Indice del forum www.zeroshell.net
Distribuzione Linux ZeroShell
 
 FAQFAQ   CercaCerca  GruppiGruppi   RegistratiRegistrati 
 ProfiloProfilo  Log inLog in   Messaggi privatiMessaggi privati 

Errore accesso VPN

 
Nuovo argomento   Rispondi    Indice del forum -> ZeroShell
Precedente :: Successivo  
Autore Messaggio
hunterbit



Registrato: 02/06/08 01:34
Messaggi: 29

MessaggioInviato: Mer Apr 20, 2016 12:01 pm    Oggetto: Errore accesso VPN Rispondi citando

Salve,
avevo configurato la mia VPN ed il tutto funzionava in modo corretto.
Poi non so per quale motivo all'improvviso non ha pił funzionato niente.
Il client ogni 5 sec tenta la riconnessione.
Uso Zeroshell 3.2.0

Quale potrebbe essere il problema?
Qui di seguito il file di log del client
Codice:


Wed Apr 20 12:53:26 2016 us=255092 Current Parameter Settings:
Wed Apr 20 12:53:26 2016 us=255092   config = 'marrellihospital.ovpn'
Wed Apr 20 12:53:26 2016 us=255092   mode = 0
Wed Apr 20 12:53:26 2016 us=255092   show_ciphers = DISABLED
Wed Apr 20 12:53:26 2016 us=255092   show_digests = DISABLED
Wed Apr 20 12:53:26 2016 us=255092   show_engines = DISABLED
Wed Apr 20 12:53:26 2016 us=255092   genkey = DISABLED
Wed Apr 20 12:53:26 2016 us=255092   key_pass_file = '[UNDEF]'
Wed Apr 20 12:53:26 2016 us=255092   show_tls_ciphers = DISABLED
Wed Apr 20 12:53:26 2016 us=255092 Connection profiles [default]:
Wed Apr 20 12:53:26 2016 us=255092   proto = tcp-client
Wed Apr 20 12:53:26 2016 us=255092   local = '[UNDEF]'
Wed Apr 20 12:53:26 2016 us=255092   local_port = 0
Wed Apr 20 12:53:26 2016 us=255092   remote = 'XX.XX.XX.XX'
Wed Apr 20 12:53:26 2016 us=255092   remote_port = 223
Wed Apr 20 12:53:26 2016 us=255092   remote_float = DISABLED
Wed Apr 20 12:53:26 2016 us=255092   bind_defined = DISABLED
Wed Apr 20 12:53:26 2016 us=255092   bind_local = DISABLED
Wed Apr 20 12:53:26 2016 us=255092   connect_retry_seconds = 5
Wed Apr 20 12:53:26 2016 us=255092   connect_timeout = 10
Wed Apr 20 12:53:26 2016 us=255092 NOTE: --mute triggered...
Wed Apr 20 12:53:26 2016 us=255092 265 variation(s) on previous 20 message(s) suppressed by --mute
Wed Apr 20 12:53:26 2016 us=255092 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug  4 2015
Wed Apr 20 12:53:26 2016 us=255092 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Enter Management Password:
Wed Apr 20 12:53:26 2016 us=255092 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Wed Apr 20 12:53:26 2016 us=255092 Need hold release from management interface, waiting...
Wed Apr 20 12:53:26 2016 us=739521 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Wed Apr 20 12:53:26 2016 us=848902 MANAGEMENT: CMD 'state on'
Wed Apr 20 12:53:26 2016 us=848902 MANAGEMENT: CMD 'log all on'
Wed Apr 20 12:53:26 2016 us=911374 MANAGEMENT: CMD 'hold off'
Wed Apr 20 12:53:26 2016 us=911374 MANAGEMENT: CMD 'hold release'
Wed Apr 20 12:53:26 2016 us=911374 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Apr 20 12:53:27 2016 us=36484 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by zu bytes
Wed Apr 20 12:53:27 2016 us=36484 LZO compression initialized
Wed Apr 20 12:53:27 2016 us=36484 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0 EL:3 ]
Wed Apr 20 12:53:27 2016 us=36484 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Apr 20 12:53:27 2016 us=36484 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:143 ET:32 EL:3 AF:3/1 ]
Wed Apr 20 12:53:27 2016 us=36484 Local Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Wed Apr 20 12:53:27 2016 us=36484 Expected Remote Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Wed Apr 20 12:53:27 2016 us=36484 Local Options hash (VER=V4): '31fdf004'
Wed Apr 20 12:53:27 2016 us=36484 Expected Remote Options hash (VER=V4): '3e6d1056'
Wed Apr 20 12:53:27 2016 us=36484 Attempting to establish TCP connection with [AF_INET]XX.XX.XX.XX:223 [nonblock]
Wed Apr 20 12:53:27 2016 us=36484 MANAGEMENT: >STATE:1461149607,TCP_CONNECT,,,
Wed Apr 20 12:53:28 2016 us=37215 TCP connection established with [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:28 2016 us=37215 TCPv4_CLIENT link local: [undef]
Wed Apr 20 12:53:28 2016 us=37215 TCPv4_CLIENT link remote: [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:28 2016 us=37215 MANAGEMENT: >STATE:1461149608,WAIT,,,
