openvpn windows-on elindul majd elhasal

Fórumok

Sziasztok,

 

win 2012R2-re felment az openvpn server, elindul,megkapja a 10.8.0.1 címet.

Kliensek kulcsai is rendben,ovpn elindul, kapnak ip-címet, pl 10.8.0.6 vagy 10.8.0.14, ezek a szerveren a logban látszódnak is.

Sőt, most este egy új gépre az ovpn-t telepítve, .ovpn- t és a ta.key-t a config-ba berakva csatlakozott, be is tudtam tallózni a win 2012r2-n lévő megosztást, 1x(!!!), majd utána egyszercsak már nem volt elérhető és azóta sem, hiába indítottam újra az openvpn-servert, a kliens számítógépet, vele együtt a kliensen lévő ovpn-t, semmi. Tűzfal a kliensen ki van kapcsolva.

Ma délután jártam hasonlóképpen: egy másik kliensen délben elindult minden,láttam a megosztást, majd ebédszünet. Utána egy másik kliensen felraktam a kulcsot, elindult ott is minden rendben, 1x bejött a win 201r2 megosztása, aztán elhasalt és utána nem jött már rendbe, akárcsak az a gép, amin délben még jó volt.

win 2012R2 fájlszerver újraindítása után megint jó volt, de most, a postom elején leírt esti távoli kliens-beállítás 1x-i csatlakozása után megint nem jó, gyanítom,h megint fájlszervert kellene újraindítani, ami nem járható út...

Lenne ötletetek, mitől van ez?

Köszi előre is!

Hozzászólások

Remek logot generál az openvpn Windows-on is, abból fogod megtudni, illetve a szerver oldalon is kéne lennie nyomának. Ha minden kliensek más a kulcsa, akkor nem fognak összeakadni a szerver oldalon. Ami még előfordulhat, hogy valamiért az UDP a tűzfalon elakad valahol, pláne mivel előszeretettel adnak privát IP -t már bármilyen net előfizetéshez, illetve esetleg kábelmodem van és még pluszban natolni is próbál. A lehetőségek tárháza elég nagy, a logokból fogsz tudni elindulni.

UPDATE

letiltottam majd engedélyeztem a win 2012r2 szerveren az OpenVPN TAP.Windows6 hálózati adaptert, és ezután megint tudok csatlakozni...

Sziasztok,

sajnos még mindig nem működik...:-(

4 géppel teszteltem eddig. (a,b,c,d) Mindegyiken win10 fut,

'a' és 'b' gépek egyazon itthoni upc-netről, wifivel. Ők mindig fel tudnak csatlakozni, látják a megosztásokat is.

'c' gép eddig egyszer tudott pillanatokra felcsatlakozni, baromi szar (2000-3000ms) ping értékkel, konkrétan két pinget bírt és többet nem láttuk.

'd' gép fel tudott ugyan csatlakozni, de csak pár kattintásnyit bírt, azaz szervermegosztásra katt-bejött, másik megosztásra katt-bejött, harmadikra már homokóra és elveszett.(tehát kb 5mp-et bírt) Ugyanez a gép egyszer egy péntek dél körüli időpontban -elmentek kajálni sokan ezért volt szabad a sáv??- be tudott jelentkezni és vagy 5 percet barangoltunk a szerver megosztásán, ment a le-feltöltés, aztán elveszett.

Ha este, meló után, mikor üres a cég, megpróbálunk vpn-ezni ezzel a 4 géppel, az 'a' és 'b' továbbra is megy, a 'c' és 'd' nem. Még pillanatokra sem. (mikor egyszer már ugye a 'd' gép perceket fent volt)

Ami viszont gáz,h minden esti tesztelés után reggel a melóhelyen a fájlszerver megosztásai nem elérhetők, a beállított \\szervernév\megosztás nem működik, csak a \\szerver_ip\megosztás, hibába csinálunk a klienseken ipconfig /release - renew-t, az ip rendben van, mégsem látszanak a megosztások. Szerveren DNS-szolgáltatást újraindítva is ugyanez, nem marad más, mint szerverújraindítás. Azután helyreáll a rend.

Van ötletetek?

Előre is köszi!!!

Szerveren futó openvpn-config:

**********************************

port 1194
proto udp4
dev tun
ca "c:\\program files\\openvpn\\config\\ca.crt"
cert "c:\\program files\\openvpn\\config\\server.crt"
key "c:\\program files\\openvpn\\config\\server.key"  # This file should be kept secret
dh "c:\\program files\\openvpn\\config\\dh2048.pem"
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "route 192.168.x.0 255.255.255.0"
push "dhcp-option DNS 192.168.90.1"
push "dhcp-option WINS 192.168.90.1"
keepalive 10 120
tls-auth ta.key 0 # This file is secret
cipher AES-256-CBC
persist-key
persist-tun
status openvpn-status.log
verb 3
explicit-exit-notify 1

*************************************

Kliensek configja:

*************************************

client
dev tun
proto udp4
remote "***fix_ip_cimunk***" 1194
resolv-retry infinite
nobind
persist-key
persist-tun
<ca>
</ca>
<cert>
</cert>
<key>
</key>
remote-cert-tls server
tls-auth ta.key 1
cipher AES-256-CBC
verb 3
*****************************************

A win2012R2 logja a reggeli leállás előtt:

The DNS server encountered an invalid domain name in a packet from 208.67.222.222. The packet will be rejected. The event data contains the DNS packet.
5504
*************
The DNS server has encountered a critical error from the Active Directory. Check that the Active Directory is functioning properly. The extended error debug information (which may be empty) is "". The event data contains the error.
4015
*************
The DNS server was unable to complete directory service enumeration of zone ..  This DNS server is configured to use information obtained from Active Directory for this zone and is unable to load the zone without it.  Check that the Active Directory is functioning properly and repeat enumeration of the zone. The extended error debug information (which may be empty) is "". The event data contains the error.
4004
*************
The DNS server was unable to add or write an update of domain name r720-dc in zone xyz.local to the Active Directory.  Check that the Active Directory is functioning properly and add or update this domain name using the DNS console. The extended error debug information (which may be empty) is "". The event data contains the error.
4011
*************
RoutingDomainID- {00000000-0000-0000-0000-000000000000}: Unable to add the interface {FED51F99-B0EB-4265-B2D3-5A36ED0F437A} with the Router Manager for the IPV6 protocol. The following error occurred: A függvényt nem lehet végrehajtani.

