OpenVPN Logs

2025-12-06 13:42:48 45.131.35.210:59035 peer info: IV_SSO=openurl,webauth,crtext
2025-12-06 13:42:48 45.131.35.210:59035 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-06 13:42:48 45.131.35.210:59035 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-06 13:42:48 45.131.35.210:59035 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-06 13:42:48 45.131.35.210:59035 [test1] Peer Connection Initiated with [AF_INET]45.131.35.210:59035
2025-12-06 13:42:48 test1/45.131.35.210:59035 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2025-12-06 13:42:48 test1/45.131.35.210:59035 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_21d738c34f823b5d2d3feda7bb5d0f71.tmp
2025-12-06 13:42:48 test1/45.131.35.210:59035 MULTI: Learn: 10.8.0.2 -> test1/45.131.35.210:59035
2025-12-06 13:42:48 test1/45.131.35.210:59035 MULTI: primary virtual IP for test1/45.131.35.210:59035: 10.8.0.2
2025-12-06 13:42:48 test1/45.131.35.210:59035 SENT CONTROL [test1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-06 13:42:49 test1/45.131.35.210:59035 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-06 13:42:49 test1/45.131.35.210:59035 Timers: ping 10, ping-restart 240
2025-12-06 13:42:49 test1/45.131.35.210:59035 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-06 13:43:16 event_wait : Interrupted system call (fd=-1,code=4)
2025-12-06 13:43:16 SENT CONTROL [test1]: 'RESTART' (status=1)
2025-12-06 13:43:17 MULTI: Connection attempt from 45.131.35.210:50073 ignored while server is shutting down
2025-12-06 13:43:18 Closing TUN/TAP interface
2025-12-06 13:43:18 net_addr_v4_del: 10.8.0.1 dev tun0
2025-12-06 13:43:18 SIGTERM[hard,] received, process exiting
2025-12-06 13:43:18 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2025-12-06 13:43:18 Note: Kernel support for ovpn-dco missing, disabling data channel offload.
2025-12-06 13:43:18 OpenVPN 2.6.14 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2025-12-06 13:43:18 library versions: OpenSSL 3.0.13 30 Jan 2024, LZO 2.10
2025-12-06 13:43:18 DCO version: N/A
2025-12-06 13:43:18 MANAGEMENT: unix domain socket listening on /run/openvpn/server.sock
2025-12-06 13:43:18 net_route_v4_best_gw query: dst 0.0.0.0
2025-12-06 13:43:18 net_route_v4_best_gw result: via 172.31.1.1 dev eth0
2025-12-06 13:43:18 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-12-06 13:43:18 Diffie-Hellman initialized with 2048 bit key
2025-12-06 13:43:18 CRL: loaded 1 CRLs from file crl.pem
2025-12-06 13:43:18 TUN/TAP device tun0 opened
2025-12-06 13:43:18 net_iface_mtu_set: mtu 1500 for tun0
2025-12-06 13:43:18 net_iface_up: set tun0 up
2025-12-06 13:43:18 net_addr_v4_add: 10.8.0.1/24 dev tun0
2025-12-06 13:43:18 Could not determine IPv4/IPv6 protocol. Using AF_INET
2025-12-06 13:43:18 Socket Buffers: R=[212992->212992] S=[212992->212992]
2025-12-06 13:43:18 UDPv4 link local (bound): [AF_INET]46.224.43.71:1194
2025-12-06 13:43:18 UDPv4 link remote: [AF_UNSPEC]
2025-12-06 13:43:18 UID set to nobody
2025-12-06 13:43:18 GID set to nogroup
2025-12-06 13:43:18 Capabilities retained: CAP_NET_ADMIN
2025-12-06 13:43:18 MULTI: multi_init called, r=256 v=256
2025-12-06 13:43:18 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2025-12-06 13:43:18 ifconfig_pool_read(), in='test1,10.8.0.2,'
2025-12-06 13:43:18 succeeded -> ifconfig_pool_set(hand=0)
2025-12-06 13:43:18 IFCONFIG POOL LIST
2025-12-06 13:43:18 test1,10.8.0.2,
2025-12-06 13:43:18 Initialization Sequence Completed
2025-12-06 13:43:19 45.131.35.210:50073 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-06 13:43:19 45.131.35.210:50073 VERIFY OK: depth=0, CN=test1
2025-12-06 13:43:19 45.131.35.210:50073 peer info: IV_VER=2.6.14
2025-12-06 13:43:19 45.131.35.210:50073 peer info: IV_PLAT=win
2025-12-06 13:43:19 45.131.35.210:50073 peer info: IV_TCPNL=1
2025-12-06 13:43:19 45.131.35.210:50073 peer info: IV_MTU=1600
2025-12-06 13:43:19 45.131.35.210:50073 peer info: IV_NCP=2
2025-12-06 13:43:19 45.131.35.210:50073 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-06 13:43:19 45.131.35.210:50073 peer info: IV_PROTO=990
2025-12-06 13:43:19 45.131.35.210:50073 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-06 13:43:19 45.131.35.210:50073 peer info: IV_SSO=openurl,webauth,crtext
2025-12-06 13:43:19 45.131.35.210:50073 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-06 13:43:19 45.131.35.210:50073 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-06 13:43:19 45.131.35.210:50073 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-06 13:43:19 45.131.35.210:50073 [test1] Peer Connection Initiated with [AF_INET]45.131.35.210:50073
2025-12-06 13:43:19 test1/45.131.35.210:50073 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2025-12-06 13:43:19 test1/45.131.35.210:50073 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_4e68a274d29925ba1852f0ec509f17ef.tmp
