Page 1 of 1

fault when connecting

Posted: Tue Apr 03, 2012 1:06 am
by sentest
ok so heres a run down i have a windows 7 64 bit machine running openvpn server starts stays started whenether anything tries connecting this appears in the logs and the user keeps trying to reconnect i am completly confused now

i have attached log

Code: Select all

Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 NOTE: --mute triggered...
Tue Apr 03 01:59:45 2012 10 variation(s) on previous 5 message(s) suppressed by --mute
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:51503 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:51503 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:51503 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:51503 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:51503 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:51503 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:51503 TLS: Initial packet from 94.174.242.70:51503, sid=103cb2ad aa4e2622
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:63887 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:63887 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:63887 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:63887 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:63887 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:63887 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:63887 TLS: Initial packet from 94.174.242.70:63887, sid=7e4c3fc4 450fcf0c
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:65314 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:65314 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:65314 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:65314 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:65314 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:65314 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:65314 TLS: Initial packet from 94.174.242.70:65314, sid=fec6223c 876788ec
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 NOTE: --mute triggered...
Tue Apr 03 01:59:45 2012 1 variation(s) on previous 5 message(s) suppressed by --mute
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:59636 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:59636 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:59636 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:59636 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:59636 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:59636 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:59636 TLS: Initial packet from 94.174.242.70:59636, sid=65926d3f b75156b3
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:59236 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:59236 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:59236 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:59236 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:59236 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:59236 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:59236 TLS: Initial packet from 94.174.242.70:59236, sid=7fcba8cd f8a83381
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:53293 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:53293 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:53293 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:53293 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:53293 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:53293 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:53293 TLS: Initial packet from 94.174.242.70:53293, sid=ebc33018 3a9fe2f7
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 NOTE: --mute triggered...
Tue Apr 03 01:59:45 2012 7 variation(s) on previous 5 message(s) suppressed by --mute
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:58594 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:58594 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:58594 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:58594 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:58594 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:58594 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:58594 TLS: Initial packet from 94.174.242.70:58594, sid=2c28da7e 39919ace
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:62344 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:62344 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:62344 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:62344 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:62344 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:62344 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:62344 TLS: Initial packet from 94.174.242.70:62344, sid=4c424723 46131d6a
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:55018 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:55018 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:55018 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:55018 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:55018 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:55018 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:55018 TLS: Initial packet from 94.174.242.70:55018, sid=8c7c7b81 ccbec804
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:61306 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:61306 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:61306 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:61306 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:61306 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:61306 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:61306 TLS: Initial packet from 94.174.242.70:61306, sid=1e4ac364 8fe8a435
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 NOTE: --mute triggered...
Tue Apr 03 01:59:45 2012 1 variation(s) on previous 5 message(s) suppressed by --mute
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:57220 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:57220 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:57220 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:57220 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:57220 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:57220 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:57220 TLS: Initial packet from 94.174.242.70:57220, sid=e4fcc5e3 20607346
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called
Tue Apr 03 01:59:45 2012 94.174.242.70:50082 Re-using SSL/TLS context
Tue Apr 03 01:59:45 2012 94.174.242.70:50082 LZO compression initialized
Tue Apr 03 01:59:45 2012 94.174.242.70:50082 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:50082 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 03 01:59:45 2012 94.174.242.70:50082 Local Options hash (VER=V4): '530fdded'
Tue Apr 03 01:59:45 2012 94.174.242.70:50082 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 03 01:59:45 2012 94.174.242.70:50082 TLS: Initial packet from 94.174.242.70:50082, sid=3ffe58cd 7f2c5bfa
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
Tue Apr 03 01:59:45 2012 MULTI: multi_create_instance called

heres the log from the client side also both machines are niether firewalled and have static external ip's so need issues of a router blocking traffic and no need for port forwarding.

