OpenVPN is connected, but cannot ping network devices from client

This forum is for admins who are looking to build or expand their OpenVPN setup.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
DevGirl73
OpenVpn Newbie
Posts: 6
Joined: Sun Feb 21, 2021 8:30 pm

OpenVPN is connected, but cannot ping network devices from client

Post by DevGirl73 » Sun Feb 21, 2021 8:54 pm

I am new to OpenVPN and I was going to setup a Raspberry Pi 4 to be my VPN. but then I realized that my router has OpenVPN server on it already. I set it up on my AN-300-RT-4L2W router according to these instructions: https://www.snapav.com/wcsstore/Extende ... NGuide.pdf
I used the AraknisDNS service for my DNS. When I connect from the client, I can see the client's Ip address on the account in the server, but I can't ping any network devices from the client and the internet passthrough is not working. Here are some of my environment details:
Server: Araknis Networks 300 Series Dual-WAN Gigabit VPN Router
Client: Windows 10 Home OS laptop & Android Galaxy S10

I haven't made any other changes to my router.

DevGirl73
OpenVpn Newbie
Posts: 6
Joined: Sun Feb 21, 2021 8:30 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by DevGirl73 » Tue Feb 23, 2021 3:58 am

Ok... correction. I can't ping my computers running windows firewall. I can ping everything else. I really don't know what to open up or how. I'm really out of my element so could use some help.

I think this is another issue... maybe worth a different thread. Internet traffic on the client isn't using the VPN either. I don't know how to pull logs from the openVPN server or client. My server came installed on my router.

DevGirl73
OpenVpn Newbie
Posts: 6
Joined: Sun Feb 21, 2021 8:30 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by DevGirl73 » Tue Feb 23, 2021 7:24 pm

I came in here to update that after turning my firewalls off on both the client and server briefly I was able to navigate to the shares on my Win10 desktop using the format of \\computername\share. I can also ssh to my Linux box so now I just have to figure out which firewall rules to change/add? I am clueless on that front. Any thoughts? I think I saw another thread with firewall rules in it. I'll search again.

The other issue I'm still having is that the client's internet connection is still not using the VPN. Is that a server or client issue? or both?
What do I do to route the internet traffic to the VPN?

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by TinCanTech » Tue Feb 23, 2021 7:39 pm

DevGirl73 wrote:
Tue Feb 23, 2021 7:24 pm
The other issue I'm still having is that the client's internet connection is still not using the VPN
Read you router manual and also the openvpn howto. Again!

Disable your client firewall for all testing.

DevGirl73
OpenVpn Newbie
Posts: 6
Joined: Sun Feb 21, 2021 8:30 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by DevGirl73 » Thu Feb 25, 2021 2:41 pm

Thanks for your response, TinCanTech.

I feel like I've read that router manual ad nauseam, but I'll take some time to go through and read some more. It seems that you are saying the answer is there and I'm missing it. I learned about disabling my firewalls for testing the hard way. I'll be doing that while testing from now on & figure out the firewall rules after.

I keep thinking that this would probably be easier if I just used a raspberry pi as the OpenVpn server instead of the one that came installed on my router, but now that I've started down the rabbit hole I don't want to give up on it. I will go through more reading this weekend and if I find the solution I will post it here because I haven't found this specific issue on this forum & hopefully it will help someone else.

Onward! I'll be back...

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by TinCanTech » Thu Feb 25, 2021 4:13 pm

DevGirl73 wrote:
Thu Feb 25, 2021 2:41 pm
this would probably be easier if I just used a raspberry pi as the OpenVpn server
Probably.
DevGirl73 wrote:
Thu Feb 25, 2021 2:41 pm
instead of the one that came installed on my router, but now that I've started down the rabbit hole I don't want to give up on it
Then you need to learn how your router does it -- We don't support routers.
DevGirl73 wrote:
Sun Feb 21, 2021 8:54 pm
When I connect from the client, I can see the client's Ip address on the account in the server,
Does the account show as "Connected" ?
DevGirl73 wrote:
Sun Feb 21, 2021 8:54 pm
but I can't ping any network devices from the client and the internet passthrough is not working
This is what your router is supposed to do for you and they all do it differently ..

If you post your client log at --verb 4 I'll check if it looks ok.

DevGirl73
OpenVpn Newbie
Posts: 6
Joined: Sun Feb 21, 2021 8:30 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by DevGirl73 » Mon Mar 01, 2021 12:41 am

I've made some progress. I can get to the shares behind my firewall using the OpenVPN client now. I was able to set the proper firewall settings. I'm using Windows Defender on a Win 10 Home computer. I followed the advice from this Stack Exchange post.
https://serverfault.com/questions/65197 ... es#tab-top
Basically, I added the VPN client's assigned subnet mask to all of the private profile rules for File and Printer Sharing.
TinCanTech wrote:
Thu Feb 25, 2021 4:13 pm
Read you router manual and also the openvpn howto. Again!
Ok, so I did that & aside from making me woefully embarrassed at not really reading the howto the first time, it made me realize that I need to add the push "redirect-gateway def1" directive in the server configuration file... which I don't think I have access to for OpenVPN on my router. :evil:
I may need to give up on that part. My main goal was connecting to my plex server from outside my network. If I have to continue to use my IpVanish VPN for internet use, I'm ok with that. Routing my internet traffic through OpenVPN would be nice, but ultimately not necessary.
TinCanTech wrote:
Thu Feb 25, 2021 4:13 pm
If you post your client log at --verb 4 I'll check if it looks ok.
I can do that... I learned it from the HowTo ;) Thanks for your help TinCanTech.

Code: Select all

2/27/2021, 11:13:06 PM OpenVPN core 3.git::662eae9a win x86_64 64-bit built on Oct 27 2020 12:49:07
⏎2/27/2021, 11:13:06 PM Frame=512/2048/512 mssfix-ctrl=1250
⏎2/27/2021, 11:13:06 PM UNUSED OPTIONS
5 [resolv-retry] [infinite] 
6 [nobind] 
7 [persist-key] 
8 [persist-tun] 
10 [verb] [4] 
⏎2/27/2021, 11:13:06 PM EVENT: RESOLVE ⏎2/27/2021, 11:13:06 PM EVENT: WAIT ⏎2/27/2021, 11:13:06 PM WinCommandAgent: transmitting bypass route to ***.***.***.***
{
	"host" : "***.***.***.***",
	"ipv6" : false
}

⏎2/27/2021, 11:13:06 PM Connecting to [thednsname.araknisdns.com]:1194 (***.***.***.***) via TCPv4
⏎2/27/2021, 11:13:06 PM EVENT: CONNECTING ⏎2/27/2021, 11:13:06 PM Tunnel Options:V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client
⏎2/27/2021, 11:13:06 PM Creds: UsernameEmpty/PasswordEmpty
⏎2/27/2021, 11:13:06 PM Peer Info:
IV_VER=3.git::662eae9a
IV_PLAT=win
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_AUTO_SESS=1
IV_GUI_VER=OCWindows_3.2.2-1455
IV_SSO=openurl

⏎2/27/2021, 11:13:07 PM SSL Handshake: CN=araknis, TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
⏎2/27/2021, 11:13:07 PM Session is ACTIVE
⏎2/27/2021, 11:13:07 PM Sending PUSH_REQUEST to server...
⏎2/27/2021, 11:13:07 PM EVENT: GET_CONFIG ⏎2/27/2021, 11:13:07 PM OPTIONS:
0 [route] [192.168.1.0] [255.255.255.0] 
1 [route] [172.0.0.0] [255.255.255.0] 
2 [topology] [net30] 
3 [ping] [10] 
4 [ping-restart] [120] 
5 [ifconfig] [172.0.0.6] [172.0.0.5] 

