Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

This forum is for admins who are looking to build or expand their OpenVPN setup.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Letalis
OpenVPN User
Posts: 47
Joined: Mon Sep 14, 2020 11:46 am

Re: Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

Post by Letalis » Sun Apr 03, 2022 11:45 am

The following logs are took from after I removed the supress-timestamps arg in the service on my machine and got rid of the cipher, auth, and crl lines in the server config as suggested (cipher and auth lines in client config have also been removed).

The server is hosted on my home LAN. If I connect from outside the LAN through my public IP I don't get any errors upon connection, but at the exact moment the reconnect occurs I get this on the server:

Code: Select all

2022-04-03 12:01:15 us=521808 event_wait : Interrupted system call (code=4)
2022-04-03 12:01:15 us=521841 SENT CONTROL [client]: 'RESTART' (status=1)
and this on the client:

Code: Select all

2022-04-03 12:01:13 Connection reset command was pushed by server ('')
2022-04-03 12:01:13 SIGUSR1[soft,server-pushed-connection-reset] received, process restarting
2022-04-03 12:01:13 Restart pause, 5 second(s)
Out of interest I tried connecting from another device within the LAN which results in this message which I assume is because I haven't setup a route for the conflicting 192.168.0.0/24 subnets (it's a brand new config like I said so I haven't set up routing options).

Code: Select all

2022-04-03 12:00:12 us=80438 client/192.168.0.14:61698 MULTI: bad source address from client [::], packet dropped
I then get the same reconnection problem. I assume the above message is irrelevant to my problem though as it only happens if I try connecting within the LAN.

The operating systems I'm using are a Ubuntu 20.04 server for the OpenVPN server, and the client machines I'm testing (and getting the same results on each) are Windows and Ubuntu 20.04 desktop too.

It could just be that my particular router at home might not like something in 2.5.2+.
If nothing stands out I'll try the git bisect later today and see if I can find the commit that changes things on my end.

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

Post by TinCanTech » Sun Apr 03, 2022 12:58 pm

Letalis wrote:
Sun Apr 03, 2022 11:45 am
The server is hosted on my home LAN. If I connect from outside the LAN through my public IP I don't get any errors upon connection, but at the exact moment the reconnect occurs I get this on the server:

Code: Select all

2022-04-03 12:01:15 us=521808 event_wait : Interrupted system call (code=4)
2022-04-03 12:01:15 us=521841 SENT CONTROL [client]: 'RESTART' (status=1)
and this on the client:

Code: Select all

2022-04-03 12:01:13 Connection reset command was pushed by server ('')
2022-04-03 12:01:13 SIGUSR1[soft,server-pushed-connection-reset] received, process restarting
2022-04-03 12:01:13 Restart pause, 5 second(s)
What do you mean by reconnect ?

Letalis
OpenVPN User
Posts: 47
Joined: Mon Sep 14, 2020 11:46 am

Re: Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

Post by Letalis » Sun Apr 03, 2022 1:20 pm

By reconnect I mean when the reset command is received, after the restart pause line the client starts to reauthenticate as shown in this previous log I posted with another server of the same setup:

Code: Select all

2022-04-01 14:42:24 us=580858 Connection reset command was pushed by server ('')
2022-04-01 14:42:24 us=580942 TCP/UDP: Closing socket
2022-04-01 14:42:24 us=580964 SIGUSR1[soft,server-pushed-connection-reset] received, process restarting
2022-04-01 14:42:24 us=580974 Restart pause, 5 second(s)
2022-04-01 14:42:29 us=581240 Re-using SSL/TLS context
2022-04-01 14:42:29 us=581307 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-01 14:42:29 us=581318 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-01 14:42:29 us=581324 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-01 14:42:29 us=581330 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-01 14:42:29 us=581375 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
2022-04-01 14:42:29 us=581385 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2022-04-01 14:42:29 us=581399 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
2022-04-01 14:42:29 us=581403 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
2022-04-01 14:42:29 us=581412 TCP/UDP: Preserving recently used remote address: [AF_INET]192.168.0.27:69
2022-04-01 14:42:29 us=581431 Socket Buffers: R=[212992->212992] S=[212992->212992]
2022-04-01 14:42:29 us=581436 UDP link local: (not bound)
2022-04-01 14:42:29 us=581440 UDP link remote: [AF_INET]192.168.0.27:69
2022-04-01 14:42:29 us=587051 read UDP [ECONNREFUSED]: Connection refused (code=111)
2022-04-01 14:42:31 us=212072 read UDP [ECONNREFUSED]: Connection refused (code=111)
2022-04-01 14:42:35 us=307920 TLS: Initial packet from [AF_INET]192.168.0.27:69, sid=e4237ce7 0287bc59
2022-04-01 14:42:35 us=319326 VERIFY OK: depth=1, CN=ChangeMe
2022-04-01 14:42:35 us=319583 VERIFY KU OK
2022-04-01 14:42:35 us=319589 Validating certificate extended key usage
2022-04-01 14:42:35 us=319594 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2022-04-01 14:42:35 us=319597 VERIFY EKU OK
2022-04-01 14:42:35 us=319601 VERIFY OK: depth=0, CN=server
2022-04-01 14:42:36 us=512720 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-04-01 14:42:36 us=512758 [server] Peer Connection Initiated with [AF_INET]192.168.0.27:69
2022-04-01 14:42:36 us=532130 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,ifconfig-ipv6 fd15:53b6:dead::2/64 fd15:53b6:dead::1,redirect-gateway def1 ipv6 bypass-dhcp,route 192.168.0.0 255.255.0.0 net_gateway,route 172.16.0.0 255.240.0.0 net_gateway,block-ipv6,explicit-exit-notify 2,ping 10,ping-restart 120,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.2 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2022-04-01 14:42:36 us=532227 OPTIONS IMPORT: timers and/or timeouts modified
2022-04-01 14:42:36 us=532234 OPTIONS IMPORT: explicit notify parm(s) modified
2022-04-01 14:42:36 us=532238 OPTIONS IMPORT: --ifconfig/up options modified
2022-04-01 14:42:36 us=532241 OPTIONS IMPORT: route options modified
2022-04-01 14:42:36 us=532244 OPTIONS IMPORT: route-related options modified
2022-04-01 14:42:36 us=532247 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2022-04-01 14:42:36 us=532250 OPTIONS IMPORT: peer-id set
2022-04-01 14:42:36 us=532253 OPTIONS IMPORT: adjusting link_mtu to 1624
2022-04-01 14:42:36 us=532257 OPTIONS IMPORT: data channel crypto options modified
2022-04-01 14:42:36 us=532260 Data Channel: using negotiated cipher 'AES-256-GCM'
2022-04-01 14:42:36 us=532269 Data Channel MTU parms [ L:1552 D:1450 EF:52 EB:406 ET:0 EL:3 ]
2022-04-01 14:42:36 us=532328 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-01 14:42:36 us=532333 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-01 14:42:36 us=532338 Preserving previous TUN/TAP instance: tun0
2022-04-01 14:42:36 us=532352 Initialization Sequence Completed

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

Post by TinCanTech » Sun Apr 03, 2022 2:50 pm

A hunch .. your server is crashing and systemd is restarting it and over-writing the log.

Try using --log-append in your server config.

Letalis
OpenVPN User
Posts: 47
Joined: Mon Sep 14, 2020 11:46 am

Re: Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

Post by Letalis » Sun Apr 03, 2022 9:07 pm

I see, could that explain why I'm not seeing anything about the reconnect in the log but I do in the management console?

