routing issue?

Need help configuring your VPN? Just post here and you'll get that help.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
yute
OpenVpn Newbie
Posts: 3
Joined: Thu Nov 09, 2017 10:17 pm

routing issue?

Post by yute » Sat Nov 11, 2017 3:30 am

Hi, newbie to openvpn and routing. This is probably a routing issue... I'm unable to ping tun ip addresses from server or client. My log files show that the client is able to connect with server. However, I cannot ping the tun ip addresses.

When I had both openvpn devices in the lab, I could ping and access devices on the LAN of the server and client openvpn devices.

What should I do with the routing?

Relevant snapshots of log files are presented below.

Client log file...
16:49:04 2017 us=753544 TCP/UDP: Incoming packet rejected from [AF_INET]6.1.1.4:1024[2], expected peer address: [AF_INET]6.1.1.4:1194 (allow this incoming source address/port by removing --remote or adding --float)
16:49:11 2017 us=280020 UDPv4 WRITE [41] to [AF_INET]6.1.1.4:1194: P_DATA_V2 kid=0 DATA len=40
16:49:14 2017 us=855591 UDPv4 READ [38] from [AF_INET]6.1.1.4:1024: P_DATA_V1 kid=0 DATA len=37
16:49:14 2017 us=855657 TCP/UDP: Incoming packet rejected from [AF_INET]6.1.1.4:1024[2], expected peer address: [AF_INET]6.1.1.4:1194 (allow this incoming source address/port by removing --remote or adding --float)
16:49:22 2017 us=19964 UDPv4 WRITE [41] to [AF_INET]6.1.1.4:1194: P_DATA_V2 kid=0 DATA len=40
16:49:24 2017 us=997396 UDPv4 READ [38] from [AF_INET]6.1.1.4:1024: P_DATA_V1 kid=0 DATA len=37
16:49:24 2017 us=997460 TCP/UDP: Incoming packet rejected from [AF_INET]6.1.1.4:1024[2], expected peer address: [AF_INET]6.1.1.4:1194 (allow this incoming source address/port by removing --remote or adding --float)
16:49:33 2017 us=29964 [server] Inactivity timeout (--ping-restart), restarting
16:49:33 2017 us=30216 TCP/UDP: Closing socket
16:49:33 2017 us=30291 SIGUSR1[soft,ping-restart] received, process restarting
16:49:33 2017 us=30341 Restart pause, 5 second(s)
16:49:38 2017 us=35438 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
16:49:38 2017 us=35483 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
16:49:38 2017 us=35515 Re-using SSL/TLS context
16:49:38 2017 us=35544 LZO compression initializing
16:49:38 2017 us=35749 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
16:49:38 2017 us=35811 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
16:49:38 2017 us=35893 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
16:49:38 2017 us=35920 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
16:49:38 2017 us=35956 TCP/UDP: Preserving recently used remote address: [AF_INET]6.1.1.4:1194
16:49:38 2017 us=35996 Socket Buffers: R=[180224->180224] S=[180224->180224]
16:49:38 2017 us=36028 UDPv4 link local: (not bound)
16:49:38 2017 us=36058 UDPv4 link remote: [AF_INET]6.1.1.4:1194
16:49:38 2017 us=36132 UDPv4 WRITE [14] to [AF_INET]6.1.1.4:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
16:49:38 2017 us=76363 UDPv4 READ [26] from [AF_INET]6.1.1.4:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
16:49:38 2017 us=76420 TLS: Initial packet from [AF_INET]6.1.1.4:1194, sid=2d21f5b8 522ebfdf
16:49:38 2017 us=76496 UDPv4 WRITE [22] to [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=0 [ 0 ]
16:49:38 2017 us=76647 UDPv4 WRITE [174] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=160
16:49:38 2017 us=115158 UDPv4 READ [1200] from [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=1174
16:49:38 2017 us=115271 NOTE: --mute triggered...