A DNS-rekord ('xyz.local. 600 IN A 10.8.0.1') dinamikus törlése nem sikerült a következő DNS-kiszolgálón:  

DNS-kiszolgáló IP-címe: 192.168.90.1
Visszaküldött válaszkód (RCODE): 5
Visszaküldött állapotkód: 9005  

FELHASZNÁLÓI BEAVATKOZÁS  
Annak érdekében, hogy a távoli számítógépek ne kapcsolódjanak szükségtelenül a tartományvezérlőhöz, törölje kézzel a rekordot, vagy hárítsa el a rekord dinamikus törlésének hibáját. A DNS hibakereséséről a súgóból tudhat meg többet.  

TOVÁBBI ADATOK
Hibaérték: DNS: a művelet visszautasítva.
*************
A DNS-rekord ('gc._msdcs.xyz.local. 600 IN A 10.8.0.1') dinamikus törlése nem sikerült a következő DNS-kiszolgálón:  

DNS-kiszolgáló IP-címe: 192.168.90.1
Visszaküldött válaszkód (RCODE): 5
Visszaküldött állapotkód: 9005  

FELHASZNÁLÓI BEAVATKOZÁS  
Annak érdekében, hogy a távoli számítógépek ne kapcsolódjanak szükségtelenül a tartományvezérlőhöz, törölje kézzel a rekordot, vagy hárítsa el a rekord dinamikus törlésének hibáját. A DNS hibakereséséről a súgóból tudhat meg többet.  

TOVÁBBI ADATOK
Hibaérték: DNS: a művelet visszautasítva.
**************
A DNS-rekord ('ForestDnsZones.xyz.local. 600 IN A 10.8.0.1') dinamikus törlése nem sikerült a következő DNS-kiszolgálón:  

DNS-kiszolgáló IP-címe: 192.168.90.1
Visszaküldött válaszkód (RCODE): 5
Visszaküldött állapotkód: 9005  

FELHASZNÁLÓI BEAVATKOZÁS  
Annak érdekében, hogy a távoli számítógépek ne kapcsolódjanak szükségtelenül a tartományvezérlőhöz, törölje kézzel a rekordot, vagy hárítsa el a rekord dinamikus törlésének hibáját. A DNS hibakereséséről a súgóból tudhat meg többet.  

TOVÁBBI ADATOK
Hibaérték: DNS: a művelet visszautasítva.
***************
A DNS-rekord ('DomainDnsZones.xyz.local. 600 IN A 10.8.0.1') dinamikus törlése nem sikerült a következő DNS-kiszolgálón:  

DNS-kiszolgáló IP-címe: 192.168.90.1
Visszaküldött válaszkód (RCODE): 5
Visszaküldött állapotkód: 9005  

FELHASZNÁLÓI BEAVATKOZÁS  
Annak érdekében, hogy a távoli számítógépek ne kapcsolódjanak szükségtelenül a tartományvezérlőhöz, törölje kézzel a rekordot, vagy hárítsa el a rekord dinamikus törlésének hibáját. A DNS hibakereséséről a súgóból tudhat meg többet.  

TOVÁBBI ADATOK
Hibaérték: DNS: a művelet visszautasítva.
***************
A(z) COM+ eseményrendszer szolgáltatás váratlanul leállt. Ez a(z) 1. alkalommal fordult elő. 1000 milliszekundumon belül a következő ellenintézkedés történik: A szolgáltatás újraindítása.
***************
A(z) Windows betűtípus-gyorsítótár szolgáltatás szolgáltatás váratlanul leállt. Ez a(z) 1. alkalommal fordult elő. 60000 milliszekundumon belül a következő ellenintézkedés történik: A szolgáltatás újraindítása.
***************
A(z) Hálózatlista szolgáltatás szolgáltatás váratlanul leállt. Ez a(z) 1. alkalommal fordult elő. 100 milliszekundumon belül a következő ellenintézkedés történik: A szolgáltatás újraindítása.
***************
A(z) Hálózatitároló-adapter szolgáltatás szolgáltatás váratlanul leállt. Ez a(z) 1. alkalommal fordult elő. 120000 milliszekundumon belül a következő ellenintézkedés történik: A szolgáltatás újraindítása.
***************
A(z) Secure Socket Tunneling Protocol (SSTP) szolgáltatás szolgáltatás váratlanul leállt. Ez a(z) 1. alkalommal fordult elő. 120000 milliszekundumon belül a következő ellenintézkedés történik: A szolgáltatás újraindítása.
***************
A(z) Windows Time szolgáltatás váratlanul leállt. Ez a(z) 1. alkalommal fordult elő. 60000 milliszekundumon belül a következő ellenintézkedés történik: A szolgáltatás újraindítása.
***************
A(z) xyz.local név feloldása során időtúllépés történt, miután a beállított DNS-kiszolgálók egyike sem válaszolt.
***************
A(z) 'xyz.local.' tartományhoz rendelt egy vagy több DNS-rekord dinamikus regisztrációja vagy törlése nem sikerült. Ezeket a rekordokat más számítógépek használják a kiszolgáló tartományvezérlőként (ha a megadott tartomány Active Directory tartomány), illetve LDAP-kiszolgálóként (ha a megadott tartomány alkalmazáspartíció) történő azonosításához.  

A hiba lehetséges okai az alábbiak lehetnek:  
- A számítógép hálózati kapcsolatainak TCP/IP tulajdonságai hibás IP-címe(ke)t tartalmaznak az elsődleges és másodlagos DNS-kiszolgálókra vonatkozóan
- A megadott elsődleges és másodlagos DNS-kiszolgáló nem működik
- A rekordok regisztrálását elsődlegesen végző egy vagy több DNS-kiszolgáló nem működik
- Az elsődleges vagy másodlagos DNS-kiszolgálók helytelen gyökérmutatókkal vannak konfigurálva
- A szülő DNS-zóna helytelen delegálást tartalmaz azon gyermekzónára nézve, amely azon DNS-rekordokra vonatkozóan mérvadó, melyek regisztrálása nem sikerült  

