Page 2 of 4

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 1:16 pm
by JW0914
Oh, duh, I'm an idiot lol

I use Comodo Internet Security 8 Pro, and I had tried to connect with the firewall, antivirus, sandbox, and HIPS disabled, with the same error message. However, I haven't disabled Comodo the last few times and once I remove the local directive, I'll disable all and try again.

On my Nexus 6 I use DroidWall and allowed the OpenVPN app through, then disabled the firewall altogether after I received connection errors to rule it out. However, I also didn't try disabling it the last few times and will disable when I try to connect again after removing the local directive.

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 1:18 pm
by JW0914
I wanted to apologize again, as my post yesterday morning wasn't intended to be rude or disrespectful

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 1:33 pm
by maikcat
I wanted to apologize again, as my post yesterday morning wasn't intended to be rude or disrespectful
no problem m8, just wanted you to know that being a mod here is not my full time job.. ;)

the symantec based question was made because the errors you encounter on your win 8 and only in your 8
shows that something is blocking openvpn internally...

make the change to the local directive in your server please and try again.

Michael.

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 1:40 pm
by JW0914
I misconfigured openwrt last night, wasn't sure where the issue was, so I reflashed again this morning.... Can I reuse the dh2048.pem after I reflash the firmware, or is that specific key bound to some sort of machine id that gets erased upon a firmware flash (full image, not a sysupgrade tarball, utilizes option -n to not save any configurations)

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 1:48 pm
by maikcat
you can use the SAME set of keys (ca.crt,dhxxxx.pem,server.crt/key,ta.key) and config of course.

Michael.

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 3:26 pm
by JW0914
We're making progress :D

I think there's a configuration issue either within my OpenWRT firewall rules or openvpn config files as I'm no longer getting the connection refused error (with and without CIS 8 Pro enabled)

Windows Client Log
[quote]
Tue Mar 24 09:13:05 2015 pkcs11_protected_authentication = DISABLED
Tue Mar 24 09:13:05 2015 pkcs11_protected_authentication = DISABLED
Tue Mar 24 09:13:05 2015 pkcs11_private_mode = 00000000
Tue Mar 24 09:13:05 2015 pkcs11_private_mode = 00000000
Tue Mar 24 09:13:05 2015 pkcs11_cert_private = DISABLED
Tue Mar 24 09:13:05 2015 pkcs11_cert_private = DISABLED
Tue Mar 24 09:13:05 2015 pkcs11_pin_cache_period = -1
Tue Mar 24 09:13:05 2015 pkcs11_id = '[UNDEF]'
Tue Mar 24 09:13:05 2015 pkcs11_id_management = DISABLED
Tue Mar 24 09:13:05 2015 server_network = 0.0.0.0
Tue Mar 24 09:13:05 2015 server_netmask = 0.0.0.0
Tue Mar 24 09:13:05 2015 server_network_ipv6 = ::
Tue Mar 24 09:13:05 2015 server_netbits_ipv6 = 0
Tue Mar 24 09:13:05 2015 server_bridge_ip = 0.0.0.0
Tue Mar 24 09:13:05 2015 server_bridge_netmask = 0.0.0.0
Tue Mar 24 09:13:05 2015 server_bridge_pool_start = 0.0.0.0
Tue Mar 24 09:13:05 2015 server_bridge_pool_end = 0.0.0.0
Tue Mar 24 09:13:05 2015 ifconfig_pool_defined = DISABLED
Tue Mar 24 09:13:05 2015 ifconfig_pool_start = 0.0.0.0
Tue Mar 24 09:13:05 2015 ifconfig_pool_end = 0.0.0.0
Tue Mar 24 09:13:05 2015 ifconfig_pool_netmask = 0.0.0.0
Tue Mar 24 09:13:05 2015 ifconfig_pool_persist_filename = '[UNDEF]'
Tue Mar 24 09:13:05 2015 ifconfig_pool_persist_refresh_freq = 600
Tue Mar 24 09:13:05 2015 ifconfig_ipv6_pool_defined = DISABLED
Tue Mar 24 09:13:05 2015 ifconfig_ipv6_pool_base = ::
Tue Mar 24 09:13:05 2015 ifconfig_ipv6_pool_netbits = 0
Tue Mar 24 09:13:05 2015 n_bcast_buf = 256
Tue Mar 24 09:13:05 2015 tcp_queue_limit = 64
Tue Mar 24 09:13:05 2015 real_hash_size = 256
Tue Mar 24 09:13:05 2015 virtual_hash_size = 256
Tue Mar 24 09:13:05 2015 client_connect_script = '[UNDEF]'
Tue Mar 24 09:13:05 2015 learn_address_script = '[UNDEF]'
Tue Mar 24 09:13:05 2015 client_disconnect_script = '[UNDEF]'
Tue Mar 24 09:13:05 2015 client_config_dir = '[UNDEF]'
Tue Mar 24 09:13:05 2015 ccd_exclusive = DISABLED
Tue Mar 24 09:13:05 2015 tmp_dir = 'C:\Users\James\AppData\Local\Temp\'
Tue Mar 24 09:13:05 2015 push_ifconfig_defined = DISABLED
Tue Mar 24 09:13:05 2015 push_ifconfig_local = 0.0.0.0
Tue Mar 24 09:13:05 2015 push_ifconfig_remote_netmask = 0.0.0.0
Tue Mar 24 09:13:05 2015 push_ifconfig_ipv6_defined = DISABLED
Tue Mar 24 09:13:05 2015 push_ifconfig_ipv6_local = ::/0
Tue Mar 24 09:13:05 2015 push_ifconfig_ipv6_remote = ::
Tue Mar 24 09:13:05 2015 enable_c2c = DISABLED
Tue Mar 24 09:13:05 2015 duplicate_cn = DISABLED
Tue Mar 24 09:13:05 2015 cf_max = 0
Tue Mar 24 09:13:05 2015 cf_per = 0
Tue Mar 24 09:13:05 2015 max_clients = 1024
Tue Mar 24 09:13:05 2015 max_routes_per_client = 256
Tue Mar 24 09:13:05 2015 auth_user_pass_verify_script = '[UNDEF]'
Tue Mar 24 09:13:05 2015 auth_user_pass_verify_script_via_file = DISABLED
Tue Mar 24 09:13:05 2015 client = ENABLED
Tue Mar 24 09:13:05 2015 pull = ENABLED
Tue Mar 24 09:13:05 2015 auth_user_pass_file = '[UNDEF]'
Tue Mar 24 09:13:05 2015 show_net_up = DISABLED
Tue Mar 24 09:13:05 2015 route_method = 0
Tue Mar 24 09:13:05 2015 ip_win32_defined = DISABLED
Tue Mar 24 09:13:05 2015 ip_win32_type = 3
Tue Mar 24 09:13:05 2015 dhcp_masq_offset = 0
Tue Mar 24 09:13:05 2015 dhcp_lease_time = 31536000
Tue Mar 24 09:13:05 2015 tap_sleep = 0
Tue Mar 24 09:13:05 2015 dhcp_options = DISABLED
Tue Mar 24 09:13:05 2015 dhcp_renew = DISABLED
Tue Mar 24 09:13:05 2015 dhcp_pre_release = DISABLED
Tue Mar 24 09:13:05 2015 dhcp_release = DISABLED
Tue Mar 24 09:13:05 2015 domain = '[UNDEF]'
Tue Mar 24 09:13:05 2015 netbios_scope = '[UNDEF]'
Tue Mar 24 09:13:05 2015 netbios_node_type = 0
Tue Mar 24 09:13:05 2015 disable_nbt = DISABLED
Tue Mar 24 09:13:05 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Mar 19 2015
Tue Mar 24 09:13:05 2015 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08
Tue Mar 24 09:13:05 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Tue Mar 24 09:13:05 2015 Need hold release from management interface, waiting...
Tue Mar 24 09:13:05 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Tue Mar 24 09:13:05 2015 MANAGEMENT: CMD 'state on'
Tue Mar 24 09:13:05 2015 MANAGEMENT: CMD 'log all on'
Tue Mar 24 09:13:05 2015 MANAGEMENT: CMD 'hold off'
Tue Mar 24 09:13:05 2015 MANAGEMENT: CMD 'hold release'
Tue Mar 24 09:13:05 2015 Control Channel Authentication: using 'C:\Program Files\OpenVPN\config\OpenWRT-VPNserver\ta.key' as a OpenVPN static key file
Tue Mar 24 09:13:05 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Mar 24 09:13:05 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Mar 24 09:13:05 2015 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:05 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Mar 24 09:13:05 2015 MANAGEMENT: >STATE:1427206385,RESOLVE,,,
Tue Mar 24 09:13:05 2015 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:05 2015 Local Options String: 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
Tue Mar 24 09:13:05 2015 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
Tue Mar 24 09:13:05 2015 Local Options hash (VER=V4): '7004d33d'
Tue Mar 24 09:13:05 2015 Expected Remote Options hash (VER=V4): '2f085942'
Tue Mar 24 09:13:05 2015 Attempting to establish TCP connection with [AF_INET]68.114.212.219:1194 [nonblock]
Tue Mar 24 09:13:05 2015 MANAGEMENT: >STATE:1427206385,TCP_CONNECT,,,
Tue Mar 24 09:13:06 2015 TCP connection established with [AF_INET]68.114.212.219:1194
Tue Mar 24 09:13:06 2015 TCPv4_CLIENT link local: [undef]
Tue Mar 24 09:13:06 2015 TCPv4_CLIENT link remote: [AF_INET]68.114.212.219:1194
Tue Mar 24 09:13:06 2015 MANAGEMENT: >STATE:1427206386,WAIT,,,
Tue Mar 24 09:13:06 2015 event_wait returned 1
Tue Mar 24 09:13:06 2015 TCPv4_CLIENT WRITE [42] to [AF_INET]68.114.212.219:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=deb003be 34e79269 tls_hmac=f349710c 311fc6f4 ab574a75 399d8fa8 dad9f836 pid=[ #1 / time = (1427206386) Tue Mar 24 09:13:06 2015 ] [ ] pid=0 DATA
Tue Mar 24 09:13:06 2015 TCPv4_CLIENT write returned 44
Tue Mar 24 09:13:06 2015 event_wait returned 1
Tue Mar 24 09:13:06 2015 Connection reset, restarting [0]
Tue Mar 24 09:13:06 2015 TCP/UDP: Closing socket
Tue Mar 24 09:13:06 2015 SIGUSR1[soft,connection-reset] received, process restarting
Tue Mar 24 09:13:06 2015 MANAGEMENT: >STATE:1427206386,RECONNECTING,connection-reset,,
Tue Mar 24 09:13:06 2015 Restart pause, 5 second(s)
[/quote]

OpenWRT Firewall Config(I think some of the zone forwarding might be the issue):
[quote]
root@OpenWRT:~# uci show firewall
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=ACCEPT
firewall.@zone[0].network=lan
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@zone[1].network=wan wan6
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow-OpenVPN-Inbound
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].src=*
firewall.@rule[0].dest_port=1194
firewall.@rule[0].family=ipv4
firewall.@rule[0].proto=tcp udp
firewall.@zone[2]=zone
firewall.@zone[2].name=vpn
firewall.@zone[2].masq=1
firewall.@zone[2].input=ACCEPT
firewall.@zone[2].forward=ACCEPT
firewall.@zone[2].output=ACCEPT
firewall.@zone[2].network=vpn0
firewall.@zone[2].log=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].dest=wan
firewall.@forwarding[0].src=lan
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].dest=lan
firewall.@forwarding[1].src=vpn
firewall.@forwarding[2]=forwarding
firewall.@forwarding[2].dest=wan
firewall.@forwarding[2].src=vpn
firewall.@forwarding[3]=forwarding
firewall.@forwarding[3].dest=vpn
firewall.@forwarding[3].src=wan
[/quote]

