dfox
07-07-15, 07:28
Raised a support ticket with my VPN provider due to issues with getting this running, most of the issues are now sorted apart from the below, the vpn provider has said they don't know what is wrong now but have pointed out the below when I run the telnet command they provided.
Wondering if anyone on here can shed some light as to what this issue is.
Mon Jul 6 20:33:09 2015 OpenVPN 2.3.4 mipsel-oe-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on May 8 2015
Mon Jul 6 20:33:09 2015 library versions: OpenSSL 1.0.2a 19 Mar 2015, LZO 2.09
Mon Jul 6 20:33:09 2015 WARNING: file '/etc/openvpn/user.key' is group or others accessible
Mon Jul 6 20:33:09 2015 WARNING: file '/etc/openvpn/ta.key' is group or others accessible
Mon Jul 6 20:33:09 2015 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
Mon Jul 6 20:33:09 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:09 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:09 2015 Socket Buffers: R=[87380->131072] S=[16384->131072]
Mon Jul 6 20:33:09 2015 Attempting to establish TCP connection with [AF_INET]199.241.146.178:443 [nonblock]
Mon Jul 6 20:33:10 2015 TCP connection established with [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:10 2015 TCPv4_CLIENT link local:
Mon Jul 6 20:33:10 2015 TCPv4_CLIENT link remote: [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:10 2015 TLS: Initial packet from [AF_INET]199.241.146.178:443, sid=4c27a6e6 9a343736
Mon Jul 6 20:33:12 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Jul 6 20:33:12 2015 Validating certificate key usage
Mon Jul 6 20:33:12 2015 ++ Certificate has key usage 00a0, expects 00a0
Mon Jul 6 20:33:12 2015 VERIFY KU OK
Mon Jul 6 20:33:12 2015 Validating certificate extended key usage
Mon Jul 6 20:33:12 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jul 6 20:33:12 2015 VERIFY EKU OK
Mon Jul 6 20:33:12 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Mon Jul 6 20:33:24 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:33:24 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:24 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:33:24 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:24 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Mon Jul 6 20:33:24 2015 [server] Peer Connection Initiated with [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:26 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Jul 6 20:33:27 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.251 255.255.0.0'
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: timers and/or timeouts modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: LZO parms modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: --ifconfig/up options modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: route options modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: route-related options modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Jul 6 20:33:27 2015 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=eth0 HWADDR=00:1e:a0:00:66:a2
Mon Jul 6 20:33:27 2015 TUN/TAP device tun1 opened
Mon Jul 6 20:33:27 2015 TUN/TAP TX queue length set to 100
Mon Jul 6 20:33:27 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Jul 6 20:33:27 2015 /sbin/ifconfig tun1 10.5.0.251 netmask 255.255.0.0 mtu 1500 broadcast 10.5.255.255
Mon Jul 6 20:33:32 2015 /sbin/route add -net 199.241.146.178 netmask 255.255.255.255 gw 192.168.0.1
[U] route: SIOCADDRT: File exists
Mon Jul 6 20:33:32 2015 ERROR: Linux route add command failed: external program exited with error status: 1
Mon Jul 6 20:33:32 2015 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.5.0.1
route: SIOCADDRT: File exists
Mon Jul 6 20:33:32 2015 ERROR: Linux route add command failed: external program exited with error status: 1
Mon Jul 6 20:33:32 2015 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.5.0.1
route: SIOCADDRT: File exists
Mon Jul 6 20:33:32 2015 ERROR: Linux route add command failed: external program exited with error status: 1
Mon Jul 6 20:33:32 2015 Initialization Sequence Completed
Mon Jul 6 20:33:47 2015 Connection reset, restarting [0]
Mon Jul 6 20:33:47 2015 SIGUSR1[soft,connection-reset] received, process restarting
Mon Jul 6 20:33:47 2015 Restart pause, 5 second(s)
Mon Jul 6 20:33:52 2015 Socket Buffers: R=[87380->131072] S=[16384->131072]
Mon Jul 6 20:33:52 2015 Attempting to establish TCP connection with [AF_INET]199.241.146.178:443 [nonblock]
Mon Jul 6 20:33:53 2015 TCP connection established with [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:53 2015 TCPv4_CLIENT link local: [undef]
Mon Jul 6 20:33:53 2015 TCPv4_CLIENT link remote: [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:53 2015 TLS: Initial packet from [AF_INET]199.241.146.178:443, sid=51fc7777 0f20fe94
Mon Jul 6 20:33:56 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Jul 6 20:33:56 2015 Validating certificate key usage
Mon Jul 6 20:33:56 2015 ++ Certificate has key usage 00a0, expects 00a0
Mon Jul 6 20:33:56 2015 VERIFY KU OK
Mon Jul 6 20:33:56 2015 Validating certificate extended key usage
Mon Jul 6 20:33:56 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jul 6 20:33:56 2015 VERIFY EKU OK
Mon Jul 6 20:33:56 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Mon Jul 6 20:34:08 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:34:08 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:34:08 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:34:08 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:34:08 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Mon Jul 6 20:34:08 2015 [server] Peer Connection Initiated with [AF_INET]199.241.146.178:443
Mon Jul 6 20:34:10 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Jul 6 20:34:10 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.251 255.255.0.0'
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: timers and/or timeouts modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: LZO parms modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: --ifconfig/up options modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: route options modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: route-related options modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Jul 6 20:34:10 2015 Preserving previous TUN/TAP instance: tun1
Mon Jul 6 20:34:10 2015 Initialization Sequence Completed
Wondering if anyone on here can shed some light as to what this issue is.