FELHASZNÁLÓI BEAVATKOZÁS  
Javítsa ki a fenti esetleges helytelen beállításokat és kezdeményezze a DNS-rekordok regisztrálását vagy törlését az 'nltest.exe /dsregdns' parancs a tartományvezérlőn, parancssorból való futtatásával, vagy a Hálózati bejelentkezés szolgáltatás újraindításával a tartományvezérlőn.
***************
Time Provider NtpClient: This machine is configured to use the domain hierarchy to determine its time source, but it is the AD PDC emulator for the domain at the root of the forest, so there is no machine above it in the domain hierarchy to use as a time source. It is recommended that you either configure a reliable time service in the root domain, or manually configure the AD PDC to synchronize with an external time source. Otherwise, this machine will function as the authoritative time source in the domain hierarchy. If an external time source is not configured or used for this computer, you may choose to disable the NtpClient.
***************
A szolgáltatásvezérlő kezelője megpróbált ellenintézkedést tenni (A szolgáltatás újraindítása) a(z) Hálózatitároló-adapter szolgáltatás szolgáltatás váratlan leállása után, de a művelet a következő hiba miatt sikertelen volt:
A szolgáltatás egy példánya már fut.
***************
A DHCP szolgáltatás azt érzékelte, hogy tartományvezérlőn fut, és nincsenek rajta konfigurálva a DHCP szolgáltatás által kezdeményezett dinamikus DNS-regisztrációkhoz szükséges hitelesítő adatok. Ez nem ajánlott biztonsági konfiguráció. A dinamikus DNS-regisztráció hitelesítő adatait a "netsh dhcp server set dnscredentials" parancssorba történő beírásával vagy a DHCP rendszerfelügyeleti eszközével konfigurálhatja.
***************
A számítógépnek legalább egy dinamikusan hozzárendelt IPv6-címe van. A DHCPv6-kiszolgáló megbízható működésének érdekében lehetőleg csak statikus IPv6-címeket használjon.
***************
A DHCP szolgáltatásnak nem sikerült címtárkiszolgálót találnia az engedélyezéshez.
***************

pénteki, 1 gépes próbálkozás, amikor fel tudott jelentkezni a 'név1' gép, majd pár másodpercig volt, majd ledobta, ezt ismételgettük, míg kb 10 percen át jó volt, aztán megint eldobta

Kliens

*************

2020-10-02 12:15:14 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.

2020-10-02 12:15:14 OpenVPN 2.5_beta4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 11 2020

2020-10-02 12:15:14 Windows version 10.0 (Windows 10 or greater) 64bit

2020-10-02 12:15:14 library versions: OpenSSL 1.1.1g  21 Apr 2020, LZO 2.10

Enter Management Password:

2020-10-02 12:15:14 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340

2020-10-02 12:15:14 Need hold release from management interface, waiting...

2020-10-02 12:15:14 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340

2020-10-02 12:15:15 MANAGEMENT: CMD 'state on'

2020-10-02 12:15:15 MANAGEMENT: CMD 'log all on'

2020-10-02 12:15:15 MANAGEMENT: CMD 'echo all on'

2020-10-02 12:15:15 MANAGEMENT: CMD 'bytecount 5'

2020-10-02 12:15:15 MANAGEMENT: CMD 'hold off'

2020-10-02 12:15:15 MANAGEMENT: CMD 'hold release'

2020-10-02 12:15:15 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:15:15 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:15:15 TCP/UDP: Preserving recently used remote address: [AF_INET]fix_ip_cim:1194

2020-10-02 12:15:15 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 12:15:15 UDP link local: (not bound)

2020-10-02 12:15:15 UDP link remote: [AF_INET]fix_ip_cim:1194

2020-10-02 12:15:15 MANAGEMENT: >STATE:1601633715,WAIT,,,,,,

2020-10-02 12:16:15 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:16:15 TLS Error: TLS handshake failed

2020-10-02 12:16:15 SIGUSR1[soft,tls-error] received, process restarting

2020-10-02 12:16:15 MANAGEMENT: >STATE:1601633775,RECONNECTING,tls-error,,,,,

2020-10-02 12:16:15 Restart pause, 5 second(s)

2020-10-02 12:16:20 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:16:20 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:16:20 TCP/UDP: Preserving recently used remote address: [AF_INET]fix_ip_cim:1194

2020-10-02 12:16:20 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 12:16:20 UDP link local: (not bound)

2020-10-02 12:16:20 UDP link remote: [AF_INET]fix_ip_cim:1194

2020-10-02 12:16:20 MANAGEMENT: >STATE:1601633780,WAIT,,,,,,

2020-10-02 12:17:02 MANAGEMENT: >STATE:1601633822,AUTH,,,,,,

2020-10-02 12:17:02 TLS: Initial packet from [AF_INET]fix_ip_cim:1194, sid=7091ee78 3f2107b8

2020-10-02 12:17:02 VERIFY OK: depth=1, C=HU, ST=MEGYE, L=Város, O=XYZH, OU=changeme, CN=R720, name=changeme, emailAddress=emailcim

2020-10-02 12:17:02 VERIFY KU OK

2020-10-02 12:17:02 Validating certificate extended key usage

2020-10-02 12:17:02 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2020-10-02 12:17:02 VERIFY EKU OK

2020-10-02 12:17:02 VERIFY OK: depth=0, C=HU, ST=MEGYE, L=Város, O=XYZH, OU=changeme, CN=server, name=server, emailAddress=emailcim

2020-10-02 12:17:02 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA

2020-10-02 12:17:02 [server] Peer Connection Initiated with [AF_INET]fix_ip_cim:1194

2020-10-02 12:17:02 PUSH: Received control message: 'PUSH_REPLY,route 192.168.90.0 255.255.255.0,dhcp-option DNS 192.168.90.1,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9,peer-id 3,cipher AES-256-GCM'

2020-10-02 12:17:02 OPTIONS IMPORT: timers and/or timeouts modified

2020-10-02 12:17:02 OPTIONS IMPORT: --ifconfig/up options modified

2020-10-02 12:17:02 OPTIONS IMPORT: route options modified

2020-10-02 12:17:02 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2020-10-02 12:17:02 OPTIONS IMPORT: peer-id set

2020-10-02 12:17:02 OPTIONS IMPORT: adjusting link_mtu to 1624

2020-10-02 12:17:02 OPTIONS IMPORT: data channel crypto options modified

2020-10-02 12:17:02 Data Channel: using negotiated cipher 'AES-256-GCM'

2020-10-02 12:17:02 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:17:02 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:17:02 interactive service msg_channel=828

2020-10-02 12:17:02 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=14 HWADDR=60:f2:62:d2:59:bf

2020-10-02 12:17:02 open_tun

2020-10-02 12:17:02 tap-windows6 device [OpenVPN TAP-Windows6] opened

2020-10-02 12:17:02 TAP-Windows Driver Version 9.24

2020-10-02 12:17:02 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.10/255.255.255.252 on interface {AE31D9D1-26EB-4A58-9A48-38DD99235A3E} [DHCP-serv: 10.8.0.9, lease-time: 31536000]

2020-10-02 12:17:02 Successful ARP Flush on interface [16] {AE31D9D1-26EB-4A58-9A48-38DD99235A3E}