2025-12-06 13:43:19 test1/45.131.35.210:50073 MULTI: Learn: 10.8.0.2 -> test1/45.131.35.210:50073
2025-12-06 13:43:19 test1/45.131.35.210:50073 MULTI: primary virtual IP for test1/45.131.35.210:50073: 10.8.0.2
2025-12-06 13:43:19 test1/45.131.35.210:50073 SENT CONTROL [test1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-06 13:43:20 test1/45.131.35.210:50073 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-06 13:43:20 test1/45.131.35.210:50073 Timers: ping 10, ping-restart 240
2025-12-06 13:43:20 test1/45.131.35.210:50073 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-06 13:43:29 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 13:43:29 MANAGEMENT: CMD 'kill clientname'
2025-12-06 13:43:29 MANAGEMENT: Client disconnected
2025-12-06 13:44:20 event_wait : Interrupted system call (fd=-1,code=4)
2025-12-06 13:44:20 SENT CONTROL [test1]: 'RESTART' (status=1)
2025-12-06 13:44:21 MULTI: Connection attempt from 45.131.35.210:61599 ignored while server is shutting down
2025-12-06 13:44:22 Closing TUN/TAP interface
2025-12-06 13:44:22 net_addr_v4_del: 10.8.0.1 dev tun0
2025-12-06 13:44:22 SIGTERM[hard,] received, process exiting
2025-12-06 13:44:23 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2025-12-06 13:44:23 Note: Kernel support for ovpn-dco missing, disabling data channel offload.
2025-12-06 13:44:23 OpenVPN 2.6.14 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2025-12-06 13:44:23 library versions: OpenSSL 3.0.13 30 Jan 2024, LZO 2.10
2025-12-06 13:44:23 DCO version: N/A
2025-12-06 13:44:23 MANAGEMENT: unix domain socket listening on /run/openvpn/server.sock
2025-12-06 13:44:23 net_route_v4_best_gw query: dst 0.0.0.0
2025-12-06 13:44:23 net_route_v4_best_gw result: via 172.31.1.1 dev eth0
2025-12-06 13:44:23 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-12-06 13:44:23 Diffie-Hellman initialized with 2048 bit key
2025-12-06 13:44:23 CRL: loaded 1 CRLs from file crl.pem
2025-12-06 13:44:23 TUN/TAP device tun0 opened
2025-12-06 13:44:23 net_iface_mtu_set: mtu 1500 for tun0
2025-12-06 13:44:23 net_iface_up: set tun0 up
2025-12-06 13:44:23 net_addr_v4_add: 10.8.0.1/24 dev tun0
2025-12-06 13:44:23 Could not determine IPv4/IPv6 protocol. Using AF_INET
2025-12-06 13:44:23 Socket Buffers: R=[212992->212992] S=[212992->212992]
2025-12-06 13:44:23 UDPv4 link local (bound): [AF_INET]46.224.43.71:1194
2025-12-06 13:44:23 UDPv4 link remote: [AF_UNSPEC]
2025-12-06 13:44:23 UID set to nobody
2025-12-06 13:44:23 GID set to nogroup
2025-12-06 13:44:23 Capabilities retained: CAP_NET_ADMIN
2025-12-06 13:44:23 MULTI: multi_init called, r=256 v=256
2025-12-06 13:44:23 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2025-12-06 13:44:23 ifconfig_pool_read(), in='test1,10.8.0.2,'
2025-12-06 13:44:23 succeeded -> ifconfig_pool_set(hand=0)
2025-12-06 13:44:23 IFCONFIG POOL LIST
2025-12-06 13:44:23 test1,10.8.0.2,
2025-12-06 13:44:23 Initialization Sequence Completed
2025-12-06 13:44:24 45.131.35.210:61599 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-06 13:44:24 45.131.35.210:61599 VERIFY OK: depth=0, CN=test1
2025-12-06 13:44:24 45.131.35.210:61599 peer info: IV_VER=2.6.14
2025-12-06 13:44:24 45.131.35.210:61599 peer info: IV_PLAT=win
2025-12-06 13:44:24 45.131.35.210:61599 peer info: IV_TCPNL=1
2025-12-06 13:44:24 45.131.35.210:61599 peer info: IV_MTU=1600
2025-12-06 13:44:24 45.131.35.210:61599 peer info: IV_NCP=2
2025-12-06 13:44:24 45.131.35.210:61599 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-06 13:44:24 45.131.35.210:61599 peer info: IV_PROTO=990
2025-12-06 13:44:24 45.131.35.210:61599 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-06 13:44:24 45.131.35.210:61599 peer info: IV_SSO=openurl,webauth,crtext
2025-12-06 13:44:24 45.131.35.210:61599 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-06 13:44:24 45.131.35.210:61599 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-06 13:44:24 45.131.35.210:61599 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-06 13:44:24 45.131.35.210:61599 [test1] Peer Connection Initiated with [AF_INET]45.131.35.210:61599
2025-12-06 13:44:24 test1/45.131.35.210:61599 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2025-12-06 13:44:24 test1/45.131.35.210:61599 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_7c85db3d8599f9d74941c0b201beda36.tmp
2025-12-06 13:44:24 test1/45.131.35.210:61599 MULTI: Learn: 10.8.0.2 -> test1/45.131.35.210:61599
2025-12-06 13:44:24 test1/45.131.35.210:61599 MULTI: primary virtual IP for test1/45.131.35.210:61599: 10.8.0.2
2025-12-06 13:44:24 test1/45.131.35.210:61599 SENT CONTROL [test1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-06 13:44:25 test1/45.131.35.210:61599 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-06 13:44:25 test1/45.131.35.210:61599 Timers: ping 10, ping-restart 240
