Jump to content
nando

openvpn crashes just when establishing connection

Recommended Posts

 

openvpn appears to connect, and then the nano resets.

full command output below:
================================================
root@Pineapple:~# openvpn seattle.ovpn

Sat Jan 25 14:21:38 2020 WARNING: --keysize is DEPRECATED and will be
removed in OpenVPN 2.6
Sat Jan 25 14:21:38 2020 OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL
(OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Jan 25 14:21:38 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Sat Jan 25 14:21:38 2020 TCP/UDP: Preserving recently used remote
address: [AF_INET]205.185.223.128:443
Sat Jan 25 14:21:38 2020 Socket Buffers: R=[163840->163840] S=[163840->163840]
Sat Jan 25 14:21:38 2020 UDP link local: (not bound)
Sat Jan 25 14:21:38 2020 UDP link remote: [AF_INET]205.185.223.128:443
Sat Jan 25 14:21:38 2020 TLS: Initial packet from
[AF_INET]205.185.223.128:443, sid=0cfa6744 0674b9af
Sat Jan 25 14:21:38 2020 WARNING: this configuration may cache
passwords in memory -- use the auth-nocache option to prevent this
Sat Jan 25 14:21:38 2020 VERIFY OK: depth=1, C=US, ST=FL, L=Winter
Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA,
emailAddress=support@ipvanish.com
Sat Jan 25 14:21:38 2020 VERIFY X509NAME OK: C=US, ST=FL, L=Winter
Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com,
emailAddress=support@ipvanish.com
Sat Jan 25 14:21:38 2020 VERIFY OK: depth=0, C=US, ST=FL, L=Winter
Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com,
emailAddress=support@ipvanish.com
Sat Jan 25 14:21:40 2020 Control Channel: TLSv1.2, cipher SSLv3
DHE-RSA-AES256-SHA, 2048 bit RSA
Sat Jan 25 14:21:40 2020 [sea-a26.ipvanish.com] Peer Connection
Initiated with [AF_INET]205.185.223.128:443
Sat Jan 25 14:21:42 2020 SENT CONTROL [sea-a26.ipvanish.com]:
'PUSH_REQUEST' (status=1)
Sat Jan 25 14:21:42 2020 PUSH: Received control message:
'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS
198.18.0.1,dhcp-option DNS 198.18.0.2,rcvbuf 493216,sndbuf
493216,explicit-exit-notify 5,comp-lzo no,route-gateway
172.21.20.1,topology subnet,ping 20,ping-restart 40,ifconfig
172.21.20.136 255.255.254.0,peer-id 0,cipher AES-256-GCM'
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: timers and/or timeouts modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: explicit notify parm(s) modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: compression parms modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Sat Jan 25 14:21:42 2020 Socket Buffers: R=[163840->327680] S=[163840->327680]
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: --ifconfig/up options modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: route options modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: route-related options modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: --ip-win32 and/or
--dhcp-option options modified
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: peer-id set
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: adjusting link_mtu to 1625
Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: data channel crypto options modified
Sat Jan 25 14:21:42 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Sat Jan 25 14:21:42 2020 NCP: overriding user-set keysize with default
Sat Jan 25 14:21:42 2020 Outgoing Data Channel: Cipher 'AES-256-GCM'
initialized with 256 bit key
Sat Jan 25 14:21:42 2020 Incoming Data Channel: Cipher 'AES-256-GCM'
initialized with 256 bit key
packet_write_wait: Connection to 172.16.42.1 port 22: Broken pipe

 

