You are not logged in.

#1 2016-04-14 14:34:54

Xenios
Member
Registered: 2014-04-01
Posts: 1

Openvpn Android bad source address

I use OpenVPN and connection via pc to pc works fine while android doesnt. I get the following error: Bad source address
I tried android connecting with apps with the same error such as: OpenVPN Connect and OpenVPN For Android

My Server configuration:

#################################################
# Sample OpenVPN 2.0 config file for            #
# multi-client server.                          #
#                                               #
# This file is for the server side              #
# of a many-clients <-> one-server              #
# OpenVPN configuration.                        #
#                                               #
# OpenVPN also supports                         #
# single-machine <-> single-machine             #
# configurations (See the Examples page         #
# on the web site for more info).               #
#                                               #
# This config should work on Windows            #
# or Linux/BSD systems.  Remember on            #
# Windows to quote pathnames and use            #
# double backslashes, e.g.:                     #
# "C:\\Program Files\\OpenVPN\\config\\foo.key" #
#                                               #
# Comments are preceded with '#' or ';'         #
#################################################

# Which local IP address should OpenVPN
# listen on? (optional)
;local a.b.c.d

# Which TCP/UDP port should OpenVPN listen on?
# If you want to run multiple OpenVPN instances
# on the same machine, use a different port
# number for each one.  You will need to
# open up this port on your firewall.
port 1194

# TCP or UDP server?
;proto tcp
proto udp

# "dev tun" will create a routed IP tunnel,
# "dev tap" will create an ethernet tunnel.
# Use "dev tap0" if you are ethernet bridging
# and have precreated a tap0 virtual interface
# and bridged it with your ethernet interface.
# If you want to control access policies
# over the VPN, you must create firewall
# rules for the the TUN/TAP interface.
# On non-Windows systems, you can give
# an explicit unit number, such as tun0.
# On Windows, use "dev-node" for this.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun

# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel if you
# have more than one.  On XP SP2 or higher,
# you may need to selectively disable the
# Windows firewall for the TAP adapter.
# Non-Windows systems usually don't need this.
;dev-node MyTap

# SSL/TLS root certificate (ca), certificate
# (cert), and private key (key).  Each client
# and the server must have their own cert and
# key file.  The server and all clients will
# use the same ca file.
#
# See the "easy-rsa" directory for a series
# of scripts for generating RSA certificates
# and private keys.  Remember to use
# a unique Common Name for the server
# and each of the client certificates.
#
# Any X509 key management system can be used.
# OpenVPN can also use a PKCS #12 formatted key file
# (see "pkcs12" directive in man page).
ca /etc/openvpn/ca.crt
cert /etc/openvpn/archsrv.crt
key /etc/openvpn/archsrv.key  # This file should be kept secret

# Diffie hellman parameters.
# Generate your own with:
#   openssl dhparam -out dh2048.pem 2048
dh /etc/openvpn/dh2048.pem

# Network topology
# Should be subnet (addressing via IP)
# unless Windows clients v2.0.9 and lower have to
# be supported (then net30, i.e. a /30 per client)
# Defaults to net30 (not recommended)
;topology subnet

# Configure server mode and supply a VPN subnet
# for OpenVPN to draw client addresses from.
# The server will take 10.8.0.1 for itself,
# the rest will be made available to clients.
# Each client will be able to reach the server
# on 10.8.0.1. Comment this line out if you are
# ethernet bridging. See the man page for more info.
server 10.8.0.0 255.255.255.0

# Maintain a record of client <-> virtual IP address
# associations in this file.  If OpenVPN goes down or
# is restarted, reconnecting clients can be assigned
# the same virtual IP address from the pool that was
# previously assigned.
ifconfig-pool-persist ipp.txt

# Configure server mode for ethernet bridging.
# You must first use your OS's bridging capability
# to bridge the TAP interface with the ethernet
# NIC interface.  Then you must manually set the
# IP/netmask on the bridge interface, here we
# assume 10.8.0.4/255.255.255.0.  Finally we
# must set aside an IP range in this subnet
# (start=10.8.0.50 end=10.8.0.100) to allocate
# to connecting clients.  Leave this line commented
# out unless you are ethernet bridging.
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100

# Configure server mode for ethernet bridging
# using a DHCP-proxy, where clients talk
# to the OpenVPN server-side DHCP server
# to receive their IP address allocation
# and DNS server addresses.  You must first use
# your OS's bridging capability to bridge the TAP
# interface with the ethernet NIC interface.
# Note: this mode only works on clients (such as
# Windows), where the client-side TAP adapter is
# bound to a DHCP client.
;server-bridge

# Push routes to the client to allow it
# to reach other private subnets behind
# the server.  Remember that these
# private subnets will also need
# to know to route the OpenVPN client
# address pool (10.8.0.0/255.255.255.0)
# back to the OpenVPN server.
;push "route 192.168.10.0 255.255.255.0"
;push "route 192.168.20.0 255.255.255.0"

# To assign specific IP addresses to specific
# clients or if a connecting client has a private
# subnet behind it that should also have VPN access,
# use the subdirectory "ccd" for client-specific
# configuration files (see man page for more info).

# EXAMPLE: Suppose the client
# having the certificate common name "Thelonious"
# also has a small subnet behind his connecting
# machine, such as 192.168.40.128/255.255.255.248.
# First, uncomment out these lines:
;client-config-dir ccd
;route 192.168.40.128 255.255.255.248
# Then create a file ccd/Thelonious with this line:
#   iroute 192.168.40.128 255.255.255.248
# This will allow Thelonious' private subnet to
# access the VPN.  This example will only work
# if you are routing, not bridging, i.e. you are
# using "dev tun" and "server" directives.

