Jump to content

openvpn crashes just when establishing connection


nando

Recommended Posts

 

openvpn appears to connect, and then the nano resets.

full command output below:
================================================
root@Pineapple:~# openvpn seattle.ovpn

Sat Jan 25 14:21:38 2020 WARNING: --keysize is DEPRECATED and will be
removed in OpenVPN 2.6
Sat Jan 25 14:21:38 2020 OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL
(OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Jan 25 14:21:38 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Sat Jan 25 14:21:38 2020 TCP/UDP: Preserving recently used remote
address: [AF_INET]205.185.223.128:443
Sat Jan 25 14:21:38 2020 Socket Buffers: R=[163840->163840] S=[163840->163840]
Sat Jan 25 14:21:38 2020 UDP link local: (not bound)
Sat Jan 25 14:21:38 2020 UDP link remote: [AF_INET]205.185.223.128:443
Sat Jan 25 14:21:38 2020 TLS: Initial packet from
[AF_INET]205.185.223.128:443, sid=0cfa6744 0674b9af
Sat Jan 25 14:21:38 2020 WARNING: this configuration may cache
passwords in memory -- use the auth-nocache option to prevent this
Sat Jan 25 14:21:38 2020 VERIFY OK: depth=1, C=US, ST=FL, L=Winter
Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA,
emailAddress=support@ipvanish.com
Sat Jan 25 14:21:38 2020 VERIFY X509NAME OK: C=US, ST=FL, L=Winter
Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com,
emailAddress=support@ipvanish.com
Sat Jan 25 14:21:38 2020 VERIFY OK: depth=0, C=US, ST=FL, L=Winter
Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com,
emailAddress=support@ipvanish.com
Sat Jan 25 14:21:40 2020 Control Channel: TLSv1.2, cipher SSLv3
DHE-RSA-AES256-SHA, 2048 bit RSA
Sat Jan 25 14:21:40 2020 [sea-a26.ipvanish.com] Peer Connection
Initiated with [AF_INET]205.185.223.128:443
Sat Jan 25 14:21:42 2020 SENT CONTROL [sea-a26.ipvanish.com]:
'PUSH_REQUEST' (status=1)
Sat Jan 25 14:21:42 2020 PUSH: Received control message:
'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS
198.18.0.1,dhcp-option DNS 198.18.0.2,rcvbuf 493216,sndbuf
493216,explicit-exit-notify 5,comp-lzo no,route-gateway
172.21.20.1,topology subnet,ping 20,ping-restart 40,ifconfig
172.21.20.136 255.255.254.0,peer-id 0,cipher AES-256-GCM'
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: timers and/or timeouts modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: explicit notify parm(s) modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: compression parms modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Sat Jan 25 14:21:42 2020 Socket Buffers: R=[163840->327680] S=[163840->327680]
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: --ifconfig/up options modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: route options modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: route-related options modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: --ip-win32 and/or
--dhcp-option options modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: peer-id set
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: adjusting link_mtu to 1625
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: data channel crypto options modified
Sat Jan 25 14:21:42 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Sat Jan 25 14:21:42 2020 NCP: overriding user-set keysize with default
Sat Jan 25 14:21:42 2020 Outgoing Data Channel: Cipher 'AES-256-GCM'
initialized with 256 bit key
Sat Jan 25 14:21:42 2020 Incoming Data Channel: Cipher 'AES-256-GCM'
initialized with 256 bit key
packet_write_wait: Connection to 172.16.42.1 port 22: Broken pipe