⏎2/27/2021, 11:13:07 PM PROTOCOL OPTIONS:
  cipher: AES-128-CBC
  digest: SHA1
  compress: NONE
  peer ID: -1
⏎2/27/2021, 11:13:07 PM CAPTURED OPTIONS:
Session Name: thednsname.araknisdns.com
Layer: OSI_LAYER_3
Remote Address: ***.***.***.***
Tunnel Addresses:
  172.0.0.6/30 -> 172.0.0.5 [net30]
Reroute Gateway: IPv4=0 IPv6=0 flags=[ IPv4 ]
Block IPv6: no
Add Routes:
  192.168.1.0/24
  172.0.0.0/24
Exclude Routes:
DNS Servers:
Search Domains:

⏎2/27/2021, 11:13:07 PM EVENT: ASSIGN_IP ⏎2/27/2021, 11:13:07 PM SetupClient: transmitting tun setup list to \\.\pipe\agent_ovpnconnect
{
	"confirm_event" : "a013000000000000",
	"destroy_event" : "d813000000000000",
	"tun" : 
	{
		"adapter_domain_suffix" : "",
		"add_routes" : 
		[
			{
				"address" : "192.168.1.0",
				"gateway" : "",
				"ipv6" : false,
				"metric" : -1,
				"net30" : false,
				"prefix_length" : 24
			},
			{
				"address" : "172.0.0.0",
				"gateway" : "",
				"ipv6" : false,
				"metric" : -1,
				"net30" : false,
				"prefix_length" : 24
			}
		],
		"block_ipv6" : false,
		"layer" : 3,
		"mtu" : 0,
		"remote_address" : 
		{
			"address" : "***.***.***.***",
			"ipv6" : false
		},
		"reroute_gw" : 
		{
			"flags" : 256,
			"ipv4" : false,
			"ipv6" : false
		},
		"route_metric_default" : -1,
		"session_name" : "thednsname.araknisdns.com",
		"tunnel_address_index_ipv4" : 0,
		"tunnel_address_index_ipv6" : -1,
		"tunnel_addresses" : 
		[
			{
				"address" : "172.0.0.6",
				"gateway" : "172.0.0.5",
				"ipv6" : false,
				"metric" : -1,
				"net30" : true,
				"prefix_length" : 30
			}
		]
	},
	"wintun" : false
}
POST np://[\\.\pipe\agent_ovpnconnect]/tun-setup : 200 OK
TAP ADAPTERS:
guid='{80609D91-786D-47C7-ADD5-723078B485D8}' index=11 name='Local Area Connection'
Open TAP device "Local Area Connection" PATH="\\.\Global\{80609D91-786D-47C7-ADD5-723078B485D8}.tap" SUCCEEDED
TAP-Windows Driver Version 9.24
ActionDeleteAllRoutesOnInterface iface_index=11
netsh interface ip set interface 11 metric=1
Ok.
netsh interface ip set address 11 static 172.0.0.6 255.255.255.252 gateway=172.0.0.5 store=active
IPHelper: add route 192.168.1.0/24 11 172.0.0.5 metric=-1
IPHelper: add route 172.0.0.0/24 11 172.0.0.5 metric=-1
ipconfig /flushdns
Windows IP Configuration
Successfully flushed the DNS Resolver Cache.
TAP handle: 9c17000000000000
⏎2/27/2021, 11:13:07 PM Connected via TUN_WIN
⏎2/27/2021, 11:13:07 PM EVENT: CONNECTED thednsname.araknisdns.com:1194 (***.***.***.***) via /TCPv4 on TUN_WIN/172.0.0.6/ gw=[172.0.0.5/]⏎

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by TinCanTech » Mon Mar 01, 2021 2:02 am

DevGirl73 wrote:
Mon Mar 01, 2021 12:41 am
realize that I need to add the push "redirect-gateway def1" directive in the server configuration file... which I don't think I have access to for OpenVPN on my router
I bet you do ..

However, you can probably add this to your client config and it does the same:

Code: Select all

redirect-gateway def1
No need to push from the server.
DevGirl73 wrote:
Mon Mar 01, 2021 12:41 am
2/27/2021, 11:13:06 PM OpenVPN core 3.git
Sorry, I don't support that version.

Use the one found here:
https://openvpn.net/community-downloads/

edissonperez
OpenVpn Newbie
Posts: 2
Joined: Mon Oct 17, 2022 11:34 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by edissonperez » Tue Oct 18, 2022 12:08 am

Hi, @TinCanTech

I have a similar problem and I don't understand, The Server is Windows 2016 IP 172.20.0.244 255.255.0.0 Gateway 172.20.0.5,
The VPN is 10.30.0.0 The connection is established without problem, but I don't PING any machine not even the same server 172.20.0.244, the firewall is stopped on the server.

I leave the configuration and the LOGs, any help will be appreciated.Image

Server.ovpn
port 1194
proto udp
dev tun

ca ca.crt
cert server.crt
key server.key
dh dh.pem

server 10.30.0.0 255.255.0.0
ifconfig-pool-persist ipp.txt

push "route 172.20.0.0 255.255.0.0"

