openvpn Client is not recognized by openvpn server
Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech
Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
-
- OpenVPN User
- Posts: 29
- Joined: Tue Jul 10, 2018 1:31 pm
openvpn Client is not recognized by openvpn server
Hi,
my client having IP 91.252.181.51 is not recognized by the server but in server logs I can found it,
so the problem seems to be that it is not recognized, can you help me to understand where is the problem from this log with error level = 7?
Thanks,
Antonio
root@solergycloud:~# cat /etc/openvpn/openvpn.log | grep 91.252.248.238
Fri Jul 13 13:35:24 2018 us=900847 91.252.248.238:6529 Re-using SSL/TLS context
Fri Jul 13 13:35:24 2018 us=900881 91.252.248.238:6529 LZO compression initialized
Fri Jul 13 13:35:24 2018 us=900892 91.252.248.238:6529 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:24 2018 us=900914 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900975 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900984 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901008 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901019 91.252.248.238:6529 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:24 2018 us=901025 91.252.248.238:6529 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:24 2018 us=901031 91.252.248.238:6529 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:24 2018 us=901065 91.252.248.238:6529 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:24 2018 us=901071 91.252.248.238:6529 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:24 2018 us=901083 91.252.248.238:6529 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:24 2018 us=901092 91.252.248.238:6529 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:24 2018 us=901103 91.252.248.238:6529 SENT PING
Fri Jul 13 13:35:24 2018 us=901116 91.252.248.238:6529 GET INST BY REAL: 91.252.248.238:6529 [created]
Fri Jul 13 13:35:24 2018 us=901128 91.252.248.238:6529 UDPv4 READ [14] from [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=901137 91.252.248.238:6529 TLS: Initial packet from [AF_INET]91.252.248.238:6529, sid=52ac7ce3 b1260378
Fri Jul 13 13:35:24 2018 us=901159 91.252.248.238:6529 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=998920 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998933 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:24 2018 us=998973 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998984 91.252.248.238:6529 UDPv4 READ [114] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:24 2018 us=999002 91.252.248.238:6529 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:24 2018 us=999041 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=999052 91.252.248.238:6529 UDPv4 READ [86] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:25 2018 us=16308 91.252.248.238:6529 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:25 2018 us=16455 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:25 2018 us=16524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:25 2018 us=16573 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:25 2018 us=16652 91.252.248.238:6529 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:25 2018 us=123354 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123399 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:25 2018 us=123440 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:25 2018 us=123485 91.252.248.238:6529 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:25 2018 us=123501 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123509 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:25 2018 us=123524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:25 2018 us=123546 91.252.248.238:6529 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:25 2018 us=123567 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123575 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:25 2018 us=123588 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:25 2018 us=123606 91.252.248.238:6529 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:25 2018 us=123636 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123647 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:25 2018 us=123663 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:25 2018 us=123683 91.252.248.238:6529 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:25 2018 us=219499 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219544 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:25 2018 us=219584 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:25 2018 us=219632 91.252.248.238:6529 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:25 2018 us=219655 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219668 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:25 2018 us=219691 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:25 2018 us=219740 91.252.248.238:6529 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:25 2018 us=219790 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219816 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:25 2018 us=219845 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:25 2018 us=219890 91.252.248.238:6529 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:25 2018 us=219906 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219915 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:25 2018 us=219929 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:25 2018 us=219957 91.252.248.238:6529 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:25 2018 us=321725 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=321813 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:25 2018 us=321877 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:25 2018 us=321953 91.252.248.238:6529 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:25 2018 us=321997 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322016 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:25 2018 us=322046 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:25 2018 us=322098 91.252.248.238:6529 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:25 2018 us=322117 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322125 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:25 2018 us=322141 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:25 2018 us=322164 91.252.248.238:6529 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:25 2018 us=322187 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322196 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:25 2018 us=322211 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:25 2018 us=322248 91.252.248.238:6529 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:25 2018 us=431040 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431087 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:25 2018 us=431128 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:25 2018 us=431196 91.252.248.238:6529 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:25 2018 us=431215 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431224 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:25 2018 us=431238 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:25 2018 us=431284 91.252.248.238:6529 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:25 2018 us=431304 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431317 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:25 2018 us=431338 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:25 2018 us=431380 91.252.248.238:6529 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:25 2018 us=431398 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431410 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:25 2018 us=431430 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:25 2018 us=431459 91.252.248.238:6529 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:25 2018 us=544352 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544396 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:25 2018 us=544437 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:25 2018 us=544510 91.252.248.238:6529 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:25 2018 us=544528 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544537 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:25 2018 us=544562 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:25 2018 us=544586 91.252.248.238:6529 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:25 2018 us=544609 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544617 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:25 2018 us=544631 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:25 2018 us=544655 91.252.248.238:6529 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:25 2018 us=544668 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544675 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:25 2018 us=544688 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:25 2018 us=544711 91.252.248.238:6529 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:25 2018 us=643686 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=643731 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:25 2018 us=643771 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:25 2018 us=643808 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=21068 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:27 2018 us=21198 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=665700 91.252.248.238:6400 Re-using SSL/TLS context
Fri Jul 13 13:35:27 2018 us=665722 91.252.248.238:6400 LZO compression initialized
Fri Jul 13 13:35:27 2018 us=665729 91.252.248.238:6400 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:27 2018 us=665741 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665821 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665841 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665867 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665877 91.252.248.238:6400 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:27 2018 us=665883 91.252.248.238:6400 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:27 2018 us=665889 91.252.248.238:6400 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:27 2018 us=665913 91.252.248.238:6400 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:27 2018 us=665918 91.252.248.238:6400 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:27 2018 us=665929 91.252.248.238:6400 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:27 2018 us=665938 91.252.248.238:6400 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:27 2018 us=665946 91.252.248.238:6400 SENT PING
Fri Jul 13 13:35:27 2018 us=665961 91.252.248.238:6400 GET INST BY REAL: 91.252.248.238:6400 [created]
Fri Jul 13 13:35:27 2018 us=665980 91.252.248.238:6400 UDPv4 READ [14] from [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=665994 91.252.248.238:6400 TLS: Initial packet from [AF_INET]91.252.248.238:6400, sid=df839f45 a0572e21
Fri Jul 13 13:35:27 2018 us=666021 91.252.248.238:6400 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=818995 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819052 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:27 2018 us=819376 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819403 91.252.248.238:6400 UDPv4 READ [114] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=819443 91.252.248.238:6400 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=819518 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819534 91.252.248.238:6400 UDPv4 READ [86] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:27 2018 us=826699 91.252.248.238:6400 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=826855 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:27 2018 us=826907 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:27 2018 us=826946 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:27 2018 us=826976 91.252.248.238:6400 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:27 2018 us=937108 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937173 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=937246 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:27 2018 us=937288 91.252.248.238:6400 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:27 2018 us=937316 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937325 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:27 2018 us=937343 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:27 2018 us=937390 91.252.248.238:6400 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:27 2018 us=937407 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937415 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:27 2018 us=937431 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:27 2018 us=937460 91.252.248.238:6400 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:27 2018 us=937474 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937483 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:27 2018 us=937500 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:27 2018 us=937543 91.252.248.238:6400 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:28 2018 us=26102 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=26248 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=56282 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56344 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:28 2018 us=56404 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:28 2018 us=56541 91.252.248.238:6400 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:28 2018 us=56568 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56585 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:28 2018 us=56611 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:28 2018 us=56662 91.252.248.238:6400 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:28 2018 us=56684 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56698 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:28 2018 us=56724 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:28 2018 us=56770 91.252.248.238:6400 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:28 2018 us=56792 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:28 2018 us=56831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:28 2018 us=56874 91.252.248.238:6400 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:28 2018 us=177436 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177506 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:28 2018 us=177561 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:28 2018 us=177629 91.252.248.238:6400 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:28 2018 us=177656 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177668 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:28 2018 us=177692 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:28 2018 us=177741 91.252.248.238:6400 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:28 2018 us=177793 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:28 2018 us=177831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:28 2018 us=177865 91.252.248.238:6400 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:28 2018 us=177878 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177885 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:28 2018 us=177898 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:28 2018 us=177932 91.252.248.238:6400 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:28 2018 us=294882 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=294930 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:28 2018 us=294982 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:28 2018 us=295052 91.252.248.238:6400 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:28 2018 us=295076 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295090 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:28 2018 us=295113 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:28 2018 us=295157 91.252.248.238:6400 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:28 2018 us=295173 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295181 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:28 2018 us=295205 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:28 2018 us=295245 91.252.248.238:6400 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:28 2018 us=295275 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295288 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:28 2018 us=295309 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:28 2018 us=295346 91.252.248.238:6400 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:28 2018 us=404207 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404337 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:28 2018 us=404396 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:28 2018 us=404447 91.252.248.238:6400 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:28 2018 us=404486 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404501 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:28 2018 us=404526 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=404574 91.252.248.238:6400 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:28 2018 us=417715 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417801 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:28 2018 us=417851 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:28 2018 us=417891 91.252.248.238:6400 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:28 2018 us=417922 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417936 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:28 2018 us=417962 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:28 2018 us=418000 91.252.248.238:6400 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:28 2018 us=533390 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=533451 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:28 2018 us=533507 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:28 2018 us=533576 91.252.248.238:6400 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=945522 91.252.248.238:6722 Re-using SSL/TLS context
Fri Jul 13 13:35:28 2018 us=945544 91.252.248.238:6722 LZO compression initialized
Fri Jul 13 13:35:28 2018 us=945551 91.252.248.238:6722 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:28 2018 us=945563 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945614 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945628 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945663 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945678 91.252.248.238:6722 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:28 2018 us=945686 91.252.248.238:6722 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:28 2018 us=945697 91.252.248.238:6722 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:28 2018 us=945729 91.252.248.238:6722 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:28 2018 us=945740 91.252.248.238:6722 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:28 2018 us=945786 91.252.248.238:6722 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:28 2018 us=945801 91.252.248.238:6722 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:28 2018 us=945825 91.252.248.238:6722 SENT PING
Fri Jul 13 13:35:28 2018 us=945843 91.252.248.238:6722 GET INST BY REAL: 91.252.248.238:6722 [created]
Fri Jul 13 13:35:28 2018 us=945967 91.252.248.238:6722 UDPv4 READ [14] from [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:28 2018 us=945991 91.252.248.238:6722 TLS: Initial packet from [AF_INET]91.252.248.238:6722, sid=eb02a63d a1b1755a
Fri Jul 13 13:35:28 2018 us=946021 91.252.248.238:6722 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:29 2018 us=44386 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:29 2018 us=44509 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:29 2018 us=45236 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45255 91.252.248.238:6722 UDPv4 READ [22] from [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:29 2018 us=45278 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45288 91.252.248.238:6722 UDPv4 READ [114] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=45305 91.252.248.238:6722 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:29 2018 us=55366 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=55426 91.252.248.238:6722 UDPv4 READ [86] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:29 2018 us=63990 91.252.248.238:6722 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=64141 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:29 2018 us=64202 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:29 2018 us=64240 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
my client having IP 91.252.181.51 is not recognized by the server but in server logs I can found it,
so the problem seems to be that it is not recognized, can you help me to understand where is the problem from this log with error level = 7?
Thanks,
Antonio
root@solergycloud:~# cat /etc/openvpn/openvpn.log | grep 91.252.248.238
Fri Jul 13 13:35:24 2018 us=900847 91.252.248.238:6529 Re-using SSL/TLS context
Fri Jul 13 13:35:24 2018 us=900881 91.252.248.238:6529 LZO compression initialized
Fri Jul 13 13:35:24 2018 us=900892 91.252.248.238:6529 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:24 2018 us=900914 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900975 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900984 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901008 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901019 91.252.248.238:6529 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:24 2018 us=901025 91.252.248.238:6529 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:24 2018 us=901031 91.252.248.238:6529 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:24 2018 us=901065 91.252.248.238:6529 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:24 2018 us=901071 91.252.248.238:6529 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:24 2018 us=901083 91.252.248.238:6529 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:24 2018 us=901092 91.252.248.238:6529 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:24 2018 us=901103 91.252.248.238:6529 SENT PING
Fri Jul 13 13:35:24 2018 us=901116 91.252.248.238:6529 GET INST BY REAL: 91.252.248.238:6529 [created]
Fri Jul 13 13:35:24 2018 us=901128 91.252.248.238:6529 UDPv4 READ [14] from [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=901137 91.252.248.238:6529 TLS: Initial packet from [AF_INET]91.252.248.238:6529, sid=52ac7ce3 b1260378
Fri Jul 13 13:35:24 2018 us=901159 91.252.248.238:6529 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=998920 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998933 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:24 2018 us=998973 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998984 91.252.248.238:6529 UDPv4 READ [114] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:24 2018 us=999002 91.252.248.238:6529 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:24 2018 us=999041 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=999052 91.252.248.238:6529 UDPv4 READ [86] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:25 2018 us=16308 91.252.248.238:6529 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:25 2018 us=16455 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:25 2018 us=16524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:25 2018 us=16573 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:25 2018 us=16652 91.252.248.238:6529 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:25 2018 us=123354 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123399 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:25 2018 us=123440 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:25 2018 us=123485 91.252.248.238:6529 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:25 2018 us=123501 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123509 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:25 2018 us=123524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:25 2018 us=123546 91.252.248.238:6529 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:25 2018 us=123567 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123575 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:25 2018 us=123588 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:25 2018 us=123606 91.252.248.238:6529 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:25 2018 us=123636 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123647 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:25 2018 us=123663 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:25 2018 us=123683 91.252.248.238:6529 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:25 2018 us=219499 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219544 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:25 2018 us=219584 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:25 2018 us=219632 91.252.248.238:6529 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:25 2018 us=219655 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219668 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:25 2018 us=219691 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:25 2018 us=219740 91.252.248.238:6529 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:25 2018 us=219790 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219816 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:25 2018 us=219845 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:25 2018 us=219890 91.252.248.238:6529 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:25 2018 us=219906 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219915 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:25 2018 us=219929 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:25 2018 us=219957 91.252.248.238:6529 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:25 2018 us=321725 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=321813 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:25 2018 us=321877 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:25 2018 us=321953 91.252.248.238:6529 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:25 2018 us=321997 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322016 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:25 2018 us=322046 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:25 2018 us=322098 91.252.248.238:6529 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:25 2018 us=322117 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322125 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:25 2018 us=322141 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:25 2018 us=322164 91.252.248.238:6529 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:25 2018 us=322187 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322196 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:25 2018 us=322211 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:25 2018 us=322248 91.252.248.238:6529 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:25 2018 us=431040 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431087 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:25 2018 us=431128 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:25 2018 us=431196 91.252.248.238:6529 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:25 2018 us=431215 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431224 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:25 2018 us=431238 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:25 2018 us=431284 91.252.248.238:6529 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:25 2018 us=431304 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431317 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:25 2018 us=431338 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:25 2018 us=431380 91.252.248.238:6529 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:25 2018 us=431398 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431410 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:25 2018 us=431430 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:25 2018 us=431459 91.252.248.238:6529 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:25 2018 us=544352 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544396 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:25 2018 us=544437 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:25 2018 us=544510 91.252.248.238:6529 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:25 2018 us=544528 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544537 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:25 2018 us=544562 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:25 2018 us=544586 91.252.248.238:6529 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:25 2018 us=544609 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544617 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:25 2018 us=544631 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:25 2018 us=544655 91.252.248.238:6529 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:25 2018 us=544668 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544675 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:25 2018 us=544688 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:25 2018 us=544711 91.252.248.238:6529 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:25 2018 us=643686 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=643731 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:25 2018 us=643771 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:25 2018 us=643808 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=21068 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:27 2018 us=21198 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=665700 91.252.248.238:6400 Re-using SSL/TLS context
Fri Jul 13 13:35:27 2018 us=665722 91.252.248.238:6400 LZO compression initialized
Fri Jul 13 13:35:27 2018 us=665729 91.252.248.238:6400 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:27 2018 us=665741 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665821 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665841 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665867 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665877 91.252.248.238:6400 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:27 2018 us=665883 91.252.248.238:6400 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:27 2018 us=665889 91.252.248.238:6400 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:27 2018 us=665913 91.252.248.238:6400 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:27 2018 us=665918 91.252.248.238:6400 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:27 2018 us=665929 91.252.248.238:6400 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:27 2018 us=665938 91.252.248.238:6400 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:27 2018 us=665946 91.252.248.238:6400 SENT PING
Fri Jul 13 13:35:27 2018 us=665961 91.252.248.238:6400 GET INST BY REAL: 91.252.248.238:6400 [created]
Fri Jul 13 13:35:27 2018 us=665980 91.252.248.238:6400 UDPv4 READ [14] from [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=665994 91.252.248.238:6400 TLS: Initial packet from [AF_INET]91.252.248.238:6400, sid=df839f45 a0572e21
Fri Jul 13 13:35:27 2018 us=666021 91.252.248.238:6400 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=818995 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819052 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:27 2018 us=819376 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819403 91.252.248.238:6400 UDPv4 READ [114] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=819443 91.252.248.238:6400 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=819518 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819534 91.252.248.238:6400 UDPv4 READ [86] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:27 2018 us=826699 91.252.248.238:6400 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=826855 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:27 2018 us=826907 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:27 2018 us=826946 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:27 2018 us=826976 91.252.248.238:6400 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:27 2018 us=937108 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937173 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=937246 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:27 2018 us=937288 91.252.248.238:6400 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:27 2018 us=937316 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937325 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:27 2018 us=937343 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:27 2018 us=937390 91.252.248.238:6400 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:27 2018 us=937407 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937415 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:27 2018 us=937431 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:27 2018 us=937460 91.252.248.238:6400 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:27 2018 us=937474 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937483 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:27 2018 us=937500 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:27 2018 us=937543 91.252.248.238:6400 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:28 2018 us=26102 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=26248 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=56282 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56344 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:28 2018 us=56404 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:28 2018 us=56541 91.252.248.238:6400 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:28 2018 us=56568 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56585 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:28 2018 us=56611 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:28 2018 us=56662 91.252.248.238:6400 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:28 2018 us=56684 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56698 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:28 2018 us=56724 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:28 2018 us=56770 91.252.248.238:6400 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:28 2018 us=56792 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:28 2018 us=56831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:28 2018 us=56874 91.252.248.238:6400 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:28 2018 us=177436 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177506 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:28 2018 us=177561 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:28 2018 us=177629 91.252.248.238:6400 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:28 2018 us=177656 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177668 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:28 2018 us=177692 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:28 2018 us=177741 91.252.248.238:6400 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:28 2018 us=177793 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:28 2018 us=177831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:28 2018 us=177865 91.252.248.238:6400 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:28 2018 us=177878 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177885 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:28 2018 us=177898 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:28 2018 us=177932 91.252.248.238:6400 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:28 2018 us=294882 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=294930 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:28 2018 us=294982 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:28 2018 us=295052 91.252.248.238:6400 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:28 2018 us=295076 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295090 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:28 2018 us=295113 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:28 2018 us=295157 91.252.248.238:6400 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:28 2018 us=295173 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295181 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:28 2018 us=295205 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:28 2018 us=295245 91.252.248.238:6400 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:28 2018 us=295275 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295288 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:28 2018 us=295309 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:28 2018 us=295346 91.252.248.238:6400 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:28 2018 us=404207 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404337 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:28 2018 us=404396 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:28 2018 us=404447 91.252.248.238:6400 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:28 2018 us=404486 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404501 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:28 2018 us=404526 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=404574 91.252.248.238:6400 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:28 2018 us=417715 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417801 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:28 2018 us=417851 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:28 2018 us=417891 91.252.248.238:6400 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:28 2018 us=417922 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417936 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:28 2018 us=417962 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:28 2018 us=418000 91.252.248.238:6400 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:28 2018 us=533390 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=533451 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:28 2018 us=533507 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:28 2018 us=533576 91.252.248.238:6400 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=945522 91.252.248.238:6722 Re-using SSL/TLS context
Fri Jul 13 13:35:28 2018 us=945544 91.252.248.238:6722 LZO compression initialized
Fri Jul 13 13:35:28 2018 us=945551 91.252.248.238:6722 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:28 2018 us=945563 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945614 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945628 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945663 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945678 91.252.248.238:6722 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:28 2018 us=945686 91.252.248.238:6722 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:28 2018 us=945697 91.252.248.238:6722 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:28 2018 us=945729 91.252.248.238:6722 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:28 2018 us=945740 91.252.248.238:6722 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:28 2018 us=945786 91.252.248.238:6722 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:28 2018 us=945801 91.252.248.238:6722 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:28 2018 us=945825 91.252.248.238:6722 SENT PING
Fri Jul 13 13:35:28 2018 us=945843 91.252.248.238:6722 GET INST BY REAL: 91.252.248.238:6722 [created]
Fri Jul 13 13:35:28 2018 us=945967 91.252.248.238:6722 UDPv4 READ [14] from [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:28 2018 us=945991 91.252.248.238:6722 TLS: Initial packet from [AF_INET]91.252.248.238:6722, sid=eb02a63d a1b1755a
Fri Jul 13 13:35:28 2018 us=946021 91.252.248.238:6722 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:29 2018 us=44386 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:29 2018 us=44509 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:29 2018 us=45236 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45255 91.252.248.238:6722 UDPv4 READ [22] from [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:29 2018 us=45278 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45288 91.252.248.238:6722 UDPv4 READ [114] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=45305 91.252.248.238:6722 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:29 2018 us=55366 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=55426 91.252.248.238:6722 UDPv4 READ [86] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:29 2018 us=63990 91.252.248.238:6722 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=64141 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:29 2018 us=64202 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:29 2018 us=64240 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
-
- OpenVPN Protagonist
- Posts: 11137
- Joined: Fri Jun 03, 2016 1:17 pm
-
- OpenVPN User
- Posts: 29
- Joined: Tue Jul 10, 2018 1:31 pm
Re: openvpn Client is not recognized by openvpn server
Hy,
the server is on Ubuntu 14 while the client is on openWRT with "Maestro router E220" but it is not possible to take a look at the configuration file because it is 400km away from me and I've no openvpn connection to it.