16:49:38 2017 us=119685 2 variation(s) on previous 3 message(s) suppressed by --mute
16:49:38 2017 us=119717 VERIFY OK: depth=1, CN=server
16:49:38 2017 us=120405 VERIFY OK: depth=0, CN=server
16:49:38 2017 us=139957 UDPv4 WRITE [1200] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=0 [ 2 ] pid=2 DATA len=1174
16:49:38 2017 us=140081 UDPv4 WRITE [854] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=840
16:49:38 2017 us=156232 UDPv4 READ [22] from [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=0 [ 2 ]
16:49:38 2017 us=160210 NOTE: --mute triggered...
16:49:38 2017 us=176402 3 variation(s) on previous 3 message(s) suppressed by --mute
16:49:38 2017 us=176442 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1570', remote='link-mtu 1558'
16:49:38 2017 us=176554 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth SHA1'
16:49:38 2017 us=176878 UDPv4 WRITE [22] to [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=0 [ 4 ]
16:49:38 2017 us=176936 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
16:49:38 2017 us=176996 [server] Peer Connection Initiated with [AF_INET]6.1.1.4:1194
16:49:39 2017 us=236135 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
16:49:39 2017 us=236209 UDPv4 WRITE [56] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=42
16:49:39 2017 us=253581 UDPv4 READ [22] from [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=0 [ 5 ]
16:49:39 2017 us=253653 UDPv4 READ [211] from [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=197
16:49:39 2017 us=253743 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM'
16:49:39 2017 us=253883 OPTIONS IMPORT: timers and/or timeouts modified
16:49:39 2017 us=253910 OPTIONS IMPORT: --ifconfig/up options modified
16:49:39 2017 us=253932 NOTE: --mute triggered...
16:49:39 2017 us=253956 5 variation(s) on previous 3 message(s) suppressed by --mute
16:49:39 2017 us=253978 Data Channel: using negotiated cipher 'AES-256-GCM'
16:49:39 2017 us=254020 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
16:49:39 2017 us=254281 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
16:49:39 2017 us=254315 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
16:49:39 2017 us=254344 Preserving previous TUN/TAP instance: tun0
16:49:39 2017 us=254401 Initialization Sequence Completed
16:49:39 2017 us=254446 UDPv4 WRITE [22] to [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=0 [ 5 ]
16:49:49 2017 us=320018 UDPv4 WRITE [41] to [AF_INET]6.1.1.4:1194: P_DATA_V2 kid=0 DATA len=40
16:49:50 2017 us=523148 UDPv4 READ [38] from [AF_INET]6.1.1.4:1194: P_DATA_V1 kid=0 DATA len=37
16:49:59 2017 us=455525 NOTE: --mute triggered...
17:49:38 2017 us=79582 718 variation(s) on previous 3 message(s) suppressed by --mute
17:49:38 2017 us=79626 VERIFY OK: depth=1, CN=server
17:49:38 2017 us=80302 VERIFY OK: depth=0, CN=server
17:49:38 2017 us=99849 UDPv4 WRITE [1200] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=1 [ 2 ] pid=2 DATA len=1174
17:49:38 2017 us=99973 UDPv4 WRITE [854] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=1 [ ] pid=3 DATA len=840
17:49:38 2017 us=115340 UDPv4 READ [22] from [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=1 [ 2 ]
17:49:38 2017 us=120927 NOTE: --mute triggered...
