I then tried the Linux client with the client configuration file in the ccd directory on the server, and it works perfectly. I assigns the given IP address that I set up in the client configuration file as expected. My question is, why does it work with Linux, but not for windows when I am setting a static IP address. I have included my Linux Openvpn server configuration file and both the Windows and Linux Openvpn client configurations files. I have also attached the client configuration file that goes in the ccd directory.
I also provided both the client and server logs for three test cases. The first test case is when windows fails to connect. It times out with a TUN/TAP timeout. The second test case was when windows succeeds. In this case, I removed the client configuration from the ccd directory. The third case is when the Linux client succeeds, and the client configuration is in the ccd directory.
local 10.1.10.2
port 1194
proto udp
dev tap0
ca /etc/openvpn/ca.crt
cert /etc/openvpn/server.crt
key /etc/openvpn/server.key
dh /etc/openvpn/dh1024.pem
ifconfig-pool-persist ipp.txt
server-bridge 10.1.10.1 255.255.255.0 10.1.10.105 10.1.10.115
client-to-client
keepalive 10 120
tls-auth /etc/openvpn/ta.key 0
cipher AES-256-CBC
comp-lzo
max-clients 10
user nobody
group nogroup
persist-key
persist-tun
status /etc/openvpn/openvpn-status.log
log-append /etc/openvpn/openvpn_server.log
verb 3
client-config-dir /etc/openvpn/ccd
client
dev tap
ifconfig 10.1.10.1 255.255.255.0
proto udp
remote 77.77.77.77 1194
resolv-retry infinite
nobind
persist-key
persist-tun
ca "c:\\Users\\tracy\\OpenVPN\\config\\client\\ca.crt"
cert "c:\\Users\\tracy\\OpenVPN\\config\\client\\client7.crt"
key "c:\\Users\\tracy\\OpenVPN\\config\\client\\client7.key"
remote-cert-tls server
tls-auth "c:\\Users\\tracy\\OpenVPN\\config\\client\\ta.key" 1
cipher AES-256-CBC
keysize 256
comp-lzo
tun-mtu 1532
auth-nocache
verb 3
client
dev tap0
proto udp
remote 77.77.77.77 1194
resolv-retry infinite
nobind
persist-key
persist-tun
log-append openvpn_client.log
ca /etc/openvpn/ca.crt
cert /etc/openvpn/client7.crt
key /etc/openvpn/client7.key
ns-cert-type server
tls-auth /etc/openvpn/ta.key 1
cipher AES-256-CBC
keysize 256
comp-lzo
link-mtu 1590
verb 3
ifconfig-push 10.1.10.200 10.1.10.2
Thu Jun 07 16:17:54 2018 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Thu Jun 07 16:17:54 2018 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Thu Jun 07 16:17:54 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Thu Jun 07 16:17:54 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Enter Management Password:
Thu Jun 07 16:17:54 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Thu Jun 07 16:17:54 2018 Need hold release from management interface, waiting...
Thu Jun 07 16:17:55 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Thu Jun 07 16:17:55 2018 MANAGEMENT: CMD 'state on'
Thu Jun 07 16:17:55 2018 MANAGEMENT: CMD 'log all on'
Thu Jun 07 16:17:55 2018 MANAGEMENT: CMD 'echo all on'
Thu Jun 07 16:17:55 2018 MANAGEMENT: CMD 'hold off'
Thu Jun 07 16:17:55 2018 MANAGEMENT: CMD 'hold release'
Thu Jun 07 16:17:55 2018 WARNING: using --pull/--client and --ifconfig together is probably not what you want
Thu Jun 07 16:17:55 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 07 16:17:55 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 07 16:17:55 2018 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1532)
Thu Jun 07 16:17:55 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]77.77.77.77:1194
Thu Jun 07 16:17:55 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Thu Jun 07 16:17:55 2018 UDP link local: (not bound)
Thu Jun 07 16:17:55 2018 UDP link remote: [AF_INET]77.77.77.77:1194
Thu Jun 07 16:17:55 2018 MANAGEMENT: >STATE:1528413475,WAIT,,,,,,
Thu Jun 07 16:17:55 2018 MANAGEMENT: >STATE:1528413475,AUTH,,,,,,
Thu Jun 07 16:17:55 2018 TLS: Initial packet from [AF_INET]77.77.77.77:1194, sid=6952f734 6a007cda
Thu Jun 07 16:17:56 2018 VERIFY OK: depth=1, C=US, ST=UT, L=Salt Lake, O=xxxxxxx, OU=stiserver1, CN=stiserver1, name=stiserver1, emailAddress=xxxxxxxxxx
Thu Jun 07 16:17:56 2018 VERIFY KU OK
Thu Jun 07 16:17:56 2018 Validating certificate extended key usage
Thu Jun 07 16:17:56 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Jun 07 16:17:56 2018 VERIFY EKU OK
Thu Jun 07 16:17:56 2018 VERIFY OK: depth=0, C=US, ST=UT, L=Salt Lake, O=xxxxxxx, OU=stiserver1, CN=server, name=stiserver1, emailAddress=xxxxxxxxxx
