1
|
Dec 12 19:16:51 openvpn 6919 Connection reset command was pushed by server ('')
|
2
|
Dec 12 19:16:51 openvpn 6919 TCP/UDP: Closing socket
|
3
|
Dec 12 19:16:51 openvpn 6919 SIGUSR1[soft,server-pushed-connection-reset] received, process restarting
|
4
|
Dec 12 19:16:51 openvpn 6919 Restart pause, 10 second(s)
|
5
|
Dec 12 19:17:01 openvpn 6919 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
|
6
|
Dec 12 19:17:01 openvpn 6919 Re-using SSL/TLS context
|
7
|
Dec 12 19:17:01 openvpn 6919 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
|
8
|
Dec 12 19:17:01 openvpn 6919 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
|
9
|
Dec 12 19:17:01 openvpn 6919 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
|
10
|
Dec 12 19:17:01 openvpn 6919 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
|
11
|
Dec 12 19:17:01 openvpn 6919 TCP/UDP: Preserving recently used remote address: [AF_INET]172.21.16.26:11984
|
12
|
Dec 12 19:17:01 openvpn 6919 Socket Buffers: R=[42080->42080] S=[57344->57344]
|
13
|
Dec 12 19:17:01 openvpn 6919 UDPv4 link local (bound): [AF_INET]172.21.16.22:0
|
14
|
Dec 12 19:17:01 openvpn 6919 UDPv4 link remote: [AF_INET]172.21.16.26:11984
|
15
|
Dec 12 19:17:01 openvpn 6919 TLS: Initial packet from [AF_INET]172.21.16.26:11984, sid=651e144f 5f4e7bf4
|
16
|
Dec 12 19:17:01 openvpn 6919 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=OpenVPN_Server_1, C=GB, L=London, O=Home
|
17
|
Dec 12 19:17:01 openvpn 6919 VERIFY WARNING: depth=1, unable to get certificate CRL: CN=OpenVPN_CA, C=GB, L=London, O=Home
|
18
|
Dec 12 19:17:01 openvpn 6919 VERIFY OK: depth=1, CN=OpenVPN_CA, C=GB, L=London, O=Home
|
19
|
Dec 12 19:17:01 openvpn 6919 VERIFY KU OK
|
20
|
Dec 12 19:17:01 openvpn 6919 Validating certificate extended key usage
|
21
|
Dec 12 19:17:01 openvpn 6919 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
|
22
|
Dec 12 19:17:01 openvpn 6919 VERIFY EKU OK
|
23
|
Dec 12 19:17:01 openvpn 6919 VERIFY X509NAME OK: CN=OpenVPN_Server_1, C=GB, L=London, O=Home
|
24
|
Dec 12 19:17:01 openvpn 6919 VERIFY OK: depth=0, CN=OpenVPN_Server_1, C=GB, L=London, O=Home
|
25
|
Dec 12 19:17:01 openvpn 6919 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
|
26
|
Dec 12 19:17:01 openvpn 6919 [OpenVPN_Server_1] Peer Connection Initiated with [AF_INET]172.21.16.26:11984
|
27
|
Dec 12 19:17:01 openvpn 6919 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
|
28
|
Dec 12 19:17:01 openvpn 6919 TLS: tls_multi_process: initial untrusted session promoted to trusted
|
29
|
Dec 12 19:17:02 openvpn 6919 SENT CONTROL [OpenVPN_Server_1]: 'PUSH_REQUEST' (status=1)
|
30
|
Dec 12 19:17:02 openvpn 6919 PUSH: Received control message: 'PUSH_REPLY,route 192.168.167.0 255.255.255.0,route 10.0.100.0 255.255.255.0,route 10.0.101.0 255.255.255.0,route 10.0.102.0 255.255.255.0,route 10.1.100.0 255.255.255.0,route 10.2.100.0 255.255.255.0,route-gateway 10.1.9.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.1.9.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500'
|
31
|
Dec 12 19:17:02 openvpn 6919 OPTIONS IMPORT: --ifconfig/up options modified
|
32
|
Dec 12 19:17:02 openvpn 6919 OPTIONS IMPORT: route options modified
|
33
|
Dec 12 19:17:02 openvpn 6919 OPTIONS IMPORT: route-related options modified
|
34
|
Dec 12 19:17:02 openvpn 6919 OPTIONS IMPORT: tun-mtu set to 1500
|
35
|
Dec 12 19:17:02 openvpn 6919 Preserving previous TUN/TAP instance: ovpnc2
|
36
|
Dec 12 19:17:02 openvpn 6919 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
|
37
|
Dec 12 19:17:02 openvpn 6919 Outgoing dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
|
38
|
Dec 12 19:17:02 openvpn 6919 Outgoing dynamic tls-crypt: Using 256 bit message hash 'SHA256' for HMAC authentication
|
39
|
Dec 12 19:17:02 openvpn 6919 Incoming dynamic tls-crypt: Cipher 'AES-256-CTR' initialized with 256 bit key
|
40
|
Dec 12 19:17:02 openvpn 6919 Incoming dynamic tls-crypt: Using 256 bit message hash 'SHA256' for HMAC authentication
|
41
|
Dec 12 19:17:02 openvpn 6919 Failed to set key: No such file or directory (errno=2)
|
42
|
Dec 12 19:17:02 openvpn 6919 Exiting due to fatal error
|
43
|
Dec 12 19:17:02 openvpn 6919 /sbin/route delete -net 192.168.167.0 10.1.9.1 255.255.255.0
|
44
|
Dec 12 19:17:02 openvpn 6919 /sbin/route delete -net 10.0.100.0 10.1.9.1 255.255.255.0
|
45
|
Dec 12 19:17:03 openvpn 6919 /sbin/route delete -net 10.0.101.0 10.1.9.1 255.255.255.0
|
46
|
Dec 12 19:17:03 openvpn 6919 /sbin/route delete -net 10.0.102.0 10.1.9.1 255.255.255.0
|
47
|
Dec 12 19:17:03 openvpn 6919 /sbin/route delete -net 10.1.100.0 10.1.9.1 255.255.255.0
|
48
|
Dec 12 19:17:03 openvpn 6919 /sbin/route delete -net 10.2.100.0 10.1.9.1 255.255.255.0
|
49
|
Dec 12 19:17:03 openvpn 6919 Closing DCO interface
|
50
|
Dec 12 19:17:03 openvpn 6919 /sbin/ifconfig ovpnc2 10.1.9.2 -alias
|
51
|
Dec 12 19:17:03 openvpn 6919 /sbin/ifconfig ovpnc2 destroy
|
52
|
Dec 12 19:17:03 openvpn 6919 /usr/local/sbin/ovpn-linkdown ovpnc2 1500 0 10.1.9.2 255.255.255.0 init
|
53
|
Dec 12 19:17:03 openvpn 21723 Flushing states on OpenVPN interface ovpnc2 (Link Down)
|