17:49:38 2017 us=141461 3 variation(s) on previous 3 message(s) suppressed by --mute
17:49:38 2017 us=141501 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1570', remote='link-mtu 1558'
17:49:38 2017 us=141607 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth SHA1'
17:49:38 2017 us=142121 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
17:49:38 2017 us=142157 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
17:49:38 2017 us=142216 UDPv4 WRITE [22] to [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=1 [ 4 ]
17:49:38 2017 us=142280 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
17:49:47 2017 us=522669 UDPv4 READ [38] from [AF_INET]6.1.1.4:1194: P_DATA_V1 kid=0 DATA len=37
17:49:48 2017 us=594849 UDPv4 WRITE [41] to [AF_INET]6.1.1.4:1194: P_DATA_V2 kid=0 DATA len=40
17:49:57 2017 us=644155 UDPv4 READ [38] from [AF_INET]6.1.1.4:1194: P_DATA_V1 kid=0 DATA len=37
17:49:58 2017 us=832431 NOTE: --mute triggered...
18:49:37 2017 us=457821 716 variation(s) on previous 3 message(s) suppressed by --mute
18:49:37 2017 us=457864 VERIFY OK: depth=1, CN=server
18:49:37 2017 us=458531 VERIFY OK: depth=0, CN=server
18:49:37 2017 us=478080 UDPv4 WRITE [1200] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=2 [ 2 ] pid=2 DATA len=1174
18:49:37 2017 us=478207 UDPv4 WRITE [854] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=2 [ ] pid=3 DATA len=840
18:49:37 2017 us=495986 UDPv4 READ [22] from [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=2 [ 2 ]
18:49:37 2017 us=499778 NOTE: --mute triggered...
18:49:37 2017 us=517938 3 variation(s) on previous 3 message(s) suppressed by --mute
18:49:37 2017 us=517984 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1570', remote='link-mtu 1558'
18:49:37 2017 us=518089 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth SHA1'
18:49:37 2017 us=518601 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
18:49:37 2017 us=518635 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
18:49:37 2017 us=518697 UDPv4 WRITE [22] to [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=2 [ 4 ]
18:49:37 2017 us=518759 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
18:49:47 2017 us=766825 UDPv4 WRITE [41] to [AF_INET]6.1.1.4:1194: P_DATA_V2 kid=1 DATA len=40
18:49:47 2017 us=784211 UDPv4 READ [38] from [AF_INET]6.1.1.4:1194: P_DATA_V1 kid=1 DATA len=37
18:49:57 2017 us=881327 UDPv4 READ [38] from [AF_INET]6.1.1.4:1194: P_DATA_V1 kid=1 DATA len=37
18:49:57 2017 us=881407 NOTE: --mute triggered...
19:49:37 2017 us=272933 709 variation(s) on previous 3 message(s) suppressed by --mute
19:49:37 2017 us=272975 TLS: soft reset sec=0 bytes=27378/-1 pkts=702/0
19:49:37 2017 us=273243 UDPv4 WRITE [14] to [AF_INET]6.1.1.4:1194: P_CONTROL_SOFT_RESET_V1 kid=3 [ ] pid=0 DATA len=0
19:49:37 2017 us=288463 UDPv4 READ [26] from [AF_INET]6.1.1.4:1194: P_CONTROL_SOFT_RESET_V1 kid=3 [ 0 ] pid=0 DATA len=0
19:49:37 2017 us=288549 UDPv4 WRITE [22] to [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=3 [ 0 ]
19:49:37 2017 us=288687 NOTE: --mute triggered...
19:49:37 2017 us=331981 4 variation(s) on previous 3 message(s) suppressed by --mute
19:49:37 2017 us=332018 VERIFY OK: depth=1, CN=server
19:49:37 2017 us=332687 VERIFY OK: depth=0, CN=server
19:49:37 2017 us=352227 UDPv4 WRITE [1200] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=3 [ 2 ] pid=2 DATA len=1174
19:49:37 2017 us=352348 UDPv4 WRITE [854] to [AF_INET]6.1.1.4:1194: P_CONTROL_V1 kid=3 [ ] pid=3 DATA len=840
19:49:37 2017 us=368850 UDPv4 READ [22] from [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=3 [ 2 ]
19:49:37 2017 us=378734 NOTE: --mute triggered...