OpenVPN Config/i]
[quote]
-ash: firewall.@forwarding[3].src=wan: not found
root@OpenWRT:~# uci show openvpn
openvpn.vpnserver=openvpn
openvpn.vpnserver.enabled=1
openvpn.vpnserver.dev=tun
openvpn.vpnserver.proto=tcp
openvpn.vpnserver.server=10.10.10.0 255.255.255.0
openvpn.vpnserver.port=1194
openvpn.vpnserver.keepalive=10 120
openvpn.vpnserver.push=route 192.168.200.0 255.255.255.0
openvpn.vpnserver.ca=/etc/openvpn/keys/ca.crt
openvpn.vpnserver.cert=/etc/openvpn/keys/OpenWRT-VPNserver.crt
openvpn.vpnserver.key=/etc/openvpn/keys/OpenWRT-VPNserver.key
openvpn.vpnserver.dh=/etc/openvpn/keys/dh2048.pem
openvpn.vpnserver.tls_auth=/etc/openvpn/keys/ta.key 0
openvpn.vpnserver.ifconfig_pool_persist=/tmp/ipp.txt
openvpn.vpnserver.log=/tmp/openvpn.log
openvpn.vpnserver.status=/tmp/openvpn-status.log
openvpn.vpnserver.verb=4
openvpn.vpnserver.cipher=AES-256-CBC
openvpn.vpnserver.client_to_client=1
openvpn.vpnserver.persist_key=1
openvpn.vpnserver.persist_tun=1
[/quote]

