I cloned repository https://github.com/dockovpn/dockovpn and updated config/server.conf to increase the server log verbosity by setting verb
to 4
:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 | port 1194 proto %HOST_TUN_PROTOCOL% dev tun ca /etc/openvpn/ca.crt cert /etc/openvpn/MyReq.crt key /etc/openvpn/MyReq.key dh /etc/openvpn/dh.pem server 10.8.0.0 255.255.255.0 ifconfig-pool-persist ipp.txt push "redirect-gateway def1 bypass-dhcp" push "dhcp-option DNS 208.67.222.222" push "dhcp-option DNS 208.67.220.220" duplicate-cn keepalive 10 120 cipher AES-256-GCM ncp-ciphers AES-256-GCM:AES-256-CBC auth SHA512 persist-key persist-tun status openvpn-status.log verb 4 tls-server tls-version-min 1.2 tls-auth /etc/openvpn/ta.key 0 crl-verify /etc/openvpn/crl.pem |
Built and run the docker image:
sudo docker build -t alekslitvinenk/openvpn-verb . export MY_IP=$(curl -s https://api.ipify.org) sudo docker run -it --rm --cap-add=NET_ADMIN -p 1194:1194/udp -e HOST_ADDR=$MY_IP --name dockovpn-verb alekslitvinenk/openvpn-verb |
the output was the following:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 | Sun Jan 12 17:28:08 2025 Creating tun/tap device. Using SSL: openssl OpenSSL 1.1.1t 7 Feb 2023 (Library: OpenSSL 1.1.1k 25 Mar 2021) Generating RSA private key, 2048 bit long modulus (2 primes) ....+++++ ............................+++++ e is 65537 (0x010001) You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Common Name (eg: your user, host, or server name) [Easy-RSA CA]: CA creation complete and you may now import and sign cert requests. Your new CA certificate file for publishing is at: /opt/Dockovpn_data/pki/ca.crt Using SSL: openssl OpenSSL 1.1.1t 7 Feb 2023 (Library: OpenSSL 1.1.1k 25 Mar 2021) Generating a RSA private key ........................................+++++ ......................................................................................+++++ writing new private key to '/opt/Dockovpn_data/pki/easy-rsa-57.nhbOHk/tmp.aKDdmD' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Common Name (eg: your user, host, or server name) [MyReq]: Keypair and certificate request completed. Your files are: req: /opt/Dockovpn_data/pki/reqs/MyReq.req key: /opt/Dockovpn_data/pki/private/MyReq.key Using SSL: openssl OpenSSL 1.1.1t 7 Feb 2023 (Library: OpenSSL 1.1.1k 25 Mar 2021) You are about to sign the following certificate. Please check over the details shown below for accuracy. Note that this request has not been cryptographically verified. Please be sure it came from a trusted source or that you have verified the request checksum with the sender. Request subject, to be signed as a server certificate for 825 days: subject= commonName = MyReq Type the word 'yes' to continue, or any other input to abort. Confirm request details: Using configuration from /opt/Dockovpn_data/pki/easy-rsa-79.eiIojA/tmp.jApMPN Check that the request matches the signature Signature ok The Subject's Distinguished Name is as follows commonName :ASN.1 12:'MyReq' Certificate is to be certified until Apr 17 17:28:08 2027 GMT (825 days) Write out database with 1 new entries Data Base Updated Certificate created at: /opt/Dockovpn_data/pki/issued/MyReq.crt 2025-01-12 17:28:08 WARNING: Using --genkey --secret filename is DEPRECATED. Use --genkey secret filename instead. Using SSL: openssl OpenSSL 1.1.1t 7 Feb 2023 (Library: OpenSSL 1.1.1k 25 Mar 2021) Using configuration from /opt/Dockovpn_data/pki/easy-rsa-143.Jajgmd/tmp.KoCgiD An updated CRL has been created. CRL file: /opt/Dockovpn_data/pki/crl.pem Sun Jan 12 17:28:08 2025 Dockovpn v1.14.0 2025-01-12 17:28:08 Note: Treating option '--ncp-ciphers' as '--data-ciphers' (renamed in OpenVPN 2.5). 