I tried adding log-append and I get this:

Code: Select all

2022-04-03 21:59:49 us=169041 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2022-04-03 21:59:49 us=274919 WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
2022-04-03 21:59:49 us=274984 Current Parameter Settings:
2022-04-03 21:59:49 us=274989   config = 'server.conf'
2022-04-03 21:59:49 us=274993   mode = 1
2022-04-03 21:59:49 us=274997   persist_config = DISABLED
2022-04-03 21:59:49 us=275000   persist_mode = 1
2022-04-03 21:59:49 us=275004   show_ciphers = DISABLED
2022-04-03 21:59:49 us=275007   show_digests = DISABLED
2022-04-03 21:59:49 us=275010   show_engines = DISABLED
2022-04-03 21:59:49 us=275014   genkey = DISABLED
2022-04-03 21:59:49 us=275017   genkey_filename = '[UNDEF]'
2022-04-03 21:59:49 us=275021   key_pass_file = '[UNDEF]'
2022-04-03 21:59:49 us=275024   show_tls_ciphers = DISABLED
2022-04-03 21:59:49 us=275027   connect_retry_max = 0
2022-04-03 21:59:49 us=275031 Connection profiles [0]:
2022-04-03 21:59:49 us=275035   proto = udp
2022-04-03 21:59:49 us=275038   local = '192.168.0.40'
2022-04-03 21:59:49 us=275041   local_port = '69'
2022-04-03 21:59:49 us=275045   remote = '[UNDEF]'
2022-04-03 21:59:49 us=275048   remote_port = '69'
2022-04-03 21:59:49 us=275051   remote_float = DISABLED
2022-04-03 21:59:49 us=275054   bind_defined = DISABLED
2022-04-03 21:59:49 us=275058   bind_local = ENABLED
2022-04-03 21:59:49 us=275061   bind_ipv6_only = DISABLED
2022-04-03 21:59:49 us=275064   connect_retry_seconds = 5
2022-04-03 21:59:49 us=275068   connect_timeout = 120
2022-04-03 21:59:49 us=275071   socks_proxy_server = '[UNDEF]'
2022-04-03 21:59:49 us=275074   socks_proxy_port = '[UNDEF]'
2022-04-03 21:59:49 us=275078   tun_mtu = 1500
2022-04-03 21:59:49 us=275081   tun_mtu_defined = ENABLED
2022-04-03 21:59:49 us=275084   link_mtu = 1500
2022-04-03 21:59:49 us=275088   link_mtu_defined = DISABLED
2022-04-03 21:59:49 us=275091   tun_mtu_extra = 0
2022-04-03 21:59:49 us=275094   tun_mtu_extra_defined = DISABLED
2022-04-03 21:59:49 us=275098   mtu_discover_type = -1
2022-04-03 21:59:49 us=275101   fragment = 0
2022-04-03 21:59:49 us=275105   mssfix = 1450
2022-04-03 21:59:49 us=275108   explicit_exit_notification = 1
2022-04-03 21:59:49 us=275112   tls_auth_file = '[UNDEF]'
2022-04-03 21:59:49 us=275115   key_direction = not set
2022-04-03 21:59:49 us=275118   tls_crypt_file = '[INLINE]'
2022-04-03 21:59:49 us=275122   tls_crypt_v2_file = '[UNDEF]'
2022-04-03 21:59:49 us=275125 Connection profiles END
2022-04-03 21:59:49 us=275129   remote_random = DISABLED
2022-04-03 21:59:49 us=275132   ipchange = '[UNDEF]'
2022-04-03 21:59:49 us=275135   dev = 'tun'
2022-04-03 21:59:49 us=275138   dev_type = '[UNDEF]'
2022-04-03 21:59:49 us=275142   dev_node = '[UNDEF]'
2022-04-03 21:59:49 us=275145   lladdr = '[UNDEF]'
2022-04-03 21:59:49 us=275148   topology = 3
2022-04-03 21:59:49 us=275151   ifconfig_local = '10.8.0.1'
2022-04-03 21:59:49 us=275155   ifconfig_remote_netmask = '255.255.255.0'
2022-04-03 21:59:49 us=275158   ifconfig_noexec = DISABLED
2022-04-03 21:59:49 us=275161   ifconfig_nowarn = DISABLED
2022-04-03 21:59:49 us=275165   ifconfig_ipv6_local = '[UNDEF]'
2022-04-03 21:59:49 us=275168   ifconfig_ipv6_netbits = 0
2022-04-03 21:59:49 us=275171   ifconfig_ipv6_remote = '[UNDEF]'
2022-04-03 21:59:49 us=275174   shaper = 0
2022-04-03 21:59:49 us=275178   mtu_test = 0
2022-04-03 21:59:49 us=275181   mlock = DISABLED
2022-04-03 21:59:49 us=275184   keepalive_ping = 10
2022-04-03 21:59:49 us=275188   keepalive_timeout = 120
2022-04-03 21:59:49 us=275191   inactivity_timeout = 0
2022-04-03 21:59:49 us=275195   inactivity_minimum_bytes = 0
2022-04-03 21:59:49 us=275198   ping_send_timeout = 10
2022-04-03 21:59:49 us=275201   ping_rec_timeout = 240
2022-04-03 21:59:49 us=275204   ping_rec_timeout_action = 2
2022-04-03 21:59:49 us=275208   ping_timer_remote = DISABLED
2022-04-03 21:59:49 us=275218   remap_sigusr1 = 0
2022-04-03 21:59:49 us=275221   persist_tun = ENABLED
2022-04-03 21:59:49 us=275225   persist_local_ip = DISABLED
2022-04-03 21:59:49 us=275228   persist_remote_ip = DISABLED
2022-04-03 21:59:49 us=275231   persist_key = ENABLED
2022-04-03 21:59:49 us=275234   passtos = DISABLED
2022-04-03 21:59:49 us=275238   resolve_retry_seconds = 1000000000
2022-04-03 21:59:49 us=275241   resolve_in_advance = DISABLED
2022-04-03 21:59:49 us=275244   username = '[UNDEF]'
2022-04-03 21:59:49 us=275247   groupname = '[UNDEF]'
2022-04-03 21:59:49 us=275251   chroot_dir = '[UNDEF]'
2022-04-03 21:59:49 us=275254   cd_dir = '[UNDEF]'
2022-04-03 21:59:49 us=275257   writepid = '[UNDEF]'
2022-04-03 21:59:49 us=275260   up_script = '[UNDEF]'
2022-04-03 21:59:49 us=275263   down_script = '[UNDEF]'
2022-04-03 21:59:49 us=275267   down_pre = DISABLED
2022-04-03 21:59:49 us=275270   up_restart = DISABLED
2022-04-03 21:59:49 us=275295   up_delay = DISABLED
2022-04-03 21:59:49 us=275299   daemon = DISABLED
2022-04-03 21:59:49 us=275302   inetd = 0
2022-04-03 21:59:49 us=275305   log = ENABLED
2022-04-03 21:59:49 us=275309   suppress_timestamps = DISABLED
2022-04-03 21:59:49 us=275312   machine_readable_output = DISABLED
2022-04-03 21:59:49 us=275315   nice = 0
2022-04-03 21:59:49 us=275319   verbosity = 4
2022-04-03 21:59:49 us=275322   mute = 0
2022-04-03 21:59:49 us=275343   gremlin = 0
2022-04-03 21:59:49 us=275347   status_file = '/run/openvpn-server/status-server.log'
2022-04-03 21:59:49 us=275351   status_file_version = 2
2022-04-03 21:59:49 us=275354   status_file_update_freq = 60
2022-04-03 21:59:49 us=275357   occ = ENABLED
2022-04-03 21:59:49 us=275361   rcvbuf = 0
2022-04-03 21:59:49 us=275364   sndbuf = 0
2022-04-03 21:59:49 us=275368   mark = 0
2022-04-03 21:59:49 us=275371   sockflags = 0
2022-04-03 21:59:49 us=275374   fast_io = DISABLED
2022-04-03 21:59:49 us=275377   comp.alg = 0
2022-04-03 21:59:49 us=275381   comp.flags = 0
2022-04-03 21:59:49 us=275384   route_script = '[UNDEF]'
2022-04-03 21:59:49 us=275388   route_default_gateway = '10.8.0.2'
2022-04-03 21:59:49 us=275391   route_default_metric = 0
2022-04-03 21:59:49 us=275395   route_noexec = DISABLED
2022-04-03 21:59:49 us=275414   route_delay = 0
2022-04-03 21:59:49 us=275418   route_delay_window = 30
2022-04-03 21:59:49 us=275422   route_delay_defined = DISABLED
2022-04-03 21:59:49 us=275425   route_nopull = DISABLED
2022-04-03 21:59:49 us=275429   route_gateway_via_dhcp = DISABLED
2022-04-03 21:59:49 us=275432   allow_pull_fqdn = DISABLED
2022-04-03 21:59:49 us=275436   management_addr = 'localhost'
2022-04-03 21:59:49 us=275439   management_port = '7505'
2022-04-03 21:59:49 us=275443   management_user_pass = '[UNDEF]'
2022-04-03 21:59:49 us=275446   management_log_history_cache = 250
2022-04-03 21:59:49 us=275463   management_echo_buffer_size = 100
2022-04-03 21:59:49 us=275469   management_write_peer_info_file = '[UNDEF]'
2022-04-03 21:59:49 us=275472   management_client_user = '[UNDEF]'
2022-04-03 21:59:49 us=275476   management_client_group = '[UNDEF]'
2022-04-03 21:59:49 us=275479   management_flags = 0
2022-04-03 21:59:49 us=275482   shared_secret_file = '[UNDEF]'
2022-04-03 21:59:49 us=275486   key_direction = not set
2022-04-03 21:59:49 us=275489   ciphername = 'BF-CBC'
2022-04-03 21:59:49 us=275493   ncp_enabled = ENABLED
2022-04-03 21:59:49 us=275496   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
2022-04-03 21:59:49 us=275500   authname = 'SHA1'
2022-04-03 21:59:49 us=275503   prng_hash = 'SHA1'
2022-04-03 21:59:49 us=275507   prng_nonce_secret_len = 16
2022-04-03 21:59:49 us=275510   keysize = 0