 
Link to comment
Share on other sites

Sat Jan 25 15:34:04 2020 us=633305 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Sat Jan 25 15:34:04 2020 us=637739 OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Jan 25 15:34:04 2020 us=642340 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Sat Jan 25 15:34:04 2020 us=665287 LZO compression initializing
Sat Jan 25 15:34:04 2020 us=679053 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Jan 25 15:34:04 2020 us=760381 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sat Jan 25 15:34:04 2020 us=765358 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,k
eysize 256,key-method 2,tls-client'
Sat Jan 25 15:34:04 2020 us=766623 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,aut
h SHA256,keysize 256,key-method 2,tls-server'
Sat Jan 25 15:34:04 2020 us=771294 TCP/UDP: Preserving recently used remote address: [AF_INET]205.185.223.128:443
Sat Jan 25 15:34:04 2020 us=776186 Socket Buffers: R=[163840->163840] S=[163840->163840]
Sat Jan 25 15:34:04 2020 us=777333 UDP link local: (not bound)
Sat Jan 25 15:34:04 2020 us=778921 UDP link remote: [AF_INET]205.185.223.128:443
Sat Jan 25 15:34:04 2020 us=794278 UDP WRITE [14] to [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Sat Jan 25 15:34:04 2020 us=906590 UDP READ [26] from [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Sat Jan 25 15:34:04 2020 us=908372 TLS: Initial packet from [AF_INET]205.185.223.128:443, sid=10449987 74033af9
Sat Jan 25 15:34:04 2020 us=911457 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 0 ]
Sat Jan 25 15:34:04 2020 us=914250 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Jan 25 15:34:04 2020 us=916623 UDP WRITE [255] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=241
Sat Jan 25 15:34:05 2020 us=57595 UDP READ [1200] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=1174
Sat Jan 25 15:34:05 2020 us=60635 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 1 ]
Sat Jan 25 15:34:05 2020 us=63529 UDP READ [1188] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=1174
Sat Jan 25 15:34:05 2020 us=66019 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 2 ]
Sat Jan 25 15:34:05 2020 us=68942 UDP READ [1044] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=1030
Sat Jan 25 15:34:05 2020 us=83312 VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com
Sat Jan 25 15:34:05 2020 us=96649 VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvani
sh.com
Sat Jan 25 15:34:05 2020 us=98316 VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvani
sh.com
Sat Jan 25 15:34:06 2020 us=816027 UDP WRITE [368] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 3 ] pid=2 DATA len=342
Sat Jan 25 15:34:06 2020 us=951786 UDP READ [101] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 2 ] pid=4 DATA len=75
Sat Jan 25 15:34:06 2020 us=956195 UDP WRITE [479] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 4 ] pid=3 DATA len=453
Sat Jan 25 15:34:07 2020 us=131095 UDP READ [287] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 3 ] pid=5 DATA len=261
Sat Jan 25 15:34:07 2020 us=134048 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 5 ]
Sat Jan 25 15:34:07 2020 us=136143 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sat Jan 25 15:34:07 2020 us=138464 [sea-a26.ipvanish.com] Peer Connection Initiated with [AF_INET]205.185.223.128:443
packet_write_poll: Connection to 172.16.42.1 port 22: Host is down

 