this is the server startup log:
Fri Jul 13 13:29:09 2018 us=299223 Current Parameter Settings:
Fri Jul 13 13:29:09 2018 us=299267 config = '/etc/openvpn/server.conf'
Fri Jul 13 13:29:09 2018 us=299274 mode = 1
Fri Jul 13 13:29:09 2018 us=299278 persist_config = DISABLED
Fri Jul 13 13:29:09 2018 us=299282 persist_mode = 1
Fri Jul 13 13:29:09 2018 us=299286 show_ciphers = DISABLED
Fri Jul 13 13:29:09 2018 us=299289 show_digests = DISABLED
Fri Jul 13 13:29:09 2018 us=299293 show_engines = DISABLED
Fri Jul 13 13:29:09 2018 us=299296 genkey = DISABLED
Fri Jul 13 13:29:09 2018 us=299300 key_pass_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299303 show_tls_ciphers = DISABLED
Fri Jul 13 13:29:09 2018 us=299312 Connection profiles [default]:
Fri Jul 13 13:29:09 2018 us=299317 proto = udp
Fri Jul 13 13:29:09 2018 us=299321 local = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299325 local_port = 1194
Fri Jul 13 13:29:09 2018 us=299328 remote = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299332 remote_port = 1194
Fri Jul 13 13:29:09 2018 us=299335 remote_float = DISABLED
Fri Jul 13 13:29:09 2018 us=299339 bind_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299342 bind_local = ENABLED
Fri Jul 13 13:29:09 2018 us=299346 connect_retry_seconds = 5
Fri Jul 13 13:29:09 2018 us=299350 connect_timeout = 10
Fri Jul 13 13:29:09 2018 us=299353 connect_retry_max = 0
Fri Jul 13 13:29:09 2018 us=299357 socks_proxy_server = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299361 socks_proxy_port = 0
Fri Jul 13 13:29:09 2018 us=299364 socks_proxy_retry = DISABLED
Fri Jul 13 13:29:09 2018 us=299368 Connection profiles END
Fri Jul 13 13:29:09 2018 us=299372 remote_random = DISABLED
Fri Jul 13 13:29:09 2018 us=299375 ipchange = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299379 dev = 'tun'
Fri Jul 13 13:29:09 2018 us=299382 dev_type = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299386 dev_node = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299390 lladdr = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299394 topology = 1
Fri Jul 13 13:29:09 2018 us=299398 tun_ipv6 = DISABLED
Fri Jul 13 13:29:09 2018 us=299401 ifconfig_local = '10.8.0.1'
Fri Jul 13 13:29:09 2018 us=299405 ifconfig_remote_netmask = '10.8.0.2'
Fri Jul 13 13:29:09 2018 us=299408 ifconfig_noexec = DISABLED
Fri Jul 13 13:29:09 2018 us=299412 ifconfig_nowarn = DISABLED
Fri Jul 13 13:29:09 2018 us=299416 ifconfig_ipv6_local = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299419 ifconfig_ipv6_netbits = 0
Fri Jul 13 13:29:09 2018 us=299423 ifconfig_ipv6_remote = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299426 shaper = 0
Fri Jul 13 13:29:09 2018 us=299430 tun_mtu = 1500
Fri Jul 13 13:29:09 2018 us=299434 tun_mtu_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=299437 link_mtu = 1500
Fri Jul 13 13:29:09 2018 us=299441 link_mtu_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299444 tun_mtu_extra = 0
Fri Jul 13 13:29:09 2018 us=299448 tun_mtu_extra_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299451 fragment = 0
Fri Jul 13 13:29:09 2018 us=299455 mtu_discover_type = -1
Fri Jul 13 13:29:09 2018 us=299458 mtu_test = 0
Fri Jul 13 13:29:09 2018 us=299462 mlock = DISABLED
Fri Jul 13 13:29:09 2018 us=299466 keepalive_ping = 10
Fri Jul 13 13:29:09 2018 us=299469 keepalive_timeout = 120
Fri Jul 13 13:29:09 2018 us=299473 inactivity_timeout = 0
Fri Jul 13 13:29:09 2018 us=299476 ping_send_timeout = 10
Fri Jul 13 13:29:09 2018 us=299480 ping_rec_timeout = 240
Fri Jul 13 13:29:09 2018 us=299486 ping_rec_timeout_action = 2
Fri Jul 13 13:29:09 2018 us=299490 ping_timer_remote = DISABLED
Fri Jul 13 13:29:09 2018 us=299494 remap_sigusr1 = 0
Fri Jul 13 13:29:09 2018 us=299497 explicit_exit_notification = 0
Fri Jul 13 13:29:09 2018 us=299504 persist_tun = ENABLED
Fri Jul 13 13:29:09 2018 us=299508 persist_local_ip = DISABLED
Fri Jul 13 13:29:09 2018 us=299511 persist_remote_ip = DISABLED
Fri Jul 13 13:29:09 2018 us=299515 persist_key = ENABLED
Fri Jul 13 13:29:09 2018 us=299518 mssfix = 1450
Fri Jul 13 13:29:09 2018 us=299522 passtos = DISABLED
Fri Jul 13 13:29:09 2018 us=299525 resolve_retry_seconds = 1000000000
Fri Jul 13 13:29:09 2018 us=299531 username = 'nobody'
Fri Jul 13 13:29:09 2018 us=299535 groupname = 'nogroup'
Fri Jul 13 13:29:09 2018 us=299539 chroot_dir = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299542 cd_dir = '/etc/openvpn'
Fri Jul 13 13:29:09 2018 us=299546 writepid = '/var/run/openvpn.server.pid'
Fri Jul 13 13:29:09 2018 us=299550 up_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299553 down_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299557 down_pre = DISABLED
Fri Jul 13 13:29:09 2018 us=299560 up_restart = DISABLED
Fri Jul 13 13:29:09 2018 us=299564 up_delay = DISABLED
Fri Jul 13 13:29:09 2018 us=299567 daemon = ENABLED
Fri Jul 13 13:29:09 2018 us=299571 inetd = 0
Fri Jul 13 13:29:09 2018 us=299574 log = ENABLED
Fri Jul 13 13:29:09 2018 us=299578 suppress_timestamps = DISABLED
Fri Jul 13 13:29:09 2018 us=299581 nice = 0
Fri Jul 13 13:29:09 2018 us=299585 verbosity = 7
Fri Jul 13 13:29:09 2018 us=299588 mute = 0
Fri Jul 13 13:29:09 2018 us=299592 gremlin = 0
Fri Jul 13 13:29:09 2018 us=299595 status_file = 'openvpn-status.log'
Fri Jul 13 13:29:09 2018 us=299599 status_file_version = 1
Fri Jul 13 13:29:09 2018 us=299603 status_file_update_freq = 60
Fri Jul 13 13:29:09 2018 us=299606 occ = ENABLED
Fri Jul 13 13:29:09 2018 us=299610 rcvbuf = 65536
Fri Jul 13 13:29:09 2018 us=299613 sndbuf = 65536
Fri Jul 13 13:29:09 2018 us=299616 sockflags = 0
Fri Jul 13 13:29:09 2018 us=299620 fast_io = DISABLED
Fri Jul 13 13:29:09 2018 us=299624 lzo = 7
Fri Jul 13 13:29:09 2018 us=299627 route_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299631 route_default_gateway = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299634 route_default_metric = 0
Fri Jul 13 13:29:09 2018 us=299638 route_noexec = DISABLED
Fri Jul 13 13:29:09 2018 us=299642 route_delay = 0
Fri Jul 13 13:29:09 2018 us=299646 route_delay_window = 30
Fri Jul 13 13:29:09 2018 us=299649 route_delay_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299653 route_nopull = DISABLED
Fri Jul 13 13:29:09 2018 us=299657 route_gateway_via_dhcp = DISABLED
Fri Jul 13 13:29:09 2018 us=299660 max_routes = 100
Fri Jul 13 13:29:09 2018 us=299664 allow_pull_fqdn = DISABLED
Fri Jul 13 13:29:09 2018 us=299672 route 192.168.1.0/255.255.255.0/nil/nil
Fri Jul 13 13:29:09 2018 us=299676 route 192.168.2.0/255.255.255.0/nil/nil
Fri Jul 13 13:29:09 2018 us=299680 route 10.8.0.0/255.255.255.0/nil/nil
Fri Jul 13 13:29:09 2018 us=299684 management_addr = 'localhost'
Fri Jul 13 13:29:09 2018 us=299687 management_port = 7505
Fri Jul 13 13:29:09 2018 us=299691 management_user_pass = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299694 management_log_history_cache = 250
Fri Jul 13 13:29:09 2018 us=299698 management_echo_buffer_size = 100
Fri Jul 13 13:29:09 2018 us=299702 management_write_peer_info_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299705 management_client_user = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299709 management_client_group = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299713 management_flags = 0
Fri Jul 13 13:29:09 2018 us=299716 shared_secret_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299720 key_direction = 0
Fri Jul 13 13:29:09 2018 us=299724 ciphername_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=299728 ciphername = 'BF-CBC'
Fri Jul 13 13:29:09 2018 us=299734 authname_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=299740 authname = 'SHA1'
Fri Jul 13 13:29:09 2018 us=299746 prng_hash = 'SHA1'
Fri Jul 13 13:29:09 2018 us=299752 prng_nonce_secret_len = 16
Fri Jul 13 13:29:09 2018 us=299758 keysize = 0
Fri Jul 13 13:29:09 2018 us=299764 engine = DISABLED
Fri Jul 13 13:29:09 2018 us=299769 replay = ENABLED
Fri Jul 13 13:29:09 2018 us=299775 mute_replay_warnings = DISABLED
Fri Jul 13 13:29:09 2018 us=299781 replay_window = 64
Fri Jul 13 13:29:09 2018 us=299786 replay_time = 15
Fri Jul 13 13:29:09 2018 us=299793 packet_id_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299799 use_iv = ENABLED
Fri Jul 13 13:29:09 2018 us=299804 test_crypto = DISABLED
Fri Jul 13 13:29:09 2018 us=299814 tls_server = ENABLED
Fri Jul 13 13:29:09 2018 us=299821 tls_client = DISABLED
Fri Jul 13 13:29:09 2018 us=299826 key_method = 2
Fri Jul 13 13:29:09 2018 us=299833 ca_file = 'ca.crt'
Fri Jul 13 13:29:09 2018 us=299839 ca_path = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299844 dh_file = 'dh2048.pem'
Fri Jul 13 13:29:09 2018 us=299851 cert_file = 'server.crt'
Fri Jul 13 13:29:09 2018 us=299856 priv_key_file = 'server.key'
Fri Jul 13 13:29:09 2018 us=299860 pkcs12_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299863 cipher_list = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299867 tls_verify = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299871 tls_export_cert = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299874 tls_remote = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299878 crl_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299881 ns_cert_type = 0
Fri Jul 13 13:29:09 2018 us=299885 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299888 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299892 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299895 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299899 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299902 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299906 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299910 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299913 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299917 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299920 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299924 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299927 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299930 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299934 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299937 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299940 remote_cert_eku = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299944 tls_timeout = 2
Fri Jul 13 13:29:09 2018 us=299948 renegotiate_bytes = 0
Fri Jul 13 13:29:09 2018 us=299951 renegotiate_packets = 0
Fri Jul 13 13:29:09 2018 us=299955 renegotiate_seconds = 3600
Fri Jul 13 13:29:09 2018 us=299958 handshake_window = 60
Fri Jul 13 13:29:09 2018 us=299961 transition_window = 3600
Fri Jul 13 13:29:09 2018 us=299965 single_session = DISABLED
Fri Jul 13 13:29:09 2018 us=299969 push_peer_info = DISABLED
Fri Jul 13 13:29:09 2018 us=299972 tls_exit = DISABLED
Fri Jul 13 13:29:09 2018 us=299976 tls_auth_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299980 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299983 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299987 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299991 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299994 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299998 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300001 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300005 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300008 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300012 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300018 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300022 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300025 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300029 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300032 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300036 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300040 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300044 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300047 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300051 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300054 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300061 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300064 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300068 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300071 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300075 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300078 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300082 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300085 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300089 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300092 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300096 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300099 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300103 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300106 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300110 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300113 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300117 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300120 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300124 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300127 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300131 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300134 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300138 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300141 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300145 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300148 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300152 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300155 pkcs11_pin_cache_period = -1
Fri Jul 13 13:29:09 2018 us=300159 pkcs11_id = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300162 pkcs11_id_management = DISABLED
Fri Jul 13 13:29:09 2018 us=300167 server_network = 10.8.0.0
Fri Jul 13 13:29:09 2018 us=300171 server_netmask = 255.255.255.0
Fri Jul 13 13:29:09 2018 us=300179 server_network_ipv6 = ::
Fri Jul 13 13:29:09 2018 us=300183 server_netbits_ipv6 = 0
Fri Jul 13 13:29:09 2018 us=300187 server_bridge_ip = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300191 server_bridge_netmask = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300195 server_bridge_pool_start = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300199 server_bridge_pool_end = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300203 push_entry = 'route 192.168.1.0 255.255.255.0'
Fri Jul 13 13:29:09 2018 us=300207 push_entry = 'route 192.168.2.0 255.255.255.0'
Fri Jul 13 13:29:09 2018 us=300211 push_entry = 'redirect-gateway def1 bypass-dhcp'
Fri Jul 13 13:29:09 2018 us=300215 push_entry = 'dhcp-option DNS 208.67.222.222'
Fri Jul 13 13:29:09 2018 us=300219 push_entry = 'dhcp-option DNS 208.67.220.220'
Fri Jul 13 13:29:09 2018 us=300223 push_entry = 'route 10.8.0.1'
Fri Jul 13 13:29:09 2018 us=300226 push_entry = 'topology net30'
Fri Jul 13 13:29:09 2018 us=300230 push_entry = 'ping 10'
Fri Jul 13 13:29:09 2018 us=300233 push_entry = 'ping-restart 120'
Fri Jul 13 13:29:09 2018 us=300237 ifconfig_pool_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=300241 ifconfig_pool_start = 10.8.0.4
Fri Jul 13 13:29:09 2018 us=300245 ifconfig_pool_end = 10.8.0.251
Fri Jul 13 13:29:09 2018 us=300249 ifconfig_pool_netmask = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300253 ifconfig_pool_persist_filename = 'ipp.txt'
Fri Jul 13 13:29:09 2018 us=300257 ifconfig_pool_persist_refresh_freq = 600
Fri Jul 13 13:29:09 2018 us=300260 ifconfig_ipv6_pool_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=300264 ifconfig_ipv6_pool_base = ::
Fri Jul 13 13:29:09 2018 us=300268 ifconfig_ipv6_pool_netbits = 0
Fri Jul 13 13:29:09 2018 us=300272 n_bcast_buf = 256
Fri Jul 13 13:29:09 2018 us=300275 tcp_queue_limit = 64
Fri Jul 13 13:29:09 2018 us=300279 real_hash_size = 256
Fri Jul 13 13:29:09 2018 us=300282 virtual_hash_size = 256
Fri Jul 13 13:29:09 2018 us=300288 client_connect_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300292 learn_address_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300296 client_disconnect_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300300 client_config_dir = '/etc/openvpn/ccd'
Fri Jul 13 13:29:09 2018 us=300303 ccd_exclusive = DISABLED
Fri Jul 13 13:29:09 2018 us=300307 tmp_dir = '/tmp'
Fri Jul 13 13:29:09 2018 us=300311 push_ifconfig_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=300315 push_ifconfig_local = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300319 push_ifconfig_remote_netmask = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300322 push_ifconfig_ipv6_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=300327 push_ifconfig_ipv6_local = ::/0
Fri Jul 13 13:29:09 2018 us=300330 push_ifconfig_ipv6_remote = ::
Fri Jul 13 13:29:09 2018 us=300334 enable_c2c = DISABLED
Fri Jul 13 13:29:09 2018 us=300338 duplicate_cn = DISABLED
Fri Jul 13 13:29:09 2018 us=300341 cf_max = 0
Fri Jul 13 13:29:09 2018 us=300345 cf_per = 0
Fri Jul 13 13:29:09 2018 us=300349 max_clients = 1024
Fri Jul 13 13:29:09 2018 us=300352 max_routes_per_client = 256
Fri Jul 13 13:29:09 2018 us=300356 auth_user_pass_verify_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300359 auth_user_pass_verify_script_via_file = DISABLED
Fri Jul 13 13:29:09 2018 us=300363 ssl_flags = 0
Fri Jul 13 13:29:09 2018 us=300367 port_share_host = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300370 port_share_port = 0
Fri Jul 13 13:29:09 2018 us=300374 client = DISABLED
Fri Jul 13 13:29:09 2018 us=300377 pull = DISABLED
Fri Jul 13 13:29:09 2018 us=300381 auth_user_pass_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300386 OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Fri Jul 13 13:29:09 2018 us=300647 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7505
Fri Jul 13 13:29:09 2018 us=300784 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=300795 GDG: route[2] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=300802 GDG: route[3] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=300816 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=300822 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Jul 13 13:29:09 2018 us=328696 Diffie-Hellman initialized with 2048 bit key
Fri Jul 13 13:29:09 2018 us=344182 PRNG init md=SHA1 size=36
Fri Jul 13 13:29:09 2018 us=344223 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:29:09 2018 us=344231 TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:29:09 2018 us=344236 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:29:09 2018 us=344257 Socket Buffers: R=[229376->131072] S=[229376->131072]
Fri Jul 13 13:29:09 2018 us=344317 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=344327 GDG: route[2] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=344333 GDG: route[3] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=344346 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=344384 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=344392 GDG: route[2] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=344398 GDG: route[3] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=344409 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=344417 ROUTE default_gateway=31.14.138.1
Fri Jul 13 13:29:09 2018 us=345048 TUN/TAP device tun0 opened
Fri Jul 13 13:29:09 2018 us=345069 TUN/TAP TX queue length set to 100
Fri Jul 13 13:29:09 2018 us=345092 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Jul 13 13:29:09 2018 us=345116 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Fri Jul 13 13:29:09 2018 us=346366 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=346386 GDG: route[2] 10.8.0.2/255.255.255.255/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=346399 GDG: route[3] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=346406 GDG: route[4] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=346420 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=346436 /sbin/route add -net 192.168.1.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 13:29:09 2018 us=348082 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=348103 GDG: route[2] 10.8.0.2/255.255.255.255/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=348111 GDG: route[3] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=348118 GDG: route[4] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=348124 GDG: route[5] 192.168.1.0/255.255.255.0/10.8.0.2 m=0
Fri Jul 13 13:29:09 2018 us=348137 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=348151 /sbin/route add -net 192.168.2.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 13:29:09 2018 us=359813 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=359838 GDG: route[2] 10.8.0.2/255.255.255.255/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=359846 GDG: route[3] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=359853 GDG: route[4] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=359859 GDG: route[5] 192.168.1.0/255.255.255.0/10.8.0.2 m=0
Fri Jul 13 13:29:09 2018 us=359865 GDG: route[6] 192.168.2.0/255.255.255.0/10.8.0.2 m=0
Fri Jul 13 13:29:09 2018 us=359879 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=359895 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 13:29:09 2018 us=360758 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:29:09 2018 us=362253 GID set to nogroup
Fri Jul 13 13:29:09 2018 us=362290 UID set to nobody
Fri Jul 13 13:29:09 2018 us=362307 UDPv4 link local (bound): [undef]
Fri Jul 13 13:29:09 2018 us=362313 UDPv4 link remote: [undef]
Fri Jul 13 13:29:09 2018 us=362332 MULTI: multi_init called, r=256 v=256
Fri Jul 13 13:29:09 2018 us=362381 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Fri Jul 13 13:29:09 2018 us=364095 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364125 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364132 ifconfig_pool_read(), in='client1,10.8.0.8', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364137 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364142 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.12', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364147 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364151 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.16', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364156 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364160 ifconfig_pool_read(), in='clientCorato,10.8.0.20', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364164 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364170 ifconfig_pool_read(), in='clientGenius,10.8.0.24', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364175 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364180 ifconfig_pool_read(), in='clientGenius,10.8.0.28', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364184 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364188 ifconfig_pool_read(), in='clientFormello,10.8.0.32', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364192 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364199 IFCONFIG POOL LIST
Fri Jul 13 13:29:09 2018 us=364205 client1,10.8.0.4
Fri Jul 13 13:29:09 2018 us=364210 client1,10.8.0.8
Fri Jul 13 13:29:09 2018 us=364214 clientTerlizzi,10.8.0.12
Fri Jul 13 13:29:09 2018 us=364219 clientTerlizzi,10.8.0.16
Fri Jul 13 13:29:09 2018 us=364223 clientCorato,10.8.0.20
Fri Jul 13 13:29:09 2018 us=364227 clientGenius,10.8.0.24
Fri Jul 13 13:29:09 2018 us=364231 clientGenius,10.8.0.28
Fri Jul 13 13:29:09 2018 us=364235 clientFormello,10.8.0.32
Fri Jul 13 13:29:09 2018 us=364274 Initialization Sequence Completed
the server is on Ubuntu 14 while the client is on openWRT with "Maestro router E220" but it is not possible to take a look at the configuration file because it is 400km away from me and I've no openvpn connection to it.
