OpenVPN connection randomly breaks

This forum is for general conversation and user-user networking.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Post Reply
geekgeek4
OpenVpn Newbie
Posts: 5
Joined: Wed Jun 10, 2020 7:40 pm

OpenVPN connection randomly breaks

Post by geekgeek4 » Wed Jun 10, 2020 7:50 pm

Hello,

I setup an openVPN server on my Raspberry Pi, and although I am able to connect to it and use it, the connection breaks quite frequently. I noticed that it tends to break whenever I run a test on speedtest.net, or when I am downloading a large file. Generally, any activity involving significant data transfer breaks the VPN.

What is causing this and what is the solution?

Server config

dev tun
proto udp
port 1194
ca /etc/openvpn/easy-rsa/pki/ca.crt
cert /etc/openvpn/easy-rsa/pki/issued/raspberrypi_6969fe2c-7ee7-4612-8428-253663f9250c.crt
key /etc/openvpn/easy-rsa/pki/private/raspberrypi_6969fe2c-7ee7-4612-8428-253663f9250c.key
dh none
ecdh-curve prime256v1
topology subnet
server 10.8.0.0 255.255.255.0
# Set your primary domain name server address for clients
push "dhcp-option DNS 10.8.0.1"
push "block-outside-dns"
# Override the Client default gateway by using 0.0.0.0/1 and
# 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of
# overriding but not wiping out the original default gateway.
push "redirect-gateway def1"
push "remote-gateway myVPNServerDomain"
push "dhcp-option DNS 192.168. my local pihole DNS"
client-to-client
client-config-dir /etc/openvpn/ccd
keepalive 15 120
remote-cert-tls client
tls-version-min 1.2
tls-crypt /etc/openvpn/easy-rsa/pki/ta.key
cipher AES-256-CBC
auth SHA256
user openvpn
group openvpn
persist-key
persist-tun
crl-verify /etc/openvpn/crl.pem
status /var/log/openvpn-status.log 20
status-version 3
syslog
verb 3
#DuplicateCNs allow access control on a less-granular, per user basis.
#Remove # if you will manage access by user instead of device.
#duplicate-cn
# Generated for use by PiVPN.io



Client config

client
dev tun
proto udp
remote myDomainName 1194
resolv-retry infinite
nobind
remote-cert-tls server
tls-version-min 1.2
verify-x509-name raspberrypi_6969fe2c-7ee7-4612-8428-253663f9250c name
cipher AES-256-CBC
auth SHA256
auth-nocache
redirect-gateway def1
verb 3
<ca>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</ca>
<cert>
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----
-----END ENCRYPTED PRIVATE KEY-----
</key>
<tls-crypt>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
-----END OpenVPN Static key V1-----
</tls-crypt>

Last edited by Pippin on Wed Jun 10, 2020 8:59 pm, edited 1 time in total.
Reason: Formatting

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: OpenVPN connection randomly breaks

Post by TinCanTech » Wed Jun 10, 2020 7:54 pm

Please see your log files.

