logic1485 DD-WRT Novice
Joined: 23 Feb 2021 Posts: 7
|
Posted: Sat Feb 27, 2021 16:53 Post subject: |
|
So, here's what happened.
There were no good guides with Fresh Tomato that I could find that had client config utility to generate the config file. So, I flashed back to dd-wrt and followed the guide posted by egc.
I've got everything set up, but tls key negotiation and handshake fails.
Quick question: in dd-wrt there are multiple ips that are being used:
192.168.11.247 WAN IP Address
192.168.11.249 Router Local IP Address
192.168.11.240 Server IP/Name (in OpenVPN Client section)
I'm guessing the handshaking is failing because I've not forwarded the correct IP. I've tried 240, going to try 247 (and connect through to the edgerouter through the WAN port) and see if that makes a difference.
(edit: I've plugged in the edgerouter into the WAN port, and forwarded 1194 to 1194 on 192.168.11.247 in the edgerouter port forwarding section and it still doesn't work)
There's one more area of difference:
In the guide by egc, the OpenVPN Server/Daemon section has three data cipher sections, which matches what I see on my dd-wrt, but in the OpenVPN Client section in the guide, after the hash algorithm, there are no data ciphers at all.
Maybe I've missed a setting somewhere, but when pasting the settings into the .ovpn file, in the guide, there is only one cipher, whereas I thought all of them would have to be mentioned. Maybe this is also giving trouble to the handshaking process?
page 31 in this guide is what I am refering to:
https://forum.dd-wrt.com/phpBB2/download.php?id=44043
found in this thread:
https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=318795
edit:
picture of my openvpn client section for refernce can be found at the following link:
https://imgur.com/PpIdr1M
edit2:
also, for reference, by build is Firmware: DD-WRT v3.0-r44715 mega (11/03/20)
edit 3:
just read through the troubleshooting guide, and checked the section on TLS error and the server address is resolving correctly (I've set up a ddns), and the port is forwarded correctly.
The Windows firewall is disabled (for testing purposes) so that's not interfering, the only thing that could be interfering could be SFE. Should I disable it, and where can I find it?
edit 4:
eibgrad said I should put the following in the firewall of the dd-wrt:
Code: | WAN_IF="$(ip route | awk '/^default/{print $NF}')"
iptables -I FORWARD -i br0 -o $WAN_IF -m state --state NEW -j REJECT |
Could that be interfering?
edit 5:
The log from the connection window:
Code: | Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_private_mode = 00000000
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_cert_private = DISABLED
Sat Feb 27 18:41:01 2021 pkcs11_pin_cache_period = -1
Sat Feb 27 18:41:01 2021 pkcs11_id = '[UNDEF]'
Sat Feb 27 18:41:01 2021 pkcs11_id_management = DISABLED
Sat Feb 27 18:41:01 2021 server_network = 0.0.0.0
Sat Feb 27 18:41:01 2021 server_netmask = 0.0.0.0
Sat Feb 27 18:41:01 2021 server_network_ipv6 = ::
Sat Feb 27 18:41:01 2021 server_netbits_ipv6 = 0
Sat Feb 27 18:41:01 2021 server_bridge_ip = 0.0.0.0
Sat Feb 27 18:41:01 2021 server_bridge_netmask = 0.0.0.0
Sat Feb 27 18:41:01 2021 server_bridge_pool_start = 0.0.0.0
Sat Feb 27 18:41:01 2021 server_bridge_pool_end = 0.0.0.0
Sat Feb 27 18:41:01 2021 ifconfig_pool_defined = DISABLED
