openvpn Client is not recognized by openvpn server

This forum is for admins who are looking to build or expand their OpenVPN setup.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
etantonio
OpenVPN User
Posts: 29
Joined: Tue Jul 10, 2018 1:31 pm

openvpn Client is not recognized by openvpn server

Post by etantonio » Fri Jul 13, 2018 11:54 am

Hi,
my client having IP 91.252.181.51 is not recognized by the server but in server logs I can found it,
so the problem seems to be that it is not recognized, can you help me to understand where is the problem from this log with error level = 7?
Thanks,
Antonio


root@solergycloud:~# cat /etc/openvpn/openvpn.log | grep 91.252.248.238
Fri Jul 13 13:35:24 2018 us=900847 91.252.248.238:6529 Re-using SSL/TLS context
Fri Jul 13 13:35:24 2018 us=900881 91.252.248.238:6529 LZO compression initialized
Fri Jul 13 13:35:24 2018 us=900892 91.252.248.238:6529 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:24 2018 us=900914 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900975 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900984 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901008 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901019 91.252.248.238:6529 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:24 2018 us=901025 91.252.248.238:6529 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:24 2018 us=901031 91.252.248.238:6529 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:24 2018 us=901065 91.252.248.238:6529 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:24 2018 us=901071 91.252.248.238:6529 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:24 2018 us=901083 91.252.248.238:6529 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:24 2018 us=901092 91.252.248.238:6529 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:24 2018 us=901103 91.252.248.238:6529 SENT PING
Fri Jul 13 13:35:24 2018 us=901116 91.252.248.238:6529 GET INST BY REAL: 91.252.248.238:6529 [created]
Fri Jul 13 13:35:24 2018 us=901128 91.252.248.238:6529 UDPv4 READ [14] from [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=901137 91.252.248.238:6529 TLS: Initial packet from [AF_INET]91.252.248.238:6529, sid=52ac7ce3 b1260378
Fri Jul 13 13:35:24 2018 us=901159 91.252.248.238:6529 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=998920 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998933 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:24 2018 us=998973 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998984 91.252.248.238:6529 UDPv4 READ [114] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:24 2018 us=999002 91.252.248.238:6529 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:24 2018 us=999041 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=999052 91.252.248.238:6529 UDPv4 READ [86] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:25 2018 us=16308 91.252.248.238:6529 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:25 2018 us=16455 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:25 2018 us=16524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:25 2018 us=16573 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:25 2018 us=16652 91.252.248.238:6529 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:25 2018 us=123354 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123399 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:25 2018 us=123440 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:25 2018 us=123485 91.252.248.238:6529 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:25 2018 us=123501 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123509 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:25 2018 us=123524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:25 2018 us=123546 91.252.248.238:6529 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:25 2018 us=123567 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123575 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:25 2018 us=123588 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:25 2018 us=123606 91.252.248.238:6529 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:25 2018 us=123636 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123647 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:25 2018 us=123663 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:25 2018 us=123683 91.252.248.238:6529 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:25 2018 us=219499 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219544 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:25 2018 us=219584 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:25 2018 us=219632 91.252.248.238:6529 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:25 2018 us=219655 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219668 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:25 2018 us=219691 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:25 2018 us=219740 91.252.248.238:6529 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:25 2018 us=219790 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219816 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:25 2018 us=219845 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:25 2018 us=219890 91.252.248.238:6529 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:25 2018 us=219906 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219915 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:25 2018 us=219929 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:25 2018 us=219957 91.252.248.238:6529 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:25 2018 us=321725 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=321813 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:25 2018 us=321877 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:25 2018 us=321953 91.252.248.238:6529 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:25 2018 us=321997 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322016 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:25 2018 us=322046 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:25 2018 us=322098 91.252.248.238:6529 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:25 2018 us=322117 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322125 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:25 2018 us=322141 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:25 2018 us=322164 91.252.248.238:6529 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:25 2018 us=322187 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322196 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:25 2018 us=322211 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:25 2018 us=322248 91.252.248.238:6529 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:25 2018 us=431040 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431087 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:25 2018 us=431128 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:25 2018 us=431196 91.252.248.238:6529 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:25 2018 us=431215 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431224 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:25 2018 us=431238 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:25 2018 us=431284 91.252.248.238:6529 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:25 2018 us=431304 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431317 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:25 2018 us=431338 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:25 2018 us=431380 91.252.248.238:6529 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:25 2018 us=431398 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431410 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:25 2018 us=431430 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:25 2018 us=431459 91.252.248.238:6529 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:25 2018 us=544352 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544396 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:25 2018 us=544437 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:25 2018 us=544510 91.252.248.238:6529 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:25 2018 us=544528 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544537 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:25 2018 us=544562 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:25 2018 us=544586 91.252.248.238:6529 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:25 2018 us=544609 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544617 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:25 2018 us=544631 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:25 2018 us=544655 91.252.248.238:6529 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:25 2018 us=544668 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544675 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:25 2018 us=544688 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:25 2018 us=544711 91.252.248.238:6529 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:25 2018 us=643686 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=643731 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:25 2018 us=643771 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:25 2018 us=643808 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=21068 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:27 2018 us=21198 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=665700 91.252.248.238:6400 Re-using SSL/TLS context
Fri Jul 13 13:35:27 2018 us=665722 91.252.248.238:6400 LZO compression initialized
Fri Jul 13 13:35:27 2018 us=665729 91.252.248.238:6400 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:27 2018 us=665741 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665821 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665841 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665867 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665877 91.252.248.238:6400 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:27 2018 us=665883 91.252.248.238:6400 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:27 2018 us=665889 91.252.248.238:6400 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:27 2018 us=665913 91.252.248.238:6400 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:27 2018 us=665918 91.252.248.238:6400 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:27 2018 us=665929 91.252.248.238:6400 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:27 2018 us=665938 91.252.248.238:6400 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:27 2018 us=665946 91.252.248.238:6400 SENT PING
Fri Jul 13 13:35:27 2018 us=665961 91.252.248.238:6400 GET INST BY REAL: 91.252.248.238:6400 [created]
Fri Jul 13 13:35:27 2018 us=665980 91.252.248.238:6400 UDPv4 READ [14] from [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=665994 91.252.248.238:6400 TLS: Initial packet from [AF_INET]91.252.248.238:6400, sid=df839f45 a0572e21
Fri Jul 13 13:35:27 2018 us=666021 91.252.248.238:6400 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=818995 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819052 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:27 2018 us=819376 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819403 91.252.248.238:6400 UDPv4 READ [114] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=819443 91.252.248.238:6400 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=819518 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819534 91.252.248.238:6400 UDPv4 READ [86] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:27 2018 us=826699 91.252.248.238:6400 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=826855 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:27 2018 us=826907 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:27 2018 us=826946 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:27 2018 us=826976 91.252.248.238:6400 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:27 2018 us=937108 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937173 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=937246 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:27 2018 us=937288 91.252.248.238:6400 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:27 2018 us=937316 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937325 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:27 2018 us=937343 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:27 2018 us=937390 91.252.248.238:6400 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:27 2018 us=937407 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937415 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:27 2018 us=937431 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:27 2018 us=937460 91.252.248.238:6400 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:27 2018 us=937474 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937483 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:27 2018 us=937500 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:27 2018 us=937543 91.252.248.238:6400 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:28 2018 us=26102 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=26248 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=56282 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56344 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:28 2018 us=56404 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:28 2018 us=56541 91.252.248.238:6400 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:28 2018 us=56568 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56585 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:28 2018 us=56611 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:28 2018 us=56662 91.252.248.238:6400 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:28 2018 us=56684 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56698 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:28 2018 us=56724 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:28 2018 us=56770 91.252.248.238:6400 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:28 2018 us=56792 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:28 2018 us=56831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:28 2018 us=56874 91.252.248.238:6400 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:28 2018 us=177436 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177506 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:28 2018 us=177561 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:28 2018 us=177629 91.252.248.238:6400 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:28 2018 us=177656 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177668 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:28 2018 us=177692 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:28 2018 us=177741 91.252.248.238:6400 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:28 2018 us=177793 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:28 2018 us=177831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:28 2018 us=177865 91.252.248.238:6400 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:28 2018 us=177878 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177885 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:28 2018 us=177898 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:28 2018 us=177932 91.252.248.238:6400 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:28 2018 us=294882 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=294930 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:28 2018 us=294982 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:28 2018 us=295052 91.252.248.238:6400 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:28 2018 us=295076 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295090 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:28 2018 us=295113 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:28 2018 us=295157 91.252.248.238:6400 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:28 2018 us=295173 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295181 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:28 2018 us=295205 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:28 2018 us=295245 91.252.248.238:6400 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:28 2018 us=295275 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295288 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:28 2018 us=295309 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:28 2018 us=295346 91.252.248.238:6400 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:28 2018 us=404207 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404337 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:28 2018 us=404396 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:28 2018 us=404447 91.252.248.238:6400 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:28 2018 us=404486 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404501 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:28 2018 us=404526 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=404574 91.252.248.238:6400 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:28 2018 us=417715 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417801 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:28 2018 us=417851 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:28 2018 us=417891 91.252.248.238:6400 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:28 2018 us=417922 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417936 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:28 2018 us=417962 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:28 2018 us=418000 91.252.248.238:6400 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:28 2018 us=533390 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=533451 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:28 2018 us=533507 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:28 2018 us=533576 91.252.248.238:6400 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=945522 91.252.248.238:6722 Re-using SSL/TLS context
Fri Jul 13 13:35:28 2018 us=945544 91.252.248.238:6722 LZO compression initialized
Fri Jul 13 13:35:28 2018 us=945551 91.252.248.238:6722 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:28 2018 us=945563 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945614 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945628 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945663 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945678 91.252.248.238:6722 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:28 2018 us=945686 91.252.248.238:6722 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:28 2018 us=945697 91.252.248.238:6722 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:28 2018 us=945729 91.252.248.238:6722 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:28 2018 us=945740 91.252.248.238:6722 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:28 2018 us=945786 91.252.248.238:6722 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:28 2018 us=945801 91.252.248.238:6722 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:28 2018 us=945825 91.252.248.238:6722 SENT PING
Fri Jul 13 13:35:28 2018 us=945843 91.252.248.238:6722 GET INST BY REAL: 91.252.248.238:6722 [created]
Fri Jul 13 13:35:28 2018 us=945967 91.252.248.238:6722 UDPv4 READ [14] from [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:28 2018 us=945991 91.252.248.238:6722 TLS: Initial packet from [AF_INET]91.252.248.238:6722, sid=eb02a63d a1b1755a
Fri Jul 13 13:35:28 2018 us=946021 91.252.248.238:6722 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:29 2018 us=44386 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:29 2018 us=44509 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:29 2018 us=45236 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45255 91.252.248.238:6722 UDPv4 READ [22] from [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:29 2018 us=45278 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45288 91.252.248.238:6722 UDPv4 READ [114] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=45305 91.252.248.238:6722 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:29 2018 us=55366 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=55426 91.252.248.238:6722 UDPv4 READ [86] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:29 2018 us=63990 91.252.248.238:6722 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=64141 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:29 2018 us=64202 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:29 2018 us=64240 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: openvpn Client is not recognized by openvpn server

Post by TinCanTech » Fri Jul 13, 2018 11:55 am


etantonio
OpenVPN User
Posts: 29
Joined: Tue Jul 10, 2018 1:31 pm

Re: openvpn Client is not recognized by openvpn server

Post by etantonio » Fri Jul 13, 2018 12:21 pm

Hy,
the server is on Ubuntu 14 while the client is on openWRT with "Maestro router E220" but it is not possible to take a look at the configuration file because it is 400km away from me and I've no openvpn connection to it.
this is the server startup log:

Fri Jul 13 13:29:09 2018 us=299223 Current Parameter Settings:
Fri Jul 13 13:29:09 2018 us=299267 config = '/etc/openvpn/server.conf'
Fri Jul 13 13:29:09 2018 us=299274 mode = 1
Fri Jul 13 13:29:09 2018 us=299278 persist_config = DISABLED
Fri Jul 13 13:29:09 2018 us=299282 persist_mode = 1
Fri Jul 13 13:29:09 2018 us=299286 show_ciphers = DISABLED
Fri Jul 13 13:29:09 2018 us=299289 show_digests = DISABLED
Fri Jul 13 13:29:09 2018 us=299293 show_engines = DISABLED
Fri Jul 13 13:29:09 2018 us=299296 genkey = DISABLED
Fri Jul 13 13:29:09 2018 us=299300 key_pass_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299303 show_tls_ciphers = DISABLED
Fri Jul 13 13:29:09 2018 us=299312 Connection profiles [default]:
Fri Jul 13 13:29:09 2018 us=299317 proto = udp
Fri Jul 13 13:29:09 2018 us=299321 local = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299325 local_port = 1194
Fri Jul 13 13:29:09 2018 us=299328 remote = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299332 remote_port = 1194
Fri Jul 13 13:29:09 2018 us=299335 remote_float = DISABLED
Fri Jul 13 13:29:09 2018 us=299339 bind_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299342 bind_local = ENABLED
Fri Jul 13 13:29:09 2018 us=299346 connect_retry_seconds = 5
Fri Jul 13 13:29:09 2018 us=299350 connect_timeout = 10
Fri Jul 13 13:29:09 2018 us=299353 connect_retry_max = 0
Fri Jul 13 13:29:09 2018 us=299357 socks_proxy_server = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299361 socks_proxy_port = 0
Fri Jul 13 13:29:09 2018 us=299364 socks_proxy_retry = DISABLED
Fri Jul 13 13:29:09 2018 us=299368 Connection profiles END
Fri Jul 13 13:29:09 2018 us=299372 remote_random = DISABLED
Fri Jul 13 13:29:09 2018 us=299375 ipchange = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299379 dev = 'tun'
Fri Jul 13 13:29:09 2018 us=299382 dev_type = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299386 dev_node = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299390 lladdr = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299394 topology = 1
Fri Jul 13 13:29:09 2018 us=299398 tun_ipv6 = DISABLED
Fri Jul 13 13:29:09 2018 us=299401 ifconfig_local = '10.8.0.1'
Fri Jul 13 13:29:09 2018 us=299405 ifconfig_remote_netmask = '10.8.0.2'
Fri Jul 13 13:29:09 2018 us=299408 ifconfig_noexec = DISABLED
Fri Jul 13 13:29:09 2018 us=299412 ifconfig_nowarn = DISABLED
Fri Jul 13 13:29:09 2018 us=299416 ifconfig_ipv6_local = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299419 ifconfig_ipv6_netbits = 0
Fri Jul 13 13:29:09 2018 us=299423 ifconfig_ipv6_remote = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299426 shaper = 0
Fri Jul 13 13:29:09 2018 us=299430 tun_mtu = 1500
Fri Jul 13 13:29:09 2018 us=299434 tun_mtu_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=299437 link_mtu = 1500
Fri Jul 13 13:29:09 2018 us=299441 link_mtu_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299444 tun_mtu_extra = 0
Fri Jul 13 13:29:09 2018 us=299448 tun_mtu_extra_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299451 fragment = 0
Fri Jul 13 13:29:09 2018 us=299455 mtu_discover_type = -1
Fri Jul 13 13:29:09 2018 us=299458 mtu_test = 0
Fri Jul 13 13:29:09 2018 us=299462 mlock = DISABLED
Fri Jul 13 13:29:09 2018 us=299466 keepalive_ping = 10
Fri Jul 13 13:29:09 2018 us=299469 keepalive_timeout = 120
Fri Jul 13 13:29:09 2018 us=299473 inactivity_timeout = 0
Fri Jul 13 13:29:09 2018 us=299476 ping_send_timeout = 10
Fri Jul 13 13:29:09 2018 us=299480 ping_rec_timeout = 240
Fri Jul 13 13:29:09 2018 us=299486 ping_rec_timeout_action = 2
Fri Jul 13 13:29:09 2018 us=299490 ping_timer_remote = DISABLED
Fri Jul 13 13:29:09 2018 us=299494 remap_sigusr1 = 0
Fri Jul 13 13:29:09 2018 us=299497 explicit_exit_notification = 0
Fri Jul 13 13:29:09 2018 us=299504 persist_tun = ENABLED
Fri Jul 13 13:29:09 2018 us=299508 persist_local_ip = DISABLED
Fri Jul 13 13:29:09 2018 us=299511 persist_remote_ip = DISABLED
Fri Jul 13 13:29:09 2018 us=299515 persist_key = ENABLED
Fri Jul 13 13:29:09 2018 us=299518 mssfix = 1450
Fri Jul 13 13:29:09 2018 us=299522 passtos = DISABLED
Fri Jul 13 13:29:09 2018 us=299525 resolve_retry_seconds = 1000000000
Fri Jul 13 13:29:09 2018 us=299531 username = 'nobody'
Fri Jul 13 13:29:09 2018 us=299535 groupname = 'nogroup'
Fri Jul 13 13:29:09 2018 us=299539 chroot_dir = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299542 cd_dir = '/etc/openvpn'
Fri Jul 13 13:29:09 2018 us=299546 writepid = '/var/run/openvpn.server.pid'
Fri Jul 13 13:29:09 2018 us=299550 up_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299553 down_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299557 down_pre = DISABLED
Fri Jul 13 13:29:09 2018 us=299560 up_restart = DISABLED
Fri Jul 13 13:29:09 2018 us=299564 up_delay = DISABLED
Fri Jul 13 13:29:09 2018 us=299567 daemon = ENABLED
Fri Jul 13 13:29:09 2018 us=299571 inetd = 0
Fri Jul 13 13:29:09 2018 us=299574 log = ENABLED
Fri Jul 13 13:29:09 2018 us=299578 suppress_timestamps = DISABLED
Fri Jul 13 13:29:09 2018 us=299581 nice = 0
Fri Jul 13 13:29:09 2018 us=299585 verbosity = 7
Fri Jul 13 13:29:09 2018 us=299588 mute = 0
Fri Jul 13 13:29:09 2018 us=299592 gremlin = 0
Fri Jul 13 13:29:09 2018 us=299595 status_file = 'openvpn-status.log'
Fri Jul 13 13:29:09 2018 us=299599 status_file_version = 1
Fri Jul 13 13:29:09 2018 us=299603 status_file_update_freq = 60
Fri Jul 13 13:29:09 2018 us=299606 occ = ENABLED
Fri Jul 13 13:29:09 2018 us=299610 rcvbuf = 65536
Fri Jul 13 13:29:09 2018 us=299613 sndbuf = 65536
Fri Jul 13 13:29:09 2018 us=299616 sockflags = 0
Fri Jul 13 13:29:09 2018 us=299620 fast_io = DISABLED
Fri Jul 13 13:29:09 2018 us=299624 lzo = 7
Fri Jul 13 13:29:09 2018 us=299627 route_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299631 route_default_gateway = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299634 route_default_metric = 0
Fri Jul 13 13:29:09 2018 us=299638 route_noexec = DISABLED
Fri Jul 13 13:29:09 2018 us=299642 route_delay = 0
Fri Jul 13 13:29:09 2018 us=299646 route_delay_window = 30
Fri Jul 13 13:29:09 2018 us=299649 route_delay_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=299653 route_nopull = DISABLED
Fri Jul 13 13:29:09 2018 us=299657 route_gateway_via_dhcp = DISABLED
Fri Jul 13 13:29:09 2018 us=299660 max_routes = 100
Fri Jul 13 13:29:09 2018 us=299664 allow_pull_fqdn = DISABLED
Fri Jul 13 13:29:09 2018 us=299672 route 192.168.1.0/255.255.255.0/nil/nil
Fri Jul 13 13:29:09 2018 us=299676 route 192.168.2.0/255.255.255.0/nil/nil
Fri Jul 13 13:29:09 2018 us=299680 route 10.8.0.0/255.255.255.0/nil/nil
Fri Jul 13 13:29:09 2018 us=299684 management_addr = 'localhost'
Fri Jul 13 13:29:09 2018 us=299687 management_port = 7505
Fri Jul 13 13:29:09 2018 us=299691 management_user_pass = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299694 management_log_history_cache = 250
Fri Jul 13 13:29:09 2018 us=299698 management_echo_buffer_size = 100
Fri Jul 13 13:29:09 2018 us=299702 management_write_peer_info_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299705 management_client_user = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299709 management_client_group = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299713 management_flags = 0
Fri Jul 13 13:29:09 2018 us=299716 shared_secret_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299720 key_direction = 0
Fri Jul 13 13:29:09 2018 us=299724 ciphername_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=299728 ciphername = 'BF-CBC'
Fri Jul 13 13:29:09 2018 us=299734 authname_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=299740 authname = 'SHA1'
Fri Jul 13 13:29:09 2018 us=299746 prng_hash = 'SHA1'
Fri Jul 13 13:29:09 2018 us=299752 prng_nonce_secret_len = 16
Fri Jul 13 13:29:09 2018 us=299758 keysize = 0
Fri Jul 13 13:29:09 2018 us=299764 engine = DISABLED
Fri Jul 13 13:29:09 2018 us=299769 replay = ENABLED
Fri Jul 13 13:29:09 2018 us=299775 mute_replay_warnings = DISABLED
Fri Jul 13 13:29:09 2018 us=299781 replay_window = 64
Fri Jul 13 13:29:09 2018 us=299786 replay_time = 15
Fri Jul 13 13:29:09 2018 us=299793 packet_id_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299799 use_iv = ENABLED
Fri Jul 13 13:29:09 2018 us=299804 test_crypto = DISABLED
Fri Jul 13 13:29:09 2018 us=299814 tls_server = ENABLED
Fri Jul 13 13:29:09 2018 us=299821 tls_client = DISABLED
Fri Jul 13 13:29:09 2018 us=299826 key_method = 2
Fri Jul 13 13:29:09 2018 us=299833 ca_file = 'ca.crt'
Fri Jul 13 13:29:09 2018 us=299839 ca_path = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299844 dh_file = 'dh2048.pem'
Fri Jul 13 13:29:09 2018 us=299851 cert_file = 'server.crt'
Fri Jul 13 13:29:09 2018 us=299856 priv_key_file = 'server.key'
Fri Jul 13 13:29:09 2018 us=299860 pkcs12_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299863 cipher_list = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299867 tls_verify = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299871 tls_export_cert = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299874 tls_remote = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299878 crl_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299881 ns_cert_type = 0
Fri Jul 13 13:29:09 2018 us=299885 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299888 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299892 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299895 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299899 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299902 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299906 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299910 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299913 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299917 remote_cert_ku = 0
Fri Jul 13 13:29:09 2018 us=299920 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299924 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299927 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299930 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299934 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299937 remote_cert_ku[i] = 0
Fri Jul 13 13:29:09 2018 us=299940 remote_cert_eku = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299944 tls_timeout = 2
Fri Jul 13 13:29:09 2018 us=299948 renegotiate_bytes = 0
Fri Jul 13 13:29:09 2018 us=299951 renegotiate_packets = 0
Fri Jul 13 13:29:09 2018 us=299955 renegotiate_seconds = 3600
Fri Jul 13 13:29:09 2018 us=299958 handshake_window = 60
Fri Jul 13 13:29:09 2018 us=299961 transition_window = 3600
Fri Jul 13 13:29:09 2018 us=299965 single_session = DISABLED
Fri Jul 13 13:29:09 2018 us=299969 push_peer_info = DISABLED
Fri Jul 13 13:29:09 2018 us=299972 tls_exit = DISABLED
Fri Jul 13 13:29:09 2018 us=299976 tls_auth_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=299980 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299983 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299987 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299991 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299994 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=299998 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300001 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300005 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300008 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300012 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300018 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300022 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300025 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300029 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300032 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300036 pkcs11_protected_authentication = DISABLED
Fri Jul 13 13:29:09 2018 us=300040 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300044 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300047 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300051 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300054 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300061 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300064 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300068 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300071 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300075 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300078 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300082 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300085 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300089 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300092 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300096 pkcs11_private_mode = 00000000
Fri Jul 13 13:29:09 2018 us=300099 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300103 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300106 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300110 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300113 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300117 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300120 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300124 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300127 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300131 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300134 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300138 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300141 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300145 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300148 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300152 pkcs11_cert_private = DISABLED
Fri Jul 13 13:29:09 2018 us=300155 pkcs11_pin_cache_period = -1
Fri Jul 13 13:29:09 2018 us=300159 pkcs11_id = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300162 pkcs11_id_management = DISABLED
Fri Jul 13 13:29:09 2018 us=300167 server_network = 10.8.0.0
Fri Jul 13 13:29:09 2018 us=300171 server_netmask = 255.255.255.0
Fri Jul 13 13:29:09 2018 us=300179 server_network_ipv6 = ::
Fri Jul 13 13:29:09 2018 us=300183 server_netbits_ipv6 = 0
Fri Jul 13 13:29:09 2018 us=300187 server_bridge_ip = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300191 server_bridge_netmask = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300195 server_bridge_pool_start = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300199 server_bridge_pool_end = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300203 push_entry = 'route 192.168.1.0 255.255.255.0'
Fri Jul 13 13:29:09 2018 us=300207 push_entry = 'route 192.168.2.0 255.255.255.0'
Fri Jul 13 13:29:09 2018 us=300211 push_entry = 'redirect-gateway def1 bypass-dhcp'
Fri Jul 13 13:29:09 2018 us=300215 push_entry = 'dhcp-option DNS 208.67.222.222'
Fri Jul 13 13:29:09 2018 us=300219 push_entry = 'dhcp-option DNS 208.67.220.220'
Fri Jul 13 13:29:09 2018 us=300223 push_entry = 'route 10.8.0.1'
Fri Jul 13 13:29:09 2018 us=300226 push_entry = 'topology net30'
Fri Jul 13 13:29:09 2018 us=300230 push_entry = 'ping 10'
Fri Jul 13 13:29:09 2018 us=300233 push_entry = 'ping-restart 120'
Fri Jul 13 13:29:09 2018 us=300237 ifconfig_pool_defined = ENABLED
Fri Jul 13 13:29:09 2018 us=300241 ifconfig_pool_start = 10.8.0.4
Fri Jul 13 13:29:09 2018 us=300245 ifconfig_pool_end = 10.8.0.251
Fri Jul 13 13:29:09 2018 us=300249 ifconfig_pool_netmask = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300253 ifconfig_pool_persist_filename = 'ipp.txt'
Fri Jul 13 13:29:09 2018 us=300257 ifconfig_pool_persist_refresh_freq = 600
Fri Jul 13 13:29:09 2018 us=300260 ifconfig_ipv6_pool_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=300264 ifconfig_ipv6_pool_base = ::
Fri Jul 13 13:29:09 2018 us=300268 ifconfig_ipv6_pool_netbits = 0
Fri Jul 13 13:29:09 2018 us=300272 n_bcast_buf = 256
Fri Jul 13 13:29:09 2018 us=300275 tcp_queue_limit = 64
Fri Jul 13 13:29:09 2018 us=300279 real_hash_size = 256
Fri Jul 13 13:29:09 2018 us=300282 virtual_hash_size = 256
Fri Jul 13 13:29:09 2018 us=300288 client_connect_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300292 learn_address_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300296 client_disconnect_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300300 client_config_dir = '/etc/openvpn/ccd'
Fri Jul 13 13:29:09 2018 us=300303 ccd_exclusive = DISABLED
Fri Jul 13 13:29:09 2018 us=300307 tmp_dir = '/tmp'
Fri Jul 13 13:29:09 2018 us=300311 push_ifconfig_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=300315 push_ifconfig_local = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300319 push_ifconfig_remote_netmask = 0.0.0.0
Fri Jul 13 13:29:09 2018 us=300322 push_ifconfig_ipv6_defined = DISABLED
Fri Jul 13 13:29:09 2018 us=300327 push_ifconfig_ipv6_local = ::/0
Fri Jul 13 13:29:09 2018 us=300330 push_ifconfig_ipv6_remote = ::
Fri Jul 13 13:29:09 2018 us=300334 enable_c2c = DISABLED
Fri Jul 13 13:29:09 2018 us=300338 duplicate_cn = DISABLED
Fri Jul 13 13:29:09 2018 us=300341 cf_max = 0
Fri Jul 13 13:29:09 2018 us=300345 cf_per = 0
Fri Jul 13 13:29:09 2018 us=300349 max_clients = 1024
Fri Jul 13 13:29:09 2018 us=300352 max_routes_per_client = 256
Fri Jul 13 13:29:09 2018 us=300356 auth_user_pass_verify_script = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300359 auth_user_pass_verify_script_via_file = DISABLED
Fri Jul 13 13:29:09 2018 us=300363 ssl_flags = 0
Fri Jul 13 13:29:09 2018 us=300367 port_share_host = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300370 port_share_port = 0
Fri Jul 13 13:29:09 2018 us=300374 client = DISABLED
Fri Jul 13 13:29:09 2018 us=300377 pull = DISABLED
Fri Jul 13 13:29:09 2018 us=300381 auth_user_pass_file = '[UNDEF]'
Fri Jul 13 13:29:09 2018 us=300386 OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Fri Jul 13 13:29:09 2018 us=300647 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7505
Fri Jul 13 13:29:09 2018 us=300784 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=300795 GDG: route[2] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=300802 GDG: route[3] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=300816 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=300822 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Jul 13 13:29:09 2018 us=328696 Diffie-Hellman initialized with 2048 bit key
Fri Jul 13 13:29:09 2018 us=344182 PRNG init md=SHA1 size=36
Fri Jul 13 13:29:09 2018 us=344223 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:29:09 2018 us=344231 TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:29:09 2018 us=344236 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:29:09 2018 us=344257 Socket Buffers: R=[229376->131072] S=[229376->131072]
Fri Jul 13 13:29:09 2018 us=344317 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=344327 GDG: route[2] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=344333 GDG: route[3] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=344346 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=344384 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=344392 GDG: route[2] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=344398 GDG: route[3] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=344409 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=344417 ROUTE default_gateway=31.14.138.1
Fri Jul 13 13:29:09 2018 us=345048 TUN/TAP device tun0 opened
Fri Jul 13 13:29:09 2018 us=345069 TUN/TAP TX queue length set to 100
Fri Jul 13 13:29:09 2018 us=345092 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Jul 13 13:29:09 2018 us=345116 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Fri Jul 13 13:29:09 2018 us=346366 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=346386 GDG: route[2] 10.8.0.2/255.255.255.255/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=346399 GDG: route[3] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=346406 GDG: route[4] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=346420 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=346436 /sbin/route add -net 192.168.1.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 13:29:09 2018 us=348082 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=348103 GDG: route[2] 10.8.0.2/255.255.255.255/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=348111 GDG: route[3] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=348118 GDG: route[4] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=348124 GDG: route[5] 192.168.1.0/255.255.255.0/10.8.0.2 m=0
Fri Jul 13 13:29:09 2018 us=348137 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=348151 /sbin/route add -net 192.168.2.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 13:29:09 2018 us=359813 GDG: route[1] 0.0.0.0/0.0.0.0/31.14.138.1 m=100
Fri Jul 13 13:29:09 2018 us=359838 GDG: route[2] 10.8.0.2/255.255.255.255/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=359846 GDG: route[3] 31.14.138.0/255.255.255.0/0.0.0.0 m=0
Fri Jul 13 13:29:09 2018 us=359853 GDG: route[4] 169.254.0.0/255.255.0.0/0.0.0.0 m=1000
Fri Jul 13 13:29:09 2018 us=359859 GDG: route[5] 192.168.1.0/255.255.255.0/10.8.0.2 m=0
Fri Jul 13 13:29:09 2018 us=359865 GDG: route[6] 192.168.2.0/255.255.255.0/10.8.0.2 m=0
Fri Jul 13 13:29:09 2018 us=359879 GDG: best=31.14.138.1[1] lm=100
Fri Jul 13 13:29:09 2018 us=359895 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 13:29:09 2018 us=360758 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:29:09 2018 us=362253 GID set to nogroup
Fri Jul 13 13:29:09 2018 us=362290 UID set to nobody
Fri Jul 13 13:29:09 2018 us=362307 UDPv4 link local (bound): [undef]
Fri Jul 13 13:29:09 2018 us=362313 UDPv4 link remote: [undef]
Fri Jul 13 13:29:09 2018 us=362332 MULTI: multi_init called, r=256 v=256
Fri Jul 13 13:29:09 2018 us=362381 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Fri Jul 13 13:29:09 2018 us=364095 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364125 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364132 ifconfig_pool_read(), in='client1,10.8.0.8', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364137 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364142 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.12', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364147 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364151 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.16', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364156 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364160 ifconfig_pool_read(), in='clientCorato,10.8.0.20', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364164 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364170 ifconfig_pool_read(), in='clientGenius,10.8.0.24', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364175 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364180 ifconfig_pool_read(), in='clientGenius,10.8.0.28', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364184 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364188 ifconfig_pool_read(), in='clientFormello,10.8.0.32', TODO: IPv6
Fri Jul 13 13:29:09 2018 us=364192 succeeded -> ifconfig_pool_set()
Fri Jul 13 13:29:09 2018 us=364199 IFCONFIG POOL LIST
Fri Jul 13 13:29:09 2018 us=364205 client1,10.8.0.4
Fri Jul 13 13:29:09 2018 us=364210 client1,10.8.0.8
Fri Jul 13 13:29:09 2018 us=364214 clientTerlizzi,10.8.0.12
Fri Jul 13 13:29:09 2018 us=364219 clientTerlizzi,10.8.0.16
Fri Jul 13 13:29:09 2018 us=364223 clientCorato,10.8.0.20
Fri Jul 13 13:29:09 2018 us=364227 clientGenius,10.8.0.24
Fri Jul 13 13:29:09 2018 us=364231 clientGenius,10.8.0.28
Fri Jul 13 13:29:09 2018 us=364235 clientFormello,10.8.0.32
Fri Jul 13 13:29:09 2018 us=364274 Initialization Sequence Completed

