shaper not working

Samples of working configurations.
Post Reply
qwerty
OpenVPN User
Posts: 13
Joined: Thu Jan 08, 2015 1:21 pm

shaper not working

Post by qwerty » Wed Mar 11, 2015 2:18 am

I want to limit traffic for each client but the "shaper" setting has no effect . The clients still have no bandwidth restriction .

Client config :

Code: Select all

client
shaper 1000000
dev tun
proto udp
remote IP 1194   
resolv-retry infinite
nobind
persist-key
persist-tun
ns-cert-type server
comp-lzo
verb 3
explicit-exit-notify 2
ping 10
ping-restart 60
route-method exe
route-delay 2

User avatar
Traffic
OpenVPN Protagonist
Posts: 4081
Joined: Sat Aug 09, 2014 11:24 am

Re: shaper not working

Post by Traffic » Wed Mar 11, 2015 10:30 pm

What about your server config ?

oh yeah .. and logs ..

:lol:

qwerty
OpenVPN User
Posts: 13
Joined: Thu Jan 08, 2015 1:21 pm

Re: shaper not working

Post by qwerty » Wed Mar 18, 2015 1:30 pm

Server cfg

Code: Select all

port 443
proto tcp
tcp-nodelay
socket-flags TCP_NODELAY
dev tun
server 10.0.0.0 255.255.255.0  
push "redirect-gateway def1"
push "dhcp-option DNS 8.8.8.8"      
keepalive 10 120         
comp-lzo                   
persist-key                
persist-tun                
verb 3                      
dev-node ...
ca ....
cert ...
key ...
dh "...
duplicate-cn
Recent Server log:

Code: Select all

Mon Mar 16 21:45:56 2015 LZO compression initialized
Mon Mar 16 21:45:56 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:45:56 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:45:56 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:45:56 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:45:56 2015 TCP connection established with 67.207.202.9:59535
Mon Mar 16 21:45:56 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:45:56 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:45:56 2015 TCPv4_SERVER link remote: 67.207.202.9:59535
Mon Mar 16 21:45:56 2015 67.207.202.9:59535 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:45:56 2015 67.207.202.9:59535 Connection reset, restarting [0]
Mon Mar 16 21:45:56 2015 67.207.202.9:59535 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:45:56 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:34 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:34 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:34 2015 LZO compression initialized
Mon Mar 16 21:55:34 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:34 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:34 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:34 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:34 2015 TCP connection established with 175.17.207.234:27503
Mon Mar 16 21:55:34 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:34 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:34 2015 TCPv4_SERVER link remote: 175.17.207.234:27503
Mon Mar 16 21:55:40 2015 175.17.207.234:27503 WARNING: Bad encapsulated packet length from peer (20304), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:40 2015 175.17.207.234:27503 Connection reset, restarting [0]
Mon Mar 16 21:55:40 2015 175.17.207.234:27503 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:40 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:40 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:40 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:40 2015 LZO compression initialized
Mon Mar 16 21:55:40 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:40 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:40 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:40 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:40 2015 TCP connection established with 175.17.198.71:62114
Mon Mar 16 21:55:40 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:40 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:40 2015 TCPv4_SERVER link remote: 175.17.198.71:62114
Mon Mar 16 21:55:40 2015 175.17.198.71:62114 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:40 2015 175.17.198.71:62114 Connection reset, restarting [0]
Mon Mar 16 21:55:40 2015 175.17.198.71:62114 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:40 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:41 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:41 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:41 2015 LZO compression initialized
Mon Mar 16 21:55:41 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:41 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:41 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:41 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:41 2015 TCP connection established with 175.17.198.71:22009
Mon Mar 16 21:55:41 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:41 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:41 2015 TCPv4_SERVER link remote: 175.17.198.71:22009
Mon Mar 16 21:55:41 2015 175.17.198.71:22009 WARNING: Bad encapsulated packet length from peer (32926), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:41 2015 175.17.198.71:22009 Connection reset, restarting [0]
Mon Mar 16 21:55:41 2015 175.17.198.71:22009 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:41 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:42 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:42 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:42 2015 LZO compression initialized
Mon Mar 16 21:55:42 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:42 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:42 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:42 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:42 2015 TCP connection established with 175.17.196.162:64492
Mon Mar 16 21:55:42 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:42 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:42 2015 TCPv4_SERVER link remote: 175.17.196.162:64492
Mon Mar 16 21:55:42 2015 175.17.196.162:64492 WARNING: Bad encapsulated packet length from peer (27648), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:42 2015 175.17.196.162:64492 Connection reset, restarting [0]
Mon Mar 16 21:55:42 2015 175.17.196.162:64492 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:42 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:42 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:42 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:42 2015 LZO compression initialized
Mon Mar 16 21:55:42 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:42 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:42 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:42 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:42 2015 TCP connection established with 175.17.204.21:34157
Mon Mar 16 21:55:42 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:42 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:42 2015 TCPv4_SERVER link remote: 175.17.204.21:34157
Mon Mar 16 21:55:42 2015 175.17.204.21:34157 WARNING: Bad encapsulated packet length from peer (15475), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:42 2015 175.17.204.21:34157 Connection reset, restarting [0]