2025-12-06 13:44:25 test1/45.131.35.210:61599 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-06 13:48:43 test1/45.131.35.210:61599 [test1] Inactivity timeout (--ping-restart), restarting
2025-12-06 13:48:43 test1/45.131.35.210:61599 SIGUSR1[soft,ping-restart] received, client-instance restarting
2025-12-06 13:49:07 tls-crypt unwrap error: packet too short
2025-12-06 13:49:07 TLS Error: tls-crypt unwrapping failed from [AF_INET]170.130.187.42:49581
2025-12-06 15:24:32 45.131.35.210:55813 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-06 15:24:32 45.131.35.210:55813 VERIFY OK: depth=0, CN=test1
2025-12-06 15:24:32 45.131.35.210:55813 peer info: IV_VER=2.6.14
2025-12-06 15:24:32 45.131.35.210:55813 peer info: IV_PLAT=win
2025-12-06 15:24:32 45.131.35.210:55813 peer info: IV_TCPNL=1
2025-12-06 15:24:32 45.131.35.210:55813 peer info: IV_MTU=1600
2025-12-06 15:24:32 45.131.35.210:55813 peer info: IV_NCP=2
2025-12-06 15:24:32 45.131.35.210:55813 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-06 15:24:32 45.131.35.210:55813 peer info: IV_PROTO=990
2025-12-06 15:24:32 45.131.35.210:55813 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-06 15:24:32 45.131.35.210:55813 peer info: IV_SSO=openurl,webauth,crtext
2025-12-06 15:24:32 45.131.35.210:55813 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-06 15:24:32 45.131.35.210:55813 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-06 15:24:32 45.131.35.210:55813 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-06 15:24:32 45.131.35.210:55813 [test1] Peer Connection Initiated with [AF_INET]45.131.35.210:55813
2025-12-06 15:24:32 test1/45.131.35.210:55813 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2025-12-06 15:24:32 test1/45.131.35.210:55813 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_4e48c3447d72caa540500c8b29131f1c.tmp
2025-12-06 15:24:32 test1/45.131.35.210:55813 MULTI: Learn: 10.8.0.2 -> test1/45.131.35.210:55813
2025-12-06 15:24:32 test1/45.131.35.210:55813 MULTI: primary virtual IP for test1/45.131.35.210:55813: 10.8.0.2
2025-12-06 15:24:32 test1/45.131.35.210:55813 SENT CONTROL [test1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-06 15:24:33 test1/45.131.35.210:55813 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-06 15:24:33 test1/45.131.35.210:55813 Timers: ping 10, ping-restart 240
2025-12-06 15:24:33 test1/45.131.35.210:55813 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-06 15:25:06 45.131.35.210:51300 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-06 15:25:06 45.131.35.210:51300 VERIFY OK: depth=0, CN=test1
2025-12-06 15:25:06 45.131.35.210:51300 peer info: IV_VER=2.6.14
2025-12-06 15:25:06 45.131.35.210:51300 peer info: IV_PLAT=win
2025-12-06 15:25:06 45.131.35.210:51300 peer info: IV_TCPNL=1
2025-12-06 15:25:06 45.131.35.210:51300 peer info: IV_MTU=1600
2025-12-06 15:25:06 45.131.35.210:51300 peer info: IV_NCP=2
2025-12-06 15:25:06 45.131.35.210:51300 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-06 15:25:06 45.131.35.210:51300 peer info: IV_PROTO=990
2025-12-06 15:25:06 45.131.35.210:51300 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-06 15:25:06 45.131.35.210:51300 peer info: IV_SSO=openurl,webauth,crtext
2025-12-06 15:25:06 45.131.35.210:51300 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-06 15:25:06 45.131.35.210:51300 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-06 15:25:06 45.131.35.210:51300 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-06 15:25:06 45.131.35.210:51300 [test1] Peer Connection Initiated with [AF_INET]45.131.35.210:51300
2025-12-06 15:25:06 MULTI: new connection by client 'test1' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
2025-12-06 15:25:06 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2025-12-06 15:25:06 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_5c9c87bb0020a491ed725f94261175c.tmp
2025-12-06 15:25:06 MULTI: Learn: 10.8.0.2 -> test1/45.131.35.210:51300
2025-12-06 15:25:06 MULTI: primary virtual IP for test1/45.131.35.210:51300: 10.8.0.2
2025-12-06 15:25:06 SENT CONTROL [test1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-06 15:25:07 test1/45.131.35.210:51300 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-06 15:25:07 test1/45.131.35.210:51300 Timers: ping 10, ping-restart 240
2025-12-06 15:25:07 test1/45.131.35.210:51300 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-06 15:26:18 event_wait : Interrupted system call (fd=-1,code=4)
2025-12-06 15:26:18 SENT CONTROL [test1]: 'RESTART' (status=1)
2025-12-06 15:26:19 MULTI: Connection attempt from 45.131.35.210:64677 ignored while server is shutting down
2025-12-06 15:26:20 Closing TUN/TAP interface
2025-12-06 15:26:20 net_addr_v4_del: 10.8.0.1 dev tun0
2025-12-06 15:26:20 SIGTERM[hard,] received, process exiting
2025-12-06 15:26:20 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2025-12-06 15:26:20 Note: Kernel support for ovpn-dco missing, disabling data channel offload.