Thu Jun 07 16:17:56 2018 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1622', remote='link-mtu 1590'
Thu Jun 07 16:17:56 2018 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1564', remote='tun-mtu 1532'
Thu Jun 07 16:17:56 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jun 07 16:17:56 2018 [server] Peer Connection Initiated with [AF_INET]77.77.77.77:1194
Thu Jun 07 16:17:57 2018 MANAGEMENT: >STATE:1528413477,GET_CONFIG,,,,,,
Thu Jun 07 16:17:57 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu Jun 07 16:17:57 2018 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.1.10.1,ping 10,ping-restart 120,ifconfig 10.1.10.200 10.1.10.2'
Thu Jun 07 16:17:57 2018 OPTIONS IMPORT: timers and/or timeouts modified
Thu Jun 07 16:17:57 2018 OPTIONS IMPORT: --ifconfig/up options modified
Thu Jun 07 16:17:57 2018 OPTIONS IMPORT: route-related options modified
Thu Jun 07 16:17:57 2018 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 07 16:17:57 2018 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 07 16:17:57 2018 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 07 16:17:57 2018 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 07 16:17:57 2018 WARNING: Since you are using --dev tap, the second argument to --ifconfig must be a netmask, for example something like 255.255.255.0. (silence this warning with --ifconfig-nowarn)
Thu Jun 07 16:17:57 2018 interactive service msg_channel=752
Thu Jun 07 16:17:57 2018 open_tun
Thu Jun 07 16:17:57 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{CF32B125-8AC7-4053-B4FC-0231B5B02A7D}.tap
Thu Jun 07 16:17:57 2018 TAP-Windows Driver Version 9.21
Thu Jun 07 16:17:57 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.10.200/10.1.10.2 on interface {CF32B125-8AC7-4053-B4FC-0231B5B02A7D} [DHCP-serv: 10.1.10.0, lease-time: 31536000]
Thu Jun 07 16:17:57 2018 Successful ARP Flush on interface [18] {CF32B125-8AC7-4053-B4FC-0231B5B02A7D}
Thu Jun 07 16:17:57 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Jun 07 16:17:57 2018 MANAGEMENT: >STATE:1528413477,ASSIGN_IP,,10.1.10.200,,,,
Thu Jun 07 16:18:02 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:02 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:07 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:07 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:08 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:08 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:09 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:09 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:10 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:10 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:11 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:11 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:12 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:12 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:13 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:13 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:14 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:14 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:15 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:15 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:16 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:16 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:17 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:17 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:18 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:18 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:19 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:19 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:20 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:20 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:21 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:21 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:22 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:22 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:23 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:23 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:24 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:24 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:25 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:25 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:26 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:26 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:27 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:27 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:28 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:28 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:29 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:29 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:30 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:30 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:31 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
