Jup, hab ich gemacht.
Damit kommen wieder andere Fehlermeldungen. Hier der Log vom Server
Code: Alles auswählen
Fri Feb 5 15:07:28 2016 vusoloms/109.47.195.227:33794 [vusoloms] Inactivity timeout (--ping-restart), restarting
Fri Feb 5 15:07:28 2016 vusoloms/109.47.195.227:33794 SIGUSR1[soft,ping-restart] received, client-instance restarting
Fri Feb 5 15:07:37 2016 vusoloms/109.47.195.227:59396 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:07:42 2016 109.47.195.227:56386 TLS: Initial packet from [AF_INET]109.47.195.227:56386, sid=dc0d75a3 8add3397
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 VERIFY OK: depth=1, C=DE, ST=CA, L=Slepo, O=Fort-Funston, OU=MyOrganizationalUnit, CN=Debian-MS, name=EasyRSA, emailAddress=me@myhost.mydomain
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 VERIFY OK: depth=0, C=DE, ST=CA, L=Slepo, O=Fort-Funston, OU=MyOrganizationalUnit, CN=vusoloms, name=EasyRSA, emailAddress=me@myhost.mydomain
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1542', remote='link-mtu 1570'
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 WARNING: 'cipher' is used inconsistently, local='cipher BF-CBC', remote='cipher AES-256-CBC'
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 WARNING: 'auth' is used inconsistently, local='auth SHA1', remote='auth SHA256'
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Feb 5 15:07:45 2016 109.47.195.227:56386 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Feb 5 15:07:46 2016 109.47.195.227:56386 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri Feb 5 15:07:46 2016 109.47.195.227:56386 [vusoloms] Peer Connection Initiated with [AF_INET]109.47.195.227:56386
Fri Feb 5 15:07:46 2016 vusoloms/109.47.195.227:56386 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
Fri Feb 5 15:07:46 2016 vusoloms/109.47.195.227:56386 MULTI: Learn: 10.8.0.6 -> vusoloms/109.47.195.227:56386
Fri Feb 5 15:07:46 2016 vusoloms/109.47.195.227:56386 MULTI: primary virtual IP for vusoloms/109.47.195.227:56386: 10.8.0.6
Fri Feb 5 15:07:48 2016 vusoloms/109.47.195.227:56386 PUSH: Received control message: 'PUSH_REQUEST'
Fri Feb 5 15:07:48 2016 vusoloms/109.47.195.227:56386 send_push_reply(): safe_cap=940
Fri Feb 5 15:07:48 2016 vusoloms/109.47.195.227:56386 SENT CONTROL [vusoloms]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
Fri Feb 5 15:07:50 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:07:51 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:01 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:12 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:21 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:33 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:41 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:52 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:58 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:59 2016 vusoloms/109.47.195.227:56386 Authenticate/Decrypt packet error: packet HMAC authentication failed
und der vom Client
Code: Alles auswählen
Fri Feb 5 15:05:41 2016 OPTIONS IMPORT: timers and/or timeouts modified
Fri Feb 5 15:05:41 2016 OPTIONS IMPORT: --ifconfig/up options modified
Fri Feb 5 15:05:41 2016 OPTIONS IMPORT: route options modified
Fri Feb 5 15:05:41 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Feb 5 15:05:41 2016 Preserving previous TUN/TAP instance: tun0
Fri Feb 5 15:05:41 2016 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Fri Feb 5 15:05:41 2016 /sbin/ip route del 10.8.0.0/24
Fri Feb 5 15:05:41 2016 /sbin/ip route del 91.38.148.23/32
Fri Feb 5 15:05:41 2016 /sbin/ip route del 0.0.0.0/1
Fri Feb 5 15:05:41 2016 /sbin/ip route del 128.0.0.0/1
Fri Feb 5 15:05:41 2016 Closing TUN/TAP interface
Fri Feb 5 15:05:41 2016 /sbin/ip addr del dev tun0 local 10.8.0.6 peer 10.8.0.5
