I have only used the client in the openvpn app
Unfortunately, this does not work on TV. You need to install VPN on the router.
oh ok starting to understand ![]()
Do an interface restart and check the logs for error messages. Also you should not bridge anything, as you were showing here.
service openvpn restart
logread -e openvpn
root@pwms:~# service openvpn restart
root@pwms:~# logread -e openvpn
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=bdc3cd88 653f940f
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:41:16 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:42:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:42:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 12:42:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 12:42:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 12:42:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 80 second(s)
Sun Sep 22 12:43:37 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=64b6bf93 dcbfda6a
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:43:37 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:44:37 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:44:37 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 12:44:37 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 12:44:37 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 12:44:37 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 160 second(s)
Sun Sep 22 12:47:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=26564bc0 ce16b1d3
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:47:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:48:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:48:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 12:48:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 12:48:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 12:48:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 12:50:54 2024 daemon.err uhttpd[1667]: [info] luci: accepted login on /admin/vpn/openvpn for root from 192.168.2.206
Sun Sep 22 12:53:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=75406c60 4368320d
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:54:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:54:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 12:54:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 12:54:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 12:54:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 12:59:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=dce4fca3 4e3b82d2
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 12:59:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:00:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:00:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:00:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:00:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:00:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:05:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=86f48b05 b982f354
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:05:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:06:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:06:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:06:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:06:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:06:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:11:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=65007c70 2fd5f250
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:11:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:12:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:12:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:12:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:12:17 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:12:17 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:17:17 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=79d3a40c 3e8d9ec4
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:17:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:18:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:18:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:18:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:18:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:18:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:23:18 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=377b4918 ed48ad0a
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:23:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:24:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:24:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:24:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:24:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:24:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:29:18 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=e17884ee b1be97ef
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:29:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:30:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:30:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:30:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:30:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:30:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:35:18 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=98badc87 81b63928
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:35:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:36:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:36:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:36:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:36:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:36:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:41:18 2024 daemon.warn openvpn(ca)[18980]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Re-using SSL/TLS context
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: UDP link local: (not bound)
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=26eda2f7 fc8eca6b
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY KU OK
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: Validating certificate extended key usage
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY EKU OK
Sun Sep 22 13:41:18 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:42:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:42:18 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Sun Sep 22 13:42:18 2024 daemon.notice openvpn(ca)[18980]: TCP/UDP: Closing socket
Sun Sep 22 13:42:18 2024 daemon.notice openvpn(ca)[18980]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:42:18 2024 daemon.notice openvpn(ca)[18980]: Restart pause, 300 second(s)
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[18980]: SIGTERM[hard,init_instance] received, process exiting
Sun Sep 22 13:43:13 2024 daemon.warn openvpn(ca)[3907]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: OpenVPN 2.5.8 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: library versions: OpenSSL 3.0.15 3 Sep 2024, LZO 2.10
Sun Sep 22 13:43:13 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:43:13 2024 daemon.warn openvpn(ca)[3907]: WARNING: Your certificate has expired!