Wed Apr 20 12:53:28 2016 us=37215 TCPv4_CLIENT WRITE [14] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Wed Apr 20 12:53:28 2016 us=37215 TCPv4_CLIENT READ [26] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Wed Apr 20 12:53:28 2016 us=37215 MANAGEMENT: >STATE:1461149608,AUTH,,,
Wed Apr 20 12:53:28 2016 us=37215 TLS: Initial packet from [AF_INET]XX.XX.XX.XX:223, sid=7e093b31 6bf4ee30
Wed Apr 20 12:53:28 2016 us=37215 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 0 ]
Wed Apr 20 12:53:28 2016 us=37215 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Wed Apr 20 12:53:28 2016 us=37215 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:28 2016 us=37215 TCPv4_CLIENT WRITE [107] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=93
Wed Apr 20 12:53:28 2016 us=84062 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:28 2016 us=146592 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 ]
Wed Apr 20 12:53:28 2016 us=146592 TCPv4_CLIENT READ [126] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ 3 ] pid=1 DATA len=100
Wed Apr 20 12:53:28 2016 us=146592 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:28 2016 us=146592 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Wed Apr 20 12:53:28 2016 us=146592 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Wed Apr 20 12:53:28 2016 us=146592 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:28 2016 us=146592 TCPv4_CLIENT WRITE [30] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 3 4 ]
Wed Apr 20 12:53:28 2016 us=146592 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Wed Apr 20 12:53:28 2016 us=146592 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 5 ]
Wed Apr 20 12:53:28 2016 us=162194 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Wed Apr 20 12:53:28 2016 us=162194 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 6 ]
Wed Apr 20 12:53:28 2016 us=162194 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Wed Apr 20 12:53:28 2016 us=162194 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Wed Apr 20 12:53:28 2016 us=162194 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 7 ]
Wed Apr 20 12:53:28 2016 us=162194 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 8 ]
Wed Apr 20 12:53:28 2016 us=162194 NOTE: --mute triggered...
Wed Apr 20 12:53:28 2016 us=224692 29 variation(s) on previous 20 message(s) suppressed by --mute
Wed Apr 20 12:53:28 2016 us=224692 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: C=IT, ST=KR, L=Calabria, O=esempio.it, OU=Esmpio, CN=Esmpio CA, emailAddress=email@email.it
Wed Apr 20 12:53:28 2016 us=224692 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Wed Apr 20 12:53:28 2016 us=224692 TLS Error: TLS object -> incoming plaintext read error
Wed Apr 20 12:53:28 2016 us=224692 TLS Error: TLS handshake failed
Wed Apr 20 12:53:28 2016 us=224692 Fatal TLS error (check_tls_errors_co), restarting
Wed Apr 20 12:53:28 2016 us=224692 TCP/UDP: Closing socket
Wed Apr 20 12:53:28 2016 us=224692 SIGUSR1[soft,tls-error] received, process restarting
Wed Apr 20 12:53:28 2016 us=224692 MANAGEMENT: >STATE:1461149608,RECONNECTING,tls-error,,
Wed Apr 20 12:53:28 2016 us=224692 Restart pause, 5 second(s)
Wed Apr 20 12:53:33 2016 us=236322 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Apr 20 12:53:33 2016 us=236322 Re-using SSL/TLS context
Wed Apr 20 12:53:33 2016 us=236322 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by zu bytes
Wed Apr 20 12:53:33 2016 us=236322 LZO compression initialized
Wed Apr 20 12:53:33 2016 us=236322 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0 EL:3 ]
Wed Apr 20 12:53:33 2016 us=236322 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Apr 20 12:53:33 2016 us=236322 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:143 ET:32 EL:3 AF:3/1 ]
Wed Apr 20 12:53:33 2016 us=236322 Local Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Wed Apr 20 12:53:33 2016 us=236322 Expected Remote Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Wed Apr 20 12:53:33 2016 us=236322 Local Options hash (VER=V4): '31fdf004'
Wed Apr 20 12:53:33 2016 us=236322 Expected Remote Options hash (VER=V4): '3e6d1056'
Wed Apr 20 12:53:33 2016 us=236322 Attempting to establish TCP connection with [AF_INET]XX.XX.XX.XX:223 [nonblock]
Wed Apr 20 12:53:33 2016 us=236322 MANAGEMENT: >STATE:1461149613,TCP_CONNECT,,,
Wed Apr 20 12:53:34 2016 us=236532 TCP connection established with [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:34 2016 us=236532 TCPv4_CLIENT link local: [undef]
