Im getting Error Messages when i try to access my NAS from an Open VPN Client.
My NAS is working in my Server Network.
My Client connects to the server network.
Every time im trying to access the NAS im getting the Following in my server.log:
"MULTI: Outgoing TUN queue full, dropped packet"
Someone please help.
Here is my server config
Code: Select all
port 443
proto tcp4
dev tap0
dev-node "Ethernet 2"
ca ca.crt
cert Mayer.crt
key Mayer.key # This file should be kept secret
dh dh2048.pem
topology subnet
server-bridge 192.168.1.150 255.255.255.0 192.168.1.20 192.168.1.22
push "route 192.168.1.1 255.255.255.0"
push "redirect-gateway def1 bypass-dhcp"
client-to-client
duplicate-cn
keepalive 10 120
cipher AES-256-CBC
comp-lzo
persist-key
persist-tun
status openvpn-status.log
verb 4
Code: Select all
client
dev tap
proto tcp
remote zzz 443
resolv-retry infinite
nobind
persist-key
persist-tun
ca ca1.crt
cert client1.crt
key client1.key
ifconfig 192.168.1.21 192.168.1.22
ns-cert-type server
comp-lzo
verb 3
float
Code: Select all
Tue Apr 30 08:26:18 2019 us=550747 Current Parameter Settings:
Tue Apr 30 08:26:18 2019 us=550747 config = 'server.ovpn'
Tue Apr 30 08:26:18 2019 us=550747 mode = 1
Tue Apr 30 08:26:18 2019 us=550747 show_ciphers = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 show_digests = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 show_engines = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 genkey = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 key_pass_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 show_tls_ciphers = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 connect_retry_max = 0
Tue Apr 30 08:26:18 2019 us=550747 Connection profiles [0]:
Tue Apr 30 08:26:18 2019 us=550747 proto = tcp4-server
Tue Apr 30 08:26:18 2019 us=550747 local = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 local_port = '443'
Tue Apr 30 08:26:18 2019 us=550747 remote = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 remote_port = '443'
Tue Apr 30 08:26:18 2019 us=550747 remote_float = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 bind_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 bind_local = ENABLED
Tue Apr 30 08:26:18 2019 us=550747 bind_ipv6_only = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 connect_retry_seconds = 5
Tue Apr 30 08:26:18 2019 us=550747 connect_timeout = 120
Tue Apr 30 08:26:18 2019 us=550747 socks_proxy_server = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 socks_proxy_port = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 tun_mtu = 1500
Tue Apr 30 08:26:18 2019 us=550747 tun_mtu_defined = ENABLED
Tue Apr 30 08:26:18 2019 us=550747 link_mtu = 1500
Tue Apr 30 08:26:18 2019 us=550747 link_mtu_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 tun_mtu_extra = 32
Tue Apr 30 08:26:18 2019 us=550747 tun_mtu_extra_defined = ENABLED
Tue Apr 30 08:26:18 2019 us=550747 mtu_discover_type = -1
Tue Apr 30 08:26:18 2019 us=550747 fragment = 0
Tue Apr 30 08:26:18 2019 us=550747 mssfix = 1450
Tue Apr 30 08:26:18 2019 us=550747 explicit_exit_notification = 0
Tue Apr 30 08:26:18 2019 us=550747 Connection profiles END
Tue Apr 30 08:26:18 2019 us=550747 remote_random = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 ipchange = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 dev = 'tap0'
Tue Apr 30 08:26:18 2019 us=550747 dev_type = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 dev_node = 'Ethernet 2'
Tue Apr 30 08:26:18 2019 us=550747 lladdr = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 topology = 3
Tue Apr 30 08:26:18 2019 us=550747 ifconfig_local = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 ifconfig_remote_netmask = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 ifconfig_noexec = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 ifconfig_nowarn = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 ifconfig_ipv6_local = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 ifconfig_ipv6_netbits = 0
Tue Apr 30 08:26:18 2019 us=550747 ifconfig_ipv6_remote = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 shaper = 0
Tue Apr 30 08:26:18 2019 us=550747 mtu_test = 0
Tue Apr 30 08:26:18 2019 us=550747 mlock = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 keepalive_ping = 10
Tue Apr 30 08:26:18 2019 us=550747 keepalive_timeout = 120