19:49:37 2017 us=397271 3 variation(s) on previous 3 message(s) suppressed by --mute
19:49:37 2017 us=397315 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1570', remote='link-mtu 1558'
19:49:37 2017 us=397421 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth SHA1'
19:49:37 2017 us=397938 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
19:49:37 2017 us=397974 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
19:49:37 2017 us=398033 UDPv4 WRITE [22] to [AF_INET]6.1.1.4:1194: P_ACK_V1 kid=3 [ 4 ]
19:49:37 2017 us=398094 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
19:49:47 2017 us=610775 UDPv4 READ [38] from [AF_INET]6.1.1.4:1194: P_DATA_V1 kid=2 DATA len=37
19:49:47 2017 us=610863 UDPv4 WRITE [41] to [AF_INET]6.1.1.4:1194: P_DATA_V2 kid=2 DATA len=40
19:49:57 2017 us=768198 UDPv4 WRITE [41] to [AF_INET]6.1.1.4:1194: P_DATA_V2 kid=2 DATA len=40
19:49:57 2017 us=795084 NOTE: --mute triggered...

Server log file...
16:49:37 2017 us=872789 MULTI: multi_create_instance called
16:49:37 2017 us=872870 7.1.1.9:35945 Re-using SSL/TLS context
16:49:37 2017 us=872897 7.1.1.9:35945 LZO compression initializing
16:49:37 2017 us=873129 7.1.1.9:35945 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
16:49:37 2017 us=873165 7.1.1.9:35945 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
16:49:37 2017 us=873263 7.1.1.9:35945 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
16:49:37 2017 us=873288 7.1.1.9:35945 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
16:49:37 2017 us=873352 7.1.1.9:35945 UDPv4 READ [14] from [AF_INET]7.1.1.9:35945: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
16:49:37 2017 us=873394 7.1.1.9:35945 TLS: Initial packet from [AF_INET]7.1.1.9:35945, sid=ca24c0f4 7d375b06
16:49:37 2017 us=873462 7.1.1.9:35945 UDPv4 WRITE [26] to [AF_INET]7.1.1.9:35945: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
16:49:37 2017 us=894958 7.1.1.9:35945 UDPv4 READ [22] from [AF_INET]7.1.1.9:35945: P_ACK_V1 kid=0 [ 0 ]
16:49:37 2017 us=895070 7.1.1.9:35945 UDPv4 READ [174] from [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=160
16:49:37 2017 us=912737 7.1.1.9:35945 NOTE: --mute triggered...
16:49:37 2017 us=955568 7.1.1.9:35945 6 variation(s) on previous 3 message(s) suppressed by --mute
16:49:37 2017 us=955600 7.1.1.9:35945 VERIFY OK: depth=1, CN=server
16:49:37 2017 us=956266 7.1.1.9:35945 VERIFY OK: depth=0, CN=client-122
16:49:37 2017 us=958568 7.1.1.9:35945 UDPv4 WRITE [77] to [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=0 [ 3 ] pid=3 DATA len=51
16:49:37 2017 us=974652 7.1.1.9:35945 UDPv4 READ [431] from [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=0 [ 3 ] pid=4 DATA len=405
16:49:37 2017 us=974723 7.1.1.9:35945 peer info: IV_VER=2.4.3
16:49:37 2017 us=974750 7.1.1.9:35945 peer info: IV_PLAT=linux
16:49:37 2017 us=974772 7.1.1.9:35945 peer info: IV_PROTO=2
16:49:37 2017 us=974792 7.1.1.9:35945 peer info: IV_NCP=2
16:49:37 2017 us=974812 7.1.1.9:35945 peer info: IV_LZ4=1
16:49:37 2017 us=974832 7.1.1.9:35945 peer info: IV_LZ4v2=1
16:49:37 2017 us=974851 7.1.1.9:35945 peer info: IV_LZO=1
16:49:37 2017 us=974871 7.1.1.9:35945 peer info: IV_COMP_STUB=1