# EXAMPLE: Suppose you want to give
# Thelonious a fixed VPN IP address of 10.9.0.1.
# First uncomment out these lines:
;client-config-dir ccd
;route 10.9.0.0 255.255.255.252
# Then add this line to ccd/Thelonious:
#   ifconfig-push 10.9.0.1 10.9.0.2

# Suppose that you want to enable different
# firewall access policies for different groups
# of clients.  There are two methods:
# (1) Run multiple OpenVPN daemons, one for each
#     group, and firewall the TUN/TAP interface
#     for each group/daemon appropriately.
# (2) (Advanced) Create a script to dynamically
#     modify the firewall in response to access
#     from different clients.  See man
#     page for more info on learn-address script.
;learn-address ./script

# If enabled, this directive will configure
# all clients to redirect their default
# network gateway through the VPN, causing
# all IP traffic such as web browsing and
# and DNS lookups to go through the VPN
# (The OpenVPN server machine may need to NAT
# or bridge the TUN/TAP interface to the internet
# in order for this to work properly).
push "redirect-gateway def1 bypass-dhcp"
push "dhcp-option DNS 10.8.0.1"

# Certain Windows-specific network settings
# can be pushed to clients, such as DNS
# or WINS server addresses.  CAVEAT:
# http://openvpn.net/faq.html#dhcpcaveats
# The addresses below refer to the public
# DNS servers provided by opendns.com.
;push "dhcp-option DNS 208.67.222.222"
;push "dhcp-option DNS 208.67.220.220"

# Uncomment this directive to allow different
# clients to be able to "see" each other.
# By default, clients will only see the server.
# To force clients to only see the server, you
# will also need to appropriately firewall the
# server's TUN/TAP interface.
;client-to-client

# Uncomment this directive if multiple clients
# might connect with the same certificate/key
# files or common names.  This is recommended
# only for testing purposes.  For production use,
# each client should have its own certificate/key
# pair.
#
# IF YOU HAVE NOT GENERATED INDIVIDUAL
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
# UNCOMMENT THIS LINE OUT.
;duplicate-cn

# The keepalive directive causes ping-like
# messages to be sent back and forth over
# the link so that each side knows when
# the other side has gone down.
# Ping every 10 seconds, assume that remote
# peer is down if no ping received during
# a 120 second time period.
keepalive 10 120

# For extra security beyond that provided
# by SSL/TLS, create an "HMAC firewall"
# to help block DoS attacks and UDP port flooding.
#
# Generate with:
#   openvpn --genkey --secret ta.key
#
# The server and each client must have
# a copy of this key.
# The second parameter should be '0'
# on the server and '1' on the clients.
;tls-auth ta.key 0 # This file is secret

# Select a cryptographic cipher.
# This config item must be copied to
# the client config file as well.
;cipher BF-CBC        # Blowfish (default)
;cipher AES-128-CBC   # AES
;cipher DES-EDE3-CBC  # Triple-DES

# Enable compression on the VPN link.
# If you enable it here, you must also
# enable it in the client config file.
#comp-lzo

# The maximum number of concurrently connected
# clients we want to allow.
;max-clients 100

# It's a good idea to reduce the OpenVPN
# daemon's privileges after initialization.
#
# You can uncomment this out on
# non-Windows systems.
;user nobody
;group nobody

# The persist options will try to avoid
# accessing certain resources on restart
# that may no longer be accessible because
# of the privilege downgrade.
persist-key
persist-tun

# Output a short status file showing
# current connections, truncated
# and rewritten every minute.
status openvpn-status.log

# By default, log messages will go to the syslog (or
# on Windows, if running as a service, they will go to
# the "\Program Files\OpenVPN\log" directory).
# Use log or log-append to override this default.
# "log" will truncate the log file on OpenVPN startup,
# while "log-append" will append to it.  Use one
# or the other (but not both).
log         openvpn.log
;log-append  openvpn.log

# Set the appropriate level of log
# file verbosity.
#
# 0 is silent, except for fatal errors
# 4 is reasonable for general usage
# 5 and 6 can help to debug connection problems
# 9 is extremely verbose
verb 6

# Silence repeating messages.  At most 20
# sequential messages of the same message
# category will be output to the log.
;mute 20

My client openvpn configuration:


##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server.     #
#                                            #
# This configuration can be used by multiple #
# clients, however each client should have   #
# its own cert and key files.                #
#                                            #
# On Windows, you might want to rename this  #
# file so it has a .ovpn extension           #
##############################################

# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client

# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun

# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel
# if you have more than one.  On XP SP2,
# you may need to disable the firewall
# for the TAP adapter.
;dev-node MyTap

# Are we connecting to a TCP or
# UDP server?  Use the same setting as
# on the server.
;proto tcp
proto udp

# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote ***.***.***.*** 1194
;remote my-server-2 1194

# Choose a random host from the remote
# list for load-balancing.  Otherwise
# try hosts in the order specified.
;remote-random

# Keep trying indefinitely to resolve the
# host name of the OpenVPN server.  Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite

# Most clients don't need to bind to
# a specific local port number.
nobind

# Downgrade privileges after initialization (non-Windows only)
;user nobody
;group nobody

# Try to preserve some state across restarts.
persist-key
persist-tun

# If you are connecting through an
# HTTP proxy to reach the actual OpenVPN
# server, put the proxy server/IP and
# port number here.  See the man page
# if your proxy server requires
# authentication.
;http-proxy-retry # retry on connection failures
;http-proxy [proxy server] [proxy port #]

# Wireless networks often produce a lot
# of duplicate packets.  Set this flag
# to silence duplicate packet warnings.
;mute-replay-warnings

# SSL/TLS parms.
# See the server config file for more
# description.  It's best to use
# a separate .crt/.key file pair
# for each client.  A single ca
# file can be used for all clients.
#ca /storage/emulated/0/openvpnconf/ca.crt
#cert /storage/emulated/0/openvpnconf/client.crt
#key /storage/emulated/0/openvpnconf/client.key


# Verify server certificate by checking that the
# certicate has the correct key usage set.
# This is an important precaution to protect against
# a potential attack discussed here:
#  http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the keyUsage set to
#   digitalSignature, keyEncipherment
# and the extendedKeyUsage to
#   serverAuth
# EasyRSA can do this for you.
remote-cert-tls server

# If a tls-auth key is used on the server
# then every client must also have the key.
;tls-auth ta.key 1

# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
;cipher x

# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
#comp-lzo

# Set log file verbosity.
verb 5

# Silence repeating messages
;mute 20

pkcs12 /storage/emulated/0/openvpnconf/client.p12

Server verbosity mode 9 log in the beginning:

at Feb 27 22:14:18 2016 us=288081 Current Parameter Settings:
Sat Feb 27 22:14:18 2016 us=288179   config = '/etc/openvpn/server.conf'
Sat Feb 27 22:14:18 2016 us=288206   mode = 1
Sat Feb 27 22:14:18 2016 us=288229   persist_config = DISABLED
Sat Feb 27 22:14:18 2016 us=288252   persist_mode = 1
Sat Feb 27 22:14:18 2016 us=288275   show_ciphers = DISABLED
Sat Feb 27 22:14:18 2016 us=288297   show_digests = DISABLED
Sat Feb 27 22:14:18 2016 us=288318   show_engines = DISABLED
Sat Feb 27 22:14:18 2016 us=288341   genkey = DISABLED
Sat Feb 27 22:14:18 2016 us=288364   key_pass_file = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=288386   show_tls_ciphers = DISABLED
Sat Feb 27 22:14:18 2016 us=288409 Connection profiles [default]:
Sat Feb 27 22:14:18 2016 us=288431   proto = udp
Sat Feb 27 22:14:18 2016 us=288453   local = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=288476   local_port = 1194
Sat Feb 27 22:14:18 2016 us=288498   remote = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=288520   remote_port = 1194
Sat Feb 27 22:14:18 2016 us=288543   remote_float = DISABLED
Sat Feb 27 22:14:18 2016 us=288564   bind_defined = DISABLED
Sat Feb 27 22:14:18 2016 us=288586   bind_local = ENABLED
Sat Feb 27 22:14:18 2016 us=288609   connect_retry_seconds = 5
Sat Feb 27 22:14:18 2016 us=288631   connect_timeout = 10
Sat Feb 27 22:14:18 2016 us=288653   connect_retry_max = 0
Sat Feb 27 22:14:18 2016 us=288676   socks_proxy_server = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=288698   socks_proxy_port = 0
Sat Feb 27 22:14:18 2016 us=288720   socks_proxy_retry = DISABLED
Sat Feb 27 22:14:18 2016 us=288743   tun_mtu = 1500
Sat Feb 27 22:14:18 2016 us=288764   tun_mtu_defined = ENABLED
Sat Feb 27 22:14:18 2016 us=288787   link_mtu = 1500
Sat Feb 27 22:14:18 2016 us=288809   link_mtu_defined = DISABLED
Sat Feb 27 22:14:18 2016 us=288831   tun_mtu_extra = 0
Sat Feb 27 22:14:18 2016 us=288853   tun_mtu_extra_defined = DISABLED
Sat Feb 27 22:14:18 2016 us=288875   mtu_discover_type = -1
Sat Feb 27 22:14:18 2016 us=288897   fragment = 0
Sat Feb 27 22:14:18 2016 us=288920   mssfix = 1450
Sat Feb 27 22:14:18 2016 us=288942   explicit_exit_notification = 0
Sat Feb 27 22:14:18 2016 us=288964 Connection profiles END
Sat Feb 27 22:14:18 2016 us=288987   remote_random = DISABLED
Sat Feb 27 22:14:18 2016 us=289008   ipchange = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289030   dev = 'tun'
Sat Feb 27 22:14:18 2016 us=289053   dev_type = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289075   dev_node = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289097   lladdr = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289119   topology = 1
Sat Feb 27 22:14:18 2016 us=289141   tun_ipv6 = DISABLED
Sat Feb 27 22:14:18 2016 us=289163   ifconfig_local = '10.8.0.1'
Sat Feb 27 22:14:18 2016 us=289186   ifconfig_remote_netmask = '10.8.0.2'
Sat Feb 27 22:14:18 2016 us=289208   ifconfig_noexec = DISABLED
Sat Feb 27 22:14:18 2016 us=289230   ifconfig_nowarn = DISABLED
Sat Feb 27 22:14:18 2016 us=289253   ifconfig_ipv6_local = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289275   ifconfig_ipv6_netbits = 0
Sat Feb 27 22:14:18 2016 us=289297   ifconfig_ipv6_remote = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289320   shaper = 0
Sat Feb 27 22:14:18 2016 us=289342   mtu_test = 0
Sat Feb 27 22:14:18 2016 us=289364   mlock = DISABLED
Sat Feb 27 22:14:18 2016 us=289387   keepalive_ping = 10
Sat Feb 27 22:14:18 2016 us=289409   keepalive_timeout = 120
Sat Feb 27 22:14:18 2016 us=289431   inactivity_timeout = 0
Sat Feb 27 22:14:18 2016 us=289454   ping_send_timeout = 10
Sat Feb 27 22:14:18 2016 us=289476   ping_rec_timeout = 240
Sat Feb 27 22:14:18 2016 us=289498   ping_rec_timeout_action = 2
Sat Feb 27 22:14:18 2016 us=289520   ping_timer_remote = DISABLED
Sat Feb 27 22:14:18 2016 us=289542   remap_sigusr1 = 0
Sat Feb 27 22:14:18 2016 us=289564   persist_tun = ENABLED
Sat Feb 27 22:14:18 2016 us=289586   persist_local_ip = DISABLED
Sat Feb 27 22:14:18 2016 us=289608   persist_remote_ip = DISABLED
Sat Feb 27 22:14:18 2016 us=289630   persist_key = ENABLED
Sat Feb 27 22:14:18 2016 us=289653   passtos = DISABLED
Sat Feb 27 22:14:18 2016 us=289675   resolve_retry_seconds = 1000000000
Sat Feb 27 22:14:18 2016 us=289707   username = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289731   groupname = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289752   chroot_dir = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289778   cd_dir = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289800   writepid = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289822   up_script = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289846   down_script = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=289867   down_pre = DISABLED
Sat Feb 27 22:14:18 2016 us=289889   up_restart = DISABLED
Sat Feb 27 22:14:18 2016 us=289912   up_delay = DISABLED
Sat Feb 27 22:14:18 2016 us=289934   daemon = DISABLED
Sat Feb 27 22:14:18 2016 us=289956   inetd = 0
Sat Feb 27 22:14:18 2016 us=289979   log = ENABLED
Sat Feb 27 22:14:18 2016 us=290001   suppress_timestamps = DISABLED
Sat Feb 27 22:14:18 2016 us=290023   nice = 0
Sat Feb 27 22:14:18 2016 us=290047   verbosity = 9
Sat Feb 27 22:14:18 2016 us=290069   mute = 0
Sat Feb 27 22:14:18 2016 us=290091   gremlin = 0
Sat Feb 27 22:14:18 2016 us=290114   status_file = 'openvpn-status.log'
Sat Feb 27 22:14:18 2016 us=290136   status_file_version = 1
Sat Feb 27 22:14:18 2016 us=290159   status_file_update_freq = 60
Sat Feb 27 22:14:18 2016 us=290181   occ = ENABLED
Sat Feb 27 22:14:18 2016 us=290203   rcvbuf = 0
Sat Feb 27 22:14:18 2016 us=290226   sndbuf = 0
Sat Feb 27 22:14:18 2016 us=290248   mark = 0
Sat Feb 27 22:14:18 2016 us=290269   sockflags = 0
Sat Feb 27 22:14:18 2016 us=290292   fast_io = DISABLED
Sat Feb 27 22:14:18 2016 us=290314   lzo = 0
Sat Feb 27 22:14:18 2016 us=290336   route_script = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=290359   route_default_gateway = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=290382   route_default_metric = 0
Sat Feb 27 22:14:18 2016 us=290404   route_noexec = DISABLED
Sat Feb 27 22:14:18 2016 us=290427   route_delay = 0
Sat Feb 27 22:14:18 2016 us=290450   route_delay_window = 30
Sat Feb 27 22:14:18 2016 us=290473   route_delay_defined = DISABLED