Wed Apr 20 12:53:34 2016 us=236532 TCPv4_CLIENT link remote: [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:34 2016 us=236532 MANAGEMENT: >STATE:1461149614,WAIT,,,
Wed Apr 20 12:53:34 2016 us=236532 TCPv4_CLIENT WRITE [14] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Wed Apr 20 12:53:34 2016 us=236532 TCPv4_CLIENT READ [26] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Wed Apr 20 12:53:34 2016 us=236532 MANAGEMENT: >STATE:1461149614,AUTH,,,
Wed Apr 20 12:53:34 2016 us=236532 TLS: Initial packet from [AF_INET]XX.XX.XX.XX:223, sid=d781f66e 4bd958fd
Wed Apr 20 12:53:34 2016 us=236532 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 0 ]
Wed Apr 20 12:53:34 2016 us=236532 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Wed Apr 20 12:53:34 2016 us=236532 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:34 2016 us=236532 TCPv4_CLIENT WRITE [107] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=93
Wed Apr 20 12:53:34 2016 us=283390 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:34 2016 us=345911 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 ]
Wed Apr 20 12:53:34 2016 us=345911 TCPv4_CLIENT READ [126] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ 3 ] pid=1 DATA len=100
Wed Apr 20 12:53:34 2016 us=345911 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:34 2016 us=345911 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Wed Apr 20 12:53:34 2016 us=345911 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Wed Apr 20 12:53:34 2016 us=345911 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:34 2016 us=345911 TCPv4_CLIENT WRITE [30] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 3 4 ]
Wed Apr 20 12:53:34 2016 us=361518 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Wed Apr 20 12:53:34 2016 us=361518 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 5 ]
Wed Apr 20 12:53:34 2016 us=361518 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Wed Apr 20 12:53:34 2016 us=361518 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 6 ]
Wed Apr 20 12:53:34 2016 us=361518 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Wed Apr 20 12:53:34 2016 us=361518 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Wed Apr 20 12:53:34 2016 us=361518 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 7 ]
Wed Apr 20 12:53:34 2016 us=361518 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 8 ]
Wed Apr 20 12:53:34 2016 us=377144 NOTE: --mute triggered...
Wed Apr 20 12:53:34 2016 us=424021 29 variation(s) on previous 20 message(s) suppressed by --mute
Wed Apr 20 12:53:34 2016 us=424021 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: C=IT, ST=KR, L=Calabria, O=esempio.it, OU=Esmpio, CN=Esmpio CA, emailAddress=email@email.it
Wed Apr 20 12:53:34 2016 us=424021 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Wed Apr 20 12:53:34 2016 us=424021 TLS Error: TLS object -> incoming plaintext read error
Wed Apr 20 12:53:34 2016 us=424021 TLS Error: TLS handshake failed
Wed Apr 20 12:53:34 2016 us=424021 Fatal TLS error (check_tls_errors_co), restarting
Wed Apr 20 12:53:34 2016 us=424021 TCP/UDP: Closing socket
Wed Apr 20 12:53:34 2016 us=424021 SIGUSR1[soft,tls-error] received, process restarting
Wed Apr 20 12:53:34 2016 us=424021 MANAGEMENT: >STATE:1461149614,RECONNECTING,tls-error,,
Wed Apr 20 12:53:34 2016 us=424021 Restart pause, 5 second(s)
Wed Apr 20 12:53:39 2016 us=426420 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Apr 20 12:53:39 2016 us=426420 Re-using SSL/TLS context
Wed Apr 20 12:53:39 2016 us=426420 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by zu bytes
Wed Apr 20 12:53:39 2016 us=426420 LZO compression initialized
Wed Apr 20 12:53:39 2016 us=426420 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0 EL:3 ]
Wed Apr 20 12:53:39 2016 us=426420 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Apr 20 12:53:39 2016 us=426420 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:143 ET:32 EL:3 AF:3/1 ]
Wed Apr 20 12:53:39 2016 us=426420 Local Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Wed Apr 20 12:53:39 2016 us=426420 Expected Remote Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Wed Apr 20 12:53:39 2016 us=426420 Local Options hash (VER=V4): '31fdf004'
Wed Apr 20 12:53:39 2016 us=426420 Expected Remote Options hash (VER=V4): '3e6d1056'
