Page 1 of 1

OpenVPN cannot connect

Posted: Fri Mar 05, 2021 4:08 am
by uretadq
Hi All,

Would like to ask for your assistance regarding the error we encountered when we connecting using the OpenVPN. "Connection reset, restarting [0]", and it loop again and not connecting. But before this incident, the users is connected successfully. We tried to uninstall and reinstall many times but it did not work. We used the "openvpn-install-2.4.9-I601-Win10.exe" and "OpenVPN-2.5.1-I601-amd64.msi", the same log we encountered and also used the OpenVPN Client but it could not connect. We tried to Run this as Administrator, and added the Port and the Exe file in the firewall, even the firewall is off, but it could not connect also. We are tried to use other Network, but the same error. And we also wondering only 2 users encountered this error, and the users are successfully connected.

OpenVPN Log:

Code: Select all

2021-03-04 12:56:46 OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
2021-03-04 12:56:46 Windows version 10.0 (Windows 10 or greater) 64bit
2021-03-04 12:56:46 library versions: OpenSSL 1.1.1j  16 Feb 2021, LZO 2.10
Enter Management Password:
2021-03-04 12:56:46 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
2021-03-04 12:56:46 Need hold release from management interface, waiting...
2021-03-04 12:56:46 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
2021-03-04 12:56:46 MANAGEMENT: CMD 'state on'
2021-03-04 12:56:46 MANAGEMENT: CMD 'log all on'
2021-03-04 12:56:46 MANAGEMENT: CMD 'echo all on'
2021-03-04 12:56:46 MANAGEMENT: CMD 'bytecount 5'
2021-03-04 12:56:46 MANAGEMENT: CMD 'hold off'
2021-03-04 12:56:46 MANAGEMENT: CMD 'hold release'
2021-03-04 12:56:46 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-03-04 12:56:46 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-03-04 12:56:46 MANAGEMENT: >STATE:1614833806,RESOLVE,,,,,,
2021-03-04 12:56:47 TCP/UDP: Preserving recently used remote address: [AF_INET]52.148.88.109:443
2021-03-04 12:56:47 Socket Buffers: R=[65536->65536] S=[65536->65536]
2021-03-04 12:56:47 Attempting to establish TCP connection with [AF_INET]52.148.88.109:443 [nonblock]
2021-03-04 12:56:47 MANAGEMENT: >STATE:1614833807,TCP_CONNECT,,,,,,
2021-03-04 12:56:47 TCP connection established with [AF_INET]52.148.88.109:443
2021-03-04 12:56:47 TCP_CLIENT link local: (not bound)
2021-03-04 12:56:47 TCP_CLIENT link remote: [AF_INET]52.148.88.109:443
2021-03-04 12:56:47 MANAGEMENT: >STATE:1614833807,WAIT,,,,,,
2021-03-04 12:56:47 Connection reset, restarting [0]
2021-03-04 12:56:47 SIGUSR1[soft,connection-reset] received, process restarting
2021-03-04 12:56:47 MANAGEMENT: >STATE:1614833807,RECONNECTING,connection-reset,,,,,
2021-03-04 12:56:47 Restart pause, 5 second(s)
2021-03-04 12:56:52 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-03-04 12:56:52 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-03-04 12:56:52 MANAGEMENT: >STATE:1614833812,RESOLVE,,,,,,
2021-03-04 12:56:52 TCP/UDP: Preserving recently used remote address: [AF_INET]52.148.88.109:443
2021-03-04 12:56:52 Socket Buffers: R=[65536->65536] S=[65536->65536]
2021-03-04 12:56:52 Attempting to establish TCP connection with [AF_INET]52.148.88.109:443 [nonblock]
2021-03-04 12:56:52 MANAGEMENT: >STATE:1614833812,TCP_CONNECT,,,,,,
2021-03-04 12:56:52 TCP connection established with [AF_INET]52.148.88.109:443
2021-03-04 12:56:52 TCP_CLIENT link local: (not bound)
2021-03-04 12:56:52 TCP_CLIENT link remote: [AF_INET]52.148.88.109:443
2021-03-04 12:56:52 MANAGEMENT: >STATE:1614833812,WAIT,,,,,,
2021-03-04 12:56:53 Connection reset, restarting [0]
2021-03-04 12:56:53 SIGUSR1[soft,connection-reset] received, process restarting
2021-03-04 12:56:53 MANAGEMENT: >STATE:1614833813,RECONNECTING,connection-reset,,,,,
2021-03-04 12:56:53 Restart pause, 5 second(s)
2021-03-04 12:56:58 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Thank you very much