2025-12-06 15:26:20 OpenVPN 2.6.14 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2025-12-06 15:26:20 library versions: OpenSSL 3.0.13 30 Jan 2024, LZO 2.10
2025-12-06 15:26:20 DCO version: N/A
2025-12-06 15:26:20 MANAGEMENT: unix domain socket listening on /run/openvpn/server.sock
2025-12-06 15:26:20 net_route_v4_best_gw query: dst 0.0.0.0
2025-12-06 15:26:20 net_route_v4_best_gw result: via 172.31.1.1 dev eth0
2025-12-06 15:26:20 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-12-06 15:26:20 Diffie-Hellman initialized with 2048 bit key
2025-12-06 15:26:20 CRL: loaded 1 CRLs from file crl.pem
2025-12-06 15:26:20 TUN/TAP device tun0 opened
2025-12-06 15:26:20 net_iface_mtu_set: mtu 1500 for tun0
2025-12-06 15:26:20 net_iface_up: set tun0 up
2025-12-06 15:26:20 net_addr_v4_add: 10.8.0.1/24 dev tun0
2025-12-06 15:26:20 Could not determine IPv4/IPv6 protocol. Using AF_INET
2025-12-06 15:26:20 Socket Buffers: R=[212992->212992] S=[212992->212992]
2025-12-06 15:26:20 UDPv4 link local (bound): [AF_INET]46.224.43.71:1194
2025-12-06 15:26:20 UDPv4 link remote: [AF_UNSPEC]
2025-12-06 15:26:20 UID set to nobody
2025-12-06 15:26:20 GID set to nogroup
2025-12-06 15:26:20 Capabilities retained: CAP_NET_ADMIN
2025-12-06 15:26:20 MULTI: multi_init called, r=256 v=256
2025-12-06 15:26:20 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2025-12-06 15:26:20 ifconfig_pool_read(), in='test1,10.8.0.2,'
2025-12-06 15:26:20 succeeded -> ifconfig_pool_set(hand=0)
2025-12-06 15:26:20 IFCONFIG POOL LIST
2025-12-06 15:26:20 test1,10.8.0.2,
2025-12-06 15:26:20 Initialization Sequence Completed
2025-12-06 15:26:21 45.131.35.210:64677 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-06 15:26:21 45.131.35.210:64677 VERIFY OK: depth=0, CN=test1
2025-12-06 15:26:21 45.131.35.210:64677 peer info: IV_VER=2.6.14
2025-12-06 15:26:21 45.131.35.210:64677 peer info: IV_PLAT=win
2025-12-06 15:26:21 45.131.35.210:64677 peer info: IV_TCPNL=1
2025-12-06 15:26:21 45.131.35.210:64677 peer info: IV_MTU=1600
2025-12-06 15:26:21 45.131.35.210:64677 peer info: IV_NCP=2
2025-12-06 15:26:21 45.131.35.210:64677 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-06 15:26:21 45.131.35.210:64677 peer info: IV_PROTO=990
2025-12-06 15:26:21 45.131.35.210:64677 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-06 15:26:21 45.131.35.210:64677 peer info: IV_SSO=openurl,webauth,crtext
2025-12-06 15:26:21 45.131.35.210:64677 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-06 15:26:21 45.131.35.210:64677 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-06 15:26:21 45.131.35.210:64677 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-06 15:26:21 45.131.35.210:64677 [test1] Peer Connection Initiated with [AF_INET]45.131.35.210:64677
2025-12-06 15:26:21 test1/45.131.35.210:64677 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2025-12-06 15:26:21 test1/45.131.35.210:64677 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_46beaf540359360a24d6d6d2983aea54.tmp
2025-12-06 15:26:21 test1/45.131.35.210:64677 MULTI: Learn: 10.8.0.2 -> test1/45.131.35.210:64677
2025-12-06 15:26:21 test1/45.131.35.210:64677 MULTI: primary virtual IP for test1/45.131.35.210:64677: 10.8.0.2
2025-12-06 15:26:21 test1/45.131.35.210:64677 SENT CONTROL [test1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-06 15:26:22 test1/45.131.35.210:64677 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-06 15:26:22 test1/45.131.35.210:64677 Timers: ping 10, ping-restart 240
2025-12-06 15:26:22 test1/45.131.35.210:64677 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-06 15:31:33 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 15:31:33 MANAGEMENT: CMD 'status 2'
2025-12-06 15:31:33 MANAGEMENT: Client disconnected
2025-12-06 15:31:56 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 15:31:56 MANAGEMENT: CMD 'status 2'
2025-12-06 15:31:56 MANAGEMENT: Client disconnected
2025-12-06 15:33:03 event_wait : Interrupted system call (fd=-1,code=4)
2025-12-06 15:33:03 SENT CONTROL [test1]: 'RESTART' (status=1)
2025-12-06 15:33:04 MULTI: Connection attempt from 45.131.35.210:51470 ignored while server is shutting down
2025-12-06 15:33:05 Closing TUN/TAP interface
2025-12-06 15:33:05 net_addr_v4_del: 10.8.0.1 dev tun0
2025-12-06 15:33:05 SIGTERM[hard,] received, process exiting