Thu Jun 07 16:18:31 2018 Route: Waiting for TUN/TAP interface to come up...
Thu Jun 07 16:18:32 2018 TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
SYSTEM ROUTING TABLE
0.0.0.0 0.0.0.0 192.168.43.1 p=0 i=2 t=4 pr=3 a=2000 h=0 m=55/0/0/0/0
127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=301384 h=0 m=331/0/0/0/0
127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=301384 h=0 m=331/0/0/0/0
127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=301384 h=0 m=331/0/0/0/0
192.168.43.0 255.255.255.0 192.168.43.192 p=0 i=2 t=3 pr=2 a=2000 h=0 m=311/0/0/0/0
192.168.43.192 255.255.255.255 192.168.43.192 p=0 i=2 t=3 pr=2 a=2000 h=0 m=311/0/0/0/0
192.168.43.255 255.255.255.255 192.168.43.192 p=0 i=2 t=3 pr=2 a=2000 h=0 m=311/0/0/0/0
192.168.56.0 255.255.255.0 192.168.56.1 p=0 i=16 t=3 pr=2 a=301379 h=0 m=281/0/0/0/0
192.168.56.1 255.255.255.255 192.168.56.1 p=0 i=16 t=3 pr=2 a=301379 h=0 m=281/0/0/0/0
192.168.56.255 255.255.255.255 192.168.56.1 p=0 i=16 t=3 pr=2 a=301379 h=0 m=281/0/0/0/0
224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=301384 h=0 m=331/0/0/0/0
224.0.0.0 240.0.0.0 192.168.56.1 p=0 i=16 t=3 pr=2 a=301382 h=0 m=281/0/0/0/0
224.0.0.0 240.0.0.0 192.168.43.192 p=0 i=2 t=3 pr=2 a=301365 h=0 m=311/0/0/0/0
224.0.0.0 240.0.0.0 0.0.0.0 p=0 i=18 t=3 pr=2 a=17418 h=0 m=291/0/0/0/0
255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=301384 h=0 m=331/0/0/0/0
255.255.255.255 255.255.255.255 192.168.56.1 p=0 i=16 t=3 pr=2 a=301382 h=0 m=281/0/0/0/0
255.255.255.255 255.255.255.255 192.168.43.192 p=0 i=2 t=3 pr=2 a=301365 h=0 m=311/0/0/0/0
255.255.255.255 255.255.255.255 0.0.0.0 p=0 i=18 t=3 pr=2 a=17418 h=0 m=291/0/0/0/0
SYSTEM ADAPTER LIST
Killer e2400 Gigabit Ethernet Controller
Index = 24
GUID = {FC2BBEC5-8E14-45EB-81AE-B5AE332B58FD}
IP = 0.0.0.0/0.0.0.0
MAC = dd:dd:dd:dd:dd:dd
GATEWAY = 10.1.10.1/255.255.255.255
DHCP SERV =
DHCP LEASE OBTAINED = Thu Jun 07 16:18:32 2018
DHCP LEASE EXPIRES = Thu Jun 07 16:18:32 2018
DNS SERV =
TAP-Windows Adapter V9
Index = 18
GUID = {CF32B125-8AC7-4053-B4FC-0231B5B02A7D}
IP = 0.0.0.0/0.0.0.0
MAC = bb:bb:bb:bb:bb:bb
GATEWAY = 0.0.0.0/255.255.255.255
DHCP SERV = 0.0.0.0/255.255.255.255
DHCP LEASE OBTAINED = Thu Jun 07 16:18:32 2018
DHCP LEASE EXPIRES = Thu Jun 07 16:18:32 2018
DNS SERV =
VirtualBox Host-Only Ethernet Adapter #3
Index = 16
GUID = {9B72ABAE-447D-4C0E-B9AB-D50B7576B8B6}
IP = 192.168.56.1/255.255.255.0
MAC = aa:aa:aa:aa:aa:aa
GATEWAY = 0.0.0.0/255.255.255.255
DNS SERV =
Bluetooth Device (Personal Area Network) #2
Index = 6
GUID = {20776B1A-121F-4915-9968-15454CB2F904}
IP = 0.0.0.0/0.0.0.0
MAC = cc:cc:cc:cc:cc:cc
GATEWAY = 0.0.0.0/255.255.255.255
DHCP SERV =
DHCP LEASE OBTAINED = Thu Jun 07 16:18:32 2018
DHCP LEASE EXPIRES = Thu Jun 07 16:18:32 2018
DNS SERV =
Intel(R) Dual Band Wireless-AC 3165
Index = 2
GUID = {06E118C8-CF07-4B2C-BBEF-C77BF4986E03}
IP = 192.168.43.192/255.255.255.0
MAC = ff:ff:ff:ff:ff:ff
GATEWAY = 192.168.43.1/255.255.255.255
DHCP SERV = 192.168.43.1/255.255.255.255
DHCP LEASE OBTAINED = Thu Jun 07 15:50:10 2018
DHCP LEASE EXPIRES = Thu Jun 07 16:50:10 2018
DNS SERV = 192.168.43.1/255.255.255.255
Microsoft Wi-Fi Direct Virtual Adapter
Index = 23
GUID = {F7E46CEB-C121-45DE-AEF5-1C3554E6D024}
IP = 0.0.0.0/0.0.0.0
MAC = ee:ee:ee:ee:ee:ee
GATEWAY = 0.0.0.0/255.255.255.255
DHCP SERV =
DHCP LEASE OBTAINED = Thu Jun 07 16:18:32 2018
DHCP LEASE EXPIRES = Thu Jun 07 16:18:32 2018
DNS SERV =
Thu Jun 07 16:18:32 2018 Initialization Sequence Completed With Errors ( see http://openvpn.net/faq.html#dhcpclientserv )
Thu Jun 07 16:18:32 2018 MANAGEMENT: >STATE:1528413512,CONNECTED,ERROR,10.1.10.200,77.77.77.77,1194,,
Thu Jun 07 16:18:36 2018 Closing TUN/TAP interface