Code: Select all

12-04-03 01:59:54 TCP/UDP: Closing socket
2012-04-03 01:59:54 SIGUSR1[soft,tls-error] received, process restarting
2012-04-03 01:59:54 MANAGEMENT: >STATE:1333414794,RECONNECTING,tls-error,,
2012-04-03 01:59:54 MANAGEMENT: CMD 'hold release'
2012-04-03 01:59:54 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2012-04-03 01:59:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2012-04-03 01:59:54 Re-using SSL/TLS context
2012-04-03 01:59:54 LZO compression initialized
2012-04-03 01:59:54 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
2012-04-03 01:59:54 Socket Buffers: R=[42080->65536] S=[9216->65536]
2012-04-03 01:59:54 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
2012-04-03 01:59:54 Local Options hash (VER=V4): '41690919'
2012-04-03 01:59:54 Expected Remote Options hash (VER=V4): '530fdded'
2012-04-03 01:59:54 UDPv4 link local: [undef]
2012-04-03 01:59:54 UDPv4 link remote: 94.174.242.68:1194
2012-04-03 01:59:54 MANAGEMENT: >STATE:1333414794,WAIT,,,
2012-04-03 01:59:54 MANAGEMENT: >STATE:1333414794,AUTH,,,
2012-04-03 01:59:54 TLS: Initial packet from 94.174.242.68:1194, sid=3e332e36 4a4c7584
2012-04-03 01:59:55 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: /C=GB/ST=London/L=London/O=Ezydigital/OU=it/CN=Ashley_Warrington/emailAddress=ash.warrington@gmail.com
2012-04-03 01:59:55 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
2012-04-03 01:59:55 TLS Error: TLS object -> incoming plaintext read error
2012-04-03 01:59:55 TLS Error: TLS handshake failed
2012-04-03 01:59:55 TCP/UDP: Closing socket
2012-04-03 01:59:55 SIGUSR1[soft,tls-error] received, process restarting
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,RECONNECTING,tls-error,,
2012-04-03 01:59:55 MANAGEMENT: CMD 'hold release'
2012-04-03 01:59:55 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2012-04-03 01:59:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2012-04-03 01:59:55 Re-using SSL/TLS context
2012-04-03 01:59:55 LZO compression initialized
2012-04-03 01:59:55 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
2012-04-03 01:59:55 Socket Buffers: R=[42080->65536] S=[9216->65536]
2012-04-03 01:59:55 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
2012-04-03 01:59:55 Local Options hash (VER=V4): '41690919'
2012-04-03 01:59:55 Expected Remote Options hash (VER=V4): '530fdded'
2012-04-03 01:59:55 UDPv4 link local: [undef]
2012-04-03 01:59:55 UDPv4 link remote: 94.174.242.68:1194
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,WAIT,,,
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,AUTH,,,
2012-04-03 01:59:55 TLS: Initial packet from 94.174.242.68:1194, sid=4d4e8e36 b243f8a5
2012-04-03 01:59:55 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: /C=GB/ST=London/L=London/O=Ezydigital/OU=it/CN=Ashley_Warrington/emailAddress=ash.warrington@gmail.com
2012-04-03 01:59:55 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
2012-04-03 01:59:55 TLS Error: TLS object -> incoming plaintext read error
2012-04-03 01:59:55 TLS Error: TLS handshake failed
2012-04-03 01:59:55 TCP/UDP: Closing socket
2012-04-03 01:59:55 SIGUSR1[soft,tls-error] received, process restarting
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,RECONNECTING,tls-error,,
2012-04-03 01:59:55 MANAGEMENT: CMD 'hold release'
2012-04-03 01:59:55 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2012-04-03 01:59:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2012-04-03 01:59:55 Re-using SSL/TLS context
2012-04-03 01:59:55 LZO compression initialized
2012-04-03 01:59:55 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
2012-04-03 01:59:55 Socket Buffers: R=[42080->65536] S=[9216->65536]
2012-04-03 01:59:55 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