2020-10-02 12:17:02 MANAGEMENT: >STATE:1601633822,ASSIGN_IP,,10.8.0.10,,,,

2020-10-02 12:17:02 IPv4 MTU set to 1500 on interface 16 using service

2020-10-02 12:17:07 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up

2020-10-02 12:17:07 MANAGEMENT: >STATE:1601633827,ADD_ROUTES,,,,,,

2020-10-02 12:17:07 C:\Windows\system32\route.exe ADD 192.168.90.0 MASK 255.255.255.0 10.8.0.9

2020-10-02 12:17:07 Route addition via service succeeded

2020-10-02 12:17:07 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.9

2020-10-02 12:17:07 Route addition via service succeeded

2020-10-02 12:17:07 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this

2020-10-02 12:17:07 Initialization Sequence Completed

2020-10-02 12:17:07 MANAGEMENT: >STATE:1601633827,CONNECTED,SUCCESS,10.8.0.10,fix_ip_cim,1194,,

2020-10-02 12:28:37 MANAGEMENT: CMD 'signal SIGHUP'

2020-10-02 12:28:37 C:\Windows\system32\route.exe DELETE 192.168.90.0 MASK 255.255.255.0 10.8.0.9

2020-10-02 12:28:37 Route deletion via service succeeded

2020-10-02 12:28:37 C:\Windows\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.9

2020-10-02 12:28:37 Route deletion via service succeeded

2020-10-02 12:28:37 Closing TUN/TAP interface

2020-10-02 12:28:49 TAP: DHCP address released

2020-10-02 12:28:49 SIGHUP[hard,] received, process restarting

2020-10-02 12:28:49 MANAGEMENT: >STATE:1601634529,RECONNECTING,SIGHUP,,,,,

2020-10-02 12:28:49 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.

2020-10-02 12:28:49 OpenVPN 2.5_beta4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 11 2020

2020-10-02 12:28:49 Windows version 10.0 (Windows 10 or greater) 64bit

2020-10-02 12:28:49 library versions: OpenSSL 1.1.1g  21 Apr 2020, LZO 2.10

2020-10-02 12:28:49 Restart pause, 5 second(s)

2020-10-02 12:28:54 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:28:54 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:28:54 TCP/UDP: Preserving recently used remote address: [AF_INET]fix_ip_cim:1194

2020-10-02 12:28:54 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 12:28:54 UDP link local: (not bound)

2020-10-02 12:28:54 UDP link remote: [AF_INET]fix_ip_cim:1194

2020-10-02 12:28:54 MANAGEMENT: >STATE:1601634534,WAIT,,,,,,

2020-10-02 12:29:54 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:29:54 TLS Error: TLS handshake failed

2020-10-02 12:29:54 SIGUSR1[soft,tls-error] received, process restarting

2020-10-02 12:29:54 MANAGEMENT: >STATE:1601634594,RECONNECTING,tls-error,,,,,

2020-10-02 12:29:54 Restart pause, 5 second(s)

2020-10-02 12:29:59 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:29:59 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:29:59 TCP/UDP: Preserving recently used remote address: [AF_INET]fix_ip_cim:1194

2020-10-02 12:29:59 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 12:29:59 UDP link local: (not bound)

2020-10-02 12:29:59 UDP link remote: [AF_INET]fix_ip_cim:1194

2020-10-02 12:29:59 MANAGEMENT: >STATE:1601634599,WAIT,,,,,,

2020-10-02 12:30:59 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:30:59 TLS Error: TLS handshake failed

2020-10-02 12:30:59 SIGUSR1[soft,tls-error] received, process restarting

2020-10-02 12:30:59 MANAGEMENT: >STATE:1601634659,RECONNECTING,tls-error,,,,,

2020-10-02 12:30:59 Restart pause, 5 second(s)

2020-10-02 12:31:04 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:31:04 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:31:04 TCP/UDP: Preserving recently used remote address: [AF_INET]fix_ip_cim:1194

2020-10-02 12:31:04 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 12:31:04 UDP link local: (not bound)

2020-10-02 12:31:04 UDP link remote: [AF_INET]fix_ip_cim:1194

2020-10-02 12:31:04 MANAGEMENT: >STATE:1601634664,WAIT,,,,,,

2020-10-02 12:31:22 MANAGEMENT: >STATE:1601634682,AUTH,,,,,,

2020-10-02 12:31:22 TLS: Initial packet from [AF_INET]fix_ip_cim:1194, sid=f781b2d7 a3410bec

2020-10-02 12:31:22 VERIFY OK: depth=1, C=HU, ST=MEGYE, L=Város, O=XYZH, OU=changeme, CN=R720, name=changeme, emailAddress=emailcim

2020-10-02 12:31:22 VERIFY KU OK

2020-10-02 12:31:22 Validating certificate extended key usage

2020-10-02 12:31:22 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2020-10-02 12:31:22 VERIFY EKU OK

2020-10-02 12:31:22 VERIFY OK: depth=0, C=HU, ST=MEGYE, L=Város, O=XYZH, OU=changeme, CN=server, name=server, emailAddress=emailcim

2020-10-02 12:31:22 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA

2020-10-02 12:31:22 [server] Peer Connection Initiated with [AF_INET]fix_ip_cim:1194

2020-10-02 12:31:22 PUSH: Received control message: 'PUSH_REPLY,route 192.168.90.0 255.255.255.0,dhcp-option DNS 192.168.90.1,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9,peer-id 2,cipher AES-256-GCM'

2020-10-02 12:31:22 OPTIONS IMPORT: timers and/or timeouts modified

2020-10-02 12:31:22 OPTIONS IMPORT: --ifconfig/up options modified

2020-10-02 12:31:22 OPTIONS IMPORT: route options modified

2020-10-02 12:31:22 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2020-10-02 12:31:22 OPTIONS IMPORT: peer-id set

2020-10-02 12:31:22 OPTIONS IMPORT: adjusting link_mtu to 1624

2020-10-02 12:31:22 OPTIONS IMPORT: data channel crypto options modified

2020-10-02 12:31:22 Data Channel: using negotiated cipher 'AES-256-GCM'

2020-10-02 12:31:22 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:31:22 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:31:22 interactive service msg_channel=828

2020-10-02 12:31:22 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=14 HWADDR=60:f2:62:d2:59:bf

2020-10-02 12:31:22 open_tun

2020-10-02 12:31:22 tap-windows6 device [OpenVPN TAP-Windows6] opened

2020-10-02 12:31:22 TAP-Windows Driver Version 9.24

2020-10-02 12:31:22 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.10/255.255.255.252 on interface {AE31D9D1-26EB-4A58-9A48-38DD99235A3E} [DHCP-serv: 10.8.0.9, lease-time: 31536000]

2020-10-02 12:31:22 Successful ARP Flush on interface [16] {AE31D9D1-26EB-4A58-9A48-38DD99235A3E}