2025-01-12 17:28:08 us=361586 WARNING: --topology net30 support for server configs with IPv4 pools will be removed in a future release. Please migrate to --topology subnet as soon as possible. 2025-01-12 17:28:08 us=362000 Current Parameter Settings: 2025-01-12 17:28:08 us=362412 config = '/etc/openvpn/server.conf' 2025-01-12 17:28:08 us=362597 mode = 1 2025-01-12 17:28:08 us=362794 persist_config = DISABLED 2025-01-12 17:28:08 us=363157 persist_mode = 1 2025-01-12 17:28:08 us=363335 show_ciphers = DISABLED 2025-01-12 17:28:08 us=363687 show_digests = DISABLED 2025-01-12 17:28:08 us=363794 show_engines = DISABLED 2025-01-12 17:28:08 us=363910 genkey = DISABLED 2025-01-12 17:28:08 us=363931 genkey_filename = '[UNDEF]' 2025-01-12 17:28:08 us=363947 key_pass_file = '[UNDEF]' 2025-01-12 17:28:08 us=363963 show_tls_ciphers = DISABLED 2025-01-12 17:28:08 us=363978 connect_retry_max = 0 2025-01-12 17:28:08 us=363993 Connection profiles [0]: 2025-01-12 17:28:08 us=364009 proto = udp 2025-01-12 17:28:08 us=364024 local = '[UNDEF]' 2025-01-12 17:28:08 us=364039 local_port = '1194' 2025-01-12 17:28:08 us=364054 remote = '[UNDEF]' 2025-01-12 17:28:08 us=364069 remote_port = '1194' 2025-01-12 17:28:08 us=364084 remote_float = DISABLED 2025-01-12 17:28:08 us=364099 bind_defined = DISABLED 2025-01-12 17:28:08 us=364113 bind_local = ENABLED 2025-01-12 17:28:08 us=364129 bind_ipv6_only = DISABLED 2025-01-12 17:28:08 us=364144 connect_retry_seconds = 5 2025-01-12 17:28:08 us=364158 connect_timeout = 120 2025-01-12 17:28:08 us=364174 socks_proxy_server = '[UNDEF]' 2025-01-12 17:28:08 us=364189 socks_proxy_port = '[UNDEF]' 2025-01-12 17:28:08 us=364204 tun_mtu = 1500 2025-01-12 17:28:08 us=364219 tun_mtu_defined = ENABLED 2025-01-12 17:28:08 us=364234 link_mtu = 1500 2025-01-12 17:28:08 us=364249 link_mtu_defined = DISABLED 2025-01-12 17:28:08 us=364264 tun_mtu_extra = 0 2025-01-12 17:28:08 us=364279 tun_mtu_extra_defined = DISABLED 2025-01-12 17:28:08 us=364294 mtu_discover_type = -1 2025-01-12 17:28:08 us=364308 fragment = 0 2025-01-12 17:28:08 us=364324 mssfix = 1450 2025-01-12 17:28:08 us=364339 explicit_exit_notification = 0 2025-01-12 17:28:08 us=364354 tls_auth_file = '[INLINE]' 2025-01-12 17:28:08 us=364369 key_direction = 0 2025-01-12 17:28:08 us=364384 tls_crypt_file = '[UNDEF]' 2025-01-12 17:28:08 us=364400 tls_crypt_v2_file = '[UNDEF]' 2025-01-12 17:28:08 us=364414 Connection profiles END 2025-01-12 17:28:08 us=364429 remote_random = DISABLED 2025-01-12 17:28:08 us=364444 ipchange = '[UNDEF]' 2025-01-12 17:28:08 us=364459 dev = 'tun' 2025-01-12 17:28:08 us=364478 dev_type = '[UNDEF]' 2025-01-12 17:28:08 us=364502 dev_node = '[UNDEF]' 2025-01-12 17:28:08 us=364518 lladdr = '[UNDEF]' 2025-01-12 17:28:08 us=364534 topology = 1 2025-01-12 17:28:08 us=364548 ifconfig_local = '10.8.0.1' 2025-01-12 17:28:08 