Random temporary connection issues

Need help configuring your VPN? Just post here and you'll get that help.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Forum rules
Please use the [oconf] BB tag for openvpn Configurations. See viewtopic.php?f=30&t=21589 for an example.
Post Reply
ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Random temporary connection issues

Post by ccman32 » Sun Nov 27, 2022 3:18 pm

Hey there,

I've been using the included OpenVPN server on my TrueNAS Core system for a few weeks now but I keep running into the same problem every few days. This usually happens while I am at university and try to connect to my server at home. The initial connect always works perfectly fine but then I cannot reach anything in the VPN (= my home) network and I get a KEEPALIVE_TIMEOUT after a few seconds. Then it reconnects just fine and the problem repeats.
As I am the only user of this server, I normally get assigned the IP 10.8.0.2. However, I noticed that every time I get this problem, I am assigned IP 10.8.0.3 instead. This makes it seem to me like an old connection or something is still open and preventing me from connecting again, but I don't know for sure if that's what is actually happening.
Here is an extract of the OpenVPN server log while the problem occurred:

Code: Select all

2022-11-26 11:04:42 X.X.X.X:58380 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 11:04:42 X.X.X.X:58380 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 11:04:42 X.X.X.X:58380 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 11:04:42 X.X.X.X:58380 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 11:04:42 X.X.X.X:58380 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:58380, sid=fde33d37 bb1e4112
2022-11-26 11:04:42 X.X.X.X:58380 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-11-26 11:04:42 X.X.X.X:58380 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 11:04:42 X.X.X.X:58380 VERIFY KU OK
2022-11-26 11:04:42 X.X.X.X:58380 Validating certificate extended key usage
2022-11-26 11:04:42 X.X.X.X:58380 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 11:04:42 X.X.X.X:58380 VERIFY EKU OK
2022-11-26 11:04:42 X.X.X.X:58380 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_VER=2.5.8
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_PLAT=win
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_PROTO=6
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_NCP=2
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_LZ4=1
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_LZ4v2=1
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_LZO=1
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_COMP_STUB=1
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_COMP_STUBv2=1
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_TCPNL=1
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 11:04:42 X.X.X.X:58380 peer info: IV_SSO=openurl,crtext
2022-11-26 11:04:42 X.X.X.X:58380 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 11:04:42 X.X.X.X:58380 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:58380
2022-11-26 11:04:42 MULTI: new connection by client '<censored>.dedyn.io' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2022-11-26 11:04:42 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2022-11-26 11:04:42 MULTI: Learn: 10.8.0.2 -> <censored>.dedyn.io/X.X.X.X:58380
2022-11-26 11:04:42 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:58380: 10.8.0.2
2022-11-26 11:04:42 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 11:04:42 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 11:04:42 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-11-26 11:09:45 X.X.X.X:60787 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 11:09:45 X.X.X.X:60787 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 11:09:45 X.X.X.X:60787 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 11:09:45 X.X.X.X:60787 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 11:09:45 X.X.X.X:60787 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:60787, sid=09f84cd8 ba5cde0b
2022-11-26 11:09:45 X.X.X.X:60787 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-11-26 11:09:45 X.X.X.X:60787 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 11:09:45 X.X.X.X:60787 VERIFY KU OK
2022-11-26 11:09:45 X.X.X.X:60787 Validating certificate extended key usage
2022-11-26 11:09:45 X.X.X.X:60787 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 11:09:45 X.X.X.X:60787 VERIFY EKU OK
2022-11-26 11:09:45 X.X.X.X:60787 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_VER=2.5.8
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_PLAT=win
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_PROTO=6
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_NCP=2
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_LZ4=1
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_LZ4v2=1
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_LZO=1
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_COMP_STUB=1
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_COMP_STUBv2=1
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_TCPNL=1
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 11:09:45 X.X.X.X:60787 peer info: IV_SSO=openurl,crtext
2022-11-26 11:09:45 X.X.X.X:60787 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 11:09:45 X.X.X.X:60787 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:60787
2022-11-26 11:09:45 MULTI: new connection by client '<censored>.dedyn.io' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2022-11-26 11:09:45 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2022-11-26 11:09:45 MULTI: Learn: 10.8.0.2 -> <censored>.dedyn.io/X.X.X.X:60787
2022-11-26 11:09:45 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:60787: 10.8.0.2
2022-11-26 11:09:45 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 11:09:45 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 11:09:45 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-11-26 12:09:22 <censored>.dedyn.io/X.X.X.X:60787 TLS: soft reset sec=3577/3577 bytes=1280269/-1 pkts=4311/0
2022-11-26 12:10:22 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:10:22 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:10:22 <censored>.dedyn.io/X.X.X.X:60787 TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1
2022-11-26 12:11:38 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:11:38 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:12:53 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:12:53 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:14:09 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:14:09 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:15:16 tls-crypt unwrap error: packet too short
2022-11-26 12:15:16 TLS Error: tls-crypt unwrapping failed from [AF_INET6]::ffff:X.X.X.X:35563
2022-11-26 12:15:24 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:15:24 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:16:39 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:16:39 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:17:54 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:17:54 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:19:09 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:19:09 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:20:24 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:20:24 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:21:39 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:21:39 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:22:54 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:22:54 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:24:09 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:24:09 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:25:26 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:25:26 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:26:41 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:26:41 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:27:56 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:27:56 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:29:11 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:29:11 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:30:26 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:30:26 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:31:42 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:31:42 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:32:57 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:32:57 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:34:12 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:34:12 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:35:28 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:35:28 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:36:43 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:36:43 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:37:58 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:37:58 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:39:13 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:39:13 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:40:29 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:40:29 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:41:44 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:41:44 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:42:59 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:42:59 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:44:16 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:44:16 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:45:31 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:45:31 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:46:25 X.X.X.X:7702 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 12:46:25 X.X.X.X:7702 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 12:46:25 X.X.X.X:7702 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 12:46:25 X.X.X.X:7702 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 12:46:25 X.X.X.X:7702 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:7702, sid=8246dfb2 aeb03c8f
2022-11-26 12:46:25 X.X.X.X:7702 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-11-26 12:46:25 X.X.X.X:7702 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 12:46:25 X.X.X.X:7702 VERIFY KU OK
2022-11-26 12:46:25 X.X.X.X:7702 Validating certificate extended key usage
2022-11-26 12:46:25 X.X.X.X:7702 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 12:46:25 X.X.X.X:7702 VERIFY EKU OK
2022-11-26 12:46:25 X.X.X.X:7702 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_VER=2.5.8
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_PLAT=win
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_PROTO=6
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_NCP=2
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_LZ4=1
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_LZ4v2=1
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_LZO=1
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_COMP_STUB=1
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_COMP_STUBv2=1
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_TCPNL=1
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 12:46:25 X.X.X.X:7702 peer info: IV_SSO=openurl,crtext
2022-11-26 12:46:25 X.X.X.X:7702 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 12:46:25 X.X.X.X:7702 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:7702
2022-11-26 12:46:25 <censored>.dedyn.io/X.X.X.X:7702 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-11-26 12:46:25 <censored>.dedyn.io/X.X.X.X:7702 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:7702
2022-11-26 12:46:25 <censored>.dedyn.io/X.X.X.X:7702 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:7702: 10.8.0.3
2022-11-26 12:46:25 <censored>.dedyn.io/X.X.X.X:7702 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 12:46:25 <censored>.dedyn.io/X.X.X.X:7702 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 12:46:25 <censored>.dedyn.io/X.X.X.X:7702 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-11-26 12:46:46 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:46:46 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:7702
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 VERIFY KU OK
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 Validating certificate extended key usage
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 VERIFY EKU OK
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_VER=2.5.8
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_PLAT=win
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_PROTO=6
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_NCP=2
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_LZ4=1
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_LZ4v2=1
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_LZO=1
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_COMP_STUB=1
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_COMP_STUBv2=1
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_TCPNL=1
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 peer info: IV_SSO=openurl,crtext
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-11-26 12:46:53 <censored>.dedyn.io/X.X.X.X:7702 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-11-26 12:46:54 <censored>.dedyn.io/X.X.X.X:7702 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 12:46:55 <censored>.dedyn.io/X.X.X.X:7702 PUSH: Received control message: 'PUSH_REQUEST'
2022-11-26 12:46:55 <censored>.dedyn.io/X.X.X.X:7702 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-11-26 12:48:01 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:48:01 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:48:03 X.X.X.X:31945 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 12:48:03 X.X.X.X:31945 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 12:48:03 X.X.X.X:31945 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 12:48:03 X.X.X.X:31945 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 12:48:03 X.X.X.X:31945 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:31945, sid=c1f9a038 8fa93a57
2022-11-26 12:48:03 X.X.X.X:31945 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-11-26 12:48:03 X.X.X.X:31945 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 12:48:03 X.X.X.X:31945 VERIFY KU OK
2022-11-26 12:48:03 X.X.X.X:31945 Validating certificate extended key usage
2022-11-26 12:48:03 X.X.X.X:31945 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 12:48:03 X.X.X.X:31945 VERIFY EKU OK
2022-11-26 12:48:03 X.X.X.X:31945 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 12:48:03 X.X.X.X:31945 peer info: IV_VER=3.git::d3f8b18b:Release
2022-11-26 12:48:03 X.X.X.X:31945 peer info: IV_PLAT=android
2022-11-26 12:48:03 X.X.X.X:31945 peer info: IV_NCP=2
2022-11-26 12:48:03 X.X.X.X:31945 peer info: IV_TCPNL=1
2022-11-26 12:48:03 X.X.X.X:31945 peer info: IV_PROTO=30
2022-11-26 12:48:03 X.X.X.X:31945 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2022-11-26 12:48:03 X.X.X.X:31945 peer info: IV_AUTO_SESS=1
2022-11-26 12:48:03 X.X.X.X:31945 peer info: IV_GUI_VER=net.openvpn.connect.android_3.3.0-8367
2022-11-26 12:48:03 X.X.X.X:31945 peer info: IV_SSO=webauth,openurl
2022-11-26 12:48:03 X.X.X.X:31945 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1521'
2022-11-26 12:48:03 X.X.X.X:31945 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 12:48:03 X.X.X.X:31945 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:31945
2022-11-26 12:48:03 MULTI: new connection by client '<censored>.dedyn.io' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2022-11-26 12:48:03 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-11-26 12:48:03 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:31945
2022-11-26 12:48:03 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:31945: 10.8.0.3
2022-11-26 12:48:03 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 12:48:03 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 12:48:03 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 2,cipher AES-256-GCM' (status=1)
2022-11-26 12:48:03 <censored>.dedyn.io/X.X.X.X:31945 PUSH: Received control message: 'PUSH_REQUEST'
2022-11-26 12:48:11 <censored>.dedyn.io/X.X.X.X:31945 SIGTERM[soft,remote-exit] received, client-instance exiting
