• AirVPN going up and down

    5
    0 Votes
    5 Posts
    1k Views
    X

    here is part of the log.. i upped the VERB to 6 as per John's request to help figure this out.  thanks guys.

    Nov 3 18:55:41 openvpn[93678]: PID_ERR replay-window backtrack occurred [33] [SSL-1] [000000000000000000000000000000000_000000000000000000000000000000] 0:166983 0:166950 t=1446605741[0] r=[-4,64,15,33,1] sl=[57,64,64,528]
    Nov 3 18:54:10 openvpn[93678]: PID_ERR replay-window backtrack occurred [31] [SSL-1] [0000000000000000000000000000000_00000000000000000000000000000000] 0:67491 0:67460 t=1446605650[0] r=[-3,64,15,31,1] sl=[29,64,64,528]
    Nov 3 18:53:24 openvpn[93678]: PID_ERR replay-window backtrack occurred [22] [SSL-1] [0______________________00000000000000000000000000000000000000000] 0:18636 0:18614 t=1446605604[0] r=[-2,64,15,22,1] sl=[52,64,64,528]
    Nov 3 18:53:17 openvpn[93678]: PID_ERR replay-window backtrack occurred [18] [SSL-1] [0_0000000000000000_000000000000000000000000000000000000000000000] 0:13080 0:13062 t=1446605597[0] r=[0,64,15,18,1] sl=[40,64,64,528]
    Nov 3 18:53:14 openvpn[93678]: PID_ERR replay-window backtrack occurred [17] [SSL-1] [0_________________0000000000000000000000000000000000000000000000] 0:8626 0:8609 t=1446605594[0] r=[-2,64,15,17,1] sl=[14,64,64,528]
    Nov 3 18:53:13 openvpn[93678]: PID_ERR replay-window backtrack occurred [14] [SSL-1] [0______________0000000000000000000000000000000000000000000000000] 0:7865 0:7851 t=1446605593[0] r=[-1,64,15,14,1] sl=[7,64,64,528]
    Nov 3 18:53:09 openvpn[93678]: PID_ERR replay-window backtrack occurred [12] [SSL-1] [000000000000_000000000000000000000000000000000000000000000000000] 0:2387 0:2375 t=1446605589[0] r=[-2,64,15,12,1] sl=[45,64,64,528]
    Nov 3 18:53:09 openvpn[93678]: PID_ERR replay-window backtrack occurred [11] [SSL-1] [0___________0000000000000000000000000000000000000000000000000000] 0:2298 0:2287 t=1446605589[0] r=[-2,64,15,11,1] sl=[6,64,64,528]
    Nov 3 18:53:07 openvpn[93678]: PID_ERR replay-window backtrack occurred [10] [SSL-1] [0000__0000_00000000000000000000000000000000000000000000000000000] 0:723 0:713 t=1446605587[0] r=[0,64,15,10,1] sl=[45,64,64,528]
    Nov 3 18:53:07 openvpn[93678]: PID_ERR replay-window backtrack occurred [8] [SSL-1] [0________0000000000000000000000000000000000000000000000000000000] 0:668 0:660 t=1446605587[0] r=[0,64,15,8,1] sl=[36,64,64,528]
    Nov 3 18:53:07 openvpn[93678]: PID_ERR replay-window backtrack occurred [5] [SSL-1] [00000_0000000000000000000000000000000000000000000000000000000000] 0:270 0:265 t=1446605587[0] r=[0,64,15,5,1] sl=[50,64,64,528]
    Nov 3 18:53:07 openvpn[93678]: PID_ERR replay-window backtrack occurred [1] [SSL-1] [0_00000000000000000000000000000000000000000000000000000000000000] 0:234 0:233 t=1446605587[0] r=[0,64,15,1,1] sl=[22,64,64,528]
    Nov 3 18:52:14 openvpn[93678]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
    Nov 3 18:52:14 openvpn[93678]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Nov 3 18:52:14 openvpn[93678]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    Nov 3 18:52:14 openvpn[93678]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Nov 3 18:52:14 openvpn[93678]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    Nov 3 18:52:07 openvpn[93678]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    Nov 3 18:52:07 openvpn[93678]: VERIFY EKU OK
    Nov 3 18:52:07 openvpn[93678]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    Nov 3 18:52:07 openvpn[93678]: Validating certificate extended key usage
    Nov 3 18:52:07 openvpn[93678]: VERIFY KU OK
    Nov 3 18:52:07 openvpn[93678]: ++ Certificate has key usage 00a0, expects 00a0
    Nov 3 18:52:07 openvpn[93678]: Validating certificate key usage
    Nov 3 18:52:07 openvpn[93678]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    Nov 3 18:52:07 openvpn[93678]: TLS: soft reset sec=0 bytes=2296042230/0 pkts=2600817/0
    Nov 3 18:52:05 openvpn[93678]: TLS: tls_process: killed expiring key
    Nov 3 18:45:44 openvpn[45742]: Exiting due to fatal error
    Nov 3 18:45:44 openvpn[45742]: Cannot open TUN/TAP dev /dev/tun1: Device busy (errno=16)
    Nov 3 18:45:44 openvpn[45742]: TUN/TAP device ovpnc1 exists previously, keep at program end
    Nov 3 18:45:44 openvpn[45742]: OPTIONS IMPORT: route-related options modified
    Nov 3 18:45:44 openvpn[45742]: OPTIONS IMPORT: –ifconfig/up options modified
    Nov 3 18:45:44 openvpn[45742]: OPTIONS IMPORT: LZO parms modified
    Nov 3 18:45:44 openvpn[45742]: OPTIONS IMPORT: timers and/or timeouts modified
    Nov 3 18:45:44 openvpn[45742]: Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
    Nov 3 18:45:44 openvpn[45742]: Options error: option 'redirect-gateway' cannot be used in this context ([PUSH-OPTIONS])
    Nov 3 18:45:44 openvpn[45742]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.195 255.255.0.0'