Thu Jun 07 16:18:36 2018 NOTE: Release of DHCP-assigned IP address lease on TAP-Windows adapter failed: The parameter is incorrect. (code=87)
Thu Jun 07 16:18:36 2018 SIGTERM[hard,] received, process exiting
Thu Jun 07 16:18:36 2018 MANAGEMENT: >STATE:1528413516,EXITING,SIGTERM,,,,,
Thu Jun 7 17:17:46 2018 OpenVPN 2.1.4 x86_64-unknown-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] built on Nov 4 2010
Thu Jun 7 17:17:46 2018 NOTE: when bridging your LAN adapter with the TAP adapter, note that the new bridge adapter will often take on its own IP address that is different from what the LAN adapter was previously set to
Thu Jun 7 17:17:46 2018 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu Jun 7 17:17:46 2018 Diffie-Hellman initialized with 1024 bit key
Thu Jun 7 17:17:46 2018 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
Thu Jun 7 17:17:46 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:17:46 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:17:46 2018 TLS-Auth MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Thu Jun 7 17:17:46 2018 Socket Buffers: R=[126976->131072] S=[126976->131072]
Thu Jun 7 17:17:46 2018 TUN/TAP device tap0 opened
Thu Jun 7 17:17:46 2018 TUN/TAP TX queue length set to 100
Thu Jun 7 17:17:46 2018 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Jun 7 17:17:46 2018 GID set to nogroup
Thu Jun 7 17:17:46 2018 UID set to nobody
Thu Jun 7 17:17:46 2018 UDPv4 link local (bound): 10.1.10.2:1194
Thu Jun 7 17:17:46 2018 UDPv4 link remote: [undef]
Thu Jun 7 17:17:46 2018 MULTI: multi_init called, r=256 v=256
Thu Jun 7 17:17:46 2018 IFCONFIG POOL: base=10.1.10.105 size=11
Thu Jun 7 17:17:46 2018 IFCONFIG POOL LIST
Thu Jun 7 17:17:46 2018 client7,10.1.10.105
Thu Jun 7 17:17:46 2018 client9,10.1.10.108
Thu Jun 7 17:17:46 2018 client2,10.1.10.112
Thu Jun 7 17:17:46 2018 Initialization Sequence Completed
Thu Jun 7 17:17:55 2018 MULTI: multi_create_instance called
Thu Jun 7 17:17:55 2018 174.208.11.157:9070 Re-using SSL/TLS context
Thu Jun 7 17:17:55 2018 174.208.11.157:9070 LZO compression initialized
Thu Jun 7 17:17:55 2018 174.208.11.157:9070 Control Channel MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Thu Jun 7 17:17:55 2018 174.208.11.157:9070 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Jun 7 17:17:55 2018 174.208.11.157:9070 Local Options hash (VER=V4): '44bd8b5e'
Thu Jun 7 17:17:55 2018 174.208.11.157:9070 Expected Remote Options hash (VER=V4): '48527533'
Thu Jun 7 17:17:55 2018 174.208.11.157:9070 TLS: Initial packet from 174.208.11.157:9070, sid=25e29502 6dbc4264
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 VERIFY OK: depth=1, /C=US/ST=UT/L=Salt_Lake/O=xxxxxxx/OU=stiserver1/CN=stiserver1/name=stiserver1/emailAddress=xxxxxxxxxx
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 VERIFY OK: depth=0, /C=US/ST=UT/L=Salt_Lake/O=xxxxxxx/OU=stiserver1/CN=client7/name=stiserver1/emailAddress=xxxxxxxxxx
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1590', remote='link-mtu 1622'
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1564'
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jun 7 17:17:56 2018 174.208.11.157:9070 [client7] Peer Connection Initiated with 174.208.11.157:9070
Thu Jun 7 17:17:56 2018 client7/174.208.11.157:9070 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/client7
Thu Jun 7 17:17:57 2018 client7/174.208.11.157:9070 PUSH: Received control message: 'PUSH_REQUEST'
Thu Jun 7 17:17:57 2018 client7/174.208.11.157:9070 SENT CONTROL [client7]: 'PUSH_REPLY,route-gateway 10.1.10.1,ping 10,ping-restart 120,ifconfig 10.1.10.200 10.1.10.2' (status=1)
Thu Jun 7 17:17:57 2018 client7/174.208.11.157:9070 MULTI: Learn: 00:ff:cf:32:b1:25 -> client7/174.208.11.157:9070
Thu Jun 7 17:22:11 2018 event_wait : Interrupted system call (code=4)
Thu Jun 7 17:22:11 2018 TCP/UDP: Closing socket
Thu Jun 7 17:22:11 2018 Closing TUN/TAP interface
Thu Jun 7 17:22:11 2018 SIGTERM[hard,] received, process exiting
Thu Jun 07 16:22:29 2018 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Thu Jun 07 16:22:29 2018 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Thu Jun 07 16:22:29 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Thu Jun 07 16:22:29 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Enter Management Password:
Thu Jun 07 16:22:29 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Thu Jun 07 16:22:29 2018 Need hold release from management interface, waiting...