this is the server startup log:
Fri Jul 13 13:29:09 2018 us=299223 Current Parameter Settings:
Fri Jul 13 13:29:09 2018 us=299267 config = '/etc/openvpn/server.conf'
Fri Jul 13 13:29:09 2018 us=299274 mode = 1
Fri Jul 13 13:29:09 2018 us=299278 persist_config = DISABLED
Fri Jul 13 13:29:09 2018 us=299282 persist_mode = 1
Fri Jul 13 13:29:09 2018 us=299286 show_ciphers = DISABLED
Fri Jul 13 13:29:09 2018 us=299289 show_digests = DISABLED
Fri Jul 13 13:29:09 2018 us=299293 show_engines = DISABLED
Fri Jul 13 13:29:09 2018 us=299296 genkey = DISABLED
Fri Jul 13 13:29:09 2018 us=299300 key_pass_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299303 show_tls_ciphers = DISABLED
Fri Jul 13 13:29:09 2018 us=299312 Connection profiles [default]:
Fri Jul 13 13:29:09 2018 us=299317 proto = udp
Fri Jul 13 13:29:09 2018 us=299321 local = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299325 local_port = 1194
Fri Jul 13 13:29:09 2018 us=299328 remote = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299332 remote_port = 1194
Fri Jul 13 13:29:09 2018 us=299335 remote_float = DISABLED
Fri Jul 13 13:29:09 2018 us=299339 bind_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299342 bind_local = ENABLED
Fri Jul 13 13:29:09 2018 us=299346 connect_retry_seconds = 5
Fri Jul 13 13:29:09 2018 us=299350 connect_timeout = 10
Fri Jul 13 13:29:09 2018 us=299353 connect_retry_max = 0
Fri Jul 13 13:29:09 2018 us=299357 socks_proxy_server = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299361 socks_proxy_port = 0
Fri Jul 13 13:29:09 2018 us=299364 socks_proxy_retry = DISABLED
Fri Jul 13 13:29:09 2018 us=299368 Connection profiles END
Fri Jul 13 13:29:09 2018 us=299372 remote_random = DISABLED
Fri Jul 13 13:29:09 2018 us=299375 ipchange = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299379 dev = 'tun'
Fri Jul 13 13:29:09 2018 us=299382 dev_type = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299386 dev_node = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299390 lladdr = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299394 topology = 1
Fri Jul 13 13:29:09 2018 us=299398 tun_ipv6 = DISABLED
Fri Jul 13 13:29:09 2018 us=299401 ifconfig_local = '10.8.0.1'
Fri Jul 13 13:29:09 2018 us=299405 ifconfig_remote_netmask = '10.8.0.2'
Fri Jul 13 13:29:09 2018 us=299408 ifconfig_noexec = DISABLED
Fri Jul 13 13:29:09 2018 us=299412 ifconfig_nowarn = DISABLED
Fri Jul 13 13:29:09 2018 us=299416 ifconfig_ipv6_local = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299419 ifconfig_ipv6_netbits = 0
Fri Jul 13 13:29:09 2018 us=299423 ifconfig_ipv6_remote = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299426 shaper = 0
Fri Jul 13 13:29:09 2018 us=299430 tun_mtu = 1500
Fri Jul 13 13:29:09 2018 us=299434 tun_mtu_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=299437 link_mtu = 1500
Fri Jul 13 13:29:09 2018 us=299441 link_mtu_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299444 tun_mtu_extra = 0
Fri Jul 13 13:29:09 2018 us=299448 tun_mtu_extra_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299451 fragment = 0
Fri Jul 13 13:29:09 2018 us=299455 mtu_discover_type = -1
Fri Jul 13 13:29:09 2018 us=299458 mtu_test = 0
Fri Jul 13 13:29:09 2018 us=299462 mlock = DISABLED
Fri Jul 13 13:29:09 2018 us=299466 keepalive_ping = 10
Fri Jul 13 13:29:09 2018 us=299469 keepalive_timeout = 120
Fri Jul 13 13:29:09 2018 us=299473 inactivity_timeout = 0
Fri Jul 13 13:29:09 2018 us=299476 ping_send_timeout = 10
Fri Jul 13 13:29:09 2018 us=299480 ping_rec_timeout = 240
Fri Jul 13 13:29:09 2018 us=299486 ping_rec_timeout_action = 2
Fri Jul 13 13:29:09 2018 us=299490 ping_timer_remote = DISABLED
Fri Jul 13 13:29:09 2018 us=299494 remap_sigusr1 = 0
Fri Jul 13 13:29:09 2018 us=299497 explicit_exit_notification = 0
Fri Jul 13 13:29:09 2018 us=299504 persist_tun = ENABLED
Fri Jul 13 13:29:09 2018 us=299508 persist_local_ip = DISABLED
Fri Jul 13 13:29:09 2018 us=299511 persist_remote_ip = DISABLED
Fri Jul 13 13:29:09 2018 us=299515 persist_key = ENABLED
Fri Jul 13 13:29:09 2018 us=299518 mssfix = 1450
Fri Jul 13 13:29:09 2018 us=299522 passtos = DISABLED
Fri Jul 13 13:29:09 2018 us=299525 resolve_retry_seconds = 1000000000
Fri Jul 13 13:29:09 2018 us=299531 username = 'nobody'
Fri Jul 13 13:29:09 2018 us=299535 groupname = 'nogroup'
Fri Jul 13 13:29:09 2018 us=299539 chroot_dir = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299542 cd_dir = '/etc/openvpn'
Fri Jul 13 13:29:09 2018 us=299546 writepid = '/var/run/openvpn.server.pid'
Fri Jul 13 13:29:09 2018 us=299550 up_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299553 down_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299557 down_pre = DISABLED
Fri Jul 13 13:29:09 2018 us=299560 up_restart = DISABLED
Fri Jul 13 13:29:09 2018 us=299564 up_delay = DISABLED
Fri Jul 13 13:29:09 2018 us=299567 daemon = ENABLED
Fri Jul 13 13:29:09 2018 us=299571 inetd = 0
Fri Jul 13 13:29:09 2018 us=299574 log = ENABLED
Fri Jul 13 13:29:09 2018 us=299578 suppress_timestamps = DISABLED
Fri Jul 13 13:29:09 2018 us=299581 nice = 0
Fri Jul 13 13:29:09 2018 us=299585 verbosity = 7
Fri Jul 13 13:29:09 2018 us=299588 mute = 0
Fri Jul 13 13:29:09 2018 us=299592 gremlin = 0
Fri Jul 13 13:29:09 2018 us=299595 status_file = 'openvpn-status.log'
Fri Jul 13 13:29:09 2018 us=299599 status_file_version = 1
Fri Jul 13 13:29:09 2018 us=299603 status_file_update_freq = 60
Fri Jul 13 13:29:09 2018 us=299606 occ = ENABLED
Fri Jul 13 13:29:09 2018 us=299610 rcvbuf = 65536
Fri Jul 13 13:29:09 2018 us=299613 sndbuf = 65536
Fri Jul 13 13:29:09 2018 us=299616 sockflags = 0
Fri Jul 13 13:29:09 2018 us=299620 fast_io = DISABLED
Fri Jul 13 13:29:09 2018 us=299624 lzo = 7
Fri Jul 13 13:29:09 2018 us=299627 route_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299631 route_default_gateway = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299634 route_default_metric = 0
Fri Jul 13 13:29:09 2018 us=299638 route_noexec = DISABLED
Fri Jul 13 13:29:09 2018 us=299642 route_delay = 0
Fri Jul 13 13:29:09 2018 us=299646 route_delay_window = 30
Fri Jul 13 13:29:09 2018 us=299649 route_delay_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299653 route_nopull = DISABLED
Fri Jul 13 13:29:09 2018 us=299657 route_gateway_via_dhcp = DISABLED
Fri Jul 13 13:29:09 2018 us=299660 max_routes = 100
Fri Jul 13 13:29:09 2018 us=299664 allow_pull_fqdn = DISABLED
Fri Jul 13 13:29:09 2018 us=299672 route 192.168.1.0/255.255.255.0/nil/nil
Fri Jul 13 13:29:09 2018 us=299676 route 192.168.2.0/255.255.255.0/nil/nil
Fri Jul 13 13:29:09 2018 us=299680 route 10.8.0.0/255.255.255.0/nil/nil
Fri Jul 13 13:29:09 2018 us=299684 management_addr = 'localhost'
Fri Jul 13 13:29:09 2018 us=299687 management_port = 7505
Fri Jul 13 13:29:09 2018 us=299691 management_user_pass = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299694 management_log_history_cache = 250
Fri Jul 13 13:29:09 2018 us=299698 management_echo_buffer_size = 100
Fri Jul 13 13:29:09 2018 us=299702 management_write_peer_info_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299705 management_client_user = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299709 management_client_group = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299713 management_flags = 0
Fri Jul 13 13:29:09 2018 us=299716 shared_secret_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299720 key_direction = 0
Fri Jul 13 13:29:09 2018 us=299724 ciphername_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=299728 ciphername = 'BF-CBC'
Fri Jul 13 13:29:09 2018 us=299734 authname_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=299740 authname = 'SHA1'
Fri Jul 13 13:29:09 2018 us=299746 prng_hash = 'SHA1'
Fri Jul 13 13:29:09 2018 us=299752 prng_nonce_secret_len = 16
Fri Jul 13 13:29:09 2018 us=299758 keysize = 0
Fri Jul 13 13:29:09 2018 us=299764 engine = DISABLED
Fri Jul 13 13:29:09 2018 us=299769 replay = ENABLED
Fri Jul 13 13:29:09 2018 us=299775 mute_replay_warnings = DISABLED
Fri Jul 13 13:29:09 2018 us=299781 replay_window = 64
Fri Jul 13 13:29:09 2018 us=299786 replay_time = 15
Fri Jul 13 13:29:09 2018 us=299793 packet_id_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299799 use_iv = ENABLED
Fri Jul 13 13:29:09 2018 us=299804 test_crypto = DISABLED
Fri Jul 13 13:29:09 2018 us=299814 tls_server = ENABLED
Fri Jul 13 13:29:09 2018 us=299821 tls_client = DISABLED
Fri Jul 13 13:29:09 2018 us=299826 key_method = 2
Fri Jul 13 13:29:09 2018 us=299833 ca_file = 'ca.crt'
Fri Jul 13 13:29:09 2018 us=299839 ca_path = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299844 dh_file = 'dh2048.pem'
Fri Jul 13 13:29:09 2018 us=299851 cert_file = 'server.crt'
Fri Jul 13 13:29:09 2018 us=299856 priv_key_file = 'server.key'
Fri Jul 13 13:29:09 2018 us=299860 pkcs12_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299863 cipher_list = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299867 tls_verify = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299871 tls_export_cert = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299874 tls_remote = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299878 crl_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299881 ns_cert_type = 0
Fri Jul 13 13:29:09 2018 us=299885 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299888 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299892 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299895 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299899 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299902 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299906 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299910 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299913 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299917 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299920 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299924 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299927 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299930 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299934 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299937 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299940 remote_cert_eku = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299944 tls_timeout = 2
Fri Jul 13 13:29:09 2018 us=299948 renegotiate_bytes = 0
Fri Jul 13 13:29:09 2018 us=299951 renegotiate_packets = 0
Fri Jul 13 13:29:09 2018 us=299955 renegotiate_seconds = 3600
Fri Jul 13 13:29:09 2018 us=299958 handshake_window = 60
Fri Jul 13 13:29:09 2018 us=299961 transition_window = 3600
Fri Jul 13 13:29:09 2018 us=299965 single_session = DISABLED
Fri Jul 13 13:29:09 2018 us=299969 push_peer_info = DISABLED
Fri Jul 13 13:29:09 2018 us=299972 tls_exit = DISABLED
Fri Jul 13 13:29:09 2018 us=299976 tls_auth_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299980 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299983 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299987 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299991 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299994 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299998 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300001 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300005 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300008 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300012 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300018 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300022 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300025 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300029 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300032 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300036 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300040 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300044 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300047 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300051 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300054 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300061 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300064 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300068 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300071 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300075 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300078 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300082 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300085 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300089 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300092 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300096 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300099 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300103 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300106 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300110 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300113 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300117 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300120 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300124 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300127 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300131 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300134 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300138 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300141 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300145 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300148 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300152 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300155 pkcs11_pin_cache_period = -1
Fri Jul 13 13:29:09 2018 us=300159 pkcs11_id = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300162 pkcs11_id_management = DISABLED
Fri Jul 13 13:29:09 2018 us=300167 server_network = 10.8.0.0
Fri Jul 13 13:29:09 2018 us=300171 server_netmask = 255.255.255.0
Fri Jul 13 13:29:09 2018 us=300179 server_network_ipv6 = ::
Fri Jul 13 13:29:09 2018 us=300183 server_netbits_ipv6 = 0
Fri Jul 13 13:29:09 2018 us=300187 server_bridge_ip = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300191 server_bridge_netmask = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300195 server_bridge_pool_start = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300199 server_bridge_pool_end = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300203 push_entry = 'route 192.168.1.0 255.255.255.0'
Fri Jul 13 13:29:09 2018 us=300207 push_entry = 'route 192.168.2.0 255.255.255.0'
Fri Jul 13 13:29:09 2018 us=300211 push_entry = 'redirect-gateway def1 bypass-dhcp'
Fri Jul 13 13:29:09 2018 us=300215 push_entry = 'dhcp-option DNS 208.67.222.222'
Fri Jul 13 13:29:09 2018 us=300219 push_entry = 'dhcp-option DNS 208.67.220.220'
Fri Jul 13 13:29:09 2018 us=300223 push_entry = 'route 10.8.0.1'
Fri Jul 13 13:29:09 2018 us=300226 push_entry = 'topology net30'
Fri Jul 13 13:29:09 2018 us=300230 push_entry = 'ping 10'
Fri Jul 13 13:29:09 2018 us=300233 push_entry = 'ping-restart 120'
Fri Jul 13 13:29:09 2018 us=300237 ifconfig_pool_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=300241 ifconfig_pool_start = 10.8.0.4
Fri Jul 13 13:29:09 2018 us=300245 ifconfig_pool_end = 10.8.0.251
Fri Jul 13 13:29:09 2018 us=300249 ifconfig_pool_netmask = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300253 ifconfig_pool_persist_filename = 'ipp.txt'
Fri Jul 13 13:29:09 2018 us=300257 ifconfig_pool_persist_refresh_freq = 600
Fri Jul 13 13:29:09 2018 us=300260 ifconfig_ipv6_pool_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=300264 ifconfig_ipv6_pool_base = ::
Fri Jul 13 13:29:09 2018 us=300268 ifconfig_ipv6_pool_netbits = 0
Fri Jul 13 13:29:09 2018 us=300272 n_bcast_buf = 256
Fri Jul 13 13:29:09 2018 us=300275 tcp_queue_limit = 64
Fri Jul 13 13:29:09 2018 us=300279 real_hash_size = 256
Fri Jul 13 13:29:09 2018 us=300282 virtual_hash_size = 256
Fri Jul 13 13:29:09 2018 us=300288 client_connect_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300292 learn_address_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300296 client_disconnect_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300300 client_config_dir = '/etc/openvpn/ccd'
Fri Jul 13 13:29:09 2018 us=300303 ccd_exclusive = DISABLED
Fri Jul 13 13:29:09 2018 us=300307 tmp_dir = '/tmp'
Fri Jul 13 13:29:09 2018 us=300311 push_ifconfig_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=300315 push_ifconfig_local = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300319 push_ifconfig_remote_netmask = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300322 push_ifconfig_ipv6_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=300327 push_ifconfig_ipv6_local = ::/0
Fri Jul 13 13:29:09 2018 us=300330 push_ifconfig_ipv6_remote = ::
Fri Jul 13 13:29:09 2018 us=300334 enable_c2c = DISABLED
Fri Jul 13 13:29:09 2018 us=300338 duplicate_cn = DISABLED
Fri Jul 13 13:29:09 2018 us=300341 cf_max = 0
Fri Jul 13 13:29:09 2018 us=300345 cf_per = 0
Fri Jul 13 13:29:09 2018 us=300349 max_clients = 1024
Fri Jul 13 13:29:09 2018 us=300352 max_routes_per_client = 256
Fri Jul 13 13:29:09 2018 us=300356 auth_user_pass_verify_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300359 auth_user_pass_verify_script_via_file = DISABLED
Fri Jul 13 13:29:09 2018 us=300363 ssl_flags = 0
Fri Jul 13 13:29:09 2018 us=300367 port_share_host = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300370 port_share_port = 0
Fri Jul 13 13:29:09 2018 us=300374 client = DISABLED
Fri Jul 13 13:29:09 2018 us=300377 pull = DISABLED
Fri Jul 13 13:29:09 2018 us=300381 auth_user_pass_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300386 OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Fri Jul 13 13:29:09 2018 us=300647 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7505
Fri Jul 13 13:29:09 2018 us=300784 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=300795 GDG: route[2] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=300802 GDG: route[3] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=300816 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=300822 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Jul 13 13:29:09 2018 us=328696 Diffie-Hellman initialized with 2048 bit key
Fri Jul 13 13:29:09 2018 us=344182 PRNG init md=SHA1 size=36
Fri Jul 13 13:29:09 2018 us=344223 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:29:09 2018 us=344231 TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:29:09 2018 us=344236 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:29:09 2018 us=344257 Socket Buffers: R=[229376->131072] S=[229376->131072]
Fri Jul 13 13:29:09 2018 us=344317 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=344327 GDG: route[2] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=344333 GDG: route[3] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=344346 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=344384 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=344392 GDG: route[2] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=344398 GDG: route[3] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=344409 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=344417 ROUTE default_gateway=31.14.138.1
Fri Jul 13 13:29:09 2018 us=345048 TUN/TAP device tun0 opened
Fri Jul 13 13:29:09 2018 us=345069 TUN/TAP TX queue length set to 100
Fri Jul 13 13:29:09 2018 us=345092 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Jul 13 13:29:09 2018 us=345116 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Fri Jul 13 13:29:09 2018 us=346366 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=346386 GDG: route[2] 10.8.0.2/255.255.255.255/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=346399 GDG: route[3] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=346406 GDG: route[4] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=346420 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=346436 /sbin/route add -net 192.168.1.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 13:29:09 2018 us=348082 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=348103 GDG: route[2] 10.8.0.2/255.255.255.255/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=348111 GDG: route[3] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=348118 GDG: route[4] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=348124 GDG: route[5] 192.168.1.0/255.255.255.0/10.8.0.2 m=0
Fri Jul 13 13:29:09 2018 us=348137 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=348151 /sbin/route add -net 192.168.2.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 13:29:09 2018 us=359813 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=359838 GDG: route[2] 10.8.0.2/255.255.255.255/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=359846 GDG: route[3] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=359853 GDG: route[4] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=359859 GDG: route[5] 192.168.1.0/255.255.255.0/10.8.0.2 m=0
Fri Jul 13 13:29:09 2018 us=359865 GDG: route[6] 192.168.2.0/255.255.255.0/10.8.0.2 m=0
Fri Jul 13 13:29:09 2018 us=359879 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=359895 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 13:29:09 2018 us=360758 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:29:09 2018 us=362253 GID set to nogroup
Fri Jul 13 13:29:09 2018 us=362290 UID set to nobody
Fri Jul 13 13:29:09 2018 us=362307 UDPv4 link local (bound): [undef]
Fri Jul 13 13:29:09 2018 us=362313 UDPv4 link remote: [undef]
Fri Jul 13 13:29:09 2018 us=362332 MULTI: multi_init called, r=256 v=256
Fri Jul 13 13:29:09 2018 us=362381 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Fri Jul 13 13:29:09 2018 us=364095 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364125 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364132 ifconfig_pool_read(), in='client1,10.8.0.8', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364137 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364142 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.12', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364147 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364151 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.16', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364156 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364160 ifconfig_pool_read(), in='clientCorato,10.8.0.20', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364164 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364170 ifconfig_pool_read(), in='clientGenius,10.8.0.24', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364175 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364180 ifconfig_pool_read(), in='clientGenius,10.8.0.28', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364184 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364188 ifconfig_pool_read(), in='clientFormello,10.8.0.32', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364192 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364199 IFCONFIG POOL LIST
Fri Jul 13 13:29:09 2018 us=364205 client1,10.8.0.4
Fri Jul 13 13:29:09 2018 us=364210 client1,10.8.0.8
Fri Jul 13 13:29:09 2018 us=364214 clientTerlizzi,10.8.0.12
Fri Jul 13 13:29:09 2018 us=364219 clientTerlizzi,10.8.0.16
Fri Jul 13 13:29:09 2018 us=364223 clientCorato,10.8.0.20
Fri Jul 13 13:29:09 2018 us=364227 clientGenius,10.8.0.24
Fri Jul 13 13:29:09 2018 us=364231 clientGenius,10.8.0.28
Fri Jul 13 13:29:09 2018 us=364235 clientFormello,10.8.0.32
Fri Jul 13 13:29:09 2018 us=364274 Initialization Sequence Completed
-
- OpenVPN Protagonist
- Posts: 11137
- Joined: Fri Jun 03, 2016 1:17 pm
Re: openvpn Client is not recognized by openvpn server
Your client is not trying to (or cannot) connect ..
-
- OpenVPN User
- Posts: 29
- Joined: Tue Jul 10, 2018 1:31 pm
Re: openvpn Client is not recognized by openvpn server
the client ip is 91.252.248.238 and I can see many UNDEF in the log status:
OpenVPN CLIENT LIST
Updated,Fri Jul 13 15:21:14 2018
Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since
UNDEF,91.252.248.238:6403,698,4278,Fri Jul 13 15:20:44 2018
UNDEF,91.252.248.238:6338,698,3138,Fri Jul 13 15:21:09 2018
UNDEF,91.252.248.238:6785,698,4392,Fri Jul 13 15:20:41 2018
UNDEF,91.252.248.238:7106,698,3708,Fri Jul 13 15:21:04 2018
UNDEF,91.252.248.238:6978,698,4734,Fri Jul 13 15:20:36 2018
UNDEF,91.252.248.238:6468,698,3822,Fri Jul 13 15:20:58 2018
UNDEF,91.252.248.238:6913,698,4278,Fri Jul 13 15:20:47 2018
UNDEF,91.252.248.238:6340,698,4734,Fri Jul 13 15:20:24 2018
UNDEF,91.252.248.238:6336,698,3822,Fri Jul 13 15:21:01 2018
UNDEF,91.252.248.238:6407,698,3480,Fri Jul 13 15:21:07 2018
UNDEF,91.252.248.238:6470,698,4278,Fri Jul 13 15:20:50 2018
UNDEF,91.252.248.238:6273,698,4392,Fri Jul 13 15:20:39 2018
UNDEF,91.252.248.238:6531,698,4734,Fri Jul 13 15:20:27 2018
UNDEF,91.252.248.238:6272,698,2910,Fri Jul 13 15:21:12 2018
UNDEF,91.252.248.238:6404,698,4734,Fri Jul 13 15:20:15 2018
UNDEF,91.252.248.238:6147,698,4734,Fri Jul 13 15:20:33 2018
UNDEF,91.252.248.238:6533,698,4164,Fri Jul 13 15:20:55 2018
UNDEF,91.252.248.238:6401,698,4734,Fri Jul 13 15:20:30 2018
UNDEF,91.252.248.238:6786,698,4734,Fri Jul 13 15:20:18 2018
client1,37.227.109.201:55297,2023361,2112086,Fri Jul 13 13:30:45 2018
UNDEF,91.252.248.238:6529,698,4734,Fri Jul 13 15:20:21 2018
UNDEF,91.252.248.238:6405,698,4278,Fri Jul 13 15:20:53 2018
ROUTING TABLE
Virtual Address,Common Name,Real Address,Last Ref
192.168.1.0/24,client1,37.227.109.201:55297,Fri Jul 13 13:30:49 2018
192.168.1.161C,client1,37.227.109.201:55297,Fri Jul 13 15:20:50 2018
192.168.1.175C,client1,37.227.109.201:55297,Fri Jul 13 15:21:12 2018
10.8.0.6,client1,37.227.109.201:55297,Fri Jul 13 15:21:13 2018
GLOBAL STATS
Max bcast/mcast queue length,0
END
This is the server log that show the connection from this client,
but I can't understand why it is not recognized.