Sat Feb 27 22:14:18 2016 us=290496   route_nopull = DISABLED
Sat Feb 27 22:14:18 2016 us=290518   route_gateway_via_dhcp = DISABLED
Sat Feb 27 22:14:18 2016 us=290541   max_routes = 100
Sat Feb 27 22:14:18 2016 us=290564   allow_pull_fqdn = DISABLED
Sat Feb 27 22:14:18 2016 us=290588   route 10.8.0.0/255.255.255.0/nil/nil
Sat Feb 27 22:14:18 2016 us=290610   management_addr = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=290634   management_port = 0
Sat Feb 27 22:14:18 2016 us=290656   management_user_pass = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=290679   management_log_history_cache = 250
Sat Feb 27 22:14:18 2016 us=290702   management_echo_buffer_size = 100
Sat Feb 27 22:14:18 2016 us=290724   management_write_peer_info_file = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=290748   management_client_user = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=290770   management_client_group = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=290794   management_flags = 0
Sat Feb 27 22:14:18 2016 us=290816   shared_secret_file = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=290838   key_direction = 0
Sat Feb 27 22:14:18 2016 us=290862   ciphername_defined = ENABLED
Sat Feb 27 22:14:18 2016 us=290884   ciphername = 'BF-CBC'
Sat Feb 27 22:14:18 2016 us=290907   authname_defined = ENABLED
Sat Feb 27 22:14:18 2016 us=290929   authname = 'SHA1'
Sat Feb 27 22:14:18 2016 us=290951   prng_hash = 'SHA1'
Sat Feb 27 22:14:18 2016 us=290974   prng_nonce_secret_len = 16
Sat Feb 27 22:14:18 2016 us=290997   keysize = 0
Sat Feb 27 22:14:18 2016 us=291019   engine = DISABLED
Sat Feb 27 22:14:18 2016 us=291041   replay = ENABLED
Sat Feb 27 22:14:18 2016 us=291064   mute_replay_warnings = DISABLED
Sat Feb 27 22:14:18 2016 us=291086   replay_window = 64
Sat Feb 27 22:14:18 2016 us=291155   replay_time = 15
Sat Feb 27 22:14:18 2016 us=291186   packet_id_file = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=291208   use_iv = ENABLED
Sat Feb 27 22:14:18 2016 us=291231   test_crypto = DISABLED
Sat Feb 27 22:14:18 2016 us=291253   tls_server = ENABLED
Sat Feb 27 22:14:18 2016 us=291275   tls_client = DISABLED
Sat Feb 27 22:14:18 2016 us=291299   key_method = 2
Sat Feb 27 22:14:18 2016 us=291332   ca_file = '/etc/openvpn/ca.crt'
Sat Feb 27 22:14:18 2016 us=291356   ca_path = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=291379   dh_file = '/etc/openvpn/dh2048.pem'
Sat Feb 27 22:14:18 2016 us=291401   cert_file = '/etc/openvpn/archsrv.crt'
Sat Feb 27 22:14:18 2016 us=291425   extra_certs_file = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=291448   priv_key_file = '/etc/openvpn/archsrv.key'
Sat Feb 27 22:14:18 2016 us=291470   pkcs12_file = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=291493   cipher_list = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=291515   tls_verify = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=291538   tls_export_cert = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=291561   verify_x509_type = 0
Sat Feb 27 22:14:18 2016 us=291583   verify_x509_name = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=291605   crl_file = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=291629   ns_cert_type = 0
Sat Feb 27 22:14:18 2016 us=291651   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291673   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291697   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291719   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291741   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291764   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291786   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291808   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291831   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291854   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291876   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291899   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291922   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291944   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291967   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=291989   remote_cert_ku[i] = 0
Sat Feb 27 22:14:18 2016 us=292011   remote_cert_eku = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=292034   ssl_flags = 0
Sat Feb 27 22:14:18 2016 us=292057   tls_timeout = 2
Sat Feb 27 22:14:18 2016 us=292079   renegotiate_bytes = 0
Sat Feb 27 22:14:18 2016 us=292102   renegotiate_packets = 0
Sat Feb 27 22:14:18 2016 us=292125   renegotiate_seconds = 3600
Sat Feb 27 22:14:18 2016 us=292147   handshake_window = 60
Sat Feb 27 22:14:18 2016 us=292170   transition_window = 3600
Sat Feb 27 22:14:18 2016 us=292192   single_session = DISABLED
Sat Feb 27 22:14:18 2016 us=292215   push_peer_info = DISABLED
Sat Feb 27 22:14:18 2016 us=292237   tls_exit = DISABLED
Sat Feb 27 22:14:18 2016 us=292259   tls_auth_file = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=292285   server_network = 10.8.0.0
Sat Feb 27 22:14:18 2016 us=292309   server_netmask = 255.255.255.0
Sat Feb 27 22:14:18 2016 us=292338   server_network_ipv6 = ::
Sat Feb 27 22:14:18 2016 us=292362   server_netbits_ipv6 = 0
Sat Feb 27 22:14:18 2016 us=292387   server_bridge_ip = 0.0.0.0
Sat Feb 27 22:14:18 2016 us=292412   server_bridge_netmask = 0.0.0.0
Sat Feb 27 22:14:18 2016 us=292437   server_bridge_pool_start = 0.0.0.0
Sat Feb 27 22:14:18 2016 us=292463   server_bridge_pool_end = 0.0.0.0
Sat Feb 27 22:14:18 2016 us=292486   push_entry = 'redirect-gateway def1 bypass-dhcp'
Sat Feb 27 22:14:18 2016 us=292510   push_entry = 'dhcp-option DNS 10.8.0.1'
Sat Feb 27 22:14:18 2016 us=292532   push_entry = 'route 10.8.0.1'
Sat Feb 27 22:14:18 2016 us=292554   push_entry = 'topology net30'
Sat Feb 27 22:14:18 2016 us=292578   push_entry = 'ping 10'
Sat Feb 27 22:14:18 2016 us=292600   push_entry = 'ping-restart 120'
Sat Feb 27 22:14:18 2016 us=292623   ifconfig_pool_defined = ENABLED
Sat Feb 27 22:14:18 2016 us=292648   ifconfig_pool_start = 10.8.0.4
Sat Feb 27 22:14:18 2016 us=292673   ifconfig_pool_end = 10.8.0.251
Sat Feb 27 22:14:18 2016 us=292699   ifconfig_pool_netmask = 0.0.0.0
Sat Feb 27 22:14:18 2016 us=292721   ifconfig_pool_persist_filename = 'ipp.txt'
Sat Feb 27 22:14:18 2016 us=292745   ifconfig_pool_persist_refresh_freq = 600