OpenVPN Server Log
[quote]
root@OpenWRT:/etc/openvpn/keys# cat /tmp/openvpn.log
Tue Mar 24 09:10:36 2015 us=161060 OpenVPN 2.3.6 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Mar 24 2015
Tue Mar 24 09:10:36 2015 us=161360 library versions: OpenSSL 1.0.2a 19 Mar 2015, LZO 2.08
Tue Mar 24 09:10:36 2015 us=446468 Diffie-Hellman initialized with 2048 bit key
Tue Mar 24 09:10:36 2015 us=451219 Control Channel Authentication: using '/etc/openvpn/keys/ta.key' as a OpenVPN static key file
Tue Mar 24 09:10:36 2015 us=451492 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Mar 24 09:10:36 2015 us=451679 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Mar 24 09:10:36 2015 us=451884 TLS-Auth MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:10:36 2015 us=452119 Socket Buffers: R=[87380->131072] S=[16384->131072]
Tue Mar 24 09:10:36 2015 us=454492 TUN/TAP device tun0 opened
Tue Mar 24 09:10:36 2015 us=454715 TUN/TAP TX queue length set to 100
Tue Mar 24 09:10:36 2015 us=454908 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Mar 24 09:10:36 2015 us=455189 /sbin/ifconfig tun0 10.10.10.1 pointopoint 10.10.10.2 mtu 1500
Tue Mar 24 09:10:36 2015 us=463909 /sbin/route add -net 10.10.10.0 netmask 255.255.255.0 gw 10.10.10.2
Tue Mar 24 09:10:36 2015 us=479818 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:10:36 2015 us=480031 Listening for incoming TCP connection on [undef]
Tue Mar 24 09:10:36 2015 us=480247 TCPv4_SERVER link local (bound): [undef]
Tue Mar 24 09:10:36 2015 us=480404 TCPv4_SERVER link remote: [undef]
Tue Mar 24 09:10:36 2015 us=480567 MULTI: multi_init called, r=256 v=256
Tue Mar 24 09:10:36 2015 us=480848 IFCONFIG POOL: base=10.10.10.4 size=62, ipv6=0
Tue Mar 24 09:10:36 2015 us=481023 IFCONFIG POOL LIST
Tue Mar 24 09:10:36 2015 us=481301 MULTI: TCP INIT maxclients=1024 maxevents=1028
Tue Mar 24 09:10:36 2015 us=481631 Initialization Sequence Completed
Tue Mar 24 09:10:50 2015 us=444280 MULTI: multi_create_instance called
Tue Mar 24 09:10:50 2015 us=444615 Re-using SSL/TLS context
Tue Mar 24 09:10:50 2015 us=445476 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:10:50 2015 us=445784 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:10:50 2015 us=446024 TCP connection established with [AF_INET]192.168.200.15:61199
Tue Mar 24 09:10:50 2015 us=446183 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:10:50 2015 us=446383 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61199
Tue Mar 24 09:10:51 2015 us=443568 192.168.200.15:61199 TLS: Initial packet from [AF_INET]192.168.200.15:61199, sid=2388bd3f f0d3b3bf
Tue Mar 24 09:10:51 2015 us=443782 192.168.200.15:61199 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:10:51 2015 us=443969 192.168.200.15:61199 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61199
Tue Mar 24 09:10:51 2015 us=444189 192.168.200.15:61199 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:10:51 2015 us=444348 192.168.200.15:61199 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:10:51 2015 us=444755 TCP/UDP: Closing socket
Tue Mar 24 09:10:56 2015 us=452149 MULTI: multi_create_instance called
Tue Mar 24 09:10:56 2015 us=452429 Re-using SSL/TLS context
Tue Mar 24 09:10:56 2015 us=452919 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:10:56 2015 us=453148 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:10:56 2015 us=453387 TCP connection established with [AF_INET]192.168.200.15:61200
Tue Mar 24 09:10:56 2015 us=453551 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:10:56 2015 us=453719 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61200
Tue Mar 24 09:10:57 2015 us=451953 192.168.200.15:61200 TLS: Initial packet from [AF_INET]192.168.200.15:61200, sid=7aaff7c0 fa1d9023
Tue Mar 24 09:10:57 2015 us=452146 192.168.200.15:61200 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:10:57 2015 us=452330 192.168.200.15:61200 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61200
Tue Mar 24 09:10:57 2015 us=452572 192.168.200.15:61200 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:10:57 2015 us=452734 192.168.200.15:61200 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:10:57 2015 us=453058 TCP/UDP: Closing socket
Tue Mar 24 09:11:02 2015 us=461811 MULTI: multi_create_instance called
Tue Mar 24 09:11:02 2015 us=462092 Re-using SSL/TLS context
Tue Mar 24 09:11:02 2015 us=462582 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:11:02 2015 us=462813 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:11:02 2015 us=463031 TCP connection established with [AF_INET]192.168.200.15:61201
Tue Mar 24 09:11:02 2015 us=463191 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:11:02 2015 us=463358 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61201
Tue Mar 24 09:11:03 2015 us=462372 192.168.200.15:61201 TLS: Initial packet from [AF_INET]192.168.200.15:61201, sid=9ed8ce59 2a33a624
Tue Mar 24 09:11:03 2015 us=462567 192.168.200.15:61201 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:11:03 2015 us=462751 192.168.200.15:61201 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61201
Tue Mar 24 09:11:03 2015 us=462970 192.168.200.15:61201 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:11:03 2015 us=463132 192.168.200.15:61201 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:11:03 2015 us=463481 TCP/UDP: Closing socket
Tue Mar 24 09:13:08 2015 us=113312 MULTI: multi_create_instance called
Tue Mar 24 09:13:08 2015 us=113594 Re-using SSL/TLS context
Tue Mar 24 09:13:08 2015 us=114080 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:08 2015 us=114314 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:08 2015 us=114530 TCP connection established with [AF_INET]192.168.200.15:61235
Tue Mar 24 09:13:08 2015 us=114693 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:13:08 2015 us=114861 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61235
Tue Mar 24 09:13:09 2015 us=114739 192.168.200.15:61235 TLS: Initial packet from [AF_INET]192.168.200.15:61235, sid=deb003be 34e79269
Tue Mar 24 09:13:09 2015 us=114931 192.168.200.15:61235 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:13:09 2015 us=115112 192.168.200.15:61235 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61235
Tue Mar 24 09:13:09 2015 us=115329 192.168.200.15:61235 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:13:09 2015 us=115487 192.168.200.15:61235 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:13:09 2015 us=115809 TCP/UDP: Closing socket
Tue Mar 24 09:13:14 2015 us=121557 MULTI: multi_create_instance called
Tue Mar 24 09:13:14 2015 us=121837 Re-using SSL/TLS context
Tue Mar 24 09:13:14 2015 us=122326 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:14 2015 us=122556 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:14 2015 us=122774 TCP connection established with [AF_INET]192.168.200.15:61238
Tue Mar 24 09:13:14 2015 us=122935 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:13:14 2015 us=123102 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61238
Tue Mar 24 09:13:15 2015 us=121564 192.168.200.15:61238 TLS: Initial packet from [AF_INET]192.168.200.15:61238, sid=63faf619 92bc8d4b
Tue Mar 24 09:13:15 2015 us=121758 192.168.200.15:61238 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:13:15 2015 us=121938 192.168.200.15:61238 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61238
Tue Mar 24 09:13:15 2015 us=122159 192.168.200.15:61238 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:13:15 2015 us=122318 192.168.200.15:61238 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:13:15 2015 us=122665 TCP/UDP: Closing socket
Tue Mar 24 09:13:20 2015 us=131047 MULTI: multi_create_instance called
Tue Mar 24 09:13:20 2015 us=131341 Re-using SSL/TLS context
Tue Mar 24 09:13:20 2015 us=131828 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:20 2015 us=132061 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:20 2015 us=132289 TCP connection established with [AF_INET]192.168.200.15:61240
Tue Mar 24 09:13:20 2015 us=132451 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:13:20 2015 us=132618 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61240
Tue Mar 24 09:13:21 2015 us=131382 192.168.200.15:61240 TLS: Initial packet from [AF_INET]192.168.200.15:61240, sid=a26391e5 2365c10b
Tue Mar 24 09:13:21 2015 us=131575 192.168.200.15:61240 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:13:21 2015 us=131758 192.168.200.15:61240 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61240
Tue Mar 24 09:13:21 2015 us=131977 192.168.200.15:61240 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:13:21 2015 us=132135 192.168.200.15:61240 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:13:21 2015 us=132460 TCP/UDP: Closing socket
Tue Mar 24 09:13:26 2015 us=141165 MULTI: multi_create_instance called
Tue Mar 24 09:13:26 2015 us=141444 Re-using SSL/TLS context
Tue Mar 24 09:13:26 2015 us=141931 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:26 2015 us=142181 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:26 2015 us=142404 TCP connection established with [AF_INET]192.168.200.15:61241
Tue Mar 24 09:13:26 2015 us=142565 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:13:26 2015 us=142733 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61241
Tue Mar 24 09:13:27 2015 us=141805 192.168.200.15:61241 TLS: Initial packet from [AF_INET]192.168.200.15:61241, sid=379f9103 9fd3db8a
Tue Mar 24 09:13:27 2015 us=141996 192.168.200.15:61241 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:13:27 2015 us=142172 192.168.200.15:61241 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61241
Tue Mar 24 09:13:27 2015 us=142391 192.168.200.15:61241 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:13:27 2015 us=142548 192.168.200.15:61241 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:13:27 2015 us=142870 TCP/UDP: Closing socket
Tue Mar 24 09:13:32 2015 us=152052 MULTI: multi_create_instance called
Tue Mar 24 09:13:32 2015 us=152347 Re-using SSL/TLS context
Tue Mar 24 09:13:32 2015 us=152834 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:32 2015 us=153066 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:32 2015 us=153284 TCP connection established with [AF_INET]192.168.200.15:61242
Tue Mar 24 09:13:32 2015 us=153444 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:13:32 2015 us=153611 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61242
Tue Mar 24 09:13:33 2015 us=151946 192.168.200.15:61242 TLS: Initial packet from [AF_INET]192.168.200.15:61242, sid=016e2f69 67813bb6
Tue Mar 24 09:13:33 2015 us=152139 192.168.200.15:61242 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:13:33 2015 us=152320 192.168.200.15:61242 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61242
Tue Mar 24 09:13:33 2015 us=152539 192.168.200.15:61242 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:13:33 2015 us=152700 192.168.200.15:61242 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:13:33 2015 us=153021 TCP/UDP: Closing socket
Tue Mar 24 09:13:38 2015 us=158836 MULTI: multi_create_instance called
Tue Mar 24 09:13:38 2015 us=159179 Re-using SSL/TLS context
Tue Mar 24 09:13:38 2015 us=159698 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:38 2015 us=159960 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:38 2015 us=160192 TCP connection established with [AF_INET]192.168.200.15:61245
Tue Mar 24 09:13:38 2015 us=160354 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:13:38 2015 us=160522 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61245
Tue Mar 24 09:13:39 2015 us=158827 192.168.200.15:61245 TLS: Initial packet from [AF_INET]192.168.200.15:61245, sid=c39d1e5b 5c7d393a
Tue Mar 24 09:13:39 2015 us=159022 192.168.200.15:61245 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:13:39 2015 us=159267 192.168.200.15:61245 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61245
Tue Mar 24 09:13:39 2015 us=159521 192.168.200.15:61245 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:13:39 2015 us=159685 192.168.200.15:61245 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:13:39 2015 us=160013 TCP/UDP: Closing socket
Tue Mar 24 09:13:44 2015 us=168536 MULTI: multi_create_instance called
Tue Mar 24 09:13:44 2015 us=168823 Re-using SSL/TLS context
Tue Mar 24 09:13:44 2015 us=169391 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:44 2015 us=169628 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:44 2015 us=169842 TCP connection established with [AF_INET]192.168.200.15:61246
Tue Mar 24 09:13:44 2015 us=170003 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:13:44 2015 us=170171 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61246
Tue Mar 24 09:13:45 2015 us=168492 192.168.200.15:61246 TLS: Initial packet from [AF_INET]192.168.200.15:61246, sid=9d30abe0 1819881c
Tue Mar 24 09:13:45 2015 us=168683 192.168.200.15:61246 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:13:45 2015 us=168860 192.168.200.15:61246 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61246
Tue Mar 24 09:13:45 2015 us=169135 192.168.200.15:61246 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:13:45 2015 us=169315 192.168.200.15:61246 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:13:45 2015 us=169647 TCP/UDP: Closing socket
Tue Mar 24 09:13:50 2015 us=178680 MULTI: multi_create_instance called
Tue Mar 24 09:13:50 2015 us=178963 Re-using SSL/TLS context
Tue Mar 24 09:13:50 2015 us=179562 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:50 2015 us=179802 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:50 2015 us=180025 TCP connection established with [AF_INET]192.168.200.15:61248
Tue Mar 24 09:13:50 2015 us=180185 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:13:50 2015 us=180362 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61248
Tue Mar 24 09:13:51 2015 us=178671 192.168.200.15:61248 TLS: Initial packet from [AF_INET]192.168.200.15:61248, sid=9a60aa8c 8bdd8d61
Tue Mar 24 09:13:51 2015 us=178882 192.168.200.15:61248 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:13:51 2015 us=179070 192.168.200.15:61248 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61248
Tue Mar 24 09:13:51 2015 us=179397 192.168.200.15:61248 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:13:51 2015 us=179569 192.168.200.15:61248 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:13:51 2015 us=179918 TCP/UDP: Closing socket
Tue Mar 24 09:13:56 2015 us=188902 MULTI: multi_create_instance called
Tue Mar 24 09:13:56 2015 us=189236 Re-using SSL/TLS context
Tue Mar 24 09:13:56 2015 us=189759 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:13:56 2015 us=189995 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:13:56 2015 us=190217 TCP connection established with [AF_INET]192.168.200.15:61249
Tue Mar 24 09:13:56 2015 us=190379 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:13:56 2015 us=190572 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61249
Tue Mar 24 09:13:57 2015 us=188594 192.168.200.15:61249 TLS: Initial packet from [AF_INET]192.168.200.15:61249, sid=049183df 3d859289
Tue Mar 24 09:13:57 2015 us=188804 192.168.200.15:61249 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:13:57 2015 us=189015 192.168.200.15:61249 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61249
Tue Mar 24 09:13:57 2015 us=189437 192.168.200.15:61249 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:13:57 2015 us=189664 192.168.200.15:61249 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:13:57 2015 us=189997 TCP/UDP: Closing socket
Tue Mar 24 09:14:02 2015 us=200019 MULTI: multi_create_instance called
Tue Mar 24 09:14:02 2015 us=200306 Re-using SSL/TLS context
Tue Mar 24 09:14:02 2015 us=200795 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:14:02 2015 us=201028 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:14:02 2015 us=201258 TCP connection established with [AF_INET]192.168.200.15:61250
Tue Mar 24 09:14:02 2015 us=201420 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:14:02 2015 us=201587 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61250
Tue Mar 24 09:14:03 2015 us=200318 192.168.200.15:61250 TLS: Initial packet from [AF_INET]192.168.200.15:61250, sid=86ae59b2 db774831
Tue Mar 24 09:14:03 2015 us=200511 192.168.200.15:61250 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:14:03 2015 us=200690 192.168.200.15:61250 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61250
