Openvpn & Airvpn

Business solution to host your own OpenVPN server with web management interface and bundled clients.
Post Reply
NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Openvpn & Airvpn

Post by NUFC12 » Tue Jul 07, 2015 11:28 am

Hi All,

Looking for some guidance here. I have an enigma 2 satellite receiver with Openvpn built into the image, I have generated and transferred all my files to etc/openvopn, I have scowered searched the internet and liaised with the vpn provider tweaking config settings etc but I still have the issue of the error below when I start openvpn.

Please see the errors highlighted in bold:

Mon Jul 6 20:33:09 2015 OpenVPN 2.3.4 mipsel-oe-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on May 8 2015
Mon Jul 6 20:33:09 2015 library versions: OpenSSL 1.0.2a 19 Mar 2015, LZO 2.09
Mon Jul 6 20:33:09 2015 WARNING: file '/etc/openvpn/user.key' is group or others accessible
Mon Jul 6 20:33:09 2015 WARNING: file '/etc/openvpn/ta.key' is group or others accessible
Mon Jul 6 20:33:09 2015 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
Mon Jul 6 20:33:09 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:09 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:09 2015 Socket Buffers: R=[87380->131072] S=[16384->131072]
Mon Jul 6 20:33:09 2015 Attempting to establish TCP connection with [AF_INET]199.241.146.178:443 [nonblock]

Mon Jul 6 20:33:10 2015 TCP connection established with [AF_INET]199.241.146.178:443

Mon Jul 6 20:33:10 2015 TCPv4_CLIENT link local: [undef]
Mon Jul 6 20:33:10 2015 TCPv4_CLIENT link remote: [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:10 2015 TLS: Initial packet from [AF_INET]199.241.146.178:443, sid=4c27a6e6 9a343736

Mon Jul 6 20:33:12 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

Mon Jul 6 20:33:12 2015 Validating certificate key usage
Mon Jul 6 20:33:12 2015 ++ Certificate has key usage 00a0, expects 00a0
Mon Jul 6 20:33:12 2015 VERIFY KU OK
Mon Jul 6 20:33:12 2015 Validating certificate extended key usage
Mon Jul 6 20:33:12 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jul 6 20:33:12 2015 VERIFY EKU OK
Mon Jul 6 20:33:12 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

Mon Jul 6 20:33:24 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:33:24 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:24 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:33:24 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:24 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Mon Jul 6 20:33:24 2015 [server] Peer Connection Initiated with [AF_INET]199.241.146.178:443

Mon Jul 6 20:33:26 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

Mon Jul 6 20:33:27 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.251 255.255.0.0'
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: timers and/or timeouts modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: LZO parms modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: --ifconfig/up options modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: route options modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: route-related options modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Jul 6 20:33:27 2015 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=eth0 HWADDR=00:1e:a0:00:66:a2

Mon Jul 6 20:33:27 2015 TUN/TAP device tun1 opened
Mon Jul 6 20:33:27 2015 TUN/TAP TX queue length set to 100
Mon Jul 6 20:33:27 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Jul 6 20:33:27 2015 /sbin/ifconfig tun1 10.5.0.251 netmask 255.255.0.0 mtu 1500 broadcast 10.5.255.255

Mon Jul 6 20:33:32 2015 /sbin/route add -net 199.241.146.178 netmask 255.255.255.255 gw 192.168.0.1

route: SIOCADDRT: File exists
Mon Jul 6 20:33:32 2015 ERROR: Linux route add command failed: external program exited with error status: 1
Mon Jul 6 20:33:32 2015 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.5.0.1
route: SIOCADDRT: File exists
Mon Jul 6 20:33:32 2015 ERROR: Linux route add command failed: external program exited with error status: 1
Mon Jul 6 20:33:32 2015 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.5.0.1
route: SIOCADDRT: File exists
Mon Jul 6 20:33:32 2015 ERROR: Linux route add command failed: external program exited with error status: 1

Mon Jul 6 20:33:32 2015 Initialization Sequence Completed

Mon Jul 6 20:33:47 2015 Connection reset, restarting [0]
Mon Jul 6 20:33:47 2015 SIGUSR1[soft,connection-reset] received, process restarting
Mon Jul 6 20:33:47 2015 Restart pause, 5 second(s)

Mon Jul 6 20:33:52 2015 Socket Buffers: R=[87380->131072] S=[16384->131072]
Mon Jul 6 20:33:52 2015 Attempting to establish TCP connection with [AF_INET]199.241.146.178:443 [nonblock]

Mon Jul 6 20:33:53 2015 TCP connection established with [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:53 2015 TCPv4_CLIENT link local: [undef]
Mon Jul 6 20:33:53 2015 TCPv4_CLIENT link remote: [AF_INET]199.241.146.178:443

Mon Jul 6 20:33:53 2015 TLS: Initial packet from [AF_INET]199.241.146.178:443, sid=51fc7777 0f20fe94