Wed Apr 20 12:53:39 2016 us=426420 Attempting to establish TCP connection with [AF_INET]XX.XX.XX.XX:223 [nonblock]
Wed Apr 20 12:53:39 2016 us=426420 MANAGEMENT: >STATE:1461149619,TCP_CONNECT,,,
Wed Apr 20 12:53:40 2016 us=435472 TCP connection established with [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:40 2016 us=435472 TCPv4_CLIENT link local: [undef]
Wed Apr 20 12:53:40 2016 us=435472 TCPv4_CLIENT link remote: [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:40 2016 us=435472 MANAGEMENT: >STATE:1461149620,WAIT,,,
Wed Apr 20 12:53:40 2016 us=435472 TCPv4_CLIENT WRITE [14] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Wed Apr 20 12:53:40 2016 us=435472 TCPv4_CLIENT READ [26] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Wed Apr 20 12:53:40 2016 us=435472 MANAGEMENT: >STATE:1461149620,AUTH,,,
Wed Apr 20 12:53:40 2016 us=435472 TLS: Initial packet from [AF_INET]XX.XX.XX.XX:223, sid=372e7cb2 28674f7b
Wed Apr 20 12:53:40 2016 us=435472 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 0 ]
Wed Apr 20 12:53:40 2016 us=435472 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Wed Apr 20 12:53:40 2016 us=435472 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:40 2016 us=435472 TCPv4_CLIENT WRITE [107] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=93
Wed Apr 20 12:53:40 2016 us=482320 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:40 2016 us=544841 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 ]
Wed Apr 20 12:53:40 2016 us=544841 TCPv4_CLIENT READ [126] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ 3 ] pid=1 DATA len=100
Wed Apr 20 12:53:40 2016 us=544841 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:40 2016 us=544841 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Wed Apr 20 12:53:40 2016 us=544841 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Wed Apr 20 12:53:40 2016 us=544841 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:40 2016 us=544841 TCPv4_CLIENT WRITE [30] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 3 4 ]
Wed Apr 20 12:53:40 2016 us=544841 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Wed Apr 20 12:53:40 2016 us=544841 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 5 ]
Wed Apr 20 12:53:40 2016 us=560449 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Wed Apr 20 12:53:40 2016 us=560449 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 6 ]
Wed Apr 20 12:53:40 2016 us=560449 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Wed Apr 20 12:53:40 2016 us=560449 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Wed Apr 20 12:53:40 2016 us=560449 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 7 ]
Wed Apr 20 12:53:40 2016 us=560449 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 8 ]
Wed Apr 20 12:53:40 2016 us=560449 NOTE: --mute triggered...
Wed Apr 20 12:53:40 2016 us=622949 29 variation(s) on previous 20 message(s) suppressed by --mute
Wed Apr 20 12:53:40 2016 us=622949 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: C=IT, ST=KR, L=Calabria, O=esempio.it, OU=Esmpio, CN=Esmpio CA, emailAddress=email@email.it
Wed Apr 20 12:53:40 2016 us=622949 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Wed Apr 20 12:53:40 2016 us=622949 TLS Error: TLS object -> incoming plaintext read error
Wed Apr 20 12:53:40 2016 us=622949 TLS Error: TLS handshake failed
Wed Apr 20 12:53:40 2016 us=622949 Fatal TLS error (check_tls_errors_co), restarting
Wed Apr 20 12:53:40 2016 us=622949 TCP/UDP: Closing socket
Wed Apr 20 12:53:40 2016 us=622949 SIGUSR1[soft,tls-error] received, process restarting
Wed Apr 20 12:53:40 2016 us=622949 MANAGEMENT: >STATE:1461149620,RECONNECTING,tls-error,,
Wed Apr 20 12:53:40 2016 us=622949 Restart pause, 5 second(s)
Wed Apr 20 12:53:45 2016 us=646244 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Apr 20 12:53:45 2016 us=646244 Re-using SSL/TLS context
Wed Apr 20 12:53:45 2016 us=646244 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by zu bytes
Wed Apr 20 12:53:45 2016 us=646244 LZO compression initialized
Wed Apr 20 12:53:45 2016 us=646244 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0 EL:3 ]
Wed Apr 20 12:53:45 2016 us=646244 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Apr 20 12:53:45 2016 us=646244 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:143 ET:32 EL:3 AF:3/1 ]