Mon Mar 16 21:55:42 2015 175.17.204.21:34157 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:42 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:43 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:43 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:43 2015 LZO compression initialized
Mon Mar 16 21:55:43 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:43 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:43 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:43 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:43 2015 TCP connection established with 175.17.205.189:45444
Mon Mar 16 21:55:43 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:43 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:43 2015 TCPv4_SERVER link remote: 175.17.205.189:45444
Mon Mar 16 21:55:43 2015 175.17.205.189:45444 WARNING: Bad encapsulated packet length from peer (3338), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:43 2015 175.17.205.189:45444 Connection reset, restarting [0]
Mon Mar 16 21:55:43 2015 175.17.205.189:45444 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:43 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:44 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:44 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:44 2015 LZO compression initialized
Mon Mar 16 21:55:44 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:44 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:44 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:44 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:44 2015 TCP connection established with 175.17.205.189:38764
Mon Mar 16 21:55:44 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:44 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:44 2015 TCPv4_SERVER link remote: 175.17.205.189:38764
Mon Mar 16 21:55:44 2015 175.17.205.189:38764 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:44 2015 175.17.205.189:38764 Connection reset, restarting [0]
Mon Mar 16 21:55:44 2015 175.17.205.189:38764 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:44 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:44 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:44 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:44 2015 LZO compression initialized
Mon Mar 16 21:55:44 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:44 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:44 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:44 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:44 2015 TCP connection established with 175.17.204.21:14246
Mon Mar 16 21:55:44 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:44 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:44 2015 TCPv4_SERVER link remote: 175.17.204.21:14246
Mon Mar 16 21:55:44 2015 175.17.204.21:14246 WARNING: Bad encapsulated packet length from peer (20304), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:44 2015 175.17.204.21:14246 Connection reset, restarting [0]
Mon Mar 16 21:55:44 2015 175.17.204.21:14246 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:44 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:45 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:45 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:45 2015 LZO compression initialized
Mon Mar 16 21:55:45 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:45 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:45 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:45 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:45 2015 TCP connection established with 175.17.208.212:22603
Mon Mar 16 21:55:45 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:45 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:45 2015 TCPv4_SERVER link remote: 175.17.208.212:22603
Mon Mar 16 21:55:45 2015 175.17.208.212:22603 WARNING: Bad encapsulated packet length from peer (32768), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:45 2015 175.17.208.212:22603 Connection reset, restarting [0]
Mon Mar 16 21:55:45 2015 175.17.208.212:22603 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:45 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:46 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:46 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:46 2015 LZO compression initialized
Mon Mar 16 21:55:46 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:46 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:46 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:46 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:46 2015 TCP connection established with 175.17.197.52:2227
Mon Mar 16 21:55:46 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:46 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:46 2015 TCPv4_SERVER link remote: 175.17.197.52:2227
Mon Mar 16 21:55:46 2015 175.17.197.52:2227 TLS Error: unknown opcode received from 175.17.197.52:2227 op=0
Mon Mar 16 21:55:46 2015 175.17.197.52:2227 Fatal TLS error (check_tls_errors_co), restarting
Mon Mar 16 21:55:46 2015 175.17.197.52:2227 SIGUSR1[soft,tls-error] received, client-instance restarting
Mon Mar 16 21:55:46 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:46 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:46 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:46 2015 LZO compression initialized
Mon Mar 16 21:55:46 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:46 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:46 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:46 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:46 2015 TCP connection established with 175.17.202.113:43782