2022-11-26 12:48:12 X.X.X.X:32202 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 12:48:12 X.X.X.X:32202 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 12:48:12 X.X.X.X:32202 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 12:48:12 X.X.X.X:32202 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 12:48:12 X.X.X.X:32202 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:32202, sid=e51110de 099fe0c9
2022-11-26 12:48:12 X.X.X.X:32202 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-11-26 12:48:12 X.X.X.X:32202 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 12:48:12 X.X.X.X:32202 VERIFY KU OK
2022-11-26 12:48:12 X.X.X.X:32202 Validating certificate extended key usage
2022-11-26 12:48:12 X.X.X.X:32202 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 12:48:12 X.X.X.X:32202 VERIFY EKU OK
2022-11-26 12:48:12 X.X.X.X:32202 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 12:48:12 X.X.X.X:32202 peer info: IV_VER=3.git::d3f8b18b:Release
2022-11-26 12:48:12 X.X.X.X:32202 peer info: IV_PLAT=android
2022-11-26 12:48:12 X.X.X.X:32202 peer info: IV_NCP=2
2022-11-26 12:48:12 X.X.X.X:32202 peer info: IV_TCPNL=1
2022-11-26 12:48:12 X.X.X.X:32202 peer info: IV_PROTO=30
2022-11-26 12:48:12 X.X.X.X:32202 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2022-11-26 12:48:12 X.X.X.X:32202 peer info: IV_AUTO_SESS=1
2022-11-26 12:48:12 X.X.X.X:32202 peer info: IV_GUI_VER=net.openvpn.connect.android_3.3.0-8367
2022-11-26 12:48:12 X.X.X.X:32202 peer info: IV_SSO=webauth,openurl
2022-11-26 12:48:12 X.X.X.X:32202 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1521'
2022-11-26 12:48:12 X.X.X.X:32202 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 12:48:12 X.X.X.X:32202 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:32202
2022-11-26 12:48:12 <censored>.dedyn.io/X.X.X.X:32202 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-11-26 12:48:12 <censored>.dedyn.io/X.X.X.X:32202 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:32202
2022-11-26 12:48:12 <censored>.dedyn.io/X.X.X.X:32202 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:32202: 10.8.0.3
2022-11-26 12:48:12 <censored>.dedyn.io/X.X.X.X:32202 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 12:48:12 <censored>.dedyn.io/X.X.X.X:32202 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 12:48:12 <censored>.dedyn.io/X.X.X.X:32202 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-11-26 12:48:12 <censored>.dedyn.io/X.X.X.X:32202 PUSH: Received control message: 'PUSH_REQUEST'
2022-11-26 12:48:17 <censored>.dedyn.io/X.X.X.X:32202 SIGTERM[soft,remote-exit] received, client-instance exiting
2022-11-26 12:49:16 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:49:16 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:50:31 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:50:31 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:51:46 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:51:46 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:53:02 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:53:02 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:54:17 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:54:17 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:55:32 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:55:32 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:56:47 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:56:47 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:57:58 tls-crypt unwrap error: packet too short
2022-11-26 12:57:58 TLS Error: tls-crypt unwrapping failed from [AF_INET6]::ffff:X.X.X.X:40898
2022-11-26 12:58:03 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:58:03 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 12:59:19 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:59:19 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 13:00:34 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 13:00:34 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 13:01:50 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 13:01:50 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 13:03:05 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 13:03:05 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 13:03:50 X.X.X.X:65397 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 13:03:50 X.X.X.X:65397 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 13:03:50 X.X.X.X:65397 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 13:03:50 X.X.X.X:65397 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 13:03:50 X.X.X.X:65397 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:65397, sid=df9491ea 34d37e27
2022-11-26 13:03:50 X.X.X.X:65397 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-11-26 13:03:50 X.X.X.X:65397 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 13:03:50 X.X.X.X:65397 VERIFY KU OK
2022-11-26 13:03:50 X.X.X.X:65397 Validating certificate extended key usage
2022-11-26 13:03:50 X.X.X.X:65397 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 13:03:50 X.X.X.X:65397 VERIFY EKU OK
2022-11-26 13:03:50 X.X.X.X:65397 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_VER=2.5.8
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_PLAT=win
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_PROTO=6
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_NCP=2
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_LZ4=1
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_LZ4v2=1
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_LZO=1
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_COMP_STUB=1
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_COMP_STUBv2=1
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_TCPNL=1
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 13:03:50 X.X.X.X:65397 peer info: IV_SSO=openurl,crtext
2022-11-26 13:03:50 X.X.X.X:65397 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 13:03:50 X.X.X.X:65397 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:65397
2022-11-26 13:03:50 <censored>.dedyn.io/X.X.X.X:65397 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-11-26 13:03:50 <censored>.dedyn.io/X.X.X.X:65397 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:65397
2022-11-26 13:03:50 <censored>.dedyn.io/X.X.X.X:65397 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:65397: 10.8.0.3
2022-11-26 13:03:50 <censored>.dedyn.io/X.X.X.X:65397 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 13:03:50 <censored>.dedyn.io/X.X.X.X:65397 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 13:03:50 <censored>.dedyn.io/X.X.X.X:65397 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-11-26 13:04:20 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 13:04:20 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 13:04:21 <censored>.dedyn.io/X.X.X.X:65397 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:65397
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 VERIFY KU OK
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 Validating certificate extended key usage
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 VERIFY EKU OK
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_VER=2.5.8
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_PLAT=win
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_PROTO=6
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_NCP=2
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_LZ4=1
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_LZ4v2=1
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_LZO=1
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_COMP_STUB=1
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_COMP_STUBv2=1
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_TCPNL=1
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 peer info: IV_SSO=openurl,crtext
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-11-26 13:04:22 <censored>.dedyn.io/X.X.X.X:65397 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 13:04:23 <censored>.dedyn.io/X.X.X.X:65397 PUSH: Received control message: 'PUSH_REQUEST'
2022-11-26 13:04:23 <censored>.dedyn.io/X.X.X.X:65397 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-11-26 13:05:36 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 13:05:36 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 13:06:51 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 13:06:51 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 13:08:07 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 13:08:07 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 13:08:42 X.X.X.X:36506 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 13:08:42 X.X.X.X:36506 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 13:08:42 X.X.X.X:36506 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 13:08:42 X.X.X.X:36506 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 13:08:42 X.X.X.X:36506 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:36506, sid=1d5c05c6 7a081fe4
2022-11-26 13:08:42 X.X.X.X:36506 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-11-26 13:08:42 X.X.X.X:36506 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 13:08:42 X.X.X.X:36506 VERIFY KU OK
2022-11-26 13:08:42 X.X.X.X:36506 Validating certificate extended key usage
2022-11-26 13:08:42 X.X.X.X:36506 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 13:08:42 X.X.X.X:36506 VERIFY EKU OK
2022-11-26 13:08:42 X.X.X.X:36506 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_VER=2.5.8
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_PLAT=win
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_PROTO=6
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_NCP=2
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_LZ4=1
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_LZ4v2=1
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_LZO=1
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_COMP_STUB=1
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_COMP_STUBv2=1
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_TCPNL=1
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 13:08:42 X.X.X.X:36506 peer info: IV_SSO=openurl,crtext
2022-11-26 13:08:42 X.X.X.X:36506 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 13:08:42 X.X.X.X:36506 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:36506
2022-11-26 13:08:42 MULTI: new connection by client '<censored>.dedyn.io' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2022-11-26 13:08:42 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-11-26 13:08:42 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:36506
2022-11-26 13:08:42 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:36506: 10.8.0.3
2022-11-26 13:08:42 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 13:08:42 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 13:08:42 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 2,cipher AES-256-GCM' (status=1)
2022-11-26 13:09:22 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 13:09:22 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed
2022-11-26 13:09:22 <censored>.dedyn.io/X.X.X.X:60787 TLS: tls_multi_process: killed expiring key
2022-11-26 13:09:22 <censored>.dedyn.io/X.X.X.X:60787 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-11-26 13:12:15 X.X.X.X:3272 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 13:12:15 X.X.X.X:3272 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 13:12:15 X.X.X.X:3272 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 13:12:15 X.X.X.X:3272 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 13:12:15 X.X.X.X:3272 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:3272, sid=67ddd9c2 90948f46
2022-11-26 13:12:15 X.X.X.X:3272 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-11-26 13:12:15 X.X.X.X:3272 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 13:12:15 X.X.X.X:3272 VERIFY KU OK
2022-11-26 13:12:15 X.X.X.X:3272 Validating certificate extended key usage
2022-11-26 13:12:15 X.X.X.X:3272 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 13:12:15 X.X.X.X:3272 VERIFY EKU OK
2022-11-26 13:12:15 X.X.X.X:3272 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_VER=2.5.8
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_PLAT=win
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_PROTO=6
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_NCP=2
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_LZ4=1
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_LZ4v2=1
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_LZO=1
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_COMP_STUB=1
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_COMP_STUBv2=1
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_TCPNL=1
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 13:12:15 X.X.X.X:3272 peer info: IV_SSO=openurl,crtext
2022-11-26 13:12:15 X.X.X.X:3272 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 13:12:15 X.X.X.X:3272 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:3272
2022-11-26 13:12:15 MULTI: new connection by client '<censored>.dedyn.io' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2022-11-26 13:12:15 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2022-11-26 13:12:15 MULTI: Learn: 10.8.0.2 -> <censored>.dedyn.io/X.X.X.X:3272
2022-11-26 13:12:15 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:3272: 10.8.0.2
2022-11-26 13:12:15 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 13:12:15 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 13:12:15 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-11-26 14:11:20 <censored>.dedyn.io/X.X.X.X:3272 TLS: soft reset sec=3545/3545 bytes=7121085/-1 pkts=14135/0
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 VERIFY KU OK
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 Validating certificate extended key usage
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 VERIFY EKU OK
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_VER=2.5.8
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_PLAT=win
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_PROTO=6
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_NCP=2
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_LZ4=1
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_LZ4v2=1
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_LZO=1
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_COMP_STUB=1
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_COMP_STUBv2=1
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_TCPNL=1
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 peer info: IV_SSO=openurl,crtext
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 14:11:21 <censored>.dedyn.io/X.X.X.X:3272 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 14:31:30 X.X.X.X:1912 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 14:31:30 X.X.X.X:1912 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 14:31:30 X.X.X.X:1912 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-11-26 14:31:30 X.X.X.X:1912 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-11-26 14:31:30 X.X.X.X:1912 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:1912, sid=e3dc4d52 c50751cc
2022-11-26 14:31:30 X.X.X.X:1912 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-11-26 14:31:30 X.X.X.X:1912 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 14:31:30 X.X.X.X:1912 VERIFY KU OK
2022-11-26 14:31:30 X.X.X.X:1912 Validating certificate extended key usage
2022-11-26 14:31:30 X.X.X.X:1912 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-11-26 14:31:30 X.X.X.X:1912 VERIFY EKU OK
2022-11-26 14:31:30 X.X.X.X:1912 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_VER=2.5.8
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_PLAT=win
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_PROTO=6
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_NCP=2
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_LZ4=1
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_LZ4v2=1
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_LZO=1
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_COMP_STUB=1
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_COMP_STUBv2=1
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_TCPNL=1
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-11-26 14:31:30 X.X.X.X:1912 peer info: IV_SSO=openurl,crtext
2022-11-26 14:31:30 X.X.X.X:1912 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-11-26 14:31:30 X.X.X.X:1912 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:1912
At timestamp 11:04:42, I was still able to connect just fine. At 12:46:25, I tried connecting again from another room and the problem started to occur. At 13:12:15, the problem seems to have solved itself without me doing anything and I was able to connect just fine again.