Link to comment
Share on other sites

# openvpn seattle.ovpn  
Sat Jan 25 15:53:00 2020 us=4362 OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Jan 25 15:53:00 2020 us=9836 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Sat Jan 25 15:53:00 2020 us=35861 LZO compression initializing
Sat Jan 25 15:53:00 2020 us=50570 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Jan 25 15:53:00 2020 us=194632 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sat Jan 25 15:53:00 2020 us=196567 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 68 bytes
Sat Jan 25 15:53:00 2020 us=198025 calc_options_string_link_mtu: link-mtu 1622 -> 1570
Sat Jan 25 15:53:00 2020 us=203446 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 68 bytes
Sat Jan 25 15:53:00 2020 us=204881 calc_options_string_link_mtu: link-mtu 1622 -> 1570
Sat Jan 25 15:53:00 2020 us=207291 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,k
eysize 256,key-method 2,tls-client'
Sat Jan 25 15:53:00 2020 us=208786 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,aut
h SHA256,keysize 256,key-method 2,tls-server'
Sat Jan 25 15:53:00 2020 us=213530 TCP/UDP: Preserving recently used remote address: [AF_INET]205.185.223.128:443
Sat Jan 25 15:53:00 2020 us=218910 Socket Buffers: R=[163840->163840] S=[163840->163840]
Sat Jan 25 15:53:00 2020 us=220332 UDP link local: (not bound)
Sat Jan 25 15:53:00 2020 us=222525 UDP link remote: [AF_INET]205.185.223.128:443
Sat Jan 25 15:53:00 2020 us=238997  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=240824 UDP WRITE [14] to [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=34ad198f 26c5beae [ ] pid=0 DATA  
Sat Jan 25 15:53:00 2020 us=242901 UDP write returned 14
Sat Jan 25 15:53:00 2020 us=360704  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=362206 UDP read returned 26
Sat Jan 25 15:53:00 2020 us=364383 UDP READ [26] from [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 sid=c09026ca e040f1ef [ 0 sid=34ad198f 26c
5beae ] pid=0 DATA  
Sat Jan 25 15:53:00 2020 us=366971 TLS: Initial packet from [AF_INET]205.185.223.128:443, sid=c09026ca e040f1ef
Sat Jan 25 15:53:00 2020 us=369100  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=371034 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 0 sid=c09026ca e040f1ef ]
Sat Jan 25 15:53:00 2020 us=373085 UDP write returned 22
Sat Jan 25 15:53:00 2020 us=375458 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Jan 25 15:53:00 2020 us=377573  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=381636 UDP WRITE [255] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ ] pid=1 DATA 16030100 ec010000 e8030
302 c7cee207 35fb7e69 fd65e1e0 ca4e37e6 80f128d[more...]
Sat Jan 25 15:53:00 2020 us=383681 UDP write returned 255
Sat Jan 25 15:53:00 2020 us=520202  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=521971 UDP read returned 1200
Sat Jan 25 15:53:00 2020 us=534966 UDP READ [1200] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ 1 sid=34ad198f 26c5beae ] pid=1 DA
TA 16030300 31020000 2d03032b 39d927c4 5037e10a fc710863 71834341 ca6cf4d[more...]
Sat Jan 25 15:53:00 2020 us=537811  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=539802 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 1 sid=c09026ca e040f1ef ]
Sat Jan 25 15:53:00 2020 us=541804 UDP write returned 22
Sat Jan 25 15:53:00 2020 us=543774  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=545281 UDP read returned 1188
Sat Jan 25 15:53:00 2020 us=558736 UDP READ [1188] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ ] pid=2 DATA 37382572 aa9dd862 93d
8ef94 42d79001 bacf844a 4879f899 aa72c283 12f4356[more...]
Sat Jan 25 15:53:00 2020 us=560889  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=562804 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 2 sid=c09026ca e040f1ef ]
Sat Jan 25 15:53:00 2020 us=564826 UDP write returned 22
Sat Jan 25 15:53:00 2020 us=566965  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=568661 UDP read returned 1044
Sat Jan 25 15:53:00 2020 us=581288 UDP READ [1044] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ ] pid=3 DATA 027b3d08 bce98b78 b1b
3a30f 84392ad8 e74f28ca 361e34fe 152448c0 a6aa343[more...]
Sat Jan 25 15:53:00 2020 us=592632 VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com
Sat Jan 25 15:53:00 2020 us=605366 VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvan
ish.com
Sat Jan 25 15:53:00 2020 us=606944 VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvan
ish.com
Sat Jan 25 15:53:02 2020 us=198583  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=203528 UDP WRITE [368] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ 3 sid=c09026ca e040f1ef ] pid=2 DATA
16030301 06100001 0201007f 0b1859e2 61d3e105 24438cb1 e324b3bf 4f4ac15[more...]
Sat Jan 25 15:53:02 2020 us=205608 UDP write returned 368