Thanks for your help
Antonio
root@solergycloud:~# cat /etc/openvpn/openvpn.log | grep 91.252.248.238
Fri Jul 13 13:35:24 2018 us=900847 91.252.248.238:6529 Re-using SSL/TLS context
Fri Jul 13 13:35:24 2018 us=900881 91.252.248.238:6529 LZO compression initialized
Fri Jul 13 13:35:24 2018 us=900892 91.252.248.238:6529 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:24 2018 us=900914 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900975 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900984 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901008 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901019 91.252.248.238:6529 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:24 2018 us=901025 91.252.248.238:6529 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:24 2018 us=901031 91.252.248.238:6529 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:24 2018 us=901065 91.252.248.238:6529 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:24 2018 us=901071 91.252.248.238:6529 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:24 2018 us=901083 91.252.248.238:6529 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:24 2018 us=901092 91.252.248.238:6529 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:24 2018 us=901103 91.252.248.238:6529 SENT PING
Fri Jul 13 13:35:24 2018 us=901116 91.252.248.238:6529 GET INST BY REAL: 91.252.248.238:6529 [created]
Fri Jul 13 13:35:24 2018 us=901128 91.252.248.238:6529 UDPv4 READ [14] from [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=901137 91.252.248.238:6529 TLS: Initial packet from [AF_INET]91.252.248.238:6529, sid=52ac7ce3 b1260378
Fri Jul 13 13:35:24 2018 us=901159 91.252.248.238:6529 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=998920 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998933 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:24 2018 us=998973 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998984 91.252.248.238:6529 UDPv4 READ [114] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:24 2018 us=999002 91.252.248.238:6529 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:24 2018 us=999041 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=999052 91.252.248.238:6529 UDPv4 READ [86] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:25 2018 us=16308 91.252.248.238:6529 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:25 2018 us=16455 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:25 2018 us=16524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:25 2018 us=16573 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:25 2018 us=16652 91.252.248.238:6529 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:25 2018 us=123354 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123399 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:25 2018 us=123440 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:25 2018 us=123485 91.252.248.238:6529 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:25 2018 us=123501 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123509 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:25 2018 us=123524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:25 2018 us=123546 91.252.248.238:6529 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:25 2018 us=123567 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123575 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:25 2018 us=123588 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:25 2018 us=123606 91.252.248.238:6529 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:25 2018 us=123636 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123647 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:25 2018 us=123663 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:25 2018 us=123683 91.252.248.238:6529 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:25 2018 us=219499 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219544 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:25 2018 us=219584 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:25 2018 us=219632 91.252.248.238:6529 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:25 2018 us=219655 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219668 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:25 2018 us=219691 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:25 2018 us=219740 91.252.248.238:6529 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:25 2018 us=219790 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219816 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:25 2018 us=219845 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:25 2018 us=219890 91.252.248.238:6529 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:25 2018 us=219906 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219915 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:25 2018 us=219929 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:25 2018 us=219957 91.252.248.238:6529 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:25 2018 us=321725 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=321813 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:25 2018 us=321877 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:25 2018 us=321953 91.252.248.238:6529 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:25 2018 us=321997 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322016 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:25 2018 us=322046 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:25 2018 us=322098 91.252.248.238:6529 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:25 2018 us=322117 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322125 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:25 2018 us=322141 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:25 2018 us=322164 91.252.248.238:6529 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:25 2018 us=322187 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322196 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:25 2018 us=322211 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:25 2018 us=322248 91.252.248.238:6529 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:25 2018 us=431040 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431087 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:25 2018 us=431128 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:25 2018 us=431196 91.252.248.238:6529 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:25 2018 us=431215 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431224 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:25 2018 us=431238 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:25 2018 us=431284 91.252.248.238:6529 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:25 2018 us=431304 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431317 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:25 2018 us=431338 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:25 2018 us=431380 91.252.248.238:6529 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:25 2018 us=431398 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431410 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:25 2018 us=431430 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:25 2018 us=431459 91.252.248.238:6529 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:25 2018 us=544352 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544396 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:25 2018 us=544437 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:25 2018 us=544510 91.252.248.238:6529 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:25 2018 us=544528 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544537 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:25 2018 us=544562 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:25 2018 us=544586 91.252.248.238:6529 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:25 2018 us=544609 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544617 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:25 2018 us=544631 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:25 2018 us=544655 91.252.248.238:6529 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:25 2018 us=544668 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544675 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:25 2018 us=544688 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:25 2018 us=544711 91.252.248.238:6529 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:25 2018 us=643686 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=643731 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:25 2018 us=643771 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:25 2018 us=643808 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=21068 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:27 2018 us=21198 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=665700 91.252.248.238:6400 Re-using SSL/TLS context
Fri Jul 13 13:35:27 2018 us=665722 91.252.248.238:6400 LZO compression initialized
Fri Jul 13 13:35:27 2018 us=665729 91.252.248.238:6400 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:27 2018 us=665741 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665821 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665841 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665867 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665877 91.252.248.238:6400 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:27 2018 us=665883 91.252.248.238:6400 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:27 2018 us=665889 91.252.248.238:6400 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:27 2018 us=665913 91.252.248.238:6400 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:27 2018 us=665918 91.252.248.238:6400 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:27 2018 us=665929 91.252.248.238:6400 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:27 2018 us=665938 91.252.248.238:6400 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:27 2018 us=665946 91.252.248.238:6400 SENT PING
Fri Jul 13 13:35:27 2018 us=665961 91.252.248.238:6400 GET INST BY REAL: 91.252.248.238:6400 [created]
Fri Jul 13 13:35:27 2018 us=665980 91.252.248.238:6400 UDPv4 READ [14] from [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=665994 91.252.248.238:6400 TLS: Initial packet from [AF_INET]91.252.248.238:6400, sid=df839f45 a0572e21
Fri Jul 13 13:35:27 2018 us=666021 91.252.248.238:6400 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=818995 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819052 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:27 2018 us=819376 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819403 91.252.248.238:6400 UDPv4 READ [114] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=819443 91.252.248.238:6400 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=819518 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819534 91.252.248.238:6400 UDPv4 READ [86] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:27 2018 us=826699 91.252.248.238:6400 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=826855 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:27 2018 us=826907 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:27 2018 us=826946 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:27 2018 us=826976 91.252.248.238:6400 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:27 2018 us=937108 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937173 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=937246 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:27 2018 us=937288 91.252.248.238:6400 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:27 2018 us=937316 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937325 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:27 2018 us=937343 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:27 2018 us=937390 91.252.248.238:6400 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:27 2018 us=937407 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937415 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:27 2018 us=937431 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:27 2018 us=937460 91.252.248.238:6400 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:27 2018 us=937474 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937483 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:27 2018 us=937500 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:27 2018 us=937543 91.252.248.238:6400 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:28 2018 us=26102 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=26248 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=56282 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56344 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:28 2018 us=56404 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:28 2018 us=56541 91.252.248.238:6400 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:28 2018 us=56568 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56585 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:28 2018 us=56611 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:28 2018 us=56662 91.252.248.238:6400 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:28 2018 us=56684 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56698 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:28 2018 us=56724 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:28 2018 us=56770 91.252.248.238:6400 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:28 2018 us=56792 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:28 2018 us=56831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:28 2018 us=56874 91.252.248.238:6400 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:28 2018 us=177436 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177506 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:28 2018 us=177561 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:28 2018 us=177629 91.252.248.238:6400 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:28 2018 us=177656 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177668 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:28 2018 us=177692 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:28 2018 us=177741 91.252.248.238:6400 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:28 2018 us=177793 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:28 2018 us=177831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:28 2018 us=177865 91.252.248.238:6400 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:28 2018 us=177878 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177885 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:28 2018 us=177898 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:28 2018 us=177932 91.252.248.238:6400 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:28 2018 us=294882 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=294930 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:28 2018 us=294982 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:28 2018 us=295052 91.252.248.238:6400 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:28 2018 us=295076 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295090 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:28 2018 us=295113 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:28 2018 us=295157 91.252.248.238:6400 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:28 2018 us=295173 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295181 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:28 2018 us=295205 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:28 2018 us=295245 91.252.248.238:6400 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:28 2018 us=295275 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295288 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:28 2018 us=295309 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:28 2018 us=295346 91.252.248.238:6400 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:28 2018 us=404207 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404337 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:28 2018 us=404396 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:28 2018 us=404447 91.252.248.238:6400 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:28 2018 us=404486 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404501 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:28 2018 us=404526 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=404574 91.252.248.238:6400 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:28 2018 us=417715 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417801 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:28 2018 us=417851 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:28 2018 us=417891 91.252.248.238:6400 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:28 2018 us=417922 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417936 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:28 2018 us=417962 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:28 2018 us=418000 91.252.248.238:6400 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:28 2018 us=533390 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=533451 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:28 2018 us=533507 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:28 2018 us=533576 91.252.248.238:6400 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=945522 91.252.248.238:6722 Re-using SSL/TLS context
Fri Jul 13 13:35:28 2018 us=945544 91.252.248.238:6722 LZO compression initialized
Fri Jul 13 13:35:28 2018 us=945551 91.252.248.238:6722 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:28 2018 us=945563 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945614 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945628 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945663 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945678 91.252.248.238:6722 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:28 2018 us=945686 91.252.248.238:6722 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:28 2018 us=945697 91.252.248.238:6722 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:28 2018 us=945729 91.252.248.238:6722 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:28 2018 us=945740 91.252.248.238:6722 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:28 2018 us=945786 91.252.248.238:6722 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:28 2018 us=945801 91.252.248.238:6722 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:28 2018 us=945825 91.252.248.238:6722 SENT PING
Fri Jul 13 13:35:28 2018 us=945843 91.252.248.238:6722 GET INST BY REAL: 91.252.248.238:6722 [created]
Fri Jul 13 13:35:28 2018 us=945967 91.252.248.238:6722 UDPv4 READ [14] from [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:28 2018 us=945991 91.252.248.238:6722 TLS: Initial packet from [AF_INET]91.252.248.238:6722, sid=eb02a63d a1b1755a
Fri Jul 13 13:35:28 2018 us=946021 91.252.248.238:6722 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:29 2018 us=44386 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:29 2018 us=44509 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:29 2018 us=45236 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45255 91.252.248.238:6722 UDPv4 READ [22] from [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:29 2018 us=45278 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45288 91.252.248.238:6722 UDPv4 READ [114] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=45305 91.252.248.238:6722 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:29 2018 us=55366 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=55426 91.252.248.238:6722 UDPv4 READ [86] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:29 2018 us=63990 91.252.248.238:6722 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=64141 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:29 2018 us=64202 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:29 2018 us=64240 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Top
HomeBoard indexAll times are UTCDelete all board cookies Members The team
OpenVPN CLIENT LIST
Updated,Fri Jul 13 15:21:14 2018
Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since
UNDEF,91.252.248.238:6403,698,4278,Fri Jul 13 15:20:44 2018
UNDEF,91.252.248.238:6338,698,3138,Fri Jul 13 15:21:09 2018
UNDEF,91.252.248.238:6785,698,4392,Fri Jul 13 15:20:41 2018
UNDEF,91.252.248.238:7106,698,3708,Fri Jul 13 15:21:04 2018
UNDEF,91.252.248.238:6978,698,4734,Fri Jul 13 15:20:36 2018
UNDEF,91.252.248.238:6468,698,3822,Fri Jul 13 15:20:58 2018
UNDEF,91.252.248.238:6913,698,4278,Fri Jul 13 15:20:47 2018
UNDEF,91.252.248.238:6340,698,4734,Fri Jul 13 15:20:24 2018
UNDEF,91.252.248.238:6336,698,3822,Fri Jul 13 15:21:01 2018
UNDEF,91.252.248.238:6407,698,3480,Fri Jul 13 15:21:07 2018
UNDEF,91.252.248.238:6470,698,4278,Fri Jul 13 15:20:50 2018
UNDEF,91.252.248.238:6273,698,4392,Fri Jul 13 15:20:39 2018
UNDEF,91.252.248.238:6531,698,4734,Fri Jul 13 15:20:27 2018
UNDEF,91.252.248.238:6272,698,2910,Fri Jul 13 15:21:12 2018
UNDEF,91.252.248.238:6404,698,4734,Fri Jul 13 15:20:15 2018
UNDEF,91.252.248.238:6147,698,4734,Fri Jul 13 15:20:33 2018
UNDEF,91.252.248.238:6533,698,4164,Fri Jul 13 15:20:55 2018
UNDEF,91.252.248.238:6401,698,4734,Fri Jul 13 15:20:30 2018
UNDEF,91.252.248.238:6786,698,4734,Fri Jul 13 15:20:18 2018
client1,37.227.109.201:55297,2023361,2112086,Fri Jul 13 13:30:45 2018
UNDEF,91.252.248.238:6529,698,4734,Fri Jul 13 15:20:21 2018
UNDEF,91.252.248.238:6405,698,4278,Fri Jul 13 15:20:53 2018
ROUTING TABLE
Virtual Address,Common Name,Real Address,Last Ref
192.168.1.0/24,client1,37.227.109.201:55297,Fri Jul 13 13:30:49 2018
192.168.1.161C,client1,37.227.109.201:55297,Fri Jul 13 15:20:50 2018
192.168.1.175C,client1,37.227.109.201:55297,Fri Jul 13 15:21:12 2018
10.8.0.6,client1,37.227.109.201:55297,Fri Jul 13 15:21:13 2018
GLOBAL STATS
Max bcast/mcast queue length,0
END
This is the server log that show the connection from this client,
but I can't understand why it is not recognized.
Thanks for your help
Antonio
root@solergycloud:~# cat /etc/openvpn/openvpn.log | grep 91.252.248.238
Fri Jul 13 13:35:24 2018 us=900847 91.252.248.238:6529 Re-using SSL/TLS context
Fri Jul 13 13:35:24 2018 us=900881 91.252.248.238:6529 LZO compression initialized
Fri Jul 13 13:35:24 2018 us=900892 91.252.248.238:6529 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:24 2018 us=900914 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900975 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900984 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901008 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901019 91.252.248.238:6529 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:24 2018 us=901025 91.252.248.238:6529 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:24 2018 us=901031 91.252.248.238:6529 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:24 2018 us=901065 91.252.248.238:6529 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:24 2018 us=901071 91.252.248.238:6529 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:24 2018 us=901083 91.252.248.238:6529 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:24 2018 us=901092 91.252.248.238:6529 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:24 2018 us=901103 91.252.248.238:6529 SENT PING
Fri Jul 13 13:35:24 2018 us=901116 91.252.248.238:6529 GET INST BY REAL: 91.252.248.238:6529 [created]
Fri Jul 13 13:35:24 2018 us=901128 91.252.248.238:6529 UDPv4 READ [14] from [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=901137 91.252.248.238:6529 TLS: Initial packet from [AF_INET]91.252.248.238:6529, sid=52ac7ce3 b1260378
Fri Jul 13 13:35:24 2018 us=901159 91.252.248.238:6529 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=998920 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998933 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:24 2018 us=998973 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998984 91.252.248.238:6529 UDPv4 READ [114] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:24 2018 us=999002 91.252.248.238:6529 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:24 2018 us=999041 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=999052 91.252.248.238:6529 UDPv4 READ [86] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:25 2018 us=16308 91.252.248.238:6529 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:25 2018 us=16455 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:25 2018 us=16524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:25 2018 us=16573 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:25 2018 us=16652 91.252.248.238:6529 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:25 2018 us=123354 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123399 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:25 2018 us=123440 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:25 2018 us=123485 91.252.248.238:6529 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:25 2018 us=123501 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123509 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:25 2018 us=123524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:25 2018 us=123546 91.252.248.238:6529 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:25 2018 us=123567 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123575 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:25 2018 us=123588 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:25 2018 us=123606 91.252.248.238:6529 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:25 2018 us=123636 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123647 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:25 2018 us=123663 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:25 2018 us=123683 91.252.248.238:6529 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:25 2018 us=219499 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219544 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:25 2018 us=219584 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:25 2018 us=219632 91.252.248.238:6529 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:25 2018 us=219655 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219668 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:25 2018 us=219691 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:25 2018 us=219740 91.252.248.238:6529 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:25 2018 us=219790 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219816 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:25 2018 us=219845 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:25 2018 us=219890 91.252.248.238:6529 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:25 2018 us=219906 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219915 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:25 2018 us=219929 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:25 2018 us=219957 91.252.248.238:6529 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:25 2018 us=321725 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=321813 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:25 2018 us=321877 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:25 2018 us=321953 91.252.248.238:6529 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:25 2018 us=321997 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322016 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:25 2018 us=322046 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:25 2018 us=322098 91.252.248.238:6529 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:25 2018 us=322117 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322125 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:25 2018 us=322141 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:25 2018 us=322164 91.252.248.238:6529 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:25 2018 us=322187 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322196 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:25 2018 us=322211 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:25 2018 us=322248 91.252.248.238:6529 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:25 2018 us=431040 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431087 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:25 2018 us=431128 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:25 2018 us=431196 91.252.248.238:6529 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:25 2018 us=431215 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431224 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:25 2018 us=431238 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:25 2018 us=431284 91.252.248.238:6529 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:25 2018 us=431304 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431317 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:25 2018 us=431338 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:25 2018 us=431380 91.252.248.238:6529 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:25 2018 us=431398 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431410 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:25 2018 us=431430 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:25 2018 us=431459 91.252.248.238:6529 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:25 2018 us=544352 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544396 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:25 2018 us=544437 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:25 2018 us=544510 91.252.248.238:6529 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:25 2018 us=544528 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544537 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:25 2018 us=544562 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:25 2018 us=544586 91.252.248.238:6529 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:25 2018 us=544609 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544617 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:25 2018 us=544631 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:25 2018 us=544655 91.252.248.238:6529 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:25 2018 us=544668 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544675 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:25 2018 us=544688 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:25 2018 us=544711 91.252.248.238:6529 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:25 2018 us=643686 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=643731 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:25 2018 us=643771 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:25 2018 us=643808 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=21068 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:27 2018 us=21198 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=665700 91.252.248.238:6400 Re-using SSL/TLS context
Fri Jul 13 13:35:27 2018 us=665722 91.252.248.238:6400 LZO compression initialized
Fri Jul 13 13:35:27 2018 us=665729 91.252.248.238:6400 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:27 2018 us=665741 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665821 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665841 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665867 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665877 91.252.248.238:6400 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:27 2018 us=665883 91.252.248.238:6400 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:27 2018 us=665889 91.252.248.238:6400 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:27 2018 us=665913 91.252.248.238:6400 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:27 2018 us=665918 91.252.248.238:6400 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:27 2018 us=665929 91.252.248.238:6400 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:27 2018 us=665938 91.252.248.238:6400 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:27 2018 us=665946 91.252.248.238:6400 SENT PING
Fri Jul 13 13:35:27 2018 us=665961 91.252.248.238:6400 GET INST BY REAL: 91.252.248.238:6400 [created]
Fri Jul 13 13:35:27 2018 us=665980 91.252.248.238:6400 UDPv4 READ [14] from [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=665994 91.252.248.238:6400 TLS: Initial packet from [AF_INET]91.252.248.238:6400, sid=df839f45 a0572e21
Fri Jul 13 13:35:27 2018 us=666021 91.252.248.238:6400 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=818995 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819052 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:27 2018 us=819376 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819403 91.252.248.238:6400 UDPv4 READ [114] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=819443 91.252.248.238:6400 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=819518 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819534 91.252.248.238:6400 UDPv4 READ [86] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:27 2018 us=826699 91.252.248.238:6400 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=826855 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:27 2018 us=826907 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:27 2018 us=826946 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:27 2018 us=826976 91.252.248.238:6400 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:27 2018 us=937108 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937173 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=937246 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:27 2018 us=937288 91.252.248.238:6400 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:27 2018 us=937316 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937325 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:27 2018 us=937343 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:27 2018 us=937390 91.252.248.238:6400 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:27 2018 us=937407 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937415 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:27 2018 us=937431 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:27 2018 us=937460 91.252.248.238:6400 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:27 2018 us=937474 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937483 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:27 2018 us=937500 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:27 2018 us=937543 91.252.248.238:6400 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:28 2018 us=26102 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=26248 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=56282 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56344 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:28 2018 us=56404 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:28 2018 us=56541 91.252.248.238:6400 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:28 2018 us=56568 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56585 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:28 2018 us=56611 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:28 2018 us=56662 91.252.248.238:6400 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:28 2018 us=56684 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56698 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:28 2018 us=56724 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:28 2018 us=56770 91.252.248.238:6400 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:28 2018 us=56792 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:28 2018 us=56831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:28 2018 us=56874 91.252.248.238:6400 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:28 2018 us=177436 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177506 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:28 2018 us=177561 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:28 2018 us=177629 91.252.248.238:6400 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:28 2018 us=177656 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177668 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:28 2018 us=177692 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:28 2018 us=177741 91.252.248.238:6400 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:28 2018 us=177793 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:28 2018 us=177831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:28 2018 us=177865 91.252.248.238:6400 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:28 2018 us=177878 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177885 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:28 2018 us=177898 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:28 2018 us=177932 91.252.248.238:6400 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:28 2018 us=294882 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=294930 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:28 2018 us=294982 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:28 2018 us=295052 91.252.248.238:6400 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:28 2018 us=295076 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295090 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:28 2018 us=295113 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:28 2018 us=295157 91.252.248.238:6400 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:28 2018 us=295173 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295181 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:28 2018 us=295205 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:28 2018 us=295245 91.252.248.238:6400 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:28 2018 us=295275 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295288 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:28 2018 us=295309 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:28 2018 us=295346 91.252.248.238:6400 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:28 2018 us=404207 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404337 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:28 2018 us=404396 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:28 2018 us=404447 91.252.248.238:6400 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:28 2018 us=404486 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404501 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:28 2018 us=404526 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=404574 91.252.248.238:6400 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:28 2018 us=417715 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417801 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:28 2018 us=417851 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:28 2018 us=417891 91.252.248.238:6400 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:28 2018 us=417922 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417936 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:28 2018 us=417962 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:28 2018 us=418000 91.252.248.238:6400 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:28 2018 us=533390 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=533451 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:28 2018 us=533507 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:28 2018 us=533576 91.252.248.238:6400 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=945522 91.252.248.238:6722 Re-using SSL/TLS context
Fri Jul 13 13:35:28 2018 us=945544 91.252.248.238:6722 LZO compression initialized
Fri Jul 13 13:35:28 2018 us=945551 91.252.248.238:6722 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:28 2018 us=945563 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945614 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945628 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945663 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945678 91.252.248.238:6722 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:28 2018 us=945686 91.252.248.238:6722 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:28 2018 us=945697 91.252.248.238:6722 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:28 2018 us=945729 91.252.248.238:6722 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:28 2018 us=945740 91.252.248.238:6722 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:28 2018 us=945786 91.252.248.238:6722 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:28 2018 us=945801 91.252.248.238:6722 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:28 2018 us=945825 91.252.248.238:6722 SENT PING
Fri Jul 13 13:35:28 2018 us=945843 91.252.248.238:6722 GET INST BY REAL: 91.252.248.238:6722 [created]
Fri Jul 13 13:35:28 2018 us=945967 91.252.248.238:6722 UDPv4 READ [14] from [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:28 2018 us=945991 91.252.248.238:6722 TLS: Initial packet from [AF_INET]91.252.248.238:6722, sid=eb02a63d a1b1755a
Fri Jul 13 13:35:28 2018 us=946021 91.252.248.238:6722 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:29 2018 us=44386 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:29 2018 us=44509 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:29 2018 us=45236 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45255 91.252.248.238:6722 UDPv4 READ [22] from [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:29 2018 us=45278 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45288 91.252.248.238:6722 UDPv4 READ [114] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=45305 91.252.248.238:6722 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:29 2018 us=55366 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=55426 91.252.248.238:6722 UDPv4 READ [86] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:29 2018 us=63990 91.252.248.238:6722 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=64141 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:29 2018 us=64202 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:29 2018 us=64240 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Top
HomeBoard indexAll times are UTCDelete all board cookies Members The team
-
- OpenVPN Protagonist
- Posts: 11137
- Joined: Fri Jun 03, 2016 1:17 pm
Re: openvpn Client is not recognized by openvpn server
The log above is of no use ..
-
- OpenVPN User
- Posts: 29
- Joined: Tue Jul 10, 2018 1:31 pm
Re: openvpn Client is not recognized by openvpn server
please excuse me,
here it the log at level 4 as required.