16:49:37 2017 us=974892 7.1.1.9:35945 peer info: IV_COMP_STUBv2=1
16:49:37 2017 us=974911 7.1.1.9:35945 peer info: IV_TCPNL=1
16:49:37 2017 us=974981 7.1.1.9:35945 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1570'
16:49:37 2017 us=975083 7.1.1.9:35945 WARNING: 'auth' is used inconsistently, local='auth SHA1', remote='auth SHA256'
16:49:37 2017 us=975502 7.1.1.9:35945 UDPv4 WRITE [261] to [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=0 [ 4 ] pid=4 DATA len=235
16:49:37 2017 us=991332 7.1.1.9:35945 UDPv4 READ [22] from [AF_INET]7.1.1.9:35945: P_ACK_V1 kid=0 [ 4 ]
16:49:37 2017 us=991378 7.1.1.9:35945 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
16:49:37 2017 us=991436 7.1.1.9:35945 [client-122] Peer Connection Initiated with [AF_INET]7.1.1.9:35945
16:49:37 2017 us=991750 MULTI: new connection by client 'client-122' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
16:49:37 2017 us=991803 Could not access file '/tmp/openvpn/ccd/client-122': Permission denied (errno=13)
16:49:37 2017 us=991838 Could not access file '/tmp/openvpn/ccd/DEFAULT': Permission denied (errno=13)
16:49:37 2017 us=991869 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
16:49:37 2017 us=991994 MULTI: Learn: 10.8.0.2 -> client-122/7.1.1.9:35945
16:49:37 2017 us=992027 MULTI: primary virtual IP for client-122/7.1.1.9:35945: 10.8.0.2
16:49:39 2017 us=51544 client-122/7.1.1.9:35945 UDPv4 READ [56] from [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=42
16:49:39 2017 us=51634 client-122/7.1.1.9:35945 PUSH: Received control message: 'PUSH_REQUEST'
16:49:39 2017 us=51732 client-122/7.1.1.9:35945 SENT CONTROL [client-122]: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
16:49:39 2017 us=51758 client-122/7.1.1.9:35945 Data Channel: using negotiated cipher 'AES-256-GCM'
16:49:39 2017 us=51801 client-122/7.1.1.9:35945 Data Channel MTU parms [ L:1550 D:1450 EF:50 EB:406 ET:0 EL:3 ]
16:49:39 2017 us=52057 client-122/7.1.1.9:35945 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
16:49:39 2017 us=52092 client-122/7.1.1.9:35945 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
16:49:39 2017 us=52147 client-122/7.1.1.9:35945 UDPv4 WRITE [22] to [AF_INET]7.1.1.9:35945: P_ACK_V1 kid=0 [ 5 ]
16:49:39 2017 us=52239 client-122/7.1.1.9:35945 UDPv4 WRITE [211] to [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=197
16:49:39 2017 us=69078 client-122/7.1.1.9:35945 UDPv4 READ [22] from [AF_INET]7.1.1.9:35945: P_ACK_V1 kid=0 [ 5 ]
16:49:49 2017 us=152710 client-122/7.1.1.9:35945 NOTE: --mute triggered...
17:49:37 2017 us=823697 client-122/7.1.1.9:35945 712 variation(s) on previous 3 message(s) suppressed by --mute
17:49:37 2017 us=823742 client-122/7.1.1.9:35945 TLS: soft reset sec=0 bytes=26701/-1 pkts=712/0
17:49:37 2017 us=823894 client-122/7.1.1.9:35945 UDPv4 WRITE [14] to [AF_INET]7.1.1.9:35945: P_CONTROL_SOFT_RESET_V1 kid=1 [ ] pid=0 DATA len=0
17:49:37 2017 us=840758 client-122/7.1.1.9:35945 UDPv4 READ [26] from [AF_INET]7.1.1.9:35945: P_CONTROL_SOFT_RESET_V1 kid=1 [ 0 ] pid=0 DATA len=0
17:49:37 2017 us=840853 client-122/7.1.1.9:35945 UDPv4 WRITE [22] to [AF_INET]7.1.1.9:35945: P_ACK_V1 kid=1 [ 0 ]
17:49:37 2017 us=857189 client-122/7.1.1.9:35945 NOTE: --mute triggered...
