Jump to content
Not connected, Your IP: 34.230.77.67
NL99

Opnsense install - status: down

Recommended Posts

I am trying to get airvpn running on my new opnsense install but no success so far. This is the guide i followed and quite some options in the setup menu are not in the guide. Maybe because this was written for an older opnsense version. I did exactly what was in the guide and nothing more. Maybe the point is that i`m behind a non-bridged modemrouter? I forwarded port 443 udp and tcp to the opnsense wan (192.168.0.20). Everything after the modemrouter is 192.168.0.x and the lan behind the opnsense system gets 192.168.1.x

 

The guide says, at step 5 the status should be up.

 

This is the log i get:

 

Feb 25 02:40:45     openvpn[86654]: MANAGEMENT: Client disconnected
Feb 25 02:40:45     openvpn[86654]: MANAGEMENT: CMD 'state 1'
Feb 25 02:40:45     openvpn[86654]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 25 02:40:15     openvpn[86654]: MANAGEMENT: Client disconnected
Feb 25 02:40:15     openvpn[86654]: MANAGEMENT: CMD 'state 1'
Feb 25 02:40:15     openvpn[86654]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 25 02:40:14     openvpn[86654]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Feb 25 02:40:14     openvpn[86654]: VERIFY EKU OK
Feb 25 02:40:14     openvpn[86654]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 25 02:40:14     openvpn[86654]: Validating certificate extended key usage
Feb 25 02:40:14     openvpn[86654]: VERIFY KU OK
Feb 25 02:40:14     openvpn[86654]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Feb 25 02:40:14     openvpn[86654]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=c0b00d21 453258cb
Feb 25 02:40:14     openvpn[86654]: UDP link remote: [AF_INET]194.187.251.154:443
Feb 25 02:40:14     openvpn[86654]: UDP link local (bound): [AF_INET]192.168.0.20:0
Feb 25 02:40:14     openvpn[86654]: Socket Buffers: R=[42080->42080] S=[57344->57344]
Feb 25 02:40:14     openvpn[86654]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443
Feb 25 02:40:14     openvpn[86654]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Feb 25 02:40:14     openvpn[86654]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Feb 25 02:40:14     openvpn[86654]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 25 02:40:14     openvpn[86654]: MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1.sock
Feb 25 02:40:14     openvpn[86616]: library versions: OpenSSL 1.0.2n 7 Dec 2017, LZO 2.10
Feb 25 02:40:14     openvpn[86616]: OpenVPN 2.4.4 amd64-portbld-freebsd11.1 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jan 22 2018
Feb 25 02:38:49     openvpn[68218]: SIGTERM[hard,] received, process exiting
Feb 25 02:38:49     openvpn[68218]: event_wait : Interrupted system call (code=4)
Feb 25 02:38:47     openvpn[68218]: MANAGEMENT: Client disconnected
Feb 25 02:38:47     openvpn[68218]: MANAGEMENT: CMD 'state 1'
Feb 25 02:38:47     openvpn[68218]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 25 02:37:59     openvpn[68218]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Feb 25 02:37:59     openvpn[68218]: VERIFY EKU OK
Feb 25 02:37:59     openvpn[68218]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 25 02:37:59     openvpn[68218]: Validating certificate extended key usage
Feb 25 02:37:59     openvpn[68218]: VERIFY KU OK
Feb 25 02:37:59     openvpn[68218]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Feb 25 02:37:59     openvpn[68218]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=37214535 dc5a7495
Feb 25 02:37:59     openvpn[68218]: UDP link remote: [AF_INET]194.187.251.154:443
Feb 25 02:37:59     openvpn[68218]: UDP link local (bound): [AF_INET]192.168.0.20:0
Feb 25 02:37:59     openvpn[68218]: Socket Buffers: R=[42080->42080] S=[57344->57344]
Feb 25 02:37:59     openvpn[68218]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443
Feb 25 02:37:59     openvpn[68218]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 25 02:37:49     openvpn[68218]: Restart pause, 10 second(s)
Feb 25 02:37:49     openvpn[68218]: SIGUSR1[soft,tls-error] received, process restarting
Feb 25 02:37:49     openvpn[68218]: TLS Error: TLS handshake failed
Feb 25 02:37:49     openvpn[68218]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Feb 25 02:37:35     openvpn[68218]: MANAGEMENT: Client disconnected
Feb 25 02:37:35     openvpn[68218]: MANAGEMENT: CMD 'state 1'
Feb 25 02:37:35     openvpn[68218]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 25 02:36:49     openvpn[68218]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Feb 25 02:36:49     openvpn[68218]: VERIFY EKU OK
Feb 25 02:36:49     openvpn[68218]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