2025-12-06 15:33:05 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2025-12-06 15:33:05 OpenVPN 2.6.14 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2025-12-06 15:33:05 library versions: OpenSSL 3.0.13 30 Jan 2024, LZO 2.10
2025-12-06 15:33:05 DCO version: N/A
2025-12-06 15:33:05 MANAGEMENT: unix domain socket listening on /run/openvpn/server.sock
2025-12-06 15:33:05 net_route_v4_best_gw query: dst 0.0.0.0
2025-12-06 15:33:05 net_route_v4_best_gw result: via 172.31.1.1 dev eth0
2025-12-06 15:33:05 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-12-06 15:33:05 Diffie-Hellman initialized with 2048 bit key
2025-12-06 15:33:05 CRL: loaded 1 CRLs from file crl.pem
2025-12-06 15:33:05 TUN/TAP device tun0 opened
2025-12-06 15:33:05 net_iface_mtu_set: mtu 1500 for tun0
2025-12-06 15:33:05 net_iface_up: set tun0 up
2025-12-06 15:33:05 net_addr_v4_add: 10.8.0.1/24 dev tun0
2025-12-06 15:33:05 Could not determine IPv4/IPv6 protocol. Using AF_INET
2025-12-06 15:33:05 Socket Buffers: R=[212992->212992] S=[212992->212992]
2025-12-06 15:33:05 UDPv4 link local (bound): [AF_INET]46.224.43.71:1194
2025-12-06 15:33:05 UDPv4 link remote: [AF_UNSPEC]
2025-12-06 15:33:05 UID set to nobody
2025-12-06 15:33:05 GID set to nogroup
2025-12-06 15:33:05 Capabilities retained: CAP_NET_ADMIN
2025-12-06 15:33:05 MULTI: multi_init called, r=256 v=256
2025-12-06 15:33:05 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2025-12-06 15:33:05 ifconfig_pool_read(), in='test1,10.8.0.2,'
2025-12-06 15:33:05 succeeded -> ifconfig_pool_set(hand=0)
2025-12-06 15:33:05 IFCONFIG POOL LIST
2025-12-06 15:33:05 test1,10.8.0.2,
2025-12-06 15:33:05 Initialization Sequence Completed
2025-12-06 15:33:07 45.131.35.210:51470 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-06 15:33:07 45.131.35.210:51470 VERIFY OK: depth=0, CN=test1
2025-12-06 15:33:07 45.131.35.210:51470 peer info: IV_VER=2.6.14
2025-12-06 15:33:07 45.131.35.210:51470 peer info: IV_PLAT=win
2025-12-06 15:33:07 45.131.35.210:51470 peer info: IV_TCPNL=1
2025-12-06 15:33:07 45.131.35.210:51470 peer info: IV_MTU=1600
2025-12-06 15:33:07 45.131.35.210:51470 peer info: IV_NCP=2
2025-12-06 15:33:07 45.131.35.210:51470 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-06 15:33:07 45.131.35.210:51470 peer info: IV_PROTO=990
2025-12-06 15:33:07 45.131.35.210:51470 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-06 15:33:07 45.131.35.210:51470 peer info: IV_SSO=openurl,webauth,crtext
2025-12-06 15:33:07 45.131.35.210:51470 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-06 15:33:07 45.131.35.210:51470 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-06 15:33:07 45.131.35.210:51470 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-06 15:33:07 45.131.35.210:51470 [test1] Peer Connection Initiated with [AF_INET]45.131.35.210:51470
2025-12-06 15:33:07 test1/45.131.35.210:51470 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
2025-12-06 15:33:07 test1/45.131.35.210:51470 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_3caeb617e97180231892378e801d85c8.tmp
2025-12-06 15:33:07 test1/45.131.35.210:51470 MULTI: Learn: 10.8.0.2 -> test1/45.131.35.210:51470
2025-12-06 15:33:07 test1/45.131.35.210:51470 MULTI: primary virtual IP for test1/45.131.35.210:51470: 10.8.0.2
2025-12-06 15:33:07 test1/45.131.35.210:51470 SENT CONTROL [test1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-06 15:33:08 test1/45.131.35.210:51470 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-06 15:33:08 test1/45.131.35.210:51470 Timers: ping 10, ping-restart 240
2025-12-06 15:33:08 test1/45.131.35.210:51470 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-06 15:33:09 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 15:33:09 MANAGEMENT: CMD 'status 2'
2025-12-06 15:33:09 MANAGEMENT: Client disconnected
2025-12-06 15:52:01 event_wait : Interrupted system call (fd=-1,code=4)
2025-12-06 15:52:01 SENT CONTROL [test1]: 'RESTART' (status=1)
2025-12-06 15:52:02 MULTI: Connection attempt from 45.131.35.210:53420 ignored while server is shutting down
2025-12-06 15:52:03 Closing TUN/TAP interface
2025-12-06 15:52:03 net_addr_v4_del: 10.8.0.1 dev tun0
2025-12-06 15:52:03 SIGTERM[hard,] received, process exiting
2025-12-06 15:54:27 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2025-12-06 15:54:27 Note: Kernel support for ovpn-dco missing, disabling data channel offload.