Thu Jun 07 16:22:30 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Thu Jun 07 16:22:30 2018 MANAGEMENT: CMD 'state on'
Thu Jun 07 16:22:30 2018 MANAGEMENT: CMD 'log all on'
Thu Jun 07 16:22:30 2018 MANAGEMENT: CMD 'echo all on'
Thu Jun 07 16:22:30 2018 MANAGEMENT: CMD 'hold off'
Thu Jun 07 16:22:30 2018 MANAGEMENT: CMD 'hold release'
Thu Jun 07 16:22:30 2018 WARNING: using --pull/--client and --ifconfig together is probably not what you want
Thu Jun 07 16:22:30 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 07 16:22:30 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 07 16:22:30 2018 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1532)
Thu Jun 07 16:22:30 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]77.77.77.77:1194
Thu Jun 07 16:22:30 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Thu Jun 07 16:22:30 2018 UDP link local: (not bound)
Thu Jun 07 16:22:30 2018 UDP link remote: [AF_INET]77.77.77.77:1194
Thu Jun 07 16:22:30 2018 MANAGEMENT: >STATE:1528413750,WAIT,,,,,,
Thu Jun 07 16:22:30 2018 MANAGEMENT: >STATE:1528413750,AUTH,,,,,,
Thu Jun 07 16:22:30 2018 TLS: Initial packet from [AF_INET]77.77.77.77:1194, sid=95d7edae f40fea23
Thu Jun 07 16:22:31 2018 VERIFY OK: depth=1, C=US, ST=UT, L=Salt Lake, O=xxxxxxx, OU=stiserver1, CN=stiserver1, name=stiserver1, emailAddress=xxxxxxxxxx
Thu Jun 07 16:22:31 2018 VERIFY KU OK
Thu Jun 07 16:22:31 2018 Validating certificate extended key usage
Thu Jun 07 16:22:31 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Jun 07 16:22:31 2018 VERIFY EKU OK
Thu Jun 07 16:22:31 2018 VERIFY OK: depth=0, C=US, ST=UT, L=Salt Lake, O=xxxxxxx, OU=stiserver1, CN=server, name=stiserver1, emailAddress=xxxxxxxxxx
Thu Jun 07 16:22:31 2018 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1622', remote='link-mtu 1590'
Thu Jun 07 16:22:31 2018 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1564', remote='tun-mtu 1532'
Thu Jun 07 16:22:31 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jun 07 16:22:31 2018 [server] Peer Connection Initiated with [AF_INET]77.77.77.77:1194
Thu Jun 07 16:22:32 2018 MANAGEMENT: >STATE:1528413752,GET_CONFIG,,,,,,
Thu Jun 07 16:22:32 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu Jun 07 16:22:32 2018 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.1.10.1,ping 10,ping-restart 120,ifconfig 10.1.10.105 255.255.255.0'
Thu Jun 07 16:22:32 2018 OPTIONS IMPORT: timers and/or timeouts modified
Thu Jun 07 16:22:32 2018 OPTIONS IMPORT: --ifconfig/up options modified
Thu Jun 07 16:22:32 2018 OPTIONS IMPORT: route-related options modified
Thu Jun 07 16:22:32 2018 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 07 16:22:32 2018 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 07 16:22:32 2018 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 07 16:22:32 2018 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 07 16:22:32 2018 interactive service msg_channel=916
Thu Jun 07 16:22:32 2018 open_tun
Thu Jun 07 16:22:32 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{CF32B125-8AC7-4053-B4FC-0231B5B02A7D}.tap
Thu Jun 07 16:22:32 2018 TAP-Windows Driver Version 9.21
Thu Jun 07 16:22:32 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.10.105/255.255.255.0 on interface {CF32B125-8AC7-4053-B4FC-0231B5B02A7D} [DHCP-serv: 10.1.10.0, lease-time: 31536000]
Thu Jun 07 16:22:32 2018 Successful ARP Flush on interface [18] {CF32B125-8AC7-4053-B4FC-0231B5B02A7D}
Thu Jun 07 16:22:32 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Jun 07 16:22:32 2018 MANAGEMENT: >STATE:1528413752,ASSIGN_IP,,10.1.10.105,,,,
Thu Jun 07 16:22:37 2018 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
Thu Jun 07 16:22:37 2018 Initialization Sequence Completed
Thu Jun 07 16:22:37 2018 MANAGEMENT: >STATE:1528413757,CONNECTED,SUCCESS,10.1.10.105,77.77.77.77,1194,,
Thu Jun 7 17:22:16 2018 OpenVPN 2.1.4 x86_64-unknown-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] built on Nov 4 2010