17:49:37 2017 us=913812 client-122/7.1.1.9:35945 7 variation(s) on previous 3 message(s) suppressed by --mute
17:49:37 2017 us=913848 client-122/7.1.1.9:35945 VERIFY OK: depth=1, CN=server
17:49:37 2017 us=914530 client-122/7.1.1.9:35945 VERIFY OK: depth=0, CN=client-122
17:49:37 2017 us=916827 client-122/7.1.1.9:35945 UDPv4 WRITE [77] to [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=1 [ 3 ] pid=3 DATA len=51
17:49:37 2017 us=936534 client-122/7.1.1.9:35945 UDPv4 READ [422] from [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=1 [ 3 ] pid=4 DATA len=396
17:49:37 2017 us=936613 client-122/7.1.1.9:35945 peer info: IV_VER=2.4.3
17:49:37 2017 us=936641 client-122/7.1.1.9:35945 peer info: IV_PLAT=linux
17:49:37 2017 us=936664 client-122/7.1.1.9:35945 peer info: IV_PROTO=2
17:49:37 2017 us=936686 client-122/7.1.1.9:35945 peer info: IV_LZ4=1
17:49:37 2017 us=936706 client-122/7.1.1.9:35945 peer info: IV_LZ4v2=1
17:49:37 2017 us=936727 client-122/7.1.1.9:35945 peer info: IV_LZO=1
17:49:37 2017 us=936747 client-122/7.1.1.9:35945 peer info: IV_COMP_STUB=1
17:49:37 2017 us=936768 client-122/7.1.1.9:35945 peer info: IV_COMP_STUBv2=1
17:49:37 2017 us=936788 client-122/7.1.1.9:35945 peer info: IV_TCPNL=1
17:49:37 2017 us=936857 client-122/7.1.1.9:35945 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1570'
17:49:37 2017 us=936958 client-122/7.1.1.9:35945 WARNING: 'auth' is used inconsistently, local='auth SHA1', remote='auth SHA256'
17:49:37 2017 us=937513 client-122/7.1.1.9:35945 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
17:49:37 2017 us=937550 client-122/7.1.1.9:35945 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
17:49:37 2017 us=937631 client-122/7.1.1.9:35945 UDPv4 WRITE [261] to [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=1 [ 4 ] pid=4 DATA len=235
17:49:37 2017 us=955611 client-122/7.1.1.9:35945 UDPv4 READ [22] from [AF_INET]7.1.1.9:35945: P_ACK_V1 kid=1 [ 4 ]
17:49:37 2017 us=955652 client-122/7.1.1.9:35945 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
17:49:47 2017 us=318649 client-122/7.1.1.9:35945 UDPv4 WRITE [38] to [AF_INET]7.1.1.9:35945: P_DATA_V1 kid=0 DATA len=37
17:49:48 2017 us=418788 client-122/7.1.1.9:35945 UDPv4 READ [41] from [AF_INET]7.1.1.9:35945: P_DATA_V2 kid=0 DATA len=40
17:49:57 2017 us=438625 client-122/7.1.1.9:35945 UDPv4 WRITE [38] to [AF_INET]7.1.1.9:35945: P_DATA_V1 kid=0 DATA len=37
17:49:58 2017 us=645166 client-122/7.1.1.9:35945 NOTE: --mute triggered...