2025-12-06 15:54:27 OpenVPN 2.6.14 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2025-12-06 15:54:27 library versions: OpenSSL 3.0.13 30 Jan 2024, LZO 2.10
2025-12-06 15:54:27 DCO version: N/A
2025-12-06 15:54:27 MANAGEMENT: unix domain socket listening on /run/openvpn/server.sock
2025-12-06 15:54:27 net_route_v4_best_gw query: dst 0.0.0.0
2025-12-06 15:54:27 net_route_v4_best_gw result: via 172.31.1.1 dev eth0
2025-12-06 15:54:27 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-12-06 15:54:27 Diffie-Hellman initialized with 2048 bit key
2025-12-06 15:54:27 CRL: loaded 1 CRLs from file crl.pem
2025-12-06 15:54:27 TUN/TAP device tun0 opened
2025-12-06 15:54:27 net_iface_mtu_set: mtu 1500 for tun0
2025-12-06 15:54:27 net_iface_up: set tun0 up
2025-12-06 15:54:27 net_addr_v4_add: 10.8.0.1/24 dev tun0
2025-12-06 15:54:27 Could not determine IPv4/IPv6 protocol. Using AF_INET
2025-12-06 15:54:27 Socket Buffers: R=[212992->212992] S=[212992->212992]
2025-12-06 15:54:27 UDPv4 link local (bound): [AF_INET]46.224.43.71:1194
2025-12-06 15:54:27 UDPv4 link remote: [AF_UNSPEC]
2025-12-06 15:54:27 UID set to nobody
2025-12-06 15:54:27 GID set to nogroup
2025-12-06 15:54:27 Capabilities retained: CAP_NET_ADMIN
2025-12-06 15:54:27 MULTI: multi_init called, r=256 v=256
2025-12-06 15:54:27 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2025-12-06 15:54:27 ifconfig_pool_read(), in='test1,10.8.0.2,'
2025-12-06 15:54:27 succeeded -> ifconfig_pool_set(hand=0)
2025-12-06 15:54:27 IFCONFIG POOL LIST
2025-12-06 15:54:27 test1,10.8.0.2,
2025-12-06 15:54:27 Initialization Sequence Completed
2025-12-06 15:54:33 event_wait : Interrupted system call (fd=-1,code=4)
2025-12-06 15:54:35 Closing TUN/TAP interface
2025-12-06 15:54:35 net_addr_v4_del: 10.8.0.1 dev tun0
2025-12-06 15:54:35 SIGTERM[hard,] received, process exiting
2025-12-06 15:54:35 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2025-12-06 15:54:35 Note: Kernel support for ovpn-dco missing, disabling data channel offload.
2025-12-06 15:54:35 OpenVPN 2.6.14 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2025-12-06 15:54:35 library versions: OpenSSL 3.0.13 30 Jan 2024, LZO 2.10
2025-12-06 15:54:35 DCO version: N/A
2025-12-06 15:54:35 MANAGEMENT: unix domain socket listening on /run/openvpn/server.sock
2025-12-06 15:54:35 net_route_v4_best_gw query: dst 0.0.0.0
2025-12-06 15:54:35 net_route_v4_best_gw result: via 172.31.1.1 dev eth0
2025-12-06 15:54:35 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-12-06 15:54:35 Diffie-Hellman initialized with 2048 bit key
2025-12-06 15:54:35 CRL: loaded 1 CRLs from file crl.pem
2025-12-06 15:54:35 TUN/TAP device tun0 opened
2025-12-06 15:54:35 net_iface_mtu_set: mtu 1500 for tun0
2025-12-06 15:54:35 net_iface_up: set tun0 up
2025-12-06 15:54:35 net_addr_v4_add: 10.8.0.1/24 dev tun0
2025-12-06 15:54:35 Could not determine IPv4/IPv6 protocol. Using AF_INET
2025-12-06 15:54:35 Socket Buffers: R=[212992->212992] S=[212992->212992]
2025-12-06 15:54:35 UDPv4 link local (bound): [AF_INET]46.224.43.71:1194
2025-12-06 15:54:35 UDPv4 link remote: [AF_UNSPEC]
2025-12-06 15:54:35 UID set to nobody
2025-12-06 15:54:35 GID set to nogroup
2025-12-06 15:54:35 Capabilities retained: CAP_NET_ADMIN
2025-12-06 15:54:35 MULTI: multi_init called, r=256 v=256
2025-12-06 15:54:35 IFCONFIG POOL IPv4: base=10.8.0.2 size=253
2025-12-06 15:54:35 ifconfig_pool_read(), in='test1,10.8.0.2,'
2025-12-06 15:54:35 succeeded -> ifconfig_pool_set(hand=0)
2025-12-06 15:54:35 IFCONFIG POOL LIST
2025-12-06 15:54:35 test1,10.8.0.2,
2025-12-06 15:54:35 Initialization Sequence Completed
2025-12-06 15:54:44 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 15:54:44 MANAGEMENT: CMD 'state'
2025-12-06 15:54:44 MANAGEMENT: Client disconnected
2025-12-06 15:54:52 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 15:54:52 MANAGEMENT: CMD 'state'
2025-12-06 15:54:52 MANAGEMENT: Client disconnected
2025-12-06 15:55:18 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 15:55:18 MANAGEMENT: CMD 'status 2'
2025-12-06 15:55:18 MANAGEMENT: Client disconnected
2025-12-06 15:55:38 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 15:55:38 MANAGEMENT: CMD 'status 2'
2025-12-06 15:55:38 MANAGEMENT: Client disconnected
2025-12-06 15:56:05 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 15:56:05 MANAGEMENT: CMD 'status 2'
2025-12-06 15:56:05 MANAGEMENT: Client disconnected
2025-12-06 16:13:45 45.131.35.210:64662 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-06 16:13:45 45.131.35.210:64662 VERIFY OK: depth=0, CN=test8
2025-12-06 16:13:45 45.131.35.210:64662 peer info: IV_VER=2.6.14
