cat /var/tmp/debug_openvpn.out
Tue Mar 15 19:37:23 2016 OpenVPN 2.3.10 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [IPv6] built on Feb 26 2016
Tue Mar 15 19:37:23 2016 library versions: OpenSSL 1.0.1r 28 Jan 2016, LZO 2.09
Tue Mar 15 19:37:23 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Mar 15 19:37:23 2016 Control Channel Authentication: using '/tmp/flash/openvpn/static.key' as a OpenVPN static key file
Tue Mar 15 19:37:23 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Mar 15 19:37:23 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Mar 15 19:37:23 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
Tue Mar 15 19:37:24 2016 Attempting to establish TCP connection with [AF_INET]xx.xxx.xx.xxx:1194 [nonblock]
Tue Mar 15 19:37:25 2016 TCP connection established with [AF_INET]xx.xxx.xx.xxx:1194
Tue Mar 15 19:37:25 2016 TCPv4_CLIENT link local: [undef]
Tue Mar 15 19:37:25 2016 TCPv4_CLIENT link remote: [AF_INET]xx.xxx.xx.xxx:1194
Tue Mar 15 19:37:25 2016 TLS: Initial packet from [AF_INET]xx.xxx.xx.xxx:1194, sid=18101f44 d2158aba
Tue Mar 15 19:37:26 2016 VERIFY OK: depth=1, C=DE, ST=Niedersachsen, L=xyz, O=Internet Ltd., OU=MyOrganizationalUnit, CN=Internet Ltd. CA, name=JokerGermany, emailAddress=JokerGermany
Tue Mar 15 19:37:26 2016 VERIFY OK: depth=0, C=DE, ST=Niedersachsen, L=xyz, O=Internet Ltd., OU=MyOrganizationalUnit, CN=stadt, name=JokerGermany, emailAddress=JokerGermanym
Tue Mar 15 19:37:29 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Mar 15 19:37:29 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Mar 15 19:37:29 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Mar 15 19:37:29 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Mar 15 19:37:29 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Tue Mar 15 19:37:29 2016 [stadt] Peer Connection Initiated with [AF_INET]87.174.47.100:1194
Tue Mar 15 19:37:31 2016 SENT CONTROL [stadt]: 'PUSH_REQUEST' (status=1)
Tue Mar 15 19:37:31 2016 PUSH: Received control message: 'PUSH_REPLY,route-gateway 192.168.200.1,topology subnet,route 192.168.2.0 255.255.255.0,route 192.168.200.1,ping 10,ping-restart 120,ifconfig 192.168.200.100 255.255.255.0'
Tue Mar 15 19:37:31 2016 OPTIONS IMPORT: timers and/or timeouts modified
Tue Mar 15 19:37:31 2016 OPTIONS IMPORT: --ifconfig/up options modified
Tue Mar 15 19:37:31 2016 OPTIONS IMPORT: route options modified
Tue Mar 15 19:37:31 2016 OPTIONS IMPORT: route-related options modified
Tue Mar 15 19:37:31 2016 TUN/TAP device tun0 opened
Tue Mar 15 19:37:31 2016 TUN/TAP TX queue length set to 100
Tue Mar 15 19:37:31 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Mar 15 19:37:31 2016 /sbin/ifconfig tun0 192.168.200.100 netmask 255.255.255.0 mtu 1500 broadcast 192.168.200.255
Tue Mar 15 19:37:31 2016 /sbin/route add -net 192.168.2.0 netmask 255.255.255.0 gw 192.168.200.1
Tue Mar 15 19:37:31 2016 /sbin/route add -net 192.168.200.1 netmask 255.255.255.255 gw 192.168.200.1
Tue Mar 15 19:37:31 2016 Initialization Sequence Completed