    pid=43 DATA len=29
    Nov 3 18:45:44 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #84 ] [ 42 ]
    pid=42 DATA len=100
    Nov 3 18:45:44 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #83 ] [ 41 ]
    pid=41 DATA len=100
    Nov 3 18:45:44 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #77 ] [ 36 ]
    pid=36 DATA len=69
    Nov 3 18:45:44 openvpn[45742]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    Nov 3 18:45:40 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #81 ] [ 40 ]
    pid=40 DATA len=77
    Nov 3 18:45:39 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #80 ] [ 39 ]
    pid=39 DATA len=100
    Nov 3 18:45:38 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #74 ] [ 35 ]
    Nov 3 18:45:38 openvpn[45742]: UDPv4 WRITE [123] to [AF_INET]46.21.151.106:443: P_CONTROL_V1 kid=0 pid=[ #79 ] [ 38 ] pid=35 DATA len=69
    Nov 3 18:45:38 openvpn[45742]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    pid=38 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: [server] Peer Connection Initiated with [AF_INET]46.21.151.106:443
    Nov 3 18:45:36 openvpn[45742]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
    Nov 3 18:45:36 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #78 ] [ 40 ]
    Nov 3 18:45:36 openvpn[45742]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Nov 3 18:45:36 openvpn[45742]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    Nov 3 18:45:36 openvpn[45742]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Nov 3 18:45:36 openvpn[45742]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
    pid=40 DATA len=77
    Nov 3 18:45:36 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #77 ] [ 39 ]
    pid=39 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #76 ] [ 38 ]
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [154] from [AF_INET]46.21.151.106:443: P_CONTROL_V1 kid=0 pid=[ #70 ] [ 34 ] pid=38 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #69 ] [ 33 ]
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #68 ] [ 32 ]
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #67 ] [ 31 ]
    pid=34 DATA len=57
    pid=33 DATA len=100
    pid=32 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 WRITE [154] to [AF_INET]46.21.151.106:443: P_CONTROL_V1 kid=0 pid=[ #72 ] [ 37 ] pid=31 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [129] from [AF_INET]46.21.151.106:443: P_CONTROL_V1 kid=0 pid=[ #66 ] [ 30 ] pid=37 DATA len=75
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #65 ] [ 29 ]
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #64 ] [ 28 ]
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #63 ] [ 27 ]
    pid=30 DATA len=34
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #62 ] [ 26 ]
    pid=29 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #61 ] [ 25 ]
    pid=28 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #60 ] [ 24 ]
    pid=27 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #59 ] [ 23 ]
    pid=26 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #58 ] [ 22 ]
    pid=25 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #57 ] [ 21 ]
    pid=24 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #56 ] [ 20 ]
    pid=23 DATA len=100
    Nov 3 18:45:36 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #55 ] [ 19 ]
    pid=22 DATA len=100
    Nov 3 18:45:35 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #54 ] [ 18 ]
    pid=21 DATA len=100
    Nov 3 18:45:35 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #53 ] [ 17 ]
    pid=20 DATA len=100
    pid=19 DATA len=100
    pid=18 DATA len=100
    pid=17 DATA len=100
    Nov 3 18:45:35 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #52 ] [ 13 ]
    pid=13 DATA len=100
    Nov 3 18:45:34 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #51 ] [ 16 ]
    pid=16 DATA len=100
    Nov 3 18:45:34 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #50 ] [ 12 ]
    pid=12 DATA len=100
    Nov 3 18:45:33 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #49 ] [ 15 ]
    pid=15 DATA len=100
    Nov 3 18:45:33 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #48 ] [ 11 ]
    pid=11 DATA len=100
    Nov 3 18:45:32 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #47 ] [ 14 ]
    pid=14 DATA len=100
    Nov 3 18:45:32 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #46 ] [ 10 ]
    pid=10 DATA len=100
    pid=13 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #45 ] [ 9 ]
    pid=12 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #44 ] [ 8 ]
    pid=11 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #43 ] [ 7 ]