18:49:37 2017 us=195350 client-122/7.1.1.9:35945 708 variation(s) on previous 3 message(s) suppressed by --mute
18:49:37 2017 us=195395 client-122/7.1.1.9:35945 TLS: soft reset sec=0 bytes=26288/-1 pkts=701/0
18:49:37 2017 us=195672 client-122/7.1.1.9:35945 UDPv4 WRITE [14] to [AF_INET]7.1.1.9:35945: P_CONTROL_SOFT_RESET_V1 kid=2 [ ] pid=0 DATA len=0
18:49:37 2017 us=212929 client-122/7.1.1.9:35945 UDPv4 READ [41] from [AF_INET]7.1.1.9:35945: P_DATA_V2 kid=1 DATA len=40
18:49:37 2017 us=213842 client-122/7.1.1.9:35945 UDPv4 READ [26] from [AF_INET]7.1.1.9:35945: P_CONTROL_SOFT_RESET_V1 kid=2 [ 0 ] pid=0 DATA len=0
18:49:37 2017 us=213905 client-122/7.1.1.9:35945 NOTE: --mute triggered...
18:49:37 2017 us=292326 client-122/7.1.1.9:35945 8 variation(s) on previous 3 message(s) suppressed by --mute
18:49:37 2017 us=292362 client-122/7.1.1.9:35945 VERIFY OK: depth=1, CN=server
18:49:37 2017 us=293036 client-122/7.1.1.9:35945 VERIFY OK: depth=0, CN=client-122
18:49:37 2017 us=295352 client-122/7.1.1.9:35945 UDPv4 WRITE [77] to [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=2 [ 3 ] pid=3 DATA len=51
18:49:37 2017 us=313298 client-122/7.1.1.9:35945 UDPv4 READ [422] from [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=2 [ 3 ] pid=4 DATA len=396
18:49:37 2017 us=313371 client-122/7.1.1.9:35945 peer info: IV_VER=2.4.3
18:49:37 2017 us=313398 client-122/7.1.1.9:35945 peer info: IV_PLAT=linux
18:49:37 2017 us=313427 client-122/7.1.1.9:35945 peer info: IV_PROTO=2
18:49:37 2017 us=313452 client-122/7.1.1.9:35945 peer info: IV_LZ4=1
18:49:37 2017 us=313474 client-122/7.1.1.9:35945 peer info: IV_LZ4v2=1
18:49:37 2017 us=313494 client-122/7.1.1.9:35945 peer info: IV_LZO=1
18:49:37 2017 us=313515 client-122/7.1.1.9:35945 peer info: IV_COMP_STUB=1
18:49:37 2017 us=313535 client-122/7.1.1.9:35945 peer info: IV_COMP_STUBv2=1
18:49:37 2017 us=313555 client-122/7.1.1.9:35945 peer info: IV_TCPNL=1
18:49:37 2017 us=313622 client-122/7.1.1.9:35945 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1570'
18:49:37 2017 us=313719 client-122/7.1.1.9:35945 WARNING: 'auth' is used inconsistently, local='auth SHA1', remote='auth SHA256'
18:49:37 2017 us=314262 client-122/7.1.1.9:35945 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
18:49:37 2017 us=314295 client-122/7.1.1.9:35945 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
18:49:37 2017 us=314377 client-122/7.1.1.9:35945 UDPv4 WRITE [261] to [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=2 [ 4 ] pid=4 DATA len=235
18:49:37 2017 us=333204 client-122/7.1.1.9:35945 UDPv4 READ [22] from [AF_INET]7.1.1.9:35945: P_ACK_V1 kid=2 [ 4 ]
18:49:37 2017 us=333247 client-122/7.1.1.9:35945 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
18:49:47 2017 us=579829 client-122/7.1.1.9:35945 UDPv4 READ [41] from [AF_INET]7.1.1.9:35945: P_DATA_V2 kid=1 DATA len=40
18:49:47 2017 us=579925 client-122/7.1.1.9:35945 UDPv4 WRITE [38] to [AF_INET]7.1.1.9:35945: P_DATA_V1 kid=1 DATA len=37
18:49:57 2017 us=665523 client-122/7.1.1.9:35945 UDPv4 WRITE [38] to [AF_INET]7.1.1.9:35945: P_DATA_V1 kid=1 DATA len=37
18:49:57 2017 us=694306 client-122/7.1.1.9:35945 NOTE: --mute triggered...