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: openvpn Client is not recognized by openvpn server

Post by TinCanTech » Fri Jul 13, 2018 12:35 pm

etantonio wrote:
Fri Jul 13, 2018 12:21 pm
OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
:roll:
etantonio wrote:
Fri Jul 13, 2018 12:21 pm
Fri Jul 13 13:29:09 2018 us=364274 Initialization Sequence Completed
Your client is not trying to (or cannot) connect ..

etantonio
OpenVPN User
Posts: 29
Joined: Tue Jul 10, 2018 1:31 pm

Re: openvpn Client is not recognized by openvpn server

Post by etantonio » Fri Jul 13, 2018 1:23 pm

the client ip is 91.252.248.238 and I can see many UNDEF in the log status:

OpenVPN CLIENT LIST
Updated,Fri Jul 13 15:21:14 2018
Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since
UNDEF,91.252.248.238:6403,698,4278,Fri Jul 13 15:20:44 2018
UNDEF,91.252.248.238:6338,698,3138,Fri Jul 13 15:21:09 2018
UNDEF,91.252.248.238:6785,698,4392,Fri Jul 13 15:20:41 2018
UNDEF,91.252.248.238:7106,698,3708,Fri Jul 13 15:21:04 2018
UNDEF,91.252.248.238:6978,698,4734,Fri Jul 13 15:20:36 2018
UNDEF,91.252.248.238:6468,698,3822,Fri Jul 13 15:20:58 2018
UNDEF,91.252.248.238:6913,698,4278,Fri Jul 13 15:20:47 2018
UNDEF,91.252.248.238:6340,698,4734,Fri Jul 13 15:20:24 2018
UNDEF,91.252.248.238:6336,698,3822,Fri Jul 13 15:21:01 2018
UNDEF,91.252.248.238:6407,698,3480,Fri Jul 13 15:21:07 2018
UNDEF,91.252.248.238:6470,698,4278,Fri Jul 13 15:20:50 2018
UNDEF,91.252.248.238:6273,698,4392,Fri Jul 13 15:20:39 2018
UNDEF,91.252.248.238:6531,698,4734,Fri Jul 13 15:20:27 2018
UNDEF,91.252.248.238:6272,698,2910,Fri Jul 13 15:21:12 2018
UNDEF,91.252.248.238:6404,698,4734,Fri Jul 13 15:20:15 2018
UNDEF,91.252.248.238:6147,698,4734,Fri Jul 13 15:20:33 2018
UNDEF,91.252.248.238:6533,698,4164,Fri Jul 13 15:20:55 2018
UNDEF,91.252.248.238:6401,698,4734,Fri Jul 13 15:20:30 2018
UNDEF,91.252.248.238:6786,698,4734,Fri Jul 13 15:20:18 2018
client1,37.227.109.201:55297,2023361,2112086,Fri Jul 13 13:30:45 2018
UNDEF,91.252.248.238:6529,698,4734,Fri Jul 13 15:20:21 2018
UNDEF,91.252.248.238:6405,698,4278,Fri Jul 13 15:20:53 2018
ROUTING TABLE
Virtual Address,Common Name,Real Address,Last Ref
192.168.1.0/24,client1,37.227.109.201:55297,Fri Jul 13 13:30:49 2018
192.168.1.161C,client1,37.227.109.201:55297,Fri Jul 13 15:20:50 2018
192.168.1.175C,client1,37.227.109.201:55297,Fri Jul 13 15:21:12 2018
10.8.0.6,client1,37.227.109.201:55297,Fri Jul 13 15:21:13 2018
GLOBAL STATS
Max bcast/mcast queue length,0
END



This is the server log that show the connection from this client,
but I can't understand why it is not recognized.
Thanks for your help
Antonio