Here is my current server configuration:
Server Configuration
proto udp
port 1194
dev tun
#dev-type tun -FIXME: This does not work, it is an openvpn issue in FreeBSD
ca /etc/certificates/CA/openvpn_ca.crt
cert /etc/certificates/openvpn_server.crt
key /etc/certificates/openvpn_server.key
dh /data/dhparam.pem
crl-verify /etc/certificates/CA/openvpn_ca.crl
server 10.8.0.0 255.255.255.0
user nobody
group nobody
status /var/log/openvpn/openvpn-status.log
log-append /var/log/openvpn/openvpn.log
verb 3
persist-tun
persist-key
remote-cert-tls client
topology subnet
cipher AES-256-GCM
auth SHA512
push "route 192.168.2.0 255.255.255.0"
push "dhcp-option DNS 192.168.2.4"
server 10.8.0.0 255.255.255.0


And this is my client configuration:
Client Configuration
client
dev tun
proto udp
port 1194
remote "<censored>.dedyn.io"
user nobody
group nobody
persist-key
persist-tun
verb 3
remote-cert-tls server
auth SHA512
cipher AES-256-GCM


What is going wrong here and how can I fix this permanently?
Any help is greatly appreciated.

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: Random temporary connection issues

Post by ordex » Tue Nov 29, 2022 10:04 pm

Honestly, it is very possible that these disruptions are caused by your network (or anything between you and the VPN server), because OpenVPN by itself would not cause such malfunctioning.

note: If you reconnect with the same certificate, you will simply "kick" the old connection, so no possibility to conflict with it.

Have you tested the VPN connection another network that is not your university? Maybe the university has some firewall that kills unknown long lasting connection? or something like that.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Wed Nov 30, 2022 9:31 am

So far I didn't encounter this problem in any other network except at the university. However, connecting from university is my main use case at the moment so the problem will most likely continue to occur at a regular basis.

Is there anything I could try configuration-wise that might fix this problem? I do not really understand what is happening when this problem occurs, because it seems to me like the expected behavior (= "kick" the old connection) is not what actually happens in my case.

Additionally, I never noticed a connection loss after some time so far at university. As long as I can successfully connect, the connection works fine until I shutdown my laptop at the end of the lecture. The problem always starts to occur later when I try to connect again after the lunch break.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Sat Dec 10, 2022 11:51 am

I just got this same problem yet again and I did some more testing: I cannot connect from ANY network to my VPN server anymore as soon as this problem starts occurring. I am completely locked out of my VPN network until it "magically" starts working again after a while. I still do not understand what is going on here. Any ideas or suggestions?

Just to make this clear again: I can still establish a connection and get assigned an IP from the VPN server. However, that IP is always 10.8.0.3 instead of 10.8.0.2 as it normally would be and I cannot communicate with anything in the VPN network until the problem disappears. After establishing a connection, it will always time out after a few seconds and reconnect, then time out again and so on...