2022-04-03 21:59:49 us=275514   engine = DISABLED
2022-04-03 21:59:49 us=275517   replay = ENABLED
2022-04-03 21:59:49 us=275521   mute_replay_warnings = DISABLED
2022-04-03 21:59:49 us=275524   replay_window = 64
2022-04-03 21:59:49 us=275528   replay_time = 15
2022-04-03 21:59:49 us=275531   packet_id_file = '[UNDEF]'
2022-04-03 21:59:49 us=275534   test_crypto = DISABLED
2022-04-03 21:59:49 us=275552   tls_server = ENABLED
2022-04-03 21:59:49 us=275562   tls_client = DISABLED
2022-04-03 21:59:49 us=275566   ca_file = 'ca.crt'
2022-04-03 21:59:49 us=277139   ca_path = '[UNDEF]'
2022-04-03 21:59:49 us=277147   dh_file = 'dh.pem'
2022-04-03 21:59:49 us=277151   cert_file = 'server.crt'
2022-04-03 21:59:49 us=277154   extra_certs_file = '[UNDEF]'
2022-04-03 21:59:49 us=277158   priv_key_file = 'server.key'
2022-04-03 21:59:49 us=277162   pkcs12_file = '[UNDEF]'
2022-04-03 21:59:49 us=277165   cipher_list = '[UNDEF]'
2022-04-03 21:59:49 us=277169   cipher_list_tls13 = '[UNDEF]'
2022-04-03 21:59:49 us=277172   tls_cert_profile = '[UNDEF]'
2022-04-03 21:59:49 us=277176   tls_verify = '[UNDEF]'
2022-04-03 21:59:49 us=277179   tls_export_cert = '[UNDEF]'
2022-04-03 21:59:49 us=277182   verify_x509_type = 0
2022-04-03 21:59:49 us=277186   verify_x509_name = '[UNDEF]'
2022-04-03 21:59:49 us=277189   crl_file = '[UNDEF]'
2022-04-03 21:59:49 us=277193   ns_cert_type = 0
2022-04-03 21:59:49 us=277196   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277200   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277203   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277207   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277210   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277214   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277217   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277220   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277224   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277227   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277231   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277234   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277237   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277241   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277244   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277248   remote_cert_ku[i] = 0
2022-04-03 21:59:49 us=277251   remote_cert_eku = '[UNDEF]'
2022-04-03 21:59:49 us=277255   ssl_flags = 0
2022-04-03 21:59:49 us=277258   tls_timeout = 2
2022-04-03 21:59:49 us=277262   renegotiate_bytes = -1
2022-04-03 21:59:49 us=277265   renegotiate_packets = 0
2022-04-03 21:59:49 us=277269   renegotiate_seconds = 3600
2022-04-03 21:59:49 us=277272   handshake_window = 60
2022-04-03 21:59:49 us=277276   transition_window = 3600
2022-04-03 21:59:49 us=277279   single_session = DISABLED
2022-04-03 21:59:49 us=277283   push_peer_info = DISABLED
2022-04-03 21:59:49 us=277286   tls_exit = DISABLED
2022-04-03 21:59:49 us=277290   tls_crypt_v2_metadata = '[UNDEF]'
2022-04-03 21:59:49 us=277293   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277297   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277300   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277304   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277307   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277311   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277314   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277318   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277321   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277351   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277360   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277363   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277367   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277370   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277373   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277377   pkcs11_protected_authentication = DISABLED
2022-04-03 21:59:49 us=277380   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277384   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277387   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277391   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277395   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277398   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277402   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277411   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277414   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277418   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277421   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277425   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277428   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277432   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277435   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277438   pkcs11_private_mode = 00000000
2022-04-03 21:59:49 us=277442   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277445   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277461   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277469   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277473   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277476   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277479   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277483   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277486   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277490   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277493   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277496   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277500   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277503   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277506   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277510   pkcs11_cert_private = DISABLED
2022-04-03 21:59:49 us=277513   pkcs11_pin_cache_period = -1
2022-04-03 21:59:49 us=277517   pkcs11_id = '[UNDEF]'
2022-04-03 21:59:49 us=277520   pkcs11_id_management = DISABLED
2022-04-03 21:59:49 us=277525   server_network = 10.8.0.0
2022-04-03 21:59:49 us=277529   server_netmask = 255.255.255.0
2022-04-03 21:59:49 us=277533   server_network_ipv6 = ::
2022-04-03 21:59:49 us=277537   server_netbits_ipv6 = 0
2022-04-03 21:59:49 us=277541   server_bridge_ip = 0.0.0.0
2022-04-03 21:59:49 us=277545   server_bridge_netmask = 0.0.0.0
2022-04-03 21:59:49 us=277549   server_bridge_pool_start = 0.0.0.0
2022-04-03 21:59:49 us=277552   server_bridge_pool_end = 0.0.0.0
2022-04-03 21:59:49 us=277556   push_entry = 'redirect-gateway def1 bypass-dhcp'
2022-04-03 21:59:49 us=277560   push_entry = 'dhcp-option DNS 1.1.1.1'
2022-04-03 21:59:49 us=277563   push_entry = 'dhcp-option DNS 1.0.0.1'
2022-04-03 21:59:49 us=277567   push_entry = 'route-gateway 10.8.0.1'
2022-04-03 21:59:49 us=277570   push_entry = 'topology subnet'
2022-04-03 21:59:49 us=277574   push_entry = 'ping 10'
2022-04-03 21:59:49 us=277577   push_entry = 'ping-restart 120'
2022-04-03 21:59:49 us=277580   ifconfig_pool_defined = ENABLED
2022-04-03 21:59:49 us=277584   ifconfig_pool_start = 10.8.0.2
2022-04-03 21:59:49 us=277588   ifconfig_pool_end = 10.8.0.254
2022-04-03 21:59:49 us=277592   ifconfig_pool_netmask = 255.255.255.0
2022-04-03 21:59:49 us=277596   ifconfig_pool_persist_filename = 'ipp.txt'
2022-04-03 21:59:49 us=277599   ifconfig_pool_persist_refresh_freq = 600
2022-04-03 21:59:49 us=277603   ifconfig_ipv6_pool_defined = DISABLED