Tue Mar 24 09:14:03 2015 us=200909 192.168.200.15:61250 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:14:03 2015 us=201069 192.168.200.15:61250 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:14:03 2015 us=201391 TCP/UDP: Closing socket
Tue Mar 24 09:14:08 2015 us=323733 MULTI: multi_create_instance called
Tue Mar 24 09:14:08 2015 us=324024 Re-using SSL/TLS context
Tue Mar 24 09:14:08 2015 us=324511 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:14:08 2015 us=324742 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:14:08 2015 us=324960 TCP connection established with [AF_INET]192.168.200.15:61251
Tue Mar 24 09:14:08 2015 us=325121 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:14:08 2015 us=325290 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61251
Tue Mar 24 09:14:09 2015 us=324446 192.168.200.15:61251 TLS: Initial packet from [AF_INET]192.168.200.15:61251, sid=402b48b8 690ddee4
Tue Mar 24 09:14:09 2015 us=324641 192.168.200.15:61251 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:14:09 2015 us=324826 192.168.200.15:61251 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61251
Tue Mar 24 09:14:09 2015 us=325045 192.168.200.15:61251 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:14:09 2015 us=325204 192.168.200.15:61251 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:14:09 2015 us=325525 TCP/UDP: Closing socket
Tue Mar 24 09:14:14 2015 us=333528 MULTI: multi_create_instance called
Tue Mar 24 09:14:14 2015 us=333810 Re-using SSL/TLS context
Tue Mar 24 09:14:14 2015 us=334299 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:14:14 2015 us=334530 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:14:14 2015 us=334756 TCP connection established with [AF_INET]192.168.200.15:61252
Tue Mar 24 09:14:14 2015 us=334928 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:14:14 2015 us=335097 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61252
Tue Mar 24 09:14:15 2015 us=333943 192.168.200.15:61252 TLS: Initial packet from [AF_INET]192.168.200.15:61252, sid=79539adf 6e0f484f
Tue Mar 24 09:14:15 2015 us=334132 192.168.200.15:61252 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:14:15 2015 us=334333 192.168.200.15:61252 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61252
Tue Mar 24 09:14:15 2015 us=334563 192.168.200.15:61252 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:14:15 2015 us=334731 192.168.200.15:61252 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:14:15 2015 us=335078 TCP/UDP: Closing socket
Tue Mar 24 09:15:27 2015 us=989939 MULTI: multi_create_instance called
Tue Mar 24 09:15:27 2015 us=990222 Re-using SSL/TLS context
Tue Mar 24 09:15:27 2015 us=990707 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:15:27 2015 us=990940 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:15:27 2015 us=991159 TCP connection established with [AF_INET]192.168.200.15:61263
Tue Mar 24 09:15:27 2015 us=991317 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:15:27 2015 us=991485 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61263
Tue Mar 24 09:15:28 2015 us=989074 192.168.200.15:61263 TLS: Initial packet from [AF_INET]192.168.200.15:61263, sid=b20974a3 84120ce9
Tue Mar 24 09:15:28 2015 us=989306 192.168.200.15:61263 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:15:28 2015 us=989489 192.168.200.15:61263 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61263
Tue Mar 24 09:15:28 2015 us=989721 192.168.200.15:61263 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:15:28 2015 us=989902 192.168.200.15:61263 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:15:28 2015 us=990234 TCP/UDP: Closing socket
Tue Mar 24 09:15:33 2015 us=999010 MULTI: multi_create_instance called
Tue Mar 24 09:15:33 2015 us=999329 Re-using SSL/TLS context
Tue Mar 24 09:15:33 2015 us=999897 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:15:34 2015 us=131 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:15:34 2015 us=349 TCP connection established with [AF_INET]192.168.200.15:61264
Tue Mar 24 09:15:34 2015 us=509 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:15:34 2015 us=672 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61264
Tue Mar 24 09:15:35 2015 us=202 192.168.200.15:61264 TLS: Initial packet from [AF_INET]192.168.200.15:61264, sid=7bbada20 99563c47
Tue Mar 24 09:15:35 2015 us=396 192.168.200.15:61264 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:15:35 2015 us=581 192.168.200.15:61264 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61264
Tue Mar 24 09:15:35 2015 us=799 192.168.200.15:61264 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:15:35 2015 us=956 192.168.200.15:61264 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:15:35 2015 us=1277 TCP/UDP: Closing socket
Tue Mar 24 09:15:40 2015 us=6416 MULTI: multi_create_instance called
Tue Mar 24 09:15:40 2015 us=6710 Re-using SSL/TLS context
Tue Mar 24 09:15:40 2015 us=7199 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:15:40 2015 us=7428 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:15:40 2015 us=7652 TCP connection established with [AF_INET]192.168.200.15:61265
Tue Mar 24 09:15:40 2015 us=7812 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:15:40 2015 us=7978 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61265
Tue Mar 24 09:15:41 2015 us=7352 192.168.200.15:61265 TLS: Initial packet from [AF_INET]192.168.200.15:61265, sid=cbd76144 6d3b98e9
Tue Mar 24 09:15:41 2015 us=7546 192.168.200.15:61265 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:15:41 2015 us=7731 192.168.200.15:61265 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61265
Tue Mar 24 09:15:41 2015 us=7965 192.168.200.15:61265 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:15:41 2015 us=8140 192.168.200.15:61265 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:15:41 2015 us=8484 TCP/UDP: Closing socket
Tue Mar 24 09:15:46 2015 us=14736 MULTI: multi_create_instance called
Tue Mar 24 09:15:46 2015 us=15019 Re-using SSL/TLS context
Tue Mar 24 09:15:46 2015 us=15637 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:15:46 2015 us=15878 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:15:46 2015 us=16101 TCP connection established with [AF_INET]192.168.200.15:61273
Tue Mar 24 09:15:46 2015 us=16285 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:15:46 2015 us=16464 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61273
Tue Mar 24 09:15:47 2015 us=14852 192.168.200.15:61273 TLS: Initial packet from [AF_INET]192.168.200.15:61273, sid=d1216791 eaf486df
Tue Mar 24 09:15:47 2015 us=15047 192.168.200.15:61273 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:15:47 2015 us=15232 192.168.200.15:61273 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61273
Tue Mar 24 09:15:47 2015 us=15475 192.168.200.15:61273 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:15:47 2015 us=15636 192.168.200.15:61273 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:15:47 2015 us=15964 TCP/UDP: Closing socket
Tue Mar 24 09:15:52 2015 us=21131 MULTI: multi_create_instance called
Tue Mar 24 09:15:52 2015 us=21413 Re-using SSL/TLS context
Tue Mar 24 09:15:52 2015 us=21900 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:15:52 2015 us=22133 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:15:52 2015 us=22351 TCP connection established with [AF_INET]192.168.200.15:61278
Tue Mar 24 09:15:52 2015 us=22510 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:15:52 2015 us=22678 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61278
Tue Mar 24 09:15:53 2015 us=20287 192.168.200.15:61278 TLS: Initial packet from [AF_INET]192.168.200.15:61278, sid=2fbeadf4 ff9b2393
Tue Mar 24 09:15:53 2015 us=20481 192.168.200.15:61278 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:15:53 2015 us=20665 192.168.200.15:61278 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61278
Tue Mar 24 09:15:53 2015 us=20883 192.168.200.15:61278 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:15:53 2015 us=21041 192.168.200.15:61278 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:15:53 2015 us=21364 TCP/UDP: Closing socket
Tue Mar 24 09:15:58 2015 us=27883 MULTI: multi_create_instance called
Tue Mar 24 09:15:58 2015 us=28163 Re-using SSL/TLS context
Tue Mar 24 09:15:58 2015 us=28651 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:15:58 2015 us=28883 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:15:58 2015 us=29174 TCP connection established with [AF_INET]192.168.200.15:61281
Tue Mar 24 09:15:58 2015 us=29361 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:15:58 2015 us=29559 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61281
Tue Mar 24 09:15:59 2015 us=27285 192.168.200.15:61281 TLS: Initial packet from [AF_INET]192.168.200.15:61281, sid=69872d21 a7d29437
Tue Mar 24 09:15:59 2015 us=27477 192.168.200.15:61281 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:15:59 2015 us=27657 192.168.200.15:61281 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61281
Tue Mar 24 09:15:59 2015 us=27876 192.168.200.15:61281 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:15:59 2015 us=28034 192.168.200.15:61281 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:15:59 2015 us=28356 TCP/UDP: Closing socket
Tue Mar 24 09:16:04 2015 us=36178 MULTI: multi_create_instance called
Tue Mar 24 09:16:04 2015 us=36462 Re-using SSL/TLS context
Tue Mar 24 09:16:04 2015 us=36951 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:04 2015 us=37182 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:04 2015 us=37427 TCP connection established with [AF_INET]192.168.200.15:61282
Tue Mar 24 09:16:04 2015 us=37595 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:04 2015 us=37765 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61282
Tue Mar 24 09:16:05 2015 us=37540 192.168.200.15:61282 TLS: Initial packet from [AF_INET]192.168.200.15:61282, sid=8e0c4fb2 64fcf4df
Tue Mar 24 09:16:05 2015 us=37712 192.168.200.15:61282 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:05 2015 us=37894 192.168.200.15:61282 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61282
Tue Mar 24 09:16:05 2015 us=38112 192.168.200.15:61282 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:05 2015 us=38271 192.168.200.15:61282 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:05 2015 us=38624 TCP/UDP: Closing socket
Tue Mar 24 09:16:10 2015 us=45808 MULTI: multi_create_instance called
Tue Mar 24 09:16:10 2015 us=46092 Re-using SSL/TLS context
Tue Mar 24 09:16:10 2015 us=46600 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:10 2015 us=46850 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:10 2015 us=47073 TCP connection established with [AF_INET]192.168.200.15:61283
Tue Mar 24 09:16:10 2015 us=47234 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:10 2015 us=47402 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61283
Tue Mar 24 09:16:11 2015 us=45477 192.168.200.15:61283 TLS: Initial packet from [AF_INET]192.168.200.15:61283, sid=966d68c1 0204681a
Tue Mar 24 09:16:11 2015 us=45672 192.168.200.15:61283 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:11 2015 us=45854 192.168.200.15:61283 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61283
Tue Mar 24 09:16:11 2015 us=46075 192.168.200.15:61283 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:11 2015 us=46233 192.168.200.15:61283 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:11 2015 us=46588 TCP/UDP: Closing socket
Tue Mar 24 09:16:16 2015 us=54150 MULTI: multi_create_instance called
Tue Mar 24 09:16:16 2015 us=54438 Re-using SSL/TLS context
Tue Mar 24 09:16:16 2015 us=54926 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:16 2015 us=55159 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:16 2015 us=55376 TCP connection established with [AF_INET]192.168.200.15:61286
Tue Mar 24 09:16:16 2015 us=55539 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:16 2015 us=55707 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61286
Tue Mar 24 09:16:17 2015 us=54986 192.168.200.15:61286 TLS: Initial packet from [AF_INET]192.168.200.15:61286, sid=f30384a2 c7192caa
Tue Mar 24 09:16:17 2015 us=55181 192.168.200.15:61286 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:17 2015 us=55367 192.168.200.15:61286 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61286
Tue Mar 24 09:16:17 2015 us=55584 192.168.200.15:61286 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:17 2015 us=55742 192.168.200.15:61286 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:17 2015 us=56064 TCP/UDP: Closing socket
Tue Mar 24 09:16:22 2015 us=63022 MULTI: multi_create_instance called
Tue Mar 24 09:16:22 2015 us=63302 Re-using SSL/TLS context
Tue Mar 24 09:16:22 2015 us=63793 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:22 2015 us=64025 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:22 2015 us=64248 TCP connection established with [AF_INET]192.168.200.15:61287
Tue Mar 24 09:16:22 2015 us=64407 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:22 2015 us=64577 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61287
Tue Mar 24 09:16:23 2015 us=62696 192.168.200.15:61287 TLS: Initial packet from [AF_INET]192.168.200.15:61287, sid=f020851c b0d51d49
Tue Mar 24 09:16:23 2015 us=62913 192.168.200.15:61287 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:23 2015 us=63096 192.168.200.15:61287 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61287
Tue Mar 24 09:16:23 2015 us=63319 192.168.200.15:61287 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:23 2015 us=63477 192.168.200.15:61287 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:23 2015 us=63800 TCP/UDP: Closing socket
Tue Mar 24 09:16:28 2015 us=184789 MULTI: multi_create_instance called
Tue Mar 24 09:16:28 2015 us=185081 Re-using SSL/TLS context
Tue Mar 24 09:16:28 2015 us=185570 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:28 2015 us=185804 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:28 2015 us=186023 TCP connection established with [AF_INET]192.168.200.15:61288
Tue Mar 24 09:16:28 2015 us=186186 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:28 2015 us=186542 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61288
Tue Mar 24 09:16:29 2015 us=184497 192.168.200.15:61288 TLS: Initial packet from [AF_INET]192.168.200.15:61288, sid=0929018e 2375c312
Tue Mar 24 09:16:29 2015 us=184688 192.168.200.15:61288 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:29 2015 us=184866 192.168.200.15:61288 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61288
Tue Mar 24 09:16:29 2015 us=185085 192.168.200.15:61288 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:29 2015 us=185254 192.168.200.15:61288 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:29 2015 us=185601 TCP/UDP: Closing socket
Tue Mar 24 09:16:33 2015 us=192834 MULTI: multi_create_instance called
Tue Mar 24 09:16:33 2015 us=193113 Re-using SSL/TLS context
Tue Mar 24 09:16:33 2015 us=193602 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:33 2015 us=193832 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:33 2015 us=194052 TCP connection established with [AF_INET]192.168.200.15:61290
Tue Mar 24 09:16:33 2015 us=194213 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:33 2015 us=194382 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61290
Tue Mar 24 09:16:34 2015 us=192449 192.168.200.15:61290 TLS: Initial packet from [AF_INET]192.168.200.15:61290, sid=b2805018 713cb1c0
Tue Mar 24 09:16:34 2015 us=192640 192.168.200.15:61290 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:34 2015 us=192818 192.168.200.15:61290 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61290
Tue Mar 24 09:16:34 2015 us=193036 192.168.200.15:61290 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:34 2015 us=193196 192.168.200.15:61290 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:34 2015 us=193518 TCP/UDP: Closing socket
Tue Mar 24 09:16:39 2015 us=199283 MULTI: multi_create_instance called
Tue Mar 24 09:16:39 2015 us=199565 Re-using SSL/TLS context
Tue Mar 24 09:16:39 2015 us=200074 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:39 2015 us=200310 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:39 2015 us=200537 TCP connection established with [AF_INET]192.168.200.15:61291
Tue Mar 24 09:16:39 2015 us=200701 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:39 2015 us=200872 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61291
Tue Mar 24 09:16:40 2015 us=200294 192.168.200.15:61291 TLS: Initial packet from [AF_INET]192.168.200.15:61291, sid=a9e24103 17e380fe