Share this post


Link to post
Share on other sites

Sat Jan 25 15:34:04 2020 us=633305 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
Sat Jan 25 15:34:04 2020 us=637739 OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Jan 25 15:34:04 2020 us=642340 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Sat Jan 25 15:34:04 2020 us=665287 LZO compression initializing
Sat Jan 25 15:34:04 2020 us=679053 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Jan 25 15:34:04 2020 us=760381 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sat Jan 25 15:34:04 2020 us=765358 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,k
eysize 256,key-method 2,tls-client'
Sat Jan 25 15:34:04 2020 us=766623 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,aut
h SHA256,keysize 256,key-method 2,tls-server'
Sat Jan 25 15:34:04 2020 us=771294 TCP/UDP: Preserving recently used remote address: [AF_INET]205.185.223.128:443
Sat Jan 25 15:34:04 2020 us=776186 Socket Buffers: R=[163840->163840] S=[163840->163840]
Sat Jan 25 15:34:04 2020 us=777333 UDP link local: (not bound)
Sat Jan 25 15:34:04 2020 us=778921 UDP link remote: [AF_INET]205.185.223.128:443
Sat Jan 25 15:34:04 2020 us=794278 UDP WRITE [14] to [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Sat Jan 25 15:34:04 2020 us=906590 UDP READ [26] from [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Sat Jan 25 15:34:04 2020 us=908372 TLS: Initial packet from [AF_INET]205.185.223.128:443, sid=10449987 74033af9
Sat Jan 25 15:34:04 2020 us=911457 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 0 ]
Sat Jan 25 15:34:04 2020 us=914250 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Jan 25 15:34:04 2020 us=916623 UDP WRITE [255] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=241
Sat Jan 25 15:34:05 2020 us=57595 UDP READ [1200] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=1174
Sat Jan 25 15:34:05 2020 us=60635 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 1 ]
Sat Jan 25 15:34:05 2020 us=63529 UDP READ [1188] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=1174
Sat Jan 25 15:34:05 2020 us=66019 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 2 ]
Sat Jan 25 15:34:05 2020 us=68942 UDP READ [1044] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=1030
Sat Jan 25 15:34:05 2020 us=83312 VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com
Sat Jan 25 15:34:05 2020 us=96649 VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvani
sh.com
Sat Jan 25 15:34:05 2020 us=98316 VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvani
sh.com
Sat Jan 25 15:34:06 2020 us=816027 UDP WRITE [368] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 3 ] pid=2 DATA len=342
Sat Jan 25 15:34:06 2020 us=951786 UDP READ [101] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 2 ] pid=4 DATA len=75
Sat Jan 25 15:34:06 2020 us=956195 UDP WRITE [479] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 4 ] pid=3 DATA len=453
Sat Jan 25 15:34:07 2020 us=131095 UDP READ [287] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 3 ] pid=5 DATA len=261
Sat Jan 25 15:34:07 2020 us=134048 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 5 ]
Sat Jan 25 15:34:07 2020 us=136143 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sat Jan 25 15:34:07 2020 us=138464 [sea-a26.ipvanish.com] Peer Connection Initiated with [AF_INET]205.185.223.128:443
packet_write_poll: Connection to 172.16.42.1 port 22: Host is down

 