us=364563 ifconfig_remote_netmask = '10.8.0.2' 2025-01-12 17:28:08 us=364578 ifconfig_noexec = DISABLED 2025-01-12 17:28:08 us=364593 ifconfig_nowarn = DISABLED 2025-01-12 17:28:08 us=364608 ifconfig_ipv6_local = '[UNDEF]' 2025-01-12 17:28:08 us=364623 ifconfig_ipv6_netbits = 0 2025-01-12 17:28:08 us=364638 ifconfig_ipv6_remote = '[UNDEF]' 2025-01-12 17:28:08 us=364654 shaper = 0 2025-01-12 17:28:08 us=364669 mtu_test = 0 2025-01-12 17:28:08 us=364683 mlock = DISABLED 2025-01-12 17:28:08 us=364698 keepalive_ping = 10 2025-01-12 17:28:08 us=364712 keepalive_timeout = 120 2025-01-12 17:28:08 us=364727 inactivity_timeout = 0 2025-01-12 17:28:08 us=364741 inactivity_minimum_bytes = 0 2025-01-12 17:28:08 us=364756 ping_send_timeout = 10 2025-01-12 17:28:08 us=364773 ping_rec_timeout = 240 2025-01-12 17:28:08 us=364788 ping_rec_timeout_action = 2 2025-01-12 17:28:08 us=364802 ping_timer_remote = DISABLED 2025-01-12 17:28:08 us=364817 remap_sigusr1 = 0 2025-01-12 17:28:08 us=364832 persist_tun = ENABLED 2025-01-12 17:28:08 us=364847 persist_local_ip = DISABLED 2025-01-12 17:28:08 us=364862 persist_remote_ip = DISABLED 2025-01-12 17:28:08 us=364877 persist_key = ENABLED 2025-01-12 17:28:08 us=364891 passtos = DISABLED 2025-01-12 17:28:08 us=364906 resolve_retry_seconds = 1000000000 2025-01-12 17:28:08 us=364921 resolve_in_advance = DISABLED 2025-01-12 17:28:08 us=364937 username = '[UNDEF]' 2025-01-12 17:28:08 us=364952 groupname = '[UNDEF]' 2025-01-12 17:28:08 us=364966 chroot_dir = '[UNDEF]' 2025-01-12 17:28:08 us=364983 cd_dir = '[UNDEF]' 2025-01-12 17:28:08 us=364999 writepid = '[UNDEF]' 2025-01-12 17:28:08 us=365016 up_script = '[UNDEF]' 2025-01-12 17:28:08 us=365031 down_script = '[UNDEF]' 2025-01-12 17:28:08 us=365045 down_pre = DISABLED 2025-01-12 17:28:08 us=365060 up_restart = DISABLED 2025-01-12 17:28:08 us=368449 up_delay = DISABLED 2025-01-12 17:28:08 us=368652 daemon = DISABLED 2025-01-12 17:28:08 us=368835 inetd = 0 2025-01-12 17:28:08 us=369028 log = DISABLED 2025-01-12 17:28:08 us=369201 suppress_timestamps = DISABLED 2025-01-12 17:28:08 us=369235 machine_readable_output = DISABLED 2025-01-12 17:28:08 us=369253 nice = 0 2025-01-12 17:28:08 us=369269 verbosity = 4 2025-01-12 17:28:08 us=369284 mute = 0 2025-01-12 17:28:08 us=369299 gremlin = 0 2025-01-12 17:28:08 us=369314 status_file = 'openvpn-status.log' 2025-01-12 17:28:08 us=369335 status_file_version = 1 2025-01-12 17:28:08 us=369359 status_file_update_freq = 60 2025-01-12 17:28:08 us=369385 occ = ENABLED 2025-01-12 17:28:08 us=369401 rcvbuf = 0 2025-01-12 17:28:08 us=369416 sndbuf = 0 2025-01-12 17:28:08 us=369433 mark = 0 2025-01-12 17:28:08 us=369449 sockflags = 0 2025-01-12 17:28:08 us=369464 fast_io = DISABLED 2025-01-12 17:28:08 us=369479 comp.alg = 0 2025-01-12 17:28:08 us=369494 comp.flags = 0 2025-01-12 17:28:08 us=369509 route_script = '[UNDEF]' 2025-01-12 17:28:08 us=369524 route_default_gateway = '[UNDEF]' 2025-01-12 17:28:08 us=369539 route_default_metric = 0 2025-01-12 17:28:08 us=369553 route_noexec = DISABLED 2025-01-12 17:28:08 us=369568 route_delay = 0 2025-01-12 17:28:08 us=369583 route_delay_window = 30 2025-01-12 17:28:08 us=369598 route_delay_defined = DISABLED 2025-01-12 17:28:08 us=369613 route_nopull = DISABLED 