User avatar
Pippin
Forum Team
Posts: 1201
Joined: Wed Jul 01, 2015 8:03 am
Location: irc://irc.libera.chat:6697/openvpn

Re: Random temporary connection issues

Post by Pippin » Sat Dec 10, 2022 1:16 pm

Hi,
ccman32 wrote:
Sat Dec 10, 2022 11:51 am
Just to make this clear again: I can still establish a connection and get assigned an IP from the VPN server. However, that IP is always 10.8.0.3 instead of 10.8.0.2 as it normally would be
The tunnel IP you get is unrelated to the issue.
.
ccman32 wrote:
Wed Nov 30, 2022 9:31 am
So far I didn't encounter this problem in any other network except at the university.
ordex wrote:
Tue Nov 29, 2022 10:04 pm
Honestly, it is very possible that these disruptions are caused by your network (or anything between you and the VPN server), because OpenVPN by itself would not cause such malfunctioning.
Maybe talk to the university network admin, maybe there is DPI involved?
.
I gloomily came to the ironic conclusion that if you take a highly intelligent person and give them the best possible, elite education, then you will most likely wind up with an academic who is completely impervious to reality.
Halton Arp

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Sat Dec 10, 2022 1:42 pm

Pippin wrote:
Sat Dec 10, 2022 1:16 pm
Hi,
ccman32 wrote:
Sat Dec 10, 2022 11:51 am
Just to make this clear again: I can still establish a connection and get assigned an IP from the VPN server. However, that IP is always 10.8.0.3 instead of 10.8.0.2 as it normally would be
The tunnel IP you get is unrelated to the issue.
.
ccman32 wrote:
Wed Nov 30, 2022 9:31 am
So far I didn't encounter this problem in any other network except at the university.
ordex wrote:
Tue Nov 29, 2022 10:04 pm
Honestly, it is very possible that these disruptions are caused by your network (or anything between you and the VPN server), because OpenVPN by itself would not cause such malfunctioning.
Maybe talk to the university network admin, maybe there is DPI involved?
.
Even if the IP is unrelated to the issue itself, so far it is a clear indicator for me which shows if the problem occurs or not. Under normal circumstances, I always get assigned the IP 10.8.0.2 because I am the only client connected to my VPN server.

Anyhow, as I said in my previous post: Even if the problem seems to be related to the university network, it causes problems outside of the university network which prevent me from connecting to my VPN network entirely. This does not seem like expected behavior to me, especially since it was pointed out previously that new connections are always supposed to kill existing connections with my current configuration.

Is there anything else I could try than completely rely on our university admin to figure this out for me? So far I still do not have any clue what is happening here.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Sun Dec 11, 2022 5:31 pm

Update: I was just able to replicate this problem in my home network. I still don't exactly know how to trigger it but I basically connected, waited 90 minutes like a normal lecture would take at the university. Then I shutdown my laptop, waited again for about 45 minutes, tried connecting again and voila, same problem.

Therefore, it does NOT seem to be caused by some setting, firewall or whatever at the university network. The fact that I did not encounter this problem in other networks before seems to be a coincidence.

What I also noticed is that it seems like after the following message is logged, I can connect again without problems:
2022-11-26 13:09:22 <censored>.dedyn.io/X.X.X.X:60787 TLS: tls_multi_process: killed expiring key
Is there really nothing I can do about this?

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: Random temporary connection issues

Post by ordex » Mon Dec 12, 2022 9:23 pm

what you are describing simply seems that openvpn is being revived and is saying that the key it was using is now expired. However, I presume also the server has long kicked the client due to inactivity/timeout.

Best behaviour is probably to shutdown openvpn before hibernating the laptop.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Tue Dec 13, 2022 6:32 am

I do not hibernate the laptop between lectures. I shut it down completely (I mean, at least as far as a shutdown works in Windows 10 with Fast Boot) and then start it again later. It doesn't just wake up from hibernation and tries to re-establish the previous VPN connection.

With the problem I explained so far, I am completely unable to connect to my VPN network for up to an entire hour and it doesn't matter which client device I am using or how often I try to re-connect or even restart the device; it just won't work. Only after "killed expiring key" is logged in the server logs, things start working again.

Are you sure all of this is caused by a connection not being explicitly terminated before shutting down my laptop? I've been using many VPN services based on OpenVPN and other VPN protocols before and I never experienced such a problem with any of them.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Mon Dec 19, 2022 1:58 pm

Does anyone here have further tips, suggestions or really anything that could help me solve this problem? I still run into this problem almost every time when I have to connect and disconnect multiple times throughout the day and it is very annoying.

cron2
Developer
Posts: 24
Joined: Tue Jan 12, 2010 8:08 pm

Re: Random temporary connection issues

Post by cron2 » Mon Dec 19, 2022 4:22 pm

This is very similar to the problem I've been observing in 2.6_beta2 with "I have client sessions that should have been dropped hours ago, but keep trying to reestablish TLS". These are usually nicely killed by --ping-restart unless DCO is involved, though... so, something is getting stuck in the TLS state machine in the server, and interfering with the new connection. Which is doubly annoying since the server is clearly noticing "hey, this is the same client, I should bump the other session".

This said, I would be curious what openvpn version is running there - if only to see if it's something ancient or fairly recent. The client is on 2.5.8 (this is visible from IV_VER= in the log above) but not the server version.

That said, please add something like "keepalive 10 30" to your server config - this will make the server send out an "openvpn ping" packet to the client and vice versa every 10 seconds, and if there is nothing heard from the other end in 30/60 seconds, the session is ended and cleaned up.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Mon Dec 19, 2022 4:28 pm

Thanks a lot for the suggestion! My server is running the following OpenVPN server version:
OpenVPN 2.5.6 amd64-portbld-freebsd13.1 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 11 2022

I added keepalive 10 30 to the server config and will test if this fixes the problem on my laptop.

plaisthos
OpenVpn Newbie
Posts: 17
Joined: Mon May 14, 2012 1:15 pm

Re: Random temporary connection issues

Post by plaisthos » Mon Dec 19, 2022 4:48 pm

I would be good to also have the log from the other side to properly be able to see what is going on.

2022-11-26 12:46:55 <censored>.dedyn.io/X.X.X.X:7702 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-11-26 12:48:01 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-11-26 12:48:01 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS handshake failed

These three lines sounds like the server never got an ACK on its PUSH message and therefore kicks off the client.

Same things happens later again:

2022-11-26 13:03:50 <censored>.dedyn.io/X.X.X.X:65397 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-11-26 13:03:50 <censored>.dedyn.io/X.X.X.X:65397 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-11-26 13:04:20 <censored>.dedyn.io/X.X.X.X:60787 TLS Error: TLS key negotiation failed to occur with

I think without tcpdump or log from the other side, it is almost impossible to say what is happening here.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Mon Dec 19, 2022 4:59 pm

I temporarily removed the keepalive 10 30 from the server config and will try to reproduce the problem one more time on my laptop. Once it occurs again, I will provide the client logs.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Tue Dec 20, 2022 5:30 pm

Okay so after reproducing the problem once again, here are some client logs which will hopefully be helpful for identifying the problem:
Android client:

Code: Select all

16:09:18.076 -- ----- OpenVPN Start -----

16:09:18.077 -- EVENT: CORE_THREAD_ACTIVE

16:09:18.085 -- OpenVPN core 3.git::d3f8b18b:Release android arm64 64-bit PT_PROXY

16:09:18.086 -- Frame=512/2048/512 mssfix-ctrl=1250

16:09:18.089 -- UNUSED OPTIONS
5 [user] [nobody]
6 [group] [nobody]
7 [persist-key]
8 [persist-tun]
12 [verb] [3]

16:09:18.090 -- EVENT: RESOLVE

16:09:18.274 -- Contacting [XX:XXXX::XXXX:XXXX]:1194 via UDP

16:09:18.276 -- EVENT: WAIT

16:09:18.309 -- Connecting to [<censored>.dedyn.io]:1194 (XX:XXXX::XXXX:XXXX) via UDPv6

16:09:18.370 -- EVENT: CONNECTING

16:09:18.376 -- Tunnel Options:V4,dev-type tun,link-mtu 1521,tun-mtu 1500,proto UDPv4,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client

16:09:18.378 -- Creds: UsernameEmpty/PasswordEmpty

16:09:18.385 -- Peer Info:
IV_VER=3.git::d3f8b18b:Release
IV_PLAT=android
IV_NCP=2
IV_TCPNL=1
IV_PROTO=30
IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
IV_AUTO_SESS=1
IV_GUI_VER=net.openvpn.connect.android_3.3.0-8367
IV_SSO=webauth,openurl


16:09:18.419 -- VERIFY OK: depth=1, /CN=<censored>.dedyn.io/C=DE/ST=<censored>/L=<censored>/O=Private/emailAddress=<censored>, signature: RSA-SHA256

16:09:18.420 -- VERIFY OK: depth=0, /CN=<censored>.dedyn.io/C=DE/ST=<censored>/L=<censored>/O=Private/emailAddress=<censored>, signature: RSA-SHA256

16:09:18.498 -- SSL Handshake: peer certificate: CN=<censored>.dedyn.io, 2048 bit RSA, cipher: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD


16:09:18.500 -- Session is ACTIVE

16:09:18.501 -- EVENT: GET_CONFIG

16:09:18.507 -- Sending PUSH_REQUEST to server...