root@solergycloud:~# cat /etc/openvpn/openvpn.log | grep 91.252.248.238
Fri Jul 13 13:35:24 2018 us=900847 91.252.248.238:6529 Re-using SSL/TLS context
Fri Jul 13 13:35:24 2018 us=900881 91.252.248.238:6529 LZO compression initialized
Fri Jul 13 13:35:24 2018 us=900892 91.252.248.238:6529 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:24 2018 us=900914 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900975 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=900984 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901008 91.252.248.238:6529 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:24 2018 us=901019 91.252.248.238:6529 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:24 2018 us=901025 91.252.248.238:6529 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:24 2018 us=901031 91.252.248.238:6529 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:24 2018 us=901065 91.252.248.238:6529 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:24 2018 us=901071 91.252.248.238:6529 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:24 2018 us=901083 91.252.248.238:6529 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:24 2018 us=901092 91.252.248.238:6529 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:24 2018 us=901103 91.252.248.238:6529 SENT PING
Fri Jul 13 13:35:24 2018 us=901116 91.252.248.238:6529 GET INST BY REAL: 91.252.248.238:6529 [created]
Fri Jul 13 13:35:24 2018 us=901128 91.252.248.238:6529 UDPv4 READ [14] from [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=901137 91.252.248.238:6529 TLS: Initial packet from [AF_INET]91.252.248.238:6529, sid=52ac7ce3 b1260378
Fri Jul 13 13:35:24 2018 us=901159 91.252.248.238:6529 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6529: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:24 2018 us=998920 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998933 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:24 2018 us=998973 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=998984 91.252.248.238:6529 UDPv4 READ [114] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:24 2018 us=999002 91.252.248.238:6529 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:24 2018 us=999041 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:24 2018 us=999052 91.252.248.238:6529 UDPv4 READ [86] from [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:25 2018 us=16308 91.252.248.238:6529 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:25 2018 us=16455 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:25 2018 us=16524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:25 2018 us=16573 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:25 2018 us=16652 91.252.248.238:6529 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:25 2018 us=123354 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123399 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:25 2018 us=123440 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:25 2018 us=123485 91.252.248.238:6529 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:25 2018 us=123501 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123509 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:25 2018 us=123524 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:25 2018 us=123546 91.252.248.238:6529 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:25 2018 us=123567 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123575 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:25 2018 us=123588 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:25 2018 us=123606 91.252.248.238:6529 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:25 2018 us=123636 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=123647 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:25 2018 us=123663 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:25 2018 us=123683 91.252.248.238:6529 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:25 2018 us=219499 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219544 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:25 2018 us=219584 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:25 2018 us=219632 91.252.248.238:6529 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:25 2018 us=219655 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219668 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:25 2018 us=219691 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:25 2018 us=219740 91.252.248.238:6529 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:25 2018 us=219790 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219816 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:25 2018 us=219845 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:25 2018 us=219890 91.252.248.238:6529 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:25 2018 us=219906 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=219915 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:25 2018 us=219929 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:25 2018 us=219957 91.252.248.238:6529 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:25 2018 us=321725 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=321813 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:25 2018 us=321877 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:25 2018 us=321953 91.252.248.238:6529 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:25 2018 us=321997 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322016 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:25 2018 us=322046 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:25 2018 us=322098 91.252.248.238:6529 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:25 2018 us=322117 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322125 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:25 2018 us=322141 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:25 2018 us=322164 91.252.248.238:6529 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:25 2018 us=322187 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=322196 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:25 2018 us=322211 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:25 2018 us=322248 91.252.248.238:6529 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:25 2018 us=431040 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431087 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:25 2018 us=431128 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:25 2018 us=431196 91.252.248.238:6529 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:25 2018 us=431215 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431224 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:25 2018 us=431238 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:25 2018 us=431284 91.252.248.238:6529 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:25 2018 us=431304 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431317 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:25 2018 us=431338 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:25 2018 us=431380 91.252.248.238:6529 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:25 2018 us=431398 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=431410 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:25 2018 us=431430 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:25 2018 us=431459 91.252.248.238:6529 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:25 2018 us=544352 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544396 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:25 2018 us=544437 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:25 2018 us=544510 91.252.248.238:6529 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:25 2018 us=544528 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544537 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:25 2018 us=544562 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:25 2018 us=544586 91.252.248.238:6529 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:25 2018 us=544609 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544617 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:25 2018 us=544631 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:25 2018 us=544655 91.252.248.238:6529 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:25 2018 us=544668 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=544675 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:25 2018 us=544688 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:25 2018 us=544711 91.252.248.238:6529 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:25 2018 us=643686 GET INST BY REAL: 91.252.248.238:6529 [succeeded]
Fri Jul 13 13:35:25 2018 us=643731 91.252.248.238:6529 UDPv4 READ [22] from [AF_INET]91.252.248.238:6529: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:25 2018 us=643771 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:25 2018 us=643808 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=21068 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:27 2018 us=21198 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:27 2018 us=665700 91.252.248.238:6400 Re-using SSL/TLS context
Fri Jul 13 13:35:27 2018 us=665722 91.252.248.238:6400 LZO compression initialized
Fri Jul 13 13:35:27 2018 us=665729 91.252.248.238:6400 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:27 2018 us=665741 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665821 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665841 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665867 91.252.248.238:6400 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:27 2018 us=665877 91.252.248.238:6400 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:27 2018 us=665883 91.252.248.238:6400 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:27 2018 us=665889 91.252.248.238:6400 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:27 2018 us=665913 91.252.248.238:6400 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:27 2018 us=665918 91.252.248.238:6400 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:27 2018 us=665929 91.252.248.238:6400 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:27 2018 us=665938 91.252.248.238:6400 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:27 2018 us=665946 91.252.248.238:6400 SENT PING
Fri Jul 13 13:35:27 2018 us=665961 91.252.248.238:6400 GET INST BY REAL: 91.252.248.238:6400 [created]
Fri Jul 13 13:35:27 2018 us=665980 91.252.248.238:6400 UDPv4 READ [14] from [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=665994 91.252.248.238:6400 TLS: Initial packet from [AF_INET]91.252.248.238:6400, sid=df839f45 a0572e21
Fri Jul 13 13:35:27 2018 us=666021 91.252.248.238:6400 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6400: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:27 2018 us=818995 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819052 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:27 2018 us=819376 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819403 91.252.248.238:6400 UDPv4 READ [114] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=819443 91.252.248.238:6400 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=819518 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=819534 91.252.248.238:6400 UDPv4 READ [86] from [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:27 2018 us=826699 91.252.248.238:6400 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:27 2018 us=826855 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:27 2018 us=826907 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:27 2018 us=826946 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Fri Jul 13 13:35:27 2018 us=826976 91.252.248.238:6400 ACK output sequence broken: [5] 1 2 3 4
Fri Jul 13 13:35:27 2018 us=937108 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937173 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:27 2018 us=937246 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Fri Jul 13 13:35:27 2018 us=937288 91.252.248.238:6400 ACK output sequence broken: [6] 5 2 3 4
Fri Jul 13 13:35:27 2018 us=937316 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937325 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 2 ]
Fri Jul 13 13:35:27 2018 us=937343 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Fri Jul 13 13:35:27 2018 us=937390 91.252.248.238:6400 ACK output sequence broken: [7] 5 6 3 4
Fri Jul 13 13:35:27 2018 us=937407 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937415 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 3 ]
Fri Jul 13 13:35:27 2018 us=937431 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Fri Jul 13 13:35:27 2018 us=937460 91.252.248.238:6400 ACK output sequence broken: [8] 5 6 7 4
Fri Jul 13 13:35:27 2018 us=937474 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:27 2018 us=937483 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 4 ]
Fri Jul 13 13:35:27 2018 us=937500 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Fri Jul 13 13:35:27 2018 us=937543 91.252.248.238:6400 ACK output sequence broken: [9] 5 6 7 8
Fri Jul 13 13:35:28 2018 us=26102 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=26248 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=56282 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56344 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 5 ]
Fri Jul 13 13:35:28 2018 us=56404 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=9 DATA len=100
Fri Jul 13 13:35:28 2018 us=56541 91.252.248.238:6400 ACK output sequence broken: [10] 9 6 7 8
Fri Jul 13 13:35:28 2018 us=56568 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56585 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 6 ]
Fri Jul 13 13:35:28 2018 us=56611 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=10 DATA len=100
Fri Jul 13 13:35:28 2018 us=56662 91.252.248.238:6400 ACK output sequence broken: [11] 9 10 7 8
Fri Jul 13 13:35:28 2018 us=56684 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56698 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 7 ]
Fri Jul 13 13:35:28 2018 us=56724 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=11 DATA len=100
Fri Jul 13 13:35:28 2018 us=56770 91.252.248.238:6400 ACK output sequence broken: [12] 9 10 11 8
Fri Jul 13 13:35:28 2018 us=56792 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=56807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 8 ]
Fri Jul 13 13:35:28 2018 us=56831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=12 DATA len=100
Fri Jul 13 13:35:28 2018 us=56874 91.252.248.238:6400 ACK output sequence broken: [13] 9 10 11 12
Fri Jul 13 13:35:28 2018 us=177436 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177506 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 9 ]
Fri Jul 13 13:35:28 2018 us=177561 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=13 DATA len=100
Fri Jul 13 13:35:28 2018 us=177629 91.252.248.238:6400 ACK output sequence broken: [14] 13 10 11 12
Fri Jul 13 13:35:28 2018 us=177656 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177668 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 10 ]
Fri Jul 13 13:35:28 2018 us=177692 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=14 DATA len=100
Fri Jul 13 13:35:28 2018 us=177741 91.252.248.238:6400 ACK output sequence broken: [15] 13 14 11 12
Fri Jul 13 13:35:28 2018 us=177793 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177807 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 11 ]
Fri Jul 13 13:35:28 2018 us=177831 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=15 DATA len=100
Fri Jul 13 13:35:28 2018 us=177865 91.252.248.238:6400 ACK output sequence broken: [16] 13 14 15 12
Fri Jul 13 13:35:28 2018 us=177878 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=177885 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 12 ]
Fri Jul 13 13:35:28 2018 us=177898 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=16 DATA len=100
Fri Jul 13 13:35:28 2018 us=177932 91.252.248.238:6400 ACK output sequence broken: [17] 13 14 15 16
Fri Jul 13 13:35:28 2018 us=294882 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=294930 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 13 ]
Fri Jul 13 13:35:28 2018 us=294982 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=17 DATA len=100
Fri Jul 13 13:35:28 2018 us=295052 91.252.248.238:6400 ACK output sequence broken: [18] 17 14 15 16
Fri Jul 13 13:35:28 2018 us=295076 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295090 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 14 ]
Fri Jul 13 13:35:28 2018 us=295113 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=18 DATA len=100
Fri Jul 13 13:35:28 2018 us=295157 91.252.248.238:6400 ACK output sequence broken: [19] 17 18 15 16
Fri Jul 13 13:35:28 2018 us=295173 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295181 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 15 ]
Fri Jul 13 13:35:28 2018 us=295205 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=19 DATA len=100
Fri Jul 13 13:35:28 2018 us=295245 91.252.248.238:6400 ACK output sequence broken: [20] 17 18 19 16
Fri Jul 13 13:35:28 2018 us=295275 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=295288 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 16 ]
Fri Jul 13 13:35:28 2018 us=295309 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=20 DATA len=100
Fri Jul 13 13:35:28 2018 us=295346 91.252.248.238:6400 ACK output sequence broken: [21] 17 18 19 20
Fri Jul 13 13:35:28 2018 us=404207 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404337 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 17 ]
Fri Jul 13 13:35:28 2018 us=404396 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=21 DATA len=100
Fri Jul 13 13:35:28 2018 us=404447 91.252.248.238:6400 ACK output sequence broken: [22] 21 18 19 20
Fri Jul 13 13:35:28 2018 us=404486 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=404501 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 18 ]
Fri Jul 13 13:35:28 2018 us=404526 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=22 DATA len=100
Fri Jul 13 13:35:28 2018 us=404574 91.252.248.238:6400 ACK output sequence broken: [23] 21 22 19 20
Fri Jul 13 13:35:28 2018 us=417715 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417801 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 19 ]
Fri Jul 13 13:35:28 2018 us=417851 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:28 2018 us=417891 91.252.248.238:6400 ACK output sequence broken: [24] 21 22 23 20
Fri Jul 13 13:35:28 2018 us=417922 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=417936 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 20 ]
Fri Jul 13 13:35:28 2018 us=417962 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=24 DATA len=100
Fri Jul 13 13:35:28 2018 us=418000 91.252.248.238:6400 ACK output sequence broken: [25] 21 22 23 24
Fri Jul 13 13:35:28 2018 us=533390 GET INST BY REAL: 91.252.248.238:6400 [succeeded]
Fri Jul 13 13:35:28 2018 us=533451 91.252.248.238:6400 UDPv4 READ [22] from [AF_INET]91.252.248.238:6400: P_ACK_V1 kid=0 [ 21 ]
Fri Jul 13 13:35:28 2018 us=533507 91.252.248.238:6400 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6400: P_CONTROL_V1 kid=0 [ ] pid=25 DATA len=100
Fri Jul 13 13:35:28 2018 us=533576 91.252.248.238:6400 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:28 2018 us=945522 91.252.248.238:6722 Re-using SSL/TLS context
Fri Jul 13 13:35:28 2018 us=945544 91.252.248.238:6722 LZO compression initialized
Fri Jul 13 13:35:28 2018 us=945551 91.252.248.238:6722 MTU DYNAMIC mtu=0, flags=1, 0 -> 138
Fri Jul 13 13:35:28 2018 us=945563 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945614 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945628 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945663 91.252.248.238:6722 PID packet_id_init seq_backtrack=64 time_backtrack=15
Fri Jul 13 13:35:28 2018 us=945678 91.252.248.238:6722 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 13:35:28 2018 us=945686 91.252.248.238:6722 MTU DYNAMIC mtu=1450, flags=2, 1542 -> 1450
Fri Jul 13 13:35:28 2018 us=945697 91.252.248.238:6722 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 13:35:28 2018 us=945729 91.252.248.238:6722 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 13:35:28 2018 us=945740 91.252.248.238:6722 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 13:35:28 2018 us=945786 91.252.248.238:6722 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 13:35:28 2018 us=945801 91.252.248.238:6722 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 13:35:28 2018 us=945825 91.252.248.238:6722 SENT PING
Fri Jul 13 13:35:28 2018 us=945843 91.252.248.238:6722 GET INST BY REAL: 91.252.248.238:6722 [created]
Fri Jul 13 13:35:28 2018 us=945967 91.252.248.238:6722 UDPv4 READ [14] from [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Fri Jul 13 13:35:28 2018 us=945991 91.252.248.238:6722 TLS: Initial packet from [AF_INET]91.252.248.238:6722, sid=eb02a63d a1b1755a
Fri Jul 13 13:35:28 2018 us=946021 91.252.248.238:6722 UDPv4 WRITE [26] to [AF_INET]91.252.248.238:6722: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Fri Jul 13 13:35:29 2018 us=44386 91.252.248.238:6529 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6529: P_CONTROL_V1 kid=0 [ ] pid=23 DATA len=100
Fri Jul 13 13:35:29 2018 us=44509 91.252.248.238:6529 ACK output sequence broken: [26] 25 22 23 24
Fri Jul 13 13:35:29 2018 us=45236 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45255 91.252.248.238:6722 UDPv4 READ [22] from [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 0 ]
Fri Jul 13 13:35:29 2018 us=45278 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=45288 91.252.248.238:6722 UDPv4 READ [114] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=45305 91.252.248.238:6722 UDPv4 WRITE [22] to [AF_INET]91.252.248.238:6722: P_ACK_V1 kid=0 [ 1 ]
Fri Jul 13 13:35:29 2018 us=55366 GET INST BY REAL: 91.252.248.238:6722 [succeeded]
Fri Jul 13 13:35:29 2018 us=55426 91.252.248.238:6722 UDPv4 READ [86] from [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=72
Fri Jul 13 13:35:29 2018 us=63990 91.252.248.238:6722 UDPv4 WRITE [126] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ 2 ] pid=1 DATA len=100
Fri Jul 13 13:35:29 2018 us=64141 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Fri Jul 13 13:35:29 2018 us=64202 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Fri Jul 13 13:35:29 2018 us=64240 91.252.248.238:6722 UDPv4 WRITE [114] to [AF_INET]91.252.248.238:6722: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Top

HomeBoard indexAll times are UTCDelete all board cookies Members The team

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: openvpn Client is not recognized by openvpn server

Post by TinCanTech » Fri Jul 13, 2018 1:40 pm

The log above is of no use ..
TinCanTech wrote:
Fri Jul 13, 2018 11:55 am
Please see:
HOWTO: Request Help !