Mon Jul 6 20:33:56 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

Mon Jul 6 20:33:56 2015 Validating certificate key usage
Mon Jul 6 20:33:56 2015 ++ Certificate has key usage 00a0, expects 00a0
Mon Jul 6 20:33:56 2015 VERIFY KU OK
Mon Jul 6 20:33:56 2015 Validating certificate extended key usage
Mon Jul 6 20:33:56 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jul 6 20:33:56 2015 VERIFY EKU OK
Mon Jul 6 20:33:56 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

Mon Jul 6 20:34:08 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:34:08 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:34:08 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:34:08 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:34:08 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Mon Jul 6 20:34:08 2015 [server] Peer Connection Initiated with [AF_INET]199.241.146.178:443

Mon Jul 6 20:34:10 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

Mon Jul 6 20:34:10 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.251 255.255.0.0'
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: timers and/or timeouts modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: LZO parms modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: --ifconfig/up options modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: route options modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: route-related options modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Jul 6 20:34:10 2015 Preserving previous TUN/TAP instance: tun1
Mon Jul 6 20:34:10 2015 Initialization Sequence Completed

I am lost now as to what it wrong, Openvpn starts but doesn't seem to connect to the vpn provider.

User avatar
maikcat
Forum Team
Posts: 4200
Joined: Wed Jan 12, 2011 9:23 am
Location: Athens,Greece
Contact:

Re: Openvpn & Airvpn

Post by maikcat » Tue Jul 07, 2015 1:04 pm

dreambox?

verify that there is not any openvpn instance running first,
are you trying to start openvpn as root?
how do you start openvpn?

Michael.

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Tue Jul 07, 2015 1:24 pm

Thanks for the reply.

It's not a dreambox but basically the same running Linux enigma 2.

I have verified that openvpn is not running already, I have tried starting it via the menu option in the configuration setup on the box and also via a telnet command from root.

Still get the same output?

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Tue Jul 07, 2015 2:20 pm

Hi,

Thanks for the reply.

Yes same kind of box as dreambox.

The VPN provider had me stop openvpn, reboot the box and run a telnet command to make sure it's not running. Please see attached photo.

I have started it both ways, from the menu option in the image and via a telnet session using /etc/init.d/openvpn start.

Both have the same output. Or is there another way to start as root?
You do not have the required permissions to view the files attached to this post.

User avatar
maikcat
Forum Team
Posts: 4200
Joined: Wed Jan 12, 2011 9:23 am
Location: Athens,Greece
Contact:

Re: Openvpn & Airvpn

Post by maikcat » Wed Jul 08, 2015 12:58 pm

dcc... i havent seen this for a while :)

anyway

you are starting openvpn as root,
can you post:

client config,
log using verb 5

ps: a nice tip to avoid the grep itself showing is to use [] for the first letter, f.e ps ax | grep [t]op :)

Michael.

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Wed Jul 08, 2015 1:59 pm

Hi,

Sorry if I have misunderstood, You want me to post my client.conf file that I got from the VPN provider? Or do you mean run a telnet command?

I am new to this.

Thanks

User avatar
maikcat
Forum Team
Posts: 4200
Joined: Wed Jan 12, 2011 9:23 am
Location: Athens,Greece
Contact:

Re: Openvpn & Airvpn

Post by maikcat » Thu Jul 09, 2015 6:43 am

you client config supplied by your provider

and the logs using verb 5

Michael.

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Thu Jul 09, 2015 7:00 am

Ok will post the config later.

Not sure how to get the logs using verb 5?

User avatar
maikcat
Forum Team
Posts: 4200
Joined: Wed Jan 12, 2011 9:23 am
Location: Athens,Greece
Contact:

Re: Openvpn & Airvpn

Post by maikcat » Thu Jul 09, 2015 12:56 pm

add verb 5 to your config ;)

Michael.

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Fri Jul 10, 2015 5:33 am

Hi, here is the config from the provider. Where do I add verb 5 to the config so I can post the outputs?

It would not let me upload any file, kept saying extension conf, ovpn,rtf is not allowed. everything I tried.

# --------------------------------------------------------
# Air VPN | https://airvpn.org | Wednesday 8th of July 2015 05:29:25 PM
# OpenVPN Client Configuration
# AirVPN_LT-Siauliai_Baten_UDP-443
# --------------------------------------------------------

client
dev tun
proto udp
remote 46.166.165.124 443
resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
cipher AES-256-CBC
comp-lzo no
route-delay 5
verb 3
explicit-exit-notify 5
ca "/etc/openvpn/ca.crt"
cert "/etc/openvpn/user.crt"
key "/etc/openvpn/user.key"
tls-auth "/etc/openvpn/ta.key" 1


Thanks

User avatar
maikcat
Forum Team
Posts: 4200
Joined: Wed Jan 12, 2011 9:23 am
Location: Athens,Greece
Contact:

Re: Openvpn & Airvpn

Post by maikcat » Fri Jul 10, 2015 6:07 am

edit the config and change verb 3 to verb 5 (using vi)

also the file should be named *.conf

Michael.