16:09:18.543 -- OPTIONS:
0 [route] [192.168.2.0] [255.255.255.0]
1 [dhcp-option] [DNS] [192.168.2.4]
2 [route-gateway] [10.8.0.1]
3 [topology] [subnet]
4 [ifconfig] [10.8.0.3] [255.255.255.0]
5 [peer-id] [2]
6 [cipher] [AES-256-GCM]


16:09:18.544 -- PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: NONE
key-derivation: OpenVPN PRF
compress: NONE
peer ID: 2
control channel: tls-crypt enabled

16:09:18.546 -- EVENT: ASSIGN_IP

16:09:18.578 -- Connected via tun

16:09:18.580 -- EVENT: CONNECTED info='<censored>.dedyn.io:1194 (XX:XXXX::XXXX:XXXX) via /UDPv6 on tun/10.8.0.3/ gw=[10.8.0.1/]'

16:09:58.587 -- Session invalidated: KEEPALIVE_TIMEOUT

16:09:58.590 -- Client terminated, restarting in 2000 ms...

16:10:00.590 -- EVENT: RECONNECTING

16:10:00.605 -- EVENT: RESOLVE

16:10:00.612 -- Contacting [XX:XXXX::XXXX:XXXX]:1194 via UDP

16:10:00.614 -- EVENT: WAIT

16:10:00.627 -- Connecting to [<censored>.dedyn.io]:1194 (XX:XXXX::XXXX:XXXX) via UDPv6

16:10:00.665 -- EVENT: CONNECTING

16:10:00.669 -- Tunnel Options:V4,dev-type tun,link-mtu 1521,tun-mtu 1500,proto UDPv4,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client

16:10:00.671 -- Creds: UsernameEmpty/PasswordEmpty

16:10:00.672 -- Peer Info:
IV_VER=3.git::d3f8b18b:Release
IV_PLAT=android
IV_NCP=2
IV_TCPNL=1
IV_PROTO=30
IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
IV_AUTO_SESS=1
IV_GUI_VER=net.openvpn.connect.android_3.3.0-8367
IV_SSO=webauth,openurl


16:10:00.715 -- VERIFY OK: depth=1, /CN=<censored>.dedyn.io/C=DE/ST=<censored>/L=<censored>/O=Private/emailAddress=<censored>, signature: RSA-SHA256

16:10:00.717 -- VERIFY OK: depth=0, /CN=<censored>.dedyn.io/C=DE/ST=<censored>/L=<censored>/O=Private/emailAddress=<censored>, signature: RSA-SHA256

16:10:00.784 -- SSL Handshake: peer certificate: CN=<censored>.dedyn.io, 2048 bit RSA, cipher: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD


16:10:00.787 -- Session is ACTIVE

16:10:00.789 -- EVENT: GET_CONFIG

16:10:00.798 -- Sending PUSH_REQUEST to server...

16:10:00.823 -- OPTIONS:
0 [route] [192.168.2.0] [255.255.255.0]
1 [dhcp-option] [DNS] [192.168.2.4]
2 [route-gateway] [10.8.0.1]
3 [topology] [subnet]
4 [ifconfig] [10.8.0.3] [255.255.255.0]
5 [peer-id] [1]
6 [cipher] [AES-256-GCM]


16:10:00.825 -- PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: NONE
key-derivation: OpenVPN PRF
compress: NONE
peer ID: 1
control channel: tls-crypt enabled

16:10:00.828 -- EVENT: ASSIGN_IP

16:10:00.863 -- Connected via tun

16:10:00.864 -- EVENT: CONNECTED info='<censored>.dedyn.io:1194 (XX:XXXX::XXXX:XXXX) via /UDPv6 on tun/10.8.0.3/ gw=[10.8.0.1/]'

16:10:40.864 -- Session invalidated: KEEPALIVE_TIMEOUT

16:10:40.865 -- Client terminated, restarting in 2000 ms...

16:10:42.870 -- EVENT: RECONNECTING

16:10:42.888 -- EVENT: RESOLVE

16:10:42.951 -- Contacting X.X.X.X:1194 via UDP

16:10:42.953 -- EVENT: WAIT

16:10:42.959 -- Connecting to [<censored>.dedyn.io]:1194 (X.X.X.X) via UDPv4

16:10:42.994 -- EVENT: CONNECTING

16:10:42.998 -- Tunnel Options:V4,dev-type tun,link-mtu 1521,tun-mtu 1500,proto UDPv4,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client

16:10:42.999 -- Creds: UsernameEmpty/PasswordEmpty

16:10:43.001 -- Peer Info:
IV_VER=3.git::d3f8b18b:Release
IV_PLAT=android
IV_NCP=2
IV_TCPNL=1
IV_PROTO=30
IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
IV_AUTO_SESS=1
IV_GUI_VER=net.openvpn.connect.android_3.3.0-8367
IV_SSO=webauth,openurl


16:10:43.052 -- VERIFY OK: depth=1, /CN=<censored>.dedyn.io/C=DE/ST=<censored>/L=<censored>/O=Private/emailAddress=<censored>, signature: RSA-SHA256

16:10:43.054 -- VERIFY OK: depth=0, /CN=<censored>.dedyn.io/C=DE/ST=<censored>/L=<censored>/O=Private/emailAddress=<censored>, signature: RSA-SHA256

16:10:43.122 -- SSL Handshake: peer certificate: CN=<censored>.dedyn.io, 2048 bit RSA, cipher: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD


16:10:43.123 -- Session is ACTIVE

16:10:43.124 -- EVENT: GET_CONFIG

16:10:43.127 -- Sending PUSH_REQUEST to server...

16:10:43.154 -- OPTIONS:
0 [route] [192.168.2.0] [255.255.255.0]
1 [dhcp-option] [DNS] [192.168.2.4]
2 [route-gateway] [10.8.0.1]
3 [topology] [subnet]
4 [ifconfig] [10.8.0.3] [255.255.255.0]
5 [peer-id] [2]
6 [cipher] [AES-256-GCM]


16:10:43.155 -- PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: NONE
key-derivation: OpenVPN PRF
compress: NONE
peer ID: 2
control channel: tls-crypt enabled

16:10:43.157 -- EVENT: ASSIGN_IP

16:10:43.216 -- Connected via tun

16:10:43.218 -- EVENT: CONNECTED info='<censored>.dedyn.io:1194 (X.X.X.X) via /UDPv4 on tun/10.8.0.3/ gw=[10.8.0.1/]'

16:10:49.129 -- EVENT: DISCONNECTED

16:10:49.129 -- Tunnel bytes per CPU second: 0

16:10:49.130 -- ----- OpenVPN Stop ----- 
Windows client:

Code: Select all

2022-12-20 15:54:47 NOTE: --user option is not implemented on Windows
2022-12-20 15:54:47 NOTE: --group option is not implemented on Windows
2022-12-20 15:54:47 OpenVPN 2.5.8 [git:release/2.5/0357ceb877687faa] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Nov 11 2022
2022-12-20 15:54:47 Windows version 10.0 (Windows 10 or greater) 64bit
2022-12-20 15:54:47 library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
2022-12-20 15:54:47 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
2022-12-20 15:54:47 Need hold release from management interface, waiting...
2022-12-20 15:54:48 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
2022-12-20 15:54:48 MANAGEMENT: CMD 'state on'
2022-12-20 15:54:48 MANAGEMENT: CMD 'log on all'
2022-12-20 15:54:48 MANAGEMENT: CMD 'echo on all'
2022-12-20 15:54:48 MANAGEMENT: CMD 'bytecount 5'
2022-12-20 15:54:48 MANAGEMENT: CMD 'state'
2022-12-20 15:54:48 MANAGEMENT: CMD 'hold off'
2022-12-20 15:54:48 MANAGEMENT: CMD 'hold release'
2022-12-20 15:54:48 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 15:54:48 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 15:54:48 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 15:54:48 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 15:54:48 MANAGEMENT: >STATE:1671548088,RESOLVE,,,,,,
2022-12-20 15:54:48 TCP/UDP: Preserving recently used remote address: [AF_INET]X.X.X.X:1194
2022-12-20 15:54:48 Socket Buffers: R=[65536->65536] S=[65536->65536]
2022-12-20 15:54:48 UDP link local (bound): [AF_INET][undef]:1194
2022-12-20 15:54:48 UDP link remote: [AF_INET]X.X.X.X:1194
2022-12-20 15:54:48 MANAGEMENT: >STATE:1671548088,WAIT,,,,,,
2022-12-20 15:54:48 MANAGEMENT: >STATE:1671548088,AUTH,,,,,,
2022-12-20 15:54:48 TLS: Initial packet from [AF_INET]X.X.X.X:1194, sid=128a31d7 11368d15
2022-12-20 15:54:48 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 15:54:48 VERIFY KU OK
2022-12-20 15:54:48 Validating certificate extended key usage
2022-12-20 15:54:48 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2022-12-20 15:54:48 VERIFY EKU OK
2022-12-20 15:54:48 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 15:54:48 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 15:54:48 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET]X.X.X.X:1194
2022-12-20 15:54:48 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM'
2022-12-20 15:54:48 OPTIONS IMPORT: --ifconfig/up options modified
2022-12-20 15:54:48 OPTIONS IMPORT: route options modified
2022-12-20 15:54:48 OPTIONS IMPORT: route-related options modified
2022-12-20 15:54:48 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2022-12-20 15:54:48 OPTIONS IMPORT: peer-id set
2022-12-20 15:54:48 OPTIONS IMPORT: adjusting link_mtu to 1624
2022-12-20 15:54:48 OPTIONS IMPORT: data channel crypto options modified
2022-12-20 15:54:48 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 15:54:48 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 15:54:48 interactive service msg_channel=704
2022-12-20 15:54:48 open_tun
2022-12-20 15:54:48 tap-windows6 device [LAN-Verbindung] opened
2022-12-20 15:54:48 TAP-Windows Driver Version 9.24 
2022-12-20 15:54:48 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.3/255.255.255.0 [SUCCEEDED]
2022-12-20 15:54:48 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.3/255.255.255.0 on interface {E4A9D5FE-C440-41CF-A380-9EFB4AEBD521} [DHCP-serv: 10.8.0.0, lease-time: 31536000]
2022-12-20 15:54:48 Successful ARP Flush on interface [23] {E4A9D5FE-C440-41CF-A380-9EFB4AEBD521}
2022-12-20 15:54:48 MANAGEMENT: >STATE:1671548088,ASSIGN_IP,,10.8.0.3,,,,
2022-12-20 15:54:48 IPv4 MTU set to 1500 on interface 23 using service
2022-12-20 15:54:53 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
2022-12-20 15:54:53 MANAGEMENT: >STATE:1671548093,ADD_ROUTES,,,,,,
2022-12-20 15:54:53 C:\WINDOWS\system32\route.exe ADD 192.168.2.0 MASK 255.255.255.0 10.8.0.1
2022-12-20 15:54:53 Route addition via service succeeded
2022-12-20 15:54:53 Initialization Sequence Completed
2022-12-20 15:54:53 MANAGEMENT: >STATE:1671548093,CONNECTED,SUCCESS,10.8.0.3,X.X.X.X,1194,,
Interestingly, I cannot see any errors in the windows client logs, but the connection still wouldn't work at all after "successfully" connecting.
Additionally, I created a wireshark dump which I recorded on my laptop's wireless interface. However, I have not found a way to upload it here. If anyone knows how I can share it, please let me know.
Also, if there is anything else I can provide to make diagnosing the problem easier, please also let me know.

plaisthos
OpenVpn Newbie
Posts: 17
Joined: Mon May 14, 2012 1:15 pm

Re: Random temporary connection issues

Post by plaisthos » Sat Dec 31, 2022 2:41 pm

Both clients logs show now different behaviour from the client logs before. Either you are dealing with multiple different problems or something else has changed as well. As for why don't have a working connection. That could be for a variety of reasons since the client logs don't show any problem or error. It would be good if you can some basic troubleshouting like ping vpn server ip, gateway ip, dns server ip, etc.

And please include a server log. With only the client side, it is still more guesswork than anything.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Tue Jan 03, 2023 9:42 pm

What exactly do you mean? I have not posted any other clients logs here before.

Regarding the basic troubleshooting: While the problem does not occur, I can ping the gateway, DNS and so on just fine after connecting to the VPN server. However, while the problem occurs, I cannot ping anything in the VPN network after "successfully" connecting to the VPN server. It still seems as if I have successfully connected, but the client will not be able to communicate with anything that it could only reach through the VPN tunnel.

As requested, here is the server log for the same time period as the client logs I've shown in my previous post. Please note that the log might contain a few more connection attempts than the client logs:

Code: Select all

2022-12-20 14:55:31 X.X.X.X:62256 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 14:55:31 X.X.X.X:62256 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 14:55:31 X.X.X.X:62256 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 14:55:31 X.X.X.X:62256 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 14:55:31 X.X.X.X:62256 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:62256, sid=8c0355f5 15095f6b
2022-12-20 14:55:31 X.X.X.X:62256 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-12-20 14:55:31 X.X.X.X:62256 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 14:55:31 X.X.X.X:62256 VERIFY KU OK
2022-12-20 14:55:31 X.X.X.X:62256 Validating certificate extended key usage
2022-12-20 14:55:31 X.X.X.X:62256 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 14:55:31 X.X.X.X:62256 VERIFY EKU OK
2022-12-20 14:55:31 X.X.X.X:62256 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_VER=2.5.8
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_PLAT=win
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_PROTO=6
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_NCP=2
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_LZ4=1
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_LZ4v2=1
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_LZO=1
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_COMP_STUB=1
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_COMP_STUBv2=1
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_TCPNL=1
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 14:55:31 X.X.X.X:62256 peer info: IV_SSO=openurl,crtext
2022-12-20 14:55:31 X.X.X.X:62256 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 14:55:31 X.X.X.X:62256 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:62256
2022-12-20 14:55:31 <censored>.dedyn.io/X.X.X.X:62256 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2022-12-20 14:55:31 <censored>.dedyn.io/X.X.X.X:62256 MULTI: Learn: 10.8.0.2 -> <censored>.dedyn.io/X.X.X.X:62256
2022-12-20 14:55:31 <censored>.dedyn.io/X.X.X.X:62256 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:62256: 10.8.0.2
2022-12-20 14:55:31 <censored>.dedyn.io/X.X.X.X:62256 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 14:55:31 <censored>.dedyn.io/X.X.X.X:62256 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 14:55:31 <censored>.dedyn.io/X.X.X.X:62256 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 TLS: soft reset sec=3348/3348 bytes=27638/-1 pkts=222/0
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 VERIFY KU OK
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 Validating certificate extended key usage
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 VERIFY EKU OK
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_VER=2.5.8
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_PLAT=win
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_PROTO=6
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_NCP=2
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_LZ4=1
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_LZ4v2=1
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_LZO=1
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_COMP_STUB=1
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_COMP_STUBv2=1
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_TCPNL=1
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 peer info: IV_SSO=openurl,crtext
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 15:51:19 <censored>.dedyn.io/X.X.X.X:62257 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 16:47:07 <censored>.dedyn.io/X.X.X.X:62257 TLS: soft reset sec=3348/3348 bytes=11592/-1 pkts=93/0
2022-12-20 16:48:07 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:48:07 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:48:07 <censored>.dedyn.io/X.X.X.X:62257 TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1
2022-12-20 16:49:22 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:49:22 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:50:37 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:50:37 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:51:52 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:51:52 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:52:40 X.X.X.X:62258 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 16:52:40 X.X.X.X:62258 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 16:52:40 X.X.X.X:62258 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 16:52:40 X.X.X.X:62258 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 16:52:40 X.X.X.X:62258 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:62258, sid=8ec35b76 89eeb8ea
2022-12-20 16:52:40 X.X.X.X:62258 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-12-20 16:52:40 X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 16:52:40 X.X.X.X:62258 VERIFY KU OK
2022-12-20 16:52:40 X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 16:52:40 X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 16:52:40 X.X.X.X:62258 VERIFY EKU OK
2022-12-20 16:52:40 X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 16:52:40 X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 16:52:40 X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 16:52:40 X.X.X.X:62258 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 16:52:40 <censored>.dedyn.io/X.X.X.X:62258 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-12-20 16:52:40 <censored>.dedyn.io/X.X.X.X:62258 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:62258
2022-12-20 16:52:40 <censored>.dedyn.io/X.X.X.X:62258 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:62258: 10.8.0.3
2022-12-20 16:52:40 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 16:52:40 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 16:52:40 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 16:53:07 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:53:07 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:54:22 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:54:22 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:55:37 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:55:37 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:56:52 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:56:52 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 16:57:51 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 16:57:52 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 16:57:52 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 16:58:07 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:58:07 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:59:23 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 16:59:23 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 16:59:45 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 16:59:46 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 16:59:46 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:00:39 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:00:39 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:01:48 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:01:49 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:01:49 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:01:55 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:01:55 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:03:10 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:03:10 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:03:46 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:03:47 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:03:47 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:04:23 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:04:24 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:04:24 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:04:25 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:04:25 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:05:29 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:05:30 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:05:30 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:05:41 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:05:41 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:06:02 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:06:03 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:06:03 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:06:57 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:06:57 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
Since the log is quite large, it seems like I have to split it into two posts.
Last edited by ccman32 on Tue Jan 03, 2023 9:53 pm, edited 2 times in total.