keepalive 10 120

comp-lzo

persist-key
persist-tun

status openvpn-status.log

verb 4


Client.ovpn
client

dev tun

proto udp

remote 181.XX.XX.XX 1194

resolv-retry infinite
nobind
persist-key
persist-tun

ca ca.crt
cert client01.crt
key client01.key

comp-lzo

verb 4



-------Server LOG-----
2022-10-17 18:06:54 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2022-10-17 18:06:54 us=250000 WARNING: --topology net30 support for server configs with IPv4 pools will be removed in a future release. Please migrate to --topology subnet as soon as possible.
2022-10-17 18:06:54 us=250000 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2022-10-17 18:06:54 us=250000 Current Parameter Settings:
2022-10-17 18:06:54 us=250000 config = 'C:\Program Files\OpenVPN\config-auto\server.ovpn'
2022-10-17 18:06:54 us=250000 mode = 1
2022-10-17 18:06:54 us=250000 show_ciphers = DISABLED
2022-10-17 18:06:54 us=250000 show_digests = DISABLED
2022-10-17 18:06:54 us=250000 show_engines = DISABLED
2022-10-17 18:06:54 us=250000 genkey = DISABLED
2022-10-17 18:06:54 us=250000 genkey_filename = '[UNDEF]'
2022-10-17 18:06:54 us=250000 key_pass_file = '[UNDEF]'
2022-10-17 18:06:54 us=250000 show_tls_ciphers = DISABLED
2022-10-17 18:06:54 us=250000 connect_retry_max = 0
2022-10-17 18:06:54 us=250000 Connection profiles [0]:
2022-10-17 18:06:54 us=250000 proto = udp
2022-10-17 18:06:54 us=250000 local = '[UNDEF]'
2022-10-17 18:06:54 us=250000 local_port = '1194'
2022-10-17 18:06:54 us=250000 remote = '[UNDEF]'
2022-10-17 18:06:54 us=250000 remote_port = '1194'
2022-10-17 18:06:54 us=250000 remote_float = DISABLED
2022-10-17 18:06:54 us=250000 bind_defined = DISABLED
2022-10-17 18:06:54 us=250000 bind_local = ENABLED
2022-10-17 18:06:54 us=250000 bind_ipv6_only = DISABLED
2022-10-17 18:06:54 us=250000 connect_retry_seconds = 5
2022-10-17 18:06:54 us=250000 connect_timeout = 120
2022-10-17 18:06:54 us=250000 socks_proxy_server = '[UNDEF]'
2022-10-17 18:06:54 us=250000 socks_proxy_port = '[UNDEF]'
2022-10-17 18:06:54 us=250000 tun_mtu = 1500
2022-10-17 18:06:54 us=250000 tun_mtu_defined = ENABLED
2022-10-17 18:06:54 us=250000 link_mtu = 1500
2022-10-17 18:06:54 us=250000 link_mtu_defined = DISABLED
2022-10-17 18:06:54 us=250000 tun_mtu_extra = 0
2022-10-17 18:06:54 us=250000 tun_mtu_extra_defined = DISABLED
2022-10-17 18:06:54 us=250000 mtu_discover_type = -1
2022-10-17 18:06:54 us=250000 fragment = 0
2022-10-17 18:06:54 us=250000 mssfix = 1450
2022-10-17 18:06:54 us=250000 explicit_exit_notification = 0
2022-10-17 18:06:54 us=250000 tls_auth_file = '[UNDEF]'
2022-10-17 18:06:54 us=250000 key_direction = not set
2022-10-17 18:06:54 us=250000 tls_crypt_file = '[UNDEF]'
2022-10-17 18:06:54 us=250000 tls_crypt_v2_file = '[UNDEF]'
2022-10-17 18:06:54 us=250000 Connection profiles END
2022-10-17 18:06:54 us=250000 remote_random = DISABLED
2022-10-17 18:06:54 us=250000 ipchange = '[UNDEF]'
2022-10-17 18:06:54 us=250000 dev = 'tun'
2022-10-17 18:06:54 us=250000 dev_type = '[UNDEF]'
2022-10-17 18:06:54 us=250000 dev_node = '[UNDEF]'
2022-10-17 18:06:54 us=250000 lladdr = '[UNDEF]'
2022-10-17 18:06:54 us=250000 topology = 1
2022-10-17 18:06:54 us=250000 ifconfig_local = '10.30.0.1'
2022-10-17 18:06:54 us=250000 ifconfig_remote_netmask = '10.30.0.2'
2022-10-17 18:06:54 us=250000 ifconfig_noexec = DISABLED
2022-10-17 18:06:54 us=250000 server_bridge_ip = 0.0.0.0
2022-10-17 18:06:54 us=250000 server_bridge_netmask = 0.0.0.0
2022-10-17 18:06:54 us=250000 server_bridge_pool_start = 0.0.0.0
2022-10-17 18:06:54 us=250000 server_bridge_pool_end = 0.0.0.0
2022-10-17 18:06:54 us=250000 push_entry = 'route 172.20.0.0 255.255.0.0'
2022-10-17 18:06:54 us=250000 push_entry = 'route 10.30.0.1'
2022-10-17 18:06:54 us=250000 push_entry = 'topology net30'
2022-10-17 18:06:54 us=250000 push_entry = 'ping 10'
2022-10-17 18:06:54 us=250000 push_entry = 'ping-restart 120'
2022-10-17 18:06:54 us=250000 ifconfig_pool_defined = ENABLED
2022-10-17 18:06:54 us=250000 ifconfig_pool_start = 10.30.0.4
2022-10-17 18:06:54 us=250000 ifconfig_pool_end = 10.30.255.251
2022-10-17 18:06:54 us=250000 ifconfig_pool_netmask = 0.0.0.0
2022-10-17 18:06:54 us=250000 ifconfig_pool_persist_filename = 'ipp.txt'
2022-10-17 18:06:54 us=250000 ifconfig_pool_persist_refresh_freq = 600
2022-10-17 18:06:54 us=250000 ifconfig_ipv6_pool_defined = DISABLED
2022-10-17 18:06:54 us=250000 ifconfig_ipv6_pool_base = ::
2022-10-17 18:06:54 us=250000 ifconfig_ipv6_pool_netbits = 0
2022-10-17 18:06:54 us=250000 n_bcast_buf = 256
2022-10-17 18:06:54 us=250000 tcp_queue_limit = 64
2022-10-17 18:06:54 us=250000 real_hash_size = 256
2022-10-17 18:06:54 us=250000 virtual_hash_size = 256
2022-10-17 18:06:54 us=250000 client_connect_script = '[UNDEF]'
2022-10-17 18:06:54 us=250000 learn_address_script = '[UNDEF]'
2022-10-17 18:06:54 us=250000 client_disconnect_script = '[UNDEF]'
2022-10-17 18:06:54 us=250000 client_config_dir = '[UNDEF]'
2022-10-17 18:06:54 us=250000 ccd_exclusive = DISABLED
2022-10-17 18:06:54 us=250000 tmp_dir = 'C:\Windows\TEMP\'
2022-10-17 18:06:54 us=250000 push_ifconfig_defined = DISABLED
2022-10-17 18:06:54 us=250000 push_ifconfig_local = 0.0.0.0
2022-10-17 18:06:54 us=250000 push_ifconfig_remote_netmask = 0.0.0.0
2022-10-17 18:06:54 us=250000 push_ifconfig_ipv6_defined = DISABLED
2022-10-17 18:08:56 us=812000 185.112.151.14:20061 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:08:56 us=812000 185.112.151.14:20061 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:08:56 us=812000 185.112.151.14:20061 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:08:56 us=812000 185.112.151.14:20061 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:08:56 us=812000 185.112.151.14:20061 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:20061, sid=6a22eb44 5adb63fe
2022-10-17 18:09:08 us=546000 MULTI: multi_create_instance called
2022-10-17 18:09:08 us=546000 45.164.19.238:1900 Re-using SSL/TLS context
2022-10-17 18:09:08 us=546000 45.164.19.238:1900 LZO compression initializing
2022-10-17 18:09:08 us=546000 45.164.19.238:1900 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:09:08 us=546000 45.164.19.238:1900 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:09:08 us=546000 45.164.19.238:1900 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:09:08 us=546000 45.164.19.238:1900 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:09:08 us=546000 45.164.19.238:1900 TLS: Initial packet from [AF_INET6]::ffff:45.164.19.238:1900, sid=6a22eb44 5adb63fe
2022-10-17 18:09:10 us=593000 MULTI: multi_create_instance called
2022-10-17 18:09:10 us=593000 185.112.151.14:33886 Re-using SSL/TLS context
2022-10-17 18:09:10 us=593000 185.112.151.14:33886 LZO compression initializing
2022-10-17 18:09:10 us=593000 185.112.151.14:33886 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:09:10 us=593000 185.112.151.14:33886 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:09:10 us=593000 185.112.151.14:33886 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:09:10 us=593000 185.112.151.14:33886 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:09:10 us=593000 185.112.151.14:33886 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:33886, sid=6a22eb44 5adb63fe
2022-10-17 18:09:16 us=937000 MULTI: multi_create_instance called
2022-10-17 18:09:16 us=937000 185.112.151.14:18224 Re-using SSL/TLS context
2022-10-17 18:09:16 us=937000 185.112.151.14:18224 LZO compression initializing
2022-10-17 18:09:16 us=937000 185.112.151.14:18224 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:09:16 us=937000 185.112.151.14:18224 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:09:16 us=937000 185.112.151.14:18224 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:09:16 us=937000 185.112.151.14:18224 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:09:16 us=937000 185.112.151.14:18224 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:18224, sid=6a22eb44 5adb63fe
2022-10-17 18:09:29 us=875000 185.112.151.14:17069 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:09:29 us=875000 185.112.151.14:17069 TLS Error: TLS handshake failed
2022-10-17 18:09:29 us=875000 185.112.151.14:17069 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:09:30 us=640000 MULTI: multi_create_instance called
2022-10-17 18:09:30 us=640000 185.112.151.14:724 Re-using SSL/TLS context
2022-10-17 18:09:30 us=640000 185.112.151.14:724 LZO compression initializing
2022-10-17 18:09:30 us=640000 185.112.151.14:724 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:09:30 us=640000 185.112.151.14:724 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:09:30 us=640000 185.112.151.14:724 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:09:30 us=640000 185.112.151.14:724 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:09:30 us=640000 185.112.151.14:724 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:724, sid=6a22eb44 5adb63fe
2022-10-17 18:09:36 us=484000 185.112.151.14:21402 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:09:36 us=484000 185.112.151.14:21402 TLS Error: TLS handshake failed
2022-10-17 18:09:36 us=484000 185.112.151.14:21402 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:09:37 us=750000 MULTI: multi_create_instance called
2022-10-17 18:09:37 us=750000 185.112.151.14:37064 Re-using SSL/TLS context
2022-10-17 18:09:37 us=750000 185.112.151.14:37064 LZO compression initializing
2022-10-17 18:09:37 us=750000 185.112.151.14:37064 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:09:37 us=750000 185.112.151.14:37064 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:09:37 us=750000 185.112.151.14:37064 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:09:37 us=750000 185.112.151.14:37064 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:09:37 us=750000 185.112.151.14:37064 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:37064, sid=6a22eb44 5adb63fe
2022-10-17 18:09:49 us=796000 185.112.151.14:43883 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:09:49 us=796000 185.112.151.14:43883 TLS Error: TLS handshake failed
2022-10-17 18:09:49 us=796000 185.112.151.14:43883 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:09:51 us=546000 MULTI: multi_create_instance called
2022-10-17 18:09:51 us=546000 185.112.151.14:6281 Re-using SSL/TLS context
2022-10-17 18:09:51 us=546000 185.112.151.14:6281 LZO compression initializing