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Fri Jul 10, 2015 6:28 am

Ok thanks I will do that later on.

Yes I have the file named conf but it wouldn't let me upload the file so just had to paste the info from it.

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Sat Jul 11, 2015 7:43 am

Hi, Changed it to verb 5 and re ran the command in telnet. This was the output:

-------------------- < Script > ----------------------------
df -m; echo ">>> DONE <<<";

Filesystem 1M-blocks Used Available Use% Mounted on
ubi0:rootfs 1844 140 1704 8% /
devtmpfs 564 0 564 0% /dev
tmpfs 0 0 0 0% /media
/dev/sda1 476744 30805 444915 6% /media/hdd
tmpfs 564 0 564 0% /var/volatile
>>> DONE <<<
root@xpeedlx3:~# [6n
clear

[H[Jroot@xpeedlx3:~# [6n
o
p
e
n
v
p
n
-
-
c
o
n
f
i
g








--config[8D
-
-
c
o
n
f
i
g

/
e
t
c
/
o
p
e
n
v
p
n
/
c
l
i
e
n
t
.
c
o
n
f


Sat Jul 11 08:34:02 2015 us=901560 Current Parameter Settings:
Sat Jul 11 08:34:02 2015 us=901971 config = '/etc/openvpn/client.conf'
Sat Jul 11 08:34:02 2015 us=902101 mode = 0
Sat Jul 11 08:34:02 2015 us=902297 persist_config = DISABLED
Sat Jul 11 08:34:02 2015 us=902395 persist_mode = 1
Sat Jul 11 08:34:02 2015 us=902486 show_ciphers = DISABLED
Sat Jul 11 08:34:02 2015 us=902583 show_digests = DISABLED
Sat Jul 11 08:34:02 2015 us=902772 show_engines = DISABLED
Sat Jul 11 08:34:02 2015 us=902886 genkey = DISABLED
Sat Jul 11 08:34:02 2015 us=902973 key_pass_file = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=903055 show_tls_ciphers = DISABLED
Sat Jul 11 08:34:02 2015 us=903188 Connection profiles [default]:
Sat Jul 11 08:34:02 2015 us=903287 proto = udp
Sat Jul 11 08:34:02 2015 us=903375 local = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=903463 local_port = 0
Sat Jul 11 08:34:02 2015 us=903547 remote = '46.166.165.124'
Sat Jul 11 08:34:02 2015 us=903631 remote_port = 443
Sat Jul 11 08:34:02 2015 us=903711 remote_float = DISABLED
Sat Jul 11 08:34:02 2015 us=903791 bind_defined = DISABLED
Sat Jul 11 08:34:02 2015 us=903874 bind_local = DISABLED
Sat Jul 11 08:34:02 2015 us=903959 connect_retry_seconds = 5
Sat Jul 11 08:34:02 2015 us=904043 connect_timeout = 10
Sat Jul 11 08:34:02 2015 us=904189 connect_retry_max = 0
Sat Jul 11 08:34:02 2015 us=904295 socks_proxy_server = '[UNDEF]'
Sa
t Jul 11 08:34:02 2015 us=904385 socks_proxy_port = 0
Sat Jul 11 08:34:02 2015 us=904471 socks_proxy_retry = DISABLED
Sat Jul 11 08:34:02 2015 us=904578 tun_mtu = 1500
Sat Jul 11 08:34:02 2015 us=904681 tun_mtu_defined = ENABLED
Sat Jul 11 08:34:02 2015 us=904781 link_mtu = 1500
Sat Jul 11 08:34:02 2015 us=904861 link_mtu_defined = DISABLED
Sat Jul 11 08:34:02 2015 us=904943 tun_mtu_extra = 0
Sat Jul 11 08:34:02 2015 us=905028 tun_mtu_extra_defined = DISABLED
Sat Jul 11 08:34:02 2015 us=905172 mtu_discover_type = -1
Sat Jul 11 08:34:02 2015 us=905365 fragment = 0
Sat Jul 11 08:34:02 2015 us=905451 mssfix = 1450
Sat Jul 11 08:34:02 2015 us=905536 explicit_exit_notification = 5
Sat Jul 11 08:34:02 2015 us=905616 Connection profiles END
Sat Jul 11 08:34:02 2015 us=905702 remote_random = DISABLED
Sat Jul 11 08:34:02 2015 us=905820 ipchange = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=905953 dev = 'tun'
Sat Jul 11 08:34:02 2015 us=906096 dev_type = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=906282 dev_node = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=906402 lladdr = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=906503 topology = 1
Sat Jul 11 08:34:02 2015 us=906589 tun_ipv6 = DISABLED
Sat Jul 11 08:34:02 2015 us=906672 ifconfig_local = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=906780 ifconfig_remote_netmask = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=906873 ifconfig_noexec = DISABLED
Sat Jul 11 08:34:02 2015 us=906962 ifconfig_nowarn = DISABLED
Sat Jul 11 08:34:02 2015 us=907043 ifconfig_ipv6_local = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=907186 ifconfig_ipv6_netbits = 0
Sat Jul 11 08:34:02 2015 us=907279 ifconfig_ipv6_remote = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=907374 shaper = 0
Sat Jul 11 08:34:02 2015 us=907474 mtu_test = 0
Sat Jul 11 08:34:02 2015 us=907569 mlock = DISABLED
Sat Jul 11 08:34:02 2015 us=907759 keepalive_ping = 0
Sat Jul 11 08:34:02 2015 us=907855 keepalive_timeout = 0
Sat Jul 11 08:34:02 2015 us=907942 inactivity_timeout = 0
Sat
Jul 11 08:34:02 2015 us=908022 ping_send_timeout = 0
Sat Jul 11 08:34:02 2015 us=908105 ping_rec_timeout = 0
