- Mitglied seit
- 4 Aug 2005
- Beiträge
- 611
- Punkte für Reaktionen
- 0
- Punkte
- 16
Hallo habt Ihr eine Idee dazu.
Dieser Fehler passiert nur nach der nächtlichen Zwangstrennung?
Wenn ich einen Restart des Service mache läuft wieder alles bis zur nächsten Zwangstrennung?
Config
Log
Grüße
Dennis
Dieser Fehler passiert nur nach der nächtlichen Zwangstrennung?
Wenn ich einen Restart des Service mache läuft wieder alles bis zur nächsten Zwangstrennung?
Config
Code:
client
dev tun
proto udp
#remote nl.privateinternetaccess.com 1194
#remote nl.privateinternetaccess.com 9201
remote sweden.privateinternetaccess.com 1194
#remote sweden.privateinternetaccess.com 1198
resolv-retry infinite
nobind
persist-key
#persist-tun
tls-client
remote-cert-tls server
auth-user-pass /etc/openvpn/passfile
comp-lzo
verb 3
#verb 9
log /tmp/debug_openvpn.out
reneg-sec 0
crl-verify /etc/openvpn/crl.pem
#crl-verify /etc/openvpn/crl.rsa.2048.pem
ca /etc/openvpn/ca.crt
#ca /etc/openvpn/ca.rsa.2048.crt
#disable-occ
#script-security 2
#up /etc/openvpn/addroute.sh
Log
Code:
Sat Apr 8 12:55:32 2017 OpenVPN 2.3.4 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jan 23 2016
Sat Apr 8 12:55:32 2017 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.08
Sat Apr 8 12:55:32 2017 WARNING: file '/etc/openvpn/passfile' is group or others accessible
Sat Apr 8 12:55:32 2017 Socket Buffers: R=[163840->131072] S=[163840->131072]
Sat Apr 8 12:55:32 2017 RESOLVE: Cannot resolve host address: sweden.privateinternetaccess.com: Temporary failure in name resolution
Sat Apr 8 12:55:32 2017 RESOLVE: Cannot resolve host address: sweden.privateinternetaccess.com: Temporary failure in name resolution
Sat Apr 8 12:55:37 2017 UDPv4 link local (bound): [undef]
Sat Apr 8 12:55:37 2017 UDPv4 link remote: [AF_INET]5.153.233.34:1194
Sat Apr 8 12:55:37 2017 TLS: Initial packet from [AF_INET]5.153.233.34:1194, sid=aa375c04 03c75688
Sat Apr 8 12:55:37 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Apr 8 12:55:37 2017 CRL CHECK OK: C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, [email protected]
Sat Apr 8 12:55:37 2017 VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, [email protected]
Sat Apr 8 12:55:37 2017 Validating certificate key usage
Sat Apr 8 12:55:37 2017 ++ Certificate has key usage 00a0, expects 00a0
Sat Apr 8 12:55:37 2017 VERIFY KU OK
Sat Apr 8 12:55:37 2017 Validating certificate extended key usage
Sat Apr 8 12:55:37 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Apr 8 12:55:37 2017 VERIFY EKU OK
Sat Apr 8 12:55:37 2017 CRL CHECK OK: C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=099d8640923d949ef9448bc9aa948bd2, name=099d8640923d949ef9448bc9aa948bd2
Sat Apr 8 12:55:37 2017 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=099d8640923d949ef9448bc9aa948bd2, name=099d8640923d949ef9448bc9aa948bd2
Sat Apr 8 12:55:38 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Apr 8 12:55:38 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 8 12:55:38 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Apr 8 12:55:38 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Apr 8 12:55:38 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sat Apr 8 12:55:38 2017 [099d8640923d949ef9448bc9aa948bd2] Peer Connection Initiated with [AF_INET]5.153.233.34:1194
Sat Apr 8 12:55:40 2017 SENT CONTROL [099d8640923d949ef9448bc9aa948bd2]: 'PUSH_REQUEST' (status=1)
Sat Apr 8 12:55:40 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.42.10.1,topology net30,ifconfig 10.42.10.6 10.42.10.5,auth-token Ir9qCT5z27sMtfWvLDMVeWmn13yWQlT4j0oZP+n/WJA='