 

Little later:

 

Feb 25 03:00:12     openvpn[86654]: MANAGEMENT: Client disconnected
Feb 25 03:00:12     openvpn[86654]: MANAGEMENT: CMD 'state 1'
Feb 25 03:00:12     openvpn[86654]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 25 02:55:44     openvpn[86654]: Restart pause, 300 second(s)
Feb 25 02:55:44     openvpn[86654]: SIGUSR1[soft,ping-restart] received, process restarting
Feb 25 02:55:44     openvpn[86654]: [server] Inactivity timeout (--ping-restart), restarting
Feb 25 02:54:44     openvpn[86654]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Feb 25 02:54:44     openvpn[86654]: VERIFY EKU OK
Feb 25 02:54:44     openvpn[86654]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 25 02:54:44     openvpn[86654]: Validating certificate extended key usage
Feb 25 02:54:44     openvpn[86654]: VERIFY KU OK
Feb 25 02:54:44     openvpn[86654]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Feb 25 02:54:44     openvpn[86654]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=263f3cd0 cd08c14b
Feb 25 02:54:44     openvpn[86654]: UDP link remote: [AF_INET]194.187.251.154:443
Feb 25 02:54:44     openvpn[86654]: UDP link local (bound): [AF_INET]192.168.0.20:0
Feb 25 02:54:44     openvpn[86654]: Socket Buffers: R=[42080->42080] S=[57344->57344]
Feb 25 02:54:44     openvpn[86654]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443
Feb 25 02:54:44     openvpn[86654]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 25 02:52:04     openvpn[86654]: Restart pause, 160 second(s)
Feb 25 02:52:04     openvpn[86654]: SIGUSR1[soft,ping-restart] received, process restarting
Feb 25 02:52:04     openvpn[86654]: [server] Inactivity timeout (--ping-restart), restarting
Feb 25 02:51:04     openvpn[86654]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Feb 25 02:51:04     openvpn[86654]: VERIFY EKU OK
Feb 25 02:51:04     openvpn[86654]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 25 02:51:04     openvpn[86654]: Validating certificate extended key usage
Feb 25 02:51:04     openvpn[86654]: VERIFY KU OK
Feb 25 02:51:04     openvpn[86654]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Feb 25 02:51:04     openvpn[86654]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=c6a2dfeb 08c736d9
Feb 25 02:51:04     openvpn[86654]: UDP link remote: [AF_INET]194.187.251.154:443
Feb 25 02:51:04     openvpn[86654]: UDP link local (bound): [AF_INET]192.168.0.20:0
Feb 25 02:51:04     openvpn[86654]: Socket Buffers: R=[42080->42080] S=[57344->57344]
Feb 25 02:51:04     openvpn[86654]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443
Feb 25 02:51:04     openvpn[86654]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 25 02:49:44     openvpn[86654]: Restart pause, 80 second(s)
Feb 25 02:49:44     openvpn[86654]: SIGUSR1[soft,ping-restart] received, process restarting
Feb 25 02:49:44     openvpn[86654]: [server] Inactivity timeout (--ping-restart), restarting
Feb 25 02:48:44     openvpn[86654]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Feb 25 02:48:44     openvpn[86654]: VERIFY EKU OK
Feb 25 02:48:44     openvpn[86654]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 25 02:48:44     openvpn[86654]: Validating certificate extended key usage
Feb 25 02:48:44     openvpn[86654]: VERIFY KU OK
Feb 25 02:48:44     openvpn[86654]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Feb 25 02:48:44     openvpn[86654]: TLS: Initial packet from [AF_INET]194.187.251.154:443, sid=7f656fd8 bb527714
Feb 25 02:48:44     openvpn[86654]: UDP link remote: [AF_INET]194.187.251.154:443
Feb 25 02:48:44     openvpn[86654]: UDP link local (bound): [AF_INET]192.168.0.20:0
Feb 25 02:48:44     openvpn[86654]: Socket Buffers: R=[42080->42080] S=[57344->57344]
Feb 25 02:48:44     openvpn[86654]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.154:443
Feb 25 02:48:44     openvpn[86654]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Feb 25 02:48:04     openvpn[86654]: Restart pause, 40 second(s)
Feb 25 02:48:04     openvpn[86654]: SIGUSR1[soft,ping-restart] received, process restarting

Share this post


Link to post

Perhaps syntax is not correct?

 

Semi-colon should be at the end of each command.

 

i.e.
persist-key;
persist-tun;
remote-cert-tls server;
auth-nocache;

IIRC persist-key and persist-tun are not required.

 

Delete auth-nocache.

 

Check system log and troubleshoot.

 

System log should not have any errors.