Mon Mar 16 21:55:46 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:46 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:46 2015 TCPv4_SERVER link remote: 175.17.202.113:43782
Mon Mar 16 21:55:46 2015 175.17.202.113:43782 TLS Error: unknown opcode received from 175.17.202.113:43782 op=0
Mon Mar 16 21:55:46 2015 175.17.202.113:43782 Fatal TLS error (check_tls_errors_co), restarting
Mon Mar 16 21:55:46 2015 175.17.202.113:43782 SIGUSR1[soft,tls-error] received, client-instance restarting
Mon Mar 16 21:55:46 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:47 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:47 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:47 2015 LZO compression initialized
Mon Mar 16 21:55:47 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:47 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:47 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:47 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:47 2015 TCP connection established with 175.17.201.98:58613
Mon Mar 16 21:55:47 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:47 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:47 2015 TCPv4_SERVER link remote: 175.17.201.98:58613
Mon Mar 16 21:55:47 2015 175.17.201.98:58613 WARNING: Bad encapsulated packet length from peer (18501), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:47 2015 175.17.201.98:58613 Connection reset, restarting [0]
Mon Mar 16 21:55:47 2015 175.17.201.98:58613 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:47 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:48 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:48 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:48 2015 LZO compression initialized
Mon Mar 16 21:55:48 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:48 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:48 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:48 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:48 2015 TCP connection established with 175.17.207.234:2035
Mon Mar 16 21:55:48 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:48 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:48 2015 TCPv4_SERVER link remote: 175.17.207.234:2035
Mon Mar 16 21:55:48 2015 175.17.207.234:2035 WARNING: Bad encapsulated packet length from peer (0), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:48 2015 175.17.207.234:2035 Connection reset, restarting [0]
Mon Mar 16 21:55:48 2015 175.17.207.234:2035 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:48 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:48 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:48 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:48 2015 LZO compression initialized
Mon Mar 16 21:55:48 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:48 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:48 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:48 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:48 2015 TCP connection established with 175.17.192.106:21853
Mon Mar 16 21:55:48 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:48 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:48 2015 TCPv4_SERVER link remote: 175.17.192.106:21853
Mon Mar 16 21:55:48 2015 175.17.192.106:21853 WARNING: Bad encapsulated packet length from peer (0), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:48 2015 175.17.192.106:21853 Connection reset, restarting [0]
Mon Mar 16 21:55:48 2015 175.17.192.106:21853 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:48 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:49 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:49 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:49 2015 LZO compression initialized
Mon Mar 16 21:55:49 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:49 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:49 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:49 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:49 2015 TCP connection established with 175.17.203.30:4743
Mon Mar 16 21:55:49 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:49 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:49 2015 TCPv4_SERVER link remote: 175.17.203.30:4743
Mon Mar 16 21:55:49 2015 175.17.203.30:4743 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:49 2015 175.17.203.30:4743 Connection reset, restarting [0]
Mon Mar 16 21:55:49 2015 175.17.203.30:4743 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:49 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:50 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:50 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:50 2015 LZO compression initialized
Mon Mar 16 21:55:50 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:50 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:50 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:50 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:50 2015 TCP connection established with 175.17.201.71:49120
Mon Mar 16 21:55:50 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:50 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:50 2015 TCPv4_SERVER link remote: 175.17.201.71:49120
Mon Mar 16 21:55:55 2015 175.17.201.71:49120 Connection reset, restarting [0]
Mon Mar 16 21:55:55 2015 175.17.201.71:49120 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:55 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:55 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:55 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:55 2015 LZO compression initialized