Antonio
Fri Jul 13 16:04:53 2018 us=779426 Current Parameter Settings:
Fri Jul 13 16:04:53 2018 us=779493 config = '/etc/openvpn/server.conf'
Fri Jul 13 16:04:53 2018 us=779504 mode = 1
Fri Jul 13 16:04:53 2018 us=779511 persist_config = DISABLED
Fri Jul 13 16:04:53 2018 us=779518 persist_mode = 1
Fri Jul 13 16:04:53 2018 us=779524 show_ciphers = DISABLED
Fri Jul 13 16:04:53 2018 us=779528 show_digests = DISABLED
Fri Jul 13 16:04:53 2018 us=779534 show_engines = DISABLED
Fri Jul 13 16:04:53 2018 us=779539 genkey = DISABLED
Fri Jul 13 16:04:53 2018 us=779542 key_pass_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779546 show_tls_ciphers = DISABLED
Fri Jul 13 16:04:53 2018 us=779551 Connection profiles [default]:
Fri Jul 13 16:04:53 2018 us=779556 proto = udp
Fri Jul 13 16:04:53 2018 us=779559 local = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779563 local_port = 1194
Fri Jul 13 16:04:53 2018 us=779566 remote = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779570 remote_port = 1194
Fri Jul 13 16:04:53 2018 us=779575 remote_float = DISABLED
Fri Jul 13 16:04:53 2018 us=779580 bind_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=779584 bind_local = ENABLED
Fri Jul 13 16:04:53 2018 us=779587 connect_retry_seconds = 5
Fri Jul 13 16:04:53 2018 us=779591 connect_timeout = 10
Fri Jul 13 16:04:53 2018 us=779595 connect_retry_max = 0
Fri Jul 13 16:04:53 2018 us=779601 socks_proxy_server = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779605 socks_proxy_port = 0
Fri Jul 13 16:04:53 2018 us=779608 socks_proxy_retry = DISABLED
Fri Jul 13 16:04:53 2018 us=779612 Connection profiles END
Fri Jul 13 16:04:53 2018 us=779615 remote_random = DISABLED
Fri Jul 13 16:04:53 2018 us=779619 ipchange = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779622 dev = 'tun'
Fri Jul 13 16:04:53 2018 us=779625 dev_type = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779629 dev_node = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779633 lladdr = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779637 topology = 1
Fri Jul 13 16:04:53 2018 us=779640 tun_ipv6 = DISABLED
Fri Jul 13 16:04:53 2018 us=779644 ifconfig_local = '10.8.0.1'
Fri Jul 13 16:04:53 2018 us=779647 ifconfig_remote_netmask = '10.8.0.2'
Fri Jul 13 16:04:53 2018 us=779651 ifconfig_noexec = DISABLED
Fri Jul 13 16:04:53 2018 us=779654 ifconfig_nowarn = DISABLED
Fri Jul 13 16:04:53 2018 us=779658 ifconfig_ipv6_local = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779661 ifconfig_ipv6_netbits = 0
Fri Jul 13 16:04:53 2018 us=779665 ifconfig_ipv6_remote = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779668 shaper = 0
Fri Jul 13 16:04:53 2018 us=779672 tun_mtu = 1500
Fri Jul 13 16:04:53 2018 us=779675 tun_mtu_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=779678 link_mtu = 1500
Fri Jul 13 16:04:53 2018 us=779682 link_mtu_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=779685 tun_mtu_extra = 0
Fri Jul 13 16:04:53 2018 us=779689 tun_mtu_extra_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=779692 fragment = 0
Fri Jul 13 16:04:53 2018 us=779698 mtu_discover_type = -1
Fri Jul 13 16:04:53 2018 us=779703 mtu_test = 0
Fri Jul 13 16:04:53 2018 us=779707 mlock = DISABLED
Fri Jul 13 16:04:53 2018 us=779710 keepalive_ping = 10
Fri Jul 13 16:04:53 2018 us=779714 keepalive_timeout = 120
Fri Jul 13 16:04:53 2018 us=779717 inactivity_timeout = 0
Fri Jul 13 16:04:53 2018 us=779721 ping_send_timeout = 10
Fri Jul 13 16:04:53 2018 us=779724 ping_rec_timeout = 240
Fri Jul 13 16:04:53 2018 us=784336 ping_rec_timeout_action = 2
Fri Jul 13 16:04:53 2018 us=784347 ping_timer_remote = DISABLED
Fri Jul 13 16:04:53 2018 us=784351 remap_sigusr1 = 0
Fri Jul 13 16:04:53 2018 us=784355 explicit_exit_notification = 0
Fri Jul 13 16:04:53 2018 us=784360 persist_tun = ENABLED
Fri Jul 13 16:04:53 2018 us=784364 persist_local_ip = DISABLED
Fri Jul 13 16:04:53 2018 us=784367 persist_remote_ip = DISABLED
Fri Jul 13 16:04:53 2018 us=784371 persist_key = ENABLED
Fri Jul 13 16:04:53 2018 us=784375 mssfix = 1450
Fri Jul 13 16:04:53 2018 us=784381 passtos = DISABLED
Fri Jul 13 16:04:53 2018 us=784388 resolve_retry_seconds = 1000000000
Fri Jul 13 16:04:53 2018 us=784400 username = 'nobody'
Fri Jul 13 16:04:53 2018 us=784404 groupname = 'nogroup'
Fri Jul 13 16:04:53 2018 us=784410 chroot_dir = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784415 cd_dir = '/etc/openvpn'
Fri Jul 13 16:04:53 2018 us=784418 writepid = '/var/run/openvpn.server.pid'
Fri Jul 13 16:04:53 2018 us=784422 up_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784426 down_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784429 down_pre = DISABLED
Fri Jul 13 16:04:53 2018 us=784432 up_restart = DISABLED
Fri Jul 13 16:04:53 2018 us=784436 up_delay = DISABLED
Fri Jul 13 16:04:53 2018 us=784439 daemon = ENABLED
Fri Jul 13 16:04:53 2018 us=784443 inetd = 0
Fri Jul 13 16:04:53 2018 us=784446 log = ENABLED
Fri Jul 13 16:04:53 2018 us=784450 suppress_timestamps = DISABLED
Fri Jul 13 16:04:53 2018 us=784453 nice = 0
Fri Jul 13 16:04:53 2018 us=784457 verbosity = 4
Fri Jul 13 16:04:53 2018 us=784460 mute = 0
Fri Jul 13 16:04:53 2018 us=784464 gremlin = 0
Fri Jul 13 16:04:53 2018 us=784467 status_file = 'openvpn-status.log'
Fri Jul 13 16:04:53 2018 us=784471 status_file_version = 1
Fri Jul 13 16:04:53 2018 us=784475 status_file_update_freq = 60
Fri Jul 13 16:04:53 2018 us=784478 occ = ENABLED
Fri Jul 13 16:04:53 2018 us=784482 rcvbuf = 65536
Fri Jul 13 16:04:53 2018 us=784485 sndbuf = 65536
Fri Jul 13 16:04:53 2018 us=784488 sockflags = 0
Fri Jul 13 16:04:53 2018 us=784492 fast_io = DISABLED
Fri Jul 13 16:04:53 2018 us=784495 lzo = 7
Fri Jul 13 16:04:53 2018 us=784499 route_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784502 route_default_gateway = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784506 route_default_metric = 0
Fri Jul 13 16:04:53 2018 us=784510 route_noexec = DISABLED
Fri Jul 13 16:04:53 2018 us=784516 route_delay = 0
Fri Jul 13 16:04:53 2018 us=784522 route_delay_window = 30
Fri Jul 13 16:04:53 2018 us=784526 route_delay_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=784530 route_nopull = DISABLED
Fri Jul 13 16:04:53 2018 us=784533 route_gateway_via_dhcp = DISABLED
Fri Jul 13 16:04:53 2018 us=784537 max_routes = 100
Fri Jul 13 16:04:53 2018 us=784541 allow_pull_fqdn = DISABLED
Fri Jul 13 16:04:53 2018 us=784547 route 192.168.1.0/255.255.255.0/nil/nil
Fri Jul 13 16:04:53 2018 us=784551 route 192.168.2.0/255.255.255.0/nil/nil
Fri Jul 13 16:04:53 2018 us=784555 route 10.8.0.0/255.255.255.0/nil/nil
Fri Jul 13 16:04:53 2018 us=784559 management_addr = 'localhost'
Fri Jul 13 16:04:53 2018 us=784563 management_port = 7505
Fri Jul 13 16:04:53 2018 us=784566 management_user_pass = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784570 management_log_history_cache = 250
Fri Jul 13 16:04:53 2018 us=784574 management_echo_buffer_size = 100
Fri Jul 13 16:04:53 2018 us=784578 management_write_peer_info_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784581 management_client_user = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784585 management_client_group = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784589 management_flags = 0
Fri Jul 13 16:04:53 2018 us=784592 shared_secret_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784596 key_direction = 0
Fri Jul 13 16:04:53 2018 us=784600 ciphername_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=784603 ciphername = 'BF-CBC'
Fri Jul 13 16:04:53 2018 us=784607 authname_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=784610 authname = 'SHA1'
Fri Jul 13 16:04:53 2018 us=784614 prng_hash = 'SHA1'
Fri Jul 13 16:04:53 2018 us=784618 prng_nonce_secret_len = 16
Fri Jul 13 16:04:53 2018 us=784621 keysize = 0
Fri Jul 13 16:04:53 2018 us=784625 engine = DISABLED
Fri Jul 13 16:04:53 2018 us=784628 replay = ENABLED
Fri Jul 13 16:04:53 2018 us=784632 mute_replay_warnings = DISABLED
Fri Jul 13 16:04:53 2018 us=784636 replay_window = 64
Fri Jul 13 16:04:53 2018 us=784639 replay_time = 15
Fri Jul 13 16:04:53 2018 us=784643 packet_id_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784646 use_iv = ENABLED
Fri Jul 13 16:04:53 2018 us=784650 test_crypto = DISABLED
Fri Jul 13 16:04:53 2018 us=784656 tls_server = ENABLED
Fri Jul 13 16:04:53 2018 us=784660 tls_client = DISABLED
Fri Jul 13 16:04:53 2018 us=784664 key_method = 2
Fri Jul 13 16:04:53 2018 us=784667 ca_file = 'ca.crt'
Fri Jul 13 16:04:53 2018 us=784673 ca_path = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784679 dh_file = 'dh2048.pem'
Fri Jul 13 16:04:53 2018 us=784683 cert_file = 'server.crt'
Fri Jul 13 16:04:53 2018 us=784687 priv_key_file = 'server.key'
Fri Jul 13 16:04:53 2018 us=784690 pkcs12_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784694 cipher_list = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784698 tls_verify = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784704 tls_export_cert = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784708 tls_remote = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784711 crl_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784715 ns_cert_type = 0
Fri Jul 13 16:04:53 2018 us=784718 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784722 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784725 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784729 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784732 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784736 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784739 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784744 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784750 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784755 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784759 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784762 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784766 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784769 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784772 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784776 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784779 remote_cert_eku = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784783 tls_timeout = 2
Fri Jul 13 16:04:53 2018 us=784786 renegotiate_bytes = 0
Fri Jul 13 16:04:53 2018 us=784790 renegotiate_packets = 0
Fri Jul 13 16:04:53 2018 us=784793 renegotiate_seconds = 3600
Fri Jul 13 16:04:53 2018 us=784797 handshake_window = 60
Fri Jul 13 16:04:53 2018 us=784800 transition_window = 3600
Fri Jul 13 16:04:53 2018 us=784804 single_session = DISABLED
Fri Jul 13 16:04:53 2018 us=784807 push_peer_info = DISABLED
Fri Jul 13 16:04:53 2018 us=784811 tls_exit = DISABLED
Fri Jul 13 16:04:53 2018 us=784814 tls_auth_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784818 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784822 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784826 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784829 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784833 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784836 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784840 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784843 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784847 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784850 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784856 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784860 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784864 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784867 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784871 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784874 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784878 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784881 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784885 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784888 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784892 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784898 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784901 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784905 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784908 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784911 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784915 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784919 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784925 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784929 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784933 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784936 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784939 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784943 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784947 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784953 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784956 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784960 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784963 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784967 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784970 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784973 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784977 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784980 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784984 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784988 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784994 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784997 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=785001 pkcs11_pin_cache_period = -1
Fri Jul 13 16:04:53 2018 us=785005 pkcs11_id = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785008 pkcs11_id_management = DISABLED
Fri Jul 13 16:04:53 2018 us=785014 server_network = 10.8.0.0
Fri Jul 13 16:04:53 2018 us=785018 server_netmask = 255.255.255.0
Fri Jul 13 16:04:53 2018 us=785029 server_network_ipv6 = ::
Fri Jul 13 16:04:53 2018 us=785036 server_netbits_ipv6 = 0
Fri Jul 13 16:04:53 2018 us=785042 server_bridge_ip = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785049 server_bridge_netmask = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785056 server_bridge_pool_start = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785063 server_bridge_pool_end = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785068 push_entry = 'route 192.168.1.0 255.255.255.0'
Fri Jul 13 16:04:53 2018 us=785072 push_entry = 'route 192.168.2.0 255.255.255.0'
Fri Jul 13 16:04:53 2018 us=785076 push_entry = 'redirect-gateway def1 bypass-dhcp'
Fri Jul 13 16:04:53 2018 us=785080 push_entry = 'dhcp-option DNS 208.67.222.222'
Fri Jul 13 16:04:53 2018 us=785084 push_entry = 'dhcp-option DNS 208.67.220.220'
Fri Jul 13 16:04:53 2018 us=785087 push_entry = 'route 10.8.0.1'
Fri Jul 13 16:04:53 2018 us=785091 push_entry = 'topology net30'
Fri Jul 13 16:04:53 2018 us=785095 push_entry = 'ping 10'
Fri Jul 13 16:04:53 2018 us=785100 push_entry = 'ping-restart 120'
Fri Jul 13 16:04:53 2018 us=785106 ifconfig_pool_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=785110 ifconfig_pool_start = 10.8.0.4
Fri Jul 13 16:04:53 2018 us=785114 ifconfig_pool_end = 10.8.0.251
Fri Jul 13 16:04:53 2018 us=785118 ifconfig_pool_netmask = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785122 ifconfig_pool_persist_filename = 'ipp.txt'
Fri Jul 13 16:04:53 2018 us=785126 ifconfig_pool_persist_refresh_freq = 600
Fri Jul 13 16:04:53 2018 us=785129 ifconfig_ipv6_pool_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=785133 ifconfig_ipv6_pool_base = ::
Fri Jul 13 16:04:53 2018 us=785137 ifconfig_ipv6_pool_netbits = 0
Fri Jul 13 16:04:53 2018 us=785141 n_bcast_buf = 256
Fri Jul 13 16:04:53 2018 us=785144 tcp_queue_limit = 64
Fri Jul 13 16:04:53 2018 us=785148 real_hash_size = 256
Fri Jul 13 16:04:53 2018 us=785151 virtual_hash_size = 256
Fri Jul 13 16:04:53 2018 us=785157 client_connect_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785161 learn_address_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785165 client_disconnect_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785168 client_config_dir = '/etc/openvpn/ccd'
Fri Jul 13 16:04:53 2018 us=785172 ccd_exclusive = DISABLED
Fri Jul 13 16:04:53 2018 us=785176 tmp_dir = '/tmp'
Fri Jul 13 16:04:53 2018 us=785179 push_ifconfig_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=785183 push_ifconfig_local = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785190 push_ifconfig_remote_netmask = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785196 push_ifconfig_ipv6_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=785201 push_ifconfig_ipv6_local = ::/0
Fri Jul 13 16:04:53 2018 us=785205 push_ifconfig_ipv6_remote = ::
Fri Jul 13 16:04:53 2018 us=785208 enable_c2c = DISABLED
Fri Jul 13 16:04:53 2018 us=785212 duplicate_cn = DISABLED
Fri Jul 13 16:04:53 2018 us=785256 cf_max = 0
Fri Jul 13 16:04:53 2018 us=785264 cf_per = 0
Fri Jul 13 16:04:53 2018 us=785268 max_clients = 1024
Fri Jul 13 16:04:53 2018 us=785271 max_routes_per_client = 256
Fri Jul 13 16:04:53 2018 us=785275 auth_user_pass_verify_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785279 auth_user_pass_verify_script_via_file = DISABLED
Fri Jul 13 16:04:53 2018 us=785284 ssl_flags = 0
Fri Jul 13 16:04:53 2018 us=785290 port_share_host = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785294 port_share_port = 0
Fri Jul 13 16:04:53 2018 us=785298 client = DISABLED
Fri Jul 13 16:04:53 2018 us=785303 pull = DISABLED
Fri Jul 13 16:04:53 2018 us=785309 auth_user_pass_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785314 OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Fri Jul 13 16:04:53 2018 us=785574 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7505
Fri Jul 13 16:04:53 2018 us=785708 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Jul 13 16:04:53 2018 us=815928 Diffie-Hellman initialized with 2048 bit key
Fri Jul 13 16:04:53 2018 us=863767 TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:04:53 2018 us=863798 Socket Buffers: R=[229376->131072] S=[229376->131072]
Fri Jul 13 16:04:53 2018 us=863893 ROUTE default_gateway=31.14.138.1
Fri Jul 13 16:04:53 2018 us=868525 TUN/TAP device tun0 opened
Fri Jul 13 16:04:53 2018 us=868556 TUN/TAP TX queue length set to 100
Fri Jul 13 16:04:53 2018 us=868572 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Jul 13 16:04:53 2018 us=868593 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Fri Jul 13 16:04:53 2018 us=875631 /sbin/route add -net 192.168.1.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 16:04:53 2018 us=886319 /sbin/route add -net 192.168.2.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 16:04:53 2018 us=891963 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 16:04:53 2018 us=898421 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:04:53 2018 us=973581 GID set to nogroup
Fri Jul 13 16:04:53 2018 us=973630 UID set to nobody
Fri Jul 13 16:04:53 2018 us=973650 UDPv4 link local (bound): [undef]
Fri Jul 13 16:04:53 2018 us=973656 UDPv4 link remote: [undef]
Fri Jul 13 16:04:53 2018 us=973664 MULTI: multi_init called, r=256 v=256
Fri Jul 13 16:04:53 2018 us=973714 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Fri Jul 13 16:04:53 2018 us=973970 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=973996 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974002 ifconfig_pool_read(), in='client1,10.8.0.8', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974006 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974011 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.12', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974017 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974022 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.16', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974032 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974037 ifconfig_pool_read(), in='clientCorato,10.8.0.20', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974041 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974044 ifconfig_pool_read(), in='clientGenius,10.8.0.24', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974049 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974053 ifconfig_pool_read(), in='clientGenius,10.8.0.28', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974057 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974061 ifconfig_pool_read(), in='clientFormello,10.8.0.32', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974065 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974075 IFCONFIG POOL LIST
Fri Jul 13 16:04:53 2018 us=974084 client1,10.8.0.4
Fri Jul 13 16:04:53 2018 us=974089 client1,10.8.0.8
Fri Jul 13 16:04:53 2018 us=974093 clientTerlizzi,10.8.0.12
Fri Jul 13 16:04:53 2018 us=974098 clientTerlizzi,10.8.0.16
Fri Jul 13 16:04:53 2018 us=974102 clientCorato,10.8.0.20
Fri Jul 13 16:04:53 2018 us=974106 clientGenius,10.8.0.24
Fri Jul 13 16:04:53 2018 us=974110 clientGenius,10.8.0.28
Fri Jul 13 16:04:53 2018 us=974114 clientFormello,10.8.0.32
Fri Jul 13 16:04:53 2018 us=974144 Initialization Sequence Completed
Fri Jul 13 16:05:01 2018 us=312358 MULTI: multi_create_instance called
Fri Jul 13 16:05:01 2018 us=312423 91.252.248.238:7105 Re-using SSL/TLS context
Fri Jul 13 16:05:01 2018 us=312456 91.252.248.238:7105 LZO compression initialized
Fri Jul 13 16:05:01 2018 us=312598 91.252.248.238:7105 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:01 2018 us=312610 91.252.248.238:7105 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:01 2018 us=312642 91.252.248.238:7105 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:01 2018 us=312648 91.252.248.238:7105 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:01 2018 us=312661 91.252.248.238:7105 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:01 2018 us=312669 91.252.248.238:7105 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:01 2018 us=312695 91.252.248.238:7105 TLS: Initial packet from [AF_INET]91.252.248.238:7105, sid=4d82684d 26d258ec
Fri Jul 13 16:05:03 2018 us=182433 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:03 2018 us=262142 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:05 2018 us=179477 MULTI: multi_create_instance called
Fri Jul 13 16:05:05 2018 us=179541 91.252.248.238:6336 Re-using SSL/TLS context
Fri Jul 13 16:05:05 2018 us=179566 91.252.248.238:6336 LZO compression initialized
Fri Jul 13 16:05:05 2018 us=179653 91.252.248.238:6336 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:05 2018 us=179666 91.252.248.238:6336 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:05 2018 us=179691 91.252.248.238:6336 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:05 2018 us=179697 91.252.248.238:6336 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:05 2018 us=179708 91.252.248.238:6336 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:05 2018 us=179717 91.252.248.238:6336 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:05 2018 us=179737 91.252.248.238:6336 TLS: Initial packet from [AF_INET]91.252.248.238:6336, sid=de086851 4f182ae6
Fri Jul 13 16:05:05 2018 us=945528 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:06 2018 us=226121 read UDPv4 [ECONNREFUSED|ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:07 2018 us=566354 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:07 2018 us=840020 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:07 2018 us=860551 MULTI: multi_create_instance called
Fri Jul 13 16:05:07 2018 us=860609 91.252.248.238:6405 Re-using SSL/TLS context
Fri Jul 13 16:05:07 2018 us=860628 91.252.248.238:6405 LZO compression initialized
Fri Jul 13 16:05:07 2018 us=860698 91.252.248.238:6405 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:07 2018 us=860707 91.252.248.238:6405 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:07 2018 us=860731 91.252.248.238:6405 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:07 2018 us=860736 91.252.248.238:6405 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:07 2018 us=860747 91.252.248.238:6405 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:07 2018 us=860754 91.252.248.238:6405 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:07 2018 us=860773 91.252.248.238:6405 TLS: Initial packet from [AF_INET]91.252.248.238:6405, sid=eea32e09 2055592f
Fri Jul 13 16:05:08 2018 us=263354 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:08 2018 us=686719 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:08 2018 us=966114 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:09 2018 us=565743 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:10 2018 us=601928 MULTI: multi_create_instance called
Fri Jul 13 16:05:10 2018 us=601996 91.252.248.238:6914 Re-using SSL/TLS context
Fri Jul 13 16:05:10 2018 us=602016 91.252.248.238:6914 LZO compression initialized
Fri Jul 13 16:05:10 2018 us=602086 91.252.248.238:6914 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:10 2018 us=602098 91.252.248.238:6914 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:10 2018 us=602122 91.252.248.238:6914 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:10 2018 us=602128 91.252.248.238:6914 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:10 2018 us=602138 91.252.248.238:6914 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:10 2018 us=602146 91.252.248.238:6914 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:10 2018 us=602165 91.252.248.238:6914 TLS: Initial packet from [AF_INET]91.252.248.238:6914, sid=9f85b15f 17f9f80f
Fri Jul 13 16:05:10 2018 us=738332 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:11 2018 us=171986 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:12 2018 us=514723 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:13 2018 us=394387 MULTI: multi_create_instance called
Fri Jul 13 16:05:13 2018 us=394455 91.252.248.238:6849 Re-using SSL/TLS context
Fri Jul 13 16:05:13 2018 us=394474 91.252.248.238:6849 LZO compression initialized
Fri Jul 13 16:05:13 2018 us=394546 91.252.248.238:6849 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:13 2018 us=394555 91.252.248.238:6849 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:13 2018 us=394579 91.252.248.238:6849 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:13 2018 us=394585 91.252.248.238:6849 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:13 2018 us=394602 91.252.248.238:6849 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:13 2018 us=394610 91.252.248.238:6849 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:13 2018 us=394629 91.252.248.238:6849 TLS: Initial packet from [AF_INET]91.252.248.238:6849, sid=2ecca58e 31b46d00
Fri Jul 13 16:05:13 2018 us=562469 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:14 2018 us=35355 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:15 2018 us=577297 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:16 2018 us=179214 MULTI: multi_create_instance called
Fri Jul 13 16:05:16 2018 us=179276 91.252.248.238:6273 Re-using SSL/TLS context
Fri Jul 13 16:05:16 2018 us=179297 91.252.248.238:6273 LZO compression initialized
Fri Jul 13 16:05:16 2018 us=179364 91.252.248.238:6273 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:16 2018 us=179373 91.252.248.238:6273 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:16 2018 us=179398 91.252.248.238:6273 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:16 2018 us=179404 91.252.248.238:6273 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:16 2018 us=179414 91.252.248.238:6273 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:16 2018 us=179422 91.252.248.238:6273 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:16 2018 us=179444 91.252.248.238:6273 TLS: Initial packet from [AF_INET]91.252.248.238:6273, sid=1418c793 b77e4189
Fri Jul 13 16:05:16 2018 us=299343 91.252.248.238:6273 write UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:17 2018 us=894483 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:17 2018 us=983641 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:20 2018 us=125493 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:20 2018 us=226266 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:20 2018 us=761776 MULTI: multi_create_instance called
Fri Jul 13 16:05:20 2018 us=761838 91.252.248.238:6977 Re-using SSL/TLS context
Fri Jul 13 16:05:20 2018 us=761858 91.252.248.238:6977 LZO compression initialized
Fri Jul 13 16:05:20 2018 us=761935 91.252.248.238:6977 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:20 2018 us=761945 91.252.248.238:6977 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:20 2018 us=761972 91.252.248.238:6977 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:20 2018 us=761978 91.252.248.238:6977 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:20 2018 us=761989 91.252.248.238:6977 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:20 2018 us=761996 91.252.248.238:6977 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:20 2018 us=762017 91.252.248.238:6977 TLS: Initial packet from [AF_INET]91.252.248.238:6977, sid=8799ad62 fb170db2
Fri Jul 13 16:05:21 2018 us=446774 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:22 2018 us=67549 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:23 2018 us=225731 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:23 2018 us=830772 MULTI: multi_create_instance called
Fri Jul 13 16:05:23 2018 us=830852 91.252.248.238:6529 Re-using SSL/TLS context
Fri Jul 13 16:05:23 2018 us=830882 91.252.248.238:6529 LZO compression initialized
Fri Jul 13 16:05:23 2018 us=830951 91.252.248.238:6529 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:23 2018 us=830960 91.252.248.238:6529 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:23 2018 us=830995 91.252.248.238:6529 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:23 2018 us=831001 91.252.248.238:6529 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:23 2018 us=831012 91.252.248.238:6529 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:23 2018 us=831019 91.252.248.238:6529 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:23 2018 us=831040 91.252.248.238:6529 TLS: Initial packet from [AF_INET]91.252.248.238:6529, sid=b6699ad1 d9e1a5f7
Fri Jul 13 16:05:24 2018 us=262829 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:25 2018 us=199120 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:26 2018 us=299887 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:26 2018 us=752448 MULTI: multi_create_instance called
Fri Jul 13 16:05:26 2018 us=752523 91.252.248.238:6979 Re-using SSL/TLS context
Fri Jul 13 16:05:26 2018 us=752547 91.252.248.238:6979 LZO compression initialized
Fri Jul 13 16:05:26 2018 us=752636 91.252.248.238:6979 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:26 2018 us=752647 91.252.248.238:6979 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:26 2018 us=752673 91.252.248.238:6979 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:26 2018 us=752679 91.252.248.238:6979 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:26 2018 us=752690 91.252.248.238:6979 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:26 2018 us=752697 91.252.248.238:6979 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:26 2018 us=752718 91.252.248.238:6979 TLS: Initial packet from [AF_INET]91.252.248.238:6979, sid=1667e0cb fa86d6fe
Fri Jul 13 16:05:27 2018 us=343183 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:28 2018 us=292540 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:29 2018 us=243842 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:29 2018 us=762102 MULTI: multi_create_instance called
Fri Jul 13 16:05:29 2018 us=762170 91.252.248.238:6851 Re-using SSL/TLS context
Fri Jul 13 16:05:29 2018 us=762193 91.252.248.238:6851 LZO compression initialized
Fri Jul 13 16:05:29 2018 us=762307 91.252.248.238:6851 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:29 2018 us=762318 91.252.248.238:6851 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:29 2018 us=762346 91.252.248.238:6851 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:29 2018 us=762352 91.252.248.238:6851 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:29 2018 us=762363 91.252.248.238:6851 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:29 2018 us=762371 91.252.248.238:6851 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:29 2018 us=762392 91.252.248.238:6851 TLS: Initial packet from [AF_INET]91.252.248.238:6851, sid=2169363a fe1c8d78
Fri Jul 13 16:05:30 2018 us=185047 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:31 2018 us=36903 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:32 2018 us=183273 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:32 2018 us=685018 MULTI: multi_create_instance called
Fri Jul 13 16:05:32 2018 us=685078 91.252.248.238:7042 Re-using SSL/TLS context
Fri Jul 13 16:05:32 2018 us=685097 91.252.248.238:7042 LZO compression initialized