etantonio
OpenVPN User
Posts: 29
Joined: Tue Jul 10, 2018 1:31 pm

Re: openvpn Client is not recognized by openvpn server

Post by etantonio » Fri Jul 13, 2018 2:13 pm

please excuse me,
here it the log at level 4 as required.
Antonio


Fri Jul 13 16:04:53 2018 us=779426 Current Parameter Settings:
Fri Jul 13 16:04:53 2018 us=779493 config = '/etc/openvpn/server.conf'
Fri Jul 13 16:04:53 2018 us=779504 mode = 1
Fri Jul 13 16:04:53 2018 us=779511 persist_config = DISABLED
Fri Jul 13 16:04:53 2018 us=779518 persist_mode = 1
Fri Jul 13 16:04:53 2018 us=779524 show_ciphers = DISABLED
Fri Jul 13 16:04:53 2018 us=779528 show_digests = DISABLED
Fri Jul 13 16:04:53 2018 us=779534 show_engines = DISABLED
Fri Jul 13 16:04:53 2018 us=779539 genkey = DISABLED
Fri Jul 13 16:04:53 2018 us=779542 key_pass_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779546 show_tls_ciphers = DISABLED
Fri Jul 13 16:04:53 2018 us=779551 Connection profiles [default]:
Fri Jul 13 16:04:53 2018 us=779556 proto = udp
Fri Jul 13 16:04:53 2018 us=779559 local = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779563 local_port = 1194
Fri Jul 13 16:04:53 2018 us=779566 remote = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779570 remote_port = 1194
Fri Jul 13 16:04:53 2018 us=779575 remote_float = DISABLED
Fri Jul 13 16:04:53 2018 us=779580 bind_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=779584 bind_local = ENABLED
Fri Jul 13 16:04:53 2018 us=779587 connect_retry_seconds = 5
Fri Jul 13 16:04:53 2018 us=779591 connect_timeout = 10
Fri Jul 13 16:04:53 2018 us=779595 connect_retry_max = 0
Fri Jul 13 16:04:53 2018 us=779601 socks_proxy_server = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779605 socks_proxy_port = 0
Fri Jul 13 16:04:53 2018 us=779608 socks_proxy_retry = DISABLED
Fri Jul 13 16:04:53 2018 us=779612 Connection profiles END
Fri Jul 13 16:04:53 2018 us=779615 remote_random = DISABLED
Fri Jul 13 16:04:53 2018 us=779619 ipchange = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779622 dev = 'tun'
Fri Jul 13 16:04:53 2018 us=779625 dev_type = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779629 dev_node = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779633 lladdr = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779637 topology = 1
Fri Jul 13 16:04:53 2018 us=779640 tun_ipv6 = DISABLED
Fri Jul 13 16:04:53 2018 us=779644 ifconfig_local = '10.8.0.1'
Fri Jul 13 16:04:53 2018 us=779647 ifconfig_remote_netmask = '10.8.0.2'
Fri Jul 13 16:04:53 2018 us=779651 ifconfig_noexec = DISABLED
Fri Jul 13 16:04:53 2018 us=779654 ifconfig_nowarn = DISABLED
Fri Jul 13 16:04:53 2018 us=779658 ifconfig_ipv6_local = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779661 ifconfig_ipv6_netbits = 0
Fri Jul 13 16:04:53 2018 us=779665 ifconfig_ipv6_remote = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=779668 shaper = 0
Fri Jul 13 16:04:53 2018 us=779672 tun_mtu = 1500
Fri Jul 13 16:04:53 2018 us=779675 tun_mtu_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=779678 link_mtu = 1500
Fri Jul 13 16:04:53 2018 us=779682 link_mtu_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=779685 tun_mtu_extra = 0
Fri Jul 13 16:04:53 2018 us=779689 tun_mtu_extra_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=779692 fragment = 0
Fri Jul 13 16:04:53 2018 us=779698 mtu_discover_type = -1
Fri Jul 13 16:04:53 2018 us=779703 mtu_test = 0
Fri Jul 13 16:04:53 2018 us=779707 mlock = DISABLED
Fri Jul 13 16:04:53 2018 us=779710 keepalive_ping = 10
Fri Jul 13 16:04:53 2018 us=779714 keepalive_timeout = 120
Fri Jul 13 16:04:53 2018 us=779717 inactivity_timeout = 0
Fri Jul 13 16:04:53 2018 us=779721 ping_send_timeout = 10
Fri Jul 13 16:04:53 2018 us=779724 ping_rec_timeout = 240
Fri Jul 13 16:04:53 2018 us=784336 ping_rec_timeout_action = 2
Fri Jul 13 16:04:53 2018 us=784347 ping_timer_remote = DISABLED
Fri Jul 13 16:04:53 2018 us=784351 remap_sigusr1 = 0
Fri Jul 13 16:04:53 2018 us=784355 explicit_exit_notification = 0
Fri Jul 13 16:04:53 2018 us=784360 persist_tun = ENABLED
Fri Jul 13 16:04:53 2018 us=784364 persist_local_ip = DISABLED
Fri Jul 13 16:04:53 2018 us=784367 persist_remote_ip = DISABLED
Fri Jul 13 16:04:53 2018 us=784371 persist_key = ENABLED
Fri Jul 13 16:04:53 2018 us=784375 mssfix = 1450
Fri Jul 13 16:04:53 2018 us=784381 passtos = DISABLED
Fri Jul 13 16:04:53 2018 us=784388 resolve_retry_seconds = 1000000000
Fri Jul 13 16:04:53 2018 us=784400 username = 'nobody'
Fri Jul 13 16:04:53 2018 us=784404 groupname = 'nogroup'
Fri Jul 13 16:04:53 2018 us=784410 chroot_dir = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784415 cd_dir = '/etc/openvpn'
Fri Jul 13 16:04:53 2018 us=784418 writepid = '/var/run/openvpn.server.pid'
Fri Jul 13 16:04:53 2018 us=784422 up_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784426 down_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784429 down_pre = DISABLED
Fri Jul 13 16:04:53 2018 us=784432 up_restart = DISABLED
Fri Jul 13 16:04:53 2018 us=784436 up_delay = DISABLED
Fri Jul 13 16:04:53 2018 us=784439 daemon = ENABLED
Fri Jul 13 16:04:53 2018 us=784443 inetd = 0
Fri Jul 13 16:04:53 2018 us=784446 log = ENABLED
Fri Jul 13 16:04:53 2018 us=784450 suppress_timestamps = DISABLED
Fri Jul 13 16:04:53 2018 us=784453 nice = 0
Fri Jul 13 16:04:53 2018 us=784457 verbosity = 4
Fri Jul 13 16:04:53 2018 us=784460 mute = 0
Fri Jul 13 16:04:53 2018 us=784464 gremlin = 0
Fri Jul 13 16:04:53 2018 us=784467 status_file = 'openvpn-status.log'
Fri Jul 13 16:04:53 2018 us=784471 status_file_version = 1
Fri Jul 13 16:04:53 2018 us=784475 status_file_update_freq = 60
Fri Jul 13 16:04:53 2018 us=784478 occ = ENABLED
Fri Jul 13 16:04:53 2018 us=784482 rcvbuf = 65536
Fri Jul 13 16:04:53 2018 us=784485 sndbuf = 65536
Fri Jul 13 16:04:53 2018 us=784488 sockflags = 0
Fri Jul 13 16:04:53 2018 us=784492 fast_io = DISABLED
Fri Jul 13 16:04:53 2018 us=784495 lzo = 7
Fri Jul 13 16:04:53 2018 us=784499 route_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784502 route_default_gateway = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784506 route_default_metric = 0
Fri Jul 13 16:04:53 2018 us=784510 route_noexec = DISABLED
Fri Jul 13 16:04:53 2018 us=784516 route_delay = 0
Fri Jul 13 16:04:53 2018 us=784522 route_delay_window = 30
Fri Jul 13 16:04:53 2018 us=784526 route_delay_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=784530 route_nopull = DISABLED
Fri Jul 13 16:04:53 2018 us=784533 route_gateway_via_dhcp = DISABLED
Fri Jul 13 16:04:53 2018 us=784537 max_routes = 100
Fri Jul 13 16:04:53 2018 us=784541 allow_pull_fqdn = DISABLED
Fri Jul 13 16:04:53 2018 us=784547 route 192.168.1.0/255.255.255.0/nil/nil
Fri Jul 13 16:04:53 2018 us=784551 route 192.168.2.0/255.255.255.0/nil/nil
Fri Jul 13 16:04:53 2018 us=784555 route 10.8.0.0/255.255.255.0/nil/nil
Fri Jul 13 16:04:53 2018 us=784559 management_addr = 'localhost'
Fri Jul 13 16:04:53 2018 us=784563 management_port = 7505
Fri Jul 13 16:04:53 2018 us=784566 management_user_pass = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784570 management_log_history_cache = 250
Fri Jul 13 16:04:53 2018 us=784574 management_echo_buffer_size = 100
Fri Jul 13 16:04:53 2018 us=784578 management_write_peer_info_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784581 management_client_user = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784585 management_client_group = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784589 management_flags = 0
Fri Jul 13 16:04:53 2018 us=784592 shared_secret_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784596 key_direction = 0
Fri Jul 13 16:04:53 2018 us=784600 ciphername_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=784603 ciphername = 'BF-CBC'
Fri Jul 13 16:04:53 2018 us=784607 authname_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=784610 authname = 'SHA1'
Fri Jul 13 16:04:53 2018 us=784614 prng_hash = 'SHA1'
Fri Jul 13 16:04:53 2018 us=784618 prng_nonce_secret_len = 16
Fri Jul 13 16:04:53 2018 us=784621 keysize = 0
Fri Jul 13 16:04:53 2018 us=784625 engine = DISABLED
Fri Jul 13 16:04:53 2018 us=784628 replay = ENABLED
Fri Jul 13 16:04:53 2018 us=784632 mute_replay_warnings = DISABLED
Fri Jul 13 16:04:53 2018 us=784636 replay_window = 64
Fri Jul 13 16:04:53 2018 us=784639 replay_time = 15
Fri Jul 13 16:04:53 2018 us=784643 packet_id_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784646 use_iv = ENABLED
Fri Jul 13 16:04:53 2018 us=784650 test_crypto = DISABLED
Fri Jul 13 16:04:53 2018 us=784656 tls_server = ENABLED
Fri Jul 13 16:04:53 2018 us=784660 tls_client = DISABLED
Fri Jul 13 16:04:53 2018 us=784664 key_method = 2
Fri Jul 13 16:04:53 2018 us=784667 ca_file = 'ca.crt'
Fri Jul 13 16:04:53 2018 us=784673 ca_path = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784679 dh_file = 'dh2048.pem'
Fri Jul 13 16:04:53 2018 us=784683 cert_file = 'server.crt'
Fri Jul 13 16:04:53 2018 us=784687 priv_key_file = 'server.key'
Fri Jul 13 16:04:53 2018 us=784690 pkcs12_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784694 cipher_list = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784698 tls_verify = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784704 tls_export_cert = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784708 tls_remote = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784711 crl_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784715 ns_cert_type = 0
Fri Jul 13 16:04:53 2018 us=784718 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784722 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784725 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784729 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784732 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784736 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784739 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784744 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784750 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784755 remote_cert_ku = 0
Fri Jul 13 16:04:53 2018 us=784759 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784762 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784766 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784769 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784772 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784776 remote_cert_ku[i] = 0
Fri Jul 13 16:04:53 2018 us=784779 remote_cert_eku = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784783 tls_timeout = 2
Fri Jul 13 16:04:53 2018 us=784786 renegotiate_bytes = 0
Fri Jul 13 16:04:53 2018 us=784790 renegotiate_packets = 0
Fri Jul 13 16:04:53 2018 us=784793 renegotiate_seconds = 3600
Fri Jul 13 16:04:53 2018 us=784797 handshake_window = 60
Fri Jul 13 16:04:53 2018 us=784800 transition_window = 3600
Fri Jul 13 16:04:53 2018 us=784804 single_session = DISABLED
Fri Jul 13 16:04:53 2018 us=784807 push_peer_info = DISABLED
Fri Jul 13 16:04:53 2018 us=784811 tls_exit = DISABLED
Fri Jul 13 16:04:53 2018 us=784814 tls_auth_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=784818 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784822 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784826 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784829 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784833 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784836 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784840 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784843 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784847 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784850 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784856 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784860 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784864 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784867 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784871 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784874 pkcs11_protected_authentication = DISABLED
Fri Jul 13 16:04:53 2018 us=784878 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784881 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784885 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784888 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784892 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784898 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784901 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784905 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784908 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784911 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784915 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784919 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784925 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784929 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784933 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784936 pkcs11_private_mode = 00000000
Fri Jul 13 16:04:53 2018 us=784939 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784943 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784947 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784953 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784956 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784960 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784963 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784967 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784970 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784973 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784977 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784980 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784984 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784988 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784994 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=784997 pkcs11_cert_private = DISABLED
Fri Jul 13 16:04:53 2018 us=785001 pkcs11_pin_cache_period = -1
Fri Jul 13 16:04:53 2018 us=785005 pkcs11_id = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785008 pkcs11_id_management = DISABLED
Fri Jul 13 16:04:53 2018 us=785014 server_network = 10.8.0.0
Fri Jul 13 16:04:53 2018 us=785018 server_netmask = 255.255.255.0
Fri Jul 13 16:04:53 2018 us=785029 server_network_ipv6 = ::
Fri Jul 13 16:04:53 2018 us=785036 server_netbits_ipv6 = 0
Fri Jul 13 16:04:53 2018 us=785042 server_bridge_ip = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785049 server_bridge_netmask = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785056 server_bridge_pool_start = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785063 server_bridge_pool_end = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785068 push_entry = 'route 192.168.1.0 255.255.255.0'
Fri Jul 13 16:04:53 2018 us=785072 push_entry = 'route 192.168.2.0 255.255.255.0'
Fri Jul 13 16:04:53 2018 us=785076 push_entry = 'redirect-gateway def1 bypass-dhcp'
Fri Jul 13 16:04:53 2018 us=785080 push_entry = 'dhcp-option DNS 208.67.222.222'
Fri Jul 13 16:04:53 2018 us=785084 push_entry = 'dhcp-option DNS 208.67.220.220'
Fri Jul 13 16:04:53 2018 us=785087 push_entry = 'route 10.8.0.1'
Fri Jul 13 16:04:53 2018 us=785091 push_entry = 'topology net30'
Fri Jul 13 16:04:53 2018 us=785095 push_entry = 'ping 10'
Fri Jul 13 16:04:53 2018 us=785100 push_entry = 'ping-restart 120'
Fri Jul 13 16:04:53 2018 us=785106 ifconfig_pool_defined = ENABLED
Fri Jul 13 16:04:53 2018 us=785110 ifconfig_pool_start = 10.8.0.4
Fri Jul 13 16:04:53 2018 us=785114 ifconfig_pool_end = 10.8.0.251
Fri Jul 13 16:04:53 2018 us=785118 ifconfig_pool_netmask = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785122 ifconfig_pool_persist_filename = 'ipp.txt'
Fri Jul 13 16:04:53 2018 us=785126 ifconfig_pool_persist_refresh_freq = 600
Fri Jul 13 16:04:53 2018 us=785129 ifconfig_ipv6_pool_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=785133 ifconfig_ipv6_pool_base = ::
Fri Jul 13 16:04:53 2018 us=785137 ifconfig_ipv6_pool_netbits = 0
Fri Jul 13 16:04:53 2018 us=785141 n_bcast_buf = 256
Fri Jul 13 16:04:53 2018 us=785144 tcp_queue_limit = 64
Fri Jul 13 16:04:53 2018 us=785148 real_hash_size = 256
Fri Jul 13 16:04:53 2018 us=785151 virtual_hash_size = 256
Fri Jul 13 16:04:53 2018 us=785157 client_connect_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785161 learn_address_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785165 client_disconnect_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785168 client_config_dir = '/etc/openvpn/ccd'
Fri Jul 13 16:04:53 2018 us=785172 ccd_exclusive = DISABLED
Fri Jul 13 16:04:53 2018 us=785176 tmp_dir = '/tmp'
