Hi list, hi developer. I already asked my question to the users list but did not get any reply. Maybe you can help.
I do have a very strange problem in building up an OpenVPN solution for a number of roadwarriors. The connection comes up fine but I cannot ping the vpn server nor any other host through the tunnel. After a few seconds, the tunnel breaks down again and the client tries to reconnect which always fail. As you can see in the logs (see below), the connection comes up fine. I do not have any firewall installed - neither on the server nor on the client. The strange thing: When I use an HTTP-Proxy server to connect from the client, the connection itself and the traffic through the tunnel are running fine. No break down, no reconnect attempts. I tried some different settings (tun-mtu,...) but these do not solve my problem. Here is my setup: - OpenVPN Server (version 2.0.7) running on SUSE Linux 10.0 (openvpn package self-compiled) on Port 443 (TCP) with certificates in tunnel mode (tun device) - Client on Windows XP SP2 (latest patchlevel) with latest openvpn-gui (from openvpn.se) Here are my configs and logs (sorry for this long posting): Server: ------------------ local <server-ip> port 443 proto tcp-server dev tun ca /etc/openvpn/ca.pem cert /etc/openvpn/gate.crt key /etc/openvpn/gate.key dh /etc/openvpn/dh2048.pem server 10.8.0.0 255.255.0.0 ifconfig-pool-persist ipp.txt client-config-dir /etc/openvpn/ccd push "dhcp-option DNS <dns-ip>" push "dhcp-option WINS <wins-ip>" client-to-client keepalive 10 120 tls-auth ta.key 0 # This file is secret cipher AES-256-CBC # AES comp-lzo user nobody group nobody persist-key persist-tun status /etc/openvpn/openvpn-status.log log-append /var/log/openvpn.log verb 6 management 127.0.0.1 444 crl-verify /etc/openvpn/crl.pem plugin /lib/security/openvpn-auth-pam.so openvpn client-connect "/etc/openvpn/scripts/client-up.sh" client-disconnect "/etc/openvpn/scripts/client-down.sh" ------------------ Client: ------------------ tcp-client dev tun dev-node "OpenVPN" proto tcp-client remote <server-ip> 443 resolv-retry infinite nobind persist-key persist-tun mute-replay-warnings pkcs12 client-cert.p12 ns-cert-type server tls-auth ta.key 1 cipher AES-256-CBC comp-lzo verb 3 tun-mtu 1500 auth-user-pass ------------------ Logs: Server: ------------------ Fri Jun 23 10:37:06 2006 us=430286 OpenVPN 2.0.7 i686-suse-linux [SSL] [LZO] [EPOLL] built on May 5 2006 Fri Jun 23 10:37:06 2006 us=430556 MANAGEMENT: TCP Socket listening on 127.0.0.1:444 Fri Jun 23 10:37:06 2006 us=432727 PLUGIN_INIT: POST /lib/security/openvpn-auth-pam.so 'openvpn' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY Fri Jun 23 10:37:06 2006 us=550912 Diffie-Hellman initialized with 2048 bit key Fri Jun 23 10:37:06 2006 us=553225 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file Fri Jun 23 10:37:06 2006 us=553323 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Jun 23 10:37:06 2006 us=553363 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Jun 23 10:37:06 2006 us=553420 TLS-Auth MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ] Fri Jun 23 10:37:06 2006 us=555557 TUN/TAP device tun0 opened Fri Jun 23 10:37:06 2006 us=555727 TUN/TAP TX queue length set to 100 Fri Jun 23 10:37:06 2006 us=555802 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500 Fri Jun 23 10:37:06 2006 us=563813 /sbin/route add -net 10.8.0.0 netmask 255.255.0.0 gw 10.8.0.2 Fri Jun 23 10:37:06 2006 us=570351 Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ] Fri Jun 23 10:37:06 2006 us=587089 GID set to nobody Fri Jun 23 10:37:06 2006 us=587280 UID set to nobody Fri Jun 23 10:37:06 2006 us=587395 Listening for incoming TCP connection on <server-ip>:443 Fri Jun 23 10:37:06 2006 us=587503 Socket Buffers: R=[87380->131072] S=[16384->131072] Fri Jun 23 10:37:06 2006 us=587550 TCPv4_SERVER link local (bound): <server-ip>:443 Fri Jun 23 10:37:06 2006 us=587583 TCPv4_SERVER link remote: [undef] Fri Jun 23 10:37:06 2006 us=587630 MULTI: multi_init called, r=256 v=256 Fri Jun 23 10:37:06 2006 us=588623 IFCONFIG POOL: base=10.8.0.4 size=16382 Fri Jun 23 10:37:06 2006 us=588975 IFCONFIG POOL LIST Fri Jun 23 10:37:06 2006 us=589098 <client-name>,10.8.0.8 Fri Jun 23 10:37:06 2006 us=590111 MULTI: TCP INIT maxclients=1024 maxevents=1028 Fri Jun 23 10:37:06 2006 us=590292 Initialization Sequence Completed Fri Jun 23 10:37:27 2006 us=286090 MULTI: multi_create_instance called Fri Jun 23 10:37:27 2006 us=286344 Re-using SSL/TLS context Fri Jun 23 10:37:27 2006 us=286482 LZO compression initialized Fri Jun 23 10:37:27 2006 us=286882 Control Channel MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ] Fri Jun 23 10:37:27 2006 us=286987 Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ] Fri Jun 23 10:37:27 2006 us=287248 Local Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server' Fri Jun 23 10:37:27 2006 us=287290 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client' Fri Jun 23 10:37:27 2006 us=287374 Local Options hash (VER=V4): '9915e4a2' Fri Jun 23 10:37:27 2006 us=287427 Expected Remote Options hash (VER=V4): '2f2c6498' Connection starts here: Fri Jun 23 10:37:27 2006 us=287536 TCP connection established with 192.168.11.133:1199 Fri Jun 23 10:37:27 2006 us=287587 Socket Buffers: R=[131072->131072] S=[131072->131072] Fri Jun 23 10:37:27 2006 us=287629 TCPv4_SERVER link local: [undef] Fri Jun 23 10:37:27 2006 us=287666 TCPv4_SERVER link remote: 192.168.11.133:1199 Fri Jun 23 10:37:27 2006 us=288180 192.168.11.133:1199 TCPv4_SERVER WRITE [42] to 192.168.11.133:1199: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0 Fri Jun 23 10:37:27 2006 us=288446 192.168.11.133:1199 TCPv4_SERVER READ [42] from 192.168.11.133:1199: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0 Fri Jun 23 10:37:27 2006 us=288510 192.168.11.133:1199 TLS: Initial packet from 192.168.11.133:1199, sid=46bfb0bf 66016382 Fri Jun 23 10:37:27 2006 us=288630 192.168.11.133:1199 TCPv4_SERVER WRITE [54] to 192.168.11.133:1199: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #2 ] [ 0 ] pid=0 DATA len=0 Fri Jun 23 10:37:27 2006 us=288864 192.168.11.133:1199 TCPv4_SERVER READ [54] from 192.168.11.133:1199: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #2 ] [ 0 ] pid=0 DATA len=0 Fri Jun 23 10:37:27 2006 us=288974 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #3 ] [ 0 ] Fri Jun 23 10:37:27 2006 us=289181 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #3 ] [ 0 ] Fri Jun 23 10:37:27 2006 us=289602 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #4 ] [ ] pid=1 DATA len=100 Fri Jun 23 10:37:27 2006 us=289747 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #4 ] [ 1 ] Fri Jun 23 10:37:27 2006 us=289860 192.168.11.133:1199 TCPv4_SERVER READ [44] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #5 ] [ ] pid=2 DATA len=2 Fri Jun 23 10:37:27 2006 us=414525 192.168.11.133:1199 TCPv4_SERVER WRITE [154] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 2 ] pid=1 DATA len=100 Fri Jun 23 10:37:27 2006 us=414726 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=2 DATA len=100 Fri Jun 23 10:37:27 2006 us=414842 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=3 DATA len=100 Fri Jun 23 10:37:27 2006 us=414956 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #8 ] [ ] pid=4 DATA len=100 Fri Jun 23 10:37:27 2006 us=488958 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #6 ] [ 1 ] Fri Jun 23 10:37:27 2006 us=489116 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #9 ] [ ] pid=5 DATA len=100 Fri Jun 23 10:37:27 2006 us=489531 192.168.11.133:1199 TCPv4_SERVER READ [58] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #7 ] [ 2 3 4 ] Fri Jun 23 10:37:27 2006 us=489666 