2012-04-03 01:59:55 Local Options hash (VER=V4): '41690919'
2012-04-03 01:59:55 Expected Remote Options hash (VER=V4): '530fdded'
2012-04-03 01:59:55 UDPv4 link local: [undef]
2012-04-03 01:59:55 UDPv4 link remote: 94.174.242.68:1194
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,WAIT,,,
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,AUTH,,,
2012-04-03 01:59:55 TLS: Initial packet from 94.174.242.68:1194, sid=cbee18f4 67f26649
2012-04-03 01:59:55 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: /C=GB/ST=London/L=London/O=Ezydigital/OU=it/CN=Ashley_Warrington/emailAddress=ash.warrington@gmail.com
2012-04-03 01:59:55 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
2012-04-03 01:59:55 TLS Error: TLS object -> incoming plaintext read error
2012-04-03 01:59:55 TLS Error: TLS handshake failed
2012-04-03 01:59:55 TCP/UDP: Closing socket
2012-04-03 01:59:55 SIGUSR1[soft,tls-error] received, process restarting
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,RECONNECTING,tls-error,,
2012-04-03 01:59:55 MANAGEMENT: CMD 'hold release'
2012-04-03 01:59:55 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2012-04-03 01:59:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2012-04-03 01:59:55 Re-using SSL/TLS context
2012-04-03 01:59:55 LZO compression initialized
2012-04-03 01:59:55 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
2012-04-03 01:59:55 Socket Buffers: R=[42080->65536] S=[9216->65536]
2012-04-03 01:59:55 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
2012-04-03 01:59:55 Local Options hash (VER=V4): '41690919'
2012-04-03 01:59:55 Expected Remote Options hash (VER=V4): '530fdded'
2012-04-03 01:59:55 UDPv4 link local: [undef]
2012-04-03 01:59:55 UDPv4 link remote: 94.174.242.68:1194
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,WAIT,,,
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,AUTH,,,
2012-04-03 01:59:55 TLS: Initial packet from 94.174.242.68:1194, sid=804bde4e 0742058f
2012-04-03 01:59:55 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: /C=GB/ST=London/L=London/O=Ezydigital/OU=it/CN=Ashley_Warrington/emailAddress=ash.warrington@gmail.com
2012-04-03 01:59:55 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
2012-04-03 01:59:55 TLS Error: TLS object -> incoming plaintext read error
2012-04-03 01:59:55 TLS Error: TLS handshake failed
2012-04-03 01:59:55 TCP/UDP: Closing socket
2012-04-03 01:59:55 SIGUSR1[soft,tls-error] received, process restarting
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,RECONNECTING,tls-error,,
2012-04-03 01:59:55 MANAGEMENT: CMD 'hold release'
2012-04-03 01:59:55 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2012-04-03 01:59:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2012-04-03 01:59:55 Re-using SSL/TLS context
2012-04-03 01:59:55 LZO compression initialized
2012-04-03 01:59:55 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
2012-04-03 01:59:55 Socket Buffers: R=[42080->65536] S=[9216->65536]
2012-04-03 01:59:55 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
2012-04-03 01:59:55 Local Options hash (VER=V4): '41690919'
2012-04-03 01:59:55 Expected Remote Options hash (VER=V4): '530fdded'
2012-04-03 01:59:55 UDPv4 link local: [undef]
2012-04-03 01:59:55 UDPv4 link remote: 94.174.242.68:1194
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,WAIT,,,
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,AUTH,,,
2012-04-03 01:59:55 TLS: Initial packet from 94.174.242.68:1194, sid=da23d9e9 e47fda98
2012-04-03 01:59:55 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: /C=GB/ST=London/L=London/O=Ezydigital/OU=it/CN=Ashley_Warrington/emailAddress=ash.warrington@gmail.com
2012-04-03 01:59:55 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
2012-04-03 01:59:55 TLS Error: TLS object -> incoming plaintext read error
