit-exit-notify,topology subnet,route-delay 5 30,dhcp-pre-release,dhcp-renew,dhcp-release,route-metric 101,ping 12,ping-restart 50,socket-flags TCP_NODELAY,auth-token SESS_ID,comp-lzo yes,redirect-gateway def1,redirect-gateway bypass-dhcp,redirect-gateway autolocal,route-gateway 172.27.224.1,dhcp-option DNS 62.240.32.5,register-dns,block-ipv6,ifconfig 172.27.225.96 255.255.248.0'
Tue Sep 02 18:51:04 2014 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:1 is ignored by previous <connection> blocks
Tue Sep 02 18:51:04 2014 Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:19: block-ipv6 (2.3.4)
Tue Sep 02 18:51:04 2014 OPTIONS IMPORT: timers and/or timeouts modified
Tue Sep 02 18:51:04 2014 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Tue Sep 02 18:51:04 2014 OPTIONS IMPORT: LZO parms modified
Tue Sep 02 18:51:04 2014 OPTIONS IMPORT: --socket-flags option modified
Tue Sep 02 18:51:04 2014 OPTIONS IMPORT: --ifconfig/up options modified
Tue Sep 02 18:51:04 2014 OPTIONS IMPORT: route options modified
Tue Sep 02 18:51:04 2014 OPTIONS IMPORT: route-related options modified
Tue Sep 02 18:51:04 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Sep 02 18:51:04 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Sep 02 18:51:04 2014 MANAGEMENT: >STATE:1409676664,ASSIGN_IP,,172.27.225.96,
Tue Sep 02 18:51:04 2014 open_tun, tt->ipv6=0
Tue Sep 02 18:51:04 2014 TAP-WIN32 device [Local Area Connection 5] opened: \\.\Global\{75A2481E-2B4A-425F-A678-AE7F6F124ACE}.tap
Tue Sep 02 18:51:04 2014 TAP-Windows Driver Version 9.21
Tue Sep 02 18:51:04 2014 Set TAP-Windows TUN subnet mode network/local/netmask = 172.27.224.0/172.27.225.96/255.255.248.0 [SUCCEEDED]
Tue Sep 02 18:51:04 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 172.27.225.96/255.255.248.0 on interface {75A2481E-2B4A-425F-A678-AE7F6F124ACE} [DHCP-serv: 172.27.231.254, lease-time: 31536000]
Tue Sep 02 18:51:04 2014 Successful ARP Flush on interface [23] {75A2481E-2B4A-425F-A678-AE7F6F124ACE}
Tue Sep 02 18:51:07 2014 TAP: DHCP address released
Tue Sep 02 18:51:10 2014 TAP: DHCP address renewal succeeded
Tue Sep 02 18:51:15 2014 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Sep 02 18:51:15 2014 C:\Windows\system32\route.exe ADD 41.208.70.19 MASK 255.255.255.255 172.23.33.1
Tue Sep 02 18:51:15 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:51:15 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:51:15 2014 C:\Windows\system32\route.exe ADD 172.23.33.254 MASK 255.255.255.255 172.23.33.1 IF 11
Tue Sep 02 18:51:15 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:51:15 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:51:15 2014 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:51:15 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:51:15 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:51:15 2014 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 172.27.224.1
Tue Sep 02 18:51:15 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Tue Sep 02 18:51:15 2014 Route addition via IPAPI succeeded [adaptive]
Tue Sep 02 18:51:15 2014 Initialization Sequence Completed
Tue Sep 02 18:51:15 2014 MANAGEMENT: >STATE:1409676675,CONNECTED,SUCCESS,172.27.225.96,41.208.70.19
Tue Sep 02 18:51:15 2014 Start net commands...
Tue Sep 02 18:51:15 2014 C:\Windows\system32\net.exe stop dnscache
Tue Sep 02 18:51:17 2014 C:\Windows\system32\net.exe start dnscache
Tue Sep 02 18:51:19 2014 C:\Windows\system32\ipconfig.exe /flushdns
Tue Sep 02 18:51:20 2014 C:\Windows\system32\ipconfig.exe /registerdns
Tue Sep 02 18:51:23 2014 End net commands...
Tue Sep 02 18:52:14 2014 MANAGEMENT: Client disconnected
Tue Sep 02 18:52:14 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Tue Sep 02 18:52:14 2014 MANAGEMENT: Client disconnected
Tue Sep 02 18:52:18 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Tue Sep 02 18:53:15 2014 MANAGEMENT: Client disconnected