Tue Apr 30 08:26:18 2019 us=550747 inactivity_timeout = 0
Tue Apr 30 08:26:18 2019 us=550747 ping_send_timeout = 10
Tue Apr 30 08:26:18 2019 us=550747 ping_rec_timeout = 240
Tue Apr 30 08:26:18 2019 us=550747 ping_rec_timeout_action = 2
Tue Apr 30 08:26:18 2019 us=550747 ping_timer_remote = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 remap_sigusr1 = 0
Tue Apr 30 08:26:18 2019 us=550747 persist_tun = ENABLED
Tue Apr 30 08:26:18 2019 us=550747 persist_local_ip = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 persist_remote_ip = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 persist_key = ENABLED
Tue Apr 30 08:26:18 2019 us=550747 passtos = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 resolve_retry_seconds = 1000000000
Tue Apr 30 08:26:18 2019 us=550747 resolve_in_advance = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 username = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 groupname = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 chroot_dir = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 cd_dir = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 writepid = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 up_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 down_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 down_pre = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 up_restart = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 up_delay = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 daemon = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 inetd = 0
Tue Apr 30 08:26:18 2019 us=550747 log = ENABLED
Tue Apr 30 08:26:18 2019 us=550747 suppress_timestamps = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 machine_readable_output = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 nice = 0
Tue Apr 30 08:26:18 2019 us=550747 verbosity = 4
Tue Apr 30 08:26:18 2019 us=550747 mute = 0
Tue Apr 30 08:26:18 2019 us=550747 gremlin = 0
Tue Apr 30 08:26:18 2019 us=550747 status_file = 'openvpn-status.log'
Tue Apr 30 08:26:18 2019 us=550747 status_file_version = 1
Tue Apr 30 08:26:18 2019 us=550747 status_file_update_freq = 60
Tue Apr 30 08:26:18 2019 us=550747 occ = ENABLED
Tue Apr 30 08:26:18 2019 us=550747 rcvbuf = 0
Tue Apr 30 08:26:18 2019 us=550747 sndbuf = 0
Tue Apr 30 08:26:18 2019 us=550747 sockflags = 0
Tue Apr 30 08:26:18 2019 us=550747 fast_io = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 comp.alg = 2
Tue Apr 30 08:26:18 2019 us=550747 comp.flags = 1
Tue Apr 30 08:26:18 2019 us=550747 route_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 route_default_gateway = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=550747 route_default_metric = 0
Tue Apr 30 08:26:18 2019 us=550747 route_noexec = DISABLED
Tue Apr 30 08:26:18 2019 us=550747 route_delay = 0
Tue Apr 30 08:26:18 2019 us=550747 route_delay_window = 30
Tue Apr 30 08:26:18 2019 us=566379 route_delay_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 route_nopull = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 route_gateway_via_dhcp = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 allow_pull_fqdn = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 management_addr = '127.0.0.1'
Tue Apr 30 08:26:18 2019 us=566379 management_port = '25341'
Tue Apr 30 08:26:18 2019 us=566379 management_user_pass = 'stdin'
Tue Apr 30 08:26:18 2019 us=566379 management_log_history_cache = 250
Tue Apr 30 08:26:18 2019 us=566379 management_echo_buffer_size = 100
Tue Apr 30 08:26:18 2019 us=566379 management_write_peer_info_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 management_client_user = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 management_client_group = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 management_flags = 6
Tue Apr 30 08:26:18 2019 us=566379 shared_secret_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 key_direction = not set
Tue Apr 30 08:26:18 2019 us=566379 ciphername = 'AES-256-CBC'
Tue Apr 30 08:26:18 2019 us=566379 ncp_enabled = ENABLED
Tue Apr 30 08:26:18 2019 us=566379 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
Tue Apr 30 08:26:18 2019 us=566379 authname = 'SHA1'
Tue Apr 30 08:26:18 2019 us=566379 prng_hash = 'SHA1'
Tue Apr 30 08:26:18 2019 us=566379 prng_nonce_secret_len = 16
Tue Apr 30 08:26:18 2019 us=566379 keysize = 0