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:43:13 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=5f38a3a0 2673ef5c
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:43:14 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:44:13 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:44:13 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS handshake failed
Sun Sep 22 13:44:13 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:44:13 2024 daemon.notice openvpn(ca)[3907]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:44:13 2024 daemon.notice openvpn(ca)[3907]: Restart pause, 5 second(s)
Sun Sep 22 13:44:18 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Re-using SSL/TLS context
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:44:18 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=24301dd5 42542fa2
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:44:19 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:45:18 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:45:18 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS handshake failed
Sun Sep 22 13:45:18 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:45:18 2024 daemon.notice openvpn(ca)[3907]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:45:18 2024 daemon.notice openvpn(ca)[3907]: Restart pause, 5 second(s)
Sun Sep 22 13:45:23 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Re-using SSL/TLS context
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=0ab8532c e762135e
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:45:23 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:46:23 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:46:23 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS handshake failed
Sun Sep 22 13:46:23 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:46:23 2024 daemon.notice openvpn(ca)[3907]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:46:23 2024 daemon.notice openvpn(ca)[3907]: Restart pause, 5 second(s)
Sun Sep 22 13:46:28 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Re-using SSL/TLS context
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=a1a6325a d63421db
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:46:28 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:47:28 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 13:47:28 2024 daemon.err openvpn(ca)[3907]: TLS Error: TLS handshake failed
Sun Sep 22 13:47:28 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:47:28 2024 daemon.notice openvpn(ca)[3907]: SIGUSR1[soft,tls-error] received, process restarting
Sun Sep 22 13:47:28 2024 daemon.notice openvpn(ca)[3907]: Restart pause, 5 second(s)
Sun Sep 22 13:47:33 2024 daemon.warn openvpn(ca)[3907]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Re-using SSL/TLS context
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: UDP link local: (not bound)
Sun Sep 22 13:47:33 2024 daemon.notice openvpn(ca)[3907]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=3a6328a8 cbfb56d1
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: VERIFY KU OK
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: Validating certificate extended key usage
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: VERIFY EKU OK
Sun Sep 22 13:47:34 2024 daemon.notice openvpn(ca)[3907]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 13:48:03 2024 daemon.err openvpn(ca)[3907]: event_wait : Interrupted system call (code=4)
Sun Sep 22 13:48:03 2024 daemon.notice openvpn(ca)[3907]: SIGTERM received, sending exit notification to peer
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[3907]: TCP/UDP: Closing socket
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[3907]: SIGTERM[soft,exit-with-notification] received, process exiting
Sun Sep 22 13:48:04 2024 daemon.warn openvpn(ca)[6190]: DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: OpenVPN 2.5.8 mipsel-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: library versions: OpenSSL 3.0.15 3 Sep 2024, LZO 2.10
Sun Sep 22 13:48:04 2024 daemon.warn openvpn(ca)[6190]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 22 13:48:04 2024 daemon.warn openvpn(ca)[6190]: WARNING: Your certificate has expired!
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: TCP/UDP: Preserving recently used remote address: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Socket Buffers: R=[180224->360448] S=[180224->360448]
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: UDP link local: (not bound)
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: UDP link remote: [AF_INET]92.243.64.175:58340
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: TLS: Initial packet from [AF_INET]92.243.64.175:58340, sid=eda8784a 3a6df091
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: VERIFY KU OK
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: Validating certificate extended key usage
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: VERIFY EKU OK
Sun Sep 22 13:48:04 2024 daemon.notice openvpn(ca)[6190]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
I don't understand much about this, but there are some mistakes when shaking hands.
Did you check for a new version of the .ovpn file
if you are trying to use one for an older OpenVPN it may not work now
Yes, basically there is a timeout due to inactivity as you can see in the timestamps.
Sun Sep 22 12:53:17 2024 daemon.notice openvpn(ca)[18980]: VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
Sun Sep 22 12:54:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Sep 22 12:54:17 2024 daemon.err openvpn(ca)[18980]: TLS Error: TLS handshake failed
Are you able to ping the server?
ping -c5 92.243.64.175
root@pwms:~# ping -c5 92.243.64.175
PING 92.243.64.175 (92.243.64.175): 56 data bytes
64 bytes from 92.243.64.175: seq=0 ttl=51 time=129.976 ms
64 bytes from 92.243.64.175: seq=1 ttl=51 time=122.550 ms
64 bytes from 92.243.64.175: seq=2 ttl=51 time=122.614 ms
64 bytes from 92.243.64.175: seq=3 ttl=51 time=122.895 ms
64 bytes from 92.243.64.175: seq=4 ttl=51 time=120.776 ms
--- 92.243.64.175 ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 120.776/123.762/129.976 ms
did you get it to work ?
did you install the " openvpn-mbedtls" ?
since you have a tls error
I did try to get something here working as an experiment
but i ended up using relayd like a wifi connection
this was on a 2nd router just to do vpn tho
Can you try to connect using this configuration file from another system? Windows, linux, android...
This actually usually means you cannot reach the server, so a network connection error, however it is also seen very early in the handshake process e.g. if your tls-crypt key is wrong (and the log indicates you are using a tls-crypt key)
Set everything up again. Chose another VPN. Tun0 appeared. The channel started working. Thanks for your help.