Sat Jul 11 08:34:02 2015 us=908265 ping_rec_timeout_action = 0
Sat Jul 11 08:34:02 2015 us=908359 ping_timer_remote = DISABLED
Sat Jul 11 08:34:02 2015 us=908471 remap_sigusr1 = 0
Sat Jul 11 08:34:02 2015 us=908561 persist_tun = ENABLED
Sat Jul 11 08:34:02 2015 us=908645 persist_local_ip = DISABLED
Sat Jul 11 08:34:02 2015 us=908757 persist_remote_ip = DISABLED
Sat Jul 11 08:34:02 2015 us=908849 persist_key = ENABLED
Sat Jul 11 08:34:02 2015 us=908931 passtos = DISABLED
Sat Jul 11 08:34:02 2015 us=909013 resolve_retry_seconds = 1000000000
Sat Jul 11 08:34:02 2015 us=909095 username = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=909220 groupname = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=909307 chroot_dir = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=909391 cd_dir = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=909470 writepid = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=909555 up_script = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=909636 down_script = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=909717 down_pre = DISABLED
Sat Jul 11 08:34:02 2015 us=909797 up_restart = DISABLED
Sat Jul 11 08:34:02 2015 us=909891 up_delay = DISABLED
Sat Jul 11 08:34:02 2015 us=910007 daemon = DISABLED
Sat Jul 11 08:34:02 2015 us=910148 inetd = 0
Sat Jul 11 08:34:02 2015 us=910347 log = DISABLED
Sat Jul 11 08:34:02 2015 us=910463 suppress_timestamps = DISABLED
Sat Jul 11 08:34:02 2015 us=910556 nice = 0
Sat Jul 11 08:34:02 2015 us=910640 verbosity = 5
Sat Jul 11 08:34:02 2015 us=910724 mute = 0
Sat Jul 11 08:34:02 2015 us=910811 gremlin = 0
Sat Jul 11 08:34:02 2015 us=910891 status_file = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=910972 status_file_version = 1
Sat Jul 11 08:34:02 2015 us=911053 status_file_update_freq = 60
Sat Jul 11 08:34:02 2015 us=911467 occ = ENABLED
Sat Jul 11 08:34:02 2015 us=911594 rcvbuf = 65536
Sat Jul 11 08:34:02 2015 us=911689 sndbuf = 655
36
Sat Jul 11 08:34:02 2015 us=911782 mark = 0
Sat Jul 11 08:34:02 2015 us=911885 sockflags = 0
Sat Jul 11 08:34:02 2015 us=911971 fast_io = DISABLED
Sat Jul 11 08:34:02 2015 us=912054 lzo = 1
Sat Jul 11 08:34:02 2015 us=912172 route_script = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=912272 route_default_gateway = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=912355 route_default_metric = 0
Sat Jul 11 08:34:02 2015 us=912438 route_noexec = DISABLED
Sat Jul 11 08:34:02 2015 us=912542 route_delay = 5
Sat Jul 11 08:34:02 2015 us=912731 route_delay_window = 30
Sat Jul 11 08:34:02 2015 us=912824 route_delay_defined = ENABLED
Sat Jul 11 08:34:02 2015 us=912934 route_nopull = DISABLED
Sat Jul 11 08:34:02 2015 us=913026 route_gateway_via_dhcp = DISABLED
Sat Jul 11 08:34:02 2015 us=913147 max_routes = 100
Sat Jul 11 08:34:02 2015 us=913253 allow_pull_fqdn = DISABLED
Sat Jul 11 08:34:02 2015 us=913343 management_addr = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=913429 management_port = 0
Sat Jul 11 08:34:02 2015 us=913514 management_user_pass = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=913599 management_log_history_cache = 250
Sat Jul 11 08:34:02 2015 us=913686 management_echo_buffer_size = 100
Sat Jul 11 08:34:02 2015 us=913771 management_write_peer_info_file = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=913857 management_client_user = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=913944 management_client_group = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=914032 management_flags = 0
Sat Jul 11 08:34:02 2015 us=914173 shared_secret_file = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=914284 key_direction = 2
Sat Jul 11 08:34:02 2015 us=914410 ciphername_defined = ENABLED
Sat Jul 11 08:34:02 2015 us=914507 ciphername = 'AES-256-CBC'
Sat Jul 11 08:34:02 2015 us=914595 authname_defined = ENABLED
Sat Jul 11 08:34:02 2015 us=914681 authname = 'SHA1'
Sat Jul 11 08:34:02 2015 us=914764 prng_hash = 'SHA1'
Sat Jul 11 08:34:02 2015 us=914850 prng_nonce_secret_len = 16
Sat Jul 11 08:34
:02 2015 us=914937 keysize = 0
Sat Jul 11 08:34:02 2015 us=915037 engine = DISABLED
Sat Jul 11 08:34:02 2015 us=915278 replay = ENABLED
Sat Jul 11 08:34:02 2015 us=915377 mute_replay_warnings = DISABLED
Sat Jul 11 08:34:02 2015 us=915467 replay_window = 64
Sat Jul 11 08:34:02 2015 us=915550 replay_time = 15
Sat Jul 11 08:34:02 2015 us=915637 packet_id_file = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=915720 use_iv = ENABLED