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #10 ] [ ] pid=6 DATA len=100 Fri Jun 23 10:37:27 2006 us=489807 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #11 ] [ ] pid=7 DATA len=100 Fri Jun 23 10:37:27 2006 us=489922 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #12 ] [ ] pid=8 DATA len=100 Fri Jun 23 10:37:27 2006 us=490084 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #8 ] [ 5 ] Fri Jun 23 10:37:27 2006 us=490344 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #13 ] [ ] pid=9 DATA len=100 Fri Jun 23 10:37:27 2006 us=490497 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #9 ] [ 6 ] Fri Jun 23 10:37:27 2006 us=490624 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #14 ] [ ] pid=10 DATA len=100 Fri Jun 23 10:37:27 2006 us=490850 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #10 ] [ 7 ] Fri Jun 23 10:37:27 2006 us=490982 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #15 ] [ ] pid=11 DATA len=100 Fri Jun 23 10:37:27 2006 us=491066 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #11 ] [ 8 ] Fri Jun 23 10:37:27 2006 us=491228 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #16 ] [ ] pid=12 DATA len=100 Fri Jun 23 10:37:27 2006 us=491327 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #12 ] [ 9 ] Fri Jun 23 10:37:27 2006 us=491499 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #17 ] [ ] pid=13 DATA len=100 Fri Jun 23 10:37:27 2006 us=491605 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #13 ] [ 10 ] Fri Jun 23 10:37:27 2006 us=491723 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #18 ] [ ] pid=14 DATA len=100 Fri Jun 23 10:37:27 2006 us=491857 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #14 ] [ 11 ] Fri Jun 23 10:37:27 2006 us=491978 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #19 ] [ ] pid=15 DATA len=100 Fri Jun 23 10:37:27 2006 us=492237 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #15 ] [ 12 ] Fri Jun 23 10:37:27 2006 us=492363 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #20 ] [ ] pid=16 DATA len=100 Fri Jun 23 10:37:27 2006 us=492591 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #16 ] [ 13 ] Fri Jun 23 10:37:27 2006 us=492736 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #21 ] [ ] pid=17 DATA len=100 Fri Jun 23 10:37:27 2006 us=492823 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #17 ] [ 14 ] Fri Jun 23 10:37:27 2006 us=492979 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #22 ] [ ] pid=18 DATA len=100 Fri Jun 23 10:37:27 2006 us=493077 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #18 ] [ 15 ] Fri Jun 23 10:37:27 2006 us=493227 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #23 ] [ ] pid=19 DATA len=100 Fri Jun 23 10:37:27 2006 us=493327 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #19 ] [ 16 ] Fri Jun 23 10:37:27 2006 us=493439 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #24 ] [ ] pid=20 DATA len=100 Fri Jun 23 10:37:27 2006 us=493580 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #20 ] [ 17 ] Fri Jun 23 10:37:27 2006 us=493701 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #25 ] [ ] pid=21 DATA len=100 Fri Jun 23 10:37:27 2006 us=493977 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #21 ] [ 18 ] Fri Jun 23 10:37:27 2006 us=494097 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #26 ] [ ] pid=22 DATA len=100 Fri Jun 23 10:37:27 2006 us=494347 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #22 ] [ 19 ] Fri Jun 23 10:37:27 2006 us=494476 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #27 ] [ ] pid=23 DATA len=100 Fri Jun 23 10:37:27 2006 us=494561 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #23 ] [ 20 ] Fri Jun 23 10:37:27 2006 us=494714 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #28 ] [ ] pid=24 DATA len=100 Fri Jun 23 10:37:27 2006 us=494814 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #24 ] [ 21 ] Fri Jun 23 10:37:27 2006 us=494924 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #29 ] [ ] pid=25 DATA len=100 Fri Jun 23 10:37:27 2006 us=495060 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #25 ] [ 22 ] Fri Jun 23 10:37:27 2006 us=495172 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #30 ] [ ] pid=26 DATA len=100 Fri Jun 23 10:37:27 2006 us=521292 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #26 ] [ 23 ] Fri Jun 23 10:37:27 2006 us=521413 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #31 ] [ ] pid=27 DATA len=100 Fri Jun 23 10:37:27 2006 us=521693 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #27 ] [ 24 ] Fri Jun 23 10:37:27 2006 us=521811 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #32 ] [ ] pid=28 DATA len=100 Fri Jun 23 10:37:27 2006 us=522051 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #28 ] [ 25 ] Fri Jun 23 10:37:27 2006 us=522167 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #33 ] [ ] pid=29 DATA len=100 Fri Jun 23 10:37:27 2006 us=522250 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #29 ] [ 26 ] Fri Jun 23 10:37:27 2006 us=522407 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #34 ] [ ] pid=30 DATA len=100 Fri Jun 23 10:37:27 2006 us=522512 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #30 ] [ 27 ] Fri Jun 23 10:37:27 2006 us=522621 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #35 ] [ ] pid=31 DATA len=100 Fri Jun 23 10:37:27 2006 us=522756 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #31 ] [ 28 ] Fri Jun 23 10:37:27 2006 us=522864 192.168.11.133:1199 TCPv4_SERVER WRITE [121] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #36 ] [ ] pid=32 DATA len=79 Fri Jun 23 10:37:27 2006 us=523035 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #32 ] [ 29 ] Fri Jun 23 10:37:27 2006 us=523802 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #33 ] [ 30 ] Fri Jun 23 10:37:27 2006 us=973363 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #34 ] [ 31 ] Fri Jun 23 10:37:27 2006 us=973895 192.168.11.133:1199 TCPv4_SERVER READ [154] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #35 ] [ 32 ] pid=3 DATA len=100 Fri Jun 23 10:37:27 2006 us=974040 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #37 ] [ 3 ] Fri Jun 23 10:37:27 2006 us=974154 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #36 ] [ ] pid=4 DATA len=100 Fri Jun 23 10:37:27 2006 us=974274 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #38 ] [ 4 ] Fri Jun 23 10:37:27 2006 us=974361 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #37 ] [ ] pid=5 DATA len=100 Fri Jun 23 10:37:27 2006 us=974641 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #39 ] [ 5 ] Fri Jun 23 10:37:27 2006 us=974736 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #38 ] [ ] pid=6 DATA len=100 Fri Jun 23 10:37:27 2006 us=974897 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #40 ] [ 6 ] Fri Jun 23 10:37:27 2006 us=975005 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #39 ] [ ] pid=7 DATA len=100 Fri Jun 23 10:37:27 2006 us=975127 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #41 ] [ 7 ] Fri Jun 23 10:37:27 2006 us=975250 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #40 ] [ ] pid=8 DATA len=100 Fri Jun 23 10:37:27 2006 us=975374 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #42 ] [ 8 ] Fri Jun 23 10:37:27 2006 us=975470 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #41 ] [ ] pid=9 DATA len=100 Fri Jun 23 10:37:27 2006 us=975588 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #43 ] [ 9 ] Fri Jun 23 10:37:27 2006 us=975727 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #42 ] [ ] pid=10 DATA len=100 Fri Jun 23 10:37:27 2006 us=975849 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #44 ] [ 10 ] Fri Jun 23 10:37:27 2006 us=976007 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #43 ] [ ] pid=11 DATA len=100 Fri Jun 23 10:37:27 2006 us=976138 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #45 ] [ 11 ] Fri Jun 23 10:37:27 2006 us=976369 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #44 ] [ ] pid=12 DATA len=100 Fri Jun 23 10:37:27 2006 us=976499 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #46 ] [ 12 ] Fri Jun 23 10:37:27 2006 us=976793 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #45 ] [ ] pid=13 DATA len=100 Fri Jun 23 10:37:27 2006 us=976926 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #47 ] [ 13 ] Fri Jun 23 10:37:27 2006 us=977012 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #46 ] [ ] pid=14 DATA len=100 Fri Jun 23 10:37:27 2006 us=977177 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #48 ] [ 14 ] Fri Jun 23 10:37:27 2006 us=977279 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #47 ] [ ] pid=15 DATA len=100 Fri Jun 23 10:37:27 2006 us=977400 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #49 ] [ 15 ] Fri Jun 23 10:37:27 2006 us=977557 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #48 ] [ ] pid=16 DATA len=100 Fri Jun 23 10:37:27 2006 us=977687 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #50 ] [ 16 ] Fri Jun 23 10:37:27 2006 us=977824 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #49 ] [ ] pid=17 DATA len=100 Fri Jun 23 10:37:27 2006 us=977949 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #51 ] [ 17 ] Fri Jun 23 10:37:27 2006 us=978171 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #50 ] [ ] pid=18 DATA len=100 Fri Jun 23 10:37:27 2006 us=978301 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #52 ] [ 18 ] Fri Jun 23 10:37:27 2006 us=978575 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #51 ] [ ] pid=19 DATA len=100 Fri Jun 23 10:37:27 2006 us=978788 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #53 ] [ 19 ] Fri Jun 23 10:37:27 2006 us=978924 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #52 ] [ ] pid=20 DATA len=100 Fri Jun 23 10:37:27 2006 us=979049 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #54 ] [ 20 ] Fri Jun 23 10:37:27 2006 us=979148 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #53 ] [ ] pid=21 DATA len=100 Fri Jun 23 10:37:27 2006 us=979312 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #55 ] [ 21 ] Fri Jun 23 10:37:27 2006 us=979413 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #54 ] [ ] pid=22 DATA len=100 Fri Jun 23 10:37:27 2006 us=979575 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #56 ] [ 22 ] Fri Jun 23 10:37:27 2006 us=979678 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #55 ] [ ] pid=23 DATA len=100 Fri Jun 23 10:37:27 2006 us=979801 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #57 ] [ 23 ] Fri Jun 23 10:37:27 2006 us=979936 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #56 ] [ ] pid=24 DATA len=100 Fri Jun 23 10:37:27 2006 us=980059 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #58 ] [ 24 ] Fri Jun 23 10:37:27 2006 us=980256 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #57 ] [ ] pid=25 DATA len=100 Fri Jun 23 10:37:27 2006 us=982550 192.168.11.133:1199 CRL CHECK OK: <cert> Fri Jun 23 10:37:27 2006 us=983471 192.168.11.133:1199 CRL CHECK OK: <cert> Fri Jun 23 10:37:27 2006 us=983554 192.168.11.133:1199 VERIFY OK: depth=0, <cert> Fri Jun 23 10:37:27 2006 us=983750 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #59 ] [ 25 ] Fri Jun 23 10:37:27 2006 us=983936 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #58 ] [ ] pid=26 DATA len=100 Fri Jun 23 10:37:27 2006 us=984079 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #60 ] [ 26 ] Fri Jun 23 10:37:27 2006 us=984237 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #59 ] [ ] pid=27 DATA len=100 Fri Jun 23 10:37:27 2006 us=984364 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #61 ] [ 27 ] Fri Jun 23 10:37:27 2006 us=984462 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #60 ] [ ] pid=28 DATA len=100 Fri Jun 23 10:37:28 2006 us=120206 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #62 ] [ 28 ] Fri Jun 23 10:37:28 2006 us=120425 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #61 ] [ ] pid=29 DATA len=100 Fri Jun 23 10:37:28 2006 us=121333 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #63 ] [ 29 ] Fri Jun 23 10:37:28 2006 us=121443 192.168.11.133:1199 TCPv4_SERVER READ [59] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #62 ] [ ] pid=30 DATA len=17 Fri Jun 23 10:37:28 2006 us=121893 192.168.11.133:1199 TCPv4_SERVER WRITE [113] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #64 ] [ 30 ] pid=33 DATA len=59 Fri Jun 23 10:37:28 2006 us=289936 192.168.11.133:1199 TCPv4_SERVER READ [154] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #63 ] [ 33 ] pid=31 DATA len=100 Fri Jun 23 10:37:28 2006 us=290110 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #65 ] [ 31 ] Fri Jun 23 10:37:28 2006 us=290356 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #64 ] [ ] pid=32 DATA len=100 Fri Jun 23 10:37:28 2006 us=290470 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #66 ] [ 32 ] Fri Jun 23 10:37:28 2006 us=290548 192.168.11.133:1199 TCPv4_SERVER READ [142] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #65 ] [ ] pid=33 DATA len=100 Fri Jun 23 10:37:28 2006 us=290648 192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #67 ] [ 33 ] Fri Jun 23 10:37:28 2006 us=290722 192.168.11.133:1199 TCPv4_SERVER READ [104] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #66 ] [ ] pid=34 DATA len=62 Fri Jun 23 10:37:28 2006 us=417331 192.168.11.133:1199 PLUGIN_CALL: POST /lib/security/openvpn-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0 Fri Jun 23 10:37:28 2006 us=417428 192.168.11.133:1199 TLS: Username/Password authentication succeeded for username '<username>' Fri Jun 23 10:37:28 2006 us=417888 192.168.11.133:1199 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Fri Jun 23 10:37:28 2006 us=417933 192.168.11.133:1199 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Jun 23 10:37:28 2006 us=417979 192.168.11.133:1199 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Fri Jun 23 10:37:28 2006 us=418019 192.168.11.133:1199 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Jun 23 10:37:28 2006 us=418219 192.168.11.133:1199 TCPv4_SERVER WRITE [154] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #68 ] [ 34 ] pid=34 DATA len=100 Fri Jun 23 10:37:28 2006 us=418332 192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #69 ] [ ] pid=35 DATA len=100 Fri Jun 23 10:37:28 2006 us=418422 192.168.11.133:1199 TCPv4_SERVER WRITE [140] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #70 ] [ ] pid=36 DATA len=98 Fri Jun 23 10:37:28 2006 us=490550 192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #67 ] [ 34 ] Fri Jun 23 10:37:28 2006 us=490792 192.168.11.133:1199 TCPv4_SERVER READ [54] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #68 ] [ 35 36 ] Fri Jun 23 10:37:28 2006 us=490899 192.168.11.133:1199 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA Fri Jun 23 10:37:28 2006 us=490974 192.168.11.133:1199 [<client-name>] Peer Connection Initiated with 192.168.11.133:1199 Fri Jun 23 10:37:28 2006 us=491186 <client-name>/192.168.11.133:1199 OPTIONS IMPORT: reading client specific options from: /etc/openvpn/ccd/<client-name> Fri Jun 23 10:37:28 2006 us=506519 <client-name>/192.168.11.133:1199 MULTI: Learn: 10.8.0.10 -> <client-name>/192.168.11.133:1199 Fri Jun 23 10:37:28 2006 us=506631 <client-name>/192.168.11.133:1199 MULTI: primary virtual IP for <client-name>/192.168.11.133:1199: 10.8.0.10 Fri Jun 23 10:37:29 2006 us=511477 <client-name>/192.168.11.133:1199 TCPv4_SERVER READ [132] from 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #69 ] [ ] pid=35 DATA len=90 Fri Jun 23 10:37:29 2006 us=511786 <client-name>/192.168.11.133:1199 PUSH: Received control message: 'PUSH_REQUEST' Fri Jun 23 10:37:29 2006 us=511923 <client-name>/192.168.11.133:1199 SENT CONTROL [<client-name>]: 'PUSH_REPLY,dhcp-option DNS <dns-ip>,dhcp-option WINS <wins-ip>,route 10.8.0.0 255.255.0.0,ping 10,ping-restart 120,route 192.168.13.0 255.255.255.0,ifconfig 10.8.0.10 10.8.0.9' (status=1) Connection established! Fri Jun 23 10:37:29 2006 us=512097 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [50] to 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #71 ] [ 35 ] Fri Jun 23 10:37:29 2006 us=512265 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #72 ] [ ] pid=37 DATA len=100 Fri Jun 23 10:37:29 2006 us=512365 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [142] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #73 ] [ ] pid=38 DATA len=100 Fri Jun 23 10:37:29 2006 us=512459 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [140] to 192.168.11.133:1199: P_CONTROL_V1 kid=0 pid=[ #74 ] [ ] pid=39 DATA len=98 Fri Jun 23 10:37:29 2006 us=702610 <client-name>/192.168.11.133:1199 TCPv4_SERVER READ [50] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #70 ] [ 37 ] Fri Jun 23 10:37:29 2006 us=741249 <client-name>/192.168.11.133:1199 TCPv4_SERVER READ [54] from 192.168.11.133:1199: P_ACK_V1 kid=0 pid=[ #71 ] [ 38 39 ] Fri Jun 23 10:37:40 2006 us=33821 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [69] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=68 Fri Jun 23 10:37:50 2006 us=114500 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [69] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=68 Fri Jun 23 10:38:00 2006 us=139266 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [69] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=68 Fri Jun 23 10:38:10 2006 us=211953 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [69] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=68 Fri Jun 23 10:38:20 2006 us=372998 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [69] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=68 Fri Jun 23 10:38:21 2006 us=117514 <client-name>/192.168.11.133:1199 TUN READ [96] Fri Jun 23 10:38:21 2006 us=117655 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [149] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=148 Fri Jun 23 10:38:21 2006 us=897109 <client-name>/192.168.11.133:1199 TUN READ [329] Fri Jun 23 10:38:21 2006 us=897662 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [229] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=228 Fri Jun 23 10:38:23 2006 us=399308 <client-name>/192.168.11.133:1199 TUN READ [329] Fri Jun 23 10:38:23 2006 us=399557 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [229] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=228 Fri Jun 23 10:38:24 2006 us=901447 <client-name>/192.168.11.133:1199 TUN READ [329] Fri Jun 23 10:38:24 2006 us=901620 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [229] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=228 Fri Jun 23 10:38:26 2006 us=403802 <client-name>/192.168.11.133:1199 TUN READ [48] Fri Jun 23 10:38:26 2006 us=403904 <client-name>/192.168.11.133:1199 TCPv4_SERVER WRITE [101] to 192.168.11.133:1199: P_DATA_V1 kid=0 DATA len=100 Fri Jun 23 10:38:28 2006 us=805632 <client-name>/192.168.11.133:1199 Connection reset, restarting [-1] Fri Jun 23 10:38:28 2006 us=805755 <client-name>/192.168.11.133:1199 SIGUSR1[soft,connection-reset] received, client-instance restarting Fri Jun 23 10:38:28 2006 us=833638 TCP/UDP: Closing socket ------------------ Tunnel broke down :( Client: ------------------ Fri Jun 23 10:35:16 2006 OpenVPN 2.0.7 Win32-MinGW [SSL] [LZO] built on Apr 12 2006 Fri Jun 23 10:35:21 2006 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port. Fri Jun 