    pid=10 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #42 ] [ 6 ]
    pid=9 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #41 ] [ 5 ]
    pid=8 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #40 ] [ 4 ]
    pid=7 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #39 ] [ 3 ]
    pid=6 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 READ [50] from [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #38 ] [ 2 ]
    pid=5 DATA len=100
    pid=4 DATA len=100
    pid=3 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [154] to [AF_INET]46.21.151.106:443: P_CONTROL_V1 kid=0 pid=[ #39 ] [ 36 ] pid=2 DATA len=100
    pid=36 DATA len=23
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #38 ] [ 35 ]
    pid=35 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #37 ] [ 34 ]
    pid=34 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #36 ] [ 33 ]
    pid=33 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #35 ] [ 32 ]
    pid=32 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #34 ] [ 31 ]
    pid=31 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #33 ] [ 30 ]
    pid=30 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #32 ] [ 29 ]
    pid=29 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #31 ] [ 28 ]
    pid=28 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #30 ] [ 27 ]
    pid=27 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #29 ] [ 26 ]
    pid=26 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #28 ] [ 25 ]
    pid=25 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #27 ] [ 24 ]
    pid=24 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #26 ] [ 23 ]
    pid=23 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #25 ] [ 22 ]
    pid=22 DATA len=100
    Nov 3 18:45:30 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #24 ] [ 21 ]
    pid=21 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #23 ] [ 20 ]
    pid=20 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #22 ] [ 19 ]
    pid=19 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #21 ] [ 18 ]
    Nov 3 18:45:29 openvpn[45742]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    Nov 3 18:45:29 openvpn[45742]: VERIFY EKU OK
    Nov 3 18:45:29 openvpn[45742]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    Nov 3 18:45:29 openvpn[45742]: Validating certificate extended key usage
    Nov 3 18:45:29 openvpn[45742]: VERIFY KU OK
    Nov 3 18:45:29 openvpn[45742]: ++ Certificate has key usage 00a0, expects 00a0
    Nov 3 18:45:29 openvpn[45742]: Validating certificate key usage
    Nov 3 18:45:29 openvpn[45742]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    pid=18 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #20 ] [ 17 ]
    pid=17 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #19 ] [ 16 ]
    pid=16 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #18 ] [ 15 ]
    pid=15 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #17 ] [ 14 ]
    pid=14 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #16 ] [ 13 ]
    pid=13 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #15 ] [ 12 ]
    pid=12 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #14 ] [ 11 ]
    pid=11 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #13 ] [ 10 ]
    pid=10 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #12 ] [ 9 ]
    pid=9 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #11 ] [ 8 ]
    pid=8 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #10 ] [ 7 ]
    pid=7 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #9 ] [ 6 ]
    pid=6 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #8 ] [ 5 ]
    pid=5 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #7 ] [ 4 ]
    pid=4 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 ]
    pid=3 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 ]
    pid=2 DATA len=100
    Nov 3 18:45:29 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #4 ] [ 1 ]
    Nov 3 18:45:29 openvpn[45742]: UDPv4 READ [154] from [AF_INET]46.21.151.106:443: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=100
    pid=1 DATA len=95
    Nov 3 18:45:28 openvpn[45742]: UDPv4 WRITE [50] to [AF_INET]46.21.151.106:443: P_ACK_V1 kid=0 pid=[ #2 ] [ 0 ]
    Nov 3 18:45:28 openvpn[45742]: TLS: Initial packet from [AF_INET]46.21.151.106:443, sid=725ebf04 09a52965
    Nov 3 18:45:28 openvpn[45742]: UDPv4 READ [54] from [AF_INET]46.21.151.106:443: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
    pid=0 DATA len=0
    Nov 3 18:45:28 openvpn[45742]: UDPv4 link remote: [AF_INET]46.21.151.106:443
    Nov 3 18:45:28 openvpn[45742]: UDPv4 link local (bound): [AF_INET]174.1.32.200