Tue Apr 30 08:26:18 2019 us=566379 engine = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 replay = ENABLED
Tue Apr 30 08:26:18 2019 us=566379 mute_replay_warnings = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 replay_window = 64
Tue Apr 30 08:26:18 2019 us=566379 replay_time = 15
Tue Apr 30 08:26:18 2019 us=566379 packet_id_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 use_iv = ENABLED
Tue Apr 30 08:26:18 2019 us=566379 test_crypto = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 tls_server = ENABLED
Tue Apr 30 08:26:18 2019 us=566379 tls_client = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 key_method = 2
Tue Apr 30 08:26:18 2019 us=566379 ca_file = 'ca.crt'
Tue Apr 30 08:26:18 2019 us=566379 ca_path = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 dh_file = 'dh2048.pem'
Tue Apr 30 08:26:18 2019 us=566379 cert_file = 'Mayer.crt'
Tue Apr 30 08:26:18 2019 us=566379 extra_certs_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 priv_key_file = 'Mayer.key'
Tue Apr 30 08:26:18 2019 us=566379 pkcs12_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 cryptoapi_cert = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 cipher_list = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 cipher_list_tls13 = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 tls_cert_profile = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 tls_verify = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 tls_export_cert = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 verify_x509_type = 0
Tue Apr 30 08:26:18 2019 us=566379 verify_x509_name = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 crl_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 ns_cert_type = 0
Tue Apr 30 08:26:18 2019 us=566379 remote_cert_ku[i] = 0
Tue Apr 30 08:26:18 2019 us=566379 remote_cert_ku[i] = 0
(...) (shortened due to too long for Post)
Tue Apr 30 08:26:18 2019 us=566379 remote_cert_ku[i] = 0
Tue Apr 30 08:26:18 2019 us=566379 remote_cert_eku = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 ssl_flags = 0
Tue Apr 30 08:26:18 2019 us=566379 tls_timeout = 2
Tue Apr 30 08:26:18 2019 us=566379 renegotiate_bytes = -1
Tue Apr 30 08:26:18 2019 us=566379 renegotiate_packets = 0
Tue Apr 30 08:26:18 2019 us=566379 renegotiate_seconds = 3600
Tue Apr 30 08:26:18 2019 us=566379 handshake_window = 60
Tue Apr 30 08:26:18 2019 us=566379 transition_window = 3600
Tue Apr 30 08:26:18 2019 us=566379 single_session = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 push_peer_info = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 tls_exit = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 tls_auth_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 tls_crypt_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=566379 pkcs11_protected_authentication = DISABLED
Tue Apr 30 08:26:18 2019 us=566379 pkcs11_protected_authentication = DISABLED
(...) (shortened due to too long for Post)
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_protected_authentication = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_protected_authentication = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_private_mode = 00000000
(...) (shortened due to too long for Post)
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_private_mode = 00000000
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_private_mode = 00000000
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_cert_private = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_cert_private = DISABLED
(...) (shortened due to too long for Post)
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_cert_private = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_pin_cache_period = -1
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_id = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 pkcs11_id_management = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 server_network = 0.0.0.0
Tue Apr 30 08:26:18 2019 us=581996 server_netmask = 0.0.0.0
Tue Apr 30 08:26:18 2019 us=581996 server_network_ipv6 = ::
Tue Apr 30 08:26:18 2019 us=581996 server_netbits_ipv6 = 0
Tue Apr 30 08:26:18 2019 us=581996 server_bridge_ip = 192.168.1.150
Tue Apr 30 08:26:18 2019 us=581996 server_bridge_netmask = 255.255.255.0
Tue Apr 30 08:26:18 2019 us=581996 server_bridge_pool_start = 192.168.1.20
Tue Apr 30 08:26:18 2019 us=581996 server_bridge_pool_end = 192.168.1.22
