Hab den Befehl mal eingebaut in die config. Aber heut um 4 Uhr Morgens war der Spaß wieder vorbei.
Bis zur Zwangstrennung keine TLS Errors, sofort nach der Zwangstrennung geht es damit los.
Log Client
Code: Alles auswählen
Sun Feb 14 01:51:22 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Feb 14 01:51:22 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sun Feb 14 02:51:21 2016 TLS: tls_process: killed expiring key
Sun Feb 14 02:51:22 2016 TLS: soft reset sec=0 bytes=12390/0 pkts=236/0
Sun Feb 14 02:51:22 2016 VERIFY OK: depth=1, C=DE, ST=CA, L=Slepo, O=Fort-Knox, OU=MyOrganizationalUnit, CN=come-on.takealookarround.biz, name=EasyRSA, emailAddress=me@myhost.mydomain
Sun Feb 14 02:51:22 2016 VERIFY OK: nsCertType=SERVER
Sun Feb 14 02:51:22 2016 VERIFY OK: depth=0, C=DE, ST=CA, L=Slepo, O=Fort-Knox, OU=MyOrganizationalUnit, CN=come-on.takealookarround.biz, name=EasyRSA, emailAddress=me@myhost.mydomain
Sun Feb 14 02:51:23 2016 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1542', remote='link-mtu 1574'
Sun Feb 14 02:51:23 2016 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1532'
Sun Feb 14 02:51:23 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Feb 14 02:51:23 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Feb 14 02:51:23 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Feb 14 02:51:23 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Feb 14 02:51:23 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sun Feb 14 03:51:22 2016 TLS: tls_process: killed expiring key
Sun Feb 14 03:51:23 2016 TLS: soft reset sec=0 bytes=12390/0 pkts=236/0
Sun Feb 14 03:51:23 2016 VERIFY OK: depth=1, C=DE, ST=CA, L=Slepo, O=Fort-Knox, OU=MyOrganizationalUnit, CN=come-on.takealookarround.biz, name=EasyRSA, emailAddress=me@myhost.mydomain
Sun Feb 14 03:51:23 2016 VERIFY OK: nsCertType=SERVER
Sun Feb 14 03:51:23 2016 VERIFY OK: depth=0, C=DE, ST=CA, L=Slepo, O=Fort-Knox, OU=MyOrganizationalUnit, CN=come-on.takealookarround.biz, name=EasyRSA, emailAddress=me@myhost.mydomain
Sun Feb 14 03:51:24 2016 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1542', remote='link-mtu 1574'
Sun Feb 14 03:51:24 2016 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1500', remote='tun-mtu 1532'
Sun Feb 14 03:51:24 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Feb 14 03:51:24 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Feb 14 03:51:24 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Feb 14 03:51:24 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Feb 14 03:51:24 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Sun Feb 14 04:12:38 2016 [meinedyndns.biz] Inactivity timeout (--ping-restart), restarting
Sun Feb 14 04:12:38 2016 SIGUSR1[soft,ping-restart] received, process restarting
Sun Feb 14 04:12:38 2016 Restart pause, 2 second(s)
Sun Feb 14 04:12:40 2016 Socket Buffers: R=[163840->131072] S=[163840->131072]
Sun Feb 14 04:12:40 2016 UDPv4 link local: [undef]
Sun Feb 14 04:12:40 2016 UDPv4 link remote: [AF_INET]91.38.137.124:4624
Sun Feb 14 04:13:40 2016 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Feb 14 04:13:40 2016 TLS Error: TLS handshake failed
Sun Feb 14 04:13:40 2016 SIGUSR1[soft,tls-error] received, process restarting
Sun Feb 14 04:13:40 2016 Restart pause, 2 second(s)
Sun Feb 14 04:13:42 2016 Socket Buffers: R=[163840->131072] S=[163840->131072]
Sun Feb 14 04:13:43 2016 UDPv4 link local: [undef]
Sun Feb 14 04:13:43 2016 UDPv4 link remote: [AF_INET]91.38.137.124:4624
Sun Feb 14 04:14:43 2016 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Feb 14 04:14:43 2016 TLS Error: TLS handshake failed
Sun Feb 14 04:14:43 2016 SIGUSR1[soft,tls-error] received, process restarting
Sun Feb 14 04:14:43 2016 Restart pause, 2 second(s)
Sun Feb 14 04:14:45 2016 Socket Buffers: R=[163840->131072] S=[163840->131072]
Sun Feb 14 04:14:45 2016 UDPv4 link local: [undef]
Sun Feb 14 04:14:45 2016 UDPv4 link remote: [AF_INET]91.38.137.124:4624
Sun Feb 14 04:15:45 2016 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Feb 14 04:15:45 2016 TLS Error: TLS handshake failed
Sun Feb 14 04:15:45 2016 SIGUSR1[soft,tls-error] received, process restarting
Sun Feb 14 04:15:45 2016 Restart pause, 2 second(s)
Sun Feb 14 04:15:47 2016 Socket Buffers: R=[163840->131072] S=[163840->131072]
Sun Feb 14 04:15:47 2016 UDPv4 link local: [undef]
Sun Feb 14 04:15:47 2016 UDPv4 link remote: [AF_INET]91.38.137.124:4624
Sun Feb 14 04:16:47 2016 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Sun Feb 14 04:16:47 2016 TLS Error: TLS handshake failed
Sun Feb 14 04:16:47 2016 SIGUSR1[soft,tls-error] received, process restarting
Sun Feb 14 04:16:47 2016 Restart pause, 2 second(s)
Die MTU Warnung hab ich eben gesehen, und hab beim Client irgendwie vergessen den Wert einzutragen, ist aber jetzt angepasst.