2025-01-12 17:28:08 us=369628 route_gateway_via_dhcp = DISABLED 2025-01-12 17:28:08 us=369643 allow_pull_fqdn = DISABLED 2025-01-12 17:28:08 us=369659 route 10.8.0.0/255.255.255.0/default (not set)/default (not set) 2025-01-12 17:28:08 us=369674 management_addr = '[UNDEF]' 2025-01-12 17:28:08 us=369836 management_port = '[UNDEF]' 2025-01-12 17:28:08 us=369851 management_user_pass = '[UNDEF]' 2025-01-12 17:28:08 us=369866 management_log_history_cache = 250 2025-01-12 17:28:08 us=369881 management_echo_buffer_size = 100 2025-01-12 17:28:08 us=369896 management_write_peer_info_file = '[UNDEF]' 2025-01-12 17:28:08 us=369911 management_client_user = '[UNDEF]' 2025-01-12 17:28:08 us=369926 management_client_group = '[UNDEF]' 2025-01-12 17:28:08 us=369941 management_flags = 0 2025-01-12 17:28:08 us=369956 shared_secret_file = '[UNDEF]' 2025-01-12 17:28:08 us=369971 key_direction = 0 2025-01-12 17:28:08 us=369986 ciphername = 'AES-256-GCM' 2025-01-12 17:28:08 us=370000 ncp_enabled = ENABLED 2025-01-12 17:28:08 us=370015 ncp_ciphers = 'AES-256-GCM:AES-256-CBC' 2025-01-12 17:28:08 us=370031 authname = 'SHA512' 2025-01-12 17:28:08 us=370046 prng_hash = 'SHA1' 2025-01-12 17:28:08 us=370061 prng_nonce_secret_len = 16 2025-01-12 17:28:08 us=370076 keysize = 0 2025-01-12 17:28:08 us=370090 engine = DISABLED 2025-01-12 17:28:08 us=370105 replay = ENABLED 2025-01-12 17:28:08 us=370119 mute_replay_warnings = DISABLED 2025-01-12 17:28:08 us=370134 replay_window = 64 2025-01-12 17:28:08 us=370148 replay_time = 15 2025-01-12 17:28:08 us=370170 packet_id_file = '[UNDEF]' 2025-01-12 17:28:08 us=370191 test_crypto = DISABLED 2025-01-12 17:28:08 us=370207 tls_server = ENABLED 2025-01-12 17:28:08 us=370221 tls_client = DISABLED 2025-01-12 17:28:08 us=370236 ca_file = '/etc/openvpn/ca.crt' 2025-01-12 17:28:08 us=370250 ca_path = '[UNDEF]' 2025-01-12 17:28:08 us=370266 dh_file = '/etc/openvpn/dh.pem' 2025-01-12 17:28:08 us=370281 cert_file = '/etc/openvpn/MyReq.crt' 2025-01-12 17:28:08 us=370296 extra_certs_file = '[UNDEF]' 2025-01-12 17:28:08 us=370311 priv_key_file = '/etc/openvpn/MyReq.key' 2025-01-12 17:28:08 us=370326 pkcs12_file = '[UNDEF]' 2025-01-12 17:28:08 us=370340 cipher_list = '[UNDEF]' 2025-01-12 17:28:08 us=370355 cipher_list_tls13 = '[UNDEF]' 2025-01-12 17:28:08 us=370370 tls_cert_profile = '[UNDEF]' 2025-01-12 17:28:08 us=370384 tls_verify = '[UNDEF]' 2025-01-12 17:28:08 us=370399 tls_export_cert = '[UNDEF]' 2025-01-12 17:28:08 us=370414 verify_x509_type = 0 2025-01-12 17:28:08 us=370429 verify_x509_name = '[UNDEF]' 2025-01-12 17:28:08 us=370444 crl_file = '/etc/openvpn/crl.pem' 2025-01-12 17:28:08 us=370459 ns_cert_type = 0 2025-01-12 17:28:08 us=370474 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370655 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370670 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370685 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370699 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370714 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370729 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370744 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370758 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370773 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370788 