Fri Jul 13 16:05:32 2018 us=685163 91.252.248.238:7042 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:32 2018 us=685172 91.252.248.238:7042 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:32 2018 us=685197 91.252.248.238:7042 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:32 2018 us=685203 91.252.248.238:7042 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:32 2018 us=685214 91.252.248.238:7042 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:32 2018 us=685222 91.252.248.238:7042 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:32 2018 us=685243 91.252.248.238:7042 TLS: Initial packet from [AF_INET]91.252.248.238:7042, sid=bbecfea3 5cdf4489
Fri Jul 13 16:05:33 2018 us=642040 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:34 2018 us=91768 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:35 2018 us=167265 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:35 2018 us=589663 MULTI: multi_create_instance called
Fri Jul 13 16:05:35 2018 us=589720 91.252.248.238:6144 Re-using SSL/TLS context
Fri Jul 13 16:05:35 2018 us=589744 91.252.248.238:6144 LZO compression initialized
Fri Jul 13 16:05:35 2018 us=589811 91.252.248.238:6144 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:35 2018 us=589821 91.252.248.238:6144 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:35 2018 us=589847 91.252.248.238:6144 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:35 2018 us=589853 91.252.248.238:6144 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:35 2018 us=589864 91.252.248.238:6144 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:35 2018 us=589871 91.252.248.238:6144 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:35 2018 us=589892 91.252.248.238:6144 TLS: Initial packet from [AF_INET]91.252.248.238:6144, sid=6fac5cb6 455de89d
Fri Jul 13 16:05:36 2018 us=76623 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:37 2018 us=56768 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:38 2018 us=202441 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:38 2018 us=585379 MULTI: multi_create_instance called
Fri Jul 13 16:05:38 2018 us=585449 91.252.248.238:6145 Re-using SSL/TLS context
Fri Jul 13 16:05:38 2018 us=585473 91.252.248.238:6145 LZO compression initialized
Fri Jul 13 16:05:38 2018 us=585566 91.252.248.238:6145 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:38 2018 us=585576 91.252.248.238:6145 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:38 2018 us=585604 91.252.248.238:6145 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:38 2018 us=585610 91.252.248.238:6145 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:38 2018 us=585630 91.252.248.238:6145 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:38 2018 us=585639 91.252.248.238:6145 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:38 2018 us=585660 91.252.248.238:6145 TLS: Initial packet from [AF_INET]91.252.248.238:6145, sid=9819fb47 fc2b2dc6
Fri Jul 13 16:05:39 2018 us=162085 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:40 2018 us=276396 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:41 2018 us=157674 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:41 2018 us=431687 MULTI: multi_create_instance called
Fri Jul 13 16:05:41 2018 us=431754 91.252.248.238:6531 Re-using SSL/TLS context
Fri Jul 13 16:05:41 2018 us=431774 91.252.248.238:6531 LZO compression initialized
Fri Jul 13 16:05:41 2018 us=431841 91.252.248.238:6531 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:41 2018 us=431850 91.252.248.238:6531 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:41 2018 us=431875 91.252.248.238:6531 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:41 2018 us=431881 91.252.248.238:6531 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:41 2018 us=431891 91.252.248.238:6531 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:41 2018 us=431899 91.252.248.238:6531 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:41 2018 us=431922 91.252.248.238:6531 TLS: Initial packet from [AF_INET]91.252.248.238:6531, sid=a8eba190 7923d023
Fri Jul 13 16:05:42 2018 us=191695 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:43 2018 us=184536 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:44 2018 us=365515 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:44 2018 us=442695 MULTI: multi_create_instance called
Fri Jul 13 16:05:44 2018 us=442754 91.252.248.238:6338 Re-using SSL/TLS context
Fri Jul 13 16:05:44 2018 us=442773 91.252.248.238:6338 LZO compression initialized
Fri Jul 13 16:05:44 2018 us=442842 91.252.248.238:6338 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:44 2018 us=442851 91.252.248.238:6338 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:44 2018 us=442886 91.252.248.238:6338 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:44 2018 us=442893 91.252.248.238:6338 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:44 2018 us=442903 91.252.248.238:6338 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:44 2018 us=442911 91.252.248.238:6338 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:44 2018 us=442935 91.252.248.238:6338 TLS: Initial packet from [AF_INET]91.252.248.238:6338, sid=9961c480 7b685ae0
Fri Jul 13 16:05:45 2018 us=163288 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:46 2018 us=566252 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:47 2018 us=237915 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:47 2018 us=342979 MULTI: multi_create_instance called
Fri Jul 13 16:05:47 2018 us=343040 91.252.248.238:6785 Re-using SSL/TLS context
Fri Jul 13 16:05:47 2018 us=343059 91.252.248.238:6785 LZO compression initialized
Fri Jul 13 16:05:47 2018 us=343128 91.252.248.238:6785 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:47 2018 us=343144 91.252.248.238:6785 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:47 2018 us=343172 91.252.248.238:6785 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:47 2018 us=343180 91.252.248.238:6785 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:47 2018 us=343191 91.252.248.238:6785 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:47 2018 us=343199 91.252.248.238:6785 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:47 2018 us=343225 91.252.248.238:6785 TLS: Initial packet from [AF_INET]91.252.248.238:6785, sid=ddad2f48 d843201b
Fri Jul 13 16:05:48 2018 us=156426 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:49 2018 us=157262 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:50 2018 us=172763 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:50 2018 us=297472 MULTI: multi_create_instance called
Fri Jul 13 16:05:50 2018 us=297544 91.252.248.238:6912 Re-using SSL/TLS context
Fri Jul 13 16:05:50 2018 us=297569 91.252.248.238:6912 LZO compression initialized
Fri Jul 13 16:05:50 2018 us=297636 91.252.248.238:6912 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:50 2018 us=297645 91.252.248.238:6912 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:50 2018 us=297670 91.252.248.238:6912 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:50 2018 us=297678 91.252.248.238:6912 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:50 2018 us=297690 91.252.248.238:6912 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:50 2018 us=297697 91.252.248.238:6912 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:50 2018 us=297719 91.252.248.238:6912 TLS: Initial packet from [AF_INET]91.252.248.238:6912, sid=4462447f 22760f74
Fri Jul 13 16:05:51 2018 us=146162 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:52 2018 us=738072 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:53 2018 us=21884 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:53 2018 us=446375 MULTI: multi_create_instance called
Fri Jul 13 16:05:53 2018 us=446442 91.252.248.238:6337 Re-using SSL/TLS context
Fri Jul 13 16:05:53 2018 us=446461 91.252.248.238:6337 LZO compression initialized
Fri Jul 13 16:05:53 2018 us=446532 91.252.248.238:6337 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:53 2018 us=446542 91.252.248.238:6337 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:53 2018 us=446569 91.252.248.238:6337 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:53 2018 us=446575 91.252.248.238:6337 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:53 2018 us=446586 91.252.248.238:6337 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:53 2018 us=446594 91.252.248.238:6337 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:53 2018 us=446617 91.252.248.238:6337 TLS: Initial packet from [AF_INET]91.252.248.238:6337, sid=3cff633d e1b30229
Fri Jul 13 16:05:54 2018 us=142131 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:55 2018 us=37582 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:56 2018 us=35240 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:56 2018 us=397207 MULTI: multi_create_instance called
Fri Jul 13 16:05:56 2018 us=397274 91.252.248.238:6658 Re-using SSL/TLS context
Fri Jul 13 16:05:56 2018 us=397292 91.252.248.238:6658 LZO compression initialized
Fri Jul 13 16:05:56 2018 us=397358 91.252.248.238:6658 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:56 2018 us=397369 91.252.248.238:6658 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:56 2018 us=397397 91.252.248.238:6658 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:56 2018 us=397403 91.252.248.238:6658 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:56 2018 us=397414 91.252.248.238:6658 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:56 2018 us=397421 91.252.248.238:6658 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:56 2018 us=397444 91.252.248.238:6658 TLS: Initial packet from [AF_INET]91.252.248.238:6658, sid=e5ea8765 5c3934ad
Fri Jul 13 16:05:57 2018 us=153885 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:58 2018 us=224576 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:59 2018 us=94022 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:59 2018 us=378649 MULTI: multi_create_instance called
Fri Jul 13 16:05:59 2018 us=378717 91.252.248.238:6721 Re-using SSL/TLS context
Fri Jul 13 16:05:59 2018 us=378736 91.252.248.238:6721 LZO compression initialized
Fri Jul 13 16:05:59 2018 us=378803 91.252.248.238:6721 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:59 2018 us=378812 91.252.248.238:6721 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:59 2018 us=378835 91.252.248.238:6721 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:59 2018 us=378840 91.252.248.238:6721 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:59 2018 us=378851 91.252.248.238:6721 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:59 2018 us=378858 91.252.248.238:6721 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:59 2018 us=378880 91.252.248.238:6721 TLS: Initial packet from [AF_INET]91.252.248.238:6721, sid=f5573076 fc137172
Fri Jul 13 16:06:00 2018 us=188878 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:01 2018 us=254133 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:01 2018 us=513314 91.252.248.238:7105 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:01 2018 us=513352 91.252.248.238:7105 TLS Error: TLS handshake failed
Fri Jul 13 16:06:01 2018 us=513463 91.252.248.238:7105 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:02 2018 us=214846 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:02 2018 us=303625 MULTI: multi_create_instance called
Fri Jul 13 16:06:02 2018 us=303748 91.252.248.238:6916 Re-using SSL/TLS context
Fri Jul 13 16:06:02 2018 us=303779 91.252.248.238:6916 LZO compression initialized
Fri Jul 13 16:06:02 2018 us=303857 91.252.248.238:6916 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:02 2018 us=303872 91.252.248.238:6916 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:02 2018 us=303906 91.252.248.238:6916 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:02 2018 us=303926 91.252.248.238:6916 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:02 2018 us=303938 91.252.248.238:6916 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:02 2018 us=303946 91.252.248.238:6916 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:02 2018 us=303969 91.252.248.238:6916 TLS: Initial packet from [AF_INET]91.252.248.238:6916, sid=41a6a340 2628202d
Fri Jul 13 16:06:03 2018 us=152369 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:04 2018 us=146530 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:05 2018 us=45529 91.252.248.238:6336 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:05 2018 us=45566 91.252.248.238:6336 TLS Error: TLS handshake failed
Fri Jul 13 16:06:05 2018 us=45658 91.252.248.238:6336 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:05 2018 us=230947 MULTI: multi_create_instance called
Fri Jul 13 16:06:05 2018 us=231005 91.252.248.238:6275 Re-using SSL/TLS context
Fri Jul 13 16:06:05 2018 us=231027 91.252.248.238:6275 LZO compression initialized
Fri Jul 13 16:06:05 2018 us=231084 91.252.248.238:6275 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:05 2018 us=231092 91.252.248.238:6275 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:05 2018 us=231114 91.252.248.238:6275 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:05 2018 us=231119 91.252.248.238:6275 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:05 2018 us=231130 91.252.248.238:6275 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:05 2018 us=231137 91.252.248.238:6275 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:05 2018 us=231160 91.252.248.238:6275 TLS: Initial packet from [AF_INET]91.252.248.238:6275, sid=b7383f6b 7978ca7e
Fri Jul 13 16:06:05 2018 us=562156 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:06 2018 us=142288 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:07 2018 us=6288 91.252.248.238:6405 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:07 2018 us=6323 91.252.248.238:6405 TLS Error: TLS handshake failed
Fri Jul 13 16:06:07 2018 us=6388 91.252.248.238:6405 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:07 2018 us=487831 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:08 2018 us=196620 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:08 2018 us=433454 MULTI: multi_create_instance called
Fri Jul 13 16:06:08 2018 us=433506 91.252.248.238:6787 Re-using SSL/TLS context
Fri Jul 13 16:06:08 2018 us=433528 91.252.248.238:6787 LZO compression initialized
Fri Jul 13 16:06:08 2018 us=433585 91.252.248.238:6787 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:08 2018 us=433594 91.252.248.238:6787 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:08 2018 us=433617 91.252.248.238:6787 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:08 2018 us=433624 91.252.248.238:6787 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:08 2018 us=433634 91.252.248.238:6787 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:08 2018 us=433642 91.252.248.238:6787 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:08 2018 us=433672 91.252.248.238:6787 TLS: Initial packet from [AF_INET]91.252.248.238:6787, sid=2c3a7a75 6b5bcdf2
Fri Jul 13 16:06:09 2018 us=175549 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:10 2018 us=203649 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:10 2018 us=360796 91.252.248.238:6914 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:10 2018 us=360845 91.252.248.238:6914 TLS Error: TLS handshake failed
Fri Jul 13 16:06:10 2018 us=360939 91.252.248.238:6914 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:11 2018 us=112266 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:11 2018 us=376918 MULTI: multi_create_instance called
Fri Jul 13 16:06:11 2018 us=376981 91.252.248.238:6530 Re-using SSL/TLS context
Fri Jul 13 16:06:11 2018 us=377006 91.252.248.238:6530 LZO compression initialized
Fri Jul 13 16:06:11 2018 us=377065 91.252.248.238:6530 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:11 2018 us=377074 91.252.248.238:6530 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:11 2018 us=377097 91.252.248.238:6530 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:11 2018 us=377102 91.252.248.238:6530 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:11 2018 us=377114 91.252.248.238:6530 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:11 2018 us=377122 91.252.248.238:6530 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:11 2018 us=377147 91.252.248.238:6530 TLS: Initial packet from [AF_INET]91.252.248.238:6530, sid=ed435d77 195bd419
Fri Jul 13 16:06:12 2018 us=178830 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:13 2018 us=304948 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
here it the log at level 4 as required.
Antonio
Fri Jul 13 16:04:53 2018 us=779426 Current Parameter Settings:
Fri Jul 13 16:04:53 2018 us=779493 config = '/etc/openvpn/server.conf'
Fri Jul 13 16:04:53 2018 us=779504 mode = 1
Fri Jul 13 16:04:53 2018 us=779511 persist_config = DISABLED
Fri Jul 13 16:04:53 2018 us=779518 persist_mode = 1
Fri Jul 13 16:04:53 2018 us=779524 show_ciphers = DISABLED
Fri Jul 13 16:04:53 2018 us=779528 show_digests = DISABLED
Fri Jul 13 16:04:53 2018 us=779534 show_engines = DISABLED
Fri Jul 13 16:04:53 2018 us=779539 genkey = DISABLED
Fri Jul 13 16:04:53 2018 us=779542 key_pass_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779546 show_tls_ciphers = DISABLED
Fri Jul 13 16:04:53 2018 us=779551 Connection profiles [default]:
Fri Jul 13 16:04:53 2018 us=779556 proto = udp
Fri Jul 13 16:04:53 2018 us=779559 local = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779563 local_port = 1194
Fri Jul 13 16:04:53 2018 us=779566 remote = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779570 remote_port = 1194
Fri Jul 13 16:04:53 2018 us=779575 remote_float = DISABLED
Fri Jul 13 16:04:53 2018 us=779580 bind_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=779584 bind_local = ENABLED
Fri Jul 13 16:04:53 2018 us=779587 connect_retry_seconds = 5
Fri Jul 13 16:04:53 2018 us=779591 connect_timeout = 10
Fri Jul 13 16:04:53 2018 us=779595 connect_retry_max = 0
Fri Jul 13 16:04:53 2018 us=779601 socks_proxy_server = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779605 socks_proxy_port = 0
Fri Jul 13 16:04:53 2018 us=779608 socks_proxy_retry = DISABLED
Fri Jul 13 16:04:53 2018 us=779612 Connection profiles END
Fri Jul 13 16:04:53 2018 us=779615 remote_random = DISABLED
Fri Jul 13 16:04:53 2018 us=779619 ipchange = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779622 dev = 'tun'
Fri Jul 13 16:04:53 2018 us=779625 dev_type = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779629 dev_node = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779633 lladdr = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779637 topology = 1
Fri Jul 13 16:04:53 2018 us=779640 tun_ipv6 = DISABLED
Fri Jul 13 16:04:53 2018 us=779644 ifconfig_local = '10.8.0.1'
Fri Jul 13 16:04:53 2018 us=779647 ifconfig_remote_netmask = '10.8.0.2'
Fri Jul 13 16:04:53 2018 us=779651 ifconfig_noexec = DISABLED
Fri Jul 13 16:04:53 2018 us=779654 ifconfig_nowarn = DISABLED
Fri Jul 13 16:04:53 2018 us=779658 ifconfig_ipv6_local = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779661 ifconfig_ipv6_netbits = 0
Fri Jul 13 16:04:53 2018 us=779665 ifconfig_ipv6_remote = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779668 shaper = 0
Fri Jul 13 16:04:53 2018 us=779672 tun_mtu = 1500
Fri Jul 13 16:04:53 2018 us=779675 tun_mtu_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=779678 link_mtu = 1500
Fri Jul 13 16:04:53 2018 us=779682 link_mtu_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=779685 tun_mtu_extra = 0
Fri Jul 13 16:04:53 2018 us=779689 tun_mtu_extra_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=779692 fragment = 0
Fri Jul 13 16:04:53 2018 us=779698 mtu_discover_type = -1
Fri Jul 13 16:04:53 2018 us=779703 mtu_test = 0
Fri Jul 13 16:04:53 2018 us=779707 mlock = DISABLED
Fri Jul 13 16:04:53 2018 us=779710 keepalive_ping = 10
Fri Jul 13 16:04:53 2018 us=779714 keepalive_timeout = 120
Fri Jul 13 16:04:53 2018 us=779717 inactivity_timeout = 0
Fri Jul 13 16:04:53 2018 us=779721 ping_send_timeout = 10
Fri Jul 13 16:04:53 2018 us=779724 ping_rec_timeout = 240
Fri Jul 13 16:04:53 2018 us=784336 ping_rec_timeout_action = 2
Fri Jul 13 16:04:53 2018 us=784347 ping_timer_remote = DISABLED
Fri Jul 13 16:04:53 2018 us=784351 remap_sigusr1 = 0
Fri Jul 13 16:04:53 2018 us=784355 explicit_exit_notification = 0
Fri Jul 13 16:04:53 2018 us=784360 persist_tun = ENABLED
Fri Jul 13 16:04:53 2018 us=784364 persist_local_ip = DISABLED
Fri Jul 13 16:04:53 2018 us=784367 persist_remote_ip = DISABLED
Fri Jul 13 16:04:53 2018 us=784371 persist_key = ENABLED
Fri Jul 13 16:04:53 2018 us=784375 mssfix = 1450
Fri Jul 13 16:04:53 2018 us=784381 passtos = DISABLED
Fri Jul 13 16:04:53 2018 us=784388 resolve_retry_seconds = 1000000000
Fri Jul 13 16:04:53 2018 us=784400 username = 'nobody'
Fri Jul 13 16:04:53 2018 us=784404 groupname = 'nogroup'
Fri Jul 13 16:04:53 2018 us=784410 chroot_dir = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784415 cd_dir = '/etc/openvpn'
Fri Jul 13 16:04:53 2018 us=784418 writepid = '/var/run/openvpn.server.pid'
Fri Jul 13 16:04:53 2018 us=784422 up_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784426 down_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784429 down_pre = DISABLED
Fri Jul 13 16:04:53 2018 us=784432 up_restart = DISABLED
Fri Jul 13 16:04:53 2018 us=784436 up_delay = DISABLED
Fri Jul 13 16:04:53 2018 us=784439 daemon = ENABLED
Fri Jul 13 16:04:53 2018 us=784443 inetd = 0
Fri Jul 13 16:04:53 2018 us=784446 log = ENABLED
Fri Jul 13 16:04:53 2018 us=784450 suppress_timestamps = DISABLED
Fri Jul 13 16:04:53 2018 us=784453 nice = 0
Fri Jul 13 16:04:53 2018 us=784457 verbosity = 4
Fri Jul 13 16:04:53 2018 us=784460 mute = 0
Fri Jul 13 16:04:53 2018 us=784464 gremlin = 0
Fri Jul 13 16:04:53 2018 us=784467 status_file = 'openvpn-status.log'
Fri Jul 13 16:04:53 2018 us=784471 status_file_version = 1
Fri Jul 13 16:04:53 2018 us=784475 status_file_update_freq = 60
Fri Jul 13 16:04:53 2018 us=784478 occ = ENABLED
Fri Jul 13 16:04:53 2018 us=784482 rcvbuf = 65536
Fri Jul 13 16:04:53 2018 us=784485 sndbuf = 65536
Fri Jul 13 16:04:53 2018 us=784488 sockflags = 0
Fri Jul 13 16:04:53 2018 us=784492 fast_io = DISABLED
Fri Jul 13 16:04:53 2018 us=784495 lzo = 7
Fri Jul 13 16:04:53 2018 us=784499 route_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784502 route_default_gateway = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784506 route_default_metric = 0
Fri Jul 13 16:04:53 2018 us=784510 route_noexec = DISABLED
Fri Jul 13 16:04:53 2018 us=784516 route_delay = 0
Fri Jul 13 16:04:53 2018 us=784522 route_delay_window = 30
Fri Jul 13 16:04:53 2018 us=784526 route_delay_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=784530 route_nopull = DISABLED
Fri Jul 13 16:04:53 2018 us=784533 route_gateway_via_dhcp = DISABLED
Fri Jul 13 16:04:53 2018 us=784537 max_routes = 100
Fri Jul 13 16:04:53 2018 us=784541 allow_pull_fqdn = DISABLED
Fri Jul 13 16:04:53 2018 us=784547 route 192.168.1.0/255.255.255.0/nil/nil
Fri Jul 13 16:04:53 2018 us=784551 route 192.168.2.0/255.255.255.0/nil/nil
Fri Jul 13 16:04:53 2018 us=784555 route 10.8.0.0/255.255.255.0/nil/nil
Fri Jul 13 16:04:53 2018 us=784559 management_addr = 'localhost'
Fri Jul 13 16:04:53 2018 us=784563 management_port = 7505
Fri Jul 13 16:04:53 2018 us=784566 management_user_pass = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784570 management_log_history_cache = 250
Fri Jul 13 16:04:53 2018 us=784574 management_echo_buffer_size = 100
Fri Jul 13 16:04:53 2018 us=784578 management_write_peer_info_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784581 management_client_user = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784585 management_client_group = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784589 management_flags = 0
Fri Jul 13 16:04:53 2018 us=784592 shared_secret_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784596 key_direction = 0
Fri Jul 13 16:04:53 2018 us=784600 ciphername_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=784603 ciphername = 'BF-CBC'
Fri Jul 13 16:04:53 2018 us=784607 authname_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=784610 authname = 'SHA1'
Fri Jul 13 16:04:53 2018 us=784614 prng_hash = 'SHA1'
Fri Jul 13 16:04:53 2018 us=784618 prng_nonce_secret_len = 16
Fri Jul 13 16:04:53 2018 us=784621 keysize = 0
Fri Jul 13 16:04:53 2018 us=784625 engine = DISABLED
Fri Jul 13 16:04:53 2018 us=784628 replay = ENABLED
Fri Jul 13 16:04:53 2018 us=784632 mute_replay_warnings = DISABLED
Fri Jul 13 16:04:53 2018 us=784636 replay_window = 64
Fri Jul 13 16:04:53 2018 us=784639 replay_time = 15
Fri Jul 13 16:04:53 2018 us=784643 packet_id_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784646 use_iv = ENABLED
Fri Jul 13 16:04:53 2018 us=784650 test_crypto = DISABLED
Fri Jul 13 16:04:53 2018 us=784656 tls_server = ENABLED
Fri Jul 13 16:04:53 2018 us=784660 tls_client = DISABLED
Fri Jul 13 16:04:53 2018 us=784664 key_method = 2
Fri Jul 13 16:04:53 2018 us=784667 ca_file = 'ca.crt'
Fri Jul 13 16:04:53 2018 us=784673 ca_path = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784679 dh_file = 'dh2048.pem'
Fri Jul 13 16:04:53 2018 us=784683 cert_file = 'server.crt'
Fri Jul 13 16:04:53 2018 us=784687 priv_key_file = 'server.key'
Fri Jul 13 16:04:53 2018 us=784690 pkcs12_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784694 cipher_list = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784698 tls_verify = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784704 tls_export_cert = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784708 tls_remote = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784711 crl_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784715 ns_cert_type = 0
Fri Jul 13 16:04:53 2018 us=784718 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784722 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784725 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784729 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784732 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784736 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784739 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784744 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784750 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784755 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784759 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784762 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784766 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784769 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784772 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784776 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784779 remote_cert_eku = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784783 tls_timeout = 2
Fri Jul 13 16:04:53 2018 us=784786 renegotiate_bytes = 0
Fri Jul 13 16:04:53 2018 us=784790 renegotiate_packets = 0
Fri Jul 13 16:04:53 2018 us=784793 renegotiate_seconds = 3600
Fri Jul 13 16:04:53 2018 us=784797 handshake_window = 60
Fri Jul 13 16:04:53 2018 us=784800 transition_window = 3600
Fri Jul 13 16:04:53 2018 us=784804 single_session = DISABLED
Fri Jul 13 16:04:53 2018 us=784807 push_peer_info = DISABLED
Fri Jul 13 16:04:53 2018 us=784811 tls_exit = DISABLED
Fri Jul 13 16:04:53 2018 us=784814 tls_auth_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784818 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784822 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784826 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784829 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784833 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784836 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784840 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784843 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784847 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784850 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784856 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784860 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784864 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784867 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784871 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784874 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784878 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784881 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784885 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784888 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784892 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784898 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784901 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784905 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784908 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784911 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784915 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784919 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784925 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784929 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784933 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784936 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784939 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784943 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784947 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784953 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784956 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784960 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784963 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784967 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784970 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784973 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784977 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784980 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784984 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784988 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784994 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784997 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=785001 pkcs11_pin_cache_period = -1
Fri Jul 13 16:04:53 2018 us=785005 pkcs11_id = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785008 pkcs11_id_management = DISABLED
Fri Jul 13 16:04:53 2018 us=785014 server_network = 10.8.0.0
Fri Jul 13 16:04:53 2018 us=785018 server_netmask = 255.255.255.0
Fri Jul 13 16:04:53 2018 us=785029 server_network_ipv6 = ::
Fri Jul 13 16:04:53 2018 us=785036 server_netbits_ipv6 = 0
Fri Jul 13 16:04:53 2018 us=785042 server_bridge_ip = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785049 server_bridge_netmask = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785056 server_bridge_pool_start = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785063 server_bridge_pool_end = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785068 push_entry = 'route 192.168.1.0 255.255.255.0'
Fri Jul 13 16:04:53 2018 us=785072 push_entry = 'route 192.168.2.0 255.255.255.0'
Fri Jul 13 16:04:53 2018 us=785076 push_entry = 'redirect-gateway def1 bypass-dhcp'
Fri Jul 13 16:04:53 2018 us=785080 push_entry = 'dhcp-option DNS 208.67.222.222'
Fri Jul 13 16:04:53 2018 us=785084 push_entry = 'dhcp-option DNS 208.67.220.220'
Fri Jul 13 16:04:53 2018 us=785087 push_entry = 'route 10.8.0.1'
Fri Jul 13 16:04:53 2018 us=785091 push_entry = 'topology net30'
Fri Jul 13 16:04:53 2018 us=785095 push_entry = 'ping 10'
Fri Jul 13 16:04:53 2018 us=785100 push_entry = 'ping-restart 120'
Fri Jul 13 16:04:53 2018 us=785106 ifconfig_pool_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=785110 ifconfig_pool_start = 10.8.0.4
Fri Jul 13 16:04:53 2018 us=785114 ifconfig_pool_end = 10.8.0.251
Fri Jul 13 16:04:53 2018 us=785118 ifconfig_pool_netmask = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785122 ifconfig_pool_persist_filename = 'ipp.txt'
Fri Jul 13 16:04:53 2018 us=785126 ifconfig_pool_persist_refresh_freq = 600
Fri Jul 13 16:04:53 2018 us=785129 ifconfig_ipv6_pool_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=785133 ifconfig_ipv6_pool_base = ::
Fri Jul 13 16:04:53 2018 us=785137 ifconfig_ipv6_pool_netbits = 0
Fri Jul 13 16:04:53 2018 us=785141 n_bcast_buf = 256
Fri Jul 13 16:04:53 2018 us=785144 tcp_queue_limit = 64
Fri Jul 13 16:04:53 2018 us=785148 real_hash_size = 256
Fri Jul 13 16:04:53 2018 us=785151 virtual_hash_size = 256
Fri Jul 13 16:04:53 2018 us=785157 client_connect_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785161 learn_address_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785165 client_disconnect_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785168 client_config_dir = '/etc/openvpn/ccd'
Fri Jul 13 16:04:53 2018 us=785172 ccd_exclusive = DISABLED
Fri Jul 13 16:04:53 2018 us=785176 tmp_dir = '/tmp'
Fri Jul 13 16:04:53 2018 us=785179 push_ifconfig_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=785183 push_ifconfig_local = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785190 push_ifconfig_remote_netmask = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785196 push_ifconfig_ipv6_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=785201 push_ifconfig_ipv6_local = ::/0