Sat Apr 8 12:55:40 2017 OPTIONS IMPORT: timers and/or timeouts modified
Sat Apr 8 12:55:40 2017 OPTIONS IMPORT: LZO parms modified
Sat Apr 8 12:55:40 2017 OPTIONS IMPORT: --ifconfig/up options modified
Sat Apr 8 12:55:40 2017 OPTIONS IMPORT: route options modified
Sat Apr 8 12:55:40 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Apr 8 12:55:40 2017 ROUTE_GATEWAY 192.168.10.1/255.255.255.0 IFACE=eth0 HWADDR=b8:27:eb:02:e6:33
Sat Apr 8 12:55:40 2017 TUN/TAP device tun0 opened
Sat Apr 8 12:55:40 2017 TUN/TAP TX queue length set to 100
Sat Apr 8 12:55:40 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Apr 8 12:55:40 2017 /sbin/ip link set dev tun0 up mtu 1500
Sat Apr 8 12:55:40 2017 /sbin/ip addr add dev tun0 local 10.42.10.6 peer 10.42.10.5
Sat Apr 8 12:55:40 2017 /sbin/ip route add 5.153.233.34/32 via 192.168.10.1
Sat Apr 8 12:55:40 2017 /sbin/ip route add 0.0.0.0/1 via 10.42.10.5
Sat Apr 8 12:55:40 2017 /sbin/ip route add 128.0.0.0/1 via 10.42.10.5
Sat Apr 8 12:55:40 2017 /sbin/ip route add 10.42.10.1/32 via 10.42.10.5
Sat Apr 8 12:55:40 2017 Initialization Sequence Completed
Sun Apr 9 06:00:06 2017 [099d8640923d949ef9448bc9aa948bd2] Inactivity timeout (--ping-restart), restarting
Sun Apr 9 06:00:06 2017 /sbin/ip route del 10.42.10.1/32
Sun Apr 9 06:00:06 2017 /sbin/ip route del 5.153.233.34/32
Sun Apr 9 06:00:06 2017 /sbin/ip route del 0.0.0.0/1
Sun Apr 9 06:00:06 2017 /sbin/ip route del 128.0.0.0/1
Sun Apr 9 06:00:06 2017 Closing TUN/TAP interface
Sun Apr 9 06:00:06 2017 /sbin/ip addr del dev tun0 local 10.42.10.6 peer 10.42.10.5
Sun Apr 9 06:00:06 2017 SIGUSR1[soft,ping-restart] received, process restarting
Sun Apr 9 06:00:06 2017 Restart pause, 2 second(s)
Sun Apr 9 06:00:08 2017 Socket Buffers: R=[163840->131072] S=[163840->131072]
Sun Apr 9 06:00:08 2017 UDPv4 link local (bound): [undef]
Sun Apr 9 06:00:08 2017 UDPv4 link remote: [AF_INET]91.108.183.171:1194
Sun Apr 9 06:00:08 2017 TLS: Initial packet from [AF_INET]91.108.183.171:1194, sid=05b04165 4f876f7e
Sun Apr 9 06:00:08 2017 CRL CHECK OK: C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, [email protected]
Sun Apr 9 06:00:08 2017 VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, [email protected]
Sun Apr 9 06:00:08 2017 Validating certificate key usage
Sun Apr 9 06:00:08 2017 ++ Certificate has key usage 00a0, expects 00a0
Sun Apr 9 06:00:08 2017 VERIFY KU OK
Sun Apr 9 06:00:08 2017 Validating certificate extended key usage
Sun Apr 9 06:00:08 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Apr 9 06:00:08 2017 VERIFY EKU OK
Sun Apr 9 06:00:08 2017 CRL CHECK OK: C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=ff6b04366cb02a5d65bf3bb8d0bb8c77, name=ff6b04366cb02a5d65bf3bb8d0bb8c77
Sun Apr 9 06:00:08 2017 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=ff6b04366cb02a5d65bf3bb8d0bb8c77, name=ff6b04366cb02a5d65bf3bb8d0bb8c77
Sun Apr 9 06:00:08 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Apr 9 06:00:08 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Apr 9 06:00:08 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Apr 9 06:00:08 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Apr 9 06:00:08 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sun Apr 9 06:00:08 2017 [ff6b04366cb02a5d65bf3bb8d0bb8c77] Peer Connection Initiated with [AF_INET]91.108.183.171:1194
Sun Apr 9 06:00:10 2017 SENT CONTROL [ff6b04366cb02a5d65bf3bb8d0bb8c77]: 'PUSH_REQUEST' (status=1)
Sun Apr 9 06:00:10 2017 AUTH: Received control message: AUTH_FAILED
Sun Apr 9 06:00:10 2017 SIGTERM[soft,auth-failure] received, process exiting
Grüße
Dennis