Background; I have two ubiquiti routers deployed to a particular site. The VPN config worked on these to connect back to our data center, tested in our office and they worked for a couple weeks on site. Four days ago both went down at the same time. Both were still connected to UNMS though. I ssh into one via UNMS and poked around but didn't see anything wrong, so I told it to reboot but it never reconnected to UNMS, or OpenVPN. The second one is still on UNMS and the logs in it and the server look like this.
Client Log;
Code: Select all
Dec 20 09:18:54 VPNrouter2 openvpn[2818]: Restart pause, 300 second(s)
Dec 20 09:23:54 VPNrouter2 openvpn[2818]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 20 09:23:54 VPNrouter2 openvpn[2818]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 20 09:23:54 VPNrouter2 openvpn[2818]: TCP/UDP: Preserving recently used remote address: [AF_INET]199.25.169.122:1194
Dec 20 09:23:54 VPNrouter2 openvpn[2818]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Dec 20 09:23:54 VPNrouter2 openvpn[2818]: Attempting to establish TCP connection with [AF_INET]199.25.169.122:1194 [nonblock]
Dec 20 09:23:55 VPNrouter2 openvpn[2818]: TCP connection established with [AF_INET]199.25.169.122:1194
Dec 20 09:23:55 VPNrouter2 openvpn[2818]: TCP_CLIENT link local: (not bound)
Dec 20 09:23:55 VPNrouter2 openvpn[2818]: TCP_CLIENT link remote: [AF_INET]199.25.169.122:1194
Dec 20 09:23:55 VPNrouter2 openvpn[2818]: TLS: Initial packet from [AF_INET]199.25.169.122:1194, sid=c44d5fa4 2e88ec1d
Dec 20 09:23:55 VPNrouter2 openvpn[2818]: write TCP_CLIENT: Connection reset by peer (code=131)
Dec 20 09:23:55 VPNrouter2 openvpn[2818]: Connection reset, restarting [0]
Dec 20 09:23:55 VPNrouter2 openvpn[2818]: SIGUSR1[soft,connection-reset] received, process restarting
Dec 20 09:23:55 VPNrouter2 openvpn[2818]: Restart pause, 300 second(s)
Code: Select all
2021-12-20 09:19:23 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-12-20 09:19:23 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-12-20 09:19:23 TCP connection established with [AF_INET]209.169.22.155:52794
2021-12-20 09:19:24 209.169.22.155:52794 TLS: Initial packet from [AF_INET]209.169.22.155:52794, sid=e1cd89cd 5c698bcb
2021-12-20 09:19:24 209.169.22.155:52794 Connection reset, restarting [-1]
2021-12-20 09:19:24 209.169.22.155:52794 SIGUSR1[soft,connection-reset] received, client-instance restarting
2021-12-20 09:22:04 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-12-20 09:22:04 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-12-20 09:22:04 TCP connection established with [AF_INET]209.169.22.155:55532
2021-12-20 09:22:05 209.169.22.155:55532 TLS: Initial packet from [AF_INET]209.169.22.155:55532, sid=cb728f73 596b00d2
2021-12-20 09:22:05 209.169.22.155:55532 Connection reset, restarting [-1]
2021-12-20 09:22:05 209.169.22.155:55532 SIGUSR1[soft,connection-reset] received, client-instance restarting