Share this post


Link to post
Share on other sites

# openvpn seattle.ovpn  
Sat Jan 25 15:53:00 2020 us=4362 OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
Sat Jan 25 15:53:00 2020 us=9836 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Sat Jan 25 15:53:00 2020 us=35861 LZO compression initializing
Sat Jan 25 15:53:00 2020 us=50570 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Jan 25 15:53:00 2020 us=194632 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sat Jan 25 15:53:00 2020 us=196567 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 68 bytes
Sat Jan 25 15:53:00 2020 us=198025 calc_options_string_link_mtu: link-mtu 1622 -> 1570
Sat Jan 25 15:53:00 2020 us=203446 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 68 bytes
Sat Jan 25 15:53:00 2020 us=204881 calc_options_string_link_mtu: link-mtu 1622 -> 1570
Sat Jan 25 15:53:00 2020 us=207291 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,k
eysize 256,key-method 2,tls-client'
Sat Jan 25 15:53:00 2020 us=208786 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,aut
h SHA256,keysize 256,key-method 2,tls-server'
Sat Jan 25 15:53:00 2020 us=213530 TCP/UDP: Preserving recently used remote address: [AF_INET]205.185.223.128:443
Sat Jan 25 15:53:00 2020 us=218910 Socket Buffers: R=[163840->163840] S=[163840->163840]
Sat Jan 25 15:53:00 2020 us=220332 UDP link local: (not bound)
Sat Jan 25 15:53:00 2020 us=222525 UDP link remote: [AF_INET]205.185.223.128:443
Sat Jan 25 15:53:00 2020 us=238997  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=240824 UDP WRITE [14] to [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=34ad198f 26c5beae [ ] pid=0 DATA  
Sat Jan 25 15:53:00 2020 us=242901 UDP write returned 14
Sat Jan 25 15:53:00 2020 us=360704  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=362206 UDP read returned 26
Sat Jan 25 15:53:00 2020 us=364383 UDP READ [26] from [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 sid=c09026ca e040f1ef [ 0 sid=34ad198f 26c
5beae ] pid=0 DATA  
Sat Jan 25 15:53:00 2020 us=366971 TLS: Initial packet from [AF_INET]205.185.223.128:443, sid=c09026ca e040f1ef
Sat Jan 25 15:53:00 2020 us=369100  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=371034 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 0 sid=c09026ca e040f1ef ]
Sat Jan 25 15:53:00 2020 us=373085 UDP write returned 22
Sat Jan 25 15:53:00 2020 us=375458 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Jan 25 15:53:00 2020 us=377573  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=381636 UDP WRITE [255] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ ] pid=1 DATA 16030100 ec010000 e8030
302 c7cee207 35fb7e69 fd65e1e0 ca4e37e6 80f128d[more...]
Sat Jan 25 15:53:00 2020 us=383681 UDP write returned 255
Sat Jan 25 15:53:00 2020 us=520202  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=521971 UDP read returned 1200
Sat Jan 25 15:53:00 2020 us=534966 UDP READ [1200] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ 1 sid=34ad198f 26c5beae ] pid=1 DA
TA 16030300 31020000 2d03032b 39d927c4 5037e10a fc710863 71834341 ca6cf4d[more...]
Sat Jan 25 15:53:00 2020 us=537811  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=539802 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 1 sid=c09026ca e040f1ef ]
Sat Jan 25 15:53:00 2020 us=541804 UDP write returned 22
Sat Jan 25 15:53:00 2020 us=543774  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=545281 UDP read returned 1188
Sat Jan 25 15:53:00 2020 us=558736 UDP READ [1188] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ ] pid=2 DATA 37382572 aa9dd862 93d
8ef94 42d79001 bacf844a 4879f899 aa72c283 12f4356[more...]
Sat Jan 25 15:53:00 2020 us=560889  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=562804 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 2 sid=c09026ca e040f1ef ]
Sat Jan 25 15:53:00 2020 us=564826 UDP write returned 22
Sat Jan 25 15:53:00 2020 us=566965  event_wait returned 1
Sat Jan 25 15:53:00 2020 us=568661 UDP read returned 1044
Sat Jan 25 15:53:00 2020 us=581288 UDP READ [1044] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ ] pid=3 DATA 027b3d08 bce98b78 b1b
3a30f 84392ad8 e74f28ca 361e34fe 152448c0 a6aa343[more...]
Sat Jan 25 15:53:00 2020 us=592632 VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com
Sat Jan 25 15:53:00 2020 us=605366 VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvan
ish.com
Sat Jan 25 15:53:00 2020 us=606944 VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvan
ish.com
Sat Jan 25 15:53:02 2020 us=198583  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=203528 UDP WRITE [368] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ 3 sid=c09026ca e040f1ef ] pid=2 DATA
16030301 06100001 0201007f 0b1859e2 61d3e105 24438cb1 e324b3bf 4f4ac15[more...]
Sat Jan 25 15:53:02 2020 us=205608 UDP write returned 368