2012-04-03 01:59:55 TLS Error: TLS handshake failed
2012-04-03 01:59:55 TCP/UDP: Closing socket
2012-04-03 01:59:55 SIGUSR1[soft,tls-error] received, process restarting
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,RECONNECTING,tls-error,,
2012-04-03 01:59:55 MANAGEMENT: CMD 'hold release'
2012-04-03 01:59:55 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2012-04-03 01:59:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2012-04-03 01:59:55 Re-using SSL/TLS context
2012-04-03 01:59:55 LZO compression initialized
2012-04-03 01:59:55 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
2012-04-03 01:59:55 Socket Buffers: R=[42080->65536] S=[9216->65536]
2012-04-03 01:59:55 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
2012-04-03 01:59:55 Local Options hash (VER=V4): '41690919'
2012-04-03 01:59:55 Expected Remote Options hash (VER=V4): '530fdded'
2012-04-03 01:59:55 UDPv4 link local: [undef]
2012-04-03 01:59:55 UDPv4 link remote: 94.174.242.68:1194
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,WAIT,,,
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,AUTH,,,
2012-04-03 01:59:55 TLS: Initial packet from 94.174.242.68:1194, sid=8ca0399d 62d91c3d
2012-04-03 01:59:55 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: /C=GB/ST=London/L=London/O=Ezydigital/OU=it/CN=Ashley_Warrington/emailAddress=ash.warrington@gmail.com
2012-04-03 01:59:55 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
2012-04-03 01:59:55 TLS Error: TLS object -> incoming plaintext read error
2012-04-03 01:59:55 TLS Error: TLS handshake failed
2012-04-03 01:59:55 TCP/UDP: Closing socket
2012-04-03 01:59:55 SIGUSR1[soft,tls-error] received, process restarting
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,RECONNECTING,tls-error,,
2012-04-03 01:59:55 MANAGEMENT: CMD 'hold release'
2012-04-03 01:59:55 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2012-04-03 01:59:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2012-04-03 01:59:55 Re-using SSL/TLS context
2012-04-03 01:59:55 LZO compression initialized
2012-04-03 01:59:55 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
2012-04-03 01:59:55 Socket Buffers: R=[42080->65536] S=[9216->65536]
2012-04-03 01:59:55 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
2012-04-03 01:59:55 Local Options hash (VER=V4): '41690919'
2012-04-03 01:59:55 Expected Remote Options hash (VER=V4): '530fdded'
2012-04-03 01:59:55 UDPv4 link local: [undef]
2012-04-03 01:59:55 UDPv4 link remote: 94.174.242.68:1194
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,WAIT,,,
2012-04-03 01:59:55 MANAGEMENT: >STATE:1333414795,AUTH,,,
2012-04-03 01:59:55 TLS: Initial packet from 94.174.242.68:1194, sid=f9809487 62cc0e41
2012-04-03 01:59:56 event_wait : Interrupted system call (code=4)
2012-04-03 01:59:56 TCP/UDP: Closing socket
2012-04-03 01:59:56 SIGTERM[hard,] received, process exiting
2012-04-03 01:59:56 MANAGEMENT: >STATE:1333414796,EXITING,SIGTERM,,
2012-04-03 01:59:57 *Tunnelblick: Flushed the DNS cache

Re: fault when connecting

Posted: Tue Apr 03, 2012 8:39 am
by maikcat
make sure the destination ip & port is correct,

also make sure that you allow traffic on your server side firewall/router .

Michael.

Re: fault when connecting

Posted: Tue Apr 03, 2012 9:48 am
by sentest
the port i am using is the same in the default config also there is no firewall and both machines are using a static external ip

Re: fault when connecting

Posted: Tue Apr 03, 2012 1:40 pm
by janjust
the client does not trust the certificate returned by the server:
2012-04-03 01:59:55 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: /C=GB/ST=London/L=London/O=Ezydigital/OU=it/CN=Ashley_Warrington/emailAddress=ash.warrington@gmail.com
check the CA.crt files on both ends