Sat Feb 27 22:14:18 2016 us=292768   ifconfig_ipv6_pool_defined = DISABLED
Sat Feb 27 22:14:18 2016 us=292793   ifconfig_ipv6_pool_base = ::
Sat Feb 27 22:14:18 2016 us=292825   ifconfig_ipv6_pool_netbits = 0
Sat Feb 27 22:14:18 2016 us=292849   n_bcast_buf = 256
Sat Feb 27 22:14:18 2016 us=292871   tcp_queue_limit = 64
Sat Feb 27 22:14:18 2016 us=292895   real_hash_size = 256
Sat Feb 27 22:14:18 2016 us=292918   virtual_hash_size = 256
Sat Feb 27 22:14:18 2016 us=292940   client_connect_script = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=292963   learn_address_script = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=292986   client_disconnect_script = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=293009   client_config_dir = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=293032   ccd_exclusive = DISABLED
Sat Feb 27 22:14:18 2016 us=293054   tmp_dir = '/tmp'
Sat Feb 27 22:14:18 2016 us=293077   push_ifconfig_defined = DISABLED
Sat Feb 27 22:14:18 2016 us=293102   push_ifconfig_local = 0.0.0.0
Sat Feb 27 22:14:18 2016 us=293127   push_ifconfig_remote_netmask = 0.0.0.0
Sat Feb 27 22:14:18 2016 us=293149   push_ifconfig_ipv6_defined = DISABLED
Sat Feb 27 22:14:18 2016 us=293174   push_ifconfig_ipv6_local = ::/0
Sat Feb 27 22:14:18 2016 us=293198   push_ifconfig_ipv6_remote = ::
Sat Feb 27 22:14:18 2016 us=293220   enable_c2c = DISABLED
Sat Feb 27 22:14:18 2016 us=293244   duplicate_cn = DISABLED
Sat Feb 27 22:14:18 2016 us=293266   cf_max = 0
Sat Feb 27 22:14:18 2016 us=293289   cf_per = 0
Sat Feb 27 22:14:18 2016 us=293312   max_clients = 1024
Sat Feb 27 22:14:18 2016 us=293335   max_routes_per_client = 256
Sat Feb 27 22:14:18 2016 us=293357   auth_user_pass_verify_script = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=293381   auth_user_pass_verify_script_via_file = DISABLED
Sat Feb 27 22:14:18 2016 us=293404   port_share_host = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=293426   port_share_port = 0
Sat Feb 27 22:14:18 2016 us=293450   client = DISABLED
Sat Feb 27 22:14:18 2016 us=293472   pull = DISABLED
Sat Feb 27 22:14:18 2016 us=293495   auth_user_pass_file = '[UNDEF]'
Sat Feb 27 22:14:18 2016 us=293520 OpenVPN 2.3.9 i686-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Mar  3 2016
Sat Feb 27 22:14:18 2016 us=293555 library versions: OpenSSL 1.0.2g  1 Mar 2016, LZO 2.09
Sat Feb 27 22:14:18 2016 us=293756 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x.  Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Sat Feb 27 22:14:18 2016 us=294221 Diffie-Hellman initialized with 2048 bit key
Sat Feb 27 22:14:18 2016 us=294970 PRNG init md=SHA1 size=36
Sat Feb 27 22:14:18 2016 us=295012 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 40 bytes
Sat Feb 27 22:14:18 2016 us=295044 TLS-Auth MTU parms [ L:1541 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 22:14:18 2016 us=295068 MTU DYNAMIC mtu=1450, flags=2, 1541 -> 1450
Sat Feb 27 22:14:18 2016 us=295103 Socket Buffers: R=[163840->163840] S=[163840->163840]
Sat Feb 27 22:14:18 2016 us=295250 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp2s8 HWADDR=00:13:d4:d0:db:1e
Sat Feb 27 22:14:18 2016 us=296096 TUN/TAP device tun0 opened
Sat Feb 27 22:14:18 2016 us=296158 TUN/TAP TX queue length set to 100
Sat Feb 27 22:14:18 2016 us=296206 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Feb 27 22:14:18 2016 us=296280 /usr/bin/ip link set dev tun0 up mtu 1500
Sat Feb 27 22:14:18 2016 us=298557 /usr/bin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2
Sat Feb 27 22:14:18 2016 us=300802 /usr/bin/ip route add 10.8.0.0/24 via 10.8.0.2
Sat Feb 27 22:14:18 2016 us=304478 Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:12 ET:0 EL:3 ]
Sat Feb 27 22:14:18 2016 us=304559 UDPv4 link local (bound): [undef]
Sat Feb 27 22:14:18 2016 us=304597 UDPv4 link remote: [undef]
Sat Feb 27 22:14:18 2016 us=304639 MULTI: multi_init called, r=256 v=256
Sat Feb 27 22:14:18 2016 us=304725 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Sat Feb 27 22:14:18 2016 us=304779 ifconfig_pool_read(), in='client,10.8.0.4', TODO: IPv6
Sat Feb 27 22:14:18 2016 us=304817 succeeded -> ifconfig_pool_set()
Sat Feb 27 22:14:18 2016 us=304877 IFCONFIG POOL LIST
Sat Feb 27 22:14:18 2016 us=304913 client,10.8.0.4
Sat Feb 27 22:14:18 2016 us=304967 PO_INIT maxevents=4 flags=0x00000002
Sat Feb 27 22:14:18 2016 us=305019 Initialization Sequence Completed
Sat Feb 27 22:14:18 2016 us=305053 SCHEDULE: schedule_find_least NULL
Sat Feb 27 22:14:18 2016 us=305087 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:14:18 2016 us=305122 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:14:18 2016 us=305163 I/O WAIT TR|Tw|SR|Sw [10/0]
Sat Feb 27 22:14:28 2016 us=315233  event_wait returned 0
Sat Feb 27 22:14:28 2016 us=315299 I/O WAIT status=0x0020
Sat Feb 27 22:14:28 2016 us=315326 MULTI: REAP range 0 -> 16
Sat Feb 27 22:14:28 2016 us=315512 SCHEDULE: schedule_find_least NULL
Sat Feb 27 22:14:28 2016 us=315537 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:14:28 2016 us=315560 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:14:28 2016 us=315588 I/O WAIT TR|Tw|SR|Sw [10/0]
Sat Feb 27 22:14:38 2016 us=325639  event_wait returned 0
Sat Feb 27 22:14:38 2016 us=325702 I/O WAIT status=0x0020
Sat Feb 27 22:14:38 2016 us=325728 MULTI: REAP range 16 -> 32
Sat Feb 27 22:14:38 2016 us=325752 SCHEDULE: schedule_find_least NULL
Sat Feb 27 22:14:38 2016 us=325777 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:14:38 2016 us=325799 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:14:38 2016 us=325827 I/O WAIT TR|Tw|SR|Sw [10/0]
Sat Feb 27 22:14:48 2016 us=335878  event_wait returned 0
Sat Feb 27 22:14:48 2016 us=335939 I/O WAIT status=0x0020
Sat Feb 27 22:14:48 2016 us=335966 MULTI: REAP range 32 -> 48
Sat Feb 27 22:14:48 2016 us=335989 SCHEDULE: schedule_find_least NULL
Sat Feb 27 22:14:48 2016 us=336013 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:14:48 2016 us=336036 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:14:48 2016 us=336064 I/O WAIT TR|Tw|SR|Sw [10/0]
Sat Feb 27 22:14:58 2016 us=346114  event_wait returned 0
Sat Feb 27 22:14:58 2016 us=346179 I/O WAIT status=0x0020
Sat Feb 27 22:14:58 2016 us=346207 MULTI: REAP range 48 -> 64
Sat Feb 27 22:14:58 2016 us=346232 SCHEDULE: schedule_find_least NULL