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Tue Jan 03, 2023 9:44 pm

And here is the second half of the server log:

Code: Select all

2022-12-20 17:07:11 X.X.X.X:16906 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 17:07:11 X.X.X.X:16906 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 17:07:11 X.X.X.X:16906 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 17:07:11 X.X.X.X:16906 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 17:07:11 X.X.X.X:16906 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:16906, sid=a9ec8e64 d910fad6
2022-12-20 17:07:11 X.X.X.X:16906 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-12-20 17:07:11 X.X.X.X:16906 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:07:11 X.X.X.X:16906 VERIFY KU OK
2022-12-20 17:07:11 X.X.X.X:16906 Validating certificate extended key usage
2022-12-20 17:07:11 X.X.X.X:16906 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:07:11 X.X.X.X:16906 VERIFY EKU OK
2022-12-20 17:07:11 X.X.X.X:16906 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:07:11 X.X.X.X:16906 peer info: IV_VER=3.git::d3f8b18b:Release
2022-12-20 17:07:11 X.X.X.X:16906 peer info: IV_PLAT=android
2022-12-20 17:07:11 X.X.X.X:16906 peer info: IV_NCP=2
2022-12-20 17:07:11 X.X.X.X:16906 peer info: IV_TCPNL=1
2022-12-20 17:07:11 X.X.X.X:16906 peer info: IV_PROTO=30
2022-12-20 17:07:11 X.X.X.X:16906 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2022-12-20 17:07:11 X.X.X.X:16906 peer info: IV_AUTO_SESS=1
2022-12-20 17:07:11 X.X.X.X:16906 peer info: IV_GUI_VER=net.openvpn.connect.android_3.3.0-8367
2022-12-20 17:07:11 X.X.X.X:16906 peer info: IV_SSO=webauth,openurl
2022-12-20 17:07:11 X.X.X.X:16906 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1521'
2022-12-20 17:07:11 X.X.X.X:16906 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:07:11 X.X.X.X:16906 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:16906
2022-12-20 17:07:11 MULTI: new connection by client '<censored>.dedyn.io' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2022-12-20 17:07:11 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-12-20 17:07:11 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:16906
2022-12-20 17:07:11 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:16906: 10.8.0.3
2022-12-20 17:07:11 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:07:11 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:07:11 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 2,cipher AES-256-GCM' (status=1)
2022-12-20 17:07:11 <censored>.dedyn.io/X.X.X.X:16906 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:07:53 X.X.X.X:17253 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 17:07:53 X.X.X.X:17253 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 17:07:53 X.X.X.X:17253 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 17:07:53 X.X.X.X:17253 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 17:07:53 X.X.X.X:17253 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:17253, sid=bc8077a6 2b6e061e
2022-12-20 17:07:53 X.X.X.X:17253 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-12-20 17:07:53 X.X.X.X:17253 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:07:53 X.X.X.X:17253 VERIFY KU OK
2022-12-20 17:07:53 X.X.X.X:17253 Validating certificate extended key usage
2022-12-20 17:07:53 X.X.X.X:17253 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:07:53 X.X.X.X:17253 VERIFY EKU OK
2022-12-20 17:07:53 X.X.X.X:17253 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:07:53 X.X.X.X:17253 peer info: IV_VER=3.git::d3f8b18b:Release
2022-12-20 17:07:53 X.X.X.X:17253 peer info: IV_PLAT=android
2022-12-20 17:07:53 X.X.X.X:17253 peer info: IV_NCP=2
2022-12-20 17:07:53 X.X.X.X:17253 peer info: IV_TCPNL=1
2022-12-20 17:07:53 X.X.X.X:17253 peer info: IV_PROTO=30
2022-12-20 17:07:53 X.X.X.X:17253 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2022-12-20 17:07:53 X.X.X.X:17253 peer info: IV_AUTO_SESS=1
2022-12-20 17:07:53 X.X.X.X:17253 peer info: IV_GUI_VER=net.openvpn.connect.android_3.3.0-8367
2022-12-20 17:07:53 X.X.X.X:17253 peer info: IV_SSO=webauth,openurl
2022-12-20 17:07:53 X.X.X.X:17253 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1521'
2022-12-20 17:07:53 X.X.X.X:17253 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:07:53 X.X.X.X:17253 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:17253
2022-12-20 17:07:53 MULTI: new connection by client '<censored>.dedyn.io' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2022-12-20 17:07:53 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-12-20 17:07:53 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:17253
2022-12-20 17:07:53 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:17253: 10.8.0.3
2022-12-20 17:07:53 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:07:53 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:07:53 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:07:53 <censored>.dedyn.io/X.X.X.X:17253 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:08:13 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:08:13 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:08:35 X.X.X.X:17679 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 17:08:35 X.X.X.X:17679 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 17:08:35 X.X.X.X:17679 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 17:08:35 X.X.X.X:17679 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 17:08:35 X.X.X.X:17679 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:17679, sid=e42f4d9b 2619a993
2022-12-20 17:08:35 X.X.X.X:17679 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-12-20 17:08:36 X.X.X.X:17679 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:08:36 X.X.X.X:17679 VERIFY KU OK
2022-12-20 17:08:36 X.X.X.X:17679 Validating certificate extended key usage
2022-12-20 17:08:36 X.X.X.X:17679 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:08:36 X.X.X.X:17679 VERIFY EKU OK
2022-12-20 17:08:36 X.X.X.X:17679 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:08:36 X.X.X.X:17679 peer info: IV_VER=3.git::d3f8b18b:Release
2022-12-20 17:08:36 X.X.X.X:17679 peer info: IV_PLAT=android
2022-12-20 17:08:36 X.X.X.X:17679 peer info: IV_NCP=2
2022-12-20 17:08:36 X.X.X.X:17679 peer info: IV_TCPNL=1
2022-12-20 17:08:36 X.X.X.X:17679 peer info: IV_PROTO=30
2022-12-20 17:08:36 X.X.X.X:17679 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2022-12-20 17:08:36 X.X.X.X:17679 peer info: IV_AUTO_SESS=1
2022-12-20 17:08:36 X.X.X.X:17679 peer info: IV_GUI_VER=net.openvpn.connect.android_3.3.0-8367
2022-12-20 17:08:36 X.X.X.X:17679 peer info: IV_SSO=webauth,openurl
2022-12-20 17:08:36 X.X.X.X:17679 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1549', remote='link-mtu 1521'
2022-12-20 17:08:36 X.X.X.X:17679 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:08:36 X.X.X.X:17679 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:17679
2022-12-20 17:08:36 MULTI: new connection by client '<censored>.dedyn.io' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2022-12-20 17:08:36 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-12-20 17:08:36 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:17679
2022-12-20 17:08:36 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:17679: 10.8.0.3
2022-12-20 17:08:36 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:08:36 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:08:36 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 2,cipher AES-256-GCM' (status=1)
2022-12-20 17:08:36 <censored>.dedyn.io/X.X.X.X:17679 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:08:41 <censored>.dedyn.io/X.X.X.X:17679 SIGTERM[soft,remote-exit] received, client-instance exiting
2022-12-20 17:09:28 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:09:28 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:10:43 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:10:43 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:11:01 X.X.X.X:62258 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 17:11:01 X.X.X.X:62258 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 17:11:01 X.X.X.X:62258 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2022-12-20 17:11:01 X.X.X.X:62258 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2022-12-20 17:11:01 X.X.X.X:62258 TLS: Initial packet from [AF_INET6]::ffff:X.X.X.X:62258, sid=c443d29e 198b5c34
2022-12-20 17:11:01 X.X.X.X:62258 CRL: loaded 1 CRLs from file /etc/certificates/CA/openvpn_ca.crl
2022-12-20 17:11:01 X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:11:01 X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:11:01 X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:11:01 X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:11:01 X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:11:01 X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:11:01 X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:11:01 X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:11:01 X.X.X.X:62258 [<censored>.dedyn.io] Peer Connection Initiated with [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:11:01 <censored>.dedyn.io/X.X.X.X:62258 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2022-12-20 17:11:01 <censored>.dedyn.io/X.X.X.X:62258 MULTI: Learn: 10.8.0.3 -> <censored>.dedyn.io/X.X.X.X:62258
2022-12-20 17:11:01 <censored>.dedyn.io/X.X.X.X:62258 MULTI: primary virtual IP for <censored>.dedyn.io/X.X.X.X:62258: 10.8.0.3
2022-12-20 17:11:01 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:11:01 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:11:01 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:11:09 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:11:10 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:11:15 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:11:20 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:11:25 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:11:33 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:11:34 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:11:34 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:11:55 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:11:56 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:11:57 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:11:58 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:11:58 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:12:02 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:12:07 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:12:07 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:13:14 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:13:14 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:14:30 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:14:30 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:15:21 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:15:22 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:15:22 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:15:46 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:15:46 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:16:16 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:16:17 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:16:17 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:17:01 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:17:01 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:18:16 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:18:16 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 TLS: new session incoming connection from [AF_INET6]::ffff:X.X.X.X:62258
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=1, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 VERIFY KU OK
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 Validating certificate extended key usage
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 VERIFY EKU OK
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 VERIFY OK: depth=0, CN=<censored>.dedyn.io, C=DE, ST=<censored>, L=<censored>, O=Private, emailAddress=<censored>
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_VER=2.5.8
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PLAT=win
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_PROTO=6
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_NCP=2
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4=1
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZ4v2=1
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_LZO=1
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUB=1
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_COMP_STUBv2=1
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_TCPNL=1
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_GUI_VER=OpenVPN_GUI_11
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 peer info: IV_SSO=openurl,crtext
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: untrusted session promoted to semi-trusted
2022-12-20 17:18:41 <censored>.dedyn.io/X.X.X.X:62258 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2022-12-20 17:18:42 <censored>.dedyn.io/X.X.X.X:62258 PUSH: Received control message: 'PUSH_REQUEST'
2022-12-20 17:18:42 <censored>.dedyn.io/X.X.X.X:62258 SENT CONTROL [<censored>.dedyn.io]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,dhcp-option DNS 192.168.2.4,route-gateway 10.8.0.1,topology subnet,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
2022-12-20 17:19:31 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:19:31 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:20:46 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:20:46 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:22:01 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:22:01 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:23:16 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:23:16 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:24:31 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:24:31 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:25:46 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:25:46 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:27:02 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:27:02 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:28:17 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:28:17 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:29:32 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:29:32 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:30:47 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:30:47 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:32:04 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:32:04 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:33:19 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:33:19 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:34:34 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:34:34 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:35:49 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:35:49 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:37:05 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:37:05 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:38:20 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:38:20 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:39:35 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:39:35 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:40:51 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:40:51 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:42:06 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:42:06 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:43:21 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:43:21 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:44:36 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:44:36 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:45:52 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:45:52 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:47:07 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 17:47:07 <censored>.dedyn.io/X.X.X.X:62257 TLS Error: TLS handshake failed
2022-12-20 17:47:07 <censored>.dedyn.io/X.X.X.X:62257 TLS: tls_multi_process: killed expiring key
2022-12-20 17:47:07 <censored>.dedyn.io/X.X.X.X:62257 SIGUSR1[soft,tls-error] received, client-instance restarting
2022-12-20 18:17:09 <censored>.dedyn.io/X.X.X.X:62258 TLS: soft reset sec=3508/3508 bytes=2632/-1 pkts=23/0
2022-12-20 18:18:09 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:18:09 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:18:09 <censored>.dedyn.io/X.X.X.X:62258 TLS: move_session: dest=TM_LAME_DUCK src=TM_ACTIVE reinit_src=1
2022-12-20 18:19:25 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:19:25 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:20:40 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:20:40 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:21:55 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:21:55 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:23:10 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:23:10 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:24:25 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:24:25 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:25:40 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:25:40 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:26:56 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:26:56 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:28:11 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:28:11 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:29:27 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:29:27 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:30:43 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:30:43 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:31:58 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:31:58 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:33:14 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:33:14 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:34:29 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:34:29 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:35:45 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:35:45 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:37:00 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:37:00 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:38:15 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:38:15 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:39:30 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:39:30 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:40:45 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:40:45 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:42:00 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:42:00 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:43:15 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:43:15 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:44:30 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:44:30 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:45:45 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:45:45 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:47:00 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:47:00 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:48:16 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:48:16 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:49:31 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:49:31 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:50:46 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:50:46 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:52:01 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:52:01 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:53:16 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:53:16 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:54:31 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:54:31 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:55:47 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:55:47 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:57:02 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:57:02 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:58:17 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:58:17 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 18:59:32 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 18:59:32 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:00:47 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:00:47 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:02:02 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:02:02 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:03:17 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:03:17 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:04:32 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:04:32 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:05:48 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:05:48 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:07:03 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:07:03 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:08:18 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:08:18 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:09:33 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:09:33 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:10:48 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:10:48 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:12:03 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:12:03 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:13:18 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:13:18 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:14:33 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:14:33 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:15:48 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:15:48 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:17:03 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:17:03 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:17:09 <censored>.dedyn.io/X.X.X.X:62258 TLS: tls_multi_process: killed expiring key
2022-12-20 19:18:09 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2022-12-20 19:18:09 <censored>.dedyn.io/X.X.X.X:62258 TLS Error: TLS handshake failed
2022-12-20 19:18:09 <censored>.dedyn.io/X.X.X.X:62258 SIGUSR1[soft,tls-error] received, client-instance restarting