Wed Apr 20 12:53:45 2016 us=646244 Local Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Wed Apr 20 12:53:45 2016 us=646244 Expected Remote Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Wed Apr 20 12:53:45 2016 us=646244 Local Options hash (VER=V4): '31fdf004'
Wed Apr 20 12:53:45 2016 us=646244 Expected Remote Options hash (VER=V4): '3e6d1056'
Wed Apr 20 12:53:45 2016 us=646244 Attempting to establish TCP connection with [AF_INET]XX.XX.XX.XX:223 [nonblock]
Wed Apr 20 12:53:45 2016 us=646244 MANAGEMENT: >STATE:1461149625,TCP_CONNECT,,,
Wed Apr 20 12:53:46 2016 us=646852 TCP connection established with [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:46 2016 us=646852 TCPv4_CLIENT link local: [undef]
Wed Apr 20 12:53:46 2016 us=646852 TCPv4_CLIENT link remote: [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:46 2016 us=646852 MANAGEMENT: >STATE:1461149626,WAIT,,,
Wed Apr 20 12:53:46 2016 us=646852 TCPv4_CLIENT WRITE [14] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Wed Apr 20 12:53:46 2016 us=646852 TCPv4_CLIENT READ [26] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Wed Apr 20 12:53:46 2016 us=646852 MANAGEMENT: >STATE:1461149626,AUTH,,,
Wed Apr 20 12:53:46 2016 us=646852 TLS: Initial packet from [AF_INET]XX.XX.XX.XX:223, sid=bb57a82f bea7bc80
Wed Apr 20 12:53:46 2016 us=646852 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 0 ]
Wed Apr 20 12:53:46 2016 us=646852 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Wed Apr 20 12:53:46 2016 us=646852 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:46 2016 us=646852 TCPv4_CLIENT WRITE [107] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=93
Wed Apr 20 12:53:46 2016 us=709324 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:46 2016 us=768732 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 ]
Wed Apr 20 12:53:46 2016 us=768732 TCPv4_CLIENT READ [126] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ 3 ] pid=1 DATA len=100
Wed Apr 20 12:53:46 2016 us=768732 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:46 2016 us=768732 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Wed Apr 20 12:53:46 2016 us=768732 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Wed Apr 20 12:53:46 2016 us=769738 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:46 2016 us=769738 TCPv4_CLIENT WRITE [30] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 3 4 ]
Wed Apr 20 12:53:46 2016 us=775019 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Wed Apr 20 12:53:46 2016 us=775019 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 5 ]
Wed Apr 20 12:53:46 2016 us=775019 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Wed Apr 20 12:53:46 2016 us=775019 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 6 ]
Wed Apr 20 12:53:46 2016 us=775019 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Wed Apr 20 12:53:46 2016 us=775019 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Wed Apr 20 12:53:46 2016 us=775019 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 7 ]
Wed Apr 20 12:53:46 2016 us=775019 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 8 ]
Wed Apr 20 12:53:46 2016 us=790651 NOTE: --mute triggered...
Wed Apr 20 12:53:46 2016 us=853178 29 variation(s) on previous 20 message(s) suppressed by --mute
Wed Apr 20 12:53:46 2016 us=853178 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: C=IT, ST=KR, L=Calabria, O=esempio.it, OU=Esmpio, CN=Esmpio CA, emailAddress=email@email.it
Wed Apr 20 12:53:46 2016 us=853178 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Wed Apr 20 12:53:46 2016 us=853178 TLS Error: TLS object -> incoming plaintext read error
Wed Apr 20 12:53:46 2016 us=853178 TLS Error: TLS handshake failed
Wed Apr 20 12:53:46 2016 us=853178 Fatal TLS error (check_tls_errors_co), restarting
Wed Apr 20 12:53:46 2016 us=853178 TCP/UDP: Closing socket
Wed Apr 20 12:53:46 2016 us=853178 SIGUSR1[soft,tls-error] received, process restarting
Wed Apr 20 12:53:46 2016 us=853178 MANAGEMENT: >STATE:1461149626,RECONNECTING,tls-error,,
Wed Apr 20 12:53:46 2016 us=853178 Restart pause, 5 second(s)
Wed Apr 20 12:53:51 2016 us=859648 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Apr 20 12:53:51 2016 us=859648 Re-using SSL/TLS context
Wed Apr 20 12:53:51 2016 us=859648 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by zu bytes
Wed Apr 20 12:53:51 2016 us=859648 LZO compression initialized