2025-12-06 16:13:45 45.131.35.210:64662 peer info: IV_PLAT=win
2025-12-06 16:13:45 45.131.35.210:64662 peer info: IV_TCPNL=1
2025-12-06 16:13:45 45.131.35.210:64662 peer info: IV_MTU=1600
2025-12-06 16:13:45 45.131.35.210:64662 peer info: IV_NCP=2
2025-12-06 16:13:45 45.131.35.210:64662 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-06 16:13:45 45.131.35.210:64662 peer info: IV_PROTO=990
2025-12-06 16:13:45 45.131.35.210:64662 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-06 16:13:45 45.131.35.210:64662 peer info: IV_SSO=openurl,webauth,crtext
2025-12-06 16:13:45 45.131.35.210:64662 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-06 16:13:45 45.131.35.210:64662 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-06 16:13:46 45.131.35.210:64662 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-06 16:13:46 45.131.35.210:64662 [test8] Peer Connection Initiated with [AF_INET]45.131.35.210:64662
2025-12-06 16:13:46 test8/45.131.35.210:64662 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2025-12-06 16:13:46 test8/45.131.35.210:64662 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_363e398d5eca157f529d1be47ed150bf.tmp
2025-12-06 16:13:46 test8/45.131.35.210:64662 MULTI: Learn: 10.8.0.3 -> test8/45.131.35.210:64662
2025-12-06 16:13:46 test8/45.131.35.210:64662 MULTI: primary virtual IP for test8/45.131.35.210:64662: 10.8.0.3
2025-12-06 16:13:46 test8/45.131.35.210:64662 SENT CONTROL [test8]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-06 16:13:47 test8/45.131.35.210:64662 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-06 16:13:47 test8/45.131.35.210:64662 Timers: ping 10, ping-restart 240
2025-12-06 16:13:47 test8/45.131.35.210:64662 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-06 16:15:23 MANAGEMENT: Client connected from /run/openvpn/server.sock
2025-12-06 16:15:23 MANAGEMENT: CMD 'status 2'
2025-12-06 16:15:23 MANAGEMENT: Client disconnected
2025-12-06 17:04:10 test8/45.131.35.210:64662 [test8] Inactivity timeout (--ping-restart), restarting
2025-12-06 17:04:10 test8/45.131.35.210:64662 SIGUSR1[soft,ping-restart] received, client-instance restarting
2025-12-06 20:39:11 tls-crypt unwrap error: packet too short
2025-12-06 20:39:11 TLS Error: tls-crypt unwrapping failed from [AF_INET]185.200.116.67:57717
2025-12-07 00:53:53 tls-crypt unwrap error: packet too short
2025-12-07 00:53:53 TLS Error: tls-crypt unwrapping failed from [AF_INET]198.235.24.204:56690
2025-12-07 07:08:28 45.131.35.210:59866 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-07 07:08:28 45.131.35.210:59866 VERIFY OK: depth=0, CN=test8
2025-12-07 07:08:28 45.131.35.210:59866 peer info: IV_VER=2.6.14
2025-12-07 07:08:28 45.131.35.210:59866 peer info: IV_PLAT=win
2025-12-07 07:08:28 45.131.35.210:59866 peer info: IV_TCPNL=1
2025-12-07 07:08:28 45.131.35.210:59866 peer info: IV_MTU=1600
2025-12-07 07:08:28 45.131.35.210:59866 peer info: IV_NCP=2
2025-12-07 07:08:28 45.131.35.210:59866 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-07 07:08:28 45.131.35.210:59866 peer info: IV_PROTO=990
2025-12-07 07:08:28 45.131.35.210:59866 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-07 07:08:28 45.131.35.210:59866 peer info: IV_SSO=openurl,webauth,crtext
2025-12-07 07:08:28 45.131.35.210:59866 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-07 07:08:28 45.131.35.210:59866 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-07 07:08:28 45.131.35.210:59866 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-07 07:08:28 45.131.35.210:59866 [test8] Peer Connection Initiated with [AF_INET]45.131.35.210:59866
2025-12-07 07:08:28 test8/45.131.35.210:59866 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2025-12-07 07:08:28 test8/45.131.35.210:59866 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_6a37d136896892fd315487bf249bb67d.tmp
2025-12-07 07:08:28 test8/45.131.35.210:59866 MULTI: Learn: 10.8.0.3 -> test8/45.131.35.210:59866
2025-12-07 07:08:28 test8/45.131.35.210:59866 MULTI: primary virtual IP for test8/45.131.35.210:59866: 10.8.0.3
2025-12-07 07:08:28 test8/45.131.35.210:59866 SENT CONTROL [test8]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-07 07:08:29 test8/45.131.35.210:59866 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-07 07:08:29 test8/45.131.35.210:59866 Timers: ping 10, ping-restart 240
2025-12-07 07:08:29 test8/45.131.35.210:59866 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-07 07:16:46 test8/45.131.35.210:59866 [test8] Inactivity timeout (--ping-restart), restarting
2025-12-07 07:16:46 test8/45.131.35.210:59866 SIGUSR1[soft,ping-restart] received, client-instance restarting