Tue Mar 24 09:16:40 2015 us=200490 192.168.200.15:61291 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:40 2015 us=200673 192.168.200.15:61291 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61291
Tue Mar 24 09:16:40 2015 us=200915 192.168.200.15:61291 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:40 2015 us=201080 192.168.200.15:61291 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:40 2015 us=201406 TCP/UDP: Closing socket
Tue Mar 24 09:16:45 2015 us=208476 MULTI: multi_create_instance called
Tue Mar 24 09:16:45 2015 us=208754 Re-using SSL/TLS context
Tue Mar 24 09:16:45 2015 us=209341 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:45 2015 us=209579 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:45 2015 us=209795 TCP connection established with [AF_INET]192.168.200.15:61292
Tue Mar 24 09:16:45 2015 us=209954 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:45 2015 us=210122 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61292
Tue Mar 24 09:16:46 2015 us=209436 192.168.200.15:61292 TLS: Initial packet from [AF_INET]192.168.200.15:61292, sid=e0afe3ed 52b50819
Tue Mar 24 09:16:46 2015 us=209631 192.168.200.15:61292 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:46 2015 us=209815 192.168.200.15:61292 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61292
Tue Mar 24 09:16:46 2015 us=210035 192.168.200.15:61292 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:46 2015 us=210194 192.168.200.15:61292 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:46 2015 us=210514 TCP/UDP: Closing socket
Tue Mar 24 09:16:51 2015 us=217237 MULTI: multi_create_instance called
Tue Mar 24 09:16:51 2015 us=217515 Re-using SSL/TLS context
Tue Mar 24 09:16:51 2015 us=218044 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:51 2015 us=218278 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:51 2015 us=218506 TCP connection established with [AF_INET]192.168.200.15:61293
Tue Mar 24 09:16:51 2015 us=218667 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:51 2015 us=218834 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61293
Tue Mar 24 09:16:52 2015 us=217782 192.168.200.15:61293 TLS: Initial packet from [AF_INET]192.168.200.15:61293, sid=b06f8617 def5d087
Tue Mar 24 09:16:52 2015 us=217976 192.168.200.15:61293 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:52 2015 us=218161 192.168.200.15:61293 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61293
Tue Mar 24 09:16:52 2015 us=218384 192.168.200.15:61293 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:52 2015 us=218542 192.168.200.15:61293 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:52 2015 us=218863 TCP/UDP: Closing socket
Tue Mar 24 09:16:57 2015 us=227555 MULTI: multi_create_instance called
Tue Mar 24 09:16:57 2015 us=227837 Re-using SSL/TLS context
Tue Mar 24 09:16:57 2015 us=228323 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:16:57 2015 us=228556 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:16:57 2015 us=228780 TCP connection established with [AF_INET]192.168.200.15:61294
Tue Mar 24 09:16:57 2015 us=228943 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:16:57 2015 us=229193 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61294
Tue Mar 24 09:16:58 2015 us=227760 192.168.200.15:61294 TLS: Initial packet from [AF_INET]192.168.200.15:61294, sid=72458884 19c00987
Tue Mar 24 09:16:58 2015 us=227955 192.168.200.15:61294 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:16:58 2015 us=228140 192.168.200.15:61294 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61294
Tue Mar 24 09:16:58 2015 us=228362 192.168.200.15:61294 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:16:58 2015 us=228520 192.168.200.15:61294 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:16:58 2015 us=228901 TCP/UDP: Closing socket
Tue Mar 24 09:17:03 2015 us=236487 MULTI: multi_create_instance called
Tue Mar 24 09:17:03 2015 us=236766 Re-using SSL/TLS context
Tue Mar 24 09:17:03 2015 us=237258 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:17:03 2015 us=237491 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:17:03 2015 us=237785 TCP connection established with [AF_INET]192.168.200.15:61295
Tue Mar 24 09:17:03 2015 us=237968 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:17:03 2015 us=238138 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61295
Tue Mar 24 09:17:04 2015 us=235656 192.168.200.15:61295 TLS: Initial packet from [AF_INET]192.168.200.15:61295, sid=bfc94700 4ab8d0ea
Tue Mar 24 09:17:04 2015 us=235849 192.168.200.15:61295 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:17:04 2015 us=236032 192.168.200.15:61295 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61295
Tue Mar 24 09:17:04 2015 us=236252 192.168.200.15:61295 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:17:04 2015 us=236410 192.168.200.15:61295 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:17:04 2015 us=236734 TCP/UDP: Closing socket
Tue Mar 24 09:17:09 2015 us=246569 MULTI: multi_create_instance called
Tue Mar 24 09:17:09 2015 us=246820 Re-using SSL/TLS context
Tue Mar 24 09:17:09 2015 us=247311 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:17:09 2015 us=247544 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:17:09 2015 us=247770 TCP connection established with [AF_INET]192.168.200.15:61296
Tue Mar 24 09:17:09 2015 us=247932 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:17:09 2015 us=248100 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61296
Tue Mar 24 09:17:10 2015 us=246644 192.168.200.15:61296 TLS: Initial packet from [AF_INET]192.168.200.15:61296, sid=6c9454eb e4c2c8d3
Tue Mar 24 09:17:10 2015 us=246839 192.168.200.15:61296 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:17:10 2015 us=247021 192.168.200.15:61296 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61296
Tue Mar 24 09:17:10 2015 us=247242 192.168.200.15:61296 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:17:10 2015 us=247400 192.168.200.15:61296 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:17:10 2015 us=247813 TCP/UDP: Closing socket
Tue Mar 24 09:17:15 2015 us=256335 MULTI: multi_create_instance called
Tue Mar 24 09:17:15 2015 us=256624 Re-using SSL/TLS context
Tue Mar 24 09:17:15 2015 us=257111 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:17:15 2015 us=257343 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:17:15 2015 us=257571 TCP connection established with [AF_INET]192.168.200.15:61297
Tue Mar 24 09:17:15 2015 us=257731 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:17:15 2015 us=257902 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61297
Tue Mar 24 09:17:16 2015 us=256804 192.168.200.15:61297 TLS: Initial packet from [AF_INET]192.168.200.15:61297, sid=a76d4bc7 cbd8dace
Tue Mar 24 09:17:16 2015 us=256998 192.168.200.15:61297 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:17:16 2015 us=257183 192.168.200.15:61297 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61297
Tue Mar 24 09:17:16 2015 us=257402 192.168.200.15:61297 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:17:16 2015 us=257559 192.168.200.15:61297 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:17:16 2015 us=257880 TCP/UDP: Closing socket
Tue Mar 24 09:17:22 2015 us=894509 MULTI: multi_create_instance called
Tue Mar 24 09:17:22 2015 us=894791 Re-using SSL/TLS context
Tue Mar 24 09:17:22 2015 us=895280 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:17:22 2015 us=895510 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:17:22 2015 us=895764 TCP connection established with [AF_INET]192.168.200.15:61299
Tue Mar 24 09:17:22 2015 us=895933 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:17:22 2015 us=896102 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61299
Tue Mar 24 09:17:23 2015 us=893912 192.168.200.15:61299 TLS: Initial packet from [AF_INET]192.168.200.15:61299, sid=482a7a98 cb5354b3
Tue Mar 24 09:17:23 2015 us=894104 192.168.200.15:61299 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:17:23 2015 us=894288 192.168.200.15:61299 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61299
Tue Mar 24 09:17:23 2015 us=894511 192.168.200.15:61299 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:17:23 2015 us=894669 192.168.200.15:61299 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:17:23 2015 us=894992 TCP/UDP: Closing socket
Tue Mar 24 09:17:29 2015 us=11141 MULTI: multi_create_instance called
Tue Mar 24 09:17:29 2015 us=11420 Re-using SSL/TLS context
Tue Mar 24 09:17:29 2015 us=11907 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:17:29 2015 us=12135 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:17:29 2015 us=12359 TCP connection established with [AF_INET]192.168.200.15:61300
Tue Mar 24 09:17:29 2015 us=12526 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:17:29 2015 us=12695 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61300
Tue Mar 24 09:17:30 2015 us=10882 192.168.200.15:61300 TLS: Initial packet from [AF_INET]192.168.200.15:61300, sid=2729e7d2 c13a06ab
Tue Mar 24 09:17:30 2015 us=11156 192.168.200.15:61300 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:17:30 2015 us=11349 192.168.200.15:61300 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61300
Tue Mar 24 09:17:30 2015 us=11572 192.168.200.15:61300 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:17:30 2015 us=11731 192.168.200.15:61300 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:17:30 2015 us=12052 TCP/UDP: Closing socket
Tue Mar 24 09:17:35 2015 us=19325 MULTI: multi_create_instance called
Tue Mar 24 09:17:35 2015 us=19608 Re-using SSL/TLS context
Tue Mar 24 09:17:35 2015 us=20132 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:17:35 2015 us=20374 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:17:35 2015 us=20626 TCP connection established with [AF_INET]192.168.200.15:61301
Tue Mar 24 09:17:35 2015 us=20794 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:17:35 2015 us=20963 TCPv4_SERVER link remote: [AF_INET]192.168.200.15:61301
Tue Mar 24 09:17:36 2015 us=20383 192.168.200.15:61301 TLS: Initial packet from [AF_INET]192.168.200.15:61301, sid=90af04cc 4db4999e
Tue Mar 24 09:17:36 2015 us=20579 192.168.200.15:61301 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:17:36 2015 us=20762 192.168.200.15:61301 TLS Error: incoming packet authentication failed from [AF_INET]192.168.200.15:61301
Tue Mar 24 09:17:36 2015 us=21003 192.168.200.15:61301 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:17:36 2015 us=21163 192.168.200.15:61301 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:17:36 2015 us=21489 TCP/UDP: Closing socket
Tue Mar 24 09:59:42 2015 us=272403 MULTI: multi_create_instance called
Tue Mar 24 09:59:42 2015 us=272683 Re-using SSL/TLS context
Tue Mar 24 09:59:42 2015 us=273168 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:59:42 2015 us=273402 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:59:42 2015 us=273632 TCP connection established with [AF_INET]70.194.136.102:2849
Tue Mar 24 09:59:42 2015 us=273795 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:59:42 2015 us=273963 TCPv4_SERVER link remote: [AF_INET]70.194.136.102:2849
Tue Mar 24 09:59:43 2015 us=305807 70.194.136.102:2849 TLS: Initial packet from [AF_INET]70.194.136.102:2849, sid=877f2324 5aa37c06
Tue Mar 24 09:59:43 2015 us=306001 70.194.136.102:2849 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:59:43 2015 us=306184 70.194.136.102:2849 TLS Error: incoming packet authentication failed from [AF_INET]70.194.136.102:2849
Tue Mar 24 09:59:43 2015 us=306404 70.194.136.102:2849 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:59:43 2015 us=306561 70.194.136.102:2849 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:59:43 2015 us=306883 TCP/UDP: Closing socket
Tue Mar 24 09:59:46 2015 us=610872 MULTI: multi_create_instance called
Tue Mar 24 09:59:46 2015 us=611151 Re-using SSL/TLS context
Tue Mar 24 09:59:46 2015 us=611638 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:59:46 2015 us=611870 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:59:46 2015 us=612093 TCP connection established with [AF_INET]70.194.136.102:2850
Tue Mar 24 09:59:46 2015 us=612256 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:59:46 2015 us=612425 TCPv4_SERVER link remote: [AF_INET]70.194.136.102:2850
Tue Mar 24 09:59:47 2015 us=538927 70.194.136.102:2850 TLS: Initial packet from [AF_INET]70.194.136.102:2850, sid=733f467f 4e96dd48
Tue Mar 24 09:59:47 2015 us=539225 70.194.136.102:2850 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:59:47 2015 us=539425 70.194.136.102:2850 TLS Error: incoming packet authentication failed from [AF_INET]70.194.136.102:2850
Tue Mar 24 09:59:47 2015 us=539645 70.194.136.102:2850 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:59:47 2015 us=539805 70.194.136.102:2850 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:59:47 2015 us=540127 TCP/UDP: Closing socket
Tue Mar 24 09:59:50 2015 us=852911 MULTI: multi_create_instance called
Tue Mar 24 09:59:50 2015 us=853205 Re-using SSL/TLS context
Tue Mar 24 09:59:50 2015 us=853690 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:59:50 2015 us=853932 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:59:50 2015 us=854159 TCP connection established with [AF_INET]70.194.136.102:2876
Tue Mar 24 09:59:50 2015 us=854323 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:59:50 2015 us=854489 TCPv4_SERVER link remote: [AF_INET]70.194.136.102:2876
Tue Mar 24 09:59:51 2015 us=750186 70.194.136.102:2876 TLS: Initial packet from [AF_INET]70.194.136.102:2876, sid=ebccd3f2 d54faa95
Tue Mar 24 09:59:51 2015 us=750379 70.194.136.102:2876 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:59:51 2015 us=750560 70.194.136.102:2876 TLS Error: incoming packet authentication failed from [AF_INET]70.194.136.102:2876
Tue Mar 24 09:59:51 2015 us=750779 70.194.136.102:2876 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:59:51 2015 us=750937 70.194.136.102:2876 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:59:51 2015 us=751262 TCP/UDP: Closing socket
Tue Mar 24 09:59:55 2015 us=70145 MULTI: multi_create_instance called
Tue Mar 24 09:59:55 2015 us=70444 Re-using SSL/TLS context
Tue Mar 24 09:59:55 2015 us=70934 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:59:55 2015 us=71166 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:59:55 2015 us=71384 TCP connection established with [AF_INET]70.194.136.102:2873
Tue Mar 24 09:59:55 2015 us=71543 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:59:55 2015 us=71709 TCPv4_SERVER link remote: [AF_INET]70.194.136.102:2873
Tue Mar 24 09:59:55 2015 us=960052 70.194.136.102:2873 TLS: Initial packet from [AF_INET]70.194.136.102:2873, sid=e9f81822 cd4587f2
Tue Mar 24 09:59:55 2015 us=960244 70.194.136.102:2873 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 09:59:55 2015 us=960424 70.194.136.102:2873 TLS Error: incoming packet authentication failed from [AF_INET]70.194.136.102:2873
Tue Mar 24 09:59:55 2015 us=960670 70.194.136.102:2873 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 09:59:55 2015 us=960833 70.194.136.102:2873 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 09:59:55 2015 us=961157 TCP/UDP: Closing socket
Tue Mar 24 09:59:59 2015 us=250348 MULTI: multi_create_instance called
Tue Mar 24 09:59:59 2015 us=250625 Re-using SSL/TLS context
Tue Mar 24 09:59:59 2015 us=251130 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Mar 24 09:59:59 2015 us=251366 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
Tue Mar 24 09:59:59 2015 us=251578 TCP connection established with [AF_INET]70.194.136.102:2868
Tue Mar 24 09:59:59 2015 us=251740 TCPv4_SERVER link local: [undef]
Tue Mar 24 09:59:59 2015 us=251907 TCPv4_SERVER link remote: [AF_INET]70.194.136.102:2868
Tue Mar 24 10:00:00 2015 us=160478 70.194.136.102:2868 TLS: Initial packet from [AF_INET]70.194.136.102:2868, sid=25e52885 035d0647
Tue Mar 24 10:00:00 2015 us=160669 70.194.136.102:2868 Authenticate/Decrypt packet error: packet HMAC authentication failed
Tue Mar 24 10:00:00 2015 us=160849 70.194.136.102:2868 TLS Error: incoming packet authentication failed from [AF_INET]70.194.136.102:2868
Tue Mar 24 10:00:00 2015 us=161068 70.194.136.102:2868 Fatal TLS error (check_tls_errors_co), restarting
Tue Mar 24 10:00:00 2015 us=161229 70.194.136.102:2868 SIGUSR1[soft,tls-error] received, client-instance restarting
Tue Mar 24 10:00:00 2015 us=161553 TCP/UDP: Closing socket
[/quote]

