MULTI: Outgoing TUN queue full, dropped packet

Need help configuring your VPN? Just post here and you'll get that help.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
Fry1990
OpenVpn Newbie
Posts: 13
Joined: Tue Apr 30, 2019 6:48 am

MULTI: Outgoing TUN queue full, dropped packet

Post by Fry1990 » Tue Apr 30, 2019 6:58 am

Hello

Im getting Error Messages when i try to access my NAS from an Open VPN Client.
My NAS is working in my Server Network.
My Client connects to the server network.
Every time im trying to access the NAS im getting the Following in my server.log:
"MULTI: Outgoing TUN queue full, dropped packet"

Someone please help.
Here is my server config

Code: Select all

port 443
proto tcp4
dev tap0
dev-node "Ethernet 2"

ca ca.crt
cert Mayer.crt
key Mayer.key  # This file should be kept secret

dh dh2048.pem

topology subnet

server-bridge 192.168.1.150 255.255.255.0 192.168.1.20 192.168.1.22

push "route 192.168.1.1 255.255.255.0"

push "redirect-gateway def1 bypass-dhcp"

client-to-client

duplicate-cn

keepalive 10 120

cipher AES-256-CBC

comp-lzo


persist-key
persist-tun

status openvpn-status.log

verb 4

My Client config

Code: Select all

client
dev tap
proto tcp

remote zzz 443

resolv-retry infinite

nobind
persist-key
persist-tun

ca ca1.crt
cert client1.crt
key client1.key

ifconfig 192.168.1.21 192.168.1.22

ns-cert-type server
comp-lzo
verb 3
float
And here is my log:

Code: Select all

Tue Apr 30 08:26:18 2019 us=550747 Current Parameter Settings:
Tue Apr 30 08:26:18 2019 us=550747   config = 'server.ovpn'
Tue Apr 30 08:26:18 2019 us=550747   mode = 1
Tue Apr 30 08:26:18 2019 us=550747   show_ciphers = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   show_digests = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   show_engines = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   genkey = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   key_pass_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   show_tls_ciphers = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   connect_retry_max = 0
Tue Apr 30 08:26:18 2019 us=550747 Connection profiles [0]:
Tue Apr 30 08:26:18 2019 us=550747   proto = tcp4-server
Tue Apr 30 08:26:18 2019 us=550747   local = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   local_port = '443'
Tue Apr 30 08:26:18 2019 us=550747   remote = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   remote_port = '443'
Tue Apr 30 08:26:18 2019 us=550747   remote_float = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   bind_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   bind_local = ENABLED
Tue Apr 30 08:26:18 2019 us=550747   bind_ipv6_only = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   connect_retry_seconds = 5
Tue Apr 30 08:26:18 2019 us=550747   connect_timeout = 120
Tue Apr 30 08:26:18 2019 us=550747   socks_proxy_server = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   socks_proxy_port = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   tun_mtu = 1500
Tue Apr 30 08:26:18 2019 us=550747   tun_mtu_defined = ENABLED
Tue Apr 30 08:26:18 2019 us=550747   link_mtu = 1500
Tue Apr 30 08:26:18 2019 us=550747   link_mtu_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   tun_mtu_extra = 32
Tue Apr 30 08:26:18 2019 us=550747   tun_mtu_extra_defined = ENABLED
Tue Apr 30 08:26:18 2019 us=550747   mtu_discover_type = -1
Tue Apr 30 08:26:18 2019 us=550747   fragment = 0
Tue Apr 30 08:26:18 2019 us=550747   mssfix = 1450
Tue Apr 30 08:26:18 2019 us=550747   explicit_exit_notification = 0
Tue Apr 30 08:26:18 2019 us=550747 Connection profiles END
Tue Apr 30 08:26:18 2019 us=550747   remote_random = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   ipchange = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   dev = 'tap0'
Tue Apr 30 08:26:18 2019 us=550747   dev_type = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   dev_node = 'Ethernet 2'
Tue Apr 30 08:26:18 2019 us=550747   lladdr = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   topology = 3
Tue Apr 30 08:26:18 2019 us=550747   ifconfig_local = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   ifconfig_remote_netmask = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   ifconfig_noexec = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   ifconfig_nowarn = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   ifconfig_ipv6_local = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   ifconfig_ipv6_netbits = 0
Tue Apr 30 08:26:18 2019 us=550747   ifconfig_ipv6_remote = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   shaper = 0
Tue Apr 30 08:26:18 2019 us=550747   mtu_test = 0
Tue Apr 30 08:26:18 2019 us=550747   mlock = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   keepalive_ping = 10
Tue Apr 30 08:26:18 2019 us=550747   keepalive_timeout = 120
Tue Apr 30 08:26:18 2019 us=550747   inactivity_timeout = 0
Tue Apr 30 08:26:18 2019 us=550747   ping_send_timeout = 10
Tue Apr 30 08:26:18 2019 us=550747   ping_rec_timeout = 240
Tue Apr 30 08:26:18 2019 us=550747   ping_rec_timeout_action = 2
Tue Apr 30 08:26:18 2019 us=550747   ping_timer_remote = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   remap_sigusr1 = 0
Tue Apr 30 08:26:18 2019 us=550747   persist_tun = ENABLED
Tue Apr 30 08:26:18 2019 us=550747   persist_local_ip = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   persist_remote_ip = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   persist_key = ENABLED
Tue Apr 30 08:26:18 2019 us=550747   passtos = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   resolve_retry_seconds = 1000000000
Tue Apr 30 08:26:18 2019 us=550747   resolve_in_advance = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   username = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   groupname = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   chroot_dir = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   cd_dir = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   writepid = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   up_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   down_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   down_pre = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   up_restart = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   up_delay = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   daemon = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   inetd = 0
Tue Apr 30 08:26:18 2019 us=550747   log = ENABLED
Tue Apr 30 08:26:18 2019 us=550747   suppress_timestamps = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   machine_readable_output = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   nice = 0
Tue Apr 30 08:26:18 2019 us=550747   verbosity = 4
Tue Apr 30 08:26:18 2019 us=550747   mute = 0
Tue Apr 30 08:26:18 2019 us=550747   gremlin = 0