Thu Jun 7 17:22:16 2018 NOTE: when bridging your LAN adapter with the TAP adapter, note that the new bridge adapter will often take on its own IP address that is different from what the LAN adapter was previously set to
Thu Jun 7 17:22:16 2018 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu Jun 7 17:22:16 2018 Diffie-Hellman initialized with 1024 bit key
Thu Jun 7 17:22:16 2018 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
Thu Jun 7 17:22:16 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:22:16 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:22:16 2018 TLS-Auth MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Thu Jun 7 17:22:16 2018 Socket Buffers: R=[126976->131072] S=[126976->131072]
Thu Jun 7 17:22:16 2018 TUN/TAP device tap0 opened
Thu Jun 7 17:22:16 2018 TUN/TAP TX queue length set to 100
Thu Jun 7 17:22:16 2018 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Jun 7 17:22:16 2018 GID set to nogroup
Thu Jun 7 17:22:16 2018 UID set to nobody
Thu Jun 7 17:22:16 2018 UDPv4 link local (bound): 10.1.10.2:1194
Thu Jun 7 17:22:16 2018 UDPv4 link remote: [undef]
Thu Jun 7 17:22:16 2018 MULTI: multi_init called, r=256 v=256
Thu Jun 7 17:22:16 2018 IFCONFIG POOL: base=10.1.10.105 size=11
Thu Jun 7 17:22:16 2018 IFCONFIG POOL LIST
Thu Jun 7 17:22:16 2018 client7,10.1.10.105
Thu Jun 7 17:22:16 2018 client9,10.1.10.108
Thu Jun 7 17:22:16 2018 client2,10.1.10.112
Thu Jun 7 17:22:16 2018 Initialization Sequence Completed
Thu Jun 7 17:22:30 2018 MULTI: multi_create_instance called
Thu Jun 7 17:22:30 2018 174.208.11.157:9061 Re-using SSL/TLS context
Thu Jun 7 17:22:30 2018 174.208.11.157:9061 LZO compression initialized
Thu Jun 7 17:22:30 2018 174.208.11.157:9061 Control Channel MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Thu Jun 7 17:22:30 2018 174.208.11.157:9061 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Jun 7 17:22:30 2018 174.208.11.157:9061 Local Options hash (VER=V4): '44bd8b5e'
Thu Jun 7 17:22:30 2018 174.208.11.157:9061 Expected Remote Options hash (VER=V4): '48527533'
Thu Jun 7 17:22:30 2018 174.208.11.157:9061 TLS: Initial packet from 174.208.11.157:9061, sid=af99a151 782c1617
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 VERIFY OK: depth=1, /C=US/ST=UT/L=Salt_Lake/O=xxxxxxx/OU=stiserver1/CN=stiserver1/name=stiserver1/emailAddress=xxxxxxxxxx
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 VERIFY OK: depth=0, /C=US/ST=UT/L=Salt_Lake/O=xxxxxxx/OU=stiserver1/CN=client7/name=stiserver1/emailAddress=xxxxxxxxxx
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1590', remote='link-mtu 1622'
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1564'
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jun 7 17:22:31 2018 174.208.11.157:9061 [client7] Peer Connection Initiated with 174.208.11.157:9061
Thu Jun 7 17:22:32 2018 client7/174.208.11.157:9061 PUSH: Received control message: 'PUSH_REQUEST'
Thu Jun 7 17:22:32 2018 client7/174.208.11.157:9061 SENT CONTROL [client7]: 'PUSH_REPLY,route-gateway 10.1.10.1,ping 10,ping-restart 120,ifconfig 10.1.10.105 255.255.255.0' (status=1)
Thu Jun 7 17:22:32 2018 client7/174.208.11.157:9061 MULTI: Learn: 00:ff:cf:32:b1:25 -> client7/174.208.11.157:9061
Thu Jun 7 17:23:04 2018 client7/174.208.11.157:9061 Replay-window backtrack occurred [1]
Thu Jun 7 17:23:33 2018 client7/174.208.11.157:9061 Replay-window backtrack occurred [4]
Thu Jun 7 17:29:53 2018 read UDPv4 [EHOSTUNREACH]: No route to host (code=113)
Thu Jun 7 17:30:05 2018 client7/174.208.11.157:9061 [client7] Inactivity timeout (--ping-restart), restarting
Thu Jun 7 17:30:05 2018 client7/174.208.11.157:9061 SIGUSR1[soft,ping-restart] received, client-instance restarting
Thu Jun 7 17:31:13 2018 MULTI: multi_create_instance called
Thu Jun 7 17:31:13 2018 174.208.11.157:9059 Re-using SSL/TLS context
Thu Jun 7 17:31:13 2018 174.208.11.157:9059 LZO compression initialized
Thu Jun 7 17:31:13 2018 174.208.11.157:9059 Control Channel MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Thu Jun 7 17:31:13 2018 174.208.11.157:9059 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Jun 7 17:31:13 2018 174.208.11.157:9059 Local Options hash (VER=V4): '44bd8b5e'