Nexus 6 Client Config
[quote]
client
dev tun
proto tcp
remote vpnserver.dyndns-server.com 1194
resolv-retry infinite
nobind
persist-key
persist-tun
mute-replay-warnings
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
-----END OpenVPN Static key V1-----
</tls-auth>
ns-cert-type server
cipher AES-256-CBC
verb 11
[/quote]

Nexus 6 Client Log
[quote]
2015-03-24 09:59:39 Running on Nexus 6 (shamu) google, Android API 21, version 0.6.29, official build
2015-03-24 09:59:39 Building configuration…
2015-03-24 09:59:42 started Socket Thread
2015-03-24 09:59:42 Network Status: CONNECTED LTE to MOBILE VZWINTERNET
2015-03-24 09:59:42 Current Parameter Settings:
2015-03-24 09:59:42 config = '/data/data/de.blinkt.openvpn/cache/android.conf'
2015-03-24 09:59:42 mode = 0
2015-03-24 09:59:42 show_ciphers = DISABLED
2015-03-24 09:59:42 show_digests = DISABLED
2015-03-24 09:59:42 show_engines = DISABLED
2015-03-24 09:59:42 genkey = DISABLED
2015-03-24 09:59:42 key_pass_file = '[UNDEF]'
2015-03-24 09:59:42 show_tls_ciphers = DISABLED
2015-03-24 09:59:42 connect_retry_max = 5
2015-03-24 09:59:42 Connection profiles [0]:
2015-03-24 09:59:42 proto = tcp-client
2015-03-24 09:59:42 local = '[UNDEF]'
2015-03-24 09:59:42 local_port = '[UNDEF]'
2015-03-24 09:59:42 remote = 'vpnserver.dyndns-server.com'
2015-03-24 09:59:42 remote_port = '1194'
2015-03-24 09:59:42 remote_float = DISABLED
2015-03-24 09:59:42 bind_defined = DISABLED
2015-03-24 09:59:42 bind_local = DISABLED
2015-03-24 09:59:42 bind_ipv6_only = DISABLED
2015-03-24 09:59:42 connect_retry_seconds = 5
2015-03-24 09:59:42 connect_timeout = 10
2015-03-24 09:59:42 socks_proxy_server = '[UNDEF]'
2015-03-24 09:59:42 socks_proxy_port = '[UNDEF]'
2015-03-24 09:59:42 socks_proxy_retry = DISABLED
2015-03-24 09:59:42 tun_mtu = 1500
2015-03-24 09:59:42 tun_mtu_defined = ENABLED
2015-03-24 09:59:42 link_mtu = 1500
2015-03-24 09:59:42 link_mtu_defined = DISABLED
2015-03-24 09:59:42 tun_mtu_extra = 0
2015-03-24 09:59:42 tun_mtu_extra_defined = DISABLED
2015-03-24 09:59:42 mtu_discover_type = -1
2015-03-24 09:59:42 fragment = 0
2015-03-24 09:59:42 mssfix = 1450
2015-03-24 09:59:42 explicit_exit_notification = 0
2015-03-24 09:59:42 Connection profiles END
2015-03-24 09:59:42 remote_random = DISABLED
2015-03-24 09:59:42 ipchange = '[UNDEF]'
2015-03-24 09:59:42 dev = 'tun'
2015-03-24 09:59:42 dev_type = '[UNDEF]'
2015-03-24 09:59:42 dev_node = '[UNDEF]'
2015-03-24 09:59:42 lladdr = '[UNDEF]'
2015-03-24 09:59:42 topology = 1
2015-03-24 09:59:42 tun_ipv6 = DISABLED
2015-03-24 09:59:42 ifconfig_local = '[UNDEF]'
2015-03-24 09:59:42 ifconfig_remote_netmask = '[UNDEF]'
2015-03-24 09:59:42 ifconfig_noexec = DISABLED
2015-03-24 09:59:42 ifconfig_nowarn = ENABLED
2015-03-24 09:59:42 ifconfig_ipv6_local = '[UNDEF]'
2015-03-24 09:59:42 ifconfig_ipv6_netbits = 0
2015-03-24 09:59:42 ifconfig_ipv6_remote = '[UNDEF]'
2015-03-24 09:59:42 shaper = 0
2015-03-24 09:59:42 mtu_test = 0
2015-03-24 09:59:42 mlock = DISABLED
2015-03-24 09:59:42 keepalive_ping = 0
2015-03-24 09:59:42 keepalive_timeout = 0
2015-03-24 09:59:42 inactivity_timeout = 0
2015-03-24 09:59:42 ping_send_timeout = 0
2015-03-24 09:59:42 ping_rec_timeout = 0
2015-03-24 09:59:42 ping_rec_timeout_action = 0
2015-03-24 09:59:42 ping_timer_remote = DISABLED
2015-03-24 09:59:42 remap_sigusr1 = 0
2015-03-24 09:59:42 persist_tun = ENABLED
2015-03-24 09:59:42 persist_local_ip = DISABLED
2015-03-24 09:59:42 persist_remote_ip = DISABLED
2015-03-24 09:59:42 persist_key = DISABLED
2015-03-24 09:59:42 passtos = DISABLED
2015-03-24 09:59:42 resolve_retry_seconds = 1000000000
2015-03-24 09:59:42 resolve_in_advance = ENABLED
2015-03-24 09:59:42 username = '[UNDEF]'
2015-03-24 09:59:42 groupname = '[UNDEF]'
2015-03-24 09:59:42 chroot_dir = '[UNDEF]'
2015-03-24 09:59:42 cd_dir = '[UNDEF]'
2015-03-24 09:59:42 writepid = '[UNDEF]'
2015-03-24 09:59:42 up_script = '[UNDEF]'
2015-03-24 09:59:42 down_script = '[UNDEF]'
2015-03-24 09:59:42 down_pre = DISABLED
2015-03-24 09:59:42 up_restart = DISABLED
2015-03-24 09:59:42 up_delay = DISABLED
2015-03-24 09:59:42 daemon = DISABLED
2015-03-24 09:59:42 inetd = 0
2015-03-24 09:59:42 log = DISABLED
2015-03-24 09:59:42 suppress_timestamps = DISABLED
2015-03-24 09:59:42 machine_readable_output = ENABLED
2015-03-24 09:59:42 nice = 0
2015-03-24 09:59:42 verbosity = 4
2015-03-24 09:59:42 mute = 0
2015-03-24 09:59:42 gremlin = 0
2015-03-24 09:59:42 status_file = '[UNDEF]'
2015-03-24 09:59:42 status_file_version = 1
2015-03-24 09:59:42 status_file_update_freq = 60
2015-03-24 09:59:42 occ = ENABLED
2015-03-24 09:59:42 rcvbuf = 65536
2015-03-24 09:59:42 sndbuf = 65536
2015-03-24 09:59:42 sockflags = 0
2015-03-24 09:59:42 fast_io = DISABLED
2015-03-24 09:59:42 comp.alg = 0
2015-03-24 09:59:42 comp.flags = 0
2015-03-24 09:59:42 route_script = '[UNDEF]'
2015-03-24 09:59:42 route_default_gateway = '[UNDEF]'
2015-03-24 09:59:42 route_default_metric = 0
2015-03-24 09:59:42 route_noexec = DISABLED
2015-03-24 09:59:42 route_delay = 0
2015-03-24 09:59:42 route_delay_window = 30
2015-03-24 09:59:42 route_delay_defined = DISABLED
2015-03-24 09:59:42 route_nopull = DISABLED
2015-03-24 09:59:42 route_gateway_via_dhcp = DISABLED
2015-03-24 09:59:42 allow_pull_fqdn = DISABLED
2015-03-24 09:59:42 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'
2015-03-24 09:59:42 management_port = 'unix'
2015-03-24 09:59:42 management_user_pass = '[UNDEF]'
2015-03-24 09:59:42 management_log_history_cache = 250
2015-03-24 09:59:42 management_echo_buffer_size = 100
2015-03-24 09:59:42 management_write_peer_info_file = '[UNDEF]'
2015-03-24 09:59:42 management_client_user = '[UNDEF]'
2015-03-24 09:59:42 management_client_group = '[UNDEF]'
2015-03-24 09:59:42 management_flags = 806
2015-03-24 09:59:42 shared_secret_file = '[UNDEF]'
2015-03-24 09:59:42 key_direction = 2
2015-03-24 09:59:42 ciphername_defined = ENABLED
2015-03-24 09:59:42 ciphername = 'AES-256-CBC'
2015-03-24 09:59:42 authname_defined = ENABLED
2015-03-24 09:59:42 authname = 'SHA1'
2015-03-24 09:59:42 prng_hash = 'SHA1'
2015-03-24 09:59:42 prng_nonce_secret_len = 16
2015-03-24 09:59:42 keysize = 0
2015-03-24 09:59:42 engine = DISABLED
2015-03-24 09:59:42 replay = ENABLED
2015-03-24 09:59:42 mute_replay_warnings = ENABLED
2015-03-24 09:59:42 replay_window = 64
2015-03-24 09:59:42 replay_time = 15
2015-03-24 09:59:42 packet_id_file = '[UNDEF]'
2015-03-24 09:59:42 use_iv = ENABLED
2015-03-24 09:59:42 test_crypto = DISABLED
2015-03-24 09:59:42 tls_server = DISABLED
2015-03-24 09:59:42 tls_client = ENABLED
2015-03-24 09:59:42 key_method = 2
2015-03-24 09:59:42 ca_file = '[[INLINE]]'
2015-03-24 09:59:42 ca_path = '[UNDEF]'
2015-03-24 09:59:42 dh_file = '[UNDEF]'
2015-03-24 09:59:42 cert_file = '[[INLINE]]'
2015-03-24 09:59:42 "priv_key_file" = EXTERNAL_PRIVATE_KEY
2015-03-24 09:59:42 pkcs12_file = '[UNDEF]'
2015-03-24 09:59:42 cipher_list = '[UNDEF]'
2015-03-24 09:59:42 tls_verify = '[UNDEF]'
2015-03-24 09:59:42 tls_export_cert = '[UNDEF]'
2015-03-24 09:59:42 verify_x509_type = 0
2015-03-24 09:59:42 verify_x509_name = '[UNDEF]'
2015-03-24 09:59:42 crl_file = '[UNDEF]'
2015-03-24 09:59:42 ns_cert_type = 1
2015-03-24 09:59:42 remote_cert_ku = 0
2015-03-24 09:59:42 remote_cert_eku = '[UNDEF]'
2015-03-24 09:59:42 ssl_flags = 0
2015-03-24 09:59:42 tls_timeout = 2
2015-03-24 09:59:42 renegotiate_bytes = 0
2015-03-24 09:59:42 renegotiate_packets = 0
2015-03-24 09:59:42 renegotiate_seconds = 3600
2015-03-24 09:59:42 handshake_window = 60
2015-03-24 09:59:42 transition_window = 3600
2015-03-24 09:59:42 single_session = DISABLED
2015-03-24 09:59:42 push_peer_info = DISABLED
2015-03-24 09:59:42 tls_exit = DISABLED
2015-03-24 09:59:42 tls_auth_file = '[[INLINE]]'
2015-03-24 09:59:42 client = ENABLED
2015-03-24 09:59:42 pull = ENABLED
2015-03-24 09:59:42 auth_user_pass_file = '[UNDEF]'
2015-03-24 09:59:42 OpenVPN 2.4-icsopenvpn [git:icsopenvpn_629-4c6f7f0d16e1a6b3] android-14-armeabi-v7a [SSL (OpenSSL)] [LZO] [SNAPPY] [LZ4] [EPOLL] [MH] [IPv6] built on Feb 24 2015
2015-03-24 09:59:42 library versions: OpenSSL 1.0.1l 15 Jan 2015, LZO 2.07
2015-03-24 09:59:42 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket
2015-03-24 09:59:42 MANAGEMENT: CMD 'hold release'
2015-03-24 09:59:42 Control Channel Authentication: tls-auth using INLINE static key file
2015-03-24 09:59:42 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2015-03-24 09:59:42 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2015-03-24 09:59:42 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:3 ]
2015-03-24 09:59:42 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:395 ET:0 EL:3 ]
2015-03-24 09:59:42 Local Options String: 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
2015-03-24 09:59:42 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
2015-03-24 09:59:42 Local Options hash (VER=V4): '7004d33d'
2015-03-24 09:59:42 Expected Remote Options hash (VER=V4): '2f085942'
2015-03-24 09:59:42 TCP/UDP: Preserving recently used remote address: [AF_INET]68.114.212.219:1194
2015-03-24 09:59:42 Socket Buffers: R=[1048576->131072] S=[524288->131072]
2015-03-24 09:59:42 Attempting to establish TCP connection with [AF_INET]68.114.212.219:1194 [nonblock]
2015-03-24 09:59:42 Protecting socket fd 4
2015-03-24 09:59:42 MANAGEMENT: CMD 'bytecount 2'
2015-03-24 09:59:42 MANAGEMENT: CMD 'state on'
2015-03-24 09:59:42 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2015-03-24 09:59:43 TCP connection established with [AF_INET]68.114.212.219:1194
2015-03-24 09:59:43 Protecting socket fd 4
2015-03-24 09:59:43 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2015-03-24 09:59:43 TCP_CLIENT link local: (not bound)
2015-03-24 09:59:43 TCP_CLIENT link remote: [AF_INET]68.114.212.219:1194
2015-03-24 09:59:43 MANAGEMENT: >STATE:1427209183,WAIT,,,
2015-03-24 09:59:43 Connection reset, restarting [0]
2015-03-24 09:59:43 TCP/UDP: Closing socket
2015-03-24 09:59:43 SIGUSR1[soft,connection-reset] received, process restarting
2015-03-24 09:59:43 MANAGEMENT: >STATE:1427209183,RECONNECTING,connection-reset,,
2015-03-24 09:59:46 MANAGEMENT: CMD 'hold release'
2015-03-24 09:59:46 Control Channel Authentication: tls-auth using INLINE static key file
2015-03-24 09:59:46 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2015-03-24 09:59:46 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2015-03-24 09:59:46 Control Channel MTU parms [ L:1559 D:168 EF:68 EB:0 ET:0 EL:3 ]
2015-03-24 09:59:46 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:395 ET:0 EL:3 ]
2015-03-24 09:59:46 Local Options String: 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
2015-03-24 09:59:46 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
2015-03-24 09:59:46 Local Options hash (VER=V4): '7004d33d'
2015-03-24 09:59:46 Expected Remote Options hash (VER=V4): '2f085942'
2015-03-24 09:59:46 TCP/UDP: Preserving recently used remote address: [AF_INET]68.114.212.219:1194
2015-03-24 09:59:46 Socket Buffers: R=[1048576->131072] S=[524288->131072]
2015-03-24 09:59:46 Attempting to establish TCP connection with [AF_INET]68.114.212.219:1194 [nonblock]
2015-03-24 09:59:46 MANAGEMENT: >STATE:1427209186,TCP_CONNECT,,,
2015-03-24 09:59:46 Protecting socket fd 4
2015-03-24 09:59:46 MANAGEMENT: CMD 'bytecount 2'
2015-03-24 09:59:46 MANAGEMENT: CMD 'state on'
2015-03-24 09:59:46 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2015-03-24 09:59:47 TCP connection established with [AF_INET]68.114.212.219:1194
2015-03-24 09:59:47 Protecting socket fd 4
2015-03-24 09:59:47 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2015-03-24 09:59:47 TCP_CLIENT link local: (not bound)
2015-03-24 09:59:47 TCP_CLIENT link remote: [AF_INET]68.114.212.219:1194
2015-03-24 09:59:47 MANAGEMENT: >STATE:1427209187,WAIT,,,
2015-03-24 09:59:47 Connection reset, restarting [0]
[/quote]