2020-10-02 12:31:22 MANAGEMENT: >STATE:1601634682,ASSIGN_IP,,10.8.0.10,,,,

2020-10-02 12:31:22 IPv4 MTU set to 1500 on interface 16 using service

2020-10-02 12:31:27 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up

2020-10-02 12:31:27 MANAGEMENT: >STATE:1601634687,ADD_ROUTES,,,,,,

2020-10-02 12:31:27 C:\Windows\system32\route.exe ADD 192.168.90.0 MASK 255.255.255.0 10.8.0.9

2020-10-02 12:31:27 Route addition via service succeeded

2020-10-02 12:31:27 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.9

2020-10-02 12:31:27 Route addition via service succeeded

2020-10-02 12:31:27 Initialization Sequence Completed

2020-10-02 12:31:27 MANAGEMENT: >STATE:1601634687,CONNECTED,SUCCESS,10.8.0.10,fix_ip_cim,1194,,

2020-10-02 12:38:26 MANAGEMENT: CMD 'signal SIGHUP'

2020-10-02 12:38:26 C:\Windows\system32\route.exe DELETE 192.168.90.0 MASK 255.255.255.0 10.8.0.9

2020-10-02 12:38:26 Route deletion via service succeeded

2020-10-02 12:38:26 C:\Windows\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.9

2020-10-02 12:38:26 Route deletion via service succeeded

2020-10-02 12:38:26 Closing TUN/TAP interface

2020-10-02 12:38:38 TAP: DHCP address released

2020-10-02 12:38:38 SIGHUP[hard,] received, process restarting

2020-10-02 12:38:38 MANAGEMENT: >STATE:1601635118,RECONNECTING,SIGHUP,,,,,

2020-10-02 12:38:38 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.

2020-10-02 12:38:38 OpenVPN 2.5_beta4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 11 2020

2020-10-02 12:38:38 Windows version 10.0 (Windows 10 or greater) 64bit

2020-10-02 12:38:38 library versions: OpenSSL 1.1.1g  21 Apr 2020, LZO 2.10

2020-10-02 12:38:38 Restart pause, 5 second(s)

2020-10-02 12:38:43 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:38:43 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:38:43 TCP/UDP: Preserving recently used remote address: [AF_INET]fix_ip_cim:1194

2020-10-02 12:38:43 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 12:38:43 UDP link local: (not bound)

2020-10-02 12:38:43 UDP link remote: [AF_INET]fix_ip_cim:1194

2020-10-02 12:38:43 MANAGEMENT: >STATE:1601635123,WAIT,,,,,,

2020-10-02 12:39:43 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:39:43 TLS Error: TLS handshake failed

2020-10-02 12:39:43 SIGUSR1[soft,tls-error] received, process restarting

2020-10-02 12:39:43 MANAGEMENT: >STATE:1601635183,RECONNECTING,tls-error,,,,,

2020-10-02 12:39:43 Restart pause, 5 second(s)

2020-10-02 12:39:48 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:39:48 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:39:48 TCP/UDP: Preserving recently used remote address: [AF_INET]fix_ip_cim:1194

2020-10-02 12:39:48 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 12:39:48 UDP link local: (not bound)

2020-10-02 12:39:48 UDP link remote: [AF_INET]fix_ip_cim:1194

2020-10-02 12:39:48 MANAGEMENT: >STATE:1601635188,WAIT,,,,,,

2020-10-02 12:40:48 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:40:48 TLS Error: TLS handshake failed

2020-10-02 12:40:48 SIGUSR1[soft,tls-error] received, process restarting

2020-10-02 12:40:48 MANAGEMENT: >STATE:1601635248,RECONNECTING,tls-error,,,,,

2020-10-02 12:40:48 Restart pause, 5 second(s)

2020-10-02 12:40:53 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:40:53 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:40:53 TCP/UDP: Preserving recently used remote address: [AF_INET]fix_ip_cim:1194

2020-10-02 12:40:53 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 12:40:53 UDP link local: (not bound)

2020-10-02 12:40:53 UDP link remote: [AF_INET]fix_ip_cim:1194

2020-10-02 12:40:53 MANAGEMENT: >STATE:1601635253,WAIT,,,,,,

2020-10-02 12:41:53 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:41:53 TLS Error: TLS handshake failed

2020-10-02 12:41:53 SIGUSR1[soft,tls-error] received, process restarting

2020-10-02 12:41:53 MANAGEMENT: >STATE:1601635313,RECONNECTING,tls-error,,,,,

2020-10-02 12:41:53 Restart pause, 5 second(s)

2020-10-02 12:41:58 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:41:58 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:41:58 TCP/UDP: Preserving recently used remote address: [AF_INET]fix_ip_cim:1194

2020-10-02 12:41:58 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 12:41:58 UDP link local: (not bound)

2020-10-02 12:41:58 UDP link remote: [AF_INET]fix_ip_cim:1194

2020-10-02 12:41:58 MANAGEMENT: >STATE:1601635318,WAIT,,,,,,

2020-10-02 12:42:22 MANAGEMENT: >STATE:1601635342,AUTH,,,,,,

2020-10-02 12:42:22 TLS: Initial packet from [AF_INET]fix_ip_cim:1194, sid=f23a00ea b332712b

2020-10-02 12:42:23 VERIFY OK: depth=1, C=HU, ST=MEGYE, L=Város, O=XYZH, OU=changeme, CN=R720, name=changeme, emailAddress=emailcim

2020-10-02 12:42:23 VERIFY KU OK

2020-10-02 12:42:23 Validating certificate extended key usage

2020-10-02 12:42:23 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2020-10-02 12:42:23 VERIFY EKU OK

2020-10-02 12:42:23 VERIFY OK: depth=0, C=HU, ST=MEGYE, L=Város, O=XYZH, OU=changeme, CN=server, name=server, emailAddress=emailcim

2020-10-02 12:42:23 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA

2020-10-02 12:42:23 [server] Peer Connection Initiated with [AF_INET]fix_ip_cim:1194

2020-10-02 12:42:23 PUSH: Received control message: 'PUSH_REPLY,route 192.168.90.0 255.255.255.0,dhcp-option DNS 192.168.90.1,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9,peer-id 4,cipher AES-256-GCM'

2020-10-02 12:42:23 OPTIONS IMPORT: timers and/or timeouts modified

2020-10-02 12:42:23 OPTIONS IMPORT: --ifconfig/up options modified

2020-10-02 12:42:23 OPTIONS IMPORT: route options modified

2020-10-02 12:42:23 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2020-10-02 12:42:23 OPTIONS IMPORT: peer-id set