Tue Apr 30 08:26:18 2019 us=581996 push_entry = 'route 192.168.1.1 255.255.255.0'
Tue Apr 30 08:26:18 2019 us=581996 push_entry = 'redirect-gateway def1 bypass-dhcp'
Tue Apr 30 08:26:18 2019 us=581996 push_entry = 'route-gateway 192.168.1.150'
Tue Apr 30 08:26:18 2019 us=581996 push_entry = 'ping 10'
Tue Apr 30 08:26:18 2019 us=581996 push_entry = 'ping-restart 120'
Tue Apr 30 08:26:18 2019 us=581996 ifconfig_pool_defined = ENABLED
Tue Apr 30 08:26:18 2019 us=581996 ifconfig_pool_start = 192.168.1.20
Tue Apr 30 08:26:18 2019 us=581996 ifconfig_pool_end = 192.168.1.22
Tue Apr 30 08:26:18 2019 us=581996 ifconfig_pool_netmask = 255.255.255.0
Tue Apr 30 08:26:18 2019 us=581996 ifconfig_pool_persist_filename = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 ifconfig_pool_persist_refresh_freq = 600
Tue Apr 30 08:26:18 2019 us=581996 ifconfig_ipv6_pool_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 ifconfig_ipv6_pool_base = ::
Tue Apr 30 08:26:18 2019 us=581996 ifconfig_ipv6_pool_netbits = 0
Tue Apr 30 08:26:18 2019 us=581996 n_bcast_buf = 256
Tue Apr 30 08:26:18 2019 us=581996 tcp_queue_limit = 64
Tue Apr 30 08:26:18 2019 us=581996 real_hash_size = 256
Tue Apr 30 08:26:18 2019 us=581996 virtual_hash_size = 256
Tue Apr 30 08:26:18 2019 us=581996 client_connect_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 learn_address_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 client_disconnect_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 client_config_dir = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 ccd_exclusive = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 tmp_dir = 'C:\Users\admin\AppData\Local\Temp\'
Tue Apr 30 08:26:18 2019 us=581996 push_ifconfig_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 push_ifconfig_local = 0.0.0.0
Tue Apr 30 08:26:18 2019 us=581996 push_ifconfig_remote_netmask = 0.0.0.0
Tue Apr 30 08:26:18 2019 us=581996 push_ifconfig_ipv6_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 push_ifconfig_ipv6_local = ::/0
Tue Apr 30 08:26:18 2019 us=581996 push_ifconfig_ipv6_remote = ::
Tue Apr 30 08:26:18 2019 us=581996 enable_c2c = ENABLED
Tue Apr 30 08:26:18 2019 us=581996 duplicate_cn = ENABLED
Tue Apr 30 08:26:18 2019 us=581996 cf_max = 0
Tue Apr 30 08:26:18 2019 us=581996 cf_per = 0
Tue Apr 30 08:26:18 2019 us=581996 max_clients = 1024
Tue Apr 30 08:26:18 2019 us=581996 max_routes_per_client = 256
Tue Apr 30 08:26:18 2019 us=581996 auth_user_pass_verify_script = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 auth_user_pass_verify_script_via_file = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 auth_token_generate = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 auth_token_lifetime = 0
Tue Apr 30 08:26:18 2019 us=581996 client = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 pull = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 auth_user_pass_file = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 show_net_up = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 route_method = 0
Tue Apr 30 08:26:18 2019 us=581996 block_outside_dns = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 ip_win32_defined = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 ip_win32_type = 3
Tue Apr 30 08:26:18 2019 us=581996 dhcp_masq_offset = 0
Tue Apr 30 08:26:18 2019 us=581996 dhcp_lease_time = 31536000
Tue Apr 30 08:26:18 2019 us=581996 tap_sleep = 10
Tue Apr 30 08:26:18 2019 us=581996 dhcp_options = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 dhcp_renew = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 dhcp_pre_release = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 domain = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 netbios_scope = '[UNDEF]'
Tue Apr 30 08:26:18 2019 us=581996 netbios_node_type = 0
Tue Apr 30 08:26:18 2019 us=581996 disable_nbt = DISABLED
Tue Apr 30 08:26:18 2019 us=581996 OpenVPN 2.4.7 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 25 2019
Tue Apr 30 08:26:18 2019 us=581996 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Apr 30 08:26:18 2019 us=581996 library versions: OpenSSL 1.1.0j 20 Nov 2018, LZO 2.10
Enter Management Password:
Tue Apr 30 08:26:18 2019 us=597621 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Tue Apr 30 08:26:18 2019 us=597621 Need hold release from management interface, waiting...