Wed Apr 20 12:53:51 2016 us=859648 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0 EL:3 ]
Wed Apr 20 12:53:51 2016 us=859648 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Apr 20 12:53:51 2016 us=859648 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:143 ET:32 EL:3 AF:3/1 ]
Wed Apr 20 12:53:51 2016 us=859648 Local Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Wed Apr 20 12:53:51 2016 us=859648 Expected Remote Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Wed Apr 20 12:53:51 2016 us=859648 Local Options hash (VER=V4): '31fdf004'
Wed Apr 20 12:53:51 2016 us=859648 Expected Remote Options hash (VER=V4): '3e6d1056'
Wed Apr 20 12:53:51 2016 us=859648 Attempting to establish TCP connection with [AF_INET]XX.XX.XX.XX:223 [nonblock]
Wed Apr 20 12:53:51 2016 us=859648 MANAGEMENT: >STATE:1461149631,TCP_CONNECT,,,
Wed Apr 20 12:53:52 2016 us=863266 TCP connection established with [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:52 2016 us=863266 TCPv4_CLIENT link local: [undef]
Wed Apr 20 12:53:52 2016 us=863266 TCPv4_CLIENT link remote: [AF_INET]XX.XX.XX.XX:223
Wed Apr 20 12:53:52 2016 us=863266 MANAGEMENT: >STATE:1461149632,WAIT,,,
Wed Apr 20 12:53:52 2016 us=863266 TCPv4_CLIENT WRITE [14] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Wed Apr 20 12:53:52 2016 us=863266 TCPv4_CLIENT READ [26] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Wed Apr 20 12:53:52 2016 us=863266 MANAGEMENT: >STATE:1461149632,AUTH,,,
Wed Apr 20 12:53:52 2016 us=863266 TLS: Initial packet from [AF_INET]XX.XX.XX.XX:223, sid=df623410 7ebf639f
Wed Apr 20 12:53:52 2016 us=863266 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 0 ]
Wed Apr 20 12:53:52 2016 us=863266 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Wed Apr 20 12:53:52 2016 us=863266 TCPv4_CLIENT WRITE [114] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:52 2016 us=863266 TCPv4_CLIENT WRITE [107] to [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=93
Wed Apr 20 12:53:52 2016 us=910151 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:52 2016 us=972626 TCPv4_CLIENT READ [22] from [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 ]
Wed Apr 20 12:53:52 2016 us=972626 TCPv4_CLIENT READ [126] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ 3 ] pid=1 DATA len=100
Wed Apr 20 12:53:52 2016 us=972626 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:53:52 2016 us=972626 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Wed Apr 20 12:53:52 2016 us=972626 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Wed Apr 20 12:53:52 2016 us=972626 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:53:52 2016 us=972626 TCPv4_CLIENT WRITE [30] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 2 3 4 ]
Wed Apr 20 12:53:52 2016 us=972626 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Wed Apr 20 12:53:52 2016 us=972626 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 5 ]
Wed Apr 20 12:53:52 2016 us=988253 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Wed Apr 20 12:53:52 2016 us=988253 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 6 ]
Wed Apr 20 12:53:52 2016 us=988253 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Wed Apr 20 12:53:52 2016 us=988253 TCPv4_CLIENT READ [114] from [AF_INET]XX.XX.XX.XX:223: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Wed Apr 20 12:53:52 2016 us=988253 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 7 ]
Wed Apr 20 12:53:52 2016 us=988253 TCPv4_CLIENT WRITE [22] to [AF_INET]XX.XX.XX.XX:223: P_ACK_V1 kid=0 [ 8 ]
Wed Apr 20 12:53:52 2016 us=988253 NOTE: --mute triggered...
Wed Apr 20 12:53:53 2016 us=50759 29 variation(s) on previous 20 message(s) suppressed by --mute
Wed Apr 20 12:53:53 2016 us=50759 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: C=IT, ST=KR, L=Calabria, O=esempio.it, OU=Esmpio, CN=Esmpio CA, emailAddress=email@email.it
Wed Apr 20 12:53:53 2016 us=50759 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Wed Apr 20 12:53:53 2016 us=50759 TLS Error: TLS object -> incoming plaintext read error
Wed Apr 20 12:53:53 2016 us=50759 TLS Error: TLS handshake failed
Wed Apr 20 12:53:53 2016 us=50759 Fatal TLS error (check_tls_errors_co), restarting
Wed Apr 20 12:53:53 2016 us=50759 TCP/UDP: Closing socket
Wed Apr 20 12:53:53 2016 us=50759 SIGUSR1[soft,tls-error] received, process restarting
Wed Apr 20 12:53:53 2016 us=50759 MANAGEMENT: >STATE:1461149633,RECONNECTING,tls-error,,