Fri Jul 13 16:04:53 2018 us=785179 push_ifconfig_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=785183 push_ifconfig_local = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785190 push_ifconfig_remote_netmask = 0.0.0.0
Fri Jul 13 16:04:53 2018 us=785196 push_ifconfig_ipv6_defined = DISABLED
Fri Jul 13 16:04:53 2018 us=785201 push_ifconfig_ipv6_local = ::/0
Fri Jul 13 16:04:53 2018 us=785205 push_ifconfig_ipv6_remote = ::
Fri Jul 13 16:04:53 2018 us=785208 enable_c2c = DISABLED
Fri Jul 13 16:04:53 2018 us=785212 duplicate_cn = DISABLED
Fri Jul 13 16:04:53 2018 us=785256 cf_max = 0
Fri Jul 13 16:04:53 2018 us=785264 cf_per = 0
Fri Jul 13 16:04:53 2018 us=785268 max_clients = 1024
Fri Jul 13 16:04:53 2018 us=785271 max_routes_per_client = 256
Fri Jul 13 16:04:53 2018 us=785275 auth_user_pass_verify_script = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785279 auth_user_pass_verify_script_via_file = DISABLED
Fri Jul 13 16:04:53 2018 us=785284 ssl_flags = 0
Fri Jul 13 16:04:53 2018 us=785290 port_share_host = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785294 port_share_port = 0
Fri Jul 13 16:04:53 2018 us=785298 client = DISABLED
Fri Jul 13 16:04:53 2018 us=785303 pull = DISABLED
Fri Jul 13 16:04:53 2018 us=785309 auth_user_pass_file = '[UNDEF]'
Fri Jul 13 16:04:53 2018 us=785314 OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Dec 1 2014
Fri Jul 13 16:04:53 2018 us=785574 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7505
Fri Jul 13 16:04:53 2018 us=785708 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Fri Jul 13 16:04:53 2018 us=815928 Diffie-Hellman initialized with 2048 bit key
Fri Jul 13 16:04:53 2018 us=863767 TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:04:53 2018 us=863798 Socket Buffers: R=[229376->131072] S=[229376->131072]
Fri Jul 13 16:04:53 2018 us=863893 ROUTE default_gateway=31.14.138.1
Fri Jul 13 16:04:53 2018 us=868525 TUN/TAP device tun0 opened
Fri Jul 13 16:04:53 2018 us=868556 TUN/TAP TX queue length set to 100
Fri Jul 13 16:04:53 2018 us=868572 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Jul 13 16:04:53 2018 us=868593 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Fri Jul 13 16:04:53 2018 us=875631 /sbin/route add -net 192.168.1.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 16:04:53 2018 us=886319 /sbin/route add -net 192.168.2.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 16:04:53 2018 us=891963 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
Fri Jul 13 16:04:53 2018 us=898421 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:04:53 2018 us=973581 GID set to nogroup
Fri Jul 13 16:04:53 2018 us=973630 UID set to nobody
Fri Jul 13 16:04:53 2018 us=973650 UDPv4 link local (bound): [undef]
Fri Jul 13 16:04:53 2018 us=973656 UDPv4 link remote: [undef]
Fri Jul 13 16:04:53 2018 us=973664 MULTI: multi_init called, r=256 v=256
Fri Jul 13 16:04:53 2018 us=973714 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Fri Jul 13 16:04:53 2018 us=973970 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=973996 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974002 ifconfig_pool_read(), in='client1,10.8.0.8', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974006 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974011 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.12', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974017 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974022 ifconfig_pool_read(), in='clientTerlizzi,10.8.0.16', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974032 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974037 ifconfig_pool_read(), in='clientCorato,10.8.0.20', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974041 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974044 ifconfig_pool_read(), in='clientGenius,10.8.0.24', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974049 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974053 ifconfig_pool_read(), in='clientGenius,10.8.0.28', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974057 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974061 ifconfig_pool_read(), in='clientFormello,10.8.0.32', TODO: IPv6
Fri Jul 13 16:04:53 2018 us=974065 succeeded -> ifconfig_pool_set()
Fri Jul 13 16:04:53 2018 us=974075 IFCONFIG POOL LIST
Fri Jul 13 16:04:53 2018 us=974084 client1,10.8.0.4
Fri Jul 13 16:04:53 2018 us=974089 client1,10.8.0.8
Fri Jul 13 16:04:53 2018 us=974093 clientTerlizzi,10.8.0.12
Fri Jul 13 16:04:53 2018 us=974098 clientTerlizzi,10.8.0.16
Fri Jul 13 16:04:53 2018 us=974102 clientCorato,10.8.0.20
Fri Jul 13 16:04:53 2018 us=974106 clientGenius,10.8.0.24
Fri Jul 13 16:04:53 2018 us=974110 clientGenius,10.8.0.28
Fri Jul 13 16:04:53 2018 us=974114 clientFormello,10.8.0.32
Fri Jul 13 16:04:53 2018 us=974144 Initialization Sequence Completed
Fri Jul 13 16:05:01 2018 us=312358 MULTI: multi_create_instance called
Fri Jul 13 16:05:01 2018 us=312423 91.252.248.238:7105 Re-using SSL/TLS context
Fri Jul 13 16:05:01 2018 us=312456 91.252.248.238:7105 LZO compression initialized
Fri Jul 13 16:05:01 2018 us=312598 91.252.248.238:7105 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:01 2018 us=312610 91.252.248.238:7105 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:01 2018 us=312642 91.252.248.238:7105 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:01 2018 us=312648 91.252.248.238:7105 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:01 2018 us=312661 91.252.248.238:7105 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:01 2018 us=312669 91.252.248.238:7105 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:01 2018 us=312695 91.252.248.238:7105 TLS: Initial packet from [AF_INET]91.252.248.238:7105, sid=4d82684d 26d258ec
Fri Jul 13 16:05:03 2018 us=182433 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:03 2018 us=262142 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:05 2018 us=179477 MULTI: multi_create_instance called
Fri Jul 13 16:05:05 2018 us=179541 91.252.248.238:6336 Re-using SSL/TLS context
Fri Jul 13 16:05:05 2018 us=179566 91.252.248.238:6336 LZO compression initialized
Fri Jul 13 16:05:05 2018 us=179653 91.252.248.238:6336 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:05 2018 us=179666 91.252.248.238:6336 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:05 2018 us=179691 91.252.248.238:6336 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:05 2018 us=179697 91.252.248.238:6336 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:05 2018 us=179708 91.252.248.238:6336 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:05 2018 us=179717 91.252.248.238:6336 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:05 2018 us=179737 91.252.248.238:6336 TLS: Initial packet from [AF_INET]91.252.248.238:6336, sid=de086851 4f182ae6
Fri Jul 13 16:05:05 2018 us=945528 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:06 2018 us=226121 read UDPv4 [ECONNREFUSED|ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:07 2018 us=566354 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:07 2018 us=840020 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:07 2018 us=860551 MULTI: multi_create_instance called
Fri Jul 13 16:05:07 2018 us=860609 91.252.248.238:6405 Re-using SSL/TLS context
Fri Jul 13 16:05:07 2018 us=860628 91.252.248.238:6405 LZO compression initialized
Fri Jul 13 16:05:07 2018 us=860698 91.252.248.238:6405 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:07 2018 us=860707 91.252.248.238:6405 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:07 2018 us=860731 91.252.248.238:6405 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:07 2018 us=860736 91.252.248.238:6405 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:07 2018 us=860747 91.252.248.238:6405 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:07 2018 us=860754 91.252.248.238:6405 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:07 2018 us=860773 91.252.248.238:6405 TLS: Initial packet from [AF_INET]91.252.248.238:6405, sid=eea32e09 2055592f
Fri Jul 13 16:05:08 2018 us=263354 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:08 2018 us=686719 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:08 2018 us=966114 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:09 2018 us=565743 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:10 2018 us=601928 MULTI: multi_create_instance called
Fri Jul 13 16:05:10 2018 us=601996 91.252.248.238:6914 Re-using SSL/TLS context
Fri Jul 13 16:05:10 2018 us=602016 91.252.248.238:6914 LZO compression initialized
Fri Jul 13 16:05:10 2018 us=602086 91.252.248.238:6914 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:10 2018 us=602098 91.252.248.238:6914 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:10 2018 us=602122 91.252.248.238:6914 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:10 2018 us=602128 91.252.248.238:6914 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:10 2018 us=602138 91.252.248.238:6914 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:10 2018 us=602146 91.252.248.238:6914 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:10 2018 us=602165 91.252.248.238:6914 TLS: Initial packet from [AF_INET]91.252.248.238:6914, sid=9f85b15f 17f9f80f
Fri Jul 13 16:05:10 2018 us=738332 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:11 2018 us=171986 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:12 2018 us=514723 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:13 2018 us=394387 MULTI: multi_create_instance called
Fri Jul 13 16:05:13 2018 us=394455 91.252.248.238:6849 Re-using SSL/TLS context
Fri Jul 13 16:05:13 2018 us=394474 91.252.248.238:6849 LZO compression initialized
Fri Jul 13 16:05:13 2018 us=394546 91.252.248.238:6849 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:13 2018 us=394555 91.252.248.238:6849 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:13 2018 us=394579 91.252.248.238:6849 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:13 2018 us=394585 91.252.248.238:6849 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:13 2018 us=394602 91.252.248.238:6849 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:13 2018 us=394610 91.252.248.238:6849 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:13 2018 us=394629 91.252.248.238:6849 TLS: Initial packet from [AF_INET]91.252.248.238:6849, sid=2ecca58e 31b46d00
Fri Jul 13 16:05:13 2018 us=562469 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:14 2018 us=35355 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:15 2018 us=577297 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:16 2018 us=179214 MULTI: multi_create_instance called
Fri Jul 13 16:05:16 2018 us=179276 91.252.248.238:6273 Re-using SSL/TLS context
Fri Jul 13 16:05:16 2018 us=179297 91.252.248.238:6273 LZO compression initialized
Fri Jul 13 16:05:16 2018 us=179364 91.252.248.238:6273 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:16 2018 us=179373 91.252.248.238:6273 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:16 2018 us=179398 91.252.248.238:6273 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:16 2018 us=179404 91.252.248.238:6273 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:16 2018 us=179414 91.252.248.238:6273 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:16 2018 us=179422 91.252.248.238:6273 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:16 2018 us=179444 91.252.248.238:6273 TLS: Initial packet from [AF_INET]91.252.248.238:6273, sid=1418c793 b77e4189
Fri Jul 13 16:05:16 2018 us=299343 91.252.248.238:6273 write UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:17 2018 us=894483 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:17 2018 us=983641 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:20 2018 us=125493 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:20 2018 us=226266 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:20 2018 us=761776 MULTI: multi_create_instance called
Fri Jul 13 16:05:20 2018 us=761838 91.252.248.238:6977 Re-using SSL/TLS context
Fri Jul 13 16:05:20 2018 us=761858 91.252.248.238:6977 LZO compression initialized
Fri Jul 13 16:05:20 2018 us=761935 91.252.248.238:6977 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:20 2018 us=761945 91.252.248.238:6977 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:20 2018 us=761972 91.252.248.238:6977 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:20 2018 us=761978 91.252.248.238:6977 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:20 2018 us=761989 91.252.248.238:6977 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:20 2018 us=761996 91.252.248.238:6977 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:20 2018 us=762017 91.252.248.238:6977 TLS: Initial packet from [AF_INET]91.252.248.238:6977, sid=8799ad62 fb170db2
Fri Jul 13 16:05:21 2018 us=446774 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:22 2018 us=67549 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:23 2018 us=225731 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:23 2018 us=830772 MULTI: multi_create_instance called
Fri Jul 13 16:05:23 2018 us=830852 91.252.248.238:6529 Re-using SSL/TLS context
Fri Jul 13 16:05:23 2018 us=830882 91.252.248.238:6529 LZO compression initialized
Fri Jul 13 16:05:23 2018 us=830951 91.252.248.238:6529 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:23 2018 us=830960 91.252.248.238:6529 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:23 2018 us=830995 91.252.248.238:6529 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:23 2018 us=831001 91.252.248.238:6529 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:23 2018 us=831012 91.252.248.238:6529 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:23 2018 us=831019 91.252.248.238:6529 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:23 2018 us=831040 91.252.248.238:6529 TLS: Initial packet from [AF_INET]91.252.248.238:6529, sid=b6699ad1 d9e1a5f7
Fri Jul 13 16:05:24 2018 us=262829 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:25 2018 us=199120 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:26 2018 us=299887 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:26 2018 us=752448 MULTI: multi_create_instance called
Fri Jul 13 16:05:26 2018 us=752523 91.252.248.238:6979 Re-using SSL/TLS context
Fri Jul 13 16:05:26 2018 us=752547 91.252.248.238:6979 LZO compression initialized
Fri Jul 13 16:05:26 2018 us=752636 91.252.248.238:6979 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:26 2018 us=752647 91.252.248.238:6979 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:26 2018 us=752673 91.252.248.238:6979 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:26 2018 us=752679 91.252.248.238:6979 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:26 2018 us=752690 91.252.248.238:6979 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:26 2018 us=752697 91.252.248.238:6979 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:26 2018 us=752718 91.252.248.238:6979 TLS: Initial packet from [AF_INET]91.252.248.238:6979, sid=1667e0cb fa86d6fe
Fri Jul 13 16:05:27 2018 us=343183 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:28 2018 us=292540 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:29 2018 us=243842 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:29 2018 us=762102 MULTI: multi_create_instance called
Fri Jul 13 16:05:29 2018 us=762170 91.252.248.238:6851 Re-using SSL/TLS context
Fri Jul 13 16:05:29 2018 us=762193 91.252.248.238:6851 LZO compression initialized
Fri Jul 13 16:05:29 2018 us=762307 91.252.248.238:6851 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:29 2018 us=762318 91.252.248.238:6851 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:29 2018 us=762346 91.252.248.238:6851 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:29 2018 us=762352 91.252.248.238:6851 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:29 2018 us=762363 91.252.248.238:6851 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:29 2018 us=762371 91.252.248.238:6851 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:29 2018 us=762392 91.252.248.238:6851 TLS: Initial packet from [AF_INET]91.252.248.238:6851, sid=2169363a fe1c8d78
Fri Jul 13 16:05:30 2018 us=185047 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:31 2018 us=36903 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:32 2018 us=183273 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:32 2018 us=685018 MULTI: multi_create_instance called
Fri Jul 13 16:05:32 2018 us=685078 91.252.248.238:7042 Re-using SSL/TLS context
Fri Jul 13 16:05:32 2018 us=685097 91.252.248.238:7042 LZO compression initialized