23 10:35:25 2006 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file Fri Jun 23 10:35:25 2006 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Jun 23 10:35:25 2006 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Jun 23 10:35:25 2006 LZO compression initialized Fri Jun 23 10:35:25 2006 Control Channel MTU parms [ L:1560 D:168 EF:68 EB:0 ET:0 EL:0 ] Fri Jun 23 10:35:25 2006 Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ] Fri Jun 23 10:35:25 2006 Local Options hash (VER=V4): '2f2c6498' Fri Jun 23 10:35:25 2006 Expected Remote Options hash (VER=V4): '9915e4a2' Fri Jun 23 10:35:25 2006 Attempting to establish TCP connection with <server-ip>:443 Fri Jun 23 10:35:25 2006 TCP connection established with <server-ip>:443 Fri Jun 23 10:35:25 2006 TCPv4_CLIENT link local: [undef] Fri Jun 23 10:35:25 2006 TCPv4_CLIENT link remote: <server-ip>:443 Fri Jun 23 10:35:25 2006 TLS: Initial packet from <server-ip>:443, sid=7f934e53 3cb48279 Fri Jun 23 10:35:26 2006 VERIFY OK: depth=1, <cert> Fri Jun 23 10:35:26 2006 VERIFY OK: nsCertType=SERVER Fri Jun 23 10:35:26 2006 VERIFY OK: depth=0, <cert> Fri Jun 23 10:35:27 2006 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Fri Jun 23 10:35:27 2006 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Jun 23 10:35:27 2006 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Fri Jun 23 10:35:27 2006 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Jun 23 10:35:27 2006 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA Fri Jun 23 10:35:27 2006 [<server-name>] Peer Connection Initiated with <server-ip>:443 Fri Jun 23 10:35:28 2006 SENT CONTROL [<server-name>]: 'PUSH_REQUEST' (status=1) Fri Jun 23 10:35:28 2006 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS <dns-ip>,dhcp-option WINS <wins-ip>,route 10.8.0.0 255.255.0.0,ping 10,ping-restart 120,route 192.168.13.0 255.255.255.0,ifconfig 10.8.0.10 10.8.0.9' Fri Jun 23 10:35:28 2006 OPTIONS IMPORT: timers and/or timeouts modified Fri Jun 23 10:35:28 2006 OPTIONS IMPORT: --ifconfig/up options modified Fri Jun 23 10:35:28 2006 OPTIONS IMPORT: route options modified Fri Jun 23 10:35:28 2006 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Fri Jun 23 10:35:28 2006 TAP-WIN32 device [OpenVPN] opened: \\.\Global\{D16ADC81-E6A1-46EF-B6CE-8C5A57FCB6CD}.tap Fri Jun 23 10:35:28 2006 TAP-Win32 Driver Version 8.1 Fri Jun 23 10:35:28 2006 TAP-Win32 MTU=1500 Fri Jun 23 10:35:28 2006 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.0.10/255.255.255.252 on interface {D16ADC81-E6A1-46EF-B6CE-8C5A57FCB6CD} [DHCP-serv: 10.8.0.9, lease-time: 31536000] Fri Jun 23 10:35:28 2006 Successful ARP Flush on interface [3] {D16ADC81-E6A1-46EF-B6CE-8C5A57FCB6CD} Fri Jun 23 10:35:28 2006 TEST ROUTES: 0/0 succeeded len=3 ret=0 a=0 u/d=down Fri Jun 23 10:35:28 2006 Route: Waiting for TUN/TAP interface to come up... Fri Jun 23 10:35:31 2006 TEST ROUTES: 0/0 succeeded len=3 ret=0 a=0 u/d=down Fri Jun 23 10:35:31 2006 Route: Waiting for TUN/TAP interface to come up... Fri Jun 23 10:35:32 2006 TEST ROUTES: 3/3 succeeded len=3 ret=1 a=0 u/d=up Fri Jun 23 10:35:32 2006 route ADD 10.8.0.0 MASK 255.255.0.0 10.8.0.9 Fri Jun 23 10:35:32 2006 Route addition via IPAPI succeeded Fri Jun 23 10:35:32 2006 route ADD 192.168.13.0 MASK 255.255.255.0 10.8.0.9 Fri Jun 23 10:35:32 2006 Route addition via IPAPI succeeded Fri Jun 23 10:35:32 2006 Initialization Sequence Completed Connection established successfully! And a few seconds later: Fri Jun 23 10:35:53 2006 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054) Fri Jun 23 10:35:53 2006 Connection reset, restarting [-1] Fri Jun 23 10:35:53 2006 TCP/UDP: Closing socket Fri Jun 23 10:35:53 2006 SIGUSR1[soft,connection-reset] received, process restarting Fri Jun 23 10:35:53 2006 Restart pause, 5 second(s) ... ------------------ Any suggestions? Thanks for your answer. Regards, Thomas