Sat Jan 25 15:53:02 2020 us=340406  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=341931 UDP read returned 101
Sat Jan 25 15:53:02 2020 us=344851 UDP READ [101] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ 2 sid=34ad198f 26c5beae ] pid=4 DAT
A 14030300 01011603 03004097 d5d8ae0b 25b9d097 a933a2f3 503a947b 3b0e3ee[more...]
Sat Jan 25 15:53:02 2020 us=349037  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=354920 UDP WRITE [479] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ 4 sid=c09026ca e040f1ef ] pid=3 DATA
17030301 c00ed566 45e6fb97 3fa8e09c 2b5ab9fa 1e15944f 4d1db5fc dbf1287[more...]
Sat Jan 25 15:53:02 2020 us=357208 UDP write returned 479
Sat Jan 25 15:53:02 2020 us=485918  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=487489 UDP read returned 287
Sat Jan 25 15:53:02 2020 us=491867 UDP READ [287] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ 3 sid=34ad198f 26c5beae ] pid=5 DAT
A 17030301 0072278a 8f50eb8d 62c96784 b14b3207 50327212 865ff232 8f9c1be[more...]
Sat Jan 25 15:53:02 2020 us=494402  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=496399 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 5 sid=c09026ca e040f1ef ]
Sat Jan 25 15:53:02 2020 us=498527 UDP write returned 22
Sat Jan 25 15:53:02 2020 us=500181 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sat Jan 25 15:53:02 2020 us=502272 [sea-a26.ipvanish.com] Peer Connection Initiated with [AF_INET]205.185.223.128:443
Sat Jan 25 15:53:03 2020 us=512745  event_wait returned 0
Sat Jan 25 15:53:03 2020 us=513952 SENT CONTROL [sea-a26.ipvanish.com]: 'PUSH_REQUEST' (status=1)
Sat Jan 25 15:53:03 2020 us=514740  event_wait returned 1
Sat Jan 25 15:53:03 2020 us=516170 UDP WRITE [83] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ ] pid=4 DATA 17030300 408463c3 16c423
a6 3dd2a75f efde5dea 3e8b0a1e 36ddd438 11aac62[more...]
Sat Jan 25 15:53:03 2020 us=519284 UDP write returned 83
Sat Jan 25 15:53:03 2020 us=721303  event_wait returned 1
Sat Jan 25 15:53:03 2020 us=722872 UDP read returned 22
Sat Jan 25 15:53:03 2020 us=724974 UDP READ [22] from [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=c09026ca e040f1ef [ 4 sid=34ad198f 26c5beae ]
Sat Jan 25 15:53:03 2020 us=727235  event_wait returned 1
Sat Jan 25 15:53:03 2020 us=728718 UDP read returned 355
Sat Jan 25 15:53:03 2020 us=734735 UDP READ [355] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ ] pid=6 DATA 17030301 5017e17d be47
dd42 45b9baa2 45e83c40 b9e902cf d73c160e 953423e[more...]
Sat Jan 25 15:53:03 2020 us=740234 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 198.18.0.1,dhcp-option DNS 198.18.
0.2,rcvbuf 493216,sndbuf 493216,explicit-exit-notify 5,comp-lzo no,route-gateway 172.21.24.1,topology subnet,ping 20,ping-restart 40,ifconfig 172.21.24.173 255.255
.254.0,peer-id 33,cipher AES-256-GCM'
Sat Jan 25 15:53:03 2020 us=743323 OPTIONS IMPORT: timers and/or timeouts modified
Sat Jan 25 15:53:03 2020 us=744735 OPTIONS IMPORT: explicit notify parm(s) modified
Sat Jan 25 15:53:03 2020 us=746950 OPTIONS IMPORT: compression parms modified
Sat Jan 25 15:53:03 2020 us=748792 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Sat Jan 25 15:53:03 2020 us=750464 Socket Buffers: R=[163840->327680] S=[163840->327680]
Sat Jan 25 15:53:03 2020 us=752138 OPTIONS IMPORT: --ifconfig/up options modified
Sat Jan 25 15:53:03 2020 us=753776 OPTIONS IMPORT: route options modified
Sat Jan 25 15:53:03 2020 us=755408 OPTIONS IMPORT: route-related options modified
Sat Jan 25 15:53:03 2020 us=757145 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Jan 25 15:53:03 2020 us=758786 OPTIONS IMPORT: peer-id set
Sat Jan 25 15:53:03 2020 us=760576 OPTIONS IMPORT: adjusting link_mtu to 1625
Sat Jan 25 15:53:03 2020 us=762158 OPTIONS IMPORT: data channel crypto options modified
Sat Jan 25 15:53:03 2020 us=763782 Data Channel: using negotiated cipher 'AES-256-GCM'
Sat Jan 25 15:53:03 2020 us=765573 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 48 bytes
Sat Jan 25 15:53:03 2020 us=767770 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
Sat Jan 25 15:53:03 2020 us=772946 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Jan 25 15:53:03 2020 us=774561 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
packet_write_wait: Connection to 172.16.42.1 port 22: Broken pipe


# cat seattle.ovpn  
client
dev tun
proto udp
remote sea-a26.ipvanish.com 443
resolv-retry infinite
nobind
persist-key
persist-tun
persist-remote-ip
ca ca.ipvanish.com.crt
verify-x509-name sea-a26.ipvanish.com name
auth-user-pass creds.txt


#comp-lzo
link-mtu 1570
verb 3
auth SHA256
cipher AES-256-CBC
keysize 256
tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-DSS-WITH-AES-256-CBC-SHA:TLS-RSA-WITH-AES-256-CBC-SHA

 

Link to comment
Share on other sites

  • 1 year later...

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...