Sat Feb 27 18:41:01 2021 ifconfig_pool_start = 0.0.0.0
Sat Feb 27 18:41:01 2021 ifconfig_pool_end = 0.0.0.0
Sat Feb 27 18:41:01 2021 ifconfig_pool_netmask = 0.0.0.0
Sat Feb 27 18:41:01 2021 ifconfig_pool_persist_filename = '[UNDEF]'
Sat Feb 27 18:41:01 2021 ifconfig_pool_persist_refresh_freq = 600
Sat Feb 27 18:41:01 2021 ifconfig_ipv6_pool_defined = DISABLED
Sat Feb 27 18:41:01 2021 ifconfig_ipv6_pool_base = ::
Sat Feb 27 18:41:01 2021 ifconfig_ipv6_pool_netbits = 0
Sat Feb 27 18:41:01 2021 n_bcast_buf = 256
Sat Feb 27 18:41:01 2021 tcp_queue_limit = 64
Sat Feb 27 18:41:01 2021 real_hash_size = 256
Sat Feb 27 18:41:01 2021 virtual_hash_size = 256
Sat Feb 27 18:41:01 2021 client_connect_script = '[UNDEF]'
Sat Feb 27 18:41:01 2021 learn_address_script = '[UNDEF]'
Sat Feb 27 18:41:01 2021 client_disconnect_script = '[UNDEF]'
Sat Feb 27 18:41:01 2021 client_config_dir = '[UNDEF]'
Sat Feb 27 18:41:01 2021 ccd_exclusive = DISABLED
Sat Feb 27 18:41:01 2021 tmp_dir = 'C:\Users\Tom\AppData\Local\Temp\'
Sat Feb 27 18:41:01 2021 push_ifconfig_defined = DISABLED
Sat Feb 27 18:41:01 2021 push_ifconfig_local = 0.0.0.0
Sat Feb 27 18:41:01 2021 push_ifconfig_remote_netmask = 0.0.0.0
Sat Feb 27 18:41:01 2021 push_ifconfig_ipv6_defined = DISABLED
Sat Feb 27 18:41:01 2021 push_ifconfig_ipv6_local = ::/0
Sat Feb 27 18:41:01 2021 push_ifconfig_ipv6_remote = ::
Sat Feb 27 18:41:01 2021 enable_c2c = DISABLED
Sat Feb 27 18:41:01 2021 duplicate_cn = DISABLED
Sat Feb 27 18:41:01 2021 cf_max = 0
Sat Feb 27 18:41:01 2021 cf_per = 0
Sat Feb 27 18:41:01 2021 max_clients = 1024
Sat Feb 27 18:41:01 2021 max_routes_per_client = 256
Sat Feb 27 18:41:01 2021 auth_user_pass_verify_script = '[UNDEF]'
Sat Feb 27 18:41:01 2021 auth_user_pass_verify_script_via_file = DISABLED
Sat Feb 27 18:41:01 2021 auth_token_generate = DISABLED
Sat Feb 27 18:41:01 2021 auth_token_lifetime = 0
Sat Feb 27 18:41:01 2021 auth_token_secret_file = '[UNDEF]'
Sat Feb 27 18:41:01 2021 vlan_tagging = DISABLED
Sat Feb 27 18:41:01 2021 vlan_accept = all
Sat Feb 27 18:41:01 2021 vlan_pvid = 1
Sat Feb 27 18:41:01 2021 client = ENABLED
Sat Feb 27 18:41:01 2021 pull = ENABLED
Sat Feb 27 18:41:01 2021 auth_user_pass_file = '[UNDEF]'
Sat Feb 27 18:41:01 2021 show_net_up = DISABLED
Sat Feb 27 18:41:01 2021 route_method = 3
Sat Feb 27 18:41:01 2021 block_outside_dns = DISABLED
Sat Feb 27 18:41:01 2021 ip_win32_defined = DISABLED
Sat Feb 27 18:41:01 2021 ip_win32_type = 3
Sat Feb 27 18:41:01 2021 dhcp_masq_offset = 0
Sat Feb 27 18:41:01 2021 dhcp_lease_time = 31536000
Sat Feb 27 18:41:01 2021 tap_sleep = 0
Sat Feb 27 18:41:01 2021 dhcp_options = DISABLED
Sat Feb 27 18:41:01 2021 dhcp_renew = DISABLED
Sat Feb 27 18:41:01 2021 dhcp_pre_release = DISABLED
Sat Feb 27 18:41:01 2021 domain = '[UNDEF]'
Sat Feb 27 18:41:01 2021 netbios_scope = '[UNDEF]'
Sat Feb 27 18:41:01 2021 netbios_node_type = 0
Sat Feb 27 18:41:01 2021 disable_nbt = DISABLED
Sat Feb 27 18:41:01 2021 OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021
Sat Feb 27 18:41:01 2021 Windows version 10.0 (Windows 10 or greater) 64bit
Sat Feb 27 18:41:01 2021 library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10
Sat Feb 27 18:41:01 2021 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Sat Feb 27 18:41:01 2021 Need hold release from management interface, waiting...