    Nov 3 18:45:28 openvpn[45742]: Expected Remote Options hash (VER=V4): '162b04de'
    Nov 3 18:45:28 openvpn[45742]: Local Options hash (VER=V4): '9e7066d2'
    Nov 3 18:45:28 openvpn[45742]: Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
    Nov 3 18:45:28 openvpn[45742]: Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
    Nov 3 18:45:28 openvpn[45742]: Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:143 ET:0 EL:3 AF:3/1 ]
    Nov 3 18:45:28 openvpn[45742]: Socket Buffers: R=[42080->65536] S=[57344->65536]
    Nov 3 18:45:28 openvpn[45742]: Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:3 ]
    Nov 3 18:45:28 openvpn[45742]: LZO compression initialized
    Nov 3 18:45:28 openvpn[45742]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Nov 3 18:45:28 openvpn[45742]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Nov 3 18:45:28 openvpn[45742]: Control Channel Authentication: using '/var/etc/openvpn/client1.tls-auth' as a OpenVPN static key file
    Nov 3 18:45:28 openvpn[45742]: NOTE: the current –script-security setting may allow this configuration to call user-defined scripts
    Nov 3 18:45:28 openvpn[45742]: MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1.sock
    Nov 3 18:45:28 openvpn[45471]: library versions: OpenSSL 1.0.1l-freebsd 15 Jan 2015, LZO 2.09
    Nov 3 18:45:28 openvpn[45471]: OpenVPN 2.3.7 amd64-portbld-freebsd10.1 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Jun 19 2015
    Nov 3 18:45:28 openvpn[45471]: auth_user_pass_file = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: pull = ENABLED
    Nov 3 18:45:28 openvpn[45471]: client = ENABLED
    Nov 3 18:45:28 openvpn[45471]: port_share_port = 0
    Nov 3 18:45:28 openvpn[45471]: port_share_host = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: auth_user_pass_verify_script_via_file = DISABLED
    Nov 3 18:45:28 openvpn[45471]: auth_user_pass_verify_script = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: max_routes_per_client = 256
    Nov 3 18:45:28 openvpn[45471]: max_clients = 1024
    Nov 3 18:45:28 openvpn[45471]: cf_per = 0
    Nov 3 18:45:28 openvpn[45471]: cf_max = 0
    Nov 3 18:45:28 openvpn[45471]: duplicate_cn = DISABLED
    Nov 3 18:45:28 openvpn[45471]: enable_c2c = DISABLED
    Nov 3 18:45:28 openvpn[45471]: push_ifconfig_ipv6_remote = ::
    Nov 3 18:45:28 openvpn[45471]: push_ifconfig_ipv6_local = ::/0
    Nov 3 18:45:28 openvpn[45471]: push_ifconfig_ipv6_defined = DISABLED
    Nov 3 18:45:28 openvpn[45471]: push_ifconfig_remote_netmask = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: push_ifconfig_local = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: push_ifconfig_defined = DISABLED
    Nov 3 18:45:28 openvpn[45471]: tmp_dir = '/tmp'
    Nov 3 18:45:28 openvpn[45471]: ccd_exclusive = DISABLED
    Nov 3 18:45:28 openvpn[45471]: client_config_dir = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: client_disconnect_script = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: learn_address_script = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: client_connect_script = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: virtual_hash_size = 256
    Nov 3 18:45:28 openvpn[45471]: real_hash_size = 256
    Nov 3 18:45:28 openvpn[45471]: tcp_queue_limit = 64
    Nov 3 18:45:28 openvpn[45471]: n_bcast_buf = 256
    Nov 3 18:45:28 openvpn[45471]: ifconfig_ipv6_pool_netbits = 0
    Nov 3 18:45:28 openvpn[45471]: ifconfig_ipv6_pool_base = ::
    Nov 3 18:45:28 openvpn[45471]: ifconfig_ipv6_pool_defined = DISABLED
    Nov 3 18:45:28 openvpn[45471]: ifconfig_pool_persist_refresh_freq = 600
    Nov 3 18:45:28 openvpn[45471]: ifconfig_pool_persist_filename = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: ifconfig_pool_netmask = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: ifconfig_pool_end = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: ifconfig_pool_start = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: ifconfig_pool_defined = DISABLED
    Nov 3 18:45:28 openvpn[45471]: server_bridge_pool_end = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: server_bridge_pool_start = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: server_bridge_netmask = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: server_bridge_ip = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: server_netbits_ipv6 = 0
    Nov 3 18:45:28 openvpn[45471]: server_network_ipv6 = ::
    Nov 3 18:45:28 openvpn[45471]: server_netmask = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: server_network = 0.0.0.0
    Nov 3 18:45:28 openvpn[45471]: tls_auth_file = '/var/etc/openvpn/client1.tls-auth'