 

Feb 24 19:58:37	openvpn	58371	VERIFY KU OK
Feb 24 19:58:37	openvpn	58371	Validating certificate extended key usage
Feb 24 19:58:37	openvpn	58371	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 24 19:58:37	openvpn	58371	VERIFY EKU OK
Feb 24 19:58:37	openvpn	58371	VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pegasus, emailAddress=info@airvpn.org
Feb 24 19:58:37	openvpn	58371	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 24 19:58:37	openvpn	58371	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 24 19:58:37	openvpn	58371	Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Feb 24 19:59:38	openvpn	56307	TLS: soft reset sec=0 bytes=623920968/-1 pkts=733779/0
Feb 24 19:59:38	openvpn	56307	VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Feb 24 19:59:38	openvpn	56307	VERIFY KU OK
Feb 24 19:59:38	openvpn	56307	Validating certificate extended key usage
Feb 24 19:59:38	openvpn	56307	++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Feb 24 19:59:38	openvpn	56307	VERIFY EKU OK
Feb 24 19:59:38	openvpn	56307	VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Feb 24 19:59:38	openvpn	56307	Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 24 19:59:38	openvpn	56307	Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Feb 24 19:59:38	openvpn	56307	Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Feb 24 20:25:00	openvpn	56307	MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 24 20:25:00	openvpn	56307	MANAGEMENT: CMD 'state 1'
Feb 24 20:25:00	openvpn	56307	MANAGEMENT: CMD 'status 2'
Feb 24 20:25:00	openvpn	56307	MANAGEMENT: Client disconnected
Feb 24 20:25:00	openvpn	57462	MANAGEMENT: Client connected from /var/etc/openvpn/client2.sock
Feb 24 20:25:00	openvpn	57462	MANAGEMENT: CMD 'state 1'
Feb 24 20:25:00	openvpn	57462	MANAGEMENT: CMD 'status 2'
Feb 24 20:25:00	openvpn	57462	MANAGEMENT: Client disconnected
Feb 24 20:25:00	openvpn	58371	MANAGEMENT: Client connected from /var/etc/openvpn/client3.sock
Feb 24 20:25:00	openvpn	58371	MANAGEMENT: CMD 'state 1'
Feb 24 20:25:00	openvpn	58371	MANAGEMENT: CMD 'status 2'
Feb 24 20:25:00	openvpn	58371	MANAGEMENT: Client disconnected
Feb 24 20:25:00	openvpn	59248	MANAGEMENT: Client connected from /var/etc/openvpn/client4.sock
Feb 24 20:25:00	openvpn	59248	MANAGEMENT: CMD 'state 1'
Feb 24 20:25:00	openvpn	59248	MANAGEMENT: CMD 'status 2'
Feb 24 20:25:00	openvpn	59248	MANAGEMENT: Client disconnected
Feb 24 20:25:35	openvpn	56307	MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 24 20:25:35	openvpn	56307	MANAGEMENT: CMD 'state 1'
Feb 24 20:25:35	openvpn	56307	MANAGEMENT: CMD 'status 2'
Feb 24 20:25:35	openvpn	56307	MANAGEMENT: Client disconnected
Feb 24 20:25:35	openvpn	57462	MANAGEMENT: Client connected from /var/etc/openvpn/client2.sock
Feb 24 20:25:35	openvpn	57462	MANAGEMENT: CMD 'state 1'
Feb 24 20:25:35	openvpn	57462	MANAGEMENT: CMD 'status 2'
Feb 24 20:25:35	openvpn	57462	MANAGEMENT: Client disconnected
Feb 24 20:25:35	openvpn	58371	MANAGEMENT: Client connected from /var/etc/openvpn/client3.sock
Feb 24 20:25:35	openvpn	58371	MANAGEMENT: CMD 'state 1'
Feb 24 20:25:35	openvpn	58371	MANAGEMENT: CMD 'status 2'
Feb 24 20:25:35	openvpn	58371	MANAGEMENT: Client disconnected
Feb 24 20:25:35	openvpn	59248	MANAGEMENT: Client connected from /var/etc/openvpn/client4.sock
Feb 24 20:25:35	openvpn	59248	MANAGEMENT: CMD 'state 1'
Feb 24 20:25:35	openvpn	59248	MANAGEMENT: CMD 'status 2'
Feb 24 20:25:35	openvpn	59248	MANAGEMENT: Client disconnected

Share this post


Link to post

I made an error with "Client Certificate: Select "Userkey CA:VPNCA *In Use""

After i fixed that, i get a status "up" but when i refresh the status, its down already. But there is an "Initialization Sequence Completed". A refresh of the connection status gives "up" and there is a little data transfer ~100kb up and down and it stays like that.