Sat Feb 27 22:14:58 2016 us=346257 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:14:58 2016 us=346280 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:14:58 2016 us=346309 I/O WAIT TR|Tw|SR|Sw [10/0]
Sat Feb 27 22:15:08 2016 us=356361  event_wait returned 0
Sat Feb 27 22:15:08 2016 us=356427 I/O WAIT status=0x0020
Sat Feb 27 22:15:08 2016 us=356455 MULTI: REAP range 64 -> 80
Sat Feb 27 22:15:08 2016 us=356481 SCHEDULE: schedule_find_least NULL
Sat Feb 27 22:15:08 2016 us=356506 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:15:08 2016 us=356531 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:15:08 2016 us=356560 I/O WAIT TR|Tw|SR|Sw [10/0]
Sat Feb 27 22:15:18 2016 us=366611  event_wait returned 0
Sat Feb 27 22:15:18 2016 us=366672 I/O WAIT status=0x0020
Sat Feb 27 22:15:18 2016 us=366699 MULTI: REAP range 80 -> 96
Sat Feb 27 22:15:18 2016 us=366724 SCHEDULE: schedule_find_least NULL
Sat Feb 27 22:15:18 2016 us=366749 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:15:18 2016 us=366772 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:15:18 2016 us=366801 I/O WAIT TR|Tw|SR|Sw [10/0]
Sat Feb 27 22:15:28 2016 us=376852  event_wait returned 0
Sat Feb 27 22:15:28 2016 us=376914 I/O WAIT status=0x0020
Sat Feb 27 22:15:28 2016 us=376940 MULTI: REAP range 96 -> 112
Sat Feb 27 22:15:28 2016 us=377059 SCHEDULE: schedule_find_least NULL
Sat Feb 27 22:15:28 2016 us=377086 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:15:28 2016 us=377110 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:15:28 2016 us=377138 I/O WAIT TR|Tw|SR|Sw [10/0]
Sat Feb 27 22:15:36 2016 us=290521 PO_WAIT[0,0] fd=5 rev=0x00000001 rwflags=0x0001 arg=0x080ff608 
Sat Feb 27 22:15:36 2016 us=290588  event_wait returned 1
Sat Feb 27 22:15:36 2016 us=290615 I/O WAIT status=0x0001
Sat Feb 27 22:15:36 2016 us=290639 MULTI: REAP range 112 -> 128
Sat Feb 27 22:15:36 2016 us=290679 UDPv4 read returned 14
Sat Feb 27 22:15:36 2016 us=290722 MULTI: multi_create_instance called
Sat Feb 27 22:15:36 2016 us=290785 ***.***.***.***:11324 Re-using SSL/TLS context
Sat Feb 27 22:15:36 2016 us=290811 ***.***.***.***:11324 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 40 bytes
Sat Feb 27 22:15:36 2016 us=290839 ***.***.***.***:11324 TLS: tls_session_init: entry
Sat Feb 27 22:15:36 2016 us=290872 ***.***.***.***:11324 PID packet_id_init tcp_mode=0 seq_backtrack=64 time_backtrack=15
Sat Feb 27 22:15:36 2016 us=290983 ***.***.***.***:11324 PID packet_id_init tcp_mode=0 seq_backtrack=64 time_backtrack=15
Sat Feb 27 22:15:36 2016 us=291009 ***.***.***.***:11324 TLS: tls_session_init: new session object, sid=0d3e4041 45eb75dd
Sat Feb 27 22:15:36 2016 us=291031 ***.***.***.***:11324 TLS: tls_session_init: entry
Sat Feb 27 22:15:36 2016 us=291056 ***.***.***.***:11324 PID packet_id_init tcp_mode=0 seq_backtrack=64 time_backtrack=15
Sat Feb 27 22:15:36 2016 us=291173 ***.***.***.***:11324 PID packet_id_init tcp_mode=0 seq_backtrack=64 time_backtrack=15
Sat Feb 27 22:15:36 2016 us=291203 ***.***.***.***:11324 TLS: tls_session_init: new session object, sid=00120bff cfe4179c
Sat Feb 27 22:15:36 2016 us=291231 ***.***.***.***:11324 Control Channel MTU parms [ L:1541 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Feb 27 22:15:36 2016 us=291253 ***.***.***.***:11324 MTU DYNAMIC mtu=1450, flags=2, 1541 -> 1450
Sat Feb 27 22:15:36 2016 us=291279 ***.***.***.***:11324 Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:12 ET:0 EL:3 ]
Sat Feb 27 22:15:36 2016 us=291337 ***.***.***.***:11324 Local Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Sat Feb 27 22:15:36 2016 us=291360 ***.***.***.***:11324 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Sat Feb 27 22:15:36 2016 us=291397 ***.***.***.***:11324 Local Options hash (VER=V4): '239669a8'
Sat Feb 27 22:15:36 2016 us=291430 ***.***.***.***:11324 Expected Remote Options hash (VER=V4): '3514370b'
Sat Feb 27 22:15:36 2016 us=291458 ***.***.***.***:11324 SENT PING
Sat Feb 27 22:15:36 2016 us=291480 ***.***.***.***:11324 TIMER: coarse timer wakeup 1 seconds
Sat Feb 27 22:15:36 2016 us=291519 ***.***.***.***:11324 TLS: tls_multi_process: i=0 state=S_INITIAL, mysid=0d3e4041 45eb75dd, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=291549 ***.***.***.***:11324 TLS: tls_multi_process: i=1 state=S_INITIAL, mysid=00120bff cfe4179c, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=291580 ***.***.***.***:11324 TLS: tls_multi_process: i=2 state=S_UNDEF, mysid=00000000 00000000, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=291608 ***.***.***.***:11324 RANDOM USEC=75565
Sat Feb 27 22:15:36 2016 us=291642 ***.***.***.***:11324 SCHEDULE: schedule_add_modify wakeup=[Sat Feb 27 22:15:37 2016 us=367192] pri=0
Sat Feb 27 22:15:36 2016 us=291671 ***.***.***.***:11324 GET INST BY REAL: 62.140.137.125:11324 [created]
Sat Feb 27 22:15:36 2016 us=291708 ***.***.***.***:11324 UDPv4 READ [14] from [AF_INET]62.140.137.125:11324: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=996ad152 a793e64e [ ] pid=0 DATA 
Sat Feb 27 22:15:36 2016 us=291734 ***.***.***.***:11324 TLS: control channel, op=P_CONTROL_HARD_RESET_CLIENT_V2, IP=[AF_INET]62.140.137.125:11324
Sat Feb 27 22:15:36 2016 us=291773 ***.***.***.***:11324 TLS: initial packet test, i=0 state=S_INITIAL, mysid=0d3e4041 45eb75dd, rec-sid=996ad152 a793e64e, rec-ip=[AF_INET]62.140.137.125:11324, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=291816 ***.***.***.***:11324 TLS: initial packet test, i=1 state=S_INITIAL, mysid=00120bff cfe4179c, rec-sid=996ad152 a793e64e, rec-ip=[AF_INET]***.***.***.***:11324, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=291855 ***.***.***.***:11324 TLS: initial packet test, i=2 state=S_UNDEF, mysid=00000000 00000000, rec-sid=996ad152 a793e64e, rec-ip=[AF_INET]***.***.***.***:11324, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=291896 ***.***.***.***:11324 TLS: Initial packet from [AF_INET]***.***.***.***:11324, sid=996ad152 a793e64e
Sat Feb 27 22:15:36 2016 us=291922 ***.***.***.***:11324 TLS: received control channel packet s#=0 sid=996ad152 a793e64e
Sat Feb 27 22:15:36 2016 us=291944 ***.***.***.***:11324 ACK reliable_schedule_now
Sat Feb 27 22:15:36 2016 us=291967 ***.***.***.***:11324 ACK read ID 0 (buf->len=0)
Sat Feb 27 22:15:36 2016 us=291990 ***.***.***.***:11324 ACK RWBS rel->size=8 rel->packet_id=00000000 id=00000000 ret=1