2022-10-17 18:09:51 us=546000 185.112.151.14:6281 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:09:51 us=546000 185.112.151.14:6281 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:09:51 us=546000 185.112.151.14:6281 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:09:51 us=546000 185.112.151.14:6281 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:09:51 us=546000 185.112.151.14:6281 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:6281, sid=6a22eb44 5adb63fe
2022-10-17 18:09:56 us=109000 185.112.151.14:20061 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:09:56 us=109000 185.112.151.14:20061 TLS Error: TLS handshake failed
2022-10-17 18:09:56 us=109000 185.112.151.14:20061 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:09:57 us=859000 MULTI: multi_create_instance called
2022-10-17 18:09:57 us=859000 185.112.151.14:14985 Re-using SSL/TLS context
2022-10-17 18:09:57 us=859000 185.112.151.14:14985 LZO compression initializing
2022-10-17 18:09:57 us=859000 185.112.151.14:14985 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:09:57 us=859000 185.112.151.14:14985 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:09:57 us=859000 185.112.151.14:14985 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:09:57 us=859000 185.112.151.14:14985 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:09:57 us=859000 185.112.151.14:14985 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:14985, sid=6a22eb44 5adb63fe
2022-10-17 18:10:08 us=515000 45.164.19.238:1900 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:10:08 us=515000 45.164.19.238:1900 TLS Error: TLS handshake failed
2022-10-17 18:10:08 us=515000 45.164.19.238:1900 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:10:08 us=750000 MULTI: multi_create_instance called
2022-10-17 18:10:08 us=750000 45.164.19.238:1900 Re-using SSL/TLS context
2022-10-17 18:10:08 us=750000 45.164.19.238:1900 LZO compression initializing
2022-10-17 18:10:08 us=750000 45.164.19.238:1900 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:10:08 us=750000 45.164.19.238:1900 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:10:08 us=750000 45.164.19.238:1900 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:10:08 us=750000 45.164.19.238:1900 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:10:08 us=750000 45.164.19.238:1900 TLS: Initial packet from [AF_INET6]::ffff:45.164.19.238:1900, sid=6a22eb44 5adb63fe
2022-10-17 18:10:10 us=453000 185.112.151.14:33886 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:10:10 us=453000 185.112.151.14:33886 TLS Error: TLS handshake failed
2022-10-17 18:10:10 us=453000 185.112.151.14:33886 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:10:11 us=593000 MULTI: multi_create_instance called
2022-10-17 18:10:11 us=593000 185.112.151.14:29052 Re-using SSL/TLS context
2022-10-17 18:10:11 us=593000 185.112.151.14:29052 LZO compression initializing
2022-10-17 18:10:11 us=593000 185.112.151.14:29052 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:10:11 us=593000 185.112.151.14:29052 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:10:11 us=593000 185.112.151.14:29052 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:10:11 us=593000 185.112.151.14:29052 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:10:11 us=593000 185.112.151.14:29052 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:29052, sid=6a22eb44 5adb63fe
2022-10-17 18:10:16 us=375000 185.112.151.14:18224 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:10:16 us=375000 185.112.151.14:18224 TLS Error: TLS handshake failed
2022-10-17 18:10:16 us=375000 185.112.151.14:18224 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:10:18 us=656000 MULTI: multi_create_instance called
2022-10-17 18:10:18 us=656000 185.112.151.14:12615 Re-using SSL/TLS context
2022-10-17 18:10:18 us=656000 185.112.151.14:12615 LZO compression initializing
2022-10-17 18:10:18 us=656000 185.112.151.14:12615 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:10:18 us=656000 185.112.151.14:12615 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:10:18 us=656000 185.112.151.14:12615 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:10:18 us=656000 185.112.151.14:12615 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:10:18 us=656000 185.112.151.14:12615 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:12615, sid=6a22eb44 5adb63fe
2022-10-17 18:10:30 185.112.151.14:724 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:10:30 185.112.151.14:724 TLS Error: TLS handshake failed
2022-10-17 18:10:30 185.112.151.14:724 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:10:31 us=656000 MULTI: multi_create_instance called
2022-10-17 18:10:31 us=656000 185.112.151.14:15954 Re-using SSL/TLS context
2022-10-17 18:10:31 us=656000 185.112.151.14:15954 LZO compression initializing
2022-10-17 18:10:31 us=656000 185.112.151.14:15954 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:10:31 us=656000 185.112.151.14:15954 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:10:31 us=656000 185.112.151.14:15954 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:10:31 us=656000 185.112.151.14:15954 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:10:31 us=656000 185.112.151.14:15954 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:15954, sid=6a22eb44 5adb63fe
2022-10-17 18:10:38 us=31000 185.112.151.14:37064 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:10:38 us=31000 185.112.151.14:37064 TLS Error: TLS handshake failed
2022-10-17 18:10:38 us=31000 185.112.151.14:37064 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:10:38 us=765000 MULTI: multi_create_instance called
2022-10-17 18:10:38 us=765000 185.112.151.14:34137 Re-using SSL/TLS context
2022-10-17 18:10:38 us=765000 185.112.151.14:34137 LZO compression initializing
2022-10-17 18:10:38 us=765000 185.112.151.14:34137 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:10:38 us=765000 185.112.151.14:34137 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:10:38 us=765000 185.112.151.14:34137 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:10:38 us=765000 185.112.151.14:34137 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:10:38 us=765000 185.112.151.14:34137 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:34137, sid=6a22eb44 5adb63fe
2022-10-17 18:10:51 us=812000 185.112.151.14:6281 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:10:51 us=812000 185.112.151.14:6281 TLS Error: TLS handshake failed
2022-10-17 18:10:51 us=812000 185.112.151.14:6281 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:10:52 us=546000 MULTI: multi_create_instance called
2022-10-17 18:10:52 us=546000 185.112.151.14:26541 Re-using SSL/TLS context
2022-10-17 18:10:52 us=546000 185.112.151.14:26541 LZO compression initializing
2022-10-17 18:10:52 us=546000 185.112.151.14:26541 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:10:52 us=546000 185.112.151.14:26541 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:10:52 us=546000 185.112.151.14:26541 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:10:52 us=546000 185.112.151.14:26541 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:10:52 us=546000 185.112.151.14:26541 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:26541, sid=6a22eb44 5adb63fe
2022-10-17 18:10:57 us=453000 185.112.151.14:14985 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:10:57 us=453000 185.112.151.14:14985 TLS Error: TLS handshake failed
2022-10-17 18:10:57 us=453000 185.112.151.14:14985 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:10:58 us=875000 MULTI: multi_create_instance called
2022-10-17 18:10:58 us=875000 185.112.151.14:47503 Re-using SSL/TLS context
2022-10-17 18:10:58 us=875000 185.112.151.14:47503 LZO compression initializing
2022-10-17 18:10:58 us=875000 185.112.151.14:47503 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:10:58 us=875000 185.112.151.14:47503 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:10:58 us=875000 185.112.151.14:47503 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:10:58 us=875000 185.112.151.14:47503 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:10:58 us=875000 185.112.151.14:47503 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:47503, sid=6a22eb44 5adb63fe
2022-10-17 18:11:08 us=812000 45.164.19.238:1900 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-10-17 18:11:08 us=812000 45.164.19.238:1900 TLS Error: TLS handshake failed
2022-10-17 18:11:08 us=812000 45.164.19.238:1900 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:11:09 us=625000 MULTI: multi_create_instance called
2022-10-17 18:11:09 us=625000 45.164.19.238:1900 Re-using SSL/TLS context
2022-10-17 18:11:09 us=625000 45.164.19.238:1900 LZO compression initializing
2022-10-17 18:11:09 us=625000 45.164.19.238:1900 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:11:09 us=625000 45.164.19.238:1900 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:11:09 us=625000 45.164.19.238:1900 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-
2022-10-17 18:23:31 us=671000 185.112.151.14:48824 TLS Error: TLS handshake failed
2022-10-17 18:23:31 us=671000 185.112.151.14:48824 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-10-17 18:23:32 us=812000 MULTI: multi_create_instance called
2022-10-17 18:23:32 us=812000 185.112.151.14:32975 Re-using SSL/TLS context
2022-10-17 18:23:32 us=812000 185.112.151.14:32975 LZO compression initializing
2022-10-17 18:23:32 us=812000 185.112.151.14:32975 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:23:32 us=812000 185.112.151.14:32975 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:23:32 us=812000 185.112.151.14:32975 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:23:32 us=812000 185.112.151.14:32975 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:23:32 us=812000 185.112.151.14:32975 TLS: Initial packet from [AF_INET6]::ffff:185.112.151.14:32975, sid=6a22eb44 5adb63fe
2022-10-17 18:23:41 us=859000 TCP/UDP: Closing socket
2022-10-17 18:23:41 us=859000 C:\Windows\system32\route.exe DELETE 10.30.0.0 MASK 255.255.0.0 10.30.0.2
2022-10-17 18:23:41 us=859000 Warning: route gateway is not reachable on any active network adapters: 10.30.0.2
2022-10-17 18:23:41 us=859000 Route deletion via IPAPI failed [adaptive]
2022-10-17 18:23:41 us=859000 Route deletion fallback to route.exe
2022-10-17 18:23:41 us=859000 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
2022-10-17 18:23:41 us=875000 Closing TUN/TAP interface
2022-10-17 18:23:41 us=875000 SIGTERM[hard,] received, process exiting



