Not signed in (Sign In)

Welcome, Guest

Want to take part in these discussions? Sign in if you have an account, or apply for one below

Vanilla 1.1.10 is a product of Lussumo. More Information: Documentation, Community Support.

    • CommentAuthorsYchZ
    • CommentTimeJul 6th 2015
     
    Mon Jul 6 22:46:13 2015 OpenVPN 2.1.3 mipsel-oe-linux [SSL] [LZO2] [EPOLL] built on Apr 17 2012
    Mon Jul 6 22:46:13 2015 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
    Mon Jul 6 22:46:13 2015 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    Mon Jul 6 22:46:13 2015 Control Channel Authentication: using '/etc/openvpn/alwaysvpn-ta.key' as a OpenVPN static key file
    Mon Jul 6 22:46:13 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Jul 6 22:46:13 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Jul 6 22:46:13 2015 LZO compression initialized
    Mon Jul 6 22:46:13 2015 Control Channel MTU parms [ L:1576 D:168 EF:68 EB:0 ET:0 EL:0 ]
    Mon Jul 6 22:46:13 2015 Socket Buffers: R=[87380->131072] S=[16384->131072]
    Mon Jul 6 22:46:13 2015 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
    Mon Jul 6 22:46:13 2015 Local Options hash (VER=V4): 'e39a3273'
    Mon Jul 6 22:46:13 2015 Expected Remote Options hash (VER=V4): '3c14feac'
    Mon Jul 6 22:46:13 2015 Attempting to establish TCP connection with (AlwaysVPN IP):443 [nonblock]
    Mon Jul 6 22:46:14 2015 TCP connection established with (AlwaysVPN IP):443
    Mon Jul 6 22:46:14 2015 TCPv4_CLIENT link local: [undef]
    Mon Jul 6 22:46:14 2015 TCPv4_CLIENT link remote: (AlwaysVPN IP):443
    Mon Jul 6 22:46:14 2015 TLS: Initial packet from (AlwaysVPN IP):443, sid=10b36548 5d376727
    Mon Jul 6 22:46:14 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
    Mon Jul 6 22:46:16 2015 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=AlwaysVPN_CA/emailAddress=support@alwaysvpn.com
    Mon Jul 6 22:46:16 2015 VERIFY OK: nsCertType=SERVER
    Mon Jul 6 22:46:16 2015 VERIFY X509NAME OK: /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=alwaysvpn_server5/emailAddress=support@alwaysvpn.com
    Mon Jul 6 22:46:16 2015 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=alwaysvpn_server5/emailAddress=support@alwaysvpn.com
    Mon Jul 6 22:46:19 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Jul 6 22:46:19 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Jul 6 22:46:19 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Jul 6 22:46:19 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Jul 6 22:46:19 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    Mon Jul 6 22:46:19 2015 [alwaysvpn_server5] Peer Connection Initiated with (AlwaysVPN IP):443
    Mon Jul 6 22:46:21 2015 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Mon Jul 6 22:46:22 2015 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.19.96.1,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,rcvbuf 100000,sndbuf 100000,ping 10,ping-restart 30,ifconfig 10.19.97.63 255.255.252.0'
    Mon Jul 6 22:46:22 2015 OPTIONS IMPORT: timers and/or timeouts modified
    Mon Jul 6 22:46:22 2015 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
    Mon Jul 6 22:46:22 2015 Socket Buffers: R=[131072->200000] S=[131072->200000]
    Mon Jul 6 22:46:22 2015 OPTIONS IMPORT: --ifconfig/up options modified
    Mon Jul 6 22:46:22 2015 OPTIONS IMPORT: route-related options modified
    Mon Jul 6 22:46:22 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon Jul 6 22:46:22 2015 ROUTE default_gateway=192.168.1.1
    Mon Jul 6 22:46:22 2015 TUN/TAP device tap2 opened
    Mon Jul 6 22:46:22 2015 TUN/TAP TX queue length set to 100
    Mon Jul 6 22:46:22 2015 /sbin/ifconfig tap2 10.19.97.63 netmask 255.255.252.0 mtu 1500 broadcast 10.19.99.255
    Mon Jul 6 22:46:22 2015 /sbin/route add -net (AlwaysVPN IP) netmask 255.255.255.255 gw 192.168.1.1
    Mon Jul 6 22:46:22 2015 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.19.96.1
    Mon Jul 6 22:46:22 2015 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.19.96.1
    Mon Jul 6 22:46:22 2015 Initialization Sequence Completed
    Mon Jul 6 22:46:22 2015 Connection reset, restarting [0]
    Mon Jul 6 22:46:22 2015 TCP/UDP: Closing socket
    Mon Jul 6 22:46:22 2015 /sbin/route del -net (AlwaysVPN IP) netmask 255.255.255.255
    Mon Jul 6 22:46:22 2015 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
    Mon Jul 6 22:46:22 2015 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
    Mon Jul 6 22:46:22 2015 Closing TUN/TAP interface