Tue Apr 30 08:26:18 2019 us=800751 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Tue Apr 30 08:26:18 2019 us=910116 MANAGEMENT: CMD 'state on'
Tue Apr 30 08:26:18 2019 us=910116 MANAGEMENT: CMD 'log all on'
Tue Apr 30 08:26:19 2019 us=894471 MANAGEMENT: CMD 'echo all on'
Tue Apr 30 08:26:19 2019 us=894471 MANAGEMENT: CMD 'bytecount 5'
Tue Apr 30 08:26:19 2019 us=910096 MANAGEMENT: CMD 'hold off'
Tue Apr 30 08:26:19 2019 us=910096 MANAGEMENT: CMD 'hold release'
Tue Apr 30 08:26:19 2019 us=925714 NOTE: when bridging your LAN adapter with the TAP adapter, note that the new bridge adapter will often take on its own IP address that is different from what the LAN adapter was previously set to
Tue Apr 30 08:26:19 2019 us=941343 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Tue Apr 30 08:26:19 2019 us=956965 Diffie-Hellman initialized with 2048 bit key
Tue Apr 30 08:26:19 2019 us=972590 TLS-Auth MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:26:19 2019 us=972590 interactive service msg_channel=0
Tue Apr 30 08:26:19 2019 us=972590 open_tun
Tue Apr 30 08:26:19 2019 us=988214 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{DE26DC7E-6548-45D2-87BF-C0A7C814693B}.tap
Tue Apr 30 08:26:19 2019 us=988214 TAP-Windows Driver Version 9.23
Tue Apr 30 08:26:19 2019 us=988214 TAP-Windows MTU=1500
Tue Apr 30 08:26:19 2019 us=988214 Sleeping for 10 seconds...
Tue Apr 30 08:26:29 2019 us=128639 NOTE: FlushIpNetTable failed on interface [20] {DE26DC7E-6548-45D2-87BF-C0A7C814693B} (status=1168) : Element nicht gefunden.
Tue Apr 30 08:26:29 2019 us=128639 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:26:29 2019 us=128639 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Apr 30 08:26:29 2019 us=128639 Listening for incoming TCP connection on [AF_INET][undef]:443
Tue Apr 30 08:26:29 2019 us=128639 TCPv4_SERVER link local (bound): [AF_INET][undef]:443
Tue Apr 30 08:26:29 2019 us=128639 TCPv4_SERVER link remote: [AF_UNSPEC]
Tue Apr 30 08:26:29 2019 us=128639 MULTI: multi_init called, r=256 v=256
Tue Apr 30 08:26:29 2019 us=128639 IFCONFIG POOL: base=192.168.1.20 size=3, ipv6=0
Tue Apr 30 08:26:29 2019 us=128639 MULTI: TCP INIT maxclients=60 maxevents=64
Tue Apr 30 08:26:29 2019 us=128639 Initialization Sequence Completed
Tue Apr 30 08:26:29 2019 us=128639 MANAGEMENT: >STATE:1556605589,CONNECTED,SUCCESS,,,,,
Tue Apr 30 08:26:40 2019 us=50260 MULTI: multi_create_instance called
Tue Apr 30 08:26:40 2019 us=50260 Re-using SSL/TLS context
Tue Apr 30 08:26:40 2019 us=50260 LZO compression initializing
Tue Apr 30 08:26:40 2019 us=50260 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:26:40 2019 us=50260 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:26:40 2019 us=50260 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:26:40 2019 us=50260 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:26:40 2019 us=50260 TCP connection established with [AF_INET]212.102.160.2:54080
Tue Apr 30 08:26:40 2019 us=50260 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:26:40 2019 us=50260 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:54080
Tue Apr 30 08:26:41 2019 us=50243 212.102.160.2:54080 TLS: Initial packet from [AF_INET]212.102.160.2:54080, sid=0b4c900d 0e0319bc
Tue Apr 30 08:26:41 2019 us=378359 212.102.160.2:54080 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:26:41 2019 us=378359 212.102.160.2:54080 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_VER=2.4.7
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_PLAT=linux
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_PROTO=2
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_NCP=2
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_LZ4=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_LZ4v2=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_LZO=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_COMP_STUB=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 peer info: IV_TCPNL=1
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:26:41 2019 us=456480 212.102.160.2:54080 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:26:41 2019 us=487730 212.102.160.2:54080 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:26:41 2019 us=487730 212.102.160.2:54080 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:54080
Tue Apr 30 08:26:41 2019 us=487730 client1/212.102.160.2:54080 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:26:42 2019 us=643951 client1/212.102.160.2:54080 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:26:43 2019 us=3319 client1/212.102.160.2:54080 MULTI: Learn: 42:cb:43:2b:9c:47 -> client1/212.102.160.2:54080
Tue Apr 30 08:27:03 2019 us=174740 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:27:03 2019 us=174740 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:27:03 2019 us=174740 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:27:03 2019 us=174740 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92
(...) (shortened due to too long for Post)
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=74
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=74
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 Connection reset, restarting [0]