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 3:30 pm
by JW0914
Please disregard Windows client log as I am now able to connect to the VPN on the PC while behind the LAN; However, I am unable to do so on my Nexus 6 (disconnected from LAN, IP in logs starts with 70 I think). The only difference in configuration between the PC and the Nexus 6 is the XML code for TLS With and I combined the Nexus 6's crt, key, and can into a p12 certificate for security reasons.

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 4:19 pm
by JW0914
Finally, everything's connected =]

After removing the local directive, the issue was some sort of corruption in the Nexus 6 crt and key, as well as the p12. I don't think I used the proper steps to add, and export certs after the initial creation of the CA. Is there a different procedure for creating certs from the CA when you're adding devices after the initial CA and certificate creation that's done when setting up the VPN

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 5:59 pm
by Traffic
Well done for solving the firewall or what ever problems you had .. sorry I cannot help more (my openwrt bricked :roll: )

Creating new cert/keys for new devices from original CA is the same as when you first created your PKI .. to add new client just use easy-rsa: build-client* (depending on easy-rsa version, i use v3).

Inline FILE SUPPORT:
https://community.openvpn.net/openvpn/w ... nPage#lbAV

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 6:01 pm
by JW0914
Thanks a bunch for all yours and Traffic's help =]. I really appreciate you both taking the time

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 6:06 pm
by maikcat
so, the removal of local directive did helped?

if your setup works now please let me know so i can mark this as solved..

Michael.

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 6:10 pm
by JW0914
Yeah works flawlessly now, both on Windows as well as Android.

I'm a bit perplexed why every tutorial I came across said to add that (actually all the tutorials on OpenWRT for tun) and why it prevented clients from communicating with the VPN

Re: Followed OpenWRT OpenVPN tutorials OpenWRT refuse connec

Posted: Tue Mar 24, 2015 11:19 pm
by JW0914
I came across a webpage tutorial a few days ago on how to configure multiple VPN servers, but I forgot to bookmark it and was wondering if either of you could please shoot me in the right direction on where to look.

What I want to accomplish:

1. Private VPN (only accessible by me) of which I have setup at 10.10.10.0/24
2. A separate VPN subnet that only has access to one local IP (192.168.200.23, a NAS server)

Current Network Config

LAN: 192.168.200.1
VPN (me only, already assigned and running): 10.10.10.0/24
VPN (NAS Server; LAN IP 192.168.200.23; not assigned yet): 10.10.0.0


I remember seeing there were two ways of doing it, one via separate conf files the main openvpn config points to, or by using "route" in the main openvpn config file. Is one way better than the other in walling off users for the NAS Server from all other LAN devices?

Re: [Solved]Followed OpenWRT tutorials OpenWRT refuse connec

Posted: Wed Mar 25, 2015 10:32 am
by maikcat
I remember seeing there were two ways of doing it, one via separate conf files the main openvpn config points to, or by using "route" in the main openvpn config file.
i would also suggest 2 possible setups,

1) create a second openvpn instance on your router (which btw i am not aware if it can do it)

or

2) use iptables to allow or deny traffic between the relevant endpoints

in the first case you do need another port and a way to block others from connecting

and in second case you do need to configure iptables correctly...

if you do not need anything else i will close this thread now.

Michael.

Re: [Solved]Followed OpenWRT tutorials OpenWRT refuse connec

Posted: Wed Mar 25, 2015 11:09 am
by Traffic
Prior to closure:
JW0914, would you mind posting your working "uci show " (at least for network + firewall ?)