 

When i follow the guide to set up alliases and rules for wan and nat there is no connection on the clients. I default the opnsense-system again and there is internet again without changing anything on the dd-wrt router behind opnsense, so i dont think its the router and it must be tunnel that is not UP or i made another error with the firewall rules.

 

Log:

 

Feb 25 21:42:06     openvpn[48457]: MANAGEMENT: Client disconnected
Feb 25 21:42:06     openvpn[48457]: MANAGEMENT: CMD 'status 2'
Feb 25 21:42:06     openvpn[48457]: MANAGEMENT: CMD 'state 1'
Feb 25 21:42:06     openvpn[48457]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 25 21:41:57     openvpn[48457]: MANAGEMENT: Client disconnected
Feb 25 21:41:57     openvpn[48457]: MANAGEMENT: CMD 'status 2'
Feb 25 21:41:57     openvpn[48457]: MANAGEMENT: CMD 'state 1'
Feb 25 21:41:57     openvpn[48457]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 25 21:40:24     openvpn[48457]: MANAGEMENT: Client disconnected
Feb 25 21:40:24     openvpn[48457]: MANAGEMENT: CMD 'status 2'
Feb 25 21:40:24     openvpn[48457]: MANAGEMENT: CMD 'state 1'
Feb 25 21:40:24     openvpn[48457]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 25 21:38:22     openvpn[48457]: MANAGEMENT: Client disconnected
Feb 25 21:38:22     openvpn[48457]: MANAGEMENT: CMD 'status 2'
Feb 25 21:38:22     openvpn[48457]: MANAGEMENT: CMD 'state 1'
Feb 25 21:38:22     openvpn[48457]: MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
Feb 25 21:37:22     openvpn[48457]: Initialization Sequence Completed
Feb 25 21:37:22     openvpn[48457]: /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
Feb 25 21:37:22     openvpn[48457]: /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
Feb 25 21:37:22     openvpn[48457]: /sbin/route add -net 194.187.251.114 192.168.0.1 255.255.255.255
Feb 25 21:37:20     openvpn[48457]: /usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkup ovpnc1 1500 1557 10.4.2.17 255.255.0.0 init
Feb 25 21:37:20     openvpn[48457]: /sbin/route add -net 10.4.0.0 10.4.0.1 255.255.0.0
Feb 25 21:37:20     openvpn[48457]: /sbin/ifconfig ovpnc1 10.4.2.17 10.4.0.1 mtu 1500 netmask 255.255.0.0 up
Feb 25 21:37:20     openvpn[48457]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Feb 25 21:37:20     openvpn[48457]: TUN/TAP device /dev/tun1 opened
Feb 25 21:37:20     openvpn[48457]: TUN/TAP device ovpnc1 exists previously, keep at program end
Feb 25 21:37:20     openvpn[48457]: ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=igb1 HWADDR=90:e2:ba:2b:26:ad
Feb 25 21:37:20     openvpn[48457]: Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Feb 25 21:37:20     openvpn[48457]: Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Feb 25 21:37:20     openvpn[48457]: Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
Feb 25 21:37:20     openvpn[48457]: Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Feb 25 21:37:20     openvpn[48457]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Feb 25 21:37:20     openvpn[48457]: OPTIONS IMPORT: route-related options modified
Feb 25 21:37:20     openvpn[48457]: OPTIONS IMPORT: route options modified
Feb 25 21:37:20     openvpn[48457]: OPTIONS IMPORT: --ifconfig/up options modified
Feb 25 21:37:20     openvpn[48457]: OPTIONS IMPORT: compression parms modified
Feb 25 21:37:20     openvpn[48457]: OPTIONS IMPORT: timers and/or timeouts modified
Feb 25 21:37:20     openvpn[48457]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.17 255.255.0.0'
Feb 25 21:37:20     openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)
Feb 25 21:37:15     openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)
Feb 25 21:37:09     openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)
Feb 25 21:37:04     openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)
Feb 25 21:36:59     openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)
Feb 25 21:36:54     openvpn[48457]: SENT CONTROL [Columba]: 'PUSH_REQUEST' (status=1)
Feb 25 21:36:53     openvpn[48457]: [Columba] Peer Connection Initiated with [AF_INET]194.187.251.114:443
Feb 25 21:36:53     openvpn[48457]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Feb 25 21:36:53     openvpn[48457]: WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
Feb 25 21:36:53     openvpn[48457]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1557', remote='link-mtu 1558'
Feb 25 21:36:53     openvpn[48457]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Columba, emailAddress=info@airvpn.org
Feb 25 21:36:53     openvpn[48457]: VERIFY EKU OK

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...