Sat Feb 27 22:15:36 2016 us=292012 ***.***.***.***:11324 ACK mark active incoming ID 0
Sat Feb 27 22:15:36 2016 us=292033 ***.***.***.***:11324 ACK acknowledge ID 0 (ack->len=1)
Sat Feb 27 22:15:36 2016 us=292073 ***.***.***.***:11324 TLS: tls_multi_process: i=0 state=S_INITIAL, mysid=0d3e4041 45eb75dd, stored-sid=996ad152 a793e64e, stored-ip=[AF_INET]62.140.137.125:11324
Sat Feb 27 22:15:36 2016 us=292097 ***.***.***.***:11324 TLS: tls_process: chg=0 ks=S_INITIAL lame=S_UNDEF to_link->len=0 wakeup=604800
Sat Feb 27 22:15:36 2016 us=292120 ***.***.***.***:11324 ACK mark active outgoing ID 0
Sat Feb 27 22:15:36 2016 us=292145 ***.***.***.***:11324 TLS: Initial Handshake, sid=0d3e4041 45eb75dd
Sat Feb 27 22:15:36 2016 us=292170 ***.***.***.***:11324 ACK reliable_can_send active=1 current=1 : [1] 0
Sat Feb 27 22:15:36 2016 us=292193 ***.***.***.***:11324 ACK reliable_send ID 0 (size=4 to=2)
Sat Feb 27 22:15:36 2016 us=292215 ***.***.***.***:11324 ACK write ID 0 (ack->len=1, n=1)
Sat Feb 27 22:15:36 2016 us=292237 ***.***.***.***:11324 Reliable -> TCP/UDP
Sat Feb 27 22:15:36 2016 us=292261 ***.***.***.***:11324 ACK reliable_send_timeout 2 [1] 0
Sat Feb 27 22:15:36 2016 us=292283 ***.***.***.***:11324 TLS: tls_process: timeout set to 2
Sat Feb 27 22:15:36 2016 us=292315 ***.***.***.***:11324 TLS: tls_multi_process: i=1 state=S_INITIAL, mysid=00120bff cfe4179c, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=292346 ***.***.***.***:11324 TLS: tls_multi_process: i=2 state=S_UNDEF, mysid=00000000 00000000, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=292383 SCHEDULE: schedule_find_least wakeup=[Sat Feb 27 22:15:37 2016 us=367192] pri=945732764
Sat Feb 27 22:15:36 2016 us=292407 PO_CTL rwflags=0x0002 ev=5 arg=0x080ff608
Sat Feb 27 22:15:36 2016 us=292429 PO_CTL rwflags=0x0000 ev=6 arg=0x080ff568
Sat Feb 27 22:15:36 2016 us=292456 I/O WAIT Tr|Tw|Sr|SW [1/74790]
Sat Feb 27 22:15:36 2016 us=292483 PO_WAIT[0,0] fd=5 rev=0x00000004 rwflags=0x0002 arg=0x080ff608 
Sat Feb 27 22:15:36 2016 us=292505  event_wait returned 1
Sat Feb 27 22:15:36 2016 us=292526 I/O WAIT status=0x0002
Sat Feb 27 22:15:36 2016 us=292565 ***.***.***.***:11324 UDPv4 WRITE [26] to [AF_INET]***.***.***.***:11324: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 sid=0d3e4041 45eb75dd [ 0 sid=996ad152 a793e64e ] pid=0 DATA 
Sat Feb 27 22:15:36 2016 us=292623 ***.***.***.***:11324 UDPv4 write returned 26
Sat Feb 27 22:15:36 2016 us=292660 ***.***.***.***:11324 TLS: tls_multi_process: i=0 state=S_PRE_START, mysid=0d3e4041 45eb75dd, stored-sid=996ad152 a793e64e, stored-ip=[AF_INET]***.***.***.***:11324
Sat Feb 27 22:15:36 2016 us=292684 ***.***.***.***:11324 TLS: tls_process: chg=0 ks=S_PRE_START lame=S_UNDEF to_link->len=0 wakeup=604800
Sat Feb 27 22:15:36 2016 us=292708 ***.***.***.***:11324 ACK reliable_can_send active=1 current=0 : [1] 0
Sat Feb 27 22:15:36 2016 us=292729 ***.***.***.***:11324 Incoming Ciphertext -> TLS
Sat Feb 27 22:15:36 2016 us=292799 ***.***.***.***:11324 SSL state (accept): before/accept initialization
Sat Feb 27 22:15:36 2016 us=292850 ***.***.***.***:11324 TLS: tls_process: chg=1 ks=S_PRE_START lame=S_UNDEF to_link->len=0 wakeup=604800
Sat Feb 27 22:15:36 2016 us=292875 ***.***.***.***:11324 ACK reliable_can_send active=1 current=0 : [1] 0
Sat Feb 27 22:15:36 2016 us=292905 ***.***.***.***:11324 ACK reliable_send_timeout 2 [1] 0
Sat Feb 27 22:15:36 2016 us=292927 ***.***.***.***:11324 TLS: tls_process: timeout set to 2
Sat Feb 27 22:15:36 2016 us=292970 ***.***.***.***:11324 TLS: tls_multi_process: i=1 state=S_INITIAL, mysid=00120bff cfe4179c, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=293002 62.140.137.125:11324 TLS: tls_multi_process: i=2 state=S_UNDEF, mysid=00000000 00000000, stored-sid=00000000 00000000, stored-ip=[undef]
Sat Feb 27 22:15:36 2016 us=293029 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:15:36 2016 us=293051 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:15:36 2016 us=293077 I/O WAIT TR|Tw|SR|Sw [1/74169]
Sat Feb 27 22:15:36 2016 us=340974 PO_WAIT[0,0] fd=5 rev=0x00000001 rwflags=0x0001 arg=0x080ff608 
Sat Feb 27 22:15:36 2016 us=341004  event_wait returned 1
Sat Feb 27 22:15:36 2016 us=341035 I/O WAIT status=0x0001
Sat Feb 27 22:15:36 2016 us=341061 UDPv4 read returned 26