Sat Jul 11 08:34:02 2015 us=915802 test_crypto = DISABLED
Sat Jul 11 08:34:02 2015 us=915886 tls_server = DISABLED
Sat Jul 11 08:34:02 2015 us=915970 tls_client = ENABLED
Sat Jul 11 08:34:02 2015 us=916053 key_method = 2
Sat Jul 11 08:34:02 2015 us=916172 ca_file = '/etc/openvpn/ca.crt'
Sat Jul 11 08:34:02 2015 us=916275 ca_path = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=916360 dh_file = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=916444 cert_file = '/etc/openvpn/user.crt'
Sat Jul 11 08:34:02 2015 us=916530 priv_key_file = '/etc/openvpn/user.key'
Sat Jul 11 08:34:02 2015 us=916640 pkcs12_file = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=916777 cipher_list = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=916887 tls_verify = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=916970 tls_export_cert = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=917054 verify_x509_type = 0
Sat Jul 11 08:34:02 2015 us=917295 verify_x509_name = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=917425 crl_file = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=917522 ns_cert_type = 0
Sat Jul 11 08:34:02 2015 us=917609 remote_cert_ku = 160
Sat Jul 11 08:34:02 2015 us=917698 remote_cert_ku = 136
Sat Jul 11 08:34:02 2015 us=917781 remote_cert_ku = 0
Sat Jul 11 08:34:02 2015 us=917865 remote_cert_ku = 0
Sat Jul 11 08:34:02 2015 us=917950 remote_cert_ku = 0
Sat Jul 11 08:34:02 2015 us=918034 remote_cert_ku = 0
Sat Jul 11 08:34:02 2015 us=918146 remote_cert_ku = 0
Sat Jul 11 08:34:02 2015 us=918252 remote_cert_ku = 0
Sat Jul 11 08:34:02 2015 us=918339 remote_cert_ku
= 0
Sat Jul 11 08:34:02 2015 us=918424 remote_cert_ku = 0
Sat Jul 11 08:34:02 2015 us=918509 remote_cert_ku[i] = 0
Sat Jul 11 08:34:02 2015 us=918593 remote_cert_ku[i] = 0
Sat Jul 11 08:34:02 2015 us=918680 remote_cert_ku[i] = 0
Sat Jul 11 08:34:02 2015 us=918771 remote_cert_ku[i] = 0
Sat Jul 11 08:34:02 2015 us=918860 remote_cert_ku[i] = 0
Sat Jul 11 08:34:02 2015 us=918966 remote_cert_ku[i] = 0
Sat Jul 11 08:34:02 2015 us=919084 remote_cert_eku = 'TLS Web Server Authentication'
Sat Jul 11 08:34:02 2015 us=919212 ssl_flags = 0
Sat Jul 11 08:34:02 2015 us=919303 tls_timeout = 2
Sat Jul 11 08:34:02 2015 us=919386 renegotiate_bytes = 0
Sat Jul 11 08:34:02 2015 us=919470 renegotiate_packets = 0
Sat Jul 11 08:34:02 2015 us=919552 renegotiate_seconds = 3600
Sat Jul 11 08:34:02 2015 us=919639 handshake_window = 60
Sat Jul 11 08:34:02 2015 us=919725 transition_window = 3600
Sat Jul 11 08:34:02 2015 us=919808 single_session = DISABLED
Sat Jul 11 08:34:02 2015 us=919894 push_peer_info = DISABLED
Sat Jul 11 08:34:02 2015 us=919976 tls_exit = DISABLED
Sat Jul 11 08:34:02 2015 us=920063 tls_auth_file = '/etc/openvpn/ta.key'
Sat Jul 11 08:34:02 2015 us=920268 server_network = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=920398 server_netmask = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=920543 server_network_ipv6 = ::
Sat Jul 11 08:34:02 2015 us=920642 server_netbits_ipv6 = 0
Sat Jul 11 08:34:02 2015 us=920743 server_bridge_ip = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=920838 server_bridge_netmask = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=920934 server_bridge_pool_start = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=921029 server_bridge_pool_end = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=921151 ifconfig_pool_defined = DISABLED
Sat Jul 11 08:34:02 2015 us=921443 ifconfig_pool_start = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=921559 ifconfig_pool_end = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=921666 ifconfig_pool_netmask = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=923248 ifconfig_pool_p
ersist_filename = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=923370 ifconfig_pool_persist_refresh_freq = 600
Sat Jul 11 08:34:02 2015 us=923461 ifconfig_ipv6_pool_defined = DISABLED
Sat Jul 11 08:34:02 2015 us=923557 ifconfig_ipv6_pool_base = ::
Sat Jul 11 08:34:02 2015 us=923647 ifconfig_ipv6_pool_netbits = 0
Sat Jul 11 08:34:02 2015 us=923734 n_bcast_buf = 256
Sat Jul 11 08:34:02 2015 us=923819 tcp_queue_limit = 64
Sat Jul 11 08:34:02 2015 us=923904 real_hash_size = 256
Sat Jul 11 08:34:02 2015 us=923991 virtual_hash_size = 256