viewtopic.php?f=30&t=22603

geekgeek4
OpenVpn Newbie
Posts: 5
Joined: Wed Jun 10, 2020 7:40 pm

Re: OpenVPN connection randomly breaks

Post by geekgeek4 » Wed Jun 10, 2020 8:22 pm

Here is part of the openvpn.log. I just copied part of it

Code: Select all

6:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 peer info: IV_NCP=2
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 peer info: IV_TCPNL=1
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 peer info: IV_PROTO=2
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 peer info: IV_AUTO_SESS=1
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:59175
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:59175
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 MULTI: primary virtual IP for MyDevice/192.168.1.1:59175: 10.8.0.2
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:05 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 SIGTERM[soft,remote-exit] received, client-instance exiting
Jun 10 21:07:10 raspberrypi ovpn-server[2988]: 192.168.1.1:49927 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Jun 10 21:07:10 raspberrypi ovpn-server[2988]: 192.168.1.1:49927 TLS Error: TLS handshake failed
Jun 10 21:07:10 raspberrypi ovpn-server[2988]: 192.168.1.1:49927 SIGUSR1[soft,tls-error] received, client-instance restarting
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Re-using SSL/TLS context
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 TLS: Initial packet from [AF_INET]192.168.1.1:62171, sid=64a4e88e 54be0a66
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 VERIFY KU OK
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Validating certificate extended key usage
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 VERIFY EKU OK
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.1.2-3096
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_VER=3.git::f225fcd0
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_PLAT=ios
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_NCP=2
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_TCPNL=1
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_PROTO=2
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_AUTO_SESS=1
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:62171
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:62171
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 MULTI: primary virtual IP for MyDevice/192.168.1.1:62171: 10.8.0.2
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Re-using SSL/TLS context
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 TLS: Initial packet from [AF_INET]192.168.1.1:41104, sid=51df3021 15e5fb70
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 VERIFY KU OK
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Validating certificate extended key usage
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 VERIFY EKU OK
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_VER=2.4.7
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_PLAT=linux
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_PROTO=2
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_NCP=2
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_LZ4=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_LZ4v2=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_LZO=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_COMP_STUB=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_COMP_STUBv2=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_TCPNL=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:41104
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: MULTI: new connection by client 'MyDevice' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:41104
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: MULTI: primary virtual IP for MyDevice/192.168.1.1:41104: 10.8.0.2
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:27 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:27 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:28 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:29 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:31 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:35 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:44 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Re-using SSL/TLS context
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 TLS: Initial packet from [AF_INET]192.168.1.1:61411, sid=f33f9ce5 3df3d7ce
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 VERIFY KU OK
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Validating certificate extended key usage
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 VERIFY EKU OK
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.1.2-3096
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_VER=3.git::f225fcd0
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_PLAT=ios
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_NCP=2
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_TCPNL=1
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_PROTO=2
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_AUTO_SESS=1
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:61411
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MULTI: new connection by client 'MyDevice' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:61411
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MULTI: primary virtual IP for MyDevice/192.168.1.1:61411: 10.8.0.2
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:08:34 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 SIGTERM[soft,remote-exit] received, client-instance exiting
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Re-using SSL/TLS context
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 TLS: Initial packet from [AF_INET]192.168.1.1:50697, sid=f7d478d6 7797ad66
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 VERIFY KU OK
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Validating certificate extended key usage
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 VERIFY EKU OK
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.1.2-3096
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_VER=3.git::f225fcd0
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_PLAT=ios
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_NCP=2
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_TCPNL=1
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_PROTO=2
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_AUTO_SESS=1
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:50697
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:50697
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 MULTI: primary virtual IP for MyDevice/192.168.1.1:50697: 10.8.0.2
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:09:10 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 SIGTERM[soft,remote-exit] received, client-instance exiting
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Re-using SSL/TLS context
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 TLS: Initial packet from [AF_INET]192.168.1.1:57799, sid=a20fbf46 39ed330a
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 VERIFY KU OK
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Validating certificate extended key usage
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 VERIFY EKU OK
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.1.2-3096
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_VER=3.git::f225fcd0
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_PLAT=ios
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_NCP=2
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_TCPNL=1
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_PROTO=2
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_AUTO_SESS=1
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:57799
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:57799
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 MULTI: primary virtual IP for MyDevice/192.168.1.1:57799: 10.8.0.2
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Last edited by Pippin on Wed Jun 10, 2020 9:00 pm, edited 1 time in total.
Reason: Formatting

geekgeek4
OpenVpn Newbie
Posts: 5
Joined: Wed Jun 10, 2020 7:40 pm

Re: OpenVPN connection randomly breaks

Post by geekgeek4 » Wed Jun 10, 2020 8:29 pm

Here is one of my clients on Windows 10:

Code: Select all

Wed Jun 10 14:25:41 2020 us=516425 Current Parameter Settings:
Wed Jun 10 14:25:41 2020 us=516425   config = 'MyDevice.ovpn'
Wed Jun 10 14:25:41 2020 us=516425   mode = 0
Wed Jun 10 14:25:41 2020 us=516425   show_ciphers = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   show_digests = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   show_engines = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   genkey = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   key_pass_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=516425   show_tls_ciphers = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   connect_retry_max = 0
Wed Jun 10 14:25:41 2020 us=516425 Connection profiles [0]:
Wed Jun 10 14:25:41 2020 us=516425   proto = udp
Wed Jun 10 14:25:41 2020 us=516425   local = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=516425   local_port = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=516425   remote = 'myVPNServerAddress'
Wed Jun 10 14:25:41 2020 us=516425   remote_port = '1194'
Wed Jun 10 14:25:41 2020 us=516425   remote_float = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   bind_defined = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   bind_local = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   bind_ipv6_only = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   connect_retry_seconds = 5
Wed Jun 10 14:25:41 2020 us=516425   connect_timeout = 120
Wed Jun 10 14:25:41 2020 us=516425   socks_proxy_server = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=516425   socks_proxy_port = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=516425   tun_mtu = 1500
Wed Jun 10 14:25:41 2020 us=516425   tun_mtu_defined = ENABLED
Wed Jun 10 14:25:41 2020 us=516425   link_mtu = 1500
Wed Jun 10 14:25:41 2020 us=516425   link_mtu_defined = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   tun_mtu_extra = 0
Wed Jun 10 14:25:41 2020 us=516425   tun_mtu_extra_defined = DISABLED
Wed Jun 10 14:25:41 2020 us=516425   mtu_discover_type = -1
Wed Jun 10 14:25:41 2020 us=517424   fragment = 0
Wed Jun 10 14:25:41 2020 us=517424   mssfix = 1450
Wed Jun 10 14:25:41 2020 us=517424   explicit_exit_notification = 0
Wed Jun 10 14:25:41 2020 us=517424 Connection profiles END
Wed Jun 10 14:25:41 2020 us=517424   remote_random = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   ipchange = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   dev = 'tun'
Wed Jun 10 14:25:41 2020 us=517424   dev_type = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   dev_node = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   lladdr = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   topology = 1
Wed Jun 10 14:25:41 2020 us=517424   ifconfig_local = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   ifconfig_remote_netmask = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   ifconfig_noexec = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   ifconfig_nowarn = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   ifconfig_ipv6_local = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   ifconfig_ipv6_netbits = 0
Wed Jun 10 14:25:41 2020 us=517424   ifconfig_ipv6_remote = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   shaper = 0
Wed Jun 10 14:25:41 2020 us=517424   mtu_test = 0
Wed Jun 10 14:25:41 2020 us=517424   mlock = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   keepalive_ping = 0
Wed Jun 10 14:25:41 2020 us=517424   keepalive_timeout = 0
Wed Jun 10 14:25:41 2020 us=517424   inactivity_timeout = 0
Wed Jun 10 14:25:41 2020 us=517424   ping_send_timeout = 0
Wed Jun 10 14:25:41 2020 us=517424   ping_rec_timeout = 0
Wed Jun 10 14:25:41 2020 us=517424   ping_rec_timeout_action = 0
Wed Jun 10 14:25:41 2020 us=517424   ping_timer_remote = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   remap_sigusr1 = 0
