Here is part of the openvpn.log. I just copied part of it
Code: Select all
6:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 peer info: IV_NCP=2
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 peer info: IV_TCPNL=1
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 peer info: IV_PROTO=2
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 peer info: IV_AUTO_SESS=1
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: 192.168.1.1:59175 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:59175
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:59175
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 MULTI: primary virtual IP for MyDevice/192.168.1.1:59175: 10.8.0.2
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:06:41 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:05 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:59175 SIGTERM[soft,remote-exit] received, client-instance exiting
Jun 10 21:07:10 raspberrypi ovpn-server[2988]: 192.168.1.1:49927 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Jun 10 21:07:10 raspberrypi ovpn-server[2988]: 192.168.1.1:49927 TLS Error: TLS handshake failed
Jun 10 21:07:10 raspberrypi ovpn-server[2988]: 192.168.1.1:49927 SIGUSR1[soft,tls-error] received, client-instance restarting
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Re-using SSL/TLS context
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 TLS: Initial packet from [AF_INET]192.168.1.1:62171, sid=64a4e88e 54be0a66
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 VERIFY KU OK
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Validating certificate extended key usage
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 VERIFY EKU OK
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.1.2-3096
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_VER=3.git::f225fcd0
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_PLAT=ios
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_NCP=2
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_TCPNL=1
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_PROTO=2
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 peer info: IV_AUTO_SESS=1
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: 192.168.1.1:62171 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:62171
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:62171
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 MULTI: primary virtual IP for MyDevice/192.168.1.1:62171: 10.8.0.2
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:20 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:62171 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Re-using SSL/TLS context
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 TLS: Initial packet from [AF_INET]192.168.1.1:41104, sid=51df3021 15e5fb70
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 VERIFY KU OK
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Validating certificate extended key usage
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 VERIFY EKU OK
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_VER=2.4.7
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_PLAT=linux
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_PROTO=2
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_NCP=2
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_LZ4=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_LZ4v2=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_LZO=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_COMP_STUB=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_COMP_STUBv2=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 peer info: IV_TCPNL=1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: 192.168.1.1:41104 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:41104
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: MULTI: new connection by client 'MyDevice' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:41104
Jun 10 21:07:25 raspberrypi ovpn-server[2988]: MULTI: primary virtual IP for MyDevice/192.168.1.1:41104: 10.8.0.2
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:26 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:27 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:27 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:28 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:29 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:31 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:35 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:44 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:41104 MULTI: bad source address from client [192.168.1.41], packet dropped
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Re-using SSL/TLS context
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 TLS: Initial packet from [AF_INET]192.168.1.1:61411, sid=f33f9ce5 3df3d7ce
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 VERIFY KU OK
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Validating certificate extended key usage
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 VERIFY EKU OK
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.1.2-3096
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_VER=3.git::f225fcd0
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_PLAT=ios
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_NCP=2
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_TCPNL=1
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_PROTO=2
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 peer info: IV_AUTO_SESS=1
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: 192.168.1.1:61411 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:61411
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MULTI: new connection by client 'MyDevice' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:61411
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MULTI: primary virtual IP for MyDevice/192.168.1.1:61411: 10.8.0.2
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:07:53 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:08:34 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:61411 SIGTERM[soft,remote-exit] received, client-instance exiting
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Re-using SSL/TLS context
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:08:44 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 TLS: Initial packet from [AF_INET]192.168.1.1:50697, sid=f7d478d6 7797ad66
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 VERIFY KU OK
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Validating certificate extended key usage
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 VERIFY EKU OK
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.1.2-3096
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_VER=3.git::f225fcd0
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_PLAT=ios
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_NCP=2
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_TCPNL=1
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_PROTO=2
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 peer info: IV_AUTO_SESS=1
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: 192.168.1.1:50697 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:50697
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:50697
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 MULTI: primary virtual IP for MyDevice/192.168.1.1:50697: 10.8.0.2
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:08:48 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:09:10 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:50697 SIGTERM[soft,remote-exit] received, client-instance exiting
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MULTI: multi_create_instance called
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Re-using SSL/TLS context
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 TLS: Initial packet from [AF_INET]192.168.1.1:57799, sid=a20fbf46 39ed330a
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 VERIFY OK: depth=1, CN=ChangeMe
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 VERIFY KU OK
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Validating certificate extended key usage
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 VERIFY EKU OK
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 VERIFY OK: depth=0, CN=MyDevice
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.1.2-3096
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_VER=3.git::f225fcd0
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_PLAT=ios
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_NCP=2
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_TCPNL=1
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_PROTO=2
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 peer info: IV_AUTO_SESS=1
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: 192.168.1.1:57799 [MyDevice] Peer Connection Initiated with [AF_INET]192.168.1.1:57799
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/MyDevice
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 MULTI: Learn: 10.8.0.2 -> MyDevice/192.168.1.1:57799
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 MULTI: primary virtual IP for MyDevice/192.168.1.1:57799: 10.8.0.2
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 PUSH: Received control message: 'PUSH_REQUEST'
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 SENT CONTROL [MyDevice]: 'PUSH_REPLY,dhcp-option DNS 10.8.0.1,block-outside-dns,redirect-gateway def1,remote-gateway ****,dhcp-option DNS 192.168.1.83,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 10 21:09:23 raspberrypi ovpn-server[2988]: MyDevice/192.168.1.1:57799 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key