2022-04-03 21:59:49 us=277606   ifconfig_ipv6_pool_base = ::
2022-04-03 21:59:49 us=277610   ifconfig_ipv6_pool_netbits = 0
2022-04-03 21:59:49 us=277614   n_bcast_buf = 256
2022-04-03 21:59:49 us=277617   tcp_queue_limit = 64
2022-04-03 21:59:49 us=277621   real_hash_size = 256
2022-04-03 21:59:49 us=277624   virtual_hash_size = 256
2022-04-03 21:59:49 us=277628   client_connect_script = '[UNDEF]'
2022-04-03 21:59:49 us=277631   learn_address_script = '[UNDEF]'
2022-04-03 21:59:49 us=277635   client_disconnect_script = '[UNDEF]'
2022-04-03 21:59:49 us=277638   client_config_dir = '[UNDEF]'
2022-04-03 21:59:49 us=277641   ccd_exclusive = DISABLED
2022-04-03 21:59:49 us=277645   tmp_dir = '/tmp'
2022-04-03 21:59:49 us=277648   push_ifconfig_defined = DISABLED
2022-04-03 21:59:49 us=277652   push_ifconfig_local = 0.0.0.0
2022-04-03 21:59:49 us=277656   push_ifconfig_remote_netmask = 0.0.0.0
2022-04-03 21:59:49 us=277663   push_ifconfig_ipv6_defined = DISABLED
2022-04-03 21:59:49 us=277670   push_ifconfig_ipv6_local = ::/0
2022-04-03 21:59:49 us=277674   push_ifconfig_ipv6_remote = ::
2022-04-03 21:59:49 us=277677   enable_c2c = DISABLED
2022-04-03 21:59:49 us=277681   duplicate_cn = DISABLED
2022-04-03 21:59:49 us=277684   cf_max = 0
2022-04-03 21:59:49 us=277687   cf_per = 0
2022-04-03 21:59:49 us=277691   max_clients = 1024
2022-04-03 21:59:49 us=277694   max_routes_per_client = 256
2022-04-03 21:59:49 us=277698   auth_user_pass_verify_script = '[UNDEF]'
2022-04-03 21:59:49 us=277701   auth_user_pass_verify_script_via_file = DISABLED
2022-04-03 21:59:49 us=277705   auth_token_generate = DISABLED
2022-04-03 21:59:49 us=277708   auth_token_lifetime = 0
2022-04-03 21:59:49 us=277712   auth_token_secret_file = '[UNDEF]'
2022-04-03 21:59:49 us=277715   port_share_host = '[UNDEF]'
2022-04-03 21:59:49 us=277718   port_share_port = '[UNDEF]'
2022-04-03 21:59:49 us=277722   vlan_tagging = DISABLED
2022-04-03 21:59:49 us=277725   vlan_accept = all
2022-04-03 21:59:49 us=277729   vlan_pvid = 1
2022-04-03 21:59:49 us=277732   client = DISABLED
2022-04-03 21:59:49 us=277736   pull = DISABLED
2022-04-03 21:59:49 us=277739   auth_user_pass_file = '[UNDEF]'
2022-04-03 21:59:49 us=277743 OpenVPN 2.5.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr  2 2022
2022-04-03 21:59:49 us=277748 library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
2022-04-03 21:59:49 us=278951 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7505
2022-04-03 21:59:49 us=297600 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
2022-04-03 21:59:49 us=338083 Diffie-Hellman initialized with 2048 bit key
2022-04-03 21:59:49 us=388234 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-03 21:59:49 us=388306 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-03 21:59:49 us=388318 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-03 21:59:49 us=388324 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-03 21:59:49 us=388335 TLS-Auth MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
2022-04-03 21:59:49 us=388595 TUN/TAP device tun0 opened
2022-04-03 21:59:49 us=388609 do_ifconfig, ipv4=1, ipv6=0
2022-04-03 21:59:49 us=388616 /sbin/ip link set dev tun0 up mtu 1500
2022-04-03 21:59:49 us=400393 /sbin/ip link set dev tun0 up
2022-04-03 21:59:49 us=401180 /sbin/ip addr add dev tun0 10.8.0.1/24
2022-04-03 21:59:49 us=408080 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2022-04-03 21:59:49 us=408102 Could not determine IPv4/IPv6 protocol. Using AF_INET
2022-04-03 21:59:49 us=408115 Socket Buffers: R=[212992->212992] S=[212992->212992]
2022-04-03 21:59:49 us=408128 UDPv4 link local (bound): [AF_INET]192.168.0.40:69
2022-04-03 21:59:49 us=408133 UDPv4 link remote: [AF_UNSPEC]
2022-04-03 21:59:49 us=408140 MULTI: multi_init called, r=256 v=256
2022-04-03 21:59:49 us=408158 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2022-04-03 21:59:49 us=456568 ifconfig_pool_read(), in='client,10.8.0.2,'
2022-04-03 21:59:49 us=456588 succeeded -> ifconfig_pool_set(hand=0)
2022-04-03 21:59:49 us=456596 IFCONFIG POOL LIST
2022-04-03 21:59:49 us=456602 client,10.8.0.2,
2022-04-03 21:59:49 us=456621 Initialization Sequence Completed
2022-04-03 22:01:01 us=245345 MULTI: multi_create_instance called
2022-04-03 22:01:01 us=245401 192.168.0.14:49906 Re-using SSL/TLS context
2022-04-03 22:01:01 us=245448 192.168.0.14:49906 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-03 22:01:01 us=245457 192.168.0.14:49906 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-03 22:01:01 us=245470 192.168.0.14:49906 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-03 22:01:01 us=245477 192.168.0.14:49906 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-03 22:01:01 us=245533 192.168.0.14:49906 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
2022-04-03 22:01:01 us=245540 192.168.0.14:49906 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2022-04-03 22:01:01 us=245561 192.168.0.14:49906 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server'
2022-04-03 22:01:01 us=245566 192.168.0.14:49906 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client'
2022-04-03 22:01:01 us=245594 192.168.0.14:49906 TLS: Initial packet from [AF_INET]192.168.0.14:49906, sid=55657fe4 4d7c914a
2022-04-03 22:01:01 us=260401 192.168.0.14:49906 VERIFY OK: depth=1, CN=ChangeMe
2022-04-03 22:01:01 us=260595 192.168.0.14:49906 VERIFY OK: depth=0, CN=client
2022-04-03 22:01:01 us=260847 192.168.0.14:49906 peer info: IV_VER=2.5.6
2022-04-03 22:01:01 us=260858 192.168.0.14:49906 peer info: IV_PLAT=win
2022-04-03 22:01:01 us=260862 192.168.0.14:49906 peer info: IV_PROTO=6
2022-04-03 22:01:01 us=260867 192.168.0.14:49906 peer info: IV_NCP=2
2022-04-03 22:01:01 us=260871 192.168.0.14:49906 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-04-03 22:01:01 us=260915 192.168.0.14:49906 peer info: IV_LZ4=1
2022-04-03 22:01:01 us=260920 192.168.0.14:49906 peer info: IV_LZ4v2=1
2022-04-03 22:01:01 us=260924 192.168.0.14:49906 peer info: IV_LZO=1
2022-04-03 22:01:01 us=260928 192.168.0.14:49906 peer info: IV_COMP_STUB=1
2022-04-03 22:01:01 us=260932 192.168.0.14:49906 peer info: IV_COMP_STUBv2=1
2022-04-03 22:01:01 us=260935 192.168.0.14:49906 peer info: IV_TCPNL=1
2022-04-03 22:01:01 us=261163 192.168.0.14:49906 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-04-03 22:01:01 us=261180 192.168.0.14:49906 [client] Peer Connection Initiated with [AF_INET]192.168.0.14:49906
2022-04-03 22:01:01 us=261191 client/192.168.0.14:49906 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2022-04-03 22:01:01 us=261209 client/192.168.0.14:49906 MULTI: Learn: 10.8.0.2 -> client/192.168.0.14:49906
2022-04-03 22:01:01 us=261214 client/192.168.0.14:49906 MULTI: primary virtual IP for client/192.168.0.14:49906: 10.8.0.2
2022-04-03 22:01:01 us=261223 client/192.168.0.14:49906 Data Channel: using negotiated cipher 'AES-256-GCM'
2022-04-03 22:01:01 us=261232 client/192.168.0.14:49906 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
2022-04-03 22:01:01 us=261273 client/192.168.0.14:49906 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-03 22:01:01 us=261279 client/192.168.0.14:49906 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-03 22:01:01 us=261296 client/192.168.0.14:49906 SENT CONTROL [client]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-04-03 22:01:01 us=609984 client/192.168.0.14:49906 MULTI: bad source address from client [::], packet dropped
2022-04-03 22:01:17 us=578703 event_wait : Interrupted system call (code=4)
2022-04-03 22:01:17 us=578739 SENT CONTROL [client]: 'RESTART' (status=1)