Wed Jun 10 14:25:41 2020 us=517424   persist_tun = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   persist_local_ip = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   persist_remote_ip = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   persist_key = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   passtos = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   resolve_retry_seconds = 1000000000
Wed Jun 10 14:25:41 2020 us=517424   resolve_in_advance = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   username = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   groupname = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   chroot_dir = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   cd_dir = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   writepid = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   up_script = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   down_script = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   down_pre = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   up_restart = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   up_delay = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   daemon = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   inetd = 0
Wed Jun 10 14:25:41 2020 us=517424   log = ENABLED
Wed Jun 10 14:25:41 2020 us=517424   suppress_timestamps = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   machine_readable_output = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   nice = 0
Wed Jun 10 14:25:41 2020 us=517424   verbosity = 4
Wed Jun 10 14:25:41 2020 us=517424   mute = 0
Wed Jun 10 14:25:41 2020 us=517424   gremlin = 0
Wed Jun 10 14:25:41 2020 us=517424   status_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   status_file_version = 1
Wed Jun 10 14:25:41 2020 us=517424   status_file_update_freq = 60
Wed Jun 10 14:25:41 2020 us=517424   occ = ENABLED
Wed Jun 10 14:25:41 2020 us=517424   rcvbuf = 0
Wed Jun 10 14:25:41 2020 us=517424   sndbuf = 0
Wed Jun 10 14:25:41 2020 us=517424   sockflags = 0
Wed Jun 10 14:25:41 2020 us=517424   fast_io = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   comp.alg = 0
Wed Jun 10 14:25:41 2020 us=517424   comp.flags = 0
Wed Jun 10 14:25:41 2020 us=517424   route_script = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   route_default_gateway = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   route_default_metric = 0
Wed Jun 10 14:25:41 2020 us=517424   route_noexec = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   route_delay = 5
Wed Jun 10 14:25:41 2020 us=517424   route_delay_window = 30
Wed Jun 10 14:25:41 2020 us=517424   route_delay_defined = ENABLED
Wed Jun 10 14:25:41 2020 us=517424   route_nopull = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   route_gateway_via_dhcp = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   allow_pull_fqdn = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   Pull filters:
Wed Jun 10 14:25:41 2020 us=517424     ignore "route-method"
Wed Jun 10 14:25:41 2020 us=517424   management_addr = '127.0.0.1'
Wed Jun 10 14:25:41 2020 us=517424   management_port = '25340'
Wed Jun 10 14:25:41 2020 us=517424   management_user_pass = 'stdin'
Wed Jun 10 14:25:41 2020 us=517424   management_log_history_cache = 250
Wed Jun 10 14:25:41 2020 us=517424   management_echo_buffer_size = 100
Wed Jun 10 14:25:41 2020 us=517424   management_write_peer_info_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   management_client_user = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   management_client_group = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   management_flags = 6
Wed Jun 10 14:25:41 2020 us=517424   shared_secret_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   key_direction = not set
Wed Jun 10 14:25:41 2020 us=517424   ciphername = 'AES-256-CBC'
Wed Jun 10 14:25:41 2020 us=517424   ncp_enabled = ENABLED
Wed Jun 10 14:25:41 2020 us=517424   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
Wed Jun 10 14:25:41 2020 us=517424   authname = 'SHA256'
Wed Jun 10 14:25:41 2020 us=517424   prng_hash = 'SHA1'
Wed Jun 10 14:25:41 2020 us=517424   prng_nonce_secret_len = 16
Wed Jun 10 14:25:41 2020 us=517424   keysize = 0