    Nov 3 18:45:28 openvpn[45471]: tls_exit = DISABLED
    Nov 3 18:45:28 openvpn[45471]: push_peer_info = DISABLED
    Nov 3 18:45:28 openvpn[45471]: single_session = DISABLED
    Nov 3 18:45:28 openvpn[45471]: transition_window = 3600
    Nov 3 18:45:28 openvpn[45471]: handshake_window = 60
    Nov 3 18:45:28 openvpn[45471]: renegotiate_seconds = 3600
    Nov 3 18:45:28 openvpn[45471]: renegotiate_packets = 0
    Nov 3 18:45:28 openvpn[45471]: renegotiate_bytes = 0
    Nov 3 18:45:28 openvpn[45471]: tls_timeout = 2
    Nov 3 18:45:28 openvpn[45471]: ssl_flags = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_eku = 'TLS Web Server Authentication'
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 0
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 136
    Nov 3 18:45:28 openvpn[45471]: remote_cert_ku = 160
    Nov 3 18:45:28 openvpn[45471]: ns_cert_type = 0
    Nov 3 18:45:28 openvpn[45471]: crl_file = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: verify_x509_name = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: verify_x509_type = 0
    Nov 3 18:45:28 openvpn[45471]: tls_export_cert = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: tls_verify = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: cipher_list = 'TLS-DHE-RSA-WITH-AES-256-CBC-SHA'
    Nov 3 18:45:28 openvpn[45471]: pkcs12_file = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: priv_key_file = '/var/etc/openvpn/client1.key'
    Nov 3 18:45:28 openvpn[45471]: cert_file = '/var/etc/openvpn/client1.cert'
    Nov 3 18:45:28 openvpn[45471]: dh_file = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: ca_path = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: ca_file = '/var/etc/openvpn/client1.ca'
    Nov 3 18:45:28 openvpn[45471]: key_method = 2
    Nov 3 18:45:28 openvpn[45471]: tls_client = ENABLED
    Nov 3 18:45:28 openvpn[45471]: tls_server = DISABLED
    Nov 3 18:45:28 openvpn[45471]: test_crypto = DISABLED
    Nov 3 18:45:28 openvpn[45471]: use_iv = ENABLED
    Nov 3 18:45:28 openvpn[45471]: packet_id_file = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: replay_time = 15
    Nov 3 18:45:28 openvpn[45471]: replay_window = 64
    Nov 3 18:45:28 openvpn[45471]: mute_replay_warnings = DISABLED
    Nov 3 18:45:28 openvpn[45471]: replay = ENABLED
    Nov 3 18:45:28 openvpn[45471]: engine = DISABLED
    Nov 3 18:45:28 openvpn[45471]: keysize = 32
    Nov 3 18:45:28 openvpn[45471]: prng_nonce_secret_len = 16
    Nov 3 18:45:28 openvpn[45471]: prng_hash = 'SHA1'
    Nov 3 18:45:28 openvpn[45471]: authname = 'SHA1'
    Nov 3 18:45:28 openvpn[45471]: authname_defined = ENABLED
    Nov 3 18:45:28 openvpn[45471]: ciphername = 'AES-256-CBC'
    Nov 3 18:45:28 openvpn[45471]: ciphername_defined = ENABLED
    Nov 3 18:45:28 openvpn[45471]: key_direction = 2
    Nov 3 18:45:28 openvpn[45471]: shared_secret_file = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: management_flags = 256
    Nov 3 18:45:28 openvpn[45471]: management_client_group = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: management_client_user = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: management_write_peer_info_file = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: management_echo_buffer_size = 100
    Nov 3 18:45:28 openvpn[45471]: management_log_history_cache = 250
    Nov 3 18:45:28 openvpn[45471]: management_user_pass = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: management_port = 0
    Nov 3 18:45:28 openvpn[45471]: management_addr = '/var/etc/openvpn/client1.sock'
    Nov 3 18:45:28 openvpn[45471]: allow_pull_fqdn = DISABLED
    Nov 3 18:45:28 openvpn[45471]: max_routes = 100
    Nov 3 18:45:28 openvpn[45471]: route_gateway_via_dhcp = DISABLED
    Nov 3 18:45:28 openvpn[45471]: route_nopull = ENABLED
    Nov 3 18:45:28 openvpn[45471]: route_delay_defined = DISABLED
    Nov 3 18:45:28 openvpn[45471]: route_delay_window = 30
    Nov 3 18:45:28 openvpn[45471]: route_delay = 0
    Nov 3 18:45:28 openvpn[45471]: route_noexec = DISABLED
    Nov 3 18:45:28 openvpn[45471]: route_default_metric = 0
    Nov 3 18:45:28 openvpn[45471]: route_default_gateway = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: route_script = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: lzo = 1
    Nov 3 18:45:28 openvpn[45471]: fast_io = DISABLED
    Nov 3 18:45:28 openvpn[45471]: sockflags = 0
    Nov 3 18:45:28 openvpn[45471]: sndbuf = 65536
    Nov 3 18:45:28 openvpn[45471]: rcvbuf = 65536
    Nov 3 18:45:28 openvpn[45471]: occ = ENABLED
    Nov 3 18:45:28 openvpn[45471]: status_file_update_freq = 60