Fri Jul 13 16:04:53 2018 us=785205 push_ifconfig_ipv6_remote = ::
Fri Jul 13 16:04:53 2018 us=785208 enable_c2c = DISABLED
Fri Jul 13 16:04:53 2018 us=785212 duplicate_cn = DISABLED
Fri Jul 13 16:04:53 2018 us=785256 cf_max = 0
Fri Jul 13 16:04:53 2018 us=785264 cf_per = 0
Fri Jul 13 16:04:53 2018 us=785268 max_clients = 1024
Fri Jul 13 16:04:53 2018 us=785271 max_routes_per_client = 256
Fri Jul 13 16:04:53 2018 us=785275 auth_user_pass_verify_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785279 auth_user_pass_verify_script_via_file = DISABLED
Fri Jul 13 16:04:53 2018 us=785284 ssl_flags = 0
Fri Jul 13 16:04:53 2018 us=785290 port_share_host = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785294 port_share_port = 0
Fri Jul 13 16:04:53 2018 us=785298 client = DISABLED
Fri Jul 13 16:04:53 2018 us=785303 pull = DISABLED
Fri Jul 13 16:04:53 2018 us=785309 auth_user_pass_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785314 OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Fri Jul 13 16:04:53 2018 us=785574 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7505
Fri Jul 13 16:04:53 2018 us=785708 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Jul 13 16:04:53 2018 us=815928 Diffie-Hellman initialized with 2048 bit key
Fri Jul 13 16:04:53 2018 us=863767 TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:04:53 2018 us=863798 Socket Buffers: R=[229376->131072] S=[229376->131072]
Fri Jul 13 16:04:53 2018 us=863893 ROUTE default_gateway=31.14.138.1
Fri Jul 13 16:04:53 2018 us=868525 TUN/TAP device tun0 opened
Fri Jul 13 16:04:53 2018 us=868556 TUN/TAP TX queue length set to 100
Fri Jul 13 16:04:53 2018 us=868572 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Jul 13 16:04:53 2018 us=868593 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Fri Jul 13 16:04:53 2018 us=875631 /sbin/route add -net 192.168.1.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 16:04:53 2018 us=886319 /sbin/route add -net 192.168.2.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 16:04:53 2018 us=891963 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 16:04:53 2018 us=898421 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:04:53 2018 us=973581 GID set to nogroup
Fri Jul 13 16:04:53 2018 us=973630 UID set to nobody
Fri Jul 13 16:04:53 2018 us=973650 UDPv4 link local (bound): [undef]
Fri Jul 13 16:04:53 2018 us=973656 UDPv4 link remote: [undef]
Fri Jul 13 16:04:53 2018 us=973664 MULTI: multi_init called, r=256 v=256
Fri Jul 13 16:04:53 2018 us=973714 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Fri Jul 13 16:04:53 2018 us=973970 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=973996 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974002 ifconfig_pool_read(), in='client1,10.8.0.8', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974006 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974011 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.12', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974017 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974022 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.16', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974032 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974037 ifconfig_pool_read(), in='clientCorato,10.8.0.20', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974041 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974044 ifconfig_pool_read(), in='clientGenius,10.8.0.24', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974049 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974053 ifconfig_pool_read(), in='clientGenius,10.8.0.28', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974057 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974061 ifconfig_pool_read(), in='clientFormello,10.8.0.32', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974065 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974075 IFCONFIG POOL LIST
Fri Jul 13 16:04:53 2018 us=974084 client1,10.8.0.4
Fri Jul 13 16:04:53 2018 us=974089 client1,10.8.0.8
Fri Jul 13 16:04:53 2018 us=974093 clientTerlizzi,10.8.0.12
Fri Jul 13 16:04:53 2018 us=974098 clientTerlizzi,10.8.0.16
Fri Jul 13 16:04:53 2018 us=974102 clientCorato,10.8.0.20
Fri Jul 13 16:04:53 2018 us=974106 clientGenius,10.8.0.24
Fri Jul 13 16:04:53 2018 us=974110 clientGenius,10.8.0.28
Fri Jul 13 16:04:53 2018 us=974114 clientFormello,10.8.0.32
Fri Jul 13 16:04:53 2018 us=974144 Initialization Sequence Completed
Fri Jul 13 16:05:01 2018 us=312358 MULTI: multi_create_instance called
Fri Jul 13 16:05:01 2018 us=312423 91.252.248.238:7105 Re-using SSL/TLS context
Fri Jul 13 16:05:01 2018 us=312456 91.252.248.238:7105 LZO compression initialized
Fri Jul 13 16:05:01 2018 us=312598 91.252.248.238:7105 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:01 2018 us=312610 91.252.248.238:7105 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:01 2018 us=312642 91.252.248.238:7105 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:01 2018 us=312648 91.252.248.238:7105 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:01 2018 us=312661 91.252.248.238:7105 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:01 2018 us=312669 91.252.248.238:7105 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:01 2018 us=312695 91.252.248.238:7105 TLS: Initial packet from [AF_INET]91.252.248.238:7105, sid=4d82684d 26d258ec
Fri Jul 13 16:05:03 2018 us=182433 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:03 2018 us=262142 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:05 2018 us=179477 MULTI: multi_create_instance called
Fri Jul 13 16:05:05 2018 us=179541 91.252.248.238:6336 Re-using SSL/TLS context
Fri Jul 13 16:05:05 2018 us=179566 91.252.248.238:6336 LZO compression initialized
Fri Jul 13 16:05:05 2018 us=179653 91.252.248.238:6336 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:05 2018 us=179666 91.252.248.238:6336 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:05 2018 us=179691 91.252.248.238:6336 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:05 2018 us=179697 91.252.248.238:6336 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:05 2018 us=179708 91.252.248.238:6336 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:05 2018 us=179717 91.252.248.238:6336 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:05 2018 us=179737 91.252.248.238:6336 TLS: Initial packet from [AF_INET]91.252.248.238:6336, sid=de086851 4f182ae6
Fri Jul 13 16:05:05 2018 us=945528 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:06 2018 us=226121 read UDPv4 [ECONNREFUSED|ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:07 2018 us=566354 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:07 2018 us=840020 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:07 2018 us=860551 MULTI: multi_create_instance called
Fri Jul 13 16:05:07 2018 us=860609 91.252.248.238:6405 Re-using SSL/TLS context
Fri Jul 13 16:05:07 2018 us=860628 91.252.248.238:6405 LZO compression initialized
Fri Jul 13 16:05:07 2018 us=860698 91.252.248.238:6405 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:07 2018 us=860707 91.252.248.238:6405 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:07 2018 us=860731 91.252.248.238:6405 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:07 2018 us=860736 91.252.248.238:6405 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:07 2018 us=860747 91.252.248.238:6405 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:07 2018 us=860754 91.252.248.238:6405 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:07 2018 us=860773 91.252.248.238:6405 TLS: Initial packet from [AF_INET]91.252.248.238:6405, sid=eea32e09 2055592f
Fri Jul 13 16:05:08 2018 us=263354 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:08 2018 us=686719 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:08 2018 us=966114 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:09 2018 us=565743 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:10 2018 us=601928 MULTI: multi_create_instance called
Fri Jul 13 16:05:10 2018 us=601996 91.252.248.238:6914 Re-using SSL/TLS context
Fri Jul 13 16:05:10 2018 us=602016 91.252.248.238:6914 LZO compression initialized
Fri Jul 13 16:05:10 2018 us=602086 91.252.248.238:6914 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:10 2018 us=602098 91.252.248.238:6914 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:10 2018 us=602122 91.252.248.238:6914 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:10 2018 us=602128 91.252.248.238:6914 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:10 2018 us=602138 91.252.248.238:6914 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:10 2018 us=602146 91.252.248.238:6914 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:10 2018 us=602165 91.252.248.238:6914 TLS: Initial packet from [AF_INET]91.252.248.238:6914, sid=9f85b15f 17f9f80f
Fri Jul 13 16:05:10 2018 us=738332 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:11 2018 us=171986 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:12 2018 us=514723 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:13 2018 us=394387 MULTI: multi_create_instance called
Fri Jul 13 16:05:13 2018 us=394455 91.252.248.238:6849 Re-using SSL/TLS context
Fri Jul 13 16:05:13 2018 us=394474 91.252.248.238:6849 LZO compression initialized
Fri Jul 13 16:05:13 2018 us=394546 91.252.248.238:6849 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:13 2018 us=394555 91.252.248.238:6849 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:13 2018 us=394579 91.252.248.238:6849 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:13 2018 us=394585 91.252.248.238:6849 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:13 2018 us=394602 91.252.248.238:6849 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:13 2018 us=394610 91.252.248.238:6849 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:13 2018 us=394629 91.252.248.238:6849 TLS: Initial packet from [AF_INET]91.252.248.238:6849, sid=2ecca58e 31b46d00
Fri Jul 13 16:05:13 2018 us=562469 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:14 2018 us=35355 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:15 2018 us=577297 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:16 2018 us=179214 MULTI: multi_create_instance called
Fri Jul 13 16:05:16 2018 us=179276 91.252.248.238:6273 Re-using SSL/TLS context
Fri Jul 13 16:05:16 2018 us=179297 91.252.248.238:6273 LZO compression initialized
Fri Jul 13 16:05:16 2018 us=179364 91.252.248.238:6273 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:16 2018 us=179373 91.252.248.238:6273 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:16 2018 us=179398 91.252.248.238:6273 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:16 2018 us=179404 91.252.248.238:6273 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:16 2018 us=179414 91.252.248.238:6273 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:16 2018 us=179422 91.252.248.238:6273 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:16 2018 us=179444 91.252.248.238:6273 TLS: Initial packet from [AF_INET]91.252.248.238:6273, sid=1418c793 b77e4189
Fri Jul 13 16:05:16 2018 us=299343 91.252.248.238:6273 write UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:17 2018 us=894483 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:17 2018 us=983641 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:20 2018 us=125493 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:20 2018 us=226266 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:20 2018 us=761776 MULTI: multi_create_instance called
Fri Jul 13 16:05:20 2018 us=761838 91.252.248.238:6977 Re-using SSL/TLS context
Fri Jul 13 16:05:20 2018 us=761858 91.252.248.238:6977 LZO compression initialized
Fri Jul 13 16:05:20 2018 us=761935 91.252.248.238:6977 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:20 2018 us=761945 91.252.248.238:6977 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:20 2018 us=761972 91.252.248.238:6977 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:20 2018 us=761978 91.252.248.238:6977 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:20 2018 us=761989 91.252.248.238:6977 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:20 2018 us=761996 91.252.248.238:6977 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:20 2018 us=762017 91.252.248.238:6977 TLS: Initial packet from [AF_INET]91.252.248.238:6977, sid=8799ad62 fb170db2
Fri Jul 13 16:05:21 2018 us=446774 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:22 2018 us=67549 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:23 2018 us=225731 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:23 2018 us=830772 MULTI: multi_create_instance called
Fri Jul 13 16:05:23 2018 us=830852 91.252.248.238:6529 Re-using SSL/TLS context
Fri Jul 13 16:05:23 2018 us=830882 91.252.248.238:6529 LZO compression initialized
Fri Jul 13 16:05:23 2018 us=830951 91.252.248.238:6529 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:23 2018 us=830960 91.252.248.238:6529 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:23 2018 us=830995 91.252.248.238:6529 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:23 2018 us=831001 91.252.248.238:6529 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:23 2018 us=831012 91.252.248.238:6529 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:23 2018 us=831019 91.252.248.238:6529 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:23 2018 us=831040 91.252.248.238:6529 TLS: Initial packet from [AF_INET]91.252.248.238:6529, sid=b6699ad1 d9e1a5f7
Fri Jul 13 16:05:24 2018 us=262829 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:25 2018 us=199120 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:26 2018 us=299887 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:26 2018 us=752448 MULTI: multi_create_instance called
Fri Jul 13 16:05:26 2018 us=752523 91.252.248.238:6979 Re-using SSL/TLS context
Fri Jul 13 16:05:26 2018 us=752547 91.252.248.238:6979 LZO compression initialized
Fri Jul 13 16:05:26 2018 us=752636 91.252.248.238:6979 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:26 2018 us=752647 91.252.248.238:6979 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:26 2018 us=752673 91.252.248.238:6979 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:26 2018 us=752679 91.252.248.238:6979 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:26 2018 us=752690 91.252.248.238:6979 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:26 2018 us=752697 91.252.248.238:6979 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:26 2018 us=752718 91.252.248.238:6979 TLS: Initial packet from [AF_INET]91.252.248.238:6979, sid=1667e0cb fa86d6fe
Fri Jul 13 16:05:27 2018 us=343183 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:28 2018 us=292540 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:29 2018 us=243842 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:29 2018 us=762102 MULTI: multi_create_instance called
Fri Jul 13 16:05:29 2018 us=762170 91.252.248.238:6851 Re-using SSL/TLS context
Fri Jul 13 16:05:29 2018 us=762193 91.252.248.238:6851 LZO compression initialized
Fri Jul 13 16:05:29 2018 us=762307 91.252.248.238:6851 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:29 2018 us=762318 91.252.248.238:6851 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:29 2018 us=762346 91.252.248.238:6851 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:29 2018 us=762352 91.252.248.238:6851 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:29 2018 us=762363 91.252.248.238:6851 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:29 2018 us=762371 91.252.248.238:6851 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:29 2018 us=762392 91.252.248.238:6851 TLS: Initial packet from [AF_INET]91.252.248.238:6851, sid=2169363a fe1c8d78
Fri Jul 13 16:05:30 2018 us=185047 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:31 2018 us=36903 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:32 2018 us=183273 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:32 2018 us=685018 MULTI: multi_create_instance called
Fri Jul 13 16:05:32 2018 us=685078 91.252.248.238:7042 Re-using SSL/TLS context
Fri Jul 13 16:05:32 2018 us=685097 91.252.248.238:7042 LZO compression initialized
Fri Jul 13 16:05:32 2018 us=685163 91.252.248.238:7042 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:32 2018 us=685172 91.252.248.238:7042 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:32 2018 us=685197 91.252.248.238:7042 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:32 2018 us=685203 91.252.248.238:7042 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:32 2018 us=685214 91.252.248.238:7042 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:32 2018 us=685222 91.252.248.238:7042 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:32 2018 us=685243 91.252.248.238:7042 TLS: Initial packet from [AF_INET]91.252.248.238:7042, sid=bbecfea3 5cdf4489
Fri Jul 13 16:05:33 2018 us=642040 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:34 2018 us=91768 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:35 2018 us=167265 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:35 2018 us=589663 MULTI: multi_create_instance called
Fri Jul 13 16:05:35 2018 us=589720 91.252.248.238:6144 Re-using SSL/TLS context
Fri Jul 13 16:05:35 2018 us=589744 91.252.248.238:6144 LZO compression initialized
Fri Jul 13 16:05:35 2018 us=589811 91.252.248.238:6144 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:35 2018 us=589821 91.252.248.238:6144 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:35 2018 us=589847 91.252.248.238:6144 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:35 2018 us=589853 91.252.248.238:6144 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:35 2018 us=589864 91.252.248.238:6144 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:35 2018 us=589871 91.252.248.238:6144 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:35 2018 us=589892 91.252.248.238:6144 TLS: Initial packet from [AF_INET]91.252.248.238:6144, sid=6fac5cb6 455de89d
Fri Jul 13 16:05:36 2018 us=76623 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:37 2018 us=56768 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:38 2018 us=202441 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:38 2018 us=585379 MULTI: multi_create_instance called
Fri Jul 13 16:05:38 2018 us=585449 91.252.248.238:6145 Re-using SSL/TLS context
Fri Jul 13 16:05:38 2018 us=585473 91.252.248.238:6145 LZO compression initialized
Fri Jul 13 16:05:38 2018 us=585566 91.252.248.238:6145 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:38 2018 us=585576 91.252.248.238:6145 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:38 2018 us=585604 91.252.248.238:6145 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:38 2018 us=585610 91.252.248.238:6145 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:38 2018 us=585630 91.252.248.238:6145 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:38 2018 us=585639 91.252.248.238:6145 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:38 2018 us=585660 91.252.248.238:6145 TLS: Initial packet from [AF_INET]91.252.248.238:6145, sid=9819fb47 fc2b2dc6
Fri Jul 13 16:05:39 2018 us=162085 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:40 2018 us=276396 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:41 2018 us=157674 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:41 2018 us=431687 MULTI: multi_create_instance called
Fri Jul 13 16:05:41 2018 us=431754 91.252.248.238:6531 Re-using SSL/TLS context
Fri Jul 13 16:05:41 2018 us=431774 91.252.248.238:6531 LZO compression initialized
Fri Jul 13 16:05:41 2018 us=431841 91.252.248.238:6531 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:41 2018 us=431850 91.252.248.238:6531 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:41 2018 us=431875 91.252.248.238:6531 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:41 2018 us=431881 91.252.248.238:6531 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:41 2018 us=431891 91.252.248.238:6531 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:41 2018 us=431899 91.252.248.238:6531 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:41 2018 us=431922 91.252.248.238:6531 TLS: Initial packet from [AF_INET]91.252.248.238:6531, sid=a8eba190 7923d023
Fri Jul 13 16:05:42 2018 us=191695 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:43 2018 us=184536 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:44 2018 us=365515 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:44 2018 us=442695 MULTI: multi_create_instance called
Fri Jul 13 16:05:44 2018 us=442754 91.252.248.238:6338 Re-using SSL/TLS context
Fri Jul 13 16:05:44 2018 us=442773 91.252.248.238:6338 LZO compression initialized
Fri Jul 13 16:05:44 2018 us=442842 91.252.248.238:6338 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:44 2018 us=442851 91.252.248.238:6338 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:44 2018 us=442886 91.252.248.238:6338 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:44 2018 us=442893 91.252.248.238:6338 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:44 2018 us=442903 91.252.248.238:6338 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:44 2018 us=442911 91.252.248.238:6338 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:44 2018 us=442935 91.252.248.238:6338 TLS: Initial packet from [AF_INET]91.252.248.238:6338, sid=9961c480 7b685ae0
Fri Jul 13 16:05:45 2018 us=163288 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:46 2018 us=566252 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:47 2018 us=237915 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:47 2018 us=342979 MULTI: multi_create_instance called
Fri Jul 13 16:05:47 2018 us=343040 91.252.248.238:6785 Re-using SSL/TLS context
Fri Jul 13 16:05:47 2018 us=343059 91.252.248.238:6785 LZO compression initialized
Fri Jul 13 16:05:47 2018 us=343128 91.252.248.238:6785 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:47 2018 us=343144 91.252.248.238:6785 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:47 2018 us=343172 91.252.248.238:6785 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:47 2018 us=343180 91.252.248.238:6785 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:47 2018 us=343191 91.252.248.238:6785 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:47 2018 us=343199 91.252.248.238:6785 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:47 2018 us=343225 91.252.248.238:6785 TLS: Initial packet from [AF_INET]91.252.248.238:6785, sid=ddad2f48 d843201b
Fri Jul 13 16:05:48 2018 us=156426 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:49 2018 us=157262 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:50 2018 us=172763 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:50 2018 us=297472 MULTI: multi_create_instance called
Fri Jul 13 16:05:50 2018 us=297544 91.252.248.238:6912 Re-using SSL/TLS context
Fri Jul 13 16:05:50 2018 us=297569 91.252.248.238:6912 LZO compression initialized
Fri Jul 13 16:05:50 2018 us=297636 91.252.248.238:6912 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:50 2018 us=297645 91.252.248.238:6912 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:50 2018 us=297670 91.252.248.238:6912 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:50 2018 us=297678 91.252.248.238:6912 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:50 2018 us=297690 91.252.248.238:6912 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:50 2018 us=297697 91.252.248.238:6912 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:50 2018 us=297719 91.252.248.238:6912 TLS: Initial packet from [AF_INET]91.252.248.238:6912, sid=4462447f 22760f74
Fri Jul 13 16:05:51 2018 us=146162 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:52 2018 us=738072 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:53 2018 us=21884 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:53 2018 us=446375 MULTI: multi_create_instance called
Fri Jul 13 16:05:53 2018 us=446442 91.252.248.238:6337 Re-using SSL/TLS context
Fri Jul 13 16:05:53 2018 us=446461 91.252.248.238:6337 LZO compression initialized
Fri Jul 13 16:05:53 2018 us=446532 91.252.248.238:6337 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:53 2018 us=446542 91.252.248.238:6337 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:53 2018 us=446569 91.252.248.238:6337 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:53 2018 us=446575 91.252.248.238:6337 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:53 2018 us=446586 91.252.248.238:6337 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:53 2018 us=446594 91.252.248.238:6337 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:53 2018 us=446617 91.252.248.238:6337 TLS: Initial packet from [AF_INET]91.252.248.238:6337, sid=3cff633d e1b30229
Fri Jul 13 16:05:54 2018 us=142131 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:55 2018 us=37582 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:56 2018 us=35240 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:56 2018 us=397207 MULTI: multi_create_instance called
Fri Jul 13 16:05:56 2018 us=397274 91.252.248.238:6658 Re-using SSL/TLS context
Fri Jul 13 16:05:56 2018 us=397292 91.252.248.238:6658 LZO compression initialized
Fri Jul 13 16:05:56 2018 us=397358 91.252.248.238:6658 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:56 2018 us=397369 91.252.248.238:6658 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:56 2018 us=397397 91.252.248.238:6658 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:56 2018 us=397403 91.252.248.238:6658 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:56 2018 us=397414 91.252.248.238:6658 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:56 2018 us=397421 91.252.248.238:6658 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:56 2018 us=397444 91.252.248.238:6658 TLS: Initial packet from [AF_INET]91.252.248.238:6658, sid=e5ea8765 5c3934ad
Fri Jul 13 16:05:57 2018 us=153885 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:58 2018 us=224576 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:59 2018 us=94022 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:59 2018 us=378649 MULTI: multi_create_instance called
Fri Jul 13 16:05:59 2018 us=378717 91.252.248.238:6721 Re-using SSL/TLS context
Fri Jul 13 16:05:59 2018 us=378736 91.252.248.238:6721 LZO compression initialized
Fri Jul 13 16:05:59 2018 us=378803 91.252.248.238:6721 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:59 2018 us=378812 91.252.248.238:6721 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:59 2018 us=378835 91.252.248.238:6721 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:59 2018 us=378840 91.252.248.238:6721 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:59 2018 us=378851 91.252.248.238:6721 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:59 2018 us=378858 91.252.248.238:6721 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:59 2018 us=378880 91.252.248.238:6721 TLS: Initial packet from [AF_INET]91.252.248.238:6721, sid=f5573076 fc137172
Fri Jul 13 16:06:00 2018 us=188878 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:01 2018 us=254133 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:01 2018 us=513314 91.252.248.238:7105 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:01 2018 us=513352 91.252.248.238:7105 TLS Error: TLS handshake failed
Fri Jul 13 16:06:01 2018 us=513463 91.252.248.238:7105 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:02 2018 us=214846 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:02 2018 us=303625 MULTI: multi_create_instance called
Fri Jul 13 16:06:02 2018 us=303748 91.252.248.238:6916 Re-using SSL/TLS context
Fri Jul 13 16:06:02 2018 us=303779 91.252.248.238:6916 LZO compression initialized
Fri Jul 13 16:06:02 2018 us=303857 91.252.248.238:6916 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:02 2018 us=303872 91.252.248.238:6916 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:02 2018 us=303906 91.252.248.238:6916 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:02 2018 us=303926 91.252.248.238:6916 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:02 2018 us=303938 91.252.248.238:6916 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:02 2018 us=303946 91.252.248.238:6916 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:02 2018 us=303969 91.252.248.238:6916 TLS: Initial packet from [AF_INET]91.252.248.238:6916, sid=41a6a340 2628202d
Fri Jul 13 16:06:03 2018 us=152369 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:04 2018 us=146530 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:05 2018 us=45529 91.252.248.238:6336 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:05 2018 us=45566 91.252.248.238:6336 TLS Error: TLS handshake failed
Fri Jul 13 16:06:05 2018 us=45658 91.252.248.238:6336 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:05 2018 us=230947 MULTI: multi_create_instance called
Fri Jul 13 16:06:05 2018 us=231005 91.252.248.238:6275 Re-using SSL/TLS context
Fri Jul 13 16:06:05 2018 us=231027 91.252.248.238:6275 LZO compression initialized
Fri Jul 13 16:06:05 2018 us=231084 91.252.248.238:6275 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:05 2018 us=231092 91.252.248.238:6275 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:05 2018 us=231114 91.252.248.238:6275 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:05 2018 us=231119 91.252.248.238:6275 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:05 2018 us=231130 91.252.248.238:6275 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:05 2018 us=231137 91.252.248.238:6275 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:05 2018 us=231160 91.252.248.238:6275 TLS: Initial packet from [AF_INET]91.252.248.238:6275, sid=b7383f6b 7978ca7e
Fri Jul 13 16:06:05 2018 us=562156 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:06 2018 us=142288 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:07 2018 us=6288 91.252.248.238:6405 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:07 2018 us=6323 91.252.248.238:6405 TLS Error: TLS handshake failed
Fri Jul 13 16:06:07 2018 us=6388 91.252.248.238:6405 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:07 2018 us=487831 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:08 2018 us=196620 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:08 2018 us=433454 MULTI: multi_create_instance called
Fri Jul 13 16:06:08 2018 us=433506 91.252.248.238:6787 Re-using SSL/TLS context
Fri Jul 13 16:06:08 2018 us=433528 91.252.248.238:6787 LZO compression initialized
Fri Jul 13 16:06:08 2018 us=433585 91.252.248.238:6787 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:08 2018 us=433594 91.252.248.238:6787 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:08 2018 us=433617 91.252.248.238:6787 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:08 2018 us=433624 91.252.248.238:6787 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:08 2018 us=433634 91.252.248.238:6787 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:08 2018 us=433642 91.252.248.238:6787 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:08 2018 us=433672 91.252.248.238:6787 TLS: Initial packet from [AF_INET]91.252.248.238:6787, sid=2c3a7a75 6b5bcdf2
Fri Jul 13 16:06:09 2018 us=175549 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:10 2018 us=203649 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:10 2018 us=360796 91.252.248.238:6914 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:10 2018 us=360845 91.252.248.238:6914 TLS Error: TLS handshake failed
Fri Jul 13 16:06:10 2018 us=360939 91.252.248.238:6914 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:11 2018 us=112266 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:11 2018 us=376918 MULTI: multi_create_instance called
Fri Jul 13 16:06:11 2018 us=376981 91.252.248.238:6530 Re-using SSL/TLS context
Fri Jul 13 16:06:11 2018 us=377006 91.252.248.238:6530 LZO compression initialized
Fri Jul 13 16:06:11 2018 us=377065 91.252.248.238:6530 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:11 2018 us=377074 91.252.248.238:6530 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:11 2018 us=377097 91.252.248.238:6530 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:11 2018 us=377102 91.252.248.238:6530 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:11 2018 us=377114 91.252.248.238:6530 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:11 2018 us=377122 91.252.248.238:6530 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:11 2018 us=377147 91.252.248.238:6530 TLS: Initial packet from [AF_INET]91.252.248.238:6530, sid=ed435d77 195bd419
Fri Jul 13 16:06:12 2018 us=178830 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:13 2018 us=304948 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
-
- OpenVPN Protagonist
- Posts: 11137
- Joined: Fri Jun 03, 2016 1:17 pm
Re: openvpn Client is not recognized by openvpn server
Please post your server configuration file.