Tue Apr 30 08:26:18 2019 us=550747   status_file = 'openvpn-status.log'
Tue Apr 30 08:26:18 2019 us=550747   status_file_version = 1
Tue Apr 30 08:26:18 2019 us=550747   status_file_update_freq = 60
Tue Apr 30 08:26:18 2019 us=550747   occ = ENABLED
Tue Apr 30 08:26:18 2019 us=550747   rcvbuf = 0
Tue Apr 30 08:26:18 2019 us=550747   sndbuf = 0
Tue Apr 30 08:26:18 2019 us=550747   sockflags = 0
Tue Apr 30 08:26:18 2019 us=550747   fast_io = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   comp.alg = 2
Tue Apr 30 08:26:18 2019 us=550747   comp.flags = 1
Tue Apr 30 08:26:18 2019 us=550747   route_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   route_default_gateway = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747   route_default_metric = 0
Tue Apr 30 08:26:18 2019 us=550747   route_noexec = DISABLED
Tue Apr 30 08:26:18 2019 us=550747   route_delay = 0
Tue Apr 30 08:26:18 2019 us=550747   route_delay_window = 30
Tue Apr 30 08:26:18 2019 us=566379   route_delay_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   route_nopull = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   route_gateway_via_dhcp = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   allow_pull_fqdn = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   management_addr = '127.0.0.1'
Tue Apr 30 08:26:18 2019 us=566379   management_port = '25341'
Tue Apr 30 08:26:18 2019 us=566379   management_user_pass = 'stdin'
Tue Apr 30 08:26:18 2019 us=566379   management_log_history_cache = 250
Tue Apr 30 08:26:18 2019 us=566379   management_echo_buffer_size = 100
Tue Apr 30 08:26:18 2019 us=566379   management_write_peer_info_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   management_client_user = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   management_client_group = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   management_flags = 6
Tue Apr 30 08:26:18 2019 us=566379   shared_secret_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   key_direction = not set
Tue Apr 30 08:26:18 2019 us=566379   ciphername = 'AES-256-CBC'
Tue Apr 30 08:26:18 2019 us=566379   ncp_enabled = ENABLED
Tue Apr 30 08:26:18 2019 us=566379   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
Tue Apr 30 08:26:18 2019 us=566379   authname = 'SHA1'
Tue Apr 30 08:26:18 2019 us=566379   prng_hash = 'SHA1'
Tue Apr 30 08:26:18 2019 us=566379   prng_nonce_secret_len = 16
Tue Apr 30 08:26:18 2019 us=566379   keysize = 0
Tue Apr 30 08:26:18 2019 us=566379   engine = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   replay = ENABLED
Tue Apr 30 08:26:18 2019 us=566379   mute_replay_warnings = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   replay_window = 64
Tue Apr 30 08:26:18 2019 us=566379   replay_time = 15
Tue Apr 30 08:26:18 2019 us=566379   packet_id_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   use_iv = ENABLED
Tue Apr 30 08:26:18 2019 us=566379   test_crypto = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   tls_server = ENABLED
Tue Apr 30 08:26:18 2019 us=566379   tls_client = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   key_method = 2
Tue Apr 30 08:26:18 2019 us=566379   ca_file = 'ca.crt'
Tue Apr 30 08:26:18 2019 us=566379   ca_path = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   dh_file = 'dh2048.pem'
Tue Apr 30 08:26:18 2019 us=566379   cert_file = 'Mayer.crt'
Tue Apr 30 08:26:18 2019 us=566379   extra_certs_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   priv_key_file = 'Mayer.key'
Tue Apr 30 08:26:18 2019 us=566379   pkcs12_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   cryptoapi_cert = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   cipher_list = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   cipher_list_tls13 = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   tls_cert_profile = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   tls_verify = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   tls_export_cert = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   verify_x509_type = 0
Tue Apr 30 08:26:18 2019 us=566379   verify_x509_name = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   crl_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   ns_cert_type = 0
Tue Apr 30 08:26:18 2019 us=566379   remote_cert_ku[i] = 0
Tue Apr 30 08:26:18 2019 us=566379   remote_cert_ku[i] = 0
(...) (shortened due to too long for Post)
Tue Apr 30 08:26:18 2019 us=566379   remote_cert_ku[i] = 0
Tue Apr 30 08:26:18 2019 us=566379   remote_cert_eku = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   ssl_flags = 0
Tue Apr 30 08:26:18 2019 us=566379   tls_timeout = 2
Tue Apr 30 08:26:18 2019 us=566379   renegotiate_bytes = -1
Tue Apr 30 08:26:18 2019 us=566379   renegotiate_packets = 0
Tue Apr 30 08:26:18 2019 us=566379   renegotiate_seconds = 3600
Tue Apr 30 08:26:18 2019 us=566379   handshake_window = 60
Tue Apr 30 08:26:18 2019 us=566379   transition_window = 3600
Tue Apr 30 08:26:18 2019 us=566379   single_session = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   push_peer_info = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   tls_exit = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   tls_auth_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   tls_crypt_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379   pkcs11_protected_authentication = DISABLED
Tue Apr 30 08:26:18 2019 us=566379   pkcs11_protected_authentication = DISABLED