2020-10-02 12:42:23 OPTIONS IMPORT: adjusting link_mtu to 1624

2020-10-02 12:42:23 OPTIONS IMPORT: data channel crypto options modified

2020-10-02 12:42:23 Data Channel: using negotiated cipher 'AES-256-GCM'

2020-10-02 12:42:23 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:42:23 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:42:23 interactive service msg_channel=828

2020-10-02 12:42:23 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=14 HWADDR=60:f2:62:d2:59:bf

2020-10-02 12:42:23 open_tun

2020-10-02 12:42:23 tap-windows6 device [OpenVPN TAP-Windows6] opened

2020-10-02 12:42:23 TAP-Windows Driver Version 9.24

2020-10-02 12:42:23 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.10/255.255.255.252 on interface {AE31D9D1-26EB-4A58-9A48-38DD99235A3E} [DHCP-serv: 10.8.0.9, lease-time: 31536000]

2020-10-02 12:42:23 Successful ARP Flush on interface [16] {AE31D9D1-26EB-4A58-9A48-38DD99235A3E}

2020-10-02 12:42:23 MANAGEMENT: >STATE:1601635343,ASSIGN_IP,,10.8.0.10,,,,

2020-10-02 12:42:23 IPv4 MTU set to 1500 on interface 16 using service

2020-10-02 12:42:28 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up

2020-10-02 12:42:28 MANAGEMENT: >STATE:1601635348,ADD_ROUTES,,,,,,

2020-10-02 12:42:28 C:\Windows\system32\route.exe ADD 192.168.90.0 MASK 255.255.255.0 10.8.0.9

2020-10-02 12:42:28 Route addition via service succeeded

2020-10-02 12:42:28 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.9

2020-10-02 12:42:28 Route addition via service succeeded

2020-10-02 12:42:28 Initialization Sequence Completed

2020-10-02 12:42:28 MANAGEMENT: >STATE:1601635348,CONNECTED,SUCCESS,10.8.0.10,fix_ip_cim,1194,,

 

Server:

*********

2020-10-02 11:39:19 WARNING: --topology net30 support for server configs with IPv4 pools will be removed in a future release. Please migrate to --topology subnet as soon as possible.

2020-10-02 11:39:19 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.

2020-10-02 11:39:19 --pull-filter ignored for --mode server

2020-10-02 11:39:19 OpenVPN 2.5_rc1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 21 2020

2020-10-02 11:39:19 Windows version 6.3 (Windows 8.1) 64bit

2020-10-02 11:39:19 library versions: OpenSSL 1.1.1g  21 Apr 2020, LZO 2.10

Enter Management Password:

2020-10-02 11:39:19 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340

2020-10-02 11:39:19 Need hold release from management interface, waiting...

2020-10-02 11:39:19 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340

2020-10-02 11:39:19 MANAGEMENT: CMD 'state on'

2020-10-02 11:39:19 MANAGEMENT: CMD 'log all on'

2020-10-02 11:39:19 MANAGEMENT: CMD 'echo all on'

2020-10-02 11:39:19 MANAGEMENT: CMD 'bytecount 5'

2020-10-02 11:39:19 MANAGEMENT: CMD 'hold off'

2020-10-02 11:39:19 MANAGEMENT: CMD 'hold release'

2020-10-02 11:39:19 Diffie-Hellman initialized with 2048 bit key

2020-10-02 11:39:19 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 11:39:19 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 11:39:19 interactive service msg_channel=788

2020-10-02 11:39:19 ROUTE_GATEWAY 192.168.90.254/255.255.255.0 I=17 HWADDR=b8:ca:3a:f5:a9:f2

2020-10-02 11:39:19 open_tun

2020-10-02 11:39:19 tap-windows6 device [OpenVPN TAP-Windows6] opened

2020-10-02 11:39:19 TAP-Windows Driver Version 9.24

2020-10-02 11:39:19 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.1/255.255.255.252 on interface {FED51F99-B0EB-4265-B2D3-5A36ED0F437A} [DHCP-serv: 10.8.0.2, lease-time: 31536000]

2020-10-02 11:39:19 Sleeping for 10 seconds...

2020-10-02 11:39:29 Successful ARP Flush on interface [22] {FED51F99-B0EB-4265-B2D3-5A36ED0F437A}

2020-10-02 11:39:29 MANAGEMENT: >STATE:1601631569,ASSIGN_IP,,10.8.0.1,,,,

2020-10-02 11:39:29 IPv4 MTU set to 1500 on interface 22 using service

2020-10-02 11:39:29 MANAGEMENT: >STATE:1601631569,ADD_ROUTES,,,,,,

2020-10-02 11:39:29 C:\Windows\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.2

2020-10-02 11:39:29 Route addition via service succeeded

2020-10-02 11:39:29 Could not determine IPv4/IPv6 protocol. Using AF_INET6

2020-10-02 11:39:29 Socket Buffers: R=[65536->65536] S=[65536->65536]

2020-10-02 11:39:29 setsockopt(IPV6_V6ONLY=0)

2020-10-02 11:39:29 UDPv6 link local (bound): [AF_INET6][undef]:1194

2020-10-02 11:39:29 UDPv6 link remote: [AF_UNSPEC]

2020-10-02 11:39:29 MULTI: multi_init called, r=256 v=256

2020-10-02 11:39:29 IFCONFIG POOL IPv4: base=10.8.0.4 size=62

2020-10-02 11:39:29 ifconfig_pool_read(), in='név2,10.8.0.4,'

2020-10-02 11:39:29 succeeded -> ifconfig_pool_set(hand=0)

2020-10-02 11:39:29 ifconfig_pool_read(), in='név1,10.8.0.8,'

2020-10-02 11:39:29 succeeded -> ifconfig_pool_set(hand=1)

2020-10-02 11:39:29 ifconfig_pool_read(), in='név4,10.8.0.12,'

2020-10-02 11:39:29 succeeded -> ifconfig_pool_set(hand=2)

2020-10-02 11:39:29 ifconfig_pool_read(), in='név3,10.8.0.16,'

2020-10-02 11:39:29 succeeded -> ifconfig_pool_set(hand=3)

2020-10-02 11:39:29 ifconfig_pool_read(), in='név5,10.8.0.20,'

2020-10-02 11:39:29 succeeded -> ifconfig_pool_set(hand=4)

2020-10-02 11:39:29 IFCONFIG POOL LIST

2020-10-02 11:39:29 név2,10.8.0.4,

2020-10-02 11:39:29 név1,10.8.0.8,

2020-10-02 11:39:29 név4,10.8.0.12,

2020-10-02 11:39:29 név3,10.8.0.16,

2020-10-02 11:39:29 név5,10.8.0.20,

2020-10-02 11:39:29 Initialization Sequence Completed

2020-10-02 11:39:29 MANAGEMENT: >STATE:1601631569,CONNECTED,SUCCESS,10.8.0.1,,,,

2020-10-02 11:39:35 92.52.241.86:59227 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 11:39:35 92.52.241.86:59227 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 11:39:35 92.52.241.86:59227 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:59227, sid=8edd6c90 fa3ae5ba