Wed Jun 10 14:25:41 2020 us=517424   engine = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   replay = ENABLED
Wed Jun 10 14:25:41 2020 us=517424   mute_replay_warnings = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   replay_window = 64
Wed Jun 10 14:25:41 2020 us=517424   replay_time = 15
Wed Jun 10 14:25:41 2020 us=517424   packet_id_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   use_iv = ENABLED
Wed Jun 10 14:25:41 2020 us=517424   test_crypto = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   tls_server = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   tls_client = ENABLED
Wed Jun 10 14:25:41 2020 us=517424   key_method = 2
Wed Jun 10 14:25:41 2020 us=517424   ca_file = '[[INLINE]]'
Wed Jun 10 14:25:41 2020 us=517424   ca_path = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   dh_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   cert_file = '[[INLINE]]'
Wed Jun 10 14:25:41 2020 us=517424   extra_certs_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   priv_key_file = '[[INLINE]]'
Wed Jun 10 14:25:41 2020 us=517424   pkcs12_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   cryptoapi_cert = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   cipher_list = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   cipher_list_tls13 = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   tls_cert_profile = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   tls_verify = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   tls_export_cert = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   verify_x509_type = 2
Wed Jun 10 14:25:41 2020 us=517424   verify_x509_name = 'raspberrypi_6969fe2c-7ee7-4612-8428-253663f9250c'
Wed Jun 10 14:25:41 2020 us=517424   crl_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   ns_cert_type = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 65535
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_ku[i] = 0
Wed Jun 10 14:25:41 2020 us=517424   remote_cert_eku = 'TLS Web Server Authentication'
Wed Jun 10 14:25:41 2020 us=517424   ssl_flags = 192
Wed Jun 10 14:25:41 2020 us=517424   tls_timeout = 2
Wed Jun 10 14:25:41 2020 us=517424   renegotiate_bytes = -1
Wed Jun 10 14:25:41 2020 us=517424   renegotiate_packets = 0
Wed Jun 10 14:25:41 2020 us=517424   renegotiate_seconds = 3600
Wed Jun 10 14:25:41 2020 us=517424   handshake_window = 60
Wed Jun 10 14:25:41 2020 us=517424   transition_window = 3600
Wed Jun 10 14:25:41 2020 us=517424   single_session = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   push_peer_info = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   tls_exit = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   tls_auth_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=517424   tls_crypt_file = '[[INLINE]]'
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=517424   pkcs11_protected_authentication = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_private_mode = 00000000
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_cert_private = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_pin_cache_period = -1
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_id = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   pkcs11_id_management = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   server_network = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   server_netmask = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   server_network_ipv6 = ::
Wed Jun 10 14:25:41 2020 us=518424   server_netbits_ipv6 = 0
Wed Jun 10 14:25:41 2020 us=518424   server_bridge_ip = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   server_bridge_netmask = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   server_bridge_pool_start = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   server_bridge_pool_end = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   ifconfig_pool_defined = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   ifconfig_pool_start = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   ifconfig_pool_end = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   ifconfig_pool_netmask = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   ifconfig_pool_persist_filename = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   ifconfig_pool_persist_refresh_freq = 600