Sat Jul 11 08:34:02 2015 us=924076 client_connect_script = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=924226 learn_address_script = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=924328 client_disconnect_script = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=924417 client_config_dir = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=924508 ccd_exclusive = DISABLED
Sat Jul 11 08:34:02 2015 us=924598 tmp_dir = '/tmp'
Sat Jul 11 08:34:02 2015 us=924697 push_ifconfig_defined = DISABLED
Sat Jul 11 08:34:02 2015 us=924808 push_ifconfig_local = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=924906 push_ifconfig_remote_netmask = 0.0.0.0
Sat Jul 11 08:34:02 2015 us=924993 push_ifconfig_ipv6_defined = DISABLED
Sat Jul 11 08:34:02 2015 us=925152 push_ifconfig_ipv6_local = ::/0
Sat Jul 11 08:34:02 2015 us=925266 push_ifconfig_ipv6_remote = ::
Sat Jul 11 08:34:02 2015 us=925358 enable_c2c = DISABLED
Sat Jul 11 08:34:02 2015 us=925471 duplicate_cn = DISABLED
Sat Jul 11 08:34:02 2015 us=925559 cf_max = 0
Sat Jul 11 08:34:02 2015 us=925642 cf_per = 0
Sat Jul 11 08:34:02 2015 us=925726 max_clients = 1024
Sat Jul 11 08:34:02 2015 us=925811 max_routes_per_client = 256
Sat Jul 11 08:34:02 2015 us=925895 auth_user_pass_verify_script = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=925985 auth_user_pass_verify_script_via_file = DISABLED
Sat Jul 11 08:34:02 2015 us=926071 port_share_host = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=926192 port_share_port = 0
Sat Jul 11 08:34:02 2015
us=926300 client = ENABLED
Sat Jul 11 08:34:02 2015 us=926393 pull = ENABLED
Sat Jul 11 08:34:02 2015 us=926479 auth_user_pass_file = '[UNDEF]'
Sat Jul 11 08:34:02 2015 us=926571 OpenVPN 2.3.4 mipsel-oe-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on May 8 2015
Sat Jul 11 08:34:02 2015 us=926709 library versions: OpenSSL 1.0.2a 19 Mar 2015, LZO 2.09
Sat Jul 11 08:34:02 2015 us=930089 WARNING: file '/etc/openvpn/user.key' is group or others accessible
Sat Jul 11 08:34:02 2015 us=932074 WARNING: file '/etc/openvpn/ta.key' is group or others accessible
Sat Jul 11 08:34:02 2015 us=932259 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
Sat Jul 11 08:34:02 2015 us=932448 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Jul 11 08:34:02 2015 us=932587 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Jul 11 08:34:02 2015 us=932804 LZO compression initialized
Sat Jul 11 08:34:02 2015 us=933457 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
Sat Jul 11 08:34:02 2015 us=933761 Socket Buffers: R=[196608->131072] S=[196608->131072]
Sat Jul 11 08:34:02 2015 us=933988 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
Sat Jul 11 08:34:02 2015 us=934241 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
Sat Jul 11 08:34:02 2015 us=934354 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
Sat Jul 11 08:34:02 2015 us=934543 Local Options hash (VER=V4): '9e7066d2'
Sat Jul 11 08:34:02 2015 us=934688 Expected Remote Options hash (VER=V4): '162b04de'
Sat Jul 11 08:34:02 2015 us=934853 UDPv4 link local: [undef]
Sat Jul 11 08:34:02 2015 us=934971 UDPv4 link remote: [AF_IN
ET]46.166.165.124:443
WRSat Jul 11 08:34:02 2015 us=997543 TLS: Initial packet from [AF_INET]46.166.165.124:443, sid=ace38e22 f3f75fbd
WWWWRRRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRSat Jul 11 08:34:03 2015 us=355755 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Jul 11 08:34:03 2015 us=366205 Validating certificate key usage
Sat Jul 11 08:34:03 2015 us=366347 ++ Certificate has key usage 00a0, expects 00a0
Sat Jul 11 08:34:03 2015 us=366467 VERIFY KU OK
Sat Jul 11 08:34:03 2015 us=366610 Validating certificate extended key usage
Sat Jul 11 08:34:03 2015 us=366748 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Jul 11 08:34:03 2015 us=366846 VERIFY EKU OK
Sat Jul 11 08:34:03 2015 us=366936 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
WRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWR
WW
WWRWRWRWRWRWRWRWRWRWRWRWRWRW
RWRWRWRWRWRWRWRWRWRWRWRWRW
RRRRWWWWRRRRWRWRSat Jul 11 08:34:09 2015 us=203108 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Jul 11 08:34:09 2015 us=203298 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Jul 11 08:34:09 2015 us=203377 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Jul 11 08:34:09 2015 us=203438 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
WSat Jul 11 08:34:09 2015 us=203705 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Sat Jul 11 08:34:09 2015 us=203847 [server] Peer Connection Initiated with [AF_INET]46.166.165.124:443