Mon Mar 16 21:55:55 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:55 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:55 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:55 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:55 2015 TCP connection established with 175.17.203.30:1599
Mon Mar 16 21:55:55 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:55 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:55 2015 TCPv4_SERVER link remote: 175.17.203.30:1599
Mon Mar 16 21:55:55 2015 175.17.203.30:1599 WARNING: Bad encapsulated packet length from peer (12300), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:55 2015 175.17.203.30:1599 Connection reset, restarting [0]
Mon Mar 16 21:55:55 2015 175.17.203.30:1599 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:55 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:56 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:56 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:56 2015 LZO compression initialized
Mon Mar 16 21:55:56 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:56 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:56 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:56 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:56 2015 TCP connection established with 175.17.194.181:27731
Mon Mar 16 21:55:56 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:56 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:56 2015 TCPv4_SERVER link remote: 175.17.194.181:27731
Mon Mar 16 21:55:56 2015 175.17.194.181:27731 WARNING: Bad encapsulated packet length from peer (20304), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:56 2015 175.17.194.181:27731 Connection reset, restarting [0]
Mon Mar 16 21:55:56 2015 175.17.194.181:27731 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:56 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:56 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:56 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:56 2015 LZO compression initialized
Mon Mar 16 21:55:56 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:56 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:56 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:56 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:56 2015 TCP connection established with 175.17.195.114:18374
Mon Mar 16 21:55:56 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:56 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:56 2015 TCPv4_SERVER link remote: 175.17.195.114:18374
Mon Mar 16 21:55:56 2015 175.17.195.114:18374 WARNING: Bad encapsulated packet length from peer (21582), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:56 2015 175.17.195.114:18374 Connection reset, restarting [0]
Mon Mar 16 21:55:56 2015 175.17.195.114:18374 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:56 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:57 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:57 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:57 2015 LZO compression initialized
Mon Mar 16 21:55:57 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:57 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:57 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:57 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:57 2015 TCP connection established with 175.17.195.114:49804
Mon Mar 16 21:55:57 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:57 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:57 2015 TCPv4_SERVER link remote: 175.17.195.114:49804
Mon Mar 16 21:56:02 2015 175.17.195.114:49804 Connection reset, restarting [0]
Mon Mar 16 21:56:02 2015 175.17.195.114:49804 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:56:02 2015 TCP/UDP: Closing socket
Mon Mar 16 21:56:02 2015 MULTI: multi_create_instance called
Mon Mar 16 21:56:02 2015 Re-using SSL/TLS context
Mon Mar 16 21:56:02 2015 LZO compression initialized
Mon Mar 16 21:56:02 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:56:02 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:56:02 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:56:02 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:56:02 2015 TCP connection established with 175.17.200.186:7520
Mon Mar 16 21:56:02 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:56:02 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:56:02 2015 TCPv4_SERVER link remote: 175.17.200.186:7520
Mon Mar 16 21:56:02 2015 175.17.200.186:7520 WARNING: Bad encapsulated packet length from peer (17517), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:56:02 2015 175.17.200.186:7520 Connection reset, restarting [0]
Mon Mar 16 21:56:02 2015 175.17.200.186:7520 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:56:02 2015 TCP/UDP: Closing socket
Mon Mar 16 21:56:03 2015 MULTI: multi_create_instance called
Mon Mar 16 21:56:03 2015 Re-using SSL/TLS context
Mon Mar 16 21:56:03 2015 LZO compression initialized
Mon Mar 16 21:56:03 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:56:03 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:56:03 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:56:03 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:56:03 2015 TCP connection established with 175.17.198.204:54218
Mon Mar 16 21:56:03 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:56:03 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:56:03 2015 TCPv4_SERVER link remote: 175.17.198.204:54218
Mon Mar 16 21:56:03 2015 175.17.198.204:54218 WARNING: Bad encapsulated packet length from peer (14848), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:56:03 2015 175.17.198.204:54218 Connection reset, restarting [0]
Mon Mar 16 21:56:03 2015 175.17.198.204:54218 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:56:03 2015 TCP/UDP: Closing socket