2020-10-02 11:39:35 92.52.241.86:59227 VERIFY OK: depth=1, C=HU, ST=MEGYE, L=Város, O=CEG, OU=changeme, CN=R720, name=changeme, emailAddress=emailcim

2020-10-02 11:39:35 92.52.241.86:59227 VERIFY OK: depth=0, C=HU, ST=MEGYE, L=Város, O=CEG, OU=changeme, CN=név1, name=changeme, emailAddress=emailcim

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_VER=2.5_beta4

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_PLAT=win

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_PROTO=6

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_NCP=2

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:AES-256-CBC

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_LZ4=1

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_LZ4v2=1

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_LZO=1

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_COMP_STUB=1

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_COMP_STUBv2=1

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_TCPNL=1

2020-10-02 11:39:35 92.52.241.86:59227 peer info: IV_GUI_VER=OpenVPN_GUI_11

2020-10-02 11:39:35 92.52.241.86:59227 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA

2020-10-02 11:39:35 92.52.241.86:59227 [név1] Peer Connection Initiated with [AF_INET6]::ffff:92.52.241.86:59227

2020-10-02 11:39:35 név1/92.52.241.86:59227 MULTI_sva: pool returned IPv4=10.8.0.10, IPv6=(Not enabled)

2020-10-02 11:39:35 név1/92.52.241.86:59227 MULTI: Learn: 10.8.0.10 -> név1/92.52.241.86:59227

2020-10-02 11:39:35 név1/92.52.241.86:59227 MULTI: primary virtual IP for név1/92.52.241.86:59227: 10.8.0.10

2020-10-02 11:39:35 név1/92.52.241.86:59227 Data Channel: using negotiated cipher 'AES-256-GCM'

2020-10-02 11:39:35 név1/92.52.241.86:59227 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 11:39:35 név1/92.52.241.86:59227 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 11:39:35 név1/92.52.241.86:59227 SENT CONTROL [név1]: 'PUSH_REPLY,route 192.168.90.0 255.255.255.0,dhcp-option DNS 192.168.90.1,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9,peer-id 0,cipher AES-256-GCM' (status=1)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 92.52.241.86:53956 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:17:01 92.52.241.86:53956 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:17:01 92.52.241.86:53956 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:53956, sid=ba4d802b d0edfd34

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 92.52.241.86:51516 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:17:01 92.52.241.86:51516 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:17:01 92.52.241.86:51516 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:51516, sid=23a4b845 5907e26b

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 92.52.241.86:61191 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:17:01 92.52.241.86:61191 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:17:01 92.52.241.86:61191 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:61191, sid=d93fa6ce 4c49fc27

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:01 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:02 92.52.241.86:61191 VERIFY OK: depth=1, C=HU, ST=MEGYE, L=Város, O=CEG, OU=changeme, CN=R720, name=changeme, emailAddress=emailcim

2020-10-02 12:17:02 92.52.241.86:61191 VERIFY OK: depth=0, C=HU, ST=MEGYE, L=Város, O=CEG, OU=changeme, CN=név1, name=changeme, emailAddress=emailcim

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_VER=2.5_beta4

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_PLAT=win

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_PROTO=6

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_NCP=2

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:AES-256-CBC

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_LZ4=1

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_LZ4v2=1

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_LZO=1

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_COMP_STUB=1

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_COMP_STUBv2=1

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_TCPNL=1

2020-10-02 12:17:02 92.52.241.86:61191 peer info: IV_GUI_VER=OpenVPN_GUI_11

2020-10-02 12:17:02 92.52.241.86:61191 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA

2020-10-02 12:17:02 92.52.241.86:61191 [név1] Peer Connection Initiated with [AF_INET6]::ffff:92.52.241.86:61191

2020-10-02 12:17:02 MULTI: new connection by client 'név1' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.

2020-10-02 12:17:02 MULTI_sva: pool returned IPv4=10.8.0.10, IPv6=(Not enabled)

2020-10-02 12:17:02 MULTI: Learn: 10.8.0.10 -> név1/92.52.241.86:61191

2020-10-02 12:17:02 MULTI: primary virtual IP for név1/92.52.241.86:61191: 10.8.0.10

2020-10-02 12:17:02 Data Channel: using negotiated cipher 'AES-256-GCM'

2020-10-02 12:17:02 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:17:02 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:17:02 SENT CONTROL [név1]: 'PUSH_REPLY,route 192.168.90.0 255.255.255.0,dhcp-option DNS 192.168.90.1,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9,peer-id 3,cipher AES-256-GCM' (status=1)

2020-10-02 12:17:03 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:08 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:15 read UDPv6: Unknown error (code=10054)

2020-10-02 12:17:31 read UDPv6: Unknown error (code=10054)

2020-10-02 12:18:01 92.52.241.86:51516 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:18:01 92.52.241.86:51516 TLS Error: TLS handshake failed

2020-10-02 12:18:01 92.52.241.86:51516 SIGUSR1[soft,tls-error] received, client-instance restarting

2020-10-02 12:18:01 92.52.241.86:53956 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:18:01 92.52.241.86:53956 TLS Error: TLS handshake failed

2020-10-02 12:18:01 92.52.241.86:53956 SIGUSR1[soft,tls-error] received, client-instance restarting

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 92.52.241.86:52498 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:31:22 92.52.241.86:52498 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:31:22 92.52.241.86:52498 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:52498, sid=30b222a7 87d5c796

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 92.52.241.86:64891 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:31:22 92.52.241.86:64891 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:31:22 92.52.241.86:64891 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:64891, sid=70f34f15 12865115

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 92.52.241.86:59867 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:31:22 92.52.241.86:59867 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:31:22 92.52.241.86:59867 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:59867, sid=5c4cb89d 41b0b202

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:22 92.52.241.86:59867 VERIFY OK: depth=1, C=HU, ST=MEGYE, L=Város, O=CEG, OU=changeme, CN=R720, name=changeme, emailAddress=emailcim

2020-10-02 12:31:22 92.52.241.86:59867 VERIFY OK: depth=0, C=HU, ST=MEGYE, L=Város, O=CEG, OU=changeme, CN=név1, name=changeme, emailAddress=emailcim

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_VER=2.5_beta4

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_PLAT=win

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_PROTO=6

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_NCP=2

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:AES-256-CBC

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_LZ4=1

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_LZ4v2=1

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_LZO=1

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_COMP_STUB=1

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_COMP_STUBv2=1

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_TCPNL=1

2020-10-02 12:31:22 92.52.241.86:59867 peer info: IV_GUI_VER=OpenVPN_GUI_11

2020-10-02 12:31:22 92.52.241.86:59867 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA

2020-10-02 12:31:22 92.52.241.86:59867 [név1] Peer Connection Initiated with [AF_INET6]::ffff:92.52.241.86:59867

2020-10-02 12:31:22 MULTI: new connection by client 'név1' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.