So that others (like me) can try to figure out we we did wrong - thanks 8-)

BTW: I am not sure removing --local is a solution as I did have it working correctly at one stage ..
I am trying to retrace my steps :cry:

Re: [Solved]Followed OpenWRT tutorials OpenWRT refuse connec

Posted: Thu Mar 26, 2015 12:21 am
by JW0914
uci show openvpn
openvpn.privatevpn=openvpn
openvpn.privatevpn.enabled=1
openvpn.privatevpn.dev=tun
openvpn.privatevpn.proto=tcp
openvpn.privatevpn.server=10.10.10.0 255.255.255.0
openvpn.privatevpn.route=10.10.0.0 255.255.255.0
openvpn.privatevpn.port=1940
openvpn.privatevpn.keepalive=10 120
openvpn.privatevpn.push=route 192.168.200.0 255.255.255.0 dhcp-option DNS 192.168
openvpn.privatevpn.ca=/etc/openvpn/keys/PrivateVPN/ca.crt
openvpn.privatevpn.cert=/etc/openvpn/keys/PrivateVPN/OpenWRT-VPNserver.crt
openvpn.privatevpn.key=/etc/openvpn/keys/PrivateVPN/OpenWRT-VPNserver.key
openvpn.privatevpn.dh=/etc/openvpn/keys/PrivateVPN/dh2048.pem
openvpn.privatevpn.tls_auth=/etc/openvpn/keys/PrivateVPN/ta.key 0
openvpn.privatevpn.ifconfig_pool_persist=/etc/openvpn/ipp.txt
openvpn.privatevpn.log=/tmp/openvpn.log
openvpn.privatevpn.status=/tmp/openvpn-status.log
openvpn.privatevpn.verb=11
openvpn.privatevpn.comp_lzo=yes
openvpn.privatevpn.cipher=AES-256-CBC
openvpn.privatevpn.client_to_client=1
openvpn.privatevpn.persist_key=1
openvpn.privatevpn.persist_tun=1
openvpn.privatevpn.client_config_dir=/etc/openvpn/clients
openvpn.privatevpn.user=nobody

uci show firewall
firewall.@rule[0]=rule
firewall.@rule[0].name=Allow Inbound VPN
firewall.@rule[0].target=ACCEPT
firewall.@rule[0].family=ipv4
firewall.@rule[0].proto=tcp udp
firewall.@rule[0].src=*
firewall.@rule[0].dest_port=1940
firewall.@defaults[0]=defaults
firewall.@defaults[0].syn_flood=1
firewall.@defaults[0].input=ACCEPT
firewall.@defaults[0].output=ACCEPT
firewall.@defaults[0].forward=REJECT
firewall.@rule[1]=rule
firewall.@rule[1].target=ACCEPT
firewall.@rule[1].name=Allow Inbound SSH
firewall.@rule[1].family=ipv4
firewall.@rule[1].proto=tcp
firewall.@rule[1].dest_port=2221
firewall.@rule[1].src=*
firewall.@zone[0]=zone
firewall.@zone[0].name=lan
firewall.@zone[0].input=ACCEPT
firewall.@zone[0].output=ACCEPT
firewall.@zone[0].forward=ACCEPT
firewall.@zone[0].network=lan
firewall.@zone[1]=zone
firewall.@zone[1].name=wan
firewall.@zone[1].input=REJECT
firewall.@zone[1].output=ACCEPT
firewall.@zone[1].forward=REJECT
firewall.@zone[1].masq=1
firewall.@zone[1].mtu_fix=1
firewall.@zone[1].network=wan wan6
firewall.@include[0]=include
firewall.@include[0].path=/etc/firewall.user
firewall.@zone[2]=zone
firewall.@zone[2].name=vpn
firewall.@zone[2].masq=1
firewall.@zone[2].input=ACCEPT
firewall.@zone[2].forward=ACCEPT
firewall.@zone[2].output=ACCEPT
firewall.@zone[2].network=vpn0
firewall.@zone[2].log=1
firewall.@forwarding[0]=forwarding
firewall.@forwarding[0].dest=wan
firewall.@forwarding[0].src=lan
firewall.@forwarding[1]=forwarding
firewall.@forwarding[1].dest=lan
firewall.@forwarding[1].src=vpn
firewall.@forwarding[2]=forwarding
firewall.@forwarding[2].dest=wan
firewall.@forwarding[2].src=vpn
firewall.@forwarding[3]=forwarding
firewall.@forwarding[3].dest=vpn
firewall.@forwarding[3].src=lan
firewall.@forwarding[4]=forwarding
firewall.@forwarding[4].dest=vpn
firewall.@forwarding[4].src=wan

openvpn log
Wed Mar 25 18:56:28 2015 us=687738 OpenVPN 2.3.6 arm-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built
Wed Mar 25 18:56:28 2015 us=688055 library versions: OpenSSL 1.0.2a 19 Mar 2015, LZO 2.08
Wed Mar 25 18:56:28 2015 us=978164 Diffie-Hellman initialized with 2048 bit key
Wed Mar 25 18:56:28 2015 us=982808 Control Channel Authentication: using '/etc/openvpn/keys/PrivateVPN/ta.key' as a Op
Wed Mar 25 18:56:28 2015 us=983032 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC
Wed Mar 25 18:56:28 2015 us=983207 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC
Wed Mar 25 18:56:28 2015 us=983412 TLS-Auth MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ]
Wed Mar 25 18:56:28 2015 us=983645 Socket Buffers: R=[87380->131072] S=[16384->131072]
Wed Mar 25 18:56:28 2015 us=986615 TUN/TAP device tun0 opened
Wed Mar 25 18:56:28 2015 us=986853 TUN/TAP TX queue length set to 100
Wed Mar 25 18:56:28 2015 us=987054 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Mar 25 18:56:28 2015 us=987337 /sbin/ifconfig tun0 10.10.10.1 pointopoint 10.
Wed Mar 25 18:56:28 2015 us=998465 /sbin/route add -net 10.10.0.0 netmask 255.255
Wed Mar 25 18:56:29 2015 us=14562 /sbin/route add -net 10.10.10.0 netmask 255.255
Wed Mar 25 18:56:29 2015 us=27637 Data Channel MTU parms [ L:1560 D:1450 EF:60 EB
Wed Mar 25 18:56:29 2015 us=28124 UID set to nobody
Wed Mar 25 18:56:29 2015 us=28376 Listening for incoming TCP connection on [undef
Wed Mar 25 18:56:29 2015 us=28657 TCPv4_SERVER link local (bound): [undef]
Wed Mar 25 18:56:29 2015 us=28827 TCPv4_SERVER link remote: [undef]
Wed Mar 25 18:56:29 2015 us=28994 MULTI: multi_init called, r=256 v=256
Wed Mar 25 18:56:29 2015 us=29293 IFCONFIG POOL: base=10.10.10.4 size=62, ipv6=0
Wed Mar 25 18:56:29 2015 us=29530 IFCONFIG POOL LIST
Wed Mar 25 18:56:29 2015 us=30176 MULTI: TCP INIT maxclients=1024 maxevents=1028
Wed Mar 25 18:56:29 2015 us=30548 Initialization Sequence Completed

netstat
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 1479/smbd
tcp 0 0 192.168.200.1:2222 0.0.0.0:* LISTEN 1329/dropbear
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 1411/uhttpd
tcp 0 0 0.0.0.0:1940 0.0.0.0:* LISTEN 2303/openvpn
tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 1770/dnsmasq
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 1479/smbd
tcp 0 0 68.114.212.219:1940 68.190.91.177:40119 TIME_WAIT -
tcp 0 0 68.114.212.219:1940 68.190.91.177:40120 TIME_WAIT -
tcp 0 248 192.168.200.1:2222 192.168.200.15:59560 ESTABLISHED 2091/dropbear
tcp 0 0 68.114.212.219:1940 68.190.91.177:40126 ESTABLISHED 2303/openvpn
tcp 0 0 :::139 :::* LISTEN 1479/smbd
tcp 0 0 :::80 :::* LISTEN 1411/uhttpd
tcp 0 0 :::53 :::* LISTEN 1770/dnsmasq
tcp 0 0 :::445 :::* LISTEN 1479/smbd
udp 0 0 0.0.0.0:53 0.0.0.0:* 1770/dnsmasq
udp 0 0 0.0.0.0:67 0.0.0.0:* 1770/dnsmasq
udp 0 0 192.168.200.255:137 0.0.0.0:* 1481/nmbd
udp 0 0 192.168.200.1:137 0.0.0.0:* 1481/nmbd
udp 0 0 0.0.0.0:137 0.0.0.0:* 1481/nmbd
udp 0 0 192.168.200.255:138 0.0.0.0:* 1481/nmbd
udp 0 0 192.168.200.1:138 0.0.0.0:* 1481/nmbd
udp 0 0 0.0.0.0:138 0.0.0.0:* 1481/nmbd
udp 0 0 :::546 :::* 1579/odhcp6c
udp 0 0 :::53 :::* 1770/dnsmasq
udp 0 0 :::123 :::* 1688/ntpd

It's perplexing that the local directive prevents devices from communicating with the VPN and leads me to believe a configuration setting or two, either within openvpn or within iptables is missing (then again, allow all traffic through the OpenWRT firewall didn't help either). I'm fairly knew to iptables so I'd be curious to know if disabling the firewall via etc/init.d/firewall stop completely disables iptables from routing traffic and/or allowing all traffic via Luci completely disables iptables ability to block traffic. If either is true, it would seem there's a configuration value missing from luci.

As a side note, I first tried setting up the VPN on my FreeNAS server (as the main purpose for it is network storage access), but could never get OpenWRT to allow the connection through on 1194. I spent two weeks trying to figure out why, couldn't determine why the connection was being blocked, then decided to simply use OpenWRT as the VPN server, but ran into the exact same errors I was getting with the VPN server in FreeNAS. (I'd prefer to use my server for an NAS VPN due to it being an octacore 2.4gHz AsRock server board, and everything from the hardware to the OS is intended for server usage).

Re: [Solved]Followed OpenWRT tutorials OpenWRT refuse connec

Posted: Thu Mar 26, 2015 12:24 am
by JW0914
maikcat wrote:if you do not need anything else i will close this thread now.Michael.
If you could leave it open for another day or two to see if @Traffic needs anything else, I'd really appreciate it. As soon as Traffic replies back and doesn't need any more info, please feel free to close the thread.

Thanks again for all of yours and @Traffic's help, I really do appreciate it.

Re: [Solved]Followed OpenWRT tutorials OpenWRT refuse connec

Posted: Thu Mar 26, 2015 8:43 pm
by Traffic
I am using openwrt x86-generic-ext4 (VM)
You are using ARM ...

I need to confirm: which version of openwrt you use .. AA or BB ?

thanks

Re: [Solved]Followed OpenWRT tutorials OpenWRT refuse connec

Posted: Fri Mar 27, 2015 12:22 am
by JW0914
Traffic wrote:I am using openwrt x86-generic-ext4 (VM)
You are using ARM ...

I need to confirm: which version of openwrt you use .. AA or BB ?

thanks
Neither... CC (Chaos Calmer). It's the snapshot trunk build.

Re: [Solved]Followed OpenWRT tutorials OpenWRT refuse connec

Posted: Fri Mar 27, 2015 12:26 am
by JW0914
OpenWrt Chaos Calmer (Bleeding Edge, r44974) / LuCI (git-15.079.29361-3e37216)

KernelL 3.18.9

BusyBox 1.22.1