2025-12-07 08:14:35 45.131.35.210:49595 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-07 08:14:35 45.131.35.210:49595 VERIFY OK: depth=0, CN=test8
2025-12-07 08:14:35 45.131.35.210:49595 peer info: IV_VER=2.6.14
2025-12-07 08:14:35 45.131.35.210:49595 peer info: IV_PLAT=win
2025-12-07 08:14:35 45.131.35.210:49595 peer info: IV_TCPNL=1
2025-12-07 08:14:35 45.131.35.210:49595 peer info: IV_MTU=1600
2025-12-07 08:14:35 45.131.35.210:49595 peer info: IV_NCP=2
2025-12-07 08:14:35 45.131.35.210:49595 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-07 08:14:35 45.131.35.210:49595 peer info: IV_PROTO=990
2025-12-07 08:14:35 45.131.35.210:49595 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-07 08:14:35 45.131.35.210:49595 peer info: IV_SSO=openurl,webauth,crtext
2025-12-07 08:14:35 45.131.35.210:49595 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-12-07 08:14:35 45.131.35.210:49595 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-12-07 08:14:35 45.131.35.210:49595 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-07 08:14:35 45.131.35.210:49595 [test8] Peer Connection Initiated with [AF_INET]45.131.35.210:49595
2025-12-07 08:14:35 test8/45.131.35.210:49595 MULTI_sva: pool returned IPv4=10.8.0.3, IPv6=(Not enabled)
2025-12-07 08:14:35 test8/45.131.35.210:49595 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_316847e93f6194737b5495da8a5a627e.tmp
2025-12-07 08:14:35 test8/45.131.35.210:49595 MULTI: Learn: 10.8.0.3 -> test8/45.131.35.210:49595
2025-12-07 08:14:35 test8/45.131.35.210:49595 MULTI: primary virtual IP for test8/45.131.35.210:49595: 10.8.0.3
2025-12-07 08:14:35 test8/45.131.35.210:49595 SENT CONTROL [test8]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 185.12.64.1,dhcp-option DNS 185.12.64.2,block-outside-dns,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)
2025-12-07 08:14:36 test8/45.131.35.210:49595 Data Channel: cipher 'AES-256-GCM', peer-id: 0
2025-12-07 08:14:36 test8/45.131.35.210:49595 Timers: ping 10, ping-restart 240
2025-12-07 08:14:36 test8/45.131.35.210:49595 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-crypt
2025-12-07 08:44:54 tls-crypt unwrap error: packet too short
2025-12-07 08:44:54 TLS Error: tls-crypt unwrapping failed from [AF_INET]38.132.109.100:52306
2025-12-07 09:10:24 test8/45.131.35.210:49595 TLS: soft reset sec=3349/3349 bytes=28974742/-1 pkts=58700/0
2025-12-07 09:10:24 test8/45.131.35.210:49595 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-07 09:10:24 test8/45.131.35.210:49595 VERIFY OK: depth=0, CN=test8
2025-12-07 09:10:24 test8/45.131.35.210:49595 peer info: IV_VER=2.6.14
2025-12-07 09:10:24 test8/45.131.35.210:49595 peer info: IV_PLAT=win
2025-12-07 09:10:24 test8/45.131.35.210:49595 peer info: IV_TCPNL=1
2025-12-07 09:10:24 test8/45.131.35.210:49595 peer info: IV_MTU=1600
2025-12-07 09:10:24 test8/45.131.35.210:49595 peer info: IV_NCP=2
2025-12-07 09:10:24 test8/45.131.35.210:49595 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-07 09:10:24 test8/45.131.35.210:49595 peer info: IV_PROTO=990
2025-12-07 09:10:24 test8/45.131.35.210:49595 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-07 09:10:24 test8/45.131.35.210:49595 peer info: IV_SSO=openurl,webauth,crtext
2025-12-07 09:10:24 test8/45.131.35.210:49595 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-07 10:06:13 test8/45.131.35.210:49595 TLS: soft reset sec=3349/3349 bytes=16715200/-1 pkts=39139/0
2025-12-07 10:06:14 test8/45.131.35.210:49595 VERIFY OK: depth=1, CN=Easy-RSA CA
2025-12-07 10:06:14 test8/45.131.35.210:49595 VERIFY OK: depth=0, CN=test8
2025-12-07 10:06:14 test8/45.131.35.210:49595 peer info: IV_VER=2.6.14
2025-12-07 10:06:14 test8/45.131.35.210:49595 peer info: IV_PLAT=win
2025-12-07 10:06:14 test8/45.131.35.210:49595 peer info: IV_TCPNL=1
2025-12-07 10:06:14 test8/45.131.35.210:49595 peer info: IV_MTU=1600
2025-12-07 10:06:14 test8/45.131.35.210:49595 peer info: IV_NCP=2
2025-12-07 10:06:14 test8/45.131.35.210:49595 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
2025-12-07 10:06:14 test8/45.131.35.210:49595 peer info: IV_PROTO=990
2025-12-07 10:06:14 test8/45.131.35.210:49595 peer info: IV_GUI_VER=OpenVPN_GUI_11.52.0.0
2025-12-07 10:06:14 test8/45.131.35.210:49595 peer info: IV_SSO=openurl,webauth,crtext
2025-12-07 10:06:14 test8/45.131.35.210:49595 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2025-12-07 10:52:49 test8/45.131.35.210:49595 [test8] Inactivity timeout (--ping-restart), restarting
2025-12-07 10:52:49 test8/45.131.35.210:49595 SIGUSR1[soft,ping-restart] received, client-instance restarting

    
Back