Thu Jun 7 17:31:13 2018 174.208.11.157:9059 Expected Remote Options hash (VER=V4): '48527533'
Thu Jun 7 17:31:13 2018 174.208.11.157:9059 TLS: Initial packet from 174.208.11.157:9059, sid=3acdb55f 9ff5eb38
Thu Jun 7 17:31:14 2018 174.208.11.157:9059 VERIFY OK: depth=1, /C=US/ST=UT/L=Salt_Lake/O=xxxxxxx/OU=stiserver1/CN=stiserver1/name=stiserver1/emailAddress=xxxxxxxxxx
Thu Jun 7 17:31:14 2018 174.208.11.157:9059 VERIFY OK: depth=0, /C=US/ST=UT/L=Salt_Lake/O=xxxxxxx/OU=stiserver1/CN=client7/name=stiserver1/emailAddress=xxxxxxxxxx
Thu Jun 7 17:31:14 2018 174.208.11.157:9059 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:31:14 2018 174.208.11.157:9059 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:31:14 2018 174.208.11.157:9059 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:31:14 2018 174.208.11.157:9059 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:31:14 2018 174.208.11.157:9059 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jun 7 17:31:14 2018 174.208.11.157:9059 [client7] Peer Connection Initiated with 174.208.11.157:9059
Thu Jun 7 17:31:16 2018 client7/174.208.11.157:9059 PUSH: Received control message: 'PUSH_REQUEST'
Thu Jun 7 17:31:16 2018 client7/174.208.11.157:9059 SENT CONTROL [client7]: 'PUSH_REPLY,route-gateway 10.1.10.1,ping 10,ping-restart 120,ifconfig 10.1.10.105 255.255.255.0' (status=1)
Thu Jun 7 17:31:16 2018 client7/174.208.11.157:9059 MULTI: Learn: 0e:77:4c:8f:95:04 -> client7/174.208.11.157:9059
Thu Jun 7 17:31:19 2018 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Thu Jun 7 17:31:28 2018 event_wait : Interrupted system call (code=4)
Thu Jun 7 17:31:28 2018 TCP/UDP: Closing socket
Thu Jun 7 17:31:28 2018 Closing TUN/TAP interface
Thu Jun 7 17:31:28 2018 SIGTERM[hard,] received, process exiting
Thu Jun 7 17:33:31 2018 OpenVPN 2.3.2 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [IPv6] built on Jun 22 2017
Thu Jun 7 17:33:31 2018 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
Thu Jun 7 17:33:31 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:33:31 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:33:31 2018 Socket Buffers: R=[212992->131072] S=[212992->131072]
Thu Jun 7 17:33:31 2018 UDPv4 link local: [undef]
Thu Jun 7 17:33:31 2018 UDPv4 link remote: [AF_INET]77.77.77.77:1194
Thu Jun 7 17:33:31 2018 TLS: Initial packet from [AF_INET]77.77.77.77:1194, sid=005fef5b 2b6dd21d
Thu Jun 7 17:33:32 2018 VERIFY OK: depth=1, C=US, ST=UT, L=Salt Lake, O=xxxxxxx, OU=stiserver1, CN=stiserver1, name=stiserver1, emailAddress=xxxxxxxxxx
Thu Jun 7 17:33:32 2018 VERIFY OK: nsCertType=SERVER
Thu Jun 7 17:33:32 2018 VERIFY OK: depth=0, C=US, ST=UT, L=Salt Lake, O=xxxxxxx, OU=stiserver1, CN=server, name=stiserver1, emailAddress=xxxxxxxxxx
Thu Jun 7 17:33:33 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:33:33 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:33:33 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:33:33 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:33:33 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jun 7 17:33:33 2018 [server] Peer Connection Initiated with [AF_INET]77.77.77.77:1194
Thu Jun 7 17:33:35 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu Jun 7 17:33:35 2018 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.1.10.1,ping 10,ping-restart 120,ifconfig 10.1.10.200 10.1.10.2'
Thu Jun 7 17:33:35 2018 OPTIONS IMPORT: timers and/or timeouts modified
Thu Jun 7 17:33:35 2018 OPTIONS IMPORT: --ifconfig/up options modified
Thu Jun 7 17:33:35 2018 OPTIONS IMPORT: route-related options modified
Thu Jun 7 17:33:35 2018 WARNING: Since you are using --dev tap, the second argument to --ifconfig must be a netmask, for example something like 255.255.255.0. (silence this warning with --ifconfig-nowarn)
Thu Jun 7 17:33:35 2018 TUN/TAP device tap0 opened
Thu Jun 7 17:33:35 2018 TUN/TAP TX queue length set to 100