    Nov 3 18:45:28 openvpn[45471]: status_file_version = 1
    Nov 3 18:45:28 openvpn[45471]: status_file = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: gremlin = 0
    Nov 3 18:45:28 openvpn[45471]: mute = 0
    Nov 3 18:45:28 openvpn[45471]: verbosity = 6
    Nov 3 18:45:28 openvpn[45471]: nice = 0
    Nov 3 18:45:28 openvpn[45471]: suppress_timestamps = DISABLED
    Nov 3 18:45:28 openvpn[45471]: log = DISABLED
    Nov 3 18:45:28 openvpn[45471]: inetd = 0
    Nov 3 18:45:28 openvpn[45471]: daemon = ENABLED
    Nov 3 18:45:28 openvpn[45471]: up_delay = DISABLED
    Nov 3 18:45:28 openvpn[45471]: up_restart = DISABLED
    Nov 3 18:45:28 openvpn[45471]: down_pre = DISABLED
    Nov 3 18:45:28 openvpn[45471]: down_script = '/usr/local/sbin/ovpn-linkdown'
    Nov 3 18:45:28 openvpn[45471]: up_script = '/usr/local/sbin/ovpn-linkup'
    Nov 3 18:45:28 openvpn[45471]: writepid = '/var/run/openvpn_client1.pid'
    Nov 3 18:45:28 openvpn[45471]: cd_dir = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: chroot_dir = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: groupname = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: username = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: resolve_retry_seconds = 1000000000
    Nov 3 18:45:28 openvpn[45471]: passtos = DISABLED
    Nov 3 18:45:28 openvpn[45471]: persist_key = ENABLED
    Nov 3 18:45:28 openvpn[45471]: persist_remote_ip = DISABLED
    Nov 3 18:45:28 openvpn[45471]: persist_local_ip = DISABLED
    Nov 3 18:45:28 openvpn[45471]: persist_tun = ENABLED
    Nov 3 18:45:28 openvpn[45471]: remap_sigusr1 = 0
    Nov 3 18:45:28 openvpn[45471]: ping_timer_remote = ENABLED
    Nov 3 18:45:28 openvpn[45471]: ping_rec_timeout_action = 2
    Nov 3 18:45:28 openvpn[45471]: ping_rec_timeout = 60
    Nov 3 18:45:28 openvpn[45471]: ping_send_timeout = 10
    Nov 3 18:45:28 openvpn[45471]: inactivity_timeout = 0
    Nov 3 18:45:28 openvpn[45471]: keepalive_timeout = 60
    Nov 3 18:45:28 openvpn[45471]: keepalive_ping = 10
    Nov 3 18:45:28 openvpn[45471]: mlock = DISABLED
    Nov 3 18:45:28 openvpn[45471]: mtu_test = 0
    Nov 3 18:45:28 openvpn[45471]: shaper = 0
    Nov 3 18:45:28 openvpn[45471]: ifconfig_ipv6_remote = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: ifconfig_ipv6_netbits = 0
    Nov 3 18:45:28 openvpn[45471]: ifconfig_ipv6_local = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: ifconfig_nowarn = DISABLED
    Nov 3 18:45:28 openvpn[45471]: ifconfig_noexec = DISABLED
    Nov 3 18:45:28 openvpn[45471]: ifconfig_remote_netmask = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: ifconfig_local = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: tun_ipv6 = ENABLED
    Nov 3 18:45:28 openvpn[45471]: topology = 1
    Nov 3 18:45:28 openvpn[45471]: lladdr = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: dev_node = '/dev/tun1'
    Nov 3 18:45:28 openvpn[45471]: dev_type = 'tun'
    Nov 3 18:45:28 openvpn[45471]: dev = 'ovpnc1'
    Nov 3 18:45:28 openvpn[45471]: ipchange = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: remote_random = DISABLED
    Nov 3 18:45:28 openvpn[45471]: Connection profiles END
    Nov 3 18:45:28 openvpn[45471]: explicit_exit_notification = 5
    Nov 3 18:45:28 openvpn[45471]: mssfix = 1450
    Nov 3 18:45:28 openvpn[45471]: fragment = 0
    Nov 3 18:45:28 openvpn[45471]: mtu_discover_type = -1
    Nov 3 18:45:28 openvpn[45471]: tun_mtu_extra_defined = DISABLED
    Nov 3 18:45:28 openvpn[45471]: tun_mtu_extra = 0
    Nov 3 18:45:28 openvpn[45471]: link_mtu_defined = DISABLED
    Nov 3 18:45:28 openvpn[45471]: link_mtu = 1500
    Nov 3 18:45:28 openvpn[45471]: tun_mtu_defined = ENABLED
    Nov 3 18:45:28 openvpn[45471]: tun_mtu = 1500
    Nov 3 18:45:28 openvpn[45471]: socks_proxy_retry = DISABLED
    Nov 3 18:45:28 openvpn[45471]: socks_proxy_port = 0
    Nov 3 18:45:28 openvpn[45471]: socks_proxy_server = '[UNDEF]'
    Nov 3 18:45:28 openvpn[45471]: connect_retry_max = 0
    Nov 3 18:45:28 openvpn[45471]: connect_timeout = 10
    Nov 3 18:45:28 openvpn[45471]: connect_retry_seconds = 5
    Nov 3 18:45:28 openvpn[45471]: bind_local = ENABLED
    Nov 3 18:45:28 openvpn[45471]: bind_defined = DISABLED
    Nov 3 18:45:28 openvpn[45471]: remote_float = DISABLED
    Nov 3 18:45:28 openvpn[45471]: remote_port = 443
    Nov 3 18:45:28 openvpn[45471]: remote = '46.21.151.106'
    Nov 3 18:45:28 openvpn[45471]: local_port = 0
    Nov 3 18:45:28 openvpn[45471]: local = '174.1.32.200'
    Nov 3 18:45:28 openvpn[45471]: proto = udp
    Nov 3 18:45:28 openvpn[45471]: Connection profiles [default]:
    Nov 3 18:45:28 openvpn[45471]: show_tls_ciphers = DISABLED

