It definitely works with both sides using the latest release 2.4. I run server on raspberry pi and clinet on mac OS.
Sun Jan 15 16:48:51 2017 us=6658 MULTI: multi_create_instance called
Sun Jan 15 16:48:51 2017 us=7112 81.109.233.126:56296 Re-using SSL/TLS context
Sun Jan 15 16:48:51 2017 us=7227 81.109.233.126:56296 LZ4 compression initializing
Sun Jan 15 16:48:51 2017 us=8148 81.109.233.126:56296 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Jan 15 16:48:51 2017 us=8263 81.109.233.126:56296 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sun Jan 15 16:48:51 2017 us=8459 81.109.233.126:56296 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
Sun Jan 15 16:48:51 2017 us=8532 81.109.233.126:56296 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
Sun Jan 15 16:48:51 2017 us=8749 81.109.233.126:56296 TLS: Initial packet from [AF_INET]81.109.233.126:56296, sid=d27a8897 0d6387be
Sun Jan 15 16:48:51 2017 us=468990 81.109.233.126:56296 VERIFY OK: depth=1, C=US, ST=California, L=San Francisco, O=Copyleft Certificate Co, OU=My Organizational Unit, CN=EasyRSA-DB, emailAddress=
me@example.net
Sun Jan 15 16:48:51 2017 us=469681 81.109.233.126:56296 Validating certificate extended key usage
Sun Jan 15 16:48:51 2017 us=469742 81.109.233.126:56296 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Sun Jan 15 16:48:51 2017 us=469786 81.109.233.126:56296 VERIFY EKU OK
Sun Jan 15 16:48:51 2017 us=469830 81.109.233.126:56296 VERIFY OK: depth=0, C=US, ST=California, L=San Francisco, O=Copyleft Certificate Co, OU=My Organizational Unit, CN=clientname1, emailAddress=
me@example.net
Sun Jan 15 16:48:51 2017 us=675132 81.109.233.126:56296 peer info: IV_VER=2.4.0
Sun Jan 15 16:48:51 2017 us=675253 81.109.233.126:56296 peer info: IV_PLAT=mac
Sun Jan 15 16:48:51 2017 us=675306 81.109.233.126:56296 peer info: IV_PROTO=2
Sun Jan 15 16:48:51 2017 us=675354 81.109.233.126:56296 peer info: IV_NCP=2
Sun Jan 15 16:48:51 2017 us=675400 81.109.233.126:56296 peer info: IV_LZ4=1
Sun Jan 15 16:48:51 2017 us=675447 81.109.233.126:56296 peer info: IV_LZ4v2=1
Sun Jan 15 16:48:51 2017 us=675494 81.109.233.126:56296 peer info: IV_LZO=1
Sun Jan 15 16:48:51 2017 us=675540 81.109.233.126:56296 peer info: IV_COMP_STUB=1
Sun Jan 15 16:48:51 2017 us=675588 81.109.233.126:56296 peer info: IV_COMP_STUBv2=1
Sun Jan 15 16:48:51 2017 us=675634 81.109.233.126:56296 peer info: IV_TCPNL=1
Sun Jan 15 16:48:51 2017 us=683883 81.109.233.126:56296 Control Channel: TLSv1.2, cipher TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384, 521 bit key
Sun Jan 15 16:48:51 2017 us=684043 81.109.233.126:56296 [clientname1] Peer Connection Initiated with [AF_INET]81.109.233.126:56296
Sun Jan 15 16:48:51 2017 us=684179 clientname1/81.109.233.126:56296 MULTI_sva: pool returned IPv4=10.88.90.6, IPv6=(Not enabled)
Sun Jan 15 16:48:51 2017 us=684414 clientname1/81.109.233.126:56296 MULTI: Learn: 10.88.90.6 -> clientname1/81.109.233.126:56296
Sun Jan 15 16:48:51 2017 us=684477 clientname1/81.109.233.126:56296 MULTI: primary virtual IP for clientname1/81.109.233.126:56296: 10.88.90.6
Sun Jan 15 16:48:52 2017 us=780141 clientname1/81.109.233.126:56296 PUSH: Received control message: 'PUSH_REQUEST'
Sun Jan 15 16:48:52 2017 us=780528 clientname1/81.109.233.126:56296 SENT CONTROL [clientname1]: 'PUSH_REPLY,route 10.88.90.1 255.255.255.255,route 10.88.90.0 255.255.255.0,dhcp-option DNS 84.200.69.80,dhcp-option DNS 84.200.70.40,redirect-gateway def1 bypass-dhcp,block-ipv6,route 10.88.90.1,topology net30,ping 10,ping-restart 120,ifconfig 10.88.90.6 10.88.90.5,peer-id 0,cipher AES-256-GCM' (status=1)
Sun Jan 15 16:48:52 2017 us=780615 clientname1/81.109.233.126:56296 Data Channel MTU parms [ L:1550 D:1450 EF:50 EB:406 ET:0 EL:3 ]
Sun Jan 15 16:48:52 2017 us=781283 clientname1/81.109.233.126:56296 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Jan 15 16:48:52 2017 us=781345 clientname1/81.109.233.126:56296 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key