2022-04-03 22:01:19 us=579155 TCP/UDP: Closing socket
2022-04-03 22:01:19 us=579194 Closing TUN/TAP interface
2022-04-03 22:01:19 us=579204 /sbin/ip addr del dev tun0 10.8.0.1/24
2022-04-03 22:01:19 us=594863 SIGTERM[hard,] received, process exiting
2022-04-03 22:01:24 us=842321 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2022-04-03 22:01:24 us=842475 WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
2022-04-03 22:01:24 us=842494 Current Parameter Settings:
2022-04-03 22:01:24 us=842499   config = 'server.conf'
2022-04-03 22:01:24 us=842503   mode = 1
2022-04-03 22:01:24 us=842507   persist_config = DISABLED
2022-04-03 22:01:24 us=842510   persist_mode = 1
2022-04-03 22:01:24 us=842514   show_ciphers = DISABLED
2022-04-03 22:01:24 us=842517   show_digests = DISABLED
2022-04-03 22:01:24 us=842521   show_engines = DISABLED
2022-04-03 22:01:24 us=842524   genkey = DISABLED
2022-04-03 22:01:24 us=842528   genkey_filename = '[UNDEF]'
2022-04-03 22:01:24 us=842531   key_pass_file = '[UNDEF]'
2022-04-03 22:01:24 us=842535   show_tls_ciphers = DISABLED
2022-04-03 22:01:24 us=842538   connect_retry_max = 0
2022-04-03 22:01:24 us=842542 Connection profiles [0]:
2022-04-03 22:01:24 us=842546   proto = udp
2022-04-03 22:01:24 us=842549   local = '192.168.0.40'
2022-04-03 22:01:24 us=842553   local_port = '69'
2022-04-03 22:01:24 us=842556   remote = '[UNDEF]'
2022-04-03 22:01:24 us=842560   remote_port = '69'
2022-04-03 22:01:24 us=842563   remote_float = DISABLED
2022-04-03 22:01:24 us=842566   bind_defined = DISABLED
2022-04-03 22:01:24 us=842570   bind_local = ENABLED
2022-04-03 22:01:24 us=842573   bind_ipv6_only = DISABLED
2022-04-03 22:01:24 us=842577   connect_retry_seconds = 5
2022-04-03 22:01:24 us=842580   connect_timeout = 120
2022-04-03 22:01:24 us=842584   socks_proxy_server = '[UNDEF]'
2022-04-03 22:01:24 us=842587   socks_proxy_port = '[UNDEF]'
2022-04-03 22:01:24 us=842591   tun_mtu = 1500
2022-04-03 22:01:24 us=842594   tun_mtu_defined = ENABLED
2022-04-03 22:01:24 us=842598   link_mtu = 1500
2022-04-03 22:01:24 us=842601   link_mtu_defined = DISABLED
2022-04-03 22:01:24 us=842604   tun_mtu_extra = 0
2022-04-03 22:01:24 us=842608   tun_mtu_extra_defined = DISABLED
2022-04-03 22:01:24 us=842612   mtu_discover_type = -1
2022-04-03 22:01:24 us=842615   fragment = 0
2022-04-03 22:01:24 us=842619   mssfix = 1450
2022-04-03 22:01:24 us=842622   explicit_exit_notification = 1
2022-04-03 22:01:24 us=842625   tls_auth_file = '[UNDEF]'
2022-04-03 22:01:24 us=842629   key_direction = not set
2022-04-03 22:01:24 us=842633   tls_crypt_file = '[INLINE]'
2022-04-03 22:01:24 us=842636   tls_crypt_v2_file = '[UNDEF]'
2022-04-03 22:01:24 us=842640 Connection profiles END
2022-04-03 22:01:24 us=842643   remote_random = DISABLED
2022-04-03 22:01:24 us=842646   ipchange = '[UNDEF]'
2022-04-03 22:01:24 us=842650   dev = 'tun'
2022-04-03 22:01:24 us=842653   dev_type = '[UNDEF]'
2022-04-03 22:01:24 us=842657   dev_node = '[UNDEF]'
2022-04-03 22:01:24 us=842660   lladdr = '[UNDEF]'
2022-04-03 22:01:24 us=842664   topology = 3
2022-04-03 22:01:24 us=842667   ifconfig_local = '10.8.0.1'
2022-04-03 22:01:24 us=842670   ifconfig_remote_netmask = '255.255.255.0'
2022-04-03 22:01:24 us=842674   ifconfig_noexec = DISABLED
2022-04-03 22:01:24 us=842677   ifconfig_nowarn = DISABLED
2022-04-03 22:01:24 us=842681   ifconfig_ipv6_local = '[UNDEF]'
2022-04-03 22:01:24 us=842684   ifconfig_ipv6_netbits = 0
2022-04-03 22:01:24 us=842688   ifconfig_ipv6_remote = '[UNDEF]'
2022-04-03 22:01:24 us=842691   shaper = 0
2022-04-03 22:01:24 us=842695   mtu_test = 0
2022-04-03 22:01:24 us=842698   mlock = DISABLED
2022-04-03 22:01:24 us=842701   keepalive_ping = 10
2022-04-03 22:01:24 us=842705   keepalive_timeout = 120
2022-04-03 22:01:24 us=842708   inactivity_timeout = 0
2022-04-03 22:01:24 us=842712   inactivity_minimum_bytes = 0
2022-04-03 22:01:24 us=842715   ping_send_timeout = 10
2022-04-03 22:01:24 us=842719   ping_rec_timeout = 240
2022-04-03 22:01:24 us=842722   ping_rec_timeout_action = 2
2022-04-03 22:01:24 us=842726   ping_timer_remote = DISABLED
2022-04-03 22:01:24 us=842729   remap_sigusr1 = 0
2022-04-03 22:01:24 us=842733   persist_tun = ENABLED
2022-04-03 22:01:24 us=842746   persist_local_ip = DISABLED
2022-04-03 22:01:24 us=842750   persist_remote_ip = DISABLED
2022-04-03 22:01:24 us=842754   persist_key = ENABLED
2022-04-03 22:01:24 us=843542   passtos = DISABLED
2022-04-03 22:01:24 us=843551   resolve_retry_seconds = 1000000000
2022-04-03 22:01:24 us=843554   resolve_in_advance = DISABLED
2022-04-03 22:01:24 us=843558   username = '[UNDEF]'
2022-04-03 22:01:24 us=843561   groupname = '[UNDEF]'
2022-04-03 22:01:24 us=843565   chroot_dir = '[UNDEF]'
2022-04-03 22:01:24 us=843568   cd_dir = '[UNDEF]'
2022-04-03 22:01:24 us=843572   writepid = '[UNDEF]'
2022-04-03 22:01:24 us=843575   up_script = '[UNDEF]'
2022-04-03 22:01:24 us=843578   down_script = '[UNDEF]'
2022-04-03 22:01:24 us=843582   down_pre = DISABLED
2022-04-03 22:01:24 us=843585   up_restart = DISABLED
2022-04-03 22:01:24 us=843588   up_delay = DISABLED
2022-04-03 22:01:24 us=843592   daemon = DISABLED
2022-04-03 22:01:24 us=843595   inetd = 0
2022-04-03 22:01:24 us=843599   log = ENABLED
2022-04-03 22:01:24 us=843602   suppress_timestamps = DISABLED
2022-04-03 22:01:24 us=843605   machine_readable_output = DISABLED
2022-04-03 22:01:24 us=843609   nice = 0
2022-04-03 22:01:24 us=843612   verbosity = 4
2022-04-03 22:01:24 us=843616   mute = 0
2022-04-03 22:01:24 us=843619   gremlin = 0
2022-04-03 22:01:24 us=843623   status_file = '/run/openvpn-server/status-server.log'
2022-04-03 22:01:24 us=843627   status_file_version = 2
2022-04-03 22:01:24 us=843630   status_file_update_freq = 60
2022-04-03 22:01:24 us=843633   occ = ENABLED
2022-04-03 22:01:24 us=843637   rcvbuf = 0
2022-04-03 22:01:24 us=843640   sndbuf = 0
2022-04-03 22:01:24 us=843644   mark = 0
2022-04-03 22:01:24 us=843647   sockflags = 0
2022-04-03 22:01:24 us=843651   fast_io = DISABLED
2022-04-03 22:01:24 us=843654   comp.alg = 0
2022-04-03 22:01:24 us=843657   comp.flags = 0
2022-04-03 22:01:24 us=843661   route_script = '[UNDEF]'
2022-04-03 22:01:24 us=843665   route_default_gateway = '10.8.0.2'
2022-04-03 22:01:24 us=843669   route_default_metric = 0
2022-04-03 22:01:24 us=843672   route_noexec = DISABLED
2022-04-03 22:01:24 us=843676   route_delay = 0
2022-04-03 22:01:24 us=843680   route_delay_window = 30
2022-04-03 22:01:24 us=843683   route_delay_defined = DISABLED
2022-04-03 22:01:24 us=843687   route_nopull = DISABLED
2022-04-03 22:01:24 us=843690   route_gateway_via_dhcp = DISABLED
2022-04-03 22:01:24 us=843693   allow_pull_fqdn = DISABLED
2022-04-03 22:01:24 us=843697   management_addr = 'localhost'
2022-04-03 22:01:24 us=843701   management_port = '7505'
2022-04-03 22:01:24 us=843704   management_user_pass = '[UNDEF]'
2022-04-03 22:01:24 us=843708   management_log_history_cache = 250
2022-04-03 22:01:24 us=843712   management_echo_buffer_size = 100
2022-04-03 22:01:24 us=843715   management_write_peer_info_file = '[UNDEF]'
2022-04-03 22:01:24 us=843719   management_client_user = '[UNDEF]'
2022-04-03 22:01:24 us=843722   management_client_group = '[UNDEF]'
2022-04-03 22:01:24 us=843726   management_flags = 0
2022-04-03 22:01:24 us=843729   shared_secret_file = '[UNDEF]'
2022-04-03 22:01:24 us=843733   key_direction = not set
2022-04-03 22:01:24 us=843736   ciphername = 'BF-CBC'
2022-04-03 22:01:24 us=843740   ncp_enabled = ENABLED
2022-04-03 22:01:24 us=843744   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