  • PIA disconnecting

    5
    0 Votes
    5 Posts
    2k Views
    U

    I followed the PIA OpenVPN tutorial in this forum.  I think it should be from pfsense which takes it from my router, no?

  • Road Warrior in China (ugly VPN)

    12
    0 Votes
    12 Posts
    3k Views
    jimpJ

    @NOYB:

    And yet it is in the bogons list.

    Because it's not a routable network from the Internet and you should never see inbound traffic from it. Not because it should never be seen on an interface.

    It is a valid destination it is not a valid source.

  • How to use multiple servers with same username in Microsoft cert store?

    1
    0 Votes
    1 Posts
    627 Views
    No one has replied
  • Access OpenVPN remote network from LAN

    4
    0 Votes
    4 Posts
    1k Views
    V

    You will either need to add a static route to your VPN server to direct packets with destination inside your LAN 192.168.100.0/24 to the VPN clients IP or you do NAT and add an outbound NAT rule to translate the source address to interface address at VPN interface.

  • OpenVpn routing

    6
    0 Votes
    6 Posts
    1k Views
    N

    Thank you for your hekp, it's working :)

  • Using VPN on your home network

    7
    0 Votes
    7 Posts
    2k Views
    N

    @johnpoz:

    Well yeah there are databases with wifi networks locations https://wigle.net/ comes to mind.

    And yeah smart phones all have GPSes – so they are always phoning home their actual location..  And most likely reporting what networks they are on as well for wifi.. They got in a lot of shit about it a few years ago..  All of them were doing it google, microsoft, apple - most likely they still are.

    So do you have your wifi gps turned off, what about your car nav system and onstar/bluelink - that has your exact location for 911 reasons if your in an accident, etc..  Do you have that all turned off.. If not - big brother knows where your at all the time!!

    Do you wear a mask when you go out - all the camera's doing facial recognition and tracking your movements.

    Those are different issue than with web site tracking.

    Furthermore the philosophy of can't turn it all off so not point in turning any of it off may be valid but certainly still doing as much as possible to limit information is also valid and even beneficial.

  • 0 Votes
    16 Posts
    5k Views
    johnpozJ

    True as I stated I thought it was same poster when first read it.. My bad…

  • Is OpenVPN tunnel symmetric or asymmetric?

    5
    0 Votes
    5 Posts
    2k Views
    DerelictD

    Nothing to do with OpenVPN. A site can only send at its max upload speed no matter what you're using.