-------Cliente.log
2022-10-17 18:48:17 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2022-10-17 18:48:17 us=62000 --cipher is not set. Previous OpenVPN version defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2022-10-17 18:48:17 us=62000 Current Parameter Settings:
2022-10-17 18:48:17 us=62000 config = 'client.ovpn'
2022-10-17 18:48:17 us=62000 mode = 0
2022-10-17 18:48:17 us=62000 show_ciphers = DISABLED
2022-10-17 18:48:17 us=62000 show_digests = DISABLED
2022-10-17 18:48:17 us=62000 show_engines = DISABLED
2022-10-17 18:48:17 us=62000 genkey = DISABLED
2022-10-17 18:48:17 us=62000 genkey_filename = '[UNDEF]'
2022-10-17 18:48:17 us=62000 key_pass_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 show_tls_ciphers = DISABLED
2022-10-17 18:48:17 us=62000 connect_retry_max = 0
2022-10-17 18:48:17 us=62000 Connection profiles [0]:
2022-10-17 18:48:17 us=62000 proto = udp
2022-10-17 18:48:17 us=62000 local = '[UNDEF]'
2022-10-17 18:48:17 us=62000 local_port = '[UNDEF]'
2022-10-17 18:48:17 us=62000 remote = '181.xxx.xx.xxx'
2022-10-17 18:48:17 us=62000 remote_port = '1194'
2022-10-17 18:48:17 us=62000 remote_float = DISABLED
2022-10-17 18:48:17 us=62000 bind_defined = DISABLED
2022-10-17 18:48:17 us=62000 bind_local = DISABLED
2022-10-17 18:48:17 us=62000 bind_ipv6_only = DISABLED
2022-10-17 18:48:17 us=62000 connect_retry_seconds = 5
2022-10-17 18:48:17 us=62000 connect_timeout = 120
2022-10-17 18:48:17 us=62000 socks_proxy_server = '[UNDEF]'
2022-10-17 18:48:17 us=62000 socks_proxy_port = '[UNDEF]'
2022-10-17 18:48:17 us=62000 tun_mtu = 1500
2022-10-17 18:48:17 us=62000 tun_mtu_defined = ENABLED
2022-10-17 18:48:17 us=62000 link_mtu = 1500
2022-10-17 18:48:17 us=62000 link_mtu_defined = DISABLED
2022-10-17 18:48:17 us=62000 tun_mtu_extra = 0
2022-10-17 18:48:17 us=62000 tun_mtu_extra_defined = DISABLED
2022-10-17 18:48:17 us=62000 mtu_discover_type = -1
2022-10-17 18:48:17 us=62000 fragment = 0
2022-10-17 18:48:17 us=62000 mssfix = 1450
2022-10-17 18:48:17 us=62000 explicit_exit_notification = 0
2022-10-17 18:48:17 us=62000 tls_auth_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 key_direction = not set
2022-10-17 18:48:17 us=62000 tls_crypt_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 tls_crypt_v2_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 Connection profiles END
2022-10-17 18:48:17 us=62000 remote_random = DISABLED
2022-10-17 18:48:17 us=62000 ipchange = '[UNDEF]'
2022-10-17 18:48:17 us=62000 dev = 'tun'
2022-10-17 18:48:17 us=62000 dev_type = '[UNDEF]'
2022-10-17 18:48:17 us=62000 dev_node = '[UNDEF]'
2022-10-17 18:48:17 us=62000 lladdr = '[UNDEF]'
2022-10-17 18:48:17 us=62000 topology = 1
2022-10-17 18:48:17 us=62000 ifconfig_local = '[UNDEF]'
2022-10-17 18:48:17 us=62000 ifconfig_remote_netmask = '[UNDEF]'
2022-10-17 18:48:17 us=62000 ifconfig_noexec = DISABLED
2022-10-17 18:48:17 us=62000 ifconfig_nowarn = DISABLED
2022-10-17 18:48:17 us=62000 ifconfig_ipv6_local = '[UNDEF]'
2022-10-17 18:48:17 us=62000 ifconfig_ipv6_netbits = 0
2022-10-17 18:48:17 us=62000 ifconfig_ipv6_remote = '[UNDEF]'
2022-10-17 18:48:17 us=62000 shaper = 0
2022-10-17 18:48:17 us=62000 mtu_test = 0
2022-10-17 18:48:17 us=62000 mlock = DISABLED
2022-10-17 18:48:17 us=62000 keepalive_ping = 0
2022-10-17 18:48:17 us=62000 keepalive_timeout = 0
2022-10-17 18:48:17 us=62000 inactivity_timeout = 0
2022-10-17 18:48:17 us=62000 inactivity_minimum_bytes = 0
2022-10-17 18:48:17 us=62000 ping_send_timeout = 0
2022-10-17 18:48:17 us=62000 ping_rec_timeout = 0
2022-10-17 18:48:17 us=62000 ping_rec_timeout_action = 0
2022-10-17 18:48:17 us=62000 ping_timer_remote = DISABLED
2022-10-17 18:48:17 us=62000 remap_sigusr1 = 0
2022-10-17 18:48:17 us=62000 persist_tun = ENABLED
2022-10-17 18:48:17 us=62000 persist_local_ip = DISABLED
2022-10-17 18:48:17 us=62000 persist_remote_ip = DISABLED
2022-10-17 18:48:17 us=62000 persist_key = ENABLED
2022-10-17 18:48:17 us=62000 passtos = DISABLED
2022-10-17 18:48:17 us=62000 resolve_retry_seconds = 1000000000
2022-10-17 18:48:17 us=62000 resolve_in_advance = DISABLED
2022-10-17 18:48:17 us=62000 username = '[UNDEF]'
2022-10-17 18:48:17 us=62000 groupname = '[UNDEF]'
2022-10-17 18:48:17 us=62000 chroot_dir = '[UNDEF]'
2022-10-17 18:48:17 us=62000 cd_dir = '[UNDEF]'
2022-10-17 18:48:17 us=62000 writepid = '[UNDEF]'
2022-10-17 18:48:17 us=62000 up_script = '[UNDEF]'
2022-10-17 18:48:17 us=62000 down_script = '[UNDEF]'
2022-10-17 18:48:17 us=62000 down_pre = DISABLED
2022-10-17 18:48:17 us=62000 up_restart = DISABLED
2022-10-17 18:48:17 us=62000 up_delay = DISABLED
2022-10-17 18:48:17 us=62000 daemon = DISABLED
2022-10-17 18:48:17 us=62000 inetd = 0
2022-10-17 18:48:17 us=62000 log = ENABLED
2022-10-17 18:48:17 us=62000 suppress_timestamps = DISABLED
2022-10-17 18:48:17 us=62000 machine_readable_output = DISABLED
2022-10-17 18:48:17 us=62000 nice = 0
2022-10-17 18:48:17 us=62000 verbosity = 4
2022-10-17 18:48:17 us=62000 mute = 0
2022-10-17 18:48:17 us=62000 status_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 status_file_version = 1
2022-10-17 18:48:17 us=62000 status_file_update_freq = 60
2022-10-17 18:48:17 us=62000 occ = ENABLED
2022-10-17 18:48:17 us=62000 rcvbuf = 0
2022-10-17 18:48:17 us=62000 sndbuf = 0
2022-10-17 18:48:17 us=62000 sockflags = 0
2022-10-17 18:48:17 us=62000 fast_io = DISABLED
2022-10-17 18:48:17 us=62000 comp.alg = 2
2022-10-17 18:48:17 us=62000 comp.flags = 1
2022-10-17 18:48:17 us=62000 route_script = '[UNDEF]'
2022-10-17 18:48:17 us=62000 route_default_gateway = '[UNDEF]'
2022-10-17 18:48:17 us=62000 route_default_metric = 0
2022-10-17 18:48:17 us=62000 route_noexec = DISABLED
2022-10-17 18:48:17 us=62000 route_delay = 5
2022-10-17 18:48:17 us=62000 route_delay_window = 30
2022-10-17 18:48:17 us=62000 route_delay_defined = ENABLED
2022-10-17 18:48:17 us=62000 route_nopull = DISABLED
2022-10-17 18:48:17 us=62000 route_gateway_via_dhcp = DISABLED
2022-10-17 18:48:17 us=62000 allow_pull_fqdn = DISABLED
2022-10-17 18:48:17 us=62000 Pull filters:
2022-10-17 18:48:17 us=62000 ignore "route-method"
2022-10-17 18:48:17 us=62000 management_addr = '127.0.0.1'
2022-10-17 18:48:17 us=62000 management_port = '25340'
2022-10-17 18:48:17 us=62000 management_user_pass = 'stdin'
2022-10-17 18:48:17 us=62000 management_log_history_cache = 250