Sat Jul 11 08:34:11 2015 us=419486 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
W
RRWRWRSat Jul 11 08:34:11 2015 us=482325 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.190 255.255.0.0'
Sat Jul 11 08:34:11 2015 us=482692 OPTIONS IMPORT: timers and/or timeouts modified
Sat Jul 11 08:34:11 2015 us=482775 OPTIONS IMPORT: LZO parms modified
Sat Jul 11 08:34:11 2015 us=482818 OPTIONS IMPORT: --ifconfig/up options modified
Sat Jul 11 08:34:11 2015 us=482859 OPTIONS IMPORT: route options modified
Sat Jul 11 08:34:11 2015 us=482897 OPTIONS IMPORT: route-related options modified
Sat Jul 11 08:34:11 2015 us=482936 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Jul 11 08:34:11 2015 us=483718 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=eth0 HWADDR=00:1e:a0:00:66:a2
Sat Jul 11 08:34:11 2015 us=492838 TUN/TAP device tun1 opened
Sat Jul 11 08:34:11 2015 us=493009 TUN/TAP TX queue length set to 100
Sat Jul 11 08:34:11 2015 us=493193 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Jul 11 08:34:11 2015 us=493476 /sbin/ifconfig tun1 10.4.0.190 netmask 255.255.0.0 mtu 1500 broadcast 10.4.255.255
W
Sat Jul 11 08:34:16 2015 us=624285 /sbin/route add -net 46.166.165.124 netmask 255.255.255.255 gw 192.168.0.1