-
- OpenVPN User
- Posts: 29
- Joined: Tue Jul 10, 2018 1:31 pm
Re: openvpn Client is not recognized by openvpn server
[oconf=]#################################################
# Sample OpenVPN 2.0 config file for #
# multi-client server. #
# #
# This file is for the server side #
# of a many-clients <-> one-server #
# OpenVPN configuration. #
# #
# OpenVPN also supports #
# single-machine <-> single-machine #
# configurations (See the Examples page #
# on the web site for more info). #
# #
# This config should work on Windows #
# or Linux/BSD systems. Remember on #
# Windows to quote pathnames and use #
# double backslashes, e.g.: #
# "C:\\Program Files\\OpenVPN\\config\\foo.key" #
# #
# Comments are preceded with '#' or ';' #
#################################################
# Which local IP address should OpenVPN
# listen on? (optional)
;local a.b.c.d
# Which TCP/UDP port should OpenVPN listen on?
# If you want to run multiple OpenVPN instances
# on the same machine, use a different port
# number for each one. You will need to
# open up this port on your firewall.
port 1194
# TCP or UDP server?
;proto tcp
proto udp
# "dev tun" will create a routed IP tunnel,
# "dev tap" will create an ethernet tunnel.
# Use "dev tap0" if you are ethernet bridging
# and have precreated a tap0 virtual interface
# and bridged it with your ethernet interface.
# If you want to control access policies
# over the VPN, you must create firewall
# rules for the the TUN/TAP interface.
# On non-Windows systems, you can give
# an explicit unit number, such as tun0.
# On Windows, use "dev-node" for this.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel if you
# have more than one. On XP SP2 or higher,
# you may need to selectively disable the
# Windows firewall for the TAP adapter.
# Non-Windows systems usually don't need this.
;dev-node MyTap
# SSL/TLS root certificate (ca), certificate
# (cert), and private key (key). Each client
# and the server must have their own cert and
# key file. The server and all clients will
# use the same ca file.
#
# See the "easy-rsa" directory for a series
# of scripts for generating RSA certificates
# and private keys. Remember to use
# a unique Common Name for the server
# and each of the client certificates.
#
# Any X509 key management system can be used.
# OpenVPN can also use a PKCS #12 formatted key file
# (see "pkcs12" directive in man page).
ca ca.crt
cert server.crt
key server.key # This file should be kept secret
# Diffie hellman parameters.
# Generate your own with:
# openssl dhparam -out dh1024.pem 1024
# Substitute 2048 for 1024 if you are using
# 2048 bit keys.
dh dh2048.pem
# Configure server mode and supply a VPN subnet
# for OpenVPN to draw client addresses from.
# The server will take 10.8.0.1 for itself,
# the rest will be made available to clients.
# Each client will be able to reach the server
# on 10.8.0.1. Comment this line out if you are
# ethernet bridging. See the man page for more info.
server 10.8.0.0 255.255.255.0
# Maintain a record of client <-> virtual IP address
# associations in this file. If OpenVPN goes down or
# is restarted, reconnecting clients can be assigned
# the same virtual IP address from the pool that was
# previously assigned.
ifconfig-pool-persist ipp.txt
# Configure server mode for ethernet bridging.
# You must first use your OS's bridging capability
# to bridge the TAP interface with the ethernet
# NIC interface. Then you must manually set the
# IP/netmask on the bridge interface, here we
# assume 10.8.0.4/255.255.255.0. Finally we
# must set aside an IP range in this subnet
# (start=10.8.0.50 end=10.8.0.100) to allocate
# to connecting clients. Leave this line commented
# out unless you are ethernet bridging.
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100
# Configure server mode for ethernet bridging
# using a DHCP-proxy, where clients talk
# to the OpenVPN server-side DHCP server
# to receive their IP address allocation
# and DNS server addresses. You must first use
# your OS's bridging capability to bridge the TAP
# interface with the ethernet NIC interface.
# Note: this mode only works on clients (such as
# Windows), where the client-side TAP adapter is
# bound to a DHCP client.
;server-bridge
# Push routes to the client to allow it
# to reach other private subnets behind
# the server. Remember that these
# private subnets will also need
# to know to route the OpenVPN client
# address pool (10.8.0.0/255.255.255.0)
# back to the OpenVPN server.
push "route 192.168.1.0 255.255.255.0"
push "route 192.168.2.0 255.255.255.0"
;push "route 192.168.3.0 255.255.255.0"
# To assign specific IP addresses to specific
# clients or if a connecting client has a private
# subnet behind it that should also have VPN access,
# use the subdirectory "ccd" for client-specific
# configuration files (see man page for more info).
# EXAMPLE: Suppose the client
# having the certificate common name "Thelonious"
# also has a small subnet behind his connecting
# machine, such as 192.168.40.128/255.255.255.248.
# First, uncomment out these lines:
client-config-dir /etc/openvpn/ccd
route 192.168.1.0 255.255.255.0
route 192.168.2.0 255.255.255.0
;route 192.168.3.0 255.255.255.0
# Then create a file ccd/Thelonious with this line:
# iroute 192.168.40.128 255.255.255.248
# This will allow Thelonious' private subnet to
# access the VPN. This example will only work
# if you are routing, not bridging, i.e. you are
# using "dev tun" and "server" directives.
# EXAMPLE: Suppose you want to give
# Thelonious a fixed VPN IP address of 10.9.0.1.
# First uncomment out these lines:
;client-config-dir ccd
;route 10.9.0.0 255.255.255.252
# Then add this line to ccd/Thelonious:
# ifconfig-push 10.9.0.1 10.9.0.2
# Suppose that you want to enable different
# firewall access policies for different groups
# of clients. There are two methods:
# (1) Run multiple OpenVPN daemons, one for each
# group, and firewall the TUN/TAP interface
# for each group/daemon appropriately.
# (2) (Advanced) Create a script to dynamically
# modify the firewall in response to access
# from different clients. See man
# page for more info on learn-address script.
;learn-address ./script
# If enabled, this directive will configure
# all clients to redirect their default
# network gateway through the VPN, causing
# all IP traffic such as web browsing and
# and DNS lookups to go through the VPN
# (The OpenVPN server machine may need to NAT
# or bridge the TUN/TAP interface to the internet
# in order for this to work properly).
push "redirect-gateway def1 bypass-dhcp"
# Certain Windows-specific network settings
# can be pushed to clients, such as DNS
# or WINS server addresses. CAVEAT:
# http://openvpn.net/faq.html#dhcpcaveats
# The addresses below refer to the public
# DNS servers provided by opendns.com.
push "dhcp-option DNS 208.67.222.222"
push "dhcp-option DNS 208.67.220.220"
# Uncomment this directive to allow different
# clients to be able to "see" each other.
# By default, clients will only see the server.
# To force clients to only see the server, you
# will also need to appropriately firewall the
# server's TUN/TAP interface.
;client-to-client
# Uncomment this directive if multiple clients
# might connect with the same certificate/key
# files or common names. This is recommended
# only for testing purposes. For production use,
# each client should have its own certificate/key
# pair.
#
# IF YOU HAVE NOT GENERATED INDIVIDUAL
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
# UNCOMMENT THIS LINE OUT.
;duplicate-cn
# The keepalive directive causes ping-like
# messages to be sent back and forth over
# the link so that each side knows when
# the other side has gone down.
# Ping every 10 seconds, assume that remote
# peer is down if no ping received during
# a 120 second time period.
keepalive 10 120
# For extra security beyond that provided
# by SSL/TLS, create an "HMAC firewall"
# to help block DoS attacks and UDP port flooding.
#
# Generate with:
# openvpn --genkey --secret ta.key
#
# The server and each client must have
# a copy of this key.
# The second parameter should be '0'
# on the server and '1' on the clients.
;tls-auth ta.key 0 # This file is secret
# Select a cryptographic cipher.
# This config item must be copied to
# the client config file as well.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
# Enable compression on the VPN link.
# If you enable it here, you must also
# enable it in the client config file.
comp-lzo
# The maximum number of concurrently connected
# clients we want to allow.
;max-clients 100
# It's a good idea to reduce the OpenVPN
# daemon's privileges after initialization.
#
# You can uncomment this out on
# non-Windows systems.
user nobody
group nogroup
# The persist options will try to avoid
# accessing certain resources on restart
# that may no longer be accessible because
# of the privilege downgrade.
persist-key
persist-tun
# Output a short status file showing
# current connections, truncated
# and rewritten every minute.
status openvpn-status.log
# By default, log messages will go to the syslog (or
# on Windows, if running as a service, they will go to
# the "\Program Files\OpenVPN\log" directory).
# Use log or log-append to override this default.
# "log" will truncate the log file on OpenVPN startup,
# while "log-append" will append to it. Use one
# or the other (but not both).
log openvpn.log
;log-append openvpn.log
# Set the appropriate level of log
# file verbosity.
#
# 0 is silent, except for fatal errors
# 4 is reasonable for general usage
# 5 and 6 can help to debug connection problems
# 9 is extremely verbose
verb 4
# Silence repeating messages. At most 20
# sequential messages of the same message
# category will be output to the log.
;mute 20
# to see it use "telnet localhost 7505"
management localhost 7505
[/oconf]
# Sample OpenVPN 2.0 config file for #
# multi-client server. #
# #
# This file is for the server side #
# of a many-clients <-> one-server #
# OpenVPN configuration. #
# #
# OpenVPN also supports #
# single-machine <-> single-machine #
# configurations (See the Examples page #
# on the web site for more info). #
# #
# This config should work on Windows #
# or Linux/BSD systems. Remember on #
# Windows to quote pathnames and use #
# double backslashes, e.g.: #
# "C:\\Program Files\\OpenVPN\\config\\foo.key" #
# #
# Comments are preceded with '#' or ';' #
#################################################
# Which local IP address should OpenVPN
# listen on? (optional)
;local a.b.c.d
# Which TCP/UDP port should OpenVPN listen on?
# If you want to run multiple OpenVPN instances
# on the same machine, use a different port
# number for each one. You will need to
# open up this port on your firewall.
port 1194
# TCP or UDP server?
;proto tcp
proto udp
# "dev tun" will create a routed IP tunnel,
# "dev tap" will create an ethernet tunnel.
# Use "dev tap0" if you are ethernet bridging
# and have precreated a tap0 virtual interface
# and bridged it with your ethernet interface.
# If you want to control access policies
# over the VPN, you must create firewall
# rules for the the TUN/TAP interface.
# On non-Windows systems, you can give
# an explicit unit number, such as tun0.
# On Windows, use "dev-node" for this.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun
# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel if you
# have more than one. On XP SP2 or higher,
# you may need to selectively disable the
# Windows firewall for the TAP adapter.
# Non-Windows systems usually don't need this.
;dev-node MyTap
# SSL/TLS root certificate (ca), certificate
# (cert), and private key (key). Each client
# and the server must have their own cert and
# key file. The server and all clients will
# use the same ca file.
#
# See the "easy-rsa" directory for a series
# of scripts for generating RSA certificates
# and private keys. Remember to use
# a unique Common Name for the server
# and each of the client certificates.
#
# Any X509 key management system can be used.
# OpenVPN can also use a PKCS #12 formatted key file
# (see "pkcs12" directive in man page).
ca ca.crt
cert server.crt
key server.key # This file should be kept secret
# Diffie hellman parameters.
# Generate your own with:
# openssl dhparam -out dh1024.pem 1024
# Substitute 2048 for 1024 if you are using
# 2048 bit keys.
dh dh2048.pem
# Configure server mode and supply a VPN subnet
# for OpenVPN to draw client addresses from.
# The server will take 10.8.0.1 for itself,
# the rest will be made available to clients.
# Each client will be able to reach the server
# on 10.8.0.1. Comment this line out if you are
# ethernet bridging. See the man page for more info.
server 10.8.0.0 255.255.255.0
# Maintain a record of client <-> virtual IP address
# associations in this file. If OpenVPN goes down or
# is restarted, reconnecting clients can be assigned
# the same virtual IP address from the pool that was
# previously assigned.
ifconfig-pool-persist ipp.txt
# Configure server mode for ethernet bridging.
# You must first use your OS's bridging capability
# to bridge the TAP interface with the ethernet
# NIC interface. Then you must manually set the
# IP/netmask on the bridge interface, here we
# assume 10.8.0.4/255.255.255.0. Finally we
# must set aside an IP range in this subnet
# (start=10.8.0.50 end=10.8.0.100) to allocate
# to connecting clients. Leave this line commented
# out unless you are ethernet bridging.
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100
# Configure server mode for ethernet bridging
# using a DHCP-proxy, where clients talk
# to the OpenVPN server-side DHCP server
# to receive their IP address allocation
# and DNS server addresses. You must first use
# your OS's bridging capability to bridge the TAP
# interface with the ethernet NIC interface.
# Note: this mode only works on clients (such as
# Windows), where the client-side TAP adapter is
# bound to a DHCP client.
;server-bridge
# Push routes to the client to allow it
# to reach other private subnets behind
# the server. Remember that these
# private subnets will also need
# to know to route the OpenVPN client
# address pool (10.8.0.0/255.255.255.0)
# back to the OpenVPN server.
push "route 192.168.1.0 255.255.255.0"
push "route 192.168.2.0 255.255.255.0"
;push "route 192.168.3.0 255.255.255.0"
# To assign specific IP addresses to specific
# clients or if a connecting client has a private
# subnet behind it that should also have VPN access,
# use the subdirectory "ccd" for client-specific
# configuration files (see man page for more info).
# EXAMPLE: Suppose the client
# having the certificate common name "Thelonious"
# also has a small subnet behind his connecting
# machine, such as 192.168.40.128/255.255.255.248.
# First, uncomment out these lines:
client-config-dir /etc/openvpn/ccd
route 192.168.1.0 255.255.255.0
route 192.168.2.0 255.255.255.0
;route 192.168.3.0 255.255.255.0
# Then create a file ccd/Thelonious with this line:
# iroute 192.168.40.128 255.255.255.248
# This will allow Thelonious' private subnet to
# access the VPN. This example will only work
# if you are routing, not bridging, i.e. you are
# using "dev tun" and "server" directives.
# EXAMPLE: Suppose you want to give
# Thelonious a fixed VPN IP address of 10.9.0.1.
# First uncomment out these lines:
;client-config-dir ccd
;route 10.9.0.0 255.255.255.252
# Then add this line to ccd/Thelonious:
# ifconfig-push 10.9.0.1 10.9.0.2
# Suppose that you want to enable different
# firewall access policies for different groups
# of clients. There are two methods:
# (1) Run multiple OpenVPN daemons, one for each
# group, and firewall the TUN/TAP interface
# for each group/daemon appropriately.
# (2) (Advanced) Create a script to dynamically
# modify the firewall in response to access
# from different clients. See man
# page for more info on learn-address script.
;learn-address ./script
# If enabled, this directive will configure
# all clients to redirect their default
# network gateway through the VPN, causing
# all IP traffic such as web browsing and
# and DNS lookups to go through the VPN
# (The OpenVPN server machine may need to NAT
# or bridge the TUN/TAP interface to the internet
# in order for this to work properly).
push "redirect-gateway def1 bypass-dhcp"
# Certain Windows-specific network settings
# can be pushed to clients, such as DNS
# or WINS server addresses. CAVEAT:
# http://openvpn.net/faq.html#dhcpcaveats
# The addresses below refer to the public
# DNS servers provided by opendns.com.
push "dhcp-option DNS 208.67.222.222"
push "dhcp-option DNS 208.67.220.220"
# Uncomment this directive to allow different
# clients to be able to "see" each other.
# By default, clients will only see the server.
# To force clients to only see the server, you
# will also need to appropriately firewall the
# server's TUN/TAP interface.
;client-to-client
# Uncomment this directive if multiple clients
# might connect with the same certificate/key
# files or common names. This is recommended
# only for testing purposes. For production use,
# each client should have its own certificate/key
# pair.
#
# IF YOU HAVE NOT GENERATED INDIVIDUAL
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
# UNCOMMENT THIS LINE OUT.
;duplicate-cn
# The keepalive directive causes ping-like
# messages to be sent back and forth over
# the link so that each side knows when
# the other side has gone down.
# Ping every 10 seconds, assume that remote
# peer is down if no ping received during
# a 120 second time period.
keepalive 10 120
# For extra security beyond that provided
# by SSL/TLS, create an "HMAC firewall"
# to help block DoS attacks and UDP port flooding.
#
# Generate with:
# openvpn --genkey --secret ta.key
#
# The server and each client must have
# a copy of this key.
# The second parameter should be '0'
# on the server and '1' on the clients.
;tls-auth ta.key 0 # This file is secret
# Select a cryptographic cipher.
# This config item must be copied to
# the client config file as well.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES
# Enable compression on the VPN link.
# If you enable it here, you must also
# enable it in the client config file.
comp-lzo
# The maximum number of concurrently connected
# clients we want to allow.
;max-clients 100
# It's a good idea to reduce the OpenVPN
# daemon's privileges after initialization.
#
# You can uncomment this out on
# non-Windows systems.
user nobody
group nogroup
# The persist options will try to avoid
# accessing certain resources on restart
# that may no longer be accessible because
# of the privilege downgrade.
persist-key
persist-tun
# Output a short status file showing
# current connections, truncated
# and rewritten every minute.
status openvpn-status.log
# By default, log messages will go to the syslog (or
# on Windows, if running as a service, they will go to
# the "\Program Files\OpenVPN\log" directory).
# Use log or log-append to override this default.
# "log" will truncate the log file on OpenVPN startup,
# while "log-append" will append to it. Use one
# or the other (but not both).
log openvpn.log
;log-append openvpn.log
# Set the appropriate level of log
# file verbosity.
#
# 0 is silent, except for fatal errors
# 4 is reasonable for general usage
# 5 and 6 can help to debug connection problems
# 9 is extremely verbose
verb 4
# Silence repeating messages. At most 20
# sequential messages of the same message
# category will be output to the log.
;mute 20
# to see it use "telnet localhost 7505"
management localhost 7505
[/oconf]
-
- OpenVPN Protagonist
- Posts: 11137
- Joined: Fri Jun 03, 2016 1:17 pm
Re: openvpn Client is not recognized by openvpn server
BBCode oconf= requires a parameter ..
Also , I do not believe that is your server.conf file .. you posted your log and it does not match.
Also , I do not believe that is your server.conf file .. you posted your log and it does not match.
-
- OpenVPN User
- Posts: 29
- Joined: Tue Jul 10, 2018 1:31 pm
Re: openvpn Client is not recognized by openvpn server
This is my server.conf and the previous are my log,
let me know where is the difference and I'll try to understand with you.
But the real problem I think is that I can't talk with this router 400km away from me.
Do you understand something from this log? Where's the problem?
Thanks
let me know where is the difference and I'll try to understand with you.
But the real problem I think is that I can't talk with this router 400km away from me.
Do you understand something from this log? Where's the problem?
Thanks
-
- OpenVPN Protagonist
- Posts: 11137
- Joined: Fri Jun 03, 2016 1:17 pm
Re: openvpn Client is not recognized by openvpn server
No .. I misread your log.
You need to upgrade your server to a supported version of Openvpn,
your current version is almost 4 years old.
This error:means that the server cannot reply to the client .. but I do not know why .. probably a firewall is blocking you.
You need to upgrade your server to a supported version of Openvpn,
your current version is almost 4 years old.
This error:
Code: Select all
read UDPv4 [ECONNREFUSED]: Connection refused (code=111)