Sat Feb 27 18:41:02 2021 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Sat Feb 27 18:41:02 2021 MANAGEMENT: CMD 'state on'
Sat Feb 27 18:41:02 2021 MANAGEMENT: CMD 'log all on'
Sat Feb 27 18:41:02 2021 MANAGEMENT: CMD 'echo all on'
Sat Feb 27 18:41:02 2021 MANAGEMENT: CMD 'bytecount 5'
Sat Feb 27 18:41:02 2021 MANAGEMENT: CMD 'hold off'
Sat Feb 27 18:41:02 2021 MANAGEMENT: CMD 'hold release'
Sat Feb 27 18:41:02 2021 Control Channel MTU parms [ L:1653 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 18:41:02 2021 MANAGEMENT: >STATE:1614447662,RESOLVE,,,,,,
Sat Feb 27 18:41:02 2021 Data Channel MTU parms [ L:1653 D:1450 EF:121 EB:411 ET:32 EL:3 ]
Sat Feb 27 18:41:02 2021 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Feb 27 18:41:02 2021 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Feb 27 18:41:02 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:41:02 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Feb 27 18:41:02 2021 UDPv4 link local: (not bound)
Sat Feb 27 18:41:02 2021 UDPv4 link remote: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:41:02 2021 MANAGEMENT: >STATE:1614447662,WAIT,,,,,,
Sat Feb 27 18:42:02 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Feb 27 18:42:02 2021 TLS Error: TLS handshake failed
Sat Feb 27 18:42:02 2021 TCP/UDP: Closing socket
Sat Feb 27 18:42:02 2021 SIGUSR1[soft,tls-error] received, process restarting
Sat Feb 27 18:42:02 2021 MANAGEMENT: >STATE:1614447722,RECONNECTING,tls-error,,,,,
Sat Feb 27 18:42:02 2021 Restart pause, 5 second(s)
Sat Feb 27 18:42:07 2021 Re-using SSL/TLS context
Sat Feb 27 18:42:07 2021 Control Channel MTU parms [ L:1653 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 18:42:07 2021 MANAGEMENT: >STATE:1614447727,RESOLVE,,,,,,
Sat Feb 27 18:42:07 2021 Data Channel MTU parms [ L:1653 D:1450 EF:121 EB:411 ET:32 EL:3 ]
Sat Feb 27 18:42:07 2021 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Feb 27 18:42:07 2021 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Feb 27 18:42:07 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:42:07 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Feb 27 18:42:07 2021 UDPv4 link local: (not bound)
Sat Feb 27 18:42:07 2021 UDPv4 link remote: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:42:07 2021 MANAGEMENT: >STATE:1614447727,WAIT,,,,,,
Sat Feb 27 18:43:07 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Feb 27 18:43:07 2021 TLS Error: TLS handshake failed
Sat Feb 27 18:43:07 2021 TCP/UDP: Closing socket
Sat Feb 27 18:43:07 2021 SIGUSR1[soft,tls-error] received, process restarting
Sat Feb 27 18:43:07 2021 MANAGEMENT: >STATE:1614447787,RECONNECTING,tls-error,,,,,
Sat Feb 27 18:43:07 2021 Restart pause, 5 second(s)
Sat Feb 27 18:43:12 2021 Re-using SSL/TLS context
Sat Feb 27 18:43:12 2021 Control Channel MTU parms [ L:1653 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 18:43:12 2021 MANAGEMENT: >STATE:1614447792,RESOLVE,,,,,,
Sat Feb 27 18:43:12 2021 Data Channel MTU parms [ L:1653 D:1450 EF:121 EB:411 ET:32 EL:3 ]
Sat Feb 27 18:43:12 2021 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Feb 27 18:43:12 2021 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Feb 27 18:43:12 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:43:12 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Feb 27 18:43:12 2021 UDPv4 link local: (not bound)