2022-04-03 22:01:24 us=843747   authname = 'SHA1'
2022-04-03 22:01:24 us=843751   prng_hash = 'SHA1'
2022-04-03 22:01:24 us=843754   prng_nonce_secret_len = 16
2022-04-03 22:01:24 us=843799   keysize = 0
2022-04-03 22:01:24 us=843807   engine = DISABLED
2022-04-03 22:01:24 us=843810   replay = ENABLED
2022-04-03 22:01:24 us=843814   mute_replay_warnings = DISABLED
2022-04-03 22:01:24 us=843818   replay_window = 64
2022-04-03 22:01:24 us=843821   replay_time = 15
2022-04-03 22:01:24 us=843825   packet_id_file = '[UNDEF]'
2022-04-03 22:01:24 us=843828   test_crypto = DISABLED
2022-04-03 22:01:24 us=843832   tls_server = ENABLED
2022-04-03 22:01:24 us=843835   tls_client = DISABLED
2022-04-03 22:01:24 us=843839   ca_file = 'ca.crt'
2022-04-03 22:01:24 us=843847   ca_path = '[UNDEF]'
2022-04-03 22:01:24 us=843851   dh_file = 'dh.pem'
2022-04-03 22:01:24 us=843855   cert_file = 'server.crt'
2022-04-03 22:01:24 us=843859   extra_certs_file = '[UNDEF]'
2022-04-03 22:01:24 us=843862   priv_key_file = 'server.key'
2022-04-03 22:01:24 us=843866   pkcs12_file = '[UNDEF]'
2022-04-03 22:01:24 us=843869   cipher_list = '[UNDEF]'
2022-04-03 22:01:24 us=843873   cipher_list_tls13 = '[UNDEF]'
2022-04-03 22:01:24 us=843876   tls_cert_profile = '[UNDEF]'
2022-04-03 22:01:24 us=843880   tls_verify = '[UNDEF]'
2022-04-03 22:01:24 us=843883   tls_export_cert = '[UNDEF]'
2022-04-03 22:01:24 us=843887   verify_x509_type = 0
2022-04-03 22:01:24 us=843891   verify_x509_name = '[UNDEF]'
2022-04-03 22:01:24 us=843894   crl_file = '[UNDEF]'
2022-04-03 22:01:24 us=843898   ns_cert_type = 0
2022-04-03 22:01:24 us=843901   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843905   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843908   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843912   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843915   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843919   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843922   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843926   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843929   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843933   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843936   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843940   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843943   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843947   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843950   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843954   remote_cert_ku[i] = 0
2022-04-03 22:01:24 us=843958   remote_cert_eku = '[UNDEF]'
2022-04-03 22:01:24 us=843961   ssl_flags = 0
2022-04-03 22:01:24 us=843965   tls_timeout = 2
2022-04-03 22:01:24 us=843968   renegotiate_bytes = -1
2022-04-03 22:01:24 us=843972   renegotiate_packets = 0
2022-04-03 22:01:24 us=843976   renegotiate_seconds = 3600
2022-04-03 22:01:24 us=843979   handshake_window = 60
2022-04-03 22:01:24 us=843983   transition_window = 3600
2022-04-03 22:01:24 us=843986   single_session = DISABLED
2022-04-03 22:01:24 us=843990   push_peer_info = DISABLED
2022-04-03 22:01:24 us=843993   tls_exit = DISABLED
2022-04-03 22:01:24 us=843997   tls_crypt_v2_metadata = '[UNDEF]'
2022-04-03 22:01:24 us=844000   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844004   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844008   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844011   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844015   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844018   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844022   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844025   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844029   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844032   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844036   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844039   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844043   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844046   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844049   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844053   pkcs11_protected_authentication = DISABLED
2022-04-03 22:01:24 us=844057   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844060   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844064   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844067   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844071   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844074   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844078   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844081   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844088   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844092   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844840   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844851   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844855   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844858   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844862   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844865   pkcs11_private_mode = 00000000
2022-04-03 22:01:24 us=844869   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844872   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844876   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844879   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844883   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844886   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844890   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844893   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844897   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844900   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844904   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844907   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844911   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844914   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844918   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844921   pkcs11_cert_private = DISABLED
2022-04-03 22:01:24 us=844925   pkcs11_pin_cache_period = -1
2022-04-03 22:01:24 us=844929   pkcs11_id = '[UNDEF]'
2022-04-03 22:01:24 us=844932   pkcs11_id_management = DISABLED
2022-04-03 22:01:24 us=844937   server_network = 10.8.0.0
2022-04-03 22:01:24 us=844941   server_netmask = 255.255.255.0
2022-04-03 22:01:24 us=844945   server_network_ipv6 = ::
2022-04-03 22:01:24 us=844949   server_netbits_ipv6 = 0
2022-04-03 22:01:24 us=844953   server_bridge_ip = 0.0.0.0
2022-04-03 22:01:24 us=844957   server_bridge_netmask = 0.0.0.0
2022-04-03 22:01:24 us=844961   server_bridge_pool_start = 0.0.0.0
2022-04-03 22:01:24 us=844965   server_bridge_pool_end = 0.0.0.0
2022-04-03 22:01:24 us=844969   push_entry = 'redirect-gateway def1 bypass-dhcp'
2022-04-03 22:01:24 us=844972   push_entry = 'dhcp-option DNS 1.1.1.1'
2022-04-03 22:01:24 us=844976   push_entry = 'dhcp-option DNS 1.0.0.1'
2022-04-03 22:01:24 us=844979   push_entry = 'route-gateway 10.8.0.1'
2022-04-03 22:01:24 us=844983   push_entry = 'topology subnet'
2022-04-03 22:01:24 us=844986   push_entry = 'ping 10'
2022-04-03 22:01:24 us=844990   push_entry = 'ping-restart 120'
2022-04-03 22:01:24 us=844993   ifconfig_pool_defined = ENABLED
2022-04-03 22:01:24 us=844997   ifconfig_pool_start = 10.8.0.2
2022-04-03 22:01:24 us=845001   ifconfig_pool_end = 10.8.0.254
2022-04-03 22:01:24 us=845005   ifconfig_pool_netmask = 255.255.255.0