  • OpenVPN WAN cannot reach LAN

    8
    0 Votes
    8 Posts
    1k Views
    M

    viragomann , the NAT as you asked me to do works.

    You are my rockstar!

    Thanks so much !

  • Problem connecting to server - Server poll timeout

    1
    0 Votes
    1 Posts
    4k Views
    No one has replied
  • OPENVPN TAP

    3
    0 Votes
    3 Posts
    1k Views
    E

    Is there nobody who can help me out? :-[

  • OpenVPN Client Export Utility does not show new user from new ca.

    2
    0 Votes
    2 Posts
    767 Views
    DerelictD

    It only shows users that have certificates created using the same CA the OpenVPN server is configured to use as its Peer Certificate Authority.

  • Welcome Dialog on logins

    1
    0 Votes
    1 Posts
    491 Views
    No one has replied
  • PFsense 2.2.4 Drops openvpn connections, does not allow reconnect

    2
    0 Votes
    2 Posts
    619 Views
    C

    If you're not getting anything in the OpenVPN logs, nothing is reaching that system. Given CARP failover or a reboot fixes temporarily, either an IP or MAC conflict is almost certainly the cause. MAC conflict where some other system has the same VHID as that CARP IP (or VRRP VRID, same virtual MAC scheme).

  • 0 Votes
    5 Posts
    1k Views
    ?

    @LAR

    I also have recently setup pfSense with PIA and been wanting to use stronger encryption.

    I found a note about changing the port to 1196 to get AES-128-CBC to work (SHA only, not SHA256).  Which is the most I've been able to get beyond the weak defaults.  I tried other ports to try to get AES-256-CBC, but no luck.

    Unfortunately after much digging I found a few obscure forum posts that indicated that to get SHA256, or a cert higher than 2048, you need to use PIA's patched client. (Anyone that has more or different info, would be appreciated.)

    This should just be a matter of changing standard client settings, and should not need a special patched client.  So I'm a bit disappointed with PIA and their default to weak encryption and the need for a  patched client to get what should be common high encryption standards to work with common OpenVPN clients.

  • OpenVPN OSX nightmare

    7
    0 Votes
    7 Posts
    2k Views
    J

    Are you accessing them from the same location? IE are the mac and the pc on the same network attempting to reach the VPN server.

    Is the mac being pushed the proper route to get to your remote IP range? I use Viscosity everyday connecting to multiple installs of PFsense without issue, it does work well once it is setup properly.

  • Want a hostname to resolve to an IP over a openvpn, please help.

    17
    0 Votes
    17 Posts
    6k Views
    E

    I figured it out. Missed one small thing the whole time. You MUST use DNS Forwarder (I tried dns resolver but had no luck, and in the domain overrides section there is no source ip), so what I did was on kenansville.local pfsense, I added host override of realestate.kenansville.local to 192.168.2.2 and under domain override I added kenansville.local with ip 192.168.2.1@192.168.1.1 and that works perfectly :) I hope it doesn't mess up any resolving of pc's on the kenansville network though. I have no way to test that at this moment.

    Not sure why there was a DNS request time out in this nslookup but here is the report below:

    Here is a current nslookup and ping:

    C:\Windows\system32>nslookup realestate
    Server:  router.kenansville.local
    Address:  192.168.1.1

    DNS request timed out.
        timeout was 2 seconds.
    Name:    realestate.kenansville.local
    Address:  192.168.2.2

    C:\Windows\system32>ping realestate

    Pinging realestate.kenansville.local [192.168.2.2] with 32 bytes of data:
    Reply from 192.168.2.2: bytes=32 time=103ms TTL=126
    Reply from 192.168.2.2: bytes=32 time=106ms TTL=126
    Reply from 192.168.2.2: bytes=32 time=113ms TTL=126
    Reply from 192.168.2.2: bytes=32 time=109ms TTL=126

    Ping statistics for 192.168.2.2:
        Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
    Approximate round trip times in milli-seconds:
        Minimum = 103ms, Maximum = 113ms, Average = 107ms

  • Pinging across the VPN, how to?

    3
    0 Votes
    3 Posts
    888 Views
    H

    fill in a gateway in the AP's settings.

    if you are using a home-router as AP, then you most likely can not fill in a gateway for its lan-interface  :(

  • Openvpn "hanshake failed"

    2
    0 Votes
    2 Posts
    828 Views
    D

    Welcome to pfSense.

    The fact that you get "handshake failed" means the client is at least trying to connect which is a good sign.

    In order to help you with your setup, we'll need more information about your setup:

    What type of OpenVPN connection are you using - site to site or remote access ?
    What type of authentication are you using - PKI, PKI + Auth, Shared Key?

    What device is trying to connect as a client?

Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.