19:49:37 2017 us=172436 client-122/7.1.1.9:35945 719 variation(s) on previous 3 message(s) suppressed by --mute
19:49:37 2017 us=172477 client-122/7.1.1.9:35945 VERIFY OK: depth=1, CN=server
19:49:37 2017 us=173161 client-122/7.1.1.9:35945 VERIFY OK: depth=0, CN=client-122
19:49:37 2017 us=175461 client-122/7.1.1.9:35945 UDPv4 WRITE [77] to [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=3 [ 3 ] pid=3 DATA len=51
19:49:37 2017 us=191830 client-122/7.1.1.9:35945 UDPv4 READ [422] from [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=3 [ 3 ] pid=4 DATA len=396
19:49:37 2017 us=191902 client-122/7.1.1.9:35945 peer info: IV_VER=2.4.3
19:49:37 2017 us=191932 client-122/7.1.1.9:35945 peer info: IV_PLAT=linux
19:49:37 2017 us=191954 client-122/7.1.1.9:35945 peer info: IV_PROTO=2
19:49:37 2017 us=191975 client-122/7.1.1.9:35945 peer info: IV_LZ4=1
19:49:37 2017 us=191996 client-122/7.1.1.9:35945 peer info: IV_LZ4v2=1
19:49:37 2017 us=192016 client-122/7.1.1.9:35945 peer info: IV_LZO=1
19:49:37 2017 us=192036 client-122/7.1.1.9:35945 peer info: IV_COMP_STUB=1
19:49:37 2017 us=192057 client-122/7.1.1.9:35945 peer info: IV_COMP_STUBv2=1
19:49:37 2017 us=192077 client-122/7.1.1.9:35945 peer info: IV_TCPNL=1
19:49:37 2017 us=192145 client-122/7.1.1.9:35945 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1570'
19:49:37 2017 us=192245 client-122/7.1.1.9:35945 WARNING: 'auth' is used inconsistently, local='auth SHA1', remote='auth SHA256'
19:49:37 2017 us=192807 client-122/7.1.1.9:35945 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
19:49:37 2017 us=192847 client-122/7.1.1.9:35945 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
19:49:37 2017 us=192930 client-122/7.1.1.9:35945 UDPv4 WRITE [261] to [AF_INET]7.1.1.9:35945: P_CONTROL_V1 kid=3 [ 4 ] pid=4 DATA len=235
19:49:37 2017 us=210259 client-122/7.1.1.9:35945 UDPv4 READ [22] from [AF_INET]7.1.1.9:35945: P_ACK_V1 kid=3 [ 4 ]
19:49:37 2017 us=210301 client-122/7.1.1.9:35945 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
19:49:47 2017 us=407655 client-122/7.1.1.9:35945 UDPv4 WRITE [38] to [AF_INET]7.1.1.9:35945: P_DATA_V1 kid=2 DATA len=37
19:49:47 2017 us=424967 client-122/7.1.1.9:35945 UDPv4 READ [41] from [AF_INET]7.1.1.9:35945: P_DATA_V2 kid=2 DATA len=40
19:49:57 2017 us=591461 client-122/7.1.1.9:35945 UDPv4 READ [41] from [AF_INET]7.1.1.9:35945: P_DATA_V2 kid=2 DATA len=40
19:49:57 2017 us=591539 client-122/7.1.1.9:35945 NOTE: --mute triggered...

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: routing issue?

Post by TinCanTech » Fri Dec 08, 2017 11:01 am


Post Reply