(...) (shortened due to too long for Post)

Tue Apr 30 08:26:18 2019 us=581996   pkcs11_protected_authentication = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   pkcs11_protected_authentication = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   pkcs11_private_mode = 00000000

(...) (shortened due to too long for Post)

Tue Apr 30 08:26:18 2019 us=581996   pkcs11_private_mode = 00000000
Tue Apr 30 08:26:18 2019 us=581996   pkcs11_private_mode = 00000000
Tue Apr 30 08:26:18 2019 us=581996   pkcs11_cert_private = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   pkcs11_cert_private = DISABLED

(...) (shortened due to too long for Post)

Tue Apr 30 08:26:18 2019 us=581996   pkcs11_cert_private = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   pkcs11_pin_cache_period = -1
Tue Apr 30 08:26:18 2019 us=581996   pkcs11_id = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   pkcs11_id_management = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   server_network = 0.0.0.0
Tue Apr 30 08:26:18 2019 us=581996   server_netmask = 0.0.0.0
Tue Apr 30 08:26:18 2019 us=581996   server_network_ipv6 = ::
Tue Apr 30 08:26:18 2019 us=581996   server_netbits_ipv6 = 0
Tue Apr 30 08:26:18 2019 us=581996   server_bridge_ip = 192.168.1.150
Tue Apr 30 08:26:18 2019 us=581996   server_bridge_netmask = 255.255.255.0
Tue Apr 30 08:26:18 2019 us=581996   server_bridge_pool_start = 192.168.1.20
Tue Apr 30 08:26:18 2019 us=581996   server_bridge_pool_end = 192.168.1.22
Tue Apr 30 08:26:18 2019 us=581996   push_entry = 'route 192.168.1.1 255.255.255.0'
Tue Apr 30 08:26:18 2019 us=581996   push_entry = 'redirect-gateway def1 bypass-dhcp'
Tue Apr 30 08:26:18 2019 us=581996   push_entry = 'route-gateway 192.168.1.150'
Tue Apr 30 08:26:18 2019 us=581996   push_entry = 'ping 10'
Tue Apr 30 08:26:18 2019 us=581996   push_entry = 'ping-restart 120'
Tue Apr 30 08:26:18 2019 us=581996   ifconfig_pool_defined = ENABLED
Tue Apr 30 08:26:18 2019 us=581996   ifconfig_pool_start = 192.168.1.20
Tue Apr 30 08:26:18 2019 us=581996   ifconfig_pool_end = 192.168.1.22
Tue Apr 30 08:26:18 2019 us=581996   ifconfig_pool_netmask = 255.255.255.0
Tue Apr 30 08:26:18 2019 us=581996   ifconfig_pool_persist_filename = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   ifconfig_pool_persist_refresh_freq = 600
Tue Apr 30 08:26:18 2019 us=581996   ifconfig_ipv6_pool_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   ifconfig_ipv6_pool_base = ::
Tue Apr 30 08:26:18 2019 us=581996   ifconfig_ipv6_pool_netbits = 0
Tue Apr 30 08:26:18 2019 us=581996   n_bcast_buf = 256
Tue Apr 30 08:26:18 2019 us=581996   tcp_queue_limit = 64
Tue Apr 30 08:26:18 2019 us=581996   real_hash_size = 256
Tue Apr 30 08:26:18 2019 us=581996   virtual_hash_size = 256
Tue Apr 30 08:26:18 2019 us=581996   client_connect_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   learn_address_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   client_disconnect_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   client_config_dir = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   ccd_exclusive = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   tmp_dir = 'C:\Users\admin\AppData\Local\Temp\'
Tue Apr 30 08:26:18 2019 us=581996   push_ifconfig_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   push_ifconfig_local = 0.0.0.0
Tue Apr 30 08:26:18 2019 us=581996   push_ifconfig_remote_netmask = 0.0.0.0
Tue Apr 30 08:26:18 2019 us=581996   push_ifconfig_ipv6_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   push_ifconfig_ipv6_local = ::/0
Tue Apr 30 08:26:18 2019 us=581996   push_ifconfig_ipv6_remote = ::
Tue Apr 30 08:26:18 2019 us=581996   enable_c2c = ENABLED
Tue Apr 30 08:26:18 2019 us=581996   duplicate_cn = ENABLED
Tue Apr 30 08:26:18 2019 us=581996   cf_max = 0
Tue Apr 30 08:26:18 2019 us=581996   cf_per = 0
Tue Apr 30 08:26:18 2019 us=581996   max_clients = 1024
Tue Apr 30 08:26:18 2019 us=581996   max_routes_per_client = 256
Tue Apr 30 08:26:18 2019 us=581996   auth_user_pass_verify_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   auth_user_pass_verify_script_via_file = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   auth_token_generate = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   auth_token_lifetime = 0
Tue Apr 30 08:26:18 2019 us=581996   client = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   pull = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   auth_user_pass_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   show_net_up = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   route_method = 0
Tue Apr 30 08:26:18 2019 us=581996   block_outside_dns = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   ip_win32_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   ip_win32_type = 3
Tue Apr 30 08:26:18 2019 us=581996   dhcp_masq_offset = 0
Tue Apr 30 08:26:18 2019 us=581996   dhcp_lease_time = 31536000
Tue Apr 30 08:26:18 2019 us=581996   tap_sleep = 10
Tue Apr 30 08:26:18 2019 us=581996   dhcp_options = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   dhcp_renew = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   dhcp_pre_release = DISABLED
Tue Apr 30 08:26:18 2019 us=581996   domain = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   netbios_scope = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996   netbios_node_type = 0