Fri Feb 5 15:05:42 2016 ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlan0 HWADDR=80:1f:02:60:e9:49
Fri Feb 5 15:05:42 2016 TUN/TAP device tun0 opened
Fri Feb 5 15:05:42 2016 TUN/TAP TX queue length set to 100
Fri Feb 5 15:05:42 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Feb 5 15:05:42 2016 /sbin/ip link set dev tun0 up mtu 1500
Fri Feb 5 15:05:42 2016 /sbin/ip addr add dev tun0 local 10.8.0.10 peer 10.8.0.9
Fri Feb 5 15:05:42 2016 /sbin/ip route add 91.38.148.23/32 via 192.168.43.1
Fri Feb 5 15:05:42 2016 /sbin/ip route add 0.0.0.0/1 via 10.8.0.9
Fri Feb 5 15:05:42 2016 /sbin/ip route add 128.0.0.0/1 via 10.8.0.9
Fri Feb 5 15:05:43 2016 /sbin/ip route add 10.8.0.0/24 via 10.8.0.9
Fri Feb 5 15:05:43 2016 Initialization Sequence Completed
Fri Feb 5 15:05:52 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:06:02 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:06:12 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:06:22 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:06:32 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:06:41 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:06:52 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:07:02 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:07:12 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:07:22 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:07:31 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:07:41 2016 [meinedyndns.biz] Inactivity timeout (--ping-restart), restarting
Fri Feb 5 15:07:41 2016 SIGUSR1[soft,ping-restart] received, process restarting
Fri Feb 5 15:07:41 2016 Restart pause, 2 second(s)
Fri Feb 5 15:07:43 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Fri Feb 5 15:07:43 2016 Socket Buffers: R=[163840->131072] S=[163840->131072]
Fri Feb 5 15:07:43 2016 UDPv4 link local: [undef]
Fri Feb 5 15:07:43 2016 UDPv4 link remote: [AF_INET]91.38.148.23:4624
Fri Feb 5 15:07:43 2016 TLS: Initial packet from [AF_INET]91.38.148.23:4624, sid=ce5a6deb d9f50942
Fri Feb 5 15:07:44 2016 VERIFY OK: depth=1, C=DE, ST=CA, L=Slepo, O=Fort-Funston, OU=MyOrganizationalUnit, CN=Debian-MS, name=EasyRSA, emailAddress=me@myhost.mydomain
Fri Feb 5 15:07:44 2016 VERIFY OK: depth=0, C=DE, ST=CA, L=Slepo, O=Fort-Knox, OU=MyOrganizationalUnit, CN=meinedyndns.biz, name=EasyRSA, emailAddress=me@myhost.mydomain
Fri Feb 5 15:07:46 2016 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1570', remote='link-mtu 1542'
Fri Feb 5 15:07:46 2016 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Fri Feb 5 15:07:46 2016 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth SHA1'
Fri Feb 5 15:07:46 2016 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Fri Feb 5 15:07:46 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Feb 5 15:07:46 2016 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Feb 5 15:07:46 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Feb 5 15:07:46 2016 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Feb 5 15:07:46 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri Feb 5 15:07:46 2016 [meinedyndns.biz] Peer Connection Initiated with [AF_INET]91.38.148.23:4624
Fri Feb 5 15:07:48 2016 SENT CONTROL [meinedyndns.biz]: 'PUSH_REQUEST' (status=1)
Fri Feb 5 15:07:49 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
Fri Feb 5 15:07:49 2016 OPTIONS IMPORT: timers and/or timeouts modified
Fri Feb 5 15:07:49 2016 OPTIONS IMPORT: --ifconfig/up options modified
Fri Feb 5 15:07:49 2016 OPTIONS IMPORT: route options modified
Fri Feb 5 15:07:49 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Feb 5 15:07:49 2016 Preserving previous TUN/TAP instance: tun0
Fri Feb 5 15:07:49 2016 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Fri Feb 5 15:07:49 2016 /sbin/ip route del 10.8.0.0/24
Fri Feb 5 15:07:49 2016 /sbin/ip route del 91.38.148.23/32
Fri Feb 5 15:07:49 2016 /sbin/ip route del 0.0.0.0/1