2020-10-02 12:31:22 MULTI_sva: pool returned IPv4=10.8.0.10, IPv6=(Not enabled)

2020-10-02 12:31:22 MULTI: Learn: 10.8.0.10 -> név1/92.52.241.86:59867

2020-10-02 12:31:22 MULTI: primary virtual IP for név1/92.52.241.86:59867: 10.8.0.10

2020-10-02 12:31:22 Data Channel: using negotiated cipher 'AES-256-GCM'

2020-10-02 12:31:22 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:31:22 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:31:22 SENT CONTROL [név1]: 'PUSH_REPLY,route 192.168.90.0 255.255.255.0,dhcp-option DNS 192.168.90.1,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9,peer-id 2,cipher AES-256-GCM' (status=1)

2020-10-02 12:31:24 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:28 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:36 read UDPv6: Unknown error (code=10054)

2020-10-02 12:31:52 read UDPv6: Unknown error (code=10054)

2020-10-02 12:32:22 92.52.241.86:64891 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:32:22 92.52.241.86:64891 TLS Error: TLS handshake failed

2020-10-02 12:32:22 92.52.241.86:64891 SIGUSR1[soft,tls-error] received, client-instance restarting

2020-10-02 12:32:22 92.52.241.86:52498 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:32:22 92.52.241.86:52498 TLS Error: TLS handshake failed

2020-10-02 12:32:22 92.52.241.86:52498 SIGUSR1[soft,tls-error] received, client-instance restarting

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 92.52.241.86:53095 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:42:22 92.52.241.86:53095 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:42:22 92.52.241.86:53095 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:53095, sid=37c3464f 027bd79c

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 92.52.241.86:56549 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:42:22 92.52.241.86:56549 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:42:22 92.52.241.86:56549 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:56549, sid=700c8164 0ad502f2

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 92.52.241.86:62936 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:42:22 92.52.241.86:62936 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:42:22 92.52.241.86:62936 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:62936, sid=1c5204db ee5de9c9

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 92.52.241.86:50905 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:42:22 92.52.241.86:50905 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2020-10-02 12:42:22 92.52.241.86:50905 TLS: Initial packet from [AF_INET6]::ffff:92.52.241.86:50905, sid=4daa91f8 5c377277

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:22 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:23 92.52.241.86:50905 VERIFY OK: depth=1, C=HU, ST=MEGYE, L=Város, O=CEG, OU=changeme, CN=R720, name=changeme, emailAddress=emailcim

2020-10-02 12:42:23 92.52.241.86:50905 VERIFY OK: depth=0, C=HU, ST=MEGYE, L=Város, O=CEG, OU=changeme, CN=név1, name=changeme, emailAddress=emailcim

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_VER=2.5_beta4

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_PLAT=win

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_PROTO=6

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_NCP=2

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:AES-256-CBC

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_LZ4=1

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_LZ4v2=1

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_LZO=1

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_COMP_STUB=1

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_COMP_STUBv2=1

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_TCPNL=1

2020-10-02 12:42:23 92.52.241.86:50905 peer info: IV_GUI_VER=OpenVPN_GUI_11

2020-10-02 12:42:23 92.52.241.86:50905 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA

2020-10-02 12:42:23 92.52.241.86:50905 [név1] Peer Connection Initiated with [AF_INET6]::ffff:92.52.241.86:50905

2020-10-02 12:42:23 MULTI: new connection by client 'név1' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.

2020-10-02 12:42:23 MULTI_sva: pool returned IPv4=10.8.0.10, IPv6=(Not enabled)

2020-10-02 12:42:23 MULTI: Learn: 10.8.0.10 -> név1/92.52.241.86:50905

2020-10-02 12:42:23 MULTI: primary virtual IP for név1/92.52.241.86:50905: 10.8.0.10

2020-10-02 12:42:23 Data Channel: using negotiated cipher 'AES-256-GCM'

2020-10-02 12:42:23 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:42:23 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

2020-10-02 12:42:23 SENT CONTROL [név1]: 'PUSH_REPLY,route 192.168.90.0 255.255.255.0,dhcp-option DNS 192.168.90.1,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9,peer-id 4,cipher AES-256-GCM' (status=1)

2020-10-02 12:42:24 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:29 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:37 read UDPv6: Unknown error (code=10054)

2020-10-02 12:42:53 read UDPv6: Unknown error (code=10054)

2020-10-02 12:43:22 92.52.241.86:56549 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:43:22 92.52.241.86:56549 TLS Error: TLS handshake failed

2020-10-02 12:43:22 92.52.241.86:56549 SIGUSR1[soft,tls-error] received, client-instance restarting

2020-10-02 12:43:22 92.52.241.86:62936 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:43:22 92.52.241.86:62936 TLS Error: TLS handshake failed

2020-10-02 12:43:22 92.52.241.86:62936 SIGUSR1[soft,tls-error] received, client-instance restarting

2020-10-02 12:43:22 92.52.241.86:53095 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)

2020-10-02 12:43:22 92.52.241.86:53095 TLS Error: TLS handshake failed

2020-10-02 12:43:22 92.52.241.86:53095 SIGUSR1[soft,tls-error] received, client-instance restarting0

2020-10-02 12:31:22 92.52.241.86:59867 [név1] Peer Connection Initiated with [AF_INET6]::ffff:92.52.241.86:59867
2020-10-02 12:31:22 MULTI: new connection by client 'név1' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.

Tehát a szerver úgy tudja ,hogy a 'név1' nevű kliense már korábban kapcsolódott, amiatt, hogy ismét kapcsolódik és nincs beállítva a --duplicate-cn, ezért a régit kivágja, az újat elfogadja.

Ez két módon követhető el:
- ugyanaz a tanúsítvány van több kliensnél is, ezért kilökdösik egymást,
- esetünkben a kapcsolat IPv6 alapokon jön be. Ha ugyanaz a kliens egyszer IPv4, egyszer IPv6 alapokon jön be, az sem optimális.

A hordozó réteg egyébként megbízható, stabil? Mert csomag itt is elveszhet...