Wed Jun 10 14:25:41 2020 us=518424   ifconfig_ipv6_pool_defined = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   ifconfig_ipv6_pool_base = ::
Wed Jun 10 14:25:41 2020 us=518424   ifconfig_ipv6_pool_netbits = 0
Wed Jun 10 14:25:41 2020 us=518424   n_bcast_buf = 256
Wed Jun 10 14:25:41 2020 us=518424   tcp_queue_limit = 64
Wed Jun 10 14:25:41 2020 us=518424   real_hash_size = 256
Wed Jun 10 14:25:41 2020 us=518424   virtual_hash_size = 256
Wed Jun 10 14:25:41 2020 us=518424   client_connect_script = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   learn_address_script = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   client_disconnect_script = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   client_config_dir = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   ccd_exclusive = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   tmp_dir = 'C:\Users\Sbart\AppData\Local\Temp\'
Wed Jun 10 14:25:41 2020 us=518424   push_ifconfig_defined = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   push_ifconfig_local = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   push_ifconfig_remote_netmask = 0.0.0.0
Wed Jun 10 14:25:41 2020 us=518424   push_ifconfig_ipv6_defined = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   push_ifconfig_ipv6_local = ::/0
Wed Jun 10 14:25:41 2020 us=518424   push_ifconfig_ipv6_remote = ::
Wed Jun 10 14:25:41 2020 us=518424   enable_c2c = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   duplicate_cn = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   cf_max = 0
Wed Jun 10 14:25:41 2020 us=518424   cf_per = 0
Wed Jun 10 14:25:41 2020 us=518424   max_clients = 1024
Wed Jun 10 14:25:41 2020 us=518424   max_routes_per_client = 256
Wed Jun 10 14:25:41 2020 us=518424   auth_user_pass_verify_script = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   auth_user_pass_verify_script_via_file = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   auth_token_generate = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   auth_token_lifetime = 0
Wed Jun 10 14:25:41 2020 us=518424   client = ENABLED
Wed Jun 10 14:25:41 2020 us=518424   pull = ENABLED
Wed Jun 10 14:25:41 2020 us=518424   auth_user_pass_file = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   show_net_up = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   route_method = 3
Wed Jun 10 14:25:41 2020 us=518424   block_outside_dns = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   ip_win32_defined = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   ip_win32_type = 3
Wed Jun 10 14:25:41 2020 us=518424   dhcp_masq_offset = 0
Wed Jun 10 14:25:41 2020 us=518424   dhcp_lease_time = 31536000
Wed Jun 10 14:25:41 2020 us=518424   tap_sleep = 0
Wed Jun 10 14:25:41 2020 us=518424   dhcp_options = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   dhcp_renew = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   dhcp_pre_release = DISABLED
Wed Jun 10 14:25:41 2020 us=518424   domain = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   netbios_scope = '[UNDEF]'
Wed Jun 10 14:25:41 2020 us=518424   netbios_node_type = 0
Wed Jun 10 14:25:41 2020 us=518424   disable_nbt = DISABLED
Wed Jun 10 14:25:41 2020 us=518424 OpenVPN 2.4.9 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 16 2020
Wed Jun 10 14:25:41 2020 us=518424 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Jun 10 14:25:41 2020 us=518424 library versions: OpenSSL 1.1.1f  31 Mar 2020, LZO 2.10
Enter Management Password:
Wed Jun 10 14:25:41 2020 us=519424 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Wed Jun 10 14:25:41 2020 us=519424 Need hold release from management interface, waiting...
Wed Jun 10 14:25:42 2020 us=8266 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Wed Jun 10 14:25:42 2020 us=109233 MANAGEMENT: CMD 'state on'