Tue Mar 17 06:42:55 2015 MULTI: multi_create_instance called
Tue Mar 17 06:42:55 2015 Re-using SSL/TLS context
Tue Mar 17 06:42:55 2015 LZO compression initialized
Tue Mar 17 06:42:55 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 06:42:55 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 06:42:55 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 06:42:55 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 06:42:55 2015 TCP connection established with 184.105.247.195:37000
Tue Mar 17 06:42:55 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 06:42:55 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 06:42:55 2015 TCPv4_SERVER link remote: 184.105.247.195:37000
Tue Mar 17 06:42:56 2015 184.105.247.195:37000 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 06:42:56 2015 184.105.247.195:37000 Connection reset, restarting [0]
Tue Mar 17 06:42:56 2015 184.105.247.195:37000 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 06:42:56 2015 TCP/UDP: Closing socket
Tue Mar 17 09:31:44 2015 MULTI: multi_create_instance called
Tue Mar 17 09:31:44 2015 Re-using SSL/TLS context
Tue Mar 17 09:31:44 2015 LZO compression initialized
Tue Mar 17 09:31:44 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 09:31:44 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 09:31:44 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 09:31:44 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 09:31:44 2015 TCP connection established with 141.212.122.34:51656
Tue Mar 17 09:31:44 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 09:31:44 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 09:31:44 2015 TCPv4_SERVER link remote: 141.212.122.34:51656
Tue Mar 17 09:31:44 2015 141.212.122.34:51656 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 09:31:44 2015 141.212.122.34:51656 Connection reset, restarting [0]
Tue Mar 17 09:31:44 2015 141.212.122.34:51656 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 09:31:44 2015 TCP/UDP: Closing socket
Tue Mar 17 09:32:37 2015 MULTI: multi_create_instance called
Tue Mar 17 09:32:37 2015 Re-using SSL/TLS context
Tue Mar 17 09:32:37 2015 LZO compression initialized
Tue Mar 17 09:32:37 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 09:32:37 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 09:32:37 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 09:32:37 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 09:32:37 2015 TCP connection established with 141.212.122.58:54538
Tue Mar 17 09:32:37 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 09:32:37 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 09:32:37 2015 TCPv4_SERVER link remote: 141.212.122.58:54538
Tue Mar 17 09:32:37 2015 141.212.122.58:54538 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 09:32:37 2015 141.212.122.58:54538 Connection reset, restarting [0]
Tue Mar 17 09:32:37 2015 141.212.122.58:54538 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 09:32:37 2015 TCP/UDP: Closing socket
Tue Mar 17 10:38:39 2015 MULTI: multi_create_instance called
Tue Mar 17 10:38:39 2015 Re-using SSL/TLS context
Tue Mar 17 10:38:39 2015 LZO compression initialized
Tue Mar 17 10:38:39 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 10:38:39 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 10:38:39 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 10:38:39 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 10:38:39 2015 TCP connection established with 188.138.9.50:58568
Tue Mar 17 10:38:39 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 10:38:39 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 10:38:39 2015 TCPv4_SERVER link remote: 188.138.9.50:58568
Tue Mar 17 10:38:39 2015 188.138.9.50:58568 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 10:38:39 2015 188.138.9.50:58568 Connection reset, restarting [0]
Tue Mar 17 10:38:39 2015 188.138.9.50:58568 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 10:38:39 2015 TCP/UDP: Closing socket
Tue Mar 17 17:45:00 2015 MULTI: multi_create_instance called
Tue Mar 17 17:45:00 2015 Re-using SSL/TLS context
Tue Mar 17 17:45:00 2015 LZO compression initialized
Tue Mar 17 17:45:00 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 17:45:00 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 17:45:00 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 17:45:00 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 17:45:00 2015 TCP connection established with 141.212.122.26:25642
Tue Mar 17 17:45:00 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 17:45:00 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 17:45:00 2015 TCPv4_SERVER link remote: 141.212.122.26:25642
Tue Mar 17 17:45:00 2015 141.212.122.26:25642 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 17:45:00 2015 141.212.122.26:25642 Connection reset, restarting [0]
Tue Mar 17 17:45:00 2015 141.212.122.26:25642 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 17:45:00 2015 TCP/UDP: Closing socket
Tue Mar 17 19:32:59 2015 MULTI: multi_create_instance called
Tue Mar 17 19:32:59 2015 Re-using SSL/TLS context
Tue Mar 17 19:32:59 2015 LZO compression initialized
Tue Mar 17 19:32:59 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 19:32:59 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 19:32:59 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 19:32:59 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 19:32:59 2015 TCP connection established with 188.132.207.46:45292
Tue Mar 17 19:32:59 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 19:32:59 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 19:32:59 2015 TCPv4_SERVER link remote: 188.132.207.46:45292