Tue Apr 30 08:28:18 2019 us=516790 client1/212.102.160.2:54080 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:28:18 2019 us=516790 TCP/UDP: Closing socket
Tue Apr 30 08:28:27 2019 us=704090 MULTI: multi_create_instance called
Tue Apr 30 08:28:27 2019 us=704090 Re-using SSL/TLS context
Tue Apr 30 08:28:27 2019 us=704090 LZO compression initializing
Tue Apr 30 08:28:27 2019 us=704090 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:28:27 2019 us=704090 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:28:27 2019 us=704090 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:28:27 2019 us=704090 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:28:27 2019 us=704090 TCP connection established with [AF_INET]212.102.160.2:54178
Tue Apr 30 08:28:27 2019 us=704090 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:28:27 2019 us=704090 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:54178
Tue Apr 30 08:28:28 2019 us=704067 212.102.160.2:54178 TLS: Initial packet from [AF_INET]212.102.160.2:54178, sid=1e47303d dd6c0eb7
Tue Apr 30 08:28:28 2019 us=985304 212.102.160.2:54178 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:28:28 2019 us=985304 212.102.160.2:54178 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_VER=2.4.7
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_PLAT=linux
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_PROTO=2
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_NCP=2
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_LZ4=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_LZ4v2=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_LZO=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_COMP_STUB=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 peer info: IV_TCPNL=1
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:28:29 2019 us=16553 212.102.160.2:54178 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:28:29 2019 us=32177 212.102.160.2:54178 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:28:29 2019 us=32177 212.102.160.2:54178 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:54178
Tue Apr 30 08:28:29 2019 us=32177 client1/212.102.160.2:54178 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:28:30 2019 us=250911 client1/212.102.160.2:54178 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:28:30 2019 us=516520 client1/212.102.160.2:54178 MULTI: Learn: 42:cb:43:2b:9c:47 -> client1/212.102.160.2:54178
Tue Apr 30 08:28:30 2019 us=516520 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:32 2019 us=782096 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:32 2019 us=782096 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:32 2019 us=782096 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=165
Tue Apr 30 08:28:34 2019 us=797678 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:36 2019 us=922624 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:36 2019 us=922624 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:37 2019 us=938224 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=82
Tue Apr 30 08:28:37 2019 us=938224 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:37 2019 us=938224 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:28:37 2019 us=938224 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:28:38 2019 us=969452 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:38 2019 us=969452 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:39 2019 us=985064 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=165
Tue Apr 30 08:28:43 2019 us=31881 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:44 2019 us=78714 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:28:44 2019 us=78714 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:28:45 2019 us=94315 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:28:45 2019 us=94315 client1/212.102.160.2:54178 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:28:46 2019 us=250542 client1/212.102.160.2:54178 Connection reset, restarting [0]
Tue Apr 30 08:28:46 2019 us=250542 client1/212.102.160.2:54178 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:28:46 2019 us=250542 TCP/UDP: Closing socket
Tue Apr 30 08:28:59 2019 us=547114 MULTI: multi_create_instance called
Tue Apr 30 08:28:59 2019 us=547114 Re-using SSL/TLS context
Tue Apr 30 08:28:59 2019 us=562741 LZO compression initializing
Tue Apr 30 08:28:59 2019 us=562741 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:28:59 2019 us=562741 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:28:59 2019 us=562741 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:28:59 2019 us=562741 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:28:59 2019 us=562741 TCP connection established with [AF_INET]212.102.160.2:53070
Tue Apr 30 08:28:59 2019 us=562741 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:28:59 2019 us=562741 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:53070
Tue Apr 30 08:29:00 2019 us=547110 212.102.160.2:53070 TLS: Initial packet from [AF_INET]212.102.160.2:53070, sid=59ae1bc8 12aedd25
Tue Apr 30 08:29:00 2019 us=781462 212.102.160.2:53070 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:29:00 2019 us=797096 212.102.160.2:53070 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_VER=2.4.7