Wed Jun 10 14:25:42 2020 us=109233 MANAGEMENT: CMD 'log all on'
Wed Jun 10 14:25:42 2020 us=273180 MANAGEMENT: CMD 'echo all on'
Wed Jun 10 14:25:42 2020 us=275179 MANAGEMENT: CMD 'bytecount 5'
Wed Jun 10 14:25:42 2020 us=277179 MANAGEMENT: CMD 'hold off'
Wed Jun 10 14:25:42 2020 us=279179 MANAGEMENT: CMD 'hold release'
Wed Jun 10 14:25:42 2020 us=286176 MANAGEMENT: CMD 'password [...]'
Wed Jun 10 14:25:42 2020 us=288175 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Wed Jun 10 14:25:42 2020 us=288175 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Jun 10 14:25:42 2020 us=288175 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Wed Jun 10 14:25:42 2020 us=288175 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Jun 10 14:25:42 2020 us=288175 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Wed Jun 10 14:25:42 2020 us=288175 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Wed Jun 10 14:25:42 2020 us=288175 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Wed Jun 10 14:25:42 2020 us=288175 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Wed Jun 10 14:25:42 2020 us=288175 TCP/UDP: Preserving recently used remote address: [AF_INET]myServer:1194
Wed Jun 10 14:25:42 2020 us=288175 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Jun 10 14:25:42 2020 us=288175 UDP link local: (not bound)
Wed Jun 10 14:25:42 2020 us=288175 UDP link remote: [AF_INET]MyServer:1194
Wed Jun 10 14:25:42 2020 us=288175 MANAGEMENT: >STATE:1591820742,WAIT,,,,,,
Wed Jun 10 14:25:42 2020 us=298172 MANAGEMENT: >STATE:1591820742,AUTH,,,,,,
Wed Jun 10 14:25:42 2020 us=298172 TLS: Initial packet from [AF_INET]MyAddress:1194, sid=3edb748b 5f522e58
Wed Jun 10 14:25:42 2020 us=363151 VERIFY OK: depth=1, CN=ChangeMe
Wed Jun 10 14:25:42 2020 us=364151 VERIFY KU OK
Wed Jun 10 14:25:42 2020 us=364151 Validating certificate extended key usage
Wed Jun 10 14:25:42 2020 us=364151 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Jun 10 14:25:42 2020 us=364151 VERIFY EKU OK
Wed Jun 10 14:25:42 2020 us=364151 VERIFY X509NAME OK: CN=raspberrypi_6969fe2c-7ee7-4612-8428-253663f9250c
Wed Jun 10 14:25:42 2020 us=364151 VERIFY OK: depth=0, CN=raspberrypi_6969fe2c-7ee7-4612-8428-253663f9250c
Wed Jun 10 14:25:42 2020 us=396141 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 256 bit EC, curve: prime256v1
Wed Jun 10 14:25:42 2020 us=396141 [raspberrypi_6969fe2c-7ee7-4612-8428-253663f9250c] Peer Connection Initiated with [AF_INET]MyServer:1194
Wed Jun 10 14:25:43 2020 us=430807 MANAGEMENT: >STATE:1591820743,GET_CONFIG,,,,,,
Wed Jun 10 14:25:43 2020 us=430807 SENT CONTROL [raspberrypi_6969fe2c-7ee7-4612-8428-253663f9250c]: 'PUSH_REQUEST' (status=1)
Wed Jun 10 14:25:43 2020 us=436804 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ******,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 2,cipher AES-256-GCM'
Wed Jun 10 14:25:43 2020 us=436804 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:4: remote-gateway (2.4.9)
Wed Jun 10 14:25:43 2020 us=436804 OPTIONS IMPORT: timers and/or timeouts modified
Wed Jun 10 14:25:43 2020 us=436804 OPTIONS IMPORT: --ifconfig/up options modified
Wed Jun 10 14:25:43 2020 us=436804 OPTIONS IMPORT: route options modified
Wed Jun 10 14:25:43 2020 us=436804 OPTIONS IMPORT: route-related options modified
Wed Jun 10 14:25:43 2020 us=436804 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Jun 10 14:25:43 2020 us=436804 OPTIONS IMPORT: peer-id set
Wed Jun 10 14:25:43 2020 us=436804 OPTIONS IMPORT: adjusting link_mtu to 1624
Wed Jun 10 14:25:43 2020 us=436804 OPTIONS IMPORT: data channel crypto options modified
Wed Jun 10 14:25:43 2020 us=436804 Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Jun 10 14:25:43 2020 us=436804 Data Channel MTU parms [ L:1552 D:1450 EF:52 EB:406 ET:0 EL:3 ]
Wed Jun 10 14:25:43 2020 us=436804 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Jun 10 14:25:43 2020 us=436804 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Jun 10 14:25:43 2020 us=436804 interactive service msg_channel=872