Server verbosity mode 9 log that I truncated in the end  :

Sat Feb 27 22:16:04 2016 us=642645 I/O WAIT status=0x0001
Sat Feb 27 22:16:04 2016 us=642670 UDPv4 read returned 101
Sat Feb 27 22:16:04 2016 us=642696 GET INST BY REAL: ***.***.***.***:11324 [succeeded]
Sat Feb 27 22:16:04 2016 us=642769 client/***.***.***.***:11324 UDPv4 READ [101] from [AF_INET]***.***.***.***:11324: P_DATA_V1 kid=0 DATA 6e6c6d18 1e070da1 21c927da 524d47ba c9cf26a3 cf1bf258 15ed4cc8 0ba2642[more...]
Sat Feb 27 22:16:04 2016 us=642796 client/***.***.***.***:11324 TLS: tls_pre_decrypt, key_id=0, IP=[AF_INET]***.***.***.***:11324
Sat Feb 27 22:16:04 2016 us=642825 client/***.***.***.***:11324 DECRYPT IV: cf1bf258 15ed4cc8
Sat Feb 27 22:16:04 2016 us=642882 client/***.***.***.***:11324 DECRYPT TO: 00000065 45000041 288f4000 4011fe06 0a080006 0a080001 30470035 002d42a[more...]
Sat Feb 27 22:16:04 2016 us=642925 client/***.***.***.***:11324 PID_TEST [0] [SSL-0] [00000000111111111111555555556666666666666>>>>>>>>>>>>>>>>>>>>>>>] 0:100 0:101 t=1456607764[0] r=[0,64,15,0,1] sl=[28,64,64,272]
Sat Feb 27 22:16:04 2016 us=642959 client/***.***.***.***:11324 GET INST BY VIRT: 10.8.0.6 -> client/***.***.***.***:11324 via 10.8.0.6
Sat Feb 27 22:16:04 2016 us=642984 PO_CTL rwflags=0x0000 ev=5 arg=0x080ff608
Sat Feb 27 22:16:04 2016 us=643008 PO_CTL rwflags=0x0002 ev=6 arg=0x080ff568
Sat Feb 27 22:16:04 2016 us=643035 I/O WAIT Tr|TW|Sr|Sw [4/106108]
Sat Feb 27 22:16:04 2016 us=643062 PO_WAIT[1,0] fd=6 rev=0x00000004 rwflags=0x0002 arg=0x080ff568 
Sat Feb 27 22:16:04 2016 us=643084  event_wait returned 1
Sat Feb 27 22:16:04 2016 us=643107 I/O WAIT status=0x0008
Sat Feb 27 22:16:04 2016 us=643129 client/***.***.***.***:11324 TUN WRITE [65]
Sat Feb 27 22:16:04 2016 us=643167 client/***.***.***.***:11324  write to TUN/TAP returned 65
Sat Feb 27 22:16:04 2016 us=643192 PO_CTL rwflags=0x0001 ev=5 arg=0x080ff608
Sat Feb 27 22:16:04 2016 us=643215 PO_CTL rwflags=0x0001 ev=6 arg=0x080ff568
Sat Feb 27 22:16:04 2016 us=643241 I/O WAIT TR|Tw|SR|Sw [4/106108]
Sat Feb 27 22:16:05 2016 us=155452  event_wait returned -1

Last edited by Xenios (2016-04-14 14:47:56)

Offline

Board footer

Powered by FluxBB