Wed Apr 20 12:53:53 2016 us=50759 Restart pause, 5 second(s)
Wed Apr 20 12:53:56 2016 us=251711 MANAGEMENT: CMD 'signal SIGHUP'
Wed Apr 20 12:53:56 2016 us=251711 SIGHUP[hard,init_instance] received, process restarting
Wed Apr 20 12:53:56 2016 us=251711 MANAGEMENT: >STATE:1461149636,RECONNECTING,init_instance,,
Wed Apr 20 12:53:56 2016 us=251711 NOTE: debug verbosity (--verb 7) is enabled but this build lacks debug support.
Wed Apr 20 12:53:56 2016 us=251711 Current Parameter Settings:
Wed Apr 20 12:53:56 2016 us=251711   config = 'marrellihospital.ovpn'
Wed Apr 20 12:53:56 2016 us=251711   mode = 0
Wed Apr 20 12:53:56 2016 us=251711   show_ciphers = DISABLED
Wed Apr 20 12:53:56 2016 us=267306   show_digests = DISABLED
Wed Apr 20 12:53:56 2016 us=267306   show_engines = DISABLED
Wed Apr 20 12:53:56 2016 us=267306   genkey = DISABLED
Wed Apr 20 12:53:56 2016 us=267306   key_pass_file = '[UNDEF]'
Wed Apr 20 12:53:56 2016 us=267306   show_tls_ciphers = DISABLED
Wed Apr 20 12:53:56 2016 us=267306 Connection profiles [default]:
Wed Apr 20 12:53:56 2016 us=267306   proto = tcp-client
Wed Apr 20 12:53:56 2016 us=267306   local = '[UNDEF]'
Wed Apr 20 12:53:56 2016 us=267306   local_port = 0
Wed Apr 20 12:53:56 2016 us=267306   remote = '95.225.139.64'
Wed Apr 20 12:53:56 2016 us=267306   remote_port = 223
Wed Apr 20 12:53:56 2016 us=267306   remote_float = DISABLED
Wed Apr 20 12:53:56 2016 us=267306   bind_defined = DISABLED
Wed Apr 20 12:53:56 2016 us=267306   bind_local = DISABLED
Wed Apr 20 12:53:56 2016 us=267306   connect_retry_seconds = 5
Wed Apr 20 12:53:56 2016 us=267306   connect_timeout = 10
Wed Apr 20 12:53:56 2016 us=267306 NOTE: --mute triggered...
Wed Apr 20 12:53:56 2016 us=267306 265 variation(s) on previous 20 message(s) suppressed by --mute
Wed Apr 20 12:53:56 2016 us=267306 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug  4 2015
Wed Apr 20 12:53:56 2016 us=267306 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Wed Apr 20 12:53:56 2016 us=267306 Restart pause, 5 second(s)
Wed Apr 20 12:54:01 2016 us=268331 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Apr 20 12:54:01 2016 us=268331 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by zu bytes
Wed Apr 20 12:54:01 2016 us=268331 LZO compression initialized
Wed Apr 20 12:54:01 2016 us=268331 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0 EL:3 ]
Wed Apr 20 12:54:01 2016 us=268331 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Apr 20 12:54:01 2016 us=268331 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:143 ET:32 EL:3 AF:3/1 ]
Wed Apr 20 12:54:01 2016 us=268331 Local Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Wed Apr 20 12:54:01 2016 us=268331 Expected Remote Options String: 'V4,dev-type tap,link-mtu 1576,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Wed Apr 20 12:54:01 2016 us=268331 Local Options hash (VER=V4): '31fdf004'
Wed Apr 20 12:54:01 2016 us=268331 Expected Remote Options hash (VER=V4): '3e6d1056'
Wed Apr 20 12:54:01 2016 us=268331 Attempting to establish TCP connection with [AF_INET]95.225.139.64:223 [nonblock]
Wed Apr 20 12:54:01 2016 us=268331 MANAGEMENT: >STATE:1461149641,TCP_CONNECT,,,
Wed Apr 20 12:54:02 2016 us=268616 TCP connection established with [AF_INET]95.225.139.64:223
Wed Apr 20 12:54:02 2016 us=268616 TCPv4_CLIENT link local: [undef]
Wed Apr 20 12:54:02 2016 us=268616 TCPv4_CLIENT link remote: [AF_INET]95.225.139.64:223
Wed Apr 20 12:54:02 2016 us=268616 MANAGEMENT: >STATE:1461149642,WAIT,,,
Wed Apr 20 12:54:02 2016 us=268616 TCPv4_CLIENT WRITE [14] to [AF_INET]95.225.139.64:223: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0
Wed Apr 20 12:54:02 2016 us=268616 TCPv4_CLIENT READ [26] from [AF_INET]95.225.139.64:223: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0
Wed Apr 20 12:54:02 2016 us=268616 MANAGEMENT: >STATE:1461149642,AUTH,,,
Wed Apr 20 12:54:02 2016 us=268616 TLS: Initial packet from [AF_INET]95.225.139.64:223, sid=335d4200 a7f48916
Wed Apr 20 12:54:02 2016 us=268616 TCPv4_CLIENT WRITE [22] to [AF_INET]95.225.139.64:223: P_ACK_V1 kid=0 [ 0 ]
Wed Apr 20 12:54:02 2016 us=268616 TCPv4_CLIENT WRITE [114] to [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=100
Wed Apr 20 12:54:02 2016 us=268616 TCPv4_CLIENT WRITE [114] to [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:54:02 2016 us=268616 TCPv4_CLIENT WRITE [107] to [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=93