Fri Feb 5 15:07:49 2016 /sbin/ip route del 128.0.0.0/1
Fri Feb 5 15:07:49 2016 Closing TUN/TAP interface
Fri Feb 5 15:07:49 2016 /sbin/ip addr del dev tun0 local 10.8.0.10 peer 10.8.0.9
Fri Feb 5 15:07:50 2016 ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlan0 HWADDR=80:1f:02:60:e9:49
Fri Feb 5 15:07:50 2016 TUN/TAP device tun0 opened
Fri Feb 5 15:07:50 2016 TUN/TAP TX queue length set to 100
Fri Feb 5 15:07:50 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri Feb 5 15:07:50 2016 /sbin/ip link set dev tun0 up mtu 1500
Fri Feb 5 15:07:50 2016 /sbin/ip addr add dev tun0 local 10.8.0.6 peer 10.8.0.5
Fri Feb 5 15:07:50 2016 /sbin/ip route add 91.38.148.23/32 via 192.168.43.1
Fri Feb 5 15:07:50 2016 /sbin/ip route add 0.0.0.0/1 via 10.8.0.5
Fri Feb 5 15:07:50 2016 /sbin/ip route add 128.0.0.0/1 via 10.8.0.5
Fri Feb 5 15:07:50 2016 /sbin/ip route add 10.8.0.0/24 via 10.8.0.5
Fri Feb 5 15:07:50 2016 Initialization Sequence Completed
Fri Feb 5 15:07:58 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:09 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:20 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:30 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:41 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:08:51 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:09:00 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:09:11 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:09:21 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:09:31 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:09:41 2016 Authenticate/Decrypt packet error: packet HMAC authentication failed
Fri Feb 5 15:09:49 2016 [meinedyndns.biz] Inactivity timeout (--ping-restart), restarting
Fri Feb 5 15:09:49 2016 SIGUSR1[soft,ping-restart] received, process restarting
Fri Feb 5 15:09:49 2016 Restart pause, 2 second(s)
Fri Feb 5 15:09:51 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Fri Feb 5 15:09:51 2016 Socket Buffers: R=[163840->131072] S=[163840->131072]
Fri Feb 5 15:09:51 2016 UDPv4 link local: [undef]
Fri Feb 5 15:09:51 2016 UDPv4 link remote: [AF_INET]91.38.148.23:4624
Fri Feb 5 15:09:51 2016 TLS: Initial packet from [AF_INET]91.38.148.23:4624, sid=ae2e2d35 f9afd61d
Fri Feb 5 15:09:52 2016 VERIFY OK: depth=1, C=DE, ST=CA, L=Slepo, O=Fort-Funston, OU=MyOrganizationalUnit, CN=Debian-MS, name=EasyRSA, emailAddress=me@myhost.mydomain
Fri Feb 5 15:09:52 2016 VERIFY OK: depth=0, C=DE, ST=CA, L=Slepo, O=Fort-Knox, OU=MyOrganizationalUnit, CN=meinedyndns.biz, name=EasyRSA, emailAddress=me@myhost.mydomain
Fri Feb 5 15:09:54 2016 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1570', remote='link-mtu 1542'
Fri Feb 5 15:09:54 2016 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
Fri Feb 5 15:09:54 2016 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth SHA1'
Fri Feb 5 15:09:54 2016 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Fri Feb 5 15:09:54 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Feb 5 15:09:54 2016 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Feb 5 15:09:54 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Fri Feb 5 15:09:54 2016 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Feb 5 15:09:54 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri Feb 5 15:09:54 2016 [meinedyndns.biz] Peer Connection Initiated with [AF_INET]91.38.148.23:4624
Fri Feb 5 15:09:57 2016 SENT CONTROL [meinedyndns.biz]: 'PUSH_REQUEST' (status=1)
Fri Feb 5 15:09:57 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9'
Zu der Frage wie ich feststelle das keine Verbindung mehr da ist.
Der Client holt sich einen Schlüssel beim Server ab um etwas zu entschlüsseln, und das funktioniert nach der Zwangstrennung nicht mehr.
EDIT:
Eine Frage, am Server selbst kann es nicht liegen oder?
Ist ein Thinclient, nicht das der zu alt ist.