Wed Jun 10 14:25:43 2020 us=439803 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=16 HWADDR=94:b8:6d:e0:06:cd
Wed Jun 10 14:25:43 2020 us=449801 open_tun
Wed Jun 10 14:25:43 2020 us=450800 TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{598316EA-FF34-41A9-902F-911242C9CEF8}.tap
Wed Jun 10 14:25:43 2020 us=450800 TAP-Windows Driver Version 9.24 
Wed Jun 10 14:25:43 2020 us=450800 TAP-Windows MTU=1500
Wed Jun 10 14:25:43 2020 us=452799 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Wed Jun 10 14:25:43 2020 us=452799 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {598316EA-FF34-41A9-902F-911242C9CEF8} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Wed Jun 10 14:25:43 2020 us=452799 DHCP option string: 06080a08 0001c0a8 0153
Wed Jun 10 14:25:43 2020 us=452799 Successful ARP Flush on interface [13] {598316EA-FF34-41A9-902F-911242C9CEF8}
Wed Jun 10 14:25:43 2020 us=457797 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Wed Jun 10 14:25:43 2020 us=457797 MANAGEMENT: >STATE:1591820743,ASSIGN_IP,,10.8.0.2,,,,
Wed Jun 10 14:25:43 2020 us=457797 Blocking outside DNS
Wed Jun 10 14:25:43 2020 us=457797 Using service to add block dns filters
Wed Jun 10 14:25:43 2020 us=476792 Blocking outside dns using service succeeded.
Wed Jun 10 14:25:48 2020 us=50472 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Wed Jun 10 14:25:48 2020 us=50472 C:\Windows\system32\route.exe ADD MyServer MASK 255.255.255.255 192.168.1.1
Wed Jun 10 14:25:48 2020 us=51471 Route addition via service succeeded
Wed Jun 10 14:25:48 2020 us=51471 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Wed Jun 10 14:25:48 2020 us=53471 Route addition via service succeeded
Wed Jun 10 14:25:48 2020 us=53471 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Wed Jun 10 14:25:48 2020 us=56470 Route addition via service succeeded
Wed Jun 10 14:25:48 2020 us=56470 Initialization Sequence Completed
Wed Jun 10 14:25:48 2020 us=56470 MANAGEMENT: >STATE:1591820748,CONNECTED,SUCCESS,10.8.0.2,MyServer,1194,,
Wed Jun 10 14:26:45 2020 us=533982 TCP/UDP: Closing socket
Wed Jun 10 14:26:45 2020 us=533982 C:\Windows\system32\route.exe DELETE MyServer MASK 255.255.255.255 192.168.1.1
Wed Jun 10 14:26:45 2020 us=535981 Route deletion via service succeeded
Wed Jun 10 14:26:45 2020 us=535981 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Wed Jun 10 14:26:45 2020 us=537980 Route deletion via service succeeded
Wed Jun 10 14:26:45 2020 us=537980 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Wed Jun 10 14:26:45 2020 us=540979 Route deletion via service succeeded
Wed Jun 10 14:26:45 2020 us=540979 Closing TUN/TAP interface
Wed Jun 10 14:26:45 2020 us=590963 TAP: DHCP address released
Wed Jun 10 14:26:45 2020 us=591963 Uninitializing WFP
Wed Jun 10 14:26:45 2020 us=591963 Using service to delete block dns filters
Wed Jun 10 14:26:45 2020 us=603960 Unblocking outside dns using service succeeded.
Wed Jun 10 14:26:45 2020 us=603960 SIGTERM[hard,] received, process exiting
Wed Jun 10 14:26:45 2020 us=603960 MANAGEMENT: >STATE:1591820805,EXITING,SIGTERM,,,,,
Last edited by Pippin on Wed Jun 10, 2020 9:01 pm, edited 1 time in total.
Reason: Formatting

geekgeek4
OpenVpn Newbie
Posts: 5
Joined: Wed Jun 10, 2020 7:40 pm

Re: OpenVPN connection randomly breaks

Post by geekgeek4 » Wed Jun 10, 2020 8:31 pm

Please let me know if anything else is needed. Thank you

TinCanTech
OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: OpenVPN connection randomly breaks

Post by TinCanTech » Wed Jun 10, 2020 8:32 pm

geekgeek4 wrote:
Wed Jun 10, 2020 8:22 pm
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: MULTI: new connection by client 'MyDevice' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.

geekgeek4
OpenVpn Newbie
Posts: 5
Joined: Wed Jun 10, 2020 7:40 pm

Re: OpenVPN connection randomly breaks

Post by geekgeek4 » Wed Jun 10, 2020 8:45 pm

wow awesome. I will give that a try.

Thanks a lot. I will let you know if it works. Much appreciated.

Post Reply