Fri Jul 13 16:05:32 2018 us=685163 91.252.248.238:7042 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:32 2018 us=685172 91.252.248.238:7042 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:32 2018 us=685197 91.252.248.238:7042 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:32 2018 us=685203 91.252.248.238:7042 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:32 2018 us=685214 91.252.248.238:7042 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:32 2018 us=685222 91.252.248.238:7042 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:32 2018 us=685243 91.252.248.238:7042 TLS: Initial packet from [AF_INET]91.252.248.238:7042, sid=bbecfea3 5cdf4489
Fri Jul 13 16:05:33 2018 us=642040 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:34 2018 us=91768 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:35 2018 us=167265 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:35 2018 us=589663 MULTI: multi_create_instance called
Fri Jul 13 16:05:35 2018 us=589720 91.252.248.238:6144 Re-using SSL/TLS context
Fri Jul 13 16:05:35 2018 us=589744 91.252.248.238:6144 LZO compression initialized
Fri Jul 13 16:05:35 2018 us=589811 91.252.248.238:6144 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:35 2018 us=589821 91.252.248.238:6144 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:35 2018 us=589847 91.252.248.238:6144 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:35 2018 us=589853 91.252.248.238:6144 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:35 2018 us=589864 91.252.248.238:6144 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:35 2018 us=589871 91.252.248.238:6144 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:35 2018 us=589892 91.252.248.238:6144 TLS: Initial packet from [AF_INET]91.252.248.238:6144, sid=6fac5cb6 455de89d
Fri Jul 13 16:05:36 2018 us=76623 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:37 2018 us=56768 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:38 2018 us=202441 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:38 2018 us=585379 MULTI: multi_create_instance called
Fri Jul 13 16:05:38 2018 us=585449 91.252.248.238:6145 Re-using SSL/TLS context
Fri Jul 13 16:05:38 2018 us=585473 91.252.248.238:6145 LZO compression initialized
Fri Jul 13 16:05:38 2018 us=585566 91.252.248.238:6145 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:38 2018 us=585576 91.252.248.238:6145 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:38 2018 us=585604 91.252.248.238:6145 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:38 2018 us=585610 91.252.248.238:6145 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:38 2018 us=585630 91.252.248.238:6145 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:38 2018 us=585639 91.252.248.238:6145 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:38 2018 us=585660 91.252.248.238:6145 TLS: Initial packet from [AF_INET]91.252.248.238:6145, sid=9819fb47 fc2b2dc6
Fri Jul 13 16:05:39 2018 us=162085 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:40 2018 us=276396 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:41 2018 us=157674 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:41 2018 us=431687 MULTI: multi_create_instance called
Fri Jul 13 16:05:41 2018 us=431754 91.252.248.238:6531 Re-using SSL/TLS context
Fri Jul 13 16:05:41 2018 us=431774 91.252.248.238:6531 LZO compression initialized
Fri Jul 13 16:05:41 2018 us=431841 91.252.248.238:6531 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:41 2018 us=431850 91.252.248.238:6531 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:41 2018 us=431875 91.252.248.238:6531 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:41 2018 us=431881 91.252.248.238:6531 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:41 2018 us=431891 91.252.248.238:6531 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:41 2018 us=431899 91.252.248.238:6531 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:41 2018 us=431922 91.252.248.238:6531 TLS: Initial packet from [AF_INET]91.252.248.238:6531, sid=a8eba190 7923d023
Fri Jul 13 16:05:42 2018 us=191695 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:43 2018 us=184536 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:44 2018 us=365515 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:44 2018 us=442695 MULTI: multi_create_instance called
Fri Jul 13 16:05:44 2018 us=442754 91.252.248.238:6338 Re-using SSL/TLS context
Fri Jul 13 16:05:44 2018 us=442773 91.252.248.238:6338 LZO compression initialized
Fri Jul 13 16:05:44 2018 us=442842 91.252.248.238:6338 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:44 2018 us=442851 91.252.248.238:6338 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:44 2018 us=442886 91.252.248.238:6338 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:44 2018 us=442893 91.252.248.238:6338 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:44 2018 us=442903 91.252.248.238:6338 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:44 2018 us=442911 91.252.248.238:6338 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:44 2018 us=442935 91.252.248.238:6338 TLS: Initial packet from [AF_INET]91.252.248.238:6338, sid=9961c480 7b685ae0
Fri Jul 13 16:05:45 2018 us=163288 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:46 2018 us=566252 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:47 2018 us=237915 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:47 2018 us=342979 MULTI: multi_create_instance called
Fri Jul 13 16:05:47 2018 us=343040 91.252.248.238:6785 Re-using SSL/TLS context
Fri Jul 13 16:05:47 2018 us=343059 91.252.248.238:6785 LZO compression initialized
Fri Jul 13 16:05:47 2018 us=343128 91.252.248.238:6785 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:47 2018 us=343144 91.252.248.238:6785 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:47 2018 us=343172 91.252.248.238:6785 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:47 2018 us=343180 91.252.248.238:6785 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:47 2018 us=343191 91.252.248.238:6785 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:47 2018 us=343199 91.252.248.238:6785 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:47 2018 us=343225 91.252.248.238:6785 TLS: Initial packet from [AF_INET]91.252.248.238:6785, sid=ddad2f48 d843201b
Fri Jul 13 16:05:48 2018 us=156426 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:49 2018 us=157262 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:50 2018 us=172763 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:50 2018 us=297472 MULTI: multi_create_instance called
Fri Jul 13 16:05:50 2018 us=297544 91.252.248.238:6912 Re-using SSL/TLS context
Fri Jul 13 16:05:50 2018 us=297569 91.252.248.238:6912 LZO compression initialized
Fri Jul 13 16:05:50 2018 us=297636 91.252.248.238:6912 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:50 2018 us=297645 91.252.248.238:6912 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:50 2018 us=297670 91.252.248.238:6912 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:50 2018 us=297678 91.252.248.238:6912 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:50 2018 us=297690 91.252.248.238:6912 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:50 2018 us=297697 91.252.248.238:6912 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:50 2018 us=297719 91.252.248.238:6912 TLS: Initial packet from [AF_INET]91.252.248.238:6912, sid=4462447f 22760f74
Fri Jul 13 16:05:51 2018 us=146162 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:52 2018 us=738072 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:53 2018 us=21884 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:53 2018 us=446375 MULTI: multi_create_instance called
Fri Jul 13 16:05:53 2018 us=446442 91.252.248.238:6337 Re-using SSL/TLS context
Fri Jul 13 16:05:53 2018 us=446461 91.252.248.238:6337 LZO compression initialized
Fri Jul 13 16:05:53 2018 us=446532 91.252.248.238:6337 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:53 2018 us=446542 91.252.248.238:6337 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:53 2018 us=446569 91.252.248.238:6337 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:53 2018 us=446575 91.252.248.238:6337 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:53 2018 us=446586 91.252.248.238:6337 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:53 2018 us=446594 91.252.248.238:6337 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:53 2018 us=446617 91.252.248.238:6337 TLS: Initial packet from [AF_INET]91.252.248.238:6337, sid=3cff633d e1b30229
Fri Jul 13 16:05:54 2018 us=142131 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:55 2018 us=37582 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:56 2018 us=35240 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:56 2018 us=397207 MULTI: multi_create_instance called
Fri Jul 13 16:05:56 2018 us=397274 91.252.248.238:6658 Re-using SSL/TLS context
Fri Jul 13 16:05:56 2018 us=397292 91.252.248.238:6658 LZO compression initialized
Fri Jul 13 16:05:56 2018 us=397358 91.252.248.238:6658 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:56 2018 us=397369 91.252.248.238:6658 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:56 2018 us=397397 91.252.248.238:6658 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:56 2018 us=397403 91.252.248.238:6658 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:56 2018 us=397414 91.252.248.238:6658 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:56 2018 us=397421 91.252.248.238:6658 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:56 2018 us=397444 91.252.248.238:6658 TLS: Initial packet from [AF_INET]91.252.248.238:6658, sid=e5ea8765 5c3934ad
Fri Jul 13 16:05:57 2018 us=153885 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:58 2018 us=224576 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:59 2018 us=94022 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:05:59 2018 us=378649 MULTI: multi_create_instance called
Fri Jul 13 16:05:59 2018 us=378717 91.252.248.238:6721 Re-using SSL/TLS context
Fri Jul 13 16:05:59 2018 us=378736 91.252.248.238:6721 LZO compression initialized
Fri Jul 13 16:05:59 2018 us=378803 91.252.248.238:6721 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:05:59 2018 us=378812 91.252.248.238:6721 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:05:59 2018 us=378835 91.252.248.238:6721 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:05:59 2018 us=378840 91.252.248.238:6721 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:05:59 2018 us=378851 91.252.248.238:6721 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:05:59 2018 us=378858 91.252.248.238:6721 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:05:59 2018 us=378880 91.252.248.238:6721 TLS: Initial packet from [AF_INET]91.252.248.238:6721, sid=f5573076 fc137172
Fri Jul 13 16:06:00 2018 us=188878 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:01 2018 us=254133 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:01 2018 us=513314 91.252.248.238:7105 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:01 2018 us=513352 91.252.248.238:7105 TLS Error: TLS handshake failed
Fri Jul 13 16:06:01 2018 us=513463 91.252.248.238:7105 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:02 2018 us=214846 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:02 2018 us=303625 MULTI: multi_create_instance called
Fri Jul 13 16:06:02 2018 us=303748 91.252.248.238:6916 Re-using SSL/TLS context
Fri Jul 13 16:06:02 2018 us=303779 91.252.248.238:6916 LZO compression initialized
Fri Jul 13 16:06:02 2018 us=303857 91.252.248.238:6916 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:02 2018 us=303872 91.252.248.238:6916 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:02 2018 us=303906 91.252.248.238:6916 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:02 2018 us=303926 91.252.248.238:6916 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:02 2018 us=303938 91.252.248.238:6916 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:02 2018 us=303946 91.252.248.238:6916 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:02 2018 us=303969 91.252.248.238:6916 TLS: Initial packet from [AF_INET]91.252.248.238:6916, sid=41a6a340 2628202d
Fri Jul 13 16:06:03 2018 us=152369 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:04 2018 us=146530 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:05 2018 us=45529 91.252.248.238:6336 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:05 2018 us=45566 91.252.248.238:6336 TLS Error: TLS handshake failed
Fri Jul 13 16:06:05 2018 us=45658 91.252.248.238:6336 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:05 2018 us=230947 MULTI: multi_create_instance called
Fri Jul 13 16:06:05 2018 us=231005 91.252.248.238:6275 Re-using SSL/TLS context
Fri Jul 13 16:06:05 2018 us=231027 91.252.248.238:6275 LZO compression initialized
Fri Jul 13 16:06:05 2018 us=231084 91.252.248.238:6275 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:05 2018 us=231092 91.252.248.238:6275 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:05 2018 us=231114 91.252.248.238:6275 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:05 2018 us=231119 91.252.248.238:6275 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:05 2018 us=231130 91.252.248.238:6275 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:05 2018 us=231137 91.252.248.238:6275 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:05 2018 us=231160 91.252.248.238:6275 TLS: Initial packet from [AF_INET]91.252.248.238:6275, sid=b7383f6b 7978ca7e
Fri Jul 13 16:06:05 2018 us=562156 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:06 2018 us=142288 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:07 2018 us=6288 91.252.248.238:6405 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:07 2018 us=6323 91.252.248.238:6405 TLS Error: TLS handshake failed
Fri Jul 13 16:06:07 2018 us=6388 91.252.248.238:6405 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:07 2018 us=487831 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:08 2018 us=196620 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:08 2018 us=433454 MULTI: multi_create_instance called
Fri Jul 13 16:06:08 2018 us=433506 91.252.248.238:6787 Re-using SSL/TLS context
Fri Jul 13 16:06:08 2018 us=433528 91.252.248.238:6787 LZO compression initialized
Fri Jul 13 16:06:08 2018 us=433585 91.252.248.238:6787 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:08 2018 us=433594 91.252.248.238:6787 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:08 2018 us=433617 91.252.248.238:6787 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:08 2018 us=433624 91.252.248.238:6787 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:08 2018 us=433634 91.252.248.238:6787 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:08 2018 us=433642 91.252.248.238:6787 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:08 2018 us=433672 91.252.248.238:6787 TLS: Initial packet from [AF_INET]91.252.248.238:6787, sid=2c3a7a75 6b5bcdf2
Fri Jul 13 16:06:09 2018 us=175549 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:10 2018 us=203649 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:10 2018 us=360796 91.252.248.238:6914 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Jul 13 16:06:10 2018 us=360845 91.252.248.238:6914 TLS Error: TLS handshake failed
Fri Jul 13 16:06:10 2018 us=360939 91.252.248.238:6914 SIGUSR1[soft,tls-error] received, client-instance restarting
Fri Jul 13 16:06:11 2018 us=112266 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:11 2018 us=376918 MULTI: multi_create_instance called
Fri Jul 13 16:06:11 2018 us=376981 91.252.248.238:6530 Re-using SSL/TLS context
Fri Jul 13 16:06:11 2018 us=377006 91.252.248.238:6530 LZO compression initialized
Fri Jul 13 16:06:11 2018 us=377065 91.252.248.238:6530 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Fri Jul 13 16:06:11 2018 us=377074 91.252.248.238:6530 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Fri Jul 13 16:06:11 2018 us=377097 91.252.248.238:6530 Local Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Fri Jul 13 16:06:11 2018 us=377102 91.252.248.238:6530 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Fri Jul 13 16:06:11 2018 us=377114 91.252.248.238:6530 Local Options hash (VER=V4): '530fdded'
Fri Jul 13 16:06:11 2018 us=377122 91.252.248.238:6530 Expected Remote Options hash (VER=V4): '41690919'
Fri Jul 13 16:06:11 2018 us=377147 91.252.248.238:6530 TLS: Initial packet from [AF_INET]91.252.248.238:6530, sid=ed435d77 195bd419
Fri Jul 13 16:06:12 2018 us=178830 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Fri Jul 13 16:06:13 2018 us=304948 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: openvpn Client is not recognized by openvpn server