User avatar
Pippin
Forum Team
Posts: 1201
Joined: Wed Jul 01, 2015 8:03 am
Location: irc://irc.libera.chat:6697/openvpn

Re: Random temporary connection issues

Post by Pippin » Tue Jan 03, 2023 11:43 pm

Hi,

Server log from openings post:
ccman32 wrote:
Sun Nov 27, 2022 3:18 pm

Code: Select all

2022-11-26 12:15:16 tls-crypt unwrap error: packet too short
2022-11-26 12:15:16 TLS Error: tls-crypt unwrapping failed from [AF_INET6]::ffff:X.X.X.X:35563
.
2022-11-26 12:57:58 tls-crypt unwrap error: packet too short
2022-11-26 12:57:58 TLS Error: tls-crypt unwrapping failed from [AF_INET6]::ffff:X.X.X.X:40898
The server config posted has no tls-crypt directive.....
.
ccman32 wrote:
Tue Dec 20, 2022 5:30 pm
Android client:

Code: Select all

16:09:18.544 -- PROTOCOL OPTIONS:

control channel: tls-crypt enabled
.
.
.
16:10:00.825 -- PROTOCOL OPTIONS:

control channel: tls-crypt enabled
.
.
.
16:10:43.155 -- PROTOCOL OPTIONS:

control channel: tls-crypt enabled

16:10:43.157 -- EVENT: ASSIGN_IP
...
...
...
I gloomily came to the ironic conclusion that if you take a highly intelligent person and give them the best possible, elite education, then you will most likely wind up with an academic who is completely impervious to reality.
Halton Arp

ccman32
OpenVpn Newbie
Posts: 13
Joined: Sun Nov 27, 2022 2:25 pm

Re: Random temporary connection issues

Post by ccman32 » Wed Jan 04, 2023 12:21 am

Yes. I have not included the <tls-crypt> section in the config because I wasn't sure if the key in it can be shared publicly or not. Other than that, the config I posted here is identical to the config that is currently used on my server.
I'm sorry if that wasn't clear or if it caused any unnecessary confusion.

Post Reply