    Mon Jul 6 22:46:22 2015 /sbin/ifconfig tap2 0.0.0.0
    Mon Jul 6 22:46:22 2015 SIGUSR1[soft,connection-reset] received, process restarting
    Mon Jul 6 22:46:22 2015 Restart pause, 1 second(s)
    Mon Jul 6 22:46:23 2015 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
    Mon Jul 6 22:46:23 2015 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
    Mon Jul 6 22:46:23 2015 Re-using SSL/TLS context
    Mon Jul 6 22:46:23 2015 LZO compression initialized
    Mon Jul 6 22:46:23 2015 Control Channel MTU parms [ L:1576 D:168 EF:68 EB:0 ET:0 EL:0 ]
    Mon Jul 6 22:46:23 2015 Socket Buffers: R=[87380->200000] S=[16384->200000]
    Mon Jul 6 22:46:23 2015 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
    Mon Jul 6 22:46:23 2015 Local Options hash (VER=V4): 'e39a3273'
    Mon Jul 6 22:46:23 2015 Expected Remote Options hash (VER=V4): '3c14feac'
    Mon Jul 6 22:46:23 2015 Attempting to establish TCP connection with (AlwaysVPN IP):443 [nonblock]
    Mon Jul 6 22:46:24 2015 TCP connection established with (AlwaysVPN IP):443
    Mon Jul 6 22:46:24 2015 TCPv4_CLIENT link local: [undef]
    Mon Jul 6 22:46:24 2015 TCPv4_CLIENT link remote: (AlwaysVPN IP):443
    Mon Jul 6 22:46:24 2015 TLS: Initial packet from (AlwaysVPN IP):443, sid=7165e00d 8355b405
    Mon Jul 6 22:46:24 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
    Mon Jul 6 22:46:26 2015 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=AlwaysVPN_CA/emailAddress=support@alwaysvpn.com
    Mon Jul 6 22:46:26 2015 VERIFY OK: nsCertType=SERVER
    Mon Jul 6 22:46:26 2015 VERIFY X509NAME OK: /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=alwaysvpn_server5/emailAddress=support@alwaysvpn.com
    Mon Jul 6 22:46:26 2015 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=AlwaysVPN/CN=alwaysvpn_server5/emailAddress=support@alwaysvpn.com
    Mon Jul 6 22:46:29 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Jul 6 22:46:29 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Jul 6 22:46:29 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
    Mon Jul 6 22:46:29 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
    Mon Jul 6 22:46:29 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    Mon Jul 6 22:46:29 2015 [alwaysvpn_server5] Peer Connection Initiated with (AlwaysVPN IP):443
    Mon Jul 6 22:46:31 2015 SENT CONTROL [alwaysvpn_server5]: 'PUSH_REQUEST' (status=1)
    Mon Jul 6 22:46:31 2015 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.19.96.1,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,rcvbuf 100000,sndbuf 100000,ping 10,ping-restart 30,ifconfig 10.19.97.63 255.255.252.0'
    Mon Jul 6 22:46:31 2015 OPTIONS IMPORT: timers and/or timeouts modified
    Mon Jul 6 22:46:31 2015 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
    Mon Jul 6 22:46:31 2015 Socket Buffers: R=[200000->200000] S=[200000->200000]
    Mon Jul 6 22:46:31 2015 OPTIONS IMPORT: --ifconfig/up options modified
    Mon Jul 6 22:46:31 2015 OPTIONS IMPORT: route-related options modified
    Mon Jul 6 22:46:31 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    Mon Jul 6 22:46:31 2015 ROUTE default_gateway=192.168.1.1
    Mon Jul 6 22:46:31 2015 TUN/TAP device tap2 opened
    Mon Jul 6 22:46:31 2015 TUN/TAP TX queue length set to 100
    Mon Jul 6 22:46:31 2015 /sbin/ifconfig tap2 10.19.97.63 netmask 255.255.252.0 mtu 1500 broadcast 10.19.99.255
    Mon Jul 6 22:46:31 2015 /sbin/route add -net (AlwaysVPN IP) netmask 255.255.255.255 gw 192.168.1.1
    Mon Jul 6 22:46:32 2015 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.19.96.1
    Mon Jul 6 22:46:32 2015 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.19.96.1
    Mon Jul 6 22:46:32 2015 Initialization Sequence Completed
    Mon Jul 6 22:46:34 2015 Connection reset, restarting [0]

    After the Initialization Sequence is completed the connections restarts permanently, like a bootloop.
    Can somebody help me?
    • CommentAuthoradmin
    • CommentTimeJul 6th 2015
     
    It looks like you are running this on an embedded linux device. Can you tell me some more about what OS it is running?
    Also OpenVPN 2.1.3 is fairly old. It would be good if you could run a newer version of openvpn.
    • CommentAuthorsYchZ
    • CommentTimeJul 6th 2015
     
    After a secound restart, it works fine
    This topic can be closed. Sry
    • CommentAuthoradmin
    • CommentTimeJul 6th 2015
     
    I'm happy to hear that you got it working!