Thu Apr 18 08:52:06 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018Thu Apr 18 08:52:06 2019 Windows version 6.2 (Windows 8 or greater) 64bitThu Apr 18 08:52:06 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10Enter Management Password:Thu Apr 18 08:52:06 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]192.168.231.4:1194Thu Apr 18 08:52:06 2019 UDP link local (bound): [AF_INET][undef]:0Thu Apr 18 08:52:06 2019 UDP link remote: [AF_INET]192.168.231.4:1194Thu Apr 18 08:52:06 2019 [xxxxxx.xxx] Peer Connection Initiated with [AF_INET]192.168.231.4:1194Thu Apr 18 08:52:07 2019 open_tunThu Apr 18 08:52:07 2019 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{322A20D5-0A7D-4DAE-A181-61DA82ECA223}.tapThu Apr 18 08:52:07 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.235.6/255.255.255.252 on interface {322A20D5-0A7D-4DAE-A181-61DA82ECA223} [DHCP-serv: 192.168.235.5, lease-time: 31536000]Thu Apr 18 08:52:07 2019 Successful ARP Flush on interface [5] {322A20D5-0A7D-4DAE-A181-61DA82ECA223}Thu Apr 18 08:52:07 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0Thu Apr 18 08:52:13 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent thisThu Apr 18 08:52:13 2019 Initialization Sequence CompletedThu Apr 18 08:52:39 2019 SIGTERM[hard,] received, process exiting
Thu Apr 18 09:05:30 2019 us=760599 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018Thu Apr 18 09:05:30 2019 us=760599 Windows version 6.2 (Windows 8 or greater) 64bitThu Apr 18 09:05:30 2019 us=760599 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10Enter Management Password:Thu Apr 18 09:05:30 2019 us=761095 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340Thu Apr 18 09:05:30 2019 us=761095 Need hold release from management interface, waiting...Thu Apr 18 09:05:31 2019 us=228772 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340Thu Apr 18 09:05:31 2019 us=336010 MANAGEMENT: CMD 'state on'Thu Apr 18 09:05:31 2019 us=336405 MANAGEMENT: CMD 'log all on'Thu Apr 18 09:05:31 2019 us=516510 MANAGEMENT: CMD 'echo all on'Thu Apr 18 09:05:31 2019 us=517999 MANAGEMENT: CMD 'bytecount 5'Thu Apr 18 09:05:31 2019 us=518991 MANAGEMENT: CMD 'hold off'Thu Apr 18 09:05:31 2019 us=520479 MANAGEMENT: CMD 'hold release'Thu Apr 18 09:05:31 2019 us=522959 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authenticationThu Apr 18 09:05:31 2019 us=522959 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authenticationThu Apr 18 09:05:31 2019 us=522959 Control Channel MTU parms [ L:1623 D:1138 EF:112 EB:0 ET:0 EL:3 ]Thu Apr 18 09:05:31 2019 us=522959 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]Thu Apr 18 09:05:31 2019 us=523455 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1603,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'Thu Apr 18 09:05:31 2019 us=523455 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1603,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'Thu Apr 18 09:05:31 2019 us=523455 TCP/UDP: Preserving recently used remote address: [AF_INET]192.168.231.4:1194Thu Apr 18 09:05:31 2019 us=523455 Socket Buffers: R=[65536->65536] S=[65536->65536]Thu Apr 18 09:05:31 2019 us=523455 Attempting to establish TCP connection with [AF_INET]192.168.231.4:1194 [nonblock]Thu Apr 18 09:05:31 2019 us=523455 MANAGEMENT: >STATE:1555571131,TCP_CONNECT,,,,,,Thu Apr 18 09:07:32 2019 us=669700 TCP: connect to [AF_INET]192.168.231.4:1194 failed: Unknown errorThu Apr 18 09:07:32 2019 us=670590 SIGUSR1[connection failed(soft),init_instance] received, process restartingThu Apr 18 09:07:32 2019 us=670590 MANAGEMENT: >STATE:1555571252,RECONNECTING,init_instance,,,,,Thu Apr 18 09:07:32 2019 us=670590 Restart pause, 5 second(s)Thu Apr 18 09:07:33 2019 us=683907 SIGTERM[hard,init_instance] received, process exitingThu Apr 18 09:07:33 2019 us=683907 MANAGEMENT: >STATE:1555571253,EXITING,init_instance,,,,,