Tue Apr 30 08:26:18 2019 us=581996   disable_nbt = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 OpenVPN 2.4.7 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 25 2019
Tue Apr 30 08:26:18 2019 us=581996 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Apr 30 08:26:18 2019 us=581996 library versions: OpenSSL 1.1.0j  20 Nov 2018, LZO 2.10
Enter Management Password:
Tue Apr 30 08:26:18 2019 us=597621 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Tue Apr 30 08:26:18 2019 us=597621 Need hold release from management interface, waiting...
Tue Apr 30 08:26:18 2019 us=800751 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Tue Apr 30 08:26:18 2019 us=910116 MANAGEMENT: CMD 'state on'
Tue Apr 30 08:26:18 2019 us=910116 MANAGEMENT: CMD 'log all on'
Tue Apr 30 08:26:19 2019 us=894471 MANAGEMENT: CMD 'echo all on'
Tue Apr 30 08:26:19 2019 us=894471 MANAGEMENT: CMD 'bytecount 5'
Tue Apr 30 08:26:19 2019 us=910096 MANAGEMENT: CMD 'hold off'
Tue Apr 30 08:26:19 2019 us=910096 MANAGEMENT: CMD 'hold release'
Tue Apr 30 08:26:19 2019 us=925714 NOTE: when bridging your LAN adapter with the TAP adapter, note that the new bridge adapter will often take on its own IP address that is different from what the LAN adapter was previously set to
Tue Apr 30 08:26:19 2019 us=941343 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Tue Apr 30 08:26:19 2019 us=956965 Diffie-Hellman initialized with 2048 bit key
Tue Apr 30 08:26:19 2019 us=972590 TLS-Auth MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:26:19 2019 us=972590 interactive service msg_channel=0
Tue Apr 30 08:26:19 2019 us=972590 open_tun
Tue Apr 30 08:26:19 2019 us=988214 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DE26DC7E-6548-45D2-87BF-C0A7C814693B}.tap
Tue Apr 30 08:26:19 2019 us=988214 TAP-Windows Driver Version 9.23 
Tue Apr 30 08:26:19 2019 us=988214 TAP-Windows MTU=1500
Tue Apr 30 08:26:19 2019 us=988214 Sleeping for 10 seconds...
Tue Apr 30 08:26:29 2019 us=128639 NOTE: FlushIpNetTable failed on interface [20] {DE26DC7E-6548-45D2-87BF-C0A7C814693B} (status=1168) : Element nicht gefunden.  
Tue Apr 30 08:26:29 2019 us=128639 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:26:29 2019 us=128639 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Apr 30 08:26:29 2019 us=128639 Listening for incoming TCP connection on [AF_INET][undef]:443
Tue Apr 30 08:26:29 2019 us=128639 TCPv4_SERVER link local (bound): [AF_INET][undef]:443
Tue Apr 30 08:26:29 2019 us=128639 TCPv4_SERVER link remote: [AF_UNSPEC]
Tue Apr 30 08:26:29 2019 us=128639 MULTI: multi_init called, r=256 v=256
Tue Apr 30 08:26:29 2019 us=128639 IFCONFIG POOL: base=192.168.1.20 size=3, ipv6=0
Tue Apr 30 08:26:29 2019 us=128639 MULTI: TCP INIT maxclients=60 maxevents=64
Tue Apr 30 08:26:29 2019 us=128639 Initialization Sequence Completed
Tue Apr 30 08:26:29 2019 us=128639 MANAGEMENT: >STATE:1556605589,CONNECTED,SUCCESS,,,,,
Tue Apr 30 08:26:40 2019 us=50260 MULTI: multi_create_instance called
Tue Apr 30 08:26:40 2019 us=50260 Re-using SSL/TLS context
Tue Apr 30 08:26:40 2019 us=50260 LZO compression initializing
Tue Apr 30 08:26:40 2019 us=50260 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:26:40 2019 us=50260 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:26:40 2019 us=50260 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:26:40 2019 us=50260 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:26:40 2019 us=50260 TCP connection established with [AF_INET]212.102.160.2:54080
Tue Apr 30 08:26:40 2019 us=50260 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:26:40 2019 us=50260 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:54080
Tue Apr 30 08:26:41 2019 us=50243 212.102.160.2:54080 TLS: Initial packet from [AF_INET]212.102.160.2:54080, sid=0b4c900d 0e0319bc
Tue Apr 30 08:26:41 2019 us=378359 212.102.160.2:54080 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:26:41 2019 us=378359 212.102.160.2:54080 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_VER=2.4.7
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_PLAT=linux
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_PROTO=2
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_NCP=2
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_LZ4=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_LZ4v2=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_LZO=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_COMP_STUB=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_TCPNL=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:26:41 2019 us=487730 212.102.160.2:54080 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:26:41 2019 us=487730 212.102.160.2:54080 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:54080
Tue Apr 30 08:26:41 2019 us=487730 client1/212.102.160.2:54080 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:26:43 2019 us=3319 client1/212.102.160.2:54080 MULTI: Learn: 42:cb:43:2b:9c:47 -> client1/212.102.160.2:54080
Tue Apr 30 08:27:03 2019 us=174740 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:27:03 2019 us=174740 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:27:03 2019 us=174740 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:27:03 2019 us=174740 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92