Tue Mar 17 19:32:59 2015 188.132.207.46:45292 WARNING: Bad encapsulated packet length from peer (32871), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 19:32:59 2015 188.132.207.46:45292 Connection reset, restarting [0]
Tue Mar 17 19:32:59 2015 188.132.207.46:45292 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 19:32:59 2015 TCP/UDP: Closing socket
Tue Mar 17 21:49:55 2015 MULTI: multi_create_instance called
Tue Mar 17 21:49:55 2015 Re-using SSL/TLS context
Tue Mar 17 21:49:55 2015 LZO compression initialized
Tue Mar 17 21:49:55 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 21:49:55 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 21:49:55 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 21:49:55 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 21:49:55 2015 TCP connection established with 67.207.202.9:32967
Tue Mar 17 21:49:55 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 21:49:55 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 21:49:55 2015 TCPv4_SERVER link remote: 67.207.202.9:32967
Tue Mar 17 21:49:55 2015 67.207.202.9:32967 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 21:49:55 2015 67.207.202.9:32967 Connection reset, restarting [0]
Tue Mar 17 21:49:55 2015 67.207.202.9:32967 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 21:49:55 2015 TCP/UDP: Closing socket
Wed Mar 18 02:22:01 2015 MULTI: multi_create_instance called
Wed Mar 18 02:22:01 2015 Re-using SSL/TLS context
Wed Mar 18 02:22:01 2015 LZO compression initialized
Wed Mar 18 02:22:01 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Wed Mar 18 02:22:01 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Mar 18 02:22:01 2015 Local Options hash (VER=V4): 'c0103fa8'
Wed Mar 18 02:22:01 2015 Expected Remote Options hash (VER=V4): '69109d17'
Wed Mar 18 02:22:01 2015 TCP connection established with 61.240.144.66:60000
Wed Mar 18 02:22:01 2015 Socket flags: TCP_NODELAY=1 succeeded
Wed Mar 18 02:22:01 2015 TCPv4_SERVER link local: [undef]
Wed Mar 18 02:22:01 2015 TCPv4_SERVER link remote: 61.240.144.66:60000
Wed Mar 18 02:22:03 2015 61.240.144.66:60000 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Wed Mar 18 02:22:03 2015 61.240.144.66:60000 Connection reset, restarting [0]
Wed Mar 18 02:22:03 2015 61.240.144.66:60000 SIGUSR1[soft,connection-reset] received, client-instance restarting
Wed Mar 18 02:22:03 2015 TCP/UDP: Closing socket
Wed Mar 18 06:19:05 2015 MULTI: multi_create_instance called
Wed Mar 18 06:19:05 2015 Re-using SSL/TLS context
Wed Mar 18 06:19:05 2015 LZO compression initialized
Wed Mar 18 06:19:05 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Wed Mar 18 06:19:05 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Mar 18 06:19:05 2015 Local Options hash (VER=V4): 'c0103fa8'
Wed Mar 18 06:19:05 2015 Expected Remote Options hash (VER=V4): '69109d17'
Wed Mar 18 06:19:05 2015 TCP connection established with 74.82.47.2:39528
Wed Mar 18 06:19:05 2015 Socket flags: TCP_NODELAY=1 succeeded
Wed Mar 18 06:19:05 2015 TCPv4_SERVER link local: [undef]
Wed Mar 18 06:19:05 2015 TCPv4_SERVER link remote: 74.82.47.2:39528
Wed Mar 18 06:19:06 2015 74.82.47.2:39528 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Wed Mar 18 06:19:06 2015 74.82.47.2:39528 Connection reset, restarting [0]
Wed Mar 18 06:19:06 2015 74.82.47.2:39528 SIGUSR1[soft,connection-reset] received, client-instance restarting
Wed Mar 18 06:19:06 2015 TCP/UDP: Closing socket
Wed Mar 18 11:45:09 2015 MULTI: multi_create_instance called
Wed Mar 18 11:45:09 2015 Re-using SSL/TLS context
Wed Mar 18 11:45:09 2015 LZO compression initialized
Wed Mar 18 11:45:09 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Wed Mar 18 11:45:09 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Mar 18 11:45:09 2015 Local Options hash (VER=V4): 'c0103fa8'
Wed Mar 18 11:45:09 2015 Expected Remote Options hash (VER=V4): '69109d17'
Wed Mar 18 11:45:09 2015 TCP connection established with 91.123.201.238:60000
Wed Mar 18 11:45:09 2015 Socket flags: TCP_NODELAY=1 succeeded
Wed Mar 18 11:45:09 2015 TCPv4_SERVER link local: [undef]
Wed Mar 18 11:45:09 2015 TCPv4_SERVER link remote: 91.123.201.238:60000
Wed Mar 18 11:45:11 2015 91.123.201.238:60000 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Wed Mar 18 11:45:11 2015 91.123.201.238:60000 Connection reset, restarting [0]
Wed Mar 18 11:45:11 2015 91.123.201.238:60000 SIGUSR1[soft,connection-reset] received, client-instance restarting
Wed Mar 18 11:45:11 2015 TCP/UDP: Closing socket

User avatar
Traffic
OpenVPN Protagonist
Posts: 4081
Joined: Sat Aug 09, 2014 11:24 am

Re: shaper not working

Post by Traffic » Wed Mar 18, 2015 7:56 pm

Before I start testing this be aware:
The Manual wrote:--shaper n
  • Limit bandwidth of outgoing tunnel data to n bytes per second on the TCP/UDP port. Note that this will only work if mode is set to p2p
I am not particularly confident on this occasion that the manual is 100% accurate on this point, especially considering this point:
The Manual wrote:--topology mode
  • Configure virtual addressing topology when running in --dev tun mode.
    mode can be one of:
    p2p -- Use a point-to-point topology where the remote endpoint of the client's tun interface always points to the local endpoint of the server's tun interface. This mode allocates a single IP address per connecting client. Only use when none of the connecting clients are Windows systems. This mode is functionally equivalent to the --ifconfig-pool-linear directive which is available in OpenVPN 2.0 and is now *deprecated*.
Non windows and *deprecated* ... I suggest you check with the IRC Channel for up to date information.

Post Reply