2022-04-03 22:01:24 us=845009   ifconfig_pool_persist_filename = 'ipp.txt'
2022-04-03 22:01:24 us=845012   ifconfig_pool_persist_refresh_freq = 600
2022-04-03 22:01:24 us=845016   ifconfig_ipv6_pool_defined = DISABLED
2022-04-03 22:01:24 us=845020   ifconfig_ipv6_pool_base = ::
2022-04-03 22:01:24 us=845023   ifconfig_ipv6_pool_netbits = 0
2022-04-03 22:01:24 us=845027   n_bcast_buf = 256
2022-04-03 22:01:24 us=845031   tcp_queue_limit = 64
2022-04-03 22:01:24 us=845034   real_hash_size = 256
2022-04-03 22:01:24 us=845038   virtual_hash_size = 256
2022-04-03 22:01:24 us=845041   client_connect_script = '[UNDEF]'
2022-04-03 22:01:24 us=845045   learn_address_script = '[UNDEF]'
2022-04-03 22:01:24 us=845048   client_disconnect_script = '[UNDEF]'
2022-04-03 22:01:24 us=845051   client_config_dir = '[UNDEF]'
2022-04-03 22:01:24 us=845055   ccd_exclusive = DISABLED
2022-04-03 22:01:24 us=845058   tmp_dir = '/tmp'
2022-04-03 22:01:24 us=845062   push_ifconfig_defined = DISABLED
2022-04-03 22:01:24 us=845066   push_ifconfig_local = 0.0.0.0
2022-04-03 22:01:24 us=845070   push_ifconfig_remote_netmask = 0.0.0.0
2022-04-03 22:01:24 us=845073   push_ifconfig_ipv6_defined = DISABLED
2022-04-03 22:01:24 us=845085   push_ifconfig_ipv6_local = ::/0
2022-04-03 22:01:24 us=845089   push_ifconfig_ipv6_remote = ::
2022-04-03 22:01:24 us=845092   enable_c2c = DISABLED
2022-04-03 22:01:24 us=845096   duplicate_cn = DISABLED
2022-04-03 22:01:24 us=845100   cf_max = 0
2022-04-03 22:01:24 us=845103   cf_per = 0
2022-04-03 22:01:24 us=845107   max_clients = 1024
2022-04-03 22:01:24 us=845110   max_routes_per_client = 256
2022-04-03 22:01:24 us=845114   auth_user_pass_verify_script = '[UNDEF]'
2022-04-03 22:01:24 us=845117   auth_user_pass_verify_script_via_file = DISABLED
2022-04-03 22:01:24 us=845121   auth_token_generate = DISABLED
2022-04-03 22:01:24 us=845124   auth_token_lifetime = 0
2022-04-03 22:01:24 us=845127   auth_token_secret_file = '[UNDEF]'
2022-04-03 22:01:24 us=845131   port_share_host = '[UNDEF]'
2022-04-03 22:01:24 us=845134   port_share_port = '[UNDEF]'
2022-04-03 22:01:24 us=845138   vlan_tagging = DISABLED
2022-04-03 22:01:24 us=845141   vlan_accept = all
2022-04-03 22:01:24 us=845145   vlan_pvid = 1
2022-04-03 22:01:24 us=845148   client = DISABLED
2022-04-03 22:01:24 us=845152   pull = DISABLED
2022-04-03 22:01:24 us=845155   auth_user_pass_file = '[UNDEF]'
2022-04-03 22:01:24 us=845160 OpenVPN 2.5.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr  2 2022
2022-04-03 22:01:24 us=845164 library versions: OpenSSL 1.1.1k  25 Mar 2021, LZO 2.10
2022-04-03 22:01:24 us=845823 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7505
2022-04-03 22:01:24 us=845975 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
2022-04-03 22:01:24 us=846251 Diffie-Hellman initialized with 2048 bit key
2022-04-03 22:01:24 us=846523 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-03 22:01:24 us=846541 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-03 22:01:24 us=846547 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-03 22:01:24 us=846553 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-03 22:01:24 us=846561 TLS-Auth MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
2022-04-03 22:01:24 us=852523 TUN/TAP device tun0 opened
2022-04-03 22:01:24 us=852547 do_ifconfig, ipv4=1, ipv6=0
2022-04-03 22:01:24 us=852557 /sbin/ip link set dev tun0 up mtu 1500
2022-04-03 22:01:24 us=865737 /sbin/ip link set dev tun0 up
2022-04-03 22:01:24 us=866559 /sbin/ip addr add dev tun0 10.8.0.1/24
2022-04-03 22:01:24 us=869039 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2022-04-03 22:01:24 us=869057 Could not determine IPv4/IPv6 protocol. Using AF_INET
2022-04-03 22:01:24 us=869068 Socket Buffers: R=[212992->212992] S=[212992->212992]
2022-04-03 22:01:24 us=869079 UDPv4 link local (bound): [AF_INET]192.168.0.40:69
2022-04-03 22:01:24 us=869117 UDPv4 link remote: [AF_UNSPEC]
2022-04-03 22:01:24 us=869126 MULTI: multi_init called, r=256 v=256
2022-04-03 22:01:24 us=869145 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2022-04-03 22:01:24 us=869182 ifconfig_pool_read(), in='client,10.8.0.2,'
2022-04-03 22:01:24 us=869189 succeeded -> ifconfig_pool_set(hand=0)
2022-04-03 22:01:24 us=869195 IFCONFIG POOL LIST
2022-04-03 22:01:24 us=869200 client,10.8.0.2,
2022-04-03 22:01:24 us=869216 Initialization Sequence Completed
2022-04-03 22:01:29 us=339160 MULTI: multi_create_instance called
2022-04-03 22:01:29 us=339213 192.168.0.14:60859 Re-using SSL/TLS context
2022-04-03 22:01:29 us=339262 192.168.0.14:60859 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-03 22:01:29 us=339270 192.168.0.14:60859 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-03 22:01:29 us=339276 192.168.0.14:60859 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-04-03 22:01:29 us=339290 192.168.0.14:60859 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-04-03 22:01:29 us=339348 192.168.0.14:60859 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
2022-04-03 22:01:29 us=339355 192.168.0.14:60859 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2022-04-03 22:01:29 us=339377 192.168.0.14:60859 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server'
2022-04-03 22:01:29 us=339382 192.168.0.14:60859 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client'
2022-04-03 22:01:29 us=339395 192.168.0.14:60859 TLS: Initial packet from [AF_INET]192.168.0.14:60859, sid=7ce87443 93be7c29
2022-04-03 22:01:29 us=382400 192.168.0.14:60859 VERIFY OK: depth=1, CN=ChangeMe
2022-04-03 22:01:29 us=382606 192.168.0.14:60859 VERIFY OK: depth=0, CN=client
2022-04-03 22:01:29 us=382846 192.168.0.14:60859 peer info: IV_VER=2.5.6
2022-04-03 22:01:29 us=382900 192.168.0.14:60859 peer info: IV_PLAT=win
2022-04-03 22:01:29 us=382910 192.168.0.14:60859 peer info: IV_PROTO=6
2022-04-03 22:01:29 us=382914 192.168.0.14:60859 peer info: IV_NCP=2
2022-04-03 22:01:29 us=382919 192.168.0.14:60859 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-04-03 22:01:29 us=382923 192.168.0.14:60859 peer info: IV_LZ4=1
2022-04-03 22:01:29 us=382927 192.168.0.14:60859 peer info: IV_LZ4v2=1
2022-04-03 22:01:29 us=382931 192.168.0.14:60859 peer info: IV_LZO=1
2022-04-03 22:01:29 us=382936 192.168.0.14:60859 peer info: IV_COMP_STUB=1
2022-04-03 22:01:29 us=382940 192.168.0.14:60859 peer info: IV_COMP_STUBv2=1
2022-04-03 22:01:29 us=382944 192.168.0.14:60859 peer info: IV_TCPNL=1
2022-04-03 22:01:29 us=388189 192.168.0.14:60859 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-04-03 22:01:29 us=388221 192.168.0.14:60859 [client] Peer Connection Initiated with [AF_INET]192.168.0.14:60859
2022-04-03 22:01:29 us=388232 client/192.168.0.14:60859 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2022-04-03 22:01:29 us=388251 client/192.168.0.14:60859 MULTI: Learn: 10.8.0.2 -> client/192.168.0.14:60859
2022-04-03 22:01:29 us=388256 client/192.168.0.14:60859 MULTI: primary virtual IP for client/192.168.0.14:60859: 10.8.0.2
2022-04-03 22:01:29 us=388264 client/192.168.0.14:60859 Data Channel: using negotiated cipher 'AES-256-GCM'
2022-04-03 22:01:29 us=388274 client/192.168.0.14:60859 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
2022-04-03 22:01:29 us=388318 client/192.168.0.14:60859 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-03 22:01:29 us=388324 client/192.168.0.14:60859 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-04-03 22:01:29 us=388343 client/192.168.0.14:60859 SENT CONTROL [client]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
It looks like it actually does start a second time!