2022-10-17 18:48:17 us=62000 management_echo_buffer_size = 100
2022-10-17 18:48:17 us=62000 management_write_peer_info_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 management_client_user = '[UNDEF]'
2022-10-17 18:48:17 us=62000 management_client_group = '[UNDEF]'
2022-10-17 18:48:17 us=62000 management_flags = 6
2022-10-17 18:48:17 us=62000 shared_secret_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 key_direction = not set
2022-10-17 18:48:17 us=62000 ciphername = 'BF-CBC'
2022-10-17 18:48:17 us=62000 ncp_enabled = ENABLED
2022-10-17 18:48:17 us=62000 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
2022-10-17 18:48:17 us=62000 authname = 'SHA1'
2022-10-17 18:48:17 us=62000 prng_hash = 'SHA1'
2022-10-17 18:48:17 us=62000 prng_nonce_secret_len = 16
2022-10-17 18:48:17 us=62000 keysize = 0
2022-10-17 18:48:17 us=62000 engine = DISABLED
2022-10-17 18:48:17 us=62000 replay = ENABLED
2022-10-17 18:48:17 us=62000 mute_replay_warnings = DISABLED
2022-10-17 18:48:17 us=62000 replay_window = 64
2022-10-17 18:48:17 us=62000 replay_time = 15
2022-10-17 18:48:17 us=62000 packet_id_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 test_crypto = DISABLED
2022-10-17 18:48:17 us=62000 tls_server = DISABLED
2022-10-17 18:48:17 us=62000 tls_client = ENABLED
2022-10-17 18:48:17 us=62000 ca_file = 'ca.crt'
2022-10-17 18:48:17 us=62000 ca_path = '[UNDEF]'
2022-10-17 18:48:17 us=62000 dh_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 cert_file = 'client01.crt'
2022-10-17 18:48:17 us=62000 extra_certs_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 priv_key_file = 'client01.key'
2022-10-17 18:48:17 us=62000 pkcs12_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 cryptoapi_cert = '[UNDEF]'
2022-10-17 18:48:17 us=62000 cipher_list = '[UNDEF]'
2022-10-17 18:48:17 us=62000 cipher_list_tls13 = '[UNDEF]'
2022-10-17 18:48:17 us=62000 tls_cert_profile = '[UNDEF]'
2022-10-17 18:48:17 us=62000 tls_verify = '[UNDEF]'
2022-10-17 18:48:17 us=62000 tls_export_cert = '[UNDEF]'
2022-10-17 18:48:17 us=62000 verify_x509_type = 0
2022-10-17 18:48:17 us=62000 verify_x509_name = '[UNDEF]'
2022-10-17 18:48:17 us=62000 crl_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 ns_cert_type = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku[i] = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku[i] = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku[i] = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku[i] = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku[i] = 0
2022-10-17 18:48:17 us=62000 remote_cert_ku[i] = 0
2022-10-17 18:48:17 us=62000 remote_cert_eku = '[UNDEF]'
2022-10-17 18:48:17 us=62000 ssl_flags = 0
2022-10-17 18:48:17 us=62000 tls_timeout = 2
2022-10-17 18:48:17 us=62000 renegotiate_bytes = -1
2022-10-17 18:48:17 us=62000 renegotiate_packets = 0
2022-10-17 18:48:17 us=62000 renegotiate_seconds = 3600
2022-10-17 18:48:17 us=62000 handshake_window = 60
2022-10-17 18:48:17 us=62000 transition_window = 3600
2022-10-17 18:48:17 us=62000 single_session = DISABLED
2022-10-17 18:48:17 us=62000 push_peer_info = DISABLED
2022-10-17 18:48:17 us=62000 tls_exit = DISABLED
2022-10-17 18:48:17 us=62000 tls_crypt_v2_metadata = '[UNDEF]'
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_protected_authentication = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_private_mode = 00000000
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_cert_private = DISABLED
2022-10-17 18:48:17 us=62000 pkcs11_pin_cache_period = -1
2022-10-17 18:48:17 us=62000 pkcs11_id = '[UNDEF]'
2022-10-17 18:48:17 us=62000 pkcs11_id_management = DISABLED
2022-10-17 18:48:17 us=62000 server_network = 0.0.0.0
2022-10-17 18:48:17 us=62000 server_netmask = 0.0.0.0
2022-10-17 18:48:17 us=62000 server_network_ipv6 = ::
2022-10-17 18:48:17 us=62000 server_netbits_ipv6 = 0
2022-10-17 18:48:17 us=62000 server_bridge_ip = 0.0.0.0
2022-10-17 18:48:17 us=62000 server_bridge_netmask = 0.0.0.0
2022-10-17 18:48:17 us=62000 server_bridge_pool_start = 0.0.0.0
2022-10-17 18:48:17 us=62000 server_bridge_pool_end = 0.0.0.0
2022-10-17 18:48:17 us=62000 ifconfig_pool_defined = DISABLED
2022-10-17 18:48:17 us=62000 ifconfig_pool_start = 0.0.0.0
2022-10-17 18:48:17 us=62000 ifconfig_pool_end = 0.0.0.0
2022-10-17 18:48:17 us=62000 ifconfig_pool_netmask = 0.0.0.0
2022-10-17 18:48:17 us=62000 ifconfig_pool_persist_filename = '[UNDEF]'
2022-10-17 18:48:17 us=62000 ifconfig_pool_persist_refresh_freq = 600
2022-10-17 18:48:17 us=62000 ifconfig_ipv6_pool_defined = DISABLED
2022-10-17 18:48:17 us=62000 ifconfig_ipv6_pool_base = ::
2022-10-17 18:48:17 us=62000 ifconfig_ipv6_pool_netbits = 0
2022-10-17 18:48:17 us=62000 n_bcast_buf = 256
2022-10-17 18:48:17 us=62000 tcp_queue_limit = 64
2022-10-17 18:48:17 us=62000 real_hash_size = 256
2022-10-17 18:48:17 us=62000 virtual_hash_size = 256
2022-10-17 18:48:17 us=62000 client_connect_script = '[UNDEF]'
2022-10-17 18:48:17 us=62000 learn_address_script = '[UNDEF]'
2022-10-17 18:48:17 us=62000 client_disconnect_script = '[UNDEF]'
2022-10-17 18:48:17 us=62000 client_config_dir = '[UNDEF]'
2022-10-17 18:48:17 us=62000 ccd_exclusive = DISABLED
2022-10-17 18:48:17 us=62000 tmp_dir = 'C:\Users\GPEREZ~1\AppData\Local\Temp\'
2022-10-17 18:48:17 us=62000 push_ifconfig_defined = DISABLED
2022-10-17 18:48:17 us=62000 push_ifconfig_local = 0.0.0.0
2022-10-17 18:48:17 us=62000 push_ifconfig_remote_netmask = 0.0.0.0
2022-10-17 18:48:17 us=62000 push_ifconfig_ipv6_defined = DISABLED
2022-10-17 18:48:17 us=62000 push_ifconfig_ipv6_local = ::/0
2022-10-17 18:48:17 us=62000 push_ifconfig_ipv6_remote = ::
2022-10-17 18:48:17 us=62000 enable_c2c = DISABLED
2022-10-17 18:48:17 us=62000 duplicate_cn = DISABLED
2022-10-17 18:48:17 us=62000 cf_max = 0
2022-10-17 18:48:17 us=62000 cf_per = 0
2022-10-17 18:48:17 us=62000 max_clients = 1024
2022-10-17 18:48:17 us=62000 max_routes_per_client = 256
2022-10-17 18:48:17 us=62000 auth_user_pass_verify_script = '[UNDEF]'
2022-10-17 18:48:17 us=62000 auth_user_pass_verify_script_via_file = DISABLED
2022-10-17 18:48:17 us=62000 auth_token_generate = DISABLED
2022-10-17 18:48:17 us=62000 auth_token_lifetime = 0
2022-10-17 18:48:17 us=62000 auth_token_secret_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 vlan_tagging = DISABLED
2022-10-17 18:48:17 us=62000 vlan_accept = all
2022-10-17 18:48:17 us=62000 vlan_pvid = 1