(...) (shortened due to too long for Post)

Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=74
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=74
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 Connection reset, restarting [0]
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:28:18 2019 us=516790 TCP/UDP: Closing socket
Tue Apr 30 08:28:27 2019 us=704090 MULTI: multi_create_instance called
Tue Apr 30 08:28:27 2019 us=704090 Re-using SSL/TLS context
Tue Apr 30 08:28:27 2019 us=704090 LZO compression initializing
Tue Apr 30 08:28:27 2019 us=704090 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:28:27 2019 us=704090 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:28:27 2019 us=704090 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:28:27 2019 us=704090 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:28:27 2019 us=704090 TCP connection established with [AF_INET]212.102.160.2:54178
Tue Apr 30 08:28:27 2019 us=704090 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:28:27 2019 us=704090 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:54178
Tue Apr 30 08:28:28 2019 us=704067 212.102.160.2:54178 TLS: Initial packet from [AF_INET]212.102.160.2:54178, sid=1e47303d dd6c0eb7
Tue Apr 30 08:28:28 2019 us=985304 212.102.160.2:54178 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:28:28 2019 us=985304 212.102.160.2:54178 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_VER=2.4.7
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_PLAT=linux
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_PROTO=2
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_NCP=2
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_LZ4=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_LZ4v2=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_LZO=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_COMP_STUB=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_TCPNL=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:28:29 2019 us=32177 212.102.160.2:54178 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:28:29 2019 us=32177 212.102.160.2:54178 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:54178
Tue Apr 30 08:28:29 2019 us=32177 client1/212.102.160.2:54178 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:28:30 2019 us=516520 client1/212.102.160.2:54178 MULTI: Learn: 42:cb:43:2b:9c:47 -> client1/212.102.160.2:54178
Tue Apr 30 08:28:30 2019 us=516520 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:32 2019 us=782096 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:32 2019 us=782096 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:32 2019 us=782096 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=165
Tue Apr 30 08:28:34 2019 us=797678 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:36 2019 us=922624 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:36 2019 us=922624 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:37 2019 us=938224 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=82
Tue Apr 30 08:28:37 2019 us=938224 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:37 2019 us=938224 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:28:37 2019 us=938224 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:28:38 2019 us=969452 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:38 2019 us=969452 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:39 2019 us=985064 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=165
Tue Apr 30 08:28:43 2019 us=31881 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:44 2019 us=78714 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:44 2019 us=78714 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:28:45 2019 us=94315 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:28:45 2019 us=94315 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:46 2019 us=250542 client1/212.102.160.2:54178 Connection reset, restarting [0]
Tue Apr 30 08:28:46 2019 us=250542 client1/212.102.160.2:54178 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:28:46 2019 us=250542 TCP/UDP: Closing socket
Tue Apr 30 08:28:59 2019 us=547114 MULTI: multi_create_instance called
Tue Apr 30 08:28:59 2019 us=547114 Re-using SSL/TLS context
Tue Apr 30 08:28:59 2019 us=562741 LZO compression initializing
Tue Apr 30 08:28:59 2019 us=562741 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:28:59 2019 us=562741 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:28:59 2019 us=562741 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:28:59 2019 us=562741 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:28:59 2019 us=562741 TCP connection established with [AF_INET]212.102.160.2:53070
Tue Apr 30 08:28:59 2019 us=562741 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:28:59 2019 us=562741 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:53070
Tue Apr 30 08:29:00 2019 us=547110 212.102.160.2:53070 TLS: Initial packet from [AF_INET]212.102.160.2:53070, sid=59ae1bc8 12aedd25
Tue Apr 30 08:29:00 2019 us=781462 212.102.160.2:53070 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:29:00 2019 us=797096 212.102.160.2:53070 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_VER=2.4.7
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_PLAT=win
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_PROTO=2
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_NCP=2
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_LZ4=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_LZ4v2=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_LZO=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_COMP_STUB=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_TCPNL=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_GUI_VER=OpenVPN_GUI_11
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:53070
Tue Apr 30 08:29:00 2019 us=812711 client1/212.102.160.2:53070 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:29:01 2019 us=922070 client1/212.102.160.2:53070 Connection reset, restarting [-1]
Tue Apr 30 08:29:01 2019 us=922070 client1/212.102.160.2:53070 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:29:01 2019 us=922070 TCP/UDP: Closing socket
Tue Apr 30 08:29:27 2019 us=258490 MULTI: multi_create_instance called
Tue Apr 30 08:29:27 2019 us=258490 Re-using SSL/TLS context
Tue Apr 30 08:29:27 2019 us=258490 LZO compression initializing
Tue Apr 30 08:29:27 2019 us=258490 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:29:27 2019 us=258490 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:29:27 2019 us=258490 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:29:27 2019 us=258490 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:29:27 2019 us=258490 TCP connection established with [AF_INET]212.102.160.2:53074
Tue Apr 30 08:29:27 2019 us=258490 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:29:27 2019 us=258490 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:53074
Tue Apr 30 08:29:28 2019 us=258462 212.102.160.2:53074 TLS: Initial packet from [AF_INET]212.102.160.2:53074, sid=ac34f926 3e972a43
Tue Apr 30 08:29:28 2019 us=477208 212.102.160.2:53074 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:29:28 2019 us=477208 212.102.160.2:53074 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_VER=2.4.7
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_PLAT=win
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_PROTO=2
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_NCP=2
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_LZ4=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_LZ4v2=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_LZO=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_COMP_STUB=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_TCPNL=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_GUI_VER=OpenVPN_GUI_11
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:29:28 2019 us=508460 212.102.160.2:53074 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:29:28 2019 us=508460 212.102.160.2:53074 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:53074
Tue Apr 30 08:29:28 2019 us=508460 client1/212.102.160.2:53074 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:29:29 2019 us=570934 client1/212.102.160.2:53074 Connection reset, restarting [-1]
Tue Apr 30 08:29:29 2019 us=570934 client1/212.102.160.2:53074 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:29:29 2019 us=570934 TCP/UDP: Closing socket
Tue Apr 30 08:30:02 2019 us=132700 MULTI: multi_create_instance called
Tue Apr 30 08:30:02 2019 us=132700 Re-using SSL/TLS context
Tue Apr 30 08:30:02 2019 us=132700 LZO compression initializing
Tue Apr 30 08:30:02 2019 us=132700 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:30:02 2019 us=132700 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:30:02 2019 us=132700 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:30:02 2019 us=132700 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:30:02 2019 us=132700 TCP connection established with [AF_INET]212.102.160.2:53076
Tue Apr 30 08:30:02 2019 us=132700 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:30:02 2019 us=132700 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:53076
Tue Apr 30 08:30:03 2019 us=117051 212.102.160.2:53076 TLS: Initial packet from [AF_INET]212.102.160.2:53076, sid=1f59d708 5e11c4a6
Tue Apr 30 08:30:03 2019 us=335796 212.102.160.2:53076 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:30:03 2019 us=335796 212.102.160.2:53076 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_VER=2.4.7
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_PLAT=win
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_PROTO=2
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_NCP=2
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_LZ4=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_LZ4v2=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_LZO=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_COMP_STUB=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_TCPNL=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_GUI_VER=OpenVPN_GUI_11
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:53076
Tue Apr 30 08:30:03 2019 us=367047 client1/212.102.160.2:53076 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:30:04 2019 us=679519 client1/212.102.160.2:53076 MULTI: Learn: 00:ff:81:78:b6:81 -> client1/212.102.160.2:53076
Tue Apr 30 08:30:04 2019 us=679519 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=58
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=164
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
(.......) (shortened because of too long for the post)
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=93
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=73
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=93
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=73
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:24 2019 us=38454 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:24 2019 us=38454 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:24 2019 us=38454 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=216
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=216
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=46
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=221
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=221
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=251
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:28 2019 us=647725 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:28 2019 us=647725 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:28 2019 us=647725 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=85
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=65
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=46
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:30 2019 us=960173 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:30 2019 us=960173 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:33 2019 us=163249 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:33 2019 us=163249 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:34 2019 us=944459 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:36 2019 us=163185 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:36 2019 us=163185 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=164
Tue Apr 30 08:30:36 2019 us=163185 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:37 2019 us=663149 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:37 2019 us=663149 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:38 2019 us=944371 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:38 2019 us=944371 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:41 2019 us=428687 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:41 2019 us=428687 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:42 2019 us=944278 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:44 2019 us=428621 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:44 2019 us=428621 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:45 2019 us=928588 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:45 2019 us=928588 client1/212.102.160.2:53076 Connection reset, restarting [-1]
Tue Apr 30 08:30:45 2019 us=928588 client1/212.102.160.2:53076 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:30:45 2019 us=928588 MBUF: dereferenced queued packet
Tue Apr 30 08:30:45 2019 us=928588 TCP/UDP: Closing socket
Tue Apr 30 08:31:02 2019 us=107889 TCP/UDP: Closing socket
Tue Apr 30 08:31:02 2019 us=107889 Closing TUN/TAP interface


TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by TinCanTech » Tue Apr 30, 2019 11:50 am

Did this only start happening when you updated to the latest openvpn version ?

Fry1990
OpenVpn Newbie
Posts: 13
Joined: Tue Apr 30, 2019 6:48 am

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by Fry1990 » Tue Apr 30, 2019 11:56 am

Perhaps.
It happened after installing it on a new pc with the same configs.
Could be that this is a newer version of open vpn.
is it useful to try an older version?
The older versions are not as secure as the new ones i think?!?

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by TinCanTech » Tue Apr 30, 2019 12:00 pm

There was a new new version released see:
https://openvpn.net/community-downloads/

Please try again and let us know if it happens again.

User avatar
Pippin
Forum Team
Posts: 1201
Joined: Wed Jul 01, 2015 8:03 am
Location: irc://irc.libera.chat:6697/openvpn

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by Pippin » Tue Apr 30, 2019 12:02 pm

Also try to play with (increase) --tcp-queue-limit n and --txqueuelen

See manual 2.4: https://community.openvpn.net/openvpn/w ... n24ManPage

Edit:
Since you're on Windows forget about --txqueuelen...
Last edited by Pippin on Tue Apr 30, 2019 12:23 pm, edited 1 time in total.

Fry1990
OpenVpn Newbie
Posts: 13
Joined: Tue Apr 30, 2019 6:48 am

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by Fry1990 » Tue Apr 30, 2019 12:13 pm

TinCanTech wrote:
Tue Apr 30, 2019 12:00 pm
There was a new new version released see:
https://openvpn.net/community-downloads/

Please try again and let us know if it happens again.
Now im confused.
Im already using the newest version:
Image

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by TinCanTech » Tue Apr 30, 2019 12:23 pm

The latest release had some issue and there is not enough detail to tell if you have the very latest version.

If the very latest 2.4.7 version behaves differently to version 2.4.6 then perhaps you have discovered a bug ..

Please test them both. (Both listed on the download link above)

Fry1990
OpenVpn Newbie
Posts: 13
Joined: Tue Apr 30, 2019 6:48 am

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by Fry1990 » Tue Apr 30, 2019 1:11 pm

Tried version 2.4.6 > No Success.
Tried udp instead of tcp for the server and the Multi (..) message is gone.
But now when i try to access the NAS im getting this:

Code: Select all

Tue Apr 30 15:05:03 2019 212.102.160.2 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Apr 30 15:05:03 2019 212.102.160.2 TLS Error: TLS handshake failed
Tue Apr 30 15:05:03 2019 212.102.160.2 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Apr 30 15:05:03 2019 MBUF: dereferenced queued packet
Tue Apr 30 15:05:03 2019 212.102.160.2 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Apr 30 15:05:03 2019 212.102.160.2 TLS Error: TLS handshake failed
Tue Apr 30 15:05:03 2019 212.102.160.2 SIGUSR1[soft,tls-error] received, client-instance restarting
Last edited by Fry1990 on Tue Apr 30, 2019 1:20 pm, edited 1 time in total.