Mon Jul 6 20:33:09 2015 OpenVPN 2.3.4 mipsel-oe-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on May 8 2015
Mon Jul 6 20:33:09 2015 library versions: OpenSSL 1.0.2a 19 Mar 2015, LZO 2.09
Mon Jul 6 20:33:09 2015 WARNING: file '/etc/openvpn/user.key' is group or others accessible
Mon Jul 6 20:33:09 2015 WARNING: file '/etc/openvpn/ta.key' is group or others accessible
Mon Jul 6 20:33:09 2015 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
Mon Jul 6 20:33:09 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:09 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:09 2015 Socket Buffers: R=[87380->131072] S=[16384->131072]
Mon Jul 6 20:33:09 2015 Attempting to establish TCP connection with [AF_INET]199.241.146.178:443 [nonblock]
Mon Jul 6 20:33:10 2015 TCP connection established with [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:10 2015 TCPv4_CLIENT link local:
Mon Jul 6 20:33:10 2015 TCPv4_CLIENT link remote: [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:10 2015 TLS: Initial packet from [AF_INET]199.241.146.178:443, sid=4c27a6e6 9a343736
Mon Jul 6 20:33:12 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Jul 6 20:33:12 2015 Validating certificate key usage
Mon Jul 6 20:33:12 2015 ++ Certificate has key usage 00a0, expects 00a0
Mon Jul 6 20:33:12 2015 VERIFY KU OK
Mon Jul 6 20:33:12 2015 Validating certificate extended key usage
Mon Jul 6 20:33:12 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jul 6 20:33:12 2015 VERIFY EKU OK
Mon Jul 6 20:33:12 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Mon Jul 6 20:33:24 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:33:24 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:24 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:33:24 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:33:24 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Mon Jul 6 20:33:24 2015 [server] Peer Connection Initiated with [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:26 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Jul 6 20:33:27 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.251 255.255.0.0'
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: timers and/or timeouts modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: LZO parms modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: --ifconfig/up options modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: route options modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: route-related options modified
Mon Jul 6 20:33:27 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Jul 6 20:33:27 2015 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=eth0 HWADDR=00:1e:a0:00:66:a2
Mon Jul 6 20:33:27 2015 TUN/TAP device tun1 opened
Mon Jul 6 20:33:27 2015 TUN/TAP TX queue length set to 100
Mon Jul 6 20:33:27 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Jul 6 20:33:27 2015 /sbin/ifconfig tun1 10.5.0.251 netmask 255.255.0.0 mtu 1500 broadcast 10.5.255.255
Mon Jul 6 20:33:32 2015 /sbin/route add -net 199.241.146.178 netmask 255.255.255.255 gw 192.168.0.1
[U] route: SIOCADDRT: File exists
Mon Jul 6 20:33:32 2015 ERROR: Linux route add command failed: external program exited with error status: 1
Mon Jul 6 20:33:32 2015 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.5.0.1
route: SIOCADDRT: File exists
Mon Jul 6 20:33:32 2015 ERROR: Linux route add command failed: external program exited with error status: 1
Mon Jul 6 20:33:32 2015 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.5.0.1
route: SIOCADDRT: File exists
Mon Jul 6 20:33:32 2015 ERROR: Linux route add command failed: external program exited with error status: 1
Mon Jul 6 20:33:32 2015 Initialization Sequence Completed
Mon Jul 6 20:33:47 2015 Connection reset, restarting [0]
Mon Jul 6 20:33:47 2015 SIGUSR1[soft,connection-reset] received, process restarting
Mon Jul 6 20:33:47 2015 Restart pause, 5 second(s)
Mon Jul 6 20:33:52 2015 Socket Buffers: R=[87380->131072] S=[16384->131072]
Mon Jul 6 20:33:52 2015 Attempting to establish TCP connection with [AF_INET]199.241.146.178:443 [nonblock]
Mon Jul 6 20:33:53 2015 TCP connection established with [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:53 2015 TCPv4_CLIENT link local: [undef]
Mon Jul 6 20:33:53 2015 TCPv4_CLIENT link remote: [AF_INET]199.241.146.178:443
Mon Jul 6 20:33:53 2015 TLS: Initial packet from [AF_INET]199.241.146.178:443, sid=51fc7777 0f20fe94
Mon Jul 6 20:33:56 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Jul 6 20:33:56 2015 Validating certificate key usage
Mon Jul 6 20:33:56 2015 ++ Certificate has key usage 00a0, expects 00a0
Mon Jul 6 20:33:56 2015 VERIFY KU OK
Mon Jul 6 20:33:56 2015 Validating certificate extended key usage
Mon Jul 6 20:33:56 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jul 6 20:33:56 2015 VERIFY EKU OK
Mon Jul 6 20:33:56 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Mon Jul 6 20:34:08 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:34:08 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:34:08 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jul 6 20:34:08 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jul 6 20:34:08 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Mon Jul 6 20:34:08 2015 [server] Peer Connection Initiated with [AF_INET]199.241.146.178:443
Mon Jul 6 20:34:10 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Jul 6 20:34:10 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.251 255.255.0.0'
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: timers and/or timeouts modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: LZO parms modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: --ifconfig/up options modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: route options modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: route-related options modified
Mon Jul 6 20:34:10 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Jul 6 20:34:10 2015 Preserving previous TUN/TAP instance: tun1
Mon Jul 6 20:34:10 2015 Initialization Sequence Completed