route: SIOCADDRT: File exists
Sat Jul 11 08:34:16 2015 us=627894 ERROR: Linux route add command failed: external program exited with error status: 1
Sat Jul 11 08:34:16 2015 us=628209 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.0.1
route: SIOCADDRT: File exists
Sat Jul 11 08:34:16 2015 us=631938 ERROR: Linux route add command failed: external program exited with error status: 1
Sat Jul 11 08:34:16 2015 us=632207 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.0.1
route: SIOCADDRT: File exists
Sat Jul 11 08:34:16 2015 us=635810 ERROR: Linux route add command failed: external program exited with error status: 1

Sat Jul 11 08:34:16 2015 us=635987 Initialization Sequence Completed

RW
W
R
W
R
W
R
W
R
W
W
^H
W
W
W
Sat Jul 11 08:36:02 2015 us=246210 [server] Inactivity timeout (--ping-restart), restarting
Sat Jul 11 08:36:02 2015 us=246916 TCP/UDP: Closing socket
Sat Jul 11 08:36:02 2015 us=247102 SIGUSR1[soft,ping-restart] received, process restarting
Sat Jul 11 08:36:02 2015 us=247239 Restart pause, 2 second(s)

Sat Jul 11 08:36:04 2015 us=247455 Re-using SSL/TLS context
Sat Jul 11 08:36:04 2015 us=247617 LZO compression initialized
Sat Jul 11 08:36:04 2015 us=247911 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
Sat Jul 11 08:36:04 2015 us=248053 Socket Buffers: R=[196608->131072] S=[196608->131072]
Sat Jul 11 08:36:04 2015 us=248203 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
Sat Jul 11 08:36:04 2015 us=248378 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
Sat Jul 11 08:36:04 2015 us=248887 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
Sat Jul 11 08:36:04 2015 us=249038 Local Options hash (VER=V4): '9e7066d2'
Sat Jul 11 08:36:04 2015 us=249172 Expected Remote Options hash (VER=V4): '162b04de'
Sat Jul 11 08:36:04 2015 us=249280 UDPv4 link local: [undef]
Sat Jul 11 08:36:04 2015 us=249371 UDPv4 link remote: [AF_INET]46.166.165.124:443
W
RSat Jul 11 08:36:04 2015 us=308674 TLS: Initial packet from [AF_INET]46.166.165.124:443, sid=f168fbb9 39eeb967
WWWWRRSat Jul 11 08:36:04 2015 us=370562 PID_ERR replay-window backtrack occurred [1] [TLS_AUTH-0] [0_0] 1436600157:3 1436600157:2 t=1436600164[0] r=[0,64,15,1,1] sl=[61,3,64,272]
RWRWRWRWRWRW
RWRWRWRWRWRWRWRWRWRWRWRSat Jul 11 08:36:04 2015 us=643557 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sat Jul 11 08:36:04 2015 us=653981 Validating certificate key usage
Sat Jul 11 08:36:04 2015 us=654235 ++ Certificate has key usage 00a0, expects 00a0
Sat Jul 11 08:36:04 2015 us=654351 VERIFY KU OK
Sat Jul 11 08:36:04 2015 us=654483 Validating certificate extended key usage
Sat Jul 11 08:36:04 2015 us=654590 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Jul 11 08:36:04 2015 us=654690 VERIFY EKU OK
Sat Jul 11 08:36:04 2015 us=654782 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
WRWRW
RWRWRWRWRWRWRWRWRWRWRWRWRW
RWR
W
WWWRWRWRWRWRWRWRWRWRWRWRWRWRW
RWRWRWRWRWRWRWRWRWRW
RWRWRWRRRRWWWWRRRRWRWRSat Jul 11 08:36:10 2015 us=397078 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Jul 11 08:36:10 2015 us=397290 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Jul 11 08:36:10 2015 us=397421 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Jul 11 08:36:10 2015 us=397554 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
WSat Jul 11 08:36:10 2015 us=397876 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Sat Jul 11 08:36:10 2015 us=398084 [server] Peer Connection Initiated with [AF_INET]46.166.165.124:443

Sat Jul 11 08:36:12 2015 us=524381 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
W
RRWRWRSat Jul 11 08:36:12 2015 us=583830 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.190 255.255.0.0'
Sat Jul 11 08:36:12 2015 us=584173 OPTIONS IMPORT: timers and/or timeouts modified
Sat Jul 11 08:36:12 2015 us=584258 OPTIONS IMPORT: LZO parms modified
Sat Jul 11 08:36:12 2015 us=584301 OPTIONS IMPORT: --ifconfig/up options modified
Sat Jul 11 08:36:12 2015 us=584342 OPTIONS IMPORT: route options modified
Sat Jul 11 08:36:12 2015 us=584383 OPTIONS IMPORT: route-related options modified
Sat Jul 11 08:36:12 2015 us=584423 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Jul 11 08:36:12 2015 us=584467 Preserving previous TUN/TAP instance: tun1
Sat Jul 11 08:36:12 2015 us=584511 Initialization Sequence Completed
W
RW
RW
RW

As you can see I still get that error. But it seems to be connecting? :?

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Sat Jul 11, 2015 7:53 am

I did notice when it was changed to verb 5 the connection kept resetting every 1.5 mins

User avatar
maikcat
Forum Team
Posts: 4200
Joined: Wed Jan 12, 2011 9:23 am
Location: Athens,Greece
Contact:

Re: Openvpn & Airvpn

Post by maikcat » Sun Jul 12, 2015 3:01 pm

with openvpn stopped can you post the output of:

netstat -nr

Michael.

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Fri Jul 17, 2015 8:21 am

Apologies, I will get round to this today. Just been very busy, work etc

will post later

NUFC12
OpenVpn Newbie
Posts: 11
Joined: Tue Jul 07, 2015 11:23 am

Re: Openvpn & Airvpn

Post by NUFC12 » Fri Jul 24, 2015 5:26 am

Sorry this took so long.
This is the output:

n
e
t
s
t
a
t

-
n
r


Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
0.0.0.0 192.168.0.1 0.0.0.0 UG 0 0 0 eth0
192.168.0.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
root@xpeedlx3:~# [6n

Post Reply