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by TinCanTech » Tue Apr 30, 2019 1:19 pm

Well, now you have changed something and your client is not connecting to your server because you have done something wrong.

Fry1990
OpenVpn Newbie
Posts: 13
Joined: Tue Apr 30, 2019 6:48 am

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by Fry1990 » Tue Apr 30, 2019 1:52 pm

Im using different systems and different configs from my smartphone (bought tap client in google play store) and from my PC.
From my Phone im getting very few times to get the connection to the nas for 5 seconds. then its down and no longer visible in network smb's.
Why does it sometimes appear and then disappear after 5 seconds?

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by TinCanTech » Tue Apr 30, 2019 2:08 pm

Fry1990 wrote:
Tue Apr 30, 2019 1:52 pm
Im using different systems and different configs
Please stick to the details you posted above or we loose track and cannot help.
Fry1990 wrote:
Tue Apr 30, 2019 1:52 pm
From my Phone im getting very few times to get the connection to the nas for 5 seconds. then its down and no longer visible in network smb's.
Why does it sometimes appear and then disappear after 5 seconds?
I don't know .. perhaps you should recheck your logs etc ..

Fry1990
OpenVpn Newbie
Posts: 13
Joined: Tue Apr 30, 2019 6:48 am

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by Fry1990 » Tue Apr 30, 2019 2:16 pm

Something is annoying too: After connect from the client to the server and then disconnect...
i cant stop the server from running.
It stays green in the task bar und the demon cant be stopped.
The only thing that then helps is to restart the Server PC. (win 10)

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by TinCanTech » Tue Apr 30, 2019 2:19 pm

I have just setup a server using the very latest installer and Windows 7 and have no such errors.

Fry1990
OpenVpn Newbie
Posts: 13
Joined: Tue Apr 30, 2019 6:48 am

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by Fry1990 » Thu May 02, 2019 8:14 am

I tried now my laptop as open vpn server with the same config and there its working.
But i found a difference: On my Laptop i connect with IP V4 AND IP V6.
On my Server PC (the first one) i only configured the ethernet adapter as IP V4 without IP V6.
And im getting following error message on my server pc when im connected:
"Could not determine IPv4/IPv6 protocol. Using AF_INET6"

So perhaps i have to use udp4 in the config or activate ip v6 on my server pc.
for now i cant proof that cause i have no time.
I tell later if it works.
Thanks for the help till now. :) :)

Fry1990
OpenVpn Newbie
Posts: 13
Joined: Tue Apr 30, 2019 6:48 am

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by Fry1990 » Mon May 06, 2019 10:54 am

Now i figrued out the error.
My Server PC has LAN Ethernet and WLAN Ethernet.
With WLAN its working with the same config.
With LAN i can connect but have no access to the other LAN Clients. (SMB CIFS Shared Folders)

My WLAN is directly connected to my Router 1 which has Internet.
My LAN is connected with a cable to my Router 2 which acts as a WLAN Repeater.
I can only with LAN activated surf in the internet with my Server PC and also get access to the other LAN Clients.

But when open vpn TAP Adapter is bridged with that LAN Ethernet it has the error that i cant access to the other LAN Clients.

Any one can help??

thiagobittencourt
OpenVpn Newbie
Posts: 1
Joined: Sun Jan 26, 2020 2:39 am

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by thiagobittencourt » Sun Jan 26, 2020 2:45 am

I don't know if you need a answer to this topic, but, in my case, I discovered that my interfaces ( tap and physical interface ) hasn't set with 'promisc' parameter.

After that, my problem has gone away!!

Centos and Linux Oracle (v7.X) tested.
OpenVPN 2.4.8

victorqedu
OpenVpn Newbie
Posts: 13
Joined: Thu Nov 09, 2017 11:21 am

Re: MULTI: Outgoing TUN queue full, dropped packet

Post by victorqedu » Wed Dec 22, 2021 8:52 pm

This is an old problem but I run into it today and I think I found a possible source.
So I use OpenVPN on many Window and Linux systems and from many used only 2 OVPN servers were installed on Windows 2012 server R2 and both had this problem. So I think there is some incompatibility between these 2.
I tested today with OVPN 2.5.5 64 bit.
Does anyone have an idea about what could be the problem in Windows 2012 R2?
Even if the VPN is connecting, is almost impossible to use, losses are very high.

Post Reply