Sat Jan 25 15:53:02 2020 us=340406  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=341931 UDP read returned 101
Sat Jan 25 15:53:02 2020 us=344851 UDP READ [101] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ 2 sid=34ad198f 26c5beae ] pid=4 DAT
A 14030300 01011603 03004097 d5d8ae0b 25b9d097 a933a2f3 503a947b 3b0e3ee[more...]
Sat Jan 25 15:53:02 2020 us=349037  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=354920 UDP WRITE [479] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ 4 sid=c09026ca e040f1ef ] pid=3 DATA
17030301 c00ed566 45e6fb97 3fa8e09c 2b5ab9fa 1e15944f 4d1db5fc dbf1287[more...]
Sat Jan 25 15:53:02 2020 us=357208 UDP write returned 479
Sat Jan 25 15:53:02 2020 us=485918  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=487489 UDP read returned 287
Sat Jan 25 15:53:02 2020 us=491867 UDP READ [287] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ 3 sid=34ad198f 26c5beae ] pid=5 DAT
A 17030301 0072278a 8f50eb8d 62c96784 b14b3207 50327212 865ff232 8f9c1be[more...]
Sat Jan 25 15:53:02 2020 us=494402  event_wait returned 1
Sat Jan 25 15:53:02 2020 us=496399 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 5 sid=c09026ca e040f1ef ]
Sat Jan 25 15:53:02 2020 us=498527 UDP write returned 22
Sat Jan 25 15:53:02 2020 us=500181 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sat Jan 25 15:53:02 2020 us=502272 [sea-a26.ipvanish.com] Peer Connection Initiated with [AF_INET]205.185.223.128:443
Sat Jan 25 15:53:03 2020 us=512745  event_wait returned 0
Sat Jan 25 15:53:03 2020 us=513952 SENT CONTROL [sea-a26.ipvanish.com]: 'PUSH_REQUEST' (status=1)
Sat Jan 25 15:53:03 2020 us=514740  event_wait returned 1
Sat Jan 25 15:53:03 2020 us=516170 UDP WRITE [83] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ ] pid=4 DATA 17030300 408463c3 16c423
a6 3dd2a75f efde5dea 3e8b0a1e 36ddd438 11aac62[more...]
Sat Jan 25 15:53:03 2020 us=519284 UDP write returned 83
Sat Jan 25 15:53:03 2020 us=721303  event_wait returned 1
Sat Jan 25 15:53:03 2020 us=722872 UDP read returned 22
Sat Jan 25 15:53:03 2020 us=724974 UDP READ [22] from [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=c09026ca e040f1ef [ 4 sid=34ad198f 26c5beae ]
Sat Jan 25 15:53:03 2020 us=727235  event_wait returned 1
Sat Jan 25 15:53:03 2020 us=728718 UDP read returned 355
Sat Jan 25 15:53:03 2020 us=734735 UDP READ [355] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ ] pid=6 DATA 17030301 5017e17d be47
dd42 45b9baa2 45e83c40 b9e902cf d73c160e 953423e[more...]
Sat Jan 25 15:53:03 2020 us=740234 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 198.18.0.1,dhcp-option DNS 198.18.
0.2,rcvbuf 493216,sndbuf 493216,explicit-exit-notify 5,comp-lzo no,route-gateway 172.21.24.1,topology subnet,ping 20,ping-restart 40,ifconfig 172.21.24.173 255.255
.254.0,peer-id 33,cipher AES-256-GCM'
Sat Jan 25 15:53:03 2020 us=743323 OPTIONS IMPORT: timers and/or timeouts modified
Sat Jan 25 15:53:03 2020 us=744735 OPTIONS IMPORT: explicit notify parm(s) modified
Sat Jan 25 15:53:03 2020 us=746950 OPTIONS IMPORT: compression parms modified
Sat Jan 25 15:53:03 2020 us=748792 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Sat Jan 25 15:53:03 2020 us=750464 Socket Buffers: R=[163840->327680] S=[163840->327680]
Sat Jan 25 15:53:03 2020 us=752138 OPTIONS IMPORT: --ifconfig/up options modified
Sat Jan 25 15:53:03 2020 us=753776 OPTIONS IMPORT: route options modified
Sat Jan 25 15:53:03 2020 us=755408 OPTIONS IMPORT: route-related options modified
Sat Jan 25 15:53:03 2020 us=757145 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Jan 25 15:53:03 2020 us=758786 OPTIONS IMPORT: peer-id set
Sat Jan 25 15:53:03 2020 us=760576 OPTIONS IMPORT: adjusting link_mtu to 1625
Sat Jan 25 15:53:03 2020 us=762158 OPTIONS IMPORT: data channel crypto options modified
Sat Jan 25 15:53:03 2020 us=763782 Data Channel: using negotiated cipher 'AES-256-GCM'
Sat Jan 25 15:53:03 2020 us=765573 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 48 bytes
Sat Jan 25 15:53:03 2020 us=767770 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
Sat Jan 25 15:53:03 2020 us=772946 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Jan 25 15:53:03 2020 us=774561 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
packet_write_wait: Connection to 172.16.42.1 port 22: Broken pipe


# cat seattle.ovpn  
client
dev tun
proto udp
remote sea-a26.ipvanish.com 443
resolv-retry infinite
nobind
persist-key
persist-tun
persist-remote-ip
ca ca.ipvanish.com.crt
verify-x509-name sea-a26.ipvanish.com name
auth-user-pass creds.txt


#comp-lzo
link-mtu 1570
verb 3
auth SHA256
cipher AES-256-CBC
keysize 256
tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-DSS-WITH-AES-256-CBC-SHA:TLS-RSA-WITH-AES-256-CBC-SHA

 

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...