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_PLAT=win
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_PROTO=2
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_NCP=2
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_LZ4=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_LZ4v2=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_LZO=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_COMP_STUB=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_TCPNL=1
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 peer info: IV_GUI_VER=OpenVPN_GUI_11
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:29:00 2019 us=812711 212.102.160.2:53070 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:53070
Tue Apr 30 08:29:00 2019 us=812711 client1/212.102.160.2:53070 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:29:01 2019 us=875197 client1/212.102.160.2:53070 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:29:01 2019 us=922070 client1/212.102.160.2:53070 Connection reset, restarting [-1]
Tue Apr 30 08:29:01 2019 us=922070 client1/212.102.160.2:53070 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:29:01 2019 us=922070 TCP/UDP: Closing socket
Tue Apr 30 08:29:27 2019 us=258490 MULTI: multi_create_instance called
Tue Apr 30 08:29:27 2019 us=258490 Re-using SSL/TLS context
Tue Apr 30 08:29:27 2019 us=258490 LZO compression initializing
Tue Apr 30 08:29:27 2019 us=258490 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:29:27 2019 us=258490 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:29:27 2019 us=258490 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:29:27 2019 us=258490 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:29:27 2019 us=258490 TCP connection established with [AF_INET]212.102.160.2:53074
Tue Apr 30 08:29:27 2019 us=258490 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:29:27 2019 us=258490 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:53074
Tue Apr 30 08:29:28 2019 us=258462 212.102.160.2:53074 TLS: Initial packet from [AF_INET]212.102.160.2:53074, sid=ac34f926 3e972a43
Tue Apr 30 08:29:28 2019 us=477208 212.102.160.2:53074 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:29:28 2019 us=477208 212.102.160.2:53074 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_VER=2.4.7
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_PLAT=win
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_PROTO=2
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_NCP=2
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_LZ4=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_LZ4v2=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_LZO=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_COMP_STUB=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_TCPNL=1
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 peer info: IV_GUI_VER=OpenVPN_GUI_11
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:29:28 2019 us=492834 212.102.160.2:53074 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:29:28 2019 us=508460 212.102.160.2:53074 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:29:28 2019 us=508460 212.102.160.2:53074 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:53074
Tue Apr 30 08:29:28 2019 us=508460 client1/212.102.160.2:53074 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:29:29 2019 us=524059 client1/212.102.160.2:53074 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:29:29 2019 us=570934 client1/212.102.160.2:53074 Connection reset, restarting [-1]
Tue Apr 30 08:29:29 2019 us=570934 client1/212.102.160.2:53074 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:29:29 2019 us=570934 TCP/UDP: Closing socket
Tue Apr 30 08:30:02 2019 us=132700 MULTI: multi_create_instance called
Tue Apr 30 08:30:02 2019 us=132700 Re-using SSL/TLS context
Tue Apr 30 08:30:02 2019 us=132700 LZO compression initializing
Tue Apr 30 08:30:02 2019 us=132700 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Tue Apr 30 08:30:02 2019 us=132700 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:30:02 2019 us=132700 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Tue Apr 30 08:30:02 2019 us=132700 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Tue Apr 30 08:30:02 2019 us=132700 TCP connection established with [AF_INET]212.102.160.2:53076
Tue Apr 30 08:30:02 2019 us=132700 TCPv4_SERVER link local: (not bound)
Tue Apr 30 08:30:02 2019 us=132700 TCPv4_SERVER link remote: [AF_INET]212.102.160.2:53076
Tue Apr 30 08:30:03 2019 us=117051 212.102.160.2:53076 TLS: Initial packet from [AF_INET]212.102.160.2:53076, sid=1f59d708 5e11c4a6
Tue Apr 30 08:30:03 2019 us=335796 212.102.160.2:53076 VERIFY OK: depth=1, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=Mayer, name=Mayer, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:30:03 2019 us=335796 212.102.160.2:53076 VERIFY OK: depth=0, C=DE, ST=BY, L=Vilsbiburg, O=Mayer, OU=None, CN=client1, name=client1, emailAddress=christoph.mayer@arcor.de
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_VER=2.4.7
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_PLAT=win