Apr 18 09:05:11 OPNsense openvpn[72934]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.Apr 18 09:05:11 OPNsense openvpn[72934]: NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsApr 18 09:05:11 OPNsense openvpn[72934]: Re-using SSL/TLS contextApr 18 09:05:11 OPNsense openvpn[72934]: Control Channel MTU parms [ L:1623 D:1138 EF:112 EB:0 ET:0 EL:3 ]Apr 18 09:05:11 OPNsense openvpn[72934]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]Apr 18 09:05:11 OPNsense openvpn[72934]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1603,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'Apr 18 09:05:11 OPNsense openvpn[72934]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1603,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'Apr 18 09:05:11 OPNsense openvpn[72934]: TCP/UDP: Preserving recently used remote address: [AF_INET]192.168.231.4:1194Apr 18 09:05:11 OPNsense openvpn[72934]: Socket Buffers: R=[65228->65228] S=[65228->65228]Apr 18 09:05:11 OPNsense openvpn[72934]: Attempting to establish TCP connection with [AF_INET]192.168.231.4:1194 [nonblock]Apr 18 09:05:11 OPNsense openvpn[72934]: TCP connection established with [AF_INET]192.168.231.4:1194Apr 18 09:05:11 OPNsense openvpn[72934]: TCP_CLIENT link local: (not bound)Apr 18 09:05:11 OPNsense openvpn[72934]: TCP_CLIENT link remote: [AF_INET]192.168.231.4:1194Apr 18 09:05:11 OPNsense openvpn[26171]: MULTI: multi_create_instance calledApr 18 09:05:11 OPNsense openvpn[26171]: Re-using SSL/TLS contextApr 18 09:05:11 OPNsense openvpn[26171]: Control Channel MTU parms [ L:1623 D:1138 EF:112 EB:0 ET:0 EL:3 ]Apr 18 09:05:11 OPNsense openvpn[26171]: Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]Apr 18 09:05:11 OPNsense openvpn[26171]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1603,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'Apr 18 09:05:11 OPNsense openvpn[26171]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1603,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'Apr 18 09:05:11 OPNsense openvpn[26171]: TCP connection established with [AF_INET]192.168.231.4:8471Apr 18 09:05:11 OPNsense openvpn[26171]: TCPv4_SERVER link local: (not bound)Apr 18 09:05:11 OPNsense openvpn[26171]: TCPv4_SERVER link remote: [AF_INET]192.168.231.4:8471Apr 18 09:05:11 OPNsense openvpn[26171]: 192.168.231.4:8471 TLS: Initial packet from [AF_INET]192.168.231.4:8471, sid=6068271c e125605dApr 18 09:05:11 OPNsense openvpn[26171]: 192.168.231.4:8471 Authenticate/Decrypt packet error: packet HMAC authentication failedApr 18 09:05:11 OPNsense openvpn[26171]: 192.168.231.4:8471 TLS Error: incoming packet authentication failed from [AF_INET]192.168.231.4:8471Apr 18 09:05:11 OPNsense openvpn[26171]: 192.168.231.4:8471 Fatal TLS error (check_tls_errors_co), restartingApr 18 09:05:11 OPNsense openvpn[26171]: 192.168.231.4:8471 SIGUSR1[soft,tls-error] received, client-instance restartingApr 18 09:05:11 OPNsense openvpn[26171]: TCP/UDP: Closing socketApr 18 09:05:11 OPNsense openvpn[72934]: Connection reset, restarting [0]Apr 18 09:05:11 OPNsense openvpn[72934]: TCP/UDP: Closing socketApr 18 09:05:11 OPNsense openvpn[72934]: SIGUSR1[soft,connection-reset] received, process restartingApr 18 09:05:11 OPNsense openvpn[72934]: Restart pause, 300 second(s)
dev ovpns1verb 4dev-type tuntun-ipv6dev-node /dev/tun1writepid /var/run/openvpn_server1.pidscript-security 3daemonkeepalive 10 60ping-timer-rempersist-tunpersist-keyproto tcp-servercipher AES-256-CBCauth SHA512up /usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkupdown /usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkdownlocal 192.168.231.4client-connect "/usr/local/etc/inc/plugins.inc.d/openvpn/ovpn_setup_cso.php server1"tls-serverserver 192.168.235.0 255.255.255.0client-config-dir /var/etc/openvpn-csc/1tls-verify "/usr/local/etc/inc/plugins.inc.d/openvpn/ovpn_auth_verify tls 'abcdefg.hi' 1"lport 1194management /var/etc/openvpn/server1.sock unixpush "route 192.168.232.0 255.255.255.0"push "dhcp-option DOMAIN klmnop.qr"push "dhcp-option DNS 192.168.232.20"ca /var/etc/openvpn/server1.cacert /var/etc/openvpn/server1.certkey /var/etc/openvpn/server1.keydh /usr/local/etc/dh-parameters.2048.sampletls-auth /var/etc/openvpn/server1.tls-auth 0persist-remote-ipfloat
dev tunpersist-tunpersist-keyproto tcp-clientcipher AES-256-CBCauth SHA512clientverb 4resolv-retry infiniteremote 192.168.231.4 1194 tcplport 0verify-x509-name "C=CH, ST=Staat, L=Ort, O=abcdefg.hi, emailAddress=mein.name@abcdefg.hi, CN=abcdefg.hi" subjectremote-cert-tls server<ca>-----BEGIN CERTIFICATE-----...-----END CERTIFICATE-----</ca><cert>-----BEGIN CERTIFICATE-----...-----END CERTIFICATE-----</cert><key>-----BEGIN PRIVATE KEY-----...-----END PRIVATE KEY-----</key><tls-auth>## 2048 bit OpenVPN static key#-----BEGIN OpenVPN Static key V1-----...-----END OpenVPN Static key V1-----</tls-auth>key-direction 1