Thu Jun 7 17:33:35 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Thu Jun 7 17:33:35 2018 /sbin/ip link set dev tap0 up mtu 1500
Thu Jun 7 17:33:35 2018 /sbin/ip addr add dev tap0 10.1.10.200/6 broadcast 255.255.255.253
Thu Jun 7 17:33:35 2018 Initialization Sequence Completed
Thu Jun 7 17:33:22 2018 OpenVPN 2.1.4 x86_64-unknown-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] built on Nov 4 2010
Thu Jun 7 17:33:22 2018 NOTE: when bridging your LAN adapter with the TAP adapter, note that the new bridge adapter will often take on its own IP address that is different from what the LAN adapter was previously set to
Thu Jun 7 17:33:22 2018 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu Jun 7 17:33:22 2018 Diffie-Hellman initialized with 1024 bit key
Thu Jun 7 17:33:22 2018 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
Thu Jun 7 17:33:22 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:33:22 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:33:22 2018 TLS-Auth MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Thu Jun 7 17:33:22 2018 Socket Buffers: R=[126976->131072] S=[126976->131072]
Thu Jun 7 17:33:22 2018 TUN/TAP device tap0 opened
Thu Jun 7 17:33:22 2018 TUN/TAP TX queue length set to 100
Thu Jun 7 17:33:22 2018 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Jun 7 17:33:22 2018 GID set to nogroup
Thu Jun 7 17:33:22 2018 UID set to nobody
Thu Jun 7 17:33:22 2018 UDPv4 link local (bound): 10.1.10.2:1194
Thu Jun 7 17:33:22 2018 UDPv4 link remote: [undef]
Thu Jun 7 17:33:22 2018 MULTI: multi_init called, r=256 v=256
Thu Jun 7 17:33:22 2018 IFCONFIG POOL: base=10.1.10.105 size=11
Thu Jun 7 17:33:22 2018 IFCONFIG POOL LIST
Thu Jun 7 17:33:22 2018 client7,10.1.10.105
Thu Jun 7 17:33:22 2018 client9,10.1.10.108
Thu Jun 7 17:33:22 2018 client2,10.1.10.112
Thu Jun 7 17:33:22 2018 Initialization Sequence Completed
Thu Jun 7 17:33:31 2018 MULTI: multi_create_instance called
Thu Jun 7 17:33:31 2018 174.208.11.157:9071 Re-using SSL/TLS context
Thu Jun 7 17:33:31 2018 174.208.11.157:9071 LZO compression initialized
Thu Jun 7 17:33:31 2018 174.208.11.157:9071 Control Channel MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Thu Jun 7 17:33:31 2018 174.208.11.157:9071 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Jun 7 17:33:31 2018 174.208.11.157:9071 Local Options hash (VER=V4): '44bd8b5e'
Thu Jun 7 17:33:31 2018 174.208.11.157:9071 Expected Remote Options hash (VER=V4): '48527533'
Thu Jun 7 17:33:31 2018 174.208.11.157:9071 TLS: Initial packet from 174.208.11.157:9071, sid=db154f71 5bfb521f
Thu Jun 7 17:33:32 2018 174.208.11.157:9071 VERIFY OK: depth=1, /C=US/ST=UT/L=Salt_Lake/O=xxxxxxx/OU=stiserver1/CN=stiserver1/name=stiserver1/emailAddress=xxxxxxxxxx
Thu Jun 7 17:33:32 2018 174.208.11.157:9071 VERIFY OK: depth=0, /C=US/ST=UT/L=Salt_Lake/O=xxxxxxx/OU=stiserver1/CN=client7/name=stiserver1/emailAddress=xxxxxxxxxx
Thu Jun 7 17:33:33 2018 174.208.11.157:9071 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:33:33 2018 174.208.11.157:9071 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:33:33 2018 174.208.11.157:9071 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jun 7 17:33:33 2018 174.208.11.157:9071 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jun 7 17:33:33 2018 174.208.11.157:9071 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Jun 7 17:33:33 2018 174.208.11.157:9071 [client7] Peer Connection Initiated with 174.208.11.157:9071
Thu Jun 7 17:33:33 2018 client7/174.208.11.157:9071 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/client7
Thu Jun 7 17:33:35 2018 client7/174.208.11.157:9071 PUSH: Received control message: 'PUSH_REQUEST'
Thu Jun 7 17:33:35 2018 client7/174.208.11.157:9071 SENT CONTROL [client7]: 'PUSH_REPLY,route-gateway 10.1.10.1,ping 10,ping-restart 120,ifconfig 10.1.10.200 10.1.10.2' (status=1)
Thu Jun 7 17:33:35 2018 client7/174.208.11.157:9071 MULTI: Learn: b2:42:e2:1c:93:b9 -> client7/174.208.11.157:9071