2022-10-17 18:48:17 us=62000 client = ENABLED
2022-10-17 18:48:17 us=62000 pull = ENABLED
2022-10-17 18:48:17 us=62000 auth_user_pass_file = '[UNDEF]'
2022-10-17 18:48:17 us=62000 show_net_up = DISABLED
2022-10-17 18:48:17 us=62000 route_method = 3
2022-10-17 18:48:17 us=62000 block_outside_dns = DISABLED
2022-10-17 18:48:17 us=62000 ip_win32_defined = DISABLED
2022-10-17 18:48:17 us=62000 ip_win32_type = 3
2022-10-17 18:48:17 us=62000 dhcp_masq_offset = 0
2022-10-17 18:48:17 us=62000 dhcp_lease_time = 31536000
2022-10-17 18:48:17 us=62000 tap_sleep = 0
2022-10-17 18:48:17 us=62000 dhcp_options = DISABLED
2022-10-17 18:48:17 us=62000 dhcp_renew = DISABLED
2022-10-17 18:48:17 us=62000 dhcp_pre_release = DISABLED
2022-10-17 18:48:17 us=62000 domain = '[UNDEF]'
2022-10-17 18:48:17 us=62000 netbios_scope = '[UNDEF]'
2022-10-17 18:48:17 us=62000 netbios_node_type = 0
2022-10-17 18:48:17 us=62000 disable_nbt = DISABLED
2022-10-17 18:48:17 us=62000 OpenVPN 2.5.6 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on May 12 2022
2022-10-17 18:48:17 us=62000 Windows version 10.0 (Windows 10 or greater) 64bit
2022-10-17 18:48:17 us=62000 library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10
2022-10-17 18:48:17 us=62000 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
2022-10-17 18:48:17 us=62000 Need hold release from management interface, waiting...
2022-10-17 18:48:17 us=62000 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
2022-10-17 18:48:17 us=187000 MANAGEMENT: CMD 'state on'
2022-10-17 18:48:17 us=187000 MANAGEMENT: CMD 'log all on'
2022-10-17 18:48:17 us=734000 MANAGEMENT: CMD 'echo all on'
2022-10-17 18:48:17 us=750000 MANAGEMENT: CMD 'bytecount 5'
2022-10-17 18:48:17 us=750000 MANAGEMENT: CMD 'hold off'
2022-10-17 18:48:17 us=765000 MANAGEMENT: CMD 'hold release'
2022-10-17 18:48:17 us=765000 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2022-10-17 18:48:17 us=765000 LZO compression initializing
2022-10-17 18:48:17 us=765000 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2022-10-17 18:48:17 us=765000 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2022-10-17 18:48:17 us=765000 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-client'
2022-10-17 18:48:17 us=765000 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,auth SHA1,keysize 128,key-method 2,tls-server'
2022-10-17 18:48:17 us=765000 TCP/UDP: Preserving recently used remote address: [AF_INET]
2022-10-17 18:48:17 us=765000 Socket Buffers: R=[65536->65536] S=[65536->65536]
2022-10-17 18:48:17 us=765000 UDP link local: (not bound)
2022-10-17 18:48:17 us=765000 UDP link remote: [AF_INET]
2022-10-17 18:48:17 us=765000 MANAGEMENT: >STATE:1666046897,WAIT,,,,,,
2022-10-17 18:48:17 us=843000 MANAGEMENT: >STATE:1666046897,AUTH,,,,,,
2022-10-17 18:48:17 us=843000 TLS: Initial packet from [AF_INET]181.XXXXXX:1194, sid=0b8aec86 8020fe6e
2022-10-17 18:48:17 us=921000 VERIFY OK: depth=1, CN=prismavm
2022-10-17 18:48:17 us=921000 VERIFY OK: depth=0, CN=server
2022-10-17 18:48:18 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-10-17 18:48:18 [server] Peer Connection Initiated with [AF_INET]181.XXXXXXXX:1194
2022-10-17 18:48:18 us=78000 PUSH: Received control message: 'PUSH_REPLY,route 172.20.0.0 255.255.0.0,route 10.30.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.30.0.6 10.30.0.5,peer-id 6,cipher AES-256-GCM'
2022-10-17 18:48:18 us=78000 OPTIONS IMPORT: timers and/or timeouts modified
2022-10-17 18:48:18 us=78000 OPTIONS IMPORT: --ifconfig/up options modified
2022-10-17 18:48:18 us=78000 OPTIONS IMPORT: route options modified
2022-10-17 18:48:18 us=78000 OPTIONS IMPORT: peer-id set
2022-10-17 18:48:18 us=78000 OPTIONS IMPORT: adjusting link_mtu to 1625
2022-10-17 18:48:18 us=78000 OPTIONS IMPORT: data channel crypto options modified
2022-10-17 18:48:18 us=78000 Data Channel: using negotiated cipher 'AES-256-GCM'
2022-10-17 18:48:18 us=78000 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
2022-10-17 18:48:18 us=78000 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-10-17 18:48:18 us=78000 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-10-17 18:48:18 us=78000 interactive service msg_channel=644
2022-10-17 18:48:18 us=93000 open_tun
2022-10-17 18:48:18 us=93000 tap-windows6 device [OpenVPN TAP-Windows6] opened
2022-10-17 18:48:18 us=93000 TAP-Windows Driver Version 9.24
2022-10-17 18:48:18 us=93000 TAP-Windows MTU=1500
2022-10-17 18:48:18 us=93000 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.30.0.6/255.255.255.252 on interface {C1B33FD7-6BFD-4EEE-95F9-9838A33E4B98} [DHCP-serv: 10.30.0.5, lease-time: 31536000]
2022-10-17 18:48:18 us=93000 Successful ARP Flush on interface [16] {C1B33FD7-6BFD-4EEE-95F9-9838A33E4B98}
2022-10-17 18:48:18 us=109000 do_ifconfig, ipv4=1, ipv6=0
2022-10-17 18:48:18 us=109000 MANAGEMENT: >STATE:1666046898,ASSIGN_IP,,10.30.0.6,,,,
2022-10-17 18:48:18 us=109000 IPv4 MTU set to 1500 on interface 16 using service
2022-10-17 18:48:23 us=984000 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up
2022-10-17 18:48:23 us=984000 MANAGEMENT: >STATE:1666046903,ADD_ROUTES,,,,,,
2022-10-17 18:48:23 us=984000 C:\WINDOWS\system32\route.exe ADD 172.20.0.0 MASK 255.255.0.0 10.30.0.5
2022-10-17 18:48:23 us=984000 Route addition via service succeeded
2022-10-17 18:48:23 us=984000 C:\WINDOWS\system32\route.exe ADD 10.30.0.1 MASK 255.255.255.255 10.30.0.5
2022-10-17 18:48:24 Route addition via service succeeded
2022-10-17 18:48:24 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2022-10-17 18:48:24 Initialization Sequence Completed
2022-10-17 18:48:24 MANAGEMENT: >STATE:1666046904,CONNECTED,SUCCESS,10.30.0.6,181.XXXXXXXX,1194,,
2022-10-17 18:49:07 us=843000 TCP/UDP: Closing socket
2022-10-17 18:49:07 us=843000 C:\WINDOWS\system32\route.exe DELETE 172.20.0.0 MASK 255.255.0.0 10.30.0.5
2022-10-17 18:49:07 us=859000 Route deletion via service succeeded
2022-10-17 18:49:07 us=859000 C:\WINDOWS\system32\route.exe DELETE 10.30.0.1 MASK 255.255.255.255 10.30.0.5
2022-10-17 18:49:07 us=859000 Route deletion via service succeeded
2022-10-17 18:49:07 us=859000 Closing TUN/TAP interface
2022-10-17 18:49:07 us=875000 TAP: DHCP address released
2022-10-17 18:49:07 us=875000 SIGTERM[hard,] received, process exiting
2022-10-17 18:49:07 us=875000 MANAGEMENT: >STATE:1666046947,EXITING,SIGTERM,,,,,