Sat Feb 27 18:43:12 2021 UDPv4 link remote: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:43:12 2021 MANAGEMENT: >STATE:1614447792,WAIT,,,,,,
Sat Feb 27 18:44:12 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Feb 27 18:44:12 2021 TLS Error: TLS handshake failed
Sat Feb 27 18:44:12 2021 TCP/UDP: Closing socket
Sat Feb 27 18:44:12 2021 SIGUSR1[soft,tls-error] received, process restarting
Sat Feb 27 18:44:12 2021 MANAGEMENT: >STATE:1614447852,RECONNECTING,tls-error,,,,,
Sat Feb 27 18:44:12 2021 Restart pause, 5 second(s)
Sat Feb 27 18:44:17 2021 Re-using SSL/TLS context
Sat Feb 27 18:44:17 2021 Control Channel MTU parms [ L:1653 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 18:44:17 2021 MANAGEMENT: >STATE:1614447857,RESOLVE,,,,,,
Sat Feb 27 18:44:17 2021 Data Channel MTU parms [ L:1653 D:1450 EF:121 EB:411 ET:32 EL:3 ]
Sat Feb 27 18:44:17 2021 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Feb 27 18:44:17 2021 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Feb 27 18:44:17 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:44:17 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Feb 27 18:44:17 2021 UDPv4 link local: (not bound)
Sat Feb 27 18:44:17 2021 UDPv4 link remote: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:44:17 2021 MANAGEMENT: >STATE:1614447857,WAIT,,,,,,
Sat Feb 27 18:45:17 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Feb 27 18:45:17 2021 TLS Error: TLS handshake failed
Sat Feb 27 18:45:17 2021 TCP/UDP: Closing socket
Sat Feb 27 18:45:17 2021 SIGUSR1[soft,tls-error] received, process restarting
Sat Feb 27 18:45:17 2021 MANAGEMENT: >STATE:1614447917,RECONNECTING,tls-error,,,,,
Sat Feb 27 18:45:17 2021 Restart pause, 5 second(s)
Sat Feb 27 18:45:22 2021 Re-using SSL/TLS context
Sat Feb 27 18:45:22 2021 Control Channel MTU parms [ L:1653 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 18:45:22 2021 MANAGEMENT: >STATE:1614447922,RESOLVE,,,,,,
Sat Feb 27 18:45:22 2021 Data Channel MTU parms [ L:1653 D:1450 EF:121 EB:411 ET:32 EL:3 ]
Sat Feb 27 18:45:22 2021 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Feb 27 18:45:22 2021 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Feb 27 18:45:22 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:45:22 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Feb 27 18:45:22 2021 UDPv4 link local: (not bound)
Sat Feb 27 18:45:22 2021 UDPv4 link remote: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:45:22 2021 MANAGEMENT: >STATE:1614447922,WAIT,,,,,,
Sat Feb 27 18:46:22 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Feb 27 18:46:22 2021 TLS Error: TLS handshake failed
Sat Feb 27 18:46:22 2021 TCP/UDP: Closing socket
Sat Feb 27 18:46:22 2021 SIGUSR1[soft,tls-error] received, process restarting
Sat Feb 27 18:46:22 2021 MANAGEMENT: >STATE:1614447982,RECONNECTING,tls-error,,,,,
Sat Feb 27 18:46:22 2021 Restart pause, 10 second(s)
Sat Feb 27 18:46:32 2021 Re-using SSL/TLS context
Sat Feb 27 18:46:32 2021 Control Channel MTU parms [ L:1653 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 18:46:32 2021 MANAGEMENT: >STATE:1614447992,RESOLVE,,,,,,
Sat Feb 27 18:46:32 2021 Data Channel MTU parms [ L:1653 D:1450 EF:121 EB:411 ET:32 EL:3 ]