Post by TinCanTech » Fri Jul 13, 2018 2:51 pm

Please post your server configuration file.

etantonio
OpenVPN User
Posts: 29
Joined: Tue Jul 10, 2018 1:31 pm

Re: openvpn Client is not recognized by openvpn server

Post by etantonio » Fri Jul 13, 2018 8:32 pm

[oconf=]#################################################
# Sample OpenVPN 2.0 config file for #
# multi-client server. #
# #
# This file is for the server side #
# of a many-clients <-> one-server #
# OpenVPN configuration. #
# #
# OpenVPN also supports #
# single-machine <-> single-machine #
# configurations (See the Examples page #
# on the web site for more info). #
# #
# This config should work on Windows #
# or Linux/BSD systems. Remember on #
# Windows to quote pathnames and use #
# double backslashes, e.g.: #
# "C:\\Program Files\\OpenVPN\\config\\foo.key" #
# #
# Comments are preceded with '#' or ';' #
#################################################

# Which local IP address should OpenVPN
# listen on? (optional)
;local a.b.c.d

# Which TCP/UDP port should OpenVPN listen on?
# If you want to run multiple OpenVPN instances
# on the same machine, use a different port
# number for each one. You will need to
# open up this port on your firewall.
port 1194

# TCP or UDP server?
;proto tcp
proto udp

# "dev tun" will create a routed IP tunnel,
# "dev tap" will create an ethernet tunnel.
# Use "dev tap0" if you are ethernet bridging
# and have precreated a tap0 virtual interface
# and bridged it with your ethernet interface.
# If you want to control access policies
# over the VPN, you must create firewall
# rules for the the TUN/TAP interface.
# On non-Windows systems, you can give
# an explicit unit number, such as tun0.
# On Windows, use "dev-node" for this.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun

# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel if you
# have more than one. On XP SP2 or higher,
# you may need to selectively disable the
# Windows firewall for the TAP adapter.
# Non-Windows systems usually don't need this.
;dev-node MyTap

# SSL/TLS root certificate (ca), certificate
# (cert), and private key (key). Each client
# and the server must have their own cert and
# key file. The server and all clients will
# use the same ca file.
#
# See the "easy-rsa" directory for a series
# of scripts for generating RSA certificates
# and private keys. Remember to use
# a unique Common Name for the server
# and each of the client certificates.
#
# Any X509 key management system can be used.
# OpenVPN can also use a PKCS #12 formatted key file
# (see "pkcs12" directive in man page).
ca ca.crt
cert server.crt
key server.key # This file should be kept secret

# Diffie hellman parameters.
# Generate your own with:
# openssl dhparam -out dh1024.pem 1024
# Substitute 2048 for 1024 if you are using
# 2048 bit keys.
dh dh2048.pem

# Configure server mode and supply a VPN subnet
# for OpenVPN to draw client addresses from.
# The server will take 10.8.0.1 for itself,
# the rest will be made available to clients.
# Each client will be able to reach the server
# on 10.8.0.1. Comment this line out if you are
# ethernet bridging. See the man page for more info.
server 10.8.0.0 255.255.255.0

# Maintain a record of client <-> virtual IP address
# associations in this file. If OpenVPN goes down or
# is restarted, reconnecting clients can be assigned
# the same virtual IP address from the pool that was
# previously assigned.
ifconfig-pool-persist ipp.txt

# Configure server mode for ethernet bridging.
# You must first use your OS's bridging capability
# to bridge the TAP interface with the ethernet
# NIC interface. Then you must manually set the
# IP/netmask on the bridge interface, here we
# assume 10.8.0.4/255.255.255.0. Finally we
# must set aside an IP range in this subnet
# (start=10.8.0.50 end=10.8.0.100) to allocate
# to connecting clients. Leave this line commented
# out unless you are ethernet bridging.
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100

# Configure server mode for ethernet bridging
# using a DHCP-proxy, where clients talk
# to the OpenVPN server-side DHCP server
# to receive their IP address allocation
# and DNS server addresses. You must first use
# your OS's bridging capability to bridge the TAP
# interface with the ethernet NIC interface.
# Note: this mode only works on clients (such as
# Windows), where the client-side TAP adapter is
# bound to a DHCP client.
;server-bridge

# Push routes to the client to allow it
# to reach other private subnets behind
# the server. Remember that these
# private subnets will also need
# to know to route the OpenVPN client
# address pool (10.8.0.0/255.255.255.0)
# back to the OpenVPN server.
push "route 192.168.1.0 255.255.255.0"
push "route 192.168.2.0 255.255.255.0"
;push "route 192.168.3.0 255.255.255.0"

# To assign specific IP addresses to specific
# clients or if a connecting client has a private
# subnet behind it that should also have VPN access,
# use the subdirectory "ccd" for client-specific
# configuration files (see man page for more info).

# EXAMPLE: Suppose the client
# having the certificate common name "Thelonious"
# also has a small subnet behind his connecting
# machine, such as 192.168.40.128/255.255.255.248.
# First, uncomment out these lines:
client-config-dir /etc/openvpn/ccd
route 192.168.1.0 255.255.255.0
route 192.168.2.0 255.255.255.0
;route 192.168.3.0 255.255.255.0

# Then create a file ccd/Thelonious with this line:
# iroute 192.168.40.128 255.255.255.248
# This will allow Thelonious' private subnet to
# access the VPN. This example will only work
# if you are routing, not bridging, i.e. you are
# using "dev tun" and "server" directives.

# EXAMPLE: Suppose you want to give
# Thelonious a fixed VPN IP address of 10.9.0.1.
# First uncomment out these lines:
;client-config-dir ccd
;route 10.9.0.0 255.255.255.252
# Then add this line to ccd/Thelonious:
# ifconfig-push 10.9.0.1 10.9.0.2

# Suppose that you want to enable different
# firewall access policies for different groups
# of clients. There are two methods:
# (1) Run multiple OpenVPN daemons, one for each
# group, and firewall the TUN/TAP interface
# for each group/daemon appropriately.
# (2) (Advanced) Create a script to dynamically
# modify the firewall in response to access
# from different clients. See man
# page for more info on learn-address script.
;learn-address ./script

# If enabled, this directive will configure
# all clients to redirect their default
# network gateway through the VPN, causing
# all IP traffic such as web browsing and
# and DNS lookups to go through the VPN
# (The OpenVPN server machine may need to NAT
# or bridge the TUN/TAP interface to the internet
# in order for this to work properly).
push "redirect-gateway def1 bypass-dhcp"

# Certain Windows-specific network settings
# can be pushed to clients, such as DNS
# or WINS server addresses. CAVEAT:
# http://openvpn.net/faq.html#dhcpcaveats
# The addresses below refer to the public
# DNS servers provided by opendns.com.
push "dhcp-option DNS 208.67.222.222"
push "dhcp-option DNS 208.67.220.220"

# Uncomment this directive to allow different
# clients to be able to "see" each other.
# By default, clients will only see the server.
# To force clients to only see the server, you
# will also need to appropriately firewall the
# server's TUN/TAP interface.
;client-to-client

# Uncomment this directive if multiple clients
# might connect with the same certificate/key
# files or common names. This is recommended
# only for testing purposes. For production use,
# each client should have its own certificate/key
# pair.
#
# IF YOU HAVE NOT GENERATED INDIVIDUAL
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
# UNCOMMENT THIS LINE OUT.
;duplicate-cn

# The keepalive directive causes ping-like
# messages to be sent back and forth over
# the link so that each side knows when
# the other side has gone down.
# Ping every 10 seconds, assume that remote
# peer is down if no ping received during
# a 120 second time period.
keepalive 10 120

# For extra security beyond that provided
# by SSL/TLS, create an "HMAC firewall"
# to help block DoS attacks and UDP port flooding.
#
# Generate with:
# openvpn --genkey --secret ta.key
#
# The server and each client must have
# a copy of this key.
# The second parameter should be '0'
# on the server and '1' on the clients.
;tls-auth ta.key 0 # This file is secret

# Select a cryptographic cipher.
# This config item must be copied to
# the client config file as well.
;cipher BF-CBC # Blowfish (default)
;cipher AES-128-CBC # AES
;cipher DES-EDE3-CBC # Triple-DES

# Enable compression on the VPN link.
# If you enable it here, you must also
# enable it in the client config file.
comp-lzo

# The maximum number of concurrently connected
# clients we want to allow.
;max-clients 100

# It's a good idea to reduce the OpenVPN
# daemon's privileges after initialization.
#
# You can uncomment this out on
# non-Windows systems.
user nobody
group nogroup

# The persist options will try to avoid
# accessing certain resources on restart
# that may no longer be accessible because
# of the privilege downgrade.
persist-key
persist-tun

# Output a short status file showing
# current connections, truncated
# and rewritten every minute.
status openvpn-status.log

# By default, log messages will go to the syslog (or
# on Windows, if running as a service, they will go to
# the "\Program Files\OpenVPN\log" directory).
# Use log or log-append to override this default.
# "log" will truncate the log file on OpenVPN startup,
# while "log-append" will append to it. Use one
# or the other (but not both).
log openvpn.log
;log-append openvpn.log

# Set the appropriate level of log
# file verbosity.
#
# 0 is silent, except for fatal errors
# 4 is reasonable for general usage
# 5 and 6 can help to debug connection problems
# 9 is extremely verbose
verb 4

# Silence repeating messages. At most 20
# sequential messages of the same message
# category will be output to the log.
;mute 20

# to see it use "telnet localhost 7505"
management localhost 7505
[/oconf]

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: openvpn Client is not recognized by openvpn server

Post by TinCanTech » Fri Jul 13, 2018 8:48 pm

BBCode oconf= requires a parameter ..

Also , I do not believe that is your server.conf file .. you posted your log and it does not match.

etantonio
OpenVPN User
Posts: 29
Joined: Tue Jul 10, 2018 1:31 pm

Re: openvpn Client is not recognized by openvpn server

Post by etantonio » Sat Jul 14, 2018 4:55 am

This is my server.conf and the previous are my log,
let me know where is the difference and I'll try to understand with you.
But the real problem I think is that I can't talk with this router 400km away from me.
Do you understand something from this log? Where's the problem?
Thanks

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: openvpn Client is not recognized by openvpn server

Post by TinCanTech » Sat Jul 14, 2018 11:21 am

No .. I misread your log.

You need to upgrade your server to a supported version of Openvpn,
your current version is almost 4 years old.

This error:

Code: Select all

read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
means that the server cannot reply to the client .. but I do not know why .. probably a firewall is blocking you.

Post Reply