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by TinCanTech » Tue Oct 18, 2022 11:02 am

Have you enabled IP Forwarding on the server ..

edissonperez
OpenVpn Newbie
Posts: 2
Joined: Mon Oct 17, 2022 11:34 pm

Re: OpenVPN is connected, but cannot ping network devices from client

Post by edissonperez » Tue Oct 18, 2022 12:56 pm

Hi, @TinCanTech

Yes, Forwarding is Enabled

Interface vEthernet (HP SW) Parameters
----------------------------------------------
IfLuid : ethernet_16
IfIndex : 16
State : connected
Metric : 5
Link MTU : 1500 bytes
Reachable Time : 34500 ms
Base Reachable Time : 30000 ms
Retransmission Interval : 1000 ms
DAD Transmits : 3
Site Prefix Length : 64
Site Id : 1
Forwarding : enabled
Advertising : disabled
Neighbor Discovery : enabled
Neighbor Unreachability Detection : enabled
Router Discovery : dhcp
Managed Address Configuration : enabled
Other Stateful Configuration : enabled
Weak Host Sends : disabled
Weak Host Receives : disabled
Use Automatic Metric : enabled
Ignore Default Routes : disabled
Advertised Router Lifetime : 1800 seconds
Advertise Default Route : disabled
Current Hop Limit : 0
Force ARPND Wake up patterns : disabled
Directed MAC Wake up patterns : disabled
ECN capability : application

Post Reply