Sat Feb 27 18:46:32 2021 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Feb 27 18:46:32 2021 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Feb 27 18:46:32 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:46:32 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Feb 27 18:46:32 2021 UDPv4 link local: (not bound)
Sat Feb 27 18:46:32 2021 UDPv4 link remote: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:46:32 2021 MANAGEMENT: >STATE:1614447992,WAIT,,,,,,
Sat Feb 27 18:47:32 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Feb 27 18:47:32 2021 TLS Error: TLS handshake failed
Sat Feb 27 18:47:32 2021 TCP/UDP: Closing socket
Sat Feb 27 18:47:32 2021 SIGUSR1[soft,tls-error] received, process restarting
Sat Feb 27 18:47:32 2021 MANAGEMENT: >STATE:1614448052,RECONNECTING,tls-error,,,,,
Sat Feb 27 18:47:32 2021 Restart pause, 20 second(s)
Sat Feb 27 18:47:52 2021 Re-using SSL/TLS context
Sat Feb 27 18:47:52 2021 Control Channel MTU parms [ L:1653 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 18:47:52 2021 MANAGEMENT: >STATE:1614448072,RESOLVE,,,,,,
Sat Feb 27 18:47:52 2021 Data Channel MTU parms [ L:1653 D:1450 EF:121 EB:411 ET:32 EL:3 ]
Sat Feb 27 18:47:52 2021 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Feb 27 18:47:52 2021 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Feb 27 18:47:52 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:47:52 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Feb 27 18:47:52 2021 UDPv4 link local: (not bound)
Sat Feb 27 18:47:52 2021 UDPv4 link remote: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:47:52 2021 MANAGEMENT: >STATE:1614448072,WAIT,,,,,,
Sat Feb 27 18:48:52 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Feb 27 18:48:52 2021 TLS Error: TLS handshake failed
Sat Feb 27 18:48:52 2021 TCP/UDP: Closing socket
Sat Feb 27 18:48:52 2021 SIGUSR1[soft,tls-error] received, process restarting
Sat Feb 27 18:48:52 2021 MANAGEMENT: >STATE:1614448132,RECONNECTING,tls-error,,,,,
Sat Feb 27 18:48:52 2021 Restart pause, 40 second(s)
Sat Feb 27 18:49:32 2021 Re-using SSL/TLS context
Sat Feb 27 18:49:32 2021 Control Channel MTU parms [ L:1653 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 18:49:32 2021 MANAGEMENT: >STATE:1614448172,RESOLVE,,,,,,
Sat Feb 27 18:49:32 2021 Data Channel MTU parms [ L:1653 D:1450 EF:121 EB:411 ET:32 EL:3 ]
Sat Feb 27 18:49:32 2021 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Feb 27 18:49:32 2021 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1601,tun-mtu 1532,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Feb 27 18:49:32 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:49:32 2021 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Feb 27 18:49:32 2021 UDPv4 link local: (not bound)
Sat Feb 27 18:49:32 2021 UDPv4 link remote: [AF_INET]84.198.75.184:1194
Sat Feb 27 18:49:32 2021 MANAGEMENT: >STATE:1614448172,WAIT,,,,,,
Sat Feb 27 18:50:32 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sat Feb 27 18:50:32 2021 TLS Error: TLS handshake failed
Sat Feb 27 18:50:32 2021 TCP/UDP: Closing socket
Sat Feb 27 18:50:32 2021 SIGUSR1[soft,tls-error] received, process restarting
Sat Feb 27 18:50:32 2021 MANAGEMENT: >STATE:1614448232,RECONNECTING,tls-error,,,,,
Sat Feb 27 18:50:32 2021 Restart pause, 80 second(s)
| [/code] |
|