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

Post by TinCanTech » Sun Apr 03, 2022 10:05 pm

You have not got the hang of this debugging yet .. all that log shows is your server functioning normally.

Letalis
OpenVPN User
Posts: 47
Joined: Mon Sep 14, 2020 11:46 am

Re: Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

Post by Letalis » Mon Apr 04, 2022 9:35 am

Really? I assumed seeing the server give that cipher warning and start listing all its server options again was it beginning starting up? Does two separate "Initialization Sequence Completed" lines not suggest the server starting up more than once?

Keep in mind I am deleting the log before restarting the service and trying to connect, so this is not the result of me just restarting OpenVPN myself and forgetting its appending. The log you see is the result of me deleting the log, restarting the service, and trying to connect with one client until it is interrupted and tries reconnecting, and then copying the log. Is it normal for a server log to show multiple "Initialization Sequence Completed" logs in one session?

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

Post by TinCanTech » Mon Apr 04, 2022 1:40 pm

Letalis wrote:
Mon Apr 04, 2022 9:35 am
Keep in mind I am deleting the log before restarting the service and trying to connect, so this is not the result of me just restarting OpenVPN myself and forgetting its appending. The log you see is the result of me deleting the log, restarting the service, and trying to connect with one client until it is interrupted and tries reconnecting, and then copying the log
What ?


This is the opposite of what I asked you to do ..

If you want further help from me then I am available for hire.

Letalis
OpenVPN User
Posts: 47
Joined: Mon Sep 14, 2020 11:46 am

Re: Upgrading OpenVPN 2.4.7 to 2.5.6 results in frequent disconnects

Post by Letalis » Mon Apr 04, 2022 1:51 pm

Maybe I hadn't best explained what I was doing. You told me to add log-append because you suspected the server is crashing and that's what I did. I only deleted the log before I started testing so I wasn't undoing the effects of the appending, and it appeared to be showing the server starting twice.

Anyhow this did actually lead me to find the cause of the problem.
The server was crashing and it turned out it was using shared libraries from another version of OpenVPN. (I should really have been using the debs from the official software repos!)

Quite an anticlimactic solution, but all sorted now. Thanks for all your assistance! :D

Post Reply