Wed Apr 20 12:54:02 2016 us=331106 TCPv4_CLIENT READ [22] from [AF_INET]95.225.139.64:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:54:02 2016 us=377996 TCPv4_CLIENT READ [22] from [AF_INET]95.225.139.64:223: P_ACK_V1 kid=0 [ 2 ]
Wed Apr 20 12:54:02 2016 us=377996 TCPv4_CLIENT READ [126] from [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ 3 ] pid=1 DATA len=100
Wed Apr 20 12:54:02 2016 us=377996 TCPv4_CLIENT READ [114] from [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=100
Wed Apr 20 12:54:02 2016 us=377996 TCPv4_CLIENT READ [114] from [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=100
Wed Apr 20 12:54:02 2016 us=377996 TCPv4_CLIENT READ [114] from [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=100
Wed Apr 20 12:54:02 2016 us=377996 TCPv4_CLIENT WRITE [22] to [AF_INET]95.225.139.64:223: P_ACK_V1 kid=0 [ 1 ]
Wed Apr 20 12:54:02 2016 us=377996 TCPv4_CLIENT WRITE [30] to [AF_INET]95.225.139.64:223: P_ACK_V1 kid=0 [ 2 3 4 ]
Wed Apr 20 12:54:02 2016 us=377996 TCPv4_CLIENT READ [114] from [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=5 DATA len=100
Wed Apr 20 12:54:02 2016 us=377996 TCPv4_CLIENT WRITE [22] to [AF_INET]95.225.139.64:223: P_ACK_V1 kid=0 [ 5 ]
Wed Apr 20 12:54:02 2016 us=393592 TCPv4_CLIENT READ [114] from [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=100
Wed Apr 20 12:54:02 2016 us=393592 TCPv4_CLIENT WRITE [22] to [AF_INET]95.225.139.64:223: P_ACK_V1 kid=0 [ 6 ]
Wed Apr 20 12:54:02 2016 us=393592 TCPv4_CLIENT READ [114] from [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=7 DATA len=100
Wed Apr 20 12:54:02 2016 us=393592 TCPv4_CLIENT READ [114] from [AF_INET]95.225.139.64:223: P_CONTROL_V1 kid=0 [ ] pid=8 DATA len=100
Wed Apr 20 12:54:02 2016 us=393592 TCPv4_CLIENT WRITE [22] to [AF_INET]95.225.139.64:223: P_ACK_V1 kid=0 [ 7 ]
Wed Apr 20 12:54:02 2016 us=393592 TCPv4_CLIENT WRITE [22] to [AF_INET]95.225.139.64:223: P_ACK_V1 kid=0 [ 8 ]
Wed Apr 20 12:54:02 2016 us=393592 NOTE: --mute triggered...
Wed Apr 20 12:54:02 2016 us=471752 29 variation(s) on previous 20 message(s) suppressed by --mute
Wed Apr 20 12:54:02 2016 us=471752 VERIFY ERROR: depth=1, error=self signed certificate in certificate chain: C=IT, ST=KR, L=Calabria, O=esempio.it, OU=Esmpio, CN=Esmpio CA, emailAddress=email@email.it
Wed Apr 20 12:54:02 2016 us=471752 TLS_ERROR: BIO read tls_read_plaintext error: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Wed Apr 20 12:54:02 2016 us=471752 TLS Error: TLS object -> incoming plaintext read error
Wed Apr 20 12:54:02 2016 us=471752 TLS Error: TLS handshake failed
Wed Apr 20 12:54:02 2016 us=471752 Fatal TLS error (check_tls_errors_co), restarting
Wed Apr 20 12:54:02 2016 us=471752 TCP/UDP: Closing socket
Wed Apr 20 12:54:02 2016 us=471752 SIGUSR1[soft,tls-error] received, process restarting
Wed Apr 20 12:54:02 2016 us=471752 MANAGEMENT: >STATE:1461149642,RECONNECTING,tls-error,,
Wed Apr 20 12:54:02 2016 us=471752 Restart pause, 5 second(s)
Wed Apr 20 12:54:05 2016 us=486587 SIGTERM[hard,init_instance] received, process exiting
Wed Apr 20 12:54:05 2016 us=486587 MANAGEMENT: >STATE:1461149645,EXITING,init_instance,,
Wed Apr 20 12:54:05 2016 us=486587 PKCS#11: Terminating openssl
Wed Apr 20 12:54:05 2016 us=486587 PKCS#11: Removing providers
Wed Apr 20 12:54:05 2016 us=486587 PKCS#11: Releasing sessions
Wed Apr 20 12:54:05 2016 us=486587 PKCS#11: Terminating slotevent
Wed Apr 20 12:54:05 2016 us=486587 PKCS#11: Marking as uninitialized

Top
Profilo Invia messaggio privato
redfive



Registrato: 26/06/09 22:21
Messaggi: 762

MessaggioInviato: Gio Apr 21, 2016 6:22 pm    Oggetto: Rispondi citando

Sicuro che i certificati siano ok ??
ciao
Top
Profilo Invia messaggio privato
hunterbit



Registrato: 02/06/08 01:34
Messaggi: 29

MessaggioInviato: Gio Apr 21, 2016 11:25 pm    Oggetto: Rispondi citando

Provo a ricreare tutto da capo,
Top
Profilo Invia messaggio privato
Mostra prima i messaggi di:   
Nuovo argomento   Rispondi    Indice del forum -> ZeroShell Tutti i fusi orari sono GMT + 1 ora
Pagina 1 di 1

 
Vai a:  
Non puoi inserire nuovi argomenti
Non puoi rispondere a nessun argomento
Non puoi modificare i tuoi messaggi
Non puoi cancellare i tuoi messaggi
Non puoi votare nei sondaggi


Powered by phpBB © 2001, 2005 phpBB Group
phpbb.it