and config file

# Automatically generated OpenVPN client config file
# Generated on Tue Sep 2 15:06:22 2014 by 41.208.70.19.static.ltt.ly
# Note: this config file contains inline private keys
# and therefore should be kept confidential!
# Note: this configuration is user-locked to the username below
# OVPN_ACCESS_SERVER_USERNAME=openvpn
# Define the profile name of this particular configuration file
# OVPN_ACCESS_SERVER_PROFILE=openvpn@41.208.70.19
# OVPN_ACCESS_SERVER_CLI_PREF_ALLOW_WEB_IMPORT=True
# OVPN_ACCESS_SERVER_CLI_PREF_ENABLE_CONNECT=True
# OVPN_ACCESS_SERVER_CLI_PREF_ENABLE_XD_PROXY=True
# OVPN_ACCESS_SERVER_WSHOST=41.208.70.19:443
# OVPN_ACCESS_SERVER_WEB_CA_BUNDLE_START
# -----BEGIN CERTIFICATE-----
# MIICFzCCAYCgAwIBAgIEUt+cnzANBgkqhkiG9w0BAQUFADBHMUUwQwYDVQQDEzxP
# cGVuVlBOIFdlYiBDQSAyMDE0LjAxLjIyIDEyOjI1OjM1IEVFVCA0MS4yMDguNzAu
# MTkuc3RhdGljLmwwHhcNMTQwMTE1MTAyNTM1WhcNMjQwMTIwMTAyNTM1WjBHMUUw
# QwYDVQQDEzxPcGVuVlBOIFdlYiBDQSAyMDE0LjAxLjIyIDEyOjI1OjM1IEVFVCA0
# MS4yMDguNzAuMTkuc3RhdGljLmwwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGB
# ALKONHOGourj2+Gl155w9BoDm7V+4rjd04x9IxEbR6qnMMHt580nr1SDAv4SeCUk
# H57QIGhpwq1iF2+yhbOHYSHS6osvJCr1flagkBnzf/02miW40+3tlvqL3dV4WOIF
# brcGZOL1YdTCgPU8NaX19th7b7eQ1r4Tu9plPfq6YgjdAgMBAAGjEDAOMAwGA1Ud
# EwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADgYEAkUc5BxUxavQT1nWBuwNar1/2WW37
# 8FEcto2HbVLQTCywRR4gAsR0uZAnth2si9pzKNlak/c8SheeDZC0pRYoblaJQG7E
# kR78hFZm6p0Q+YyfhJDG1/lCqeGwYgG5c+ztAzQvfVRtnYMdoMeseC4AsvEJBvEK
# UIodK0H27J1gj0E=
# -----END CERTIFICATE-----
# OVPN_ACCESS_SERVER_WEB_CA_BUNDLE_STOP
# OVPN_ACCESS_SERVER_IS_OPENVPN_WEB_CA=1
# OVPN_ACCESS_SERVER_ORGANIZATION=OpenVPN Technologies, Inc.
setenv FORWARD_COMPATIBLE 1
client
server-poll-timeout 4
nobind
remote 41.208.70.19 1194 udp
remote 41.208.70.19 1194 udp
remote 41.208.70.19 443 tcp
remote 41.208.70.19 1194 udp
remote 41.208.70.19 1194 udp
remote 41.208.70.19 1194 udp
remote 41.208.70.19 1194 udp
remote 41.208.70.19 1194 udp
dev tun
dev-type tun
ns-cert-type server
reneg-sec 604800
sndbuf 100000
rcvbuf 100000
auth-user-pass
static-challenge "Enter Google Authenticator Code" 1
# NOTE: LZO commands are pushed by the Access Server at connect time.
# NOTE: The below line doesn't disable LZO.
comp-lzo no
verb 3
setenv PUSH_PEER_INFO

Post Reply