Tun interface and openvpn

I have only used the client in the openvpn app

Unfortunately, this does not work on TV. You need to install VPN on the router.

oh ok starting to understand :slight_smile:

Do an interface restart and check the logs for error messages. Also you should not bridge anything, as you were showing here.

service openvpn restart
logread -e openvpn
1 Like
root@pwms:~# service openvpn restart
root@pwms:~# logread -e openvpn
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=bdc3cd88 653f940f
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:42:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:42:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 12:42:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 12:42:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 12:42:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 80 second(s)
Sun Sep 22 12:43:37 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=64b6bf93 dcbfda6a
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:44:37 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:44:37 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 12:44:37 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 12:44:37 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 12:44:37 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 160 second(s)
Sun Sep 22 12:47:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=26564bc0 ce16b1d3
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:48:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:48:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 12:48:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 12:48:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 12:48:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 12:50:54 2024 daemon.err uhttpd[1667]: [info] luci: accepted login on /admin/vpn/openvpn for root from 192.168.2.206
Sun Sep 22 12:53:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=75406c60 4368320d
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:54:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:54:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 12:54:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 12:54:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 12:54:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 12:59:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=dce4fca3 4e3b82d2
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:00:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:00:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:00:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:00:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:00:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:05:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=86f48b05 b982f354
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:06:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:06:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:06:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:06:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:06:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:11:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=65007c70 2fd5f250
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:12:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:12:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:12:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:12:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:12:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:17:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=79d3a40c 3e8d9ec4
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:18:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:18:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:18:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:18:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:18:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:23:18 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=377b4918 ed48ad0a
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:24:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:24:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:24:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:24:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:24:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:29:18 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=e17884ee b1be97ef
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:30:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:30:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:30:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:30:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:30:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:35:18 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=98badc87 81b63928
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:36:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:36:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:36:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:36:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:36:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:41:18 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=26eda2f7 fc8eca6b
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:42:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:42:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:42:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:42:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:42:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[18980]: SIGTERM[hard,init_instance] received, process exiting
Sun Sep 22 13:43:13 2024 daemon.warn openvpn(ca)[3907]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: OpenVPN 2.5.8 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: library versions: OpenSSL 3.0.15 3 Sep 2024, LZO 2.10
Sun Sep 22 13:43:13 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:43:13 2024 daemon.warn openvpn(ca)[3907]: WARNING: Your certificate has expired!
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=5f38a3a0 2673ef5c
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:44:13 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:44:13 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS handshake failed
Sun Sep 22 13:44:13 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:44:13 2024 daemon.notice openvpn(ca)[3907]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:44:13 2024 daemon.notice openvpn(ca)[3907]: Restart pause, 5 second(s)
Sun Sep 22 13:44:18 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Re-using SSL/TLS context
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=24301dd5 42542fa2
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:45:18 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:45:18 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS handshake failed
Sun Sep 22 13:45:18 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:45:18 2024 daemon.notice openvpn(ca)[3907]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:45:18 2024 daemon.notice openvpn(ca)[3907]: Restart pause, 5 second(s)
Sun Sep 22 13:45:23 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Re-using SSL/TLS context
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=0ab8532c e762135e
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:46:23 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:46:23 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS handshake failed
Sun Sep 22 13:46:23 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:46:23 2024 daemon.notice openvpn(ca)[3907]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:46:23 2024 daemon.notice openvpn(ca)[3907]: Restart pause, 5 second(s)
Sun Sep 22 13:46:28 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Re-using SSL/TLS context
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=a1a6325a d63421db
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:47:28 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:47:28 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS handshake failed
Sun Sep 22 13:47:28 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:47:28 2024 daemon.notice openvpn(ca)[3907]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:47:28 2024 daemon.notice openvpn(ca)[3907]: Restart pause, 5 second(s)
Sun Sep 22 13:47:33 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Re-using SSL/TLS context
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=3a6328a8 cbfb56d1
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:48:03 2024 daemon.err openvpn(ca)[3907]: event_wait : Interrupted system call (code=4)
Sun Sep 22 13:48:03 2024 daemon.notice openvpn(ca)[3907]: SIGTERM received, sending exit notification to peer
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[3907]: SIGTERM[soft,exit-with-notification] received, process exiting
Sun Sep 22 13:48:04 2024 daemon.warn openvpn(ca)[6190]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: OpenVPN 2.5.8 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: library versions: OpenSSL 3.0.15 3 Sep 2024, LZO 2.10
Sun Sep 22 13:48:04 2024 daemon.warn openvpn(ca)[6190]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:48:04 2024 daemon.warn openvpn(ca)[6190]: WARNING: Your certificate has expired!
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: UDP link local: (not bound)
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=eda8784a 3a6df091
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: VERIFY KU OK
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Validating certificate extended key usage
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: VERIFY EKU OK
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru

I don't understand much about this, but there are some mistakes when shaking hands.

Did you check for a new version of the .ovpn file
if you are trying to use one for an older OpenVPN it may not work now

Yes, basically there is a timeout due to inactivity as you can see in the timestamps.

Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:54:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:54:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed

Are you able to ping the server?
ping -c5 92.243.64.175

root@pwms:~# ping -c5 92.243.64.175
PING 92.243.64.175 (92.243.64.175): 56 data bytes
64 bytes from 92.243.64.175: seq=0 ttl=51 time=129.976 ms
64 bytes from 92.243.64.175: seq=1 ttl=51 time=122.550 ms
64 bytes from 92.243.64.175: seq=2 ttl=51 time=122.614 ms
64 bytes from 92.243.64.175: seq=3 ttl=51 time=122.895 ms
64 bytes from 92.243.64.175: seq=4 ttl=51 time=120.776 ms

--- 92.243.64.175 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 120.776/123.762/129.976 ms

did you get it to work ?
did you install the " openvpn-mbedtls" ?
since you have a tls error

I did try to get something here working as an experiment
but i ended up using relayd like a wifi connection
this was on a 2nd router just to do vpn tho

Can you try to connect using this configuration file from another system? Windows, linux, android...

1 Like

This actually usually means you cannot reach the server, so a network connection error, however it is also seen very early in the handshake process e.g. if your tls-crypt key is wrong (and the log indicates you are using a tls-crypt key)

Set everything up again. Chose another VPN. Tun0 appeared. The channel started working. Thanks for your help.

2 Likes