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_PROTO=2
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_NCP=2
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_LZ4=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_LZ4v2=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_LZO=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_COMP_STUB=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_COMP_STUBv2=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_TCPNL=1
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 peer info: IV_GUI_VER=OpenVPN_GUI_11
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Apr 30 08:30:03 2019 us=367047 212.102.160.2:53076 [client1] Peer Connection Initiated with [AF_INET]212.102.160.2:53076
Tue Apr 30 08:30:03 2019 us=367047 client1/212.102.160.2:53076 MULTI_sva: pool returned IPv4=192.168.1.20, IPv6=(Not enabled)
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 SENT CONTROL [client1]: 'PUSH_REPLY,route 192.168.1.1 255.255.255.0,redirect-gateway def1 bypass-dhcp,route-gateway 192.168.1.150,ping 10,ping-restart 120,ifconfig 192.168.1.20 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 Data Channel MTU parms [ L:1584 D:1450 EF:52 EB:412 ET:32 EL:3 ]
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:30:04 2019 us=570143 client1/212.102.160.2:53076 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Apr 30 08:30:04 2019 us=679519 client1/212.102.160.2:53076 MULTI: Learn: 00:ff:81:78:b6:81 -> client1/212.102.160.2:53076
Tue Apr 30 08:30:04 2019 us=679519 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=58
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=164
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=54
Tue Apr 30 08:30:05 2019 us=757616 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=90
(.......) (shortened because of too long for the post)
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=93
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=73
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=93
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=73
Tue Apr 30 08:30:21 2019 us=476012 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:22 2019 us=538488 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:24 2019 us=38454 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:24 2019 us=38454 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:24 2019 us=38454 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=216
Tue Apr 30 08:30:25 2019 us=444672 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=110
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=216
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=46
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=221
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=221
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=251
Tue Apr 30 08:30:27 2019 us=38387 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:28 2019 us=647725 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:28 2019 us=647725 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:28 2019 us=647725 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=85
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=65
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=46
Tue Apr 30 08:30:29 2019 us=944571 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:30 2019 us=960173 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:30 2019 us=960173 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:33 2019 us=163249 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:33 2019 us=163249 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:34 2019 us=944459 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:36 2019 us=163185 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:36 2019 us=163185 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=164
Tue Apr 30 08:30:36 2019 us=163185 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:37 2019 us=663149 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:37 2019 us=663149 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:38 2019 us=944371 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:38 2019 us=944371 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:41 2019 us=428687 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:41 2019 us=428687 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:42 2019 us=944278 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:44 2019 us=428621 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:44 2019 us=428621 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=42
Tue Apr 30 08:30:45 2019 us=928588 client1/212.102.160.2:53076 MULTI: Outgoing TUN queue full, dropped packet len=92
Tue Apr 30 08:30:45 2019 us=928588 client1/212.102.160.2:53076 Connection reset, restarting [-1]
Tue Apr 30 08:30:45 2019 us=928588 client1/212.102.160.2:53076 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Apr 30 08:30:45 2019 us=928588 MBUF: dereferenced queued packet
Tue Apr 30 08:30:45 2019 us=928588 TCP/UDP: Closing socket
Tue Apr 30 08:31:02 2019 us=107889 TCP/UDP: Closing socket
Tue Apr 30 08:31:02 2019 us=107889 Closing TUN/TAP interface