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370802 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370817 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370832 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370847 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370862 remote_cert_ku[i] = 0 2025-01-12 17:28:08 us=370877 remote_cert_eku = '[UNDEF]' 2025-01-12 17:28:08 us=370892 ssl_flags = 192 2025-01-12 17:28:08 us=370906 tls_timeout = 2 2025-01-12 17:28:08 us=370921 renegotiate_bytes = -1 2025-01-12 17:28:08 us=370936 renegotiate_packets = 0 2025-01-12 17:28:08 us=370950 renegotiate_seconds = 3600 2025-01-12 17:28:08 us=370970 handshake_window = 60 2025-01-12 17:28:08 us=370985 transition_window = 3600 2025-01-12 17:28:08 us=371001 single_session = DISABLED 2025-01-12 17:28:08 us=371016 push_peer_info = DISABLED 2025-01-12 17:28:08 us=371030 tls_exit = DISABLED 2025-01-12 17:28:08 us=371045 tls_crypt_v2_metadata = '[UNDEF]' 2025-01-12 17:28:08 us=371062 server_network = 10.8.0.0 2025-01-12 17:28:08 us=371077 server_netmask = 255.255.255.0 2025-01-12 17:28:08 us=371094 server_network_ipv6 = :: 2025-01-12 17:28:08 us=371110 server_netbits_ipv6 = 0 2025-01-12 17:28:08 us=371126 server_bridge_ip = 0.0.0.0 2025-01-12 17:28:08 us=371142 server_bridge_netmask = 0.0.0.0 2025-01-12 17:28:08 us=371157 server_bridge_pool_start = 0.0.0.0 2025-01-12 17:28:08 us=371174 server_bridge_pool_end = 0.0.0.0 2025-01-12 17:28:08 us=371189 push_entry = 'redirect-gateway def1 bypass-dhcp' 2025-01-12 17:28:08 us=371204 push_entry = 'dhcp-option DNS 208.67.222.222' 2025-01-12 17:28:08 us=371219 push_entry = 'dhcp-option DNS 208.67.220.220' 2025-01-12 17:28:08 us=371233 push_entry = 'route 10.8.0.1' 2025-01-12 17:28:08 us=371249 push_entry = 'topology net30' 2025-01-12 17:28:08 us=371264 push_entry = 'ping 10' 2025-01-12 17:28:08 us=371279 push_entry = 'ping-restart 120' 2025-01-12 17:28:08 us=371294 ifconfig_pool_defined = ENABLED 2025-01-12 17:28:08 us=371309 ifconfig_pool_start = 10.8.0.4 2025-01-12 17:28:08 us=371325 ifconfig_pool_end = 10.8.0.251 2025-01-12 17:28:08 us=371342 ifconfig_pool_netmask = 0.0.0.0 2025-01-12 17:28:08 us=371357 ifconfig_pool_persist_filename = 'ipp.txt' 2025-01-12 17:28:08 us=371372 ifconfig_pool_persist_refresh_freq = 600 2025-01-12 17:28:08 us=371388 ifconfig_ipv6_pool_defined = DISABLED 2025-01-12 17:28:08 us=371404 ifconfig_ipv6_pool_base = :: 2025-01-12 17:28:08 us=371419 ifconfig_ipv6_pool_netbits = 0 2025-01-12 17:28:08 us=371433 n_bcast_buf = 256 2025-01-12 17:28:08 us=371448 tcp_queue_limit = 64 2025-01-12 17:28:08 us=371463 real_hash_size = 256 2025-01-12 17:28:08 us=371478 virtual_hash_size = 256 2025-01-12 17:28:08 us=371492 client_connect_script = '[UNDEF]' 2025-01-12 17:28:08 us=371508 learn_address_script = '[UNDEF]' 2025-01-12 17:28:08 us=371523 client_disconnect_script = '[UNDEF]' 2025-01-12 17:28:08 us=371539 client_config_dir = '[UNDEF]' 2025-01-12 17:28:08 us=371554 ccd_exclusive = DISABLED 2025-01-12 17:28:08 us=371568 tmp_dir = '/tmp' 2025-01-12 17:28:08 us=371583 push_ifconfig_defined = DISABLED 2025-01-12 17:28:08 us=371598 push_ifconfig_local = 0.0.0.0 2025-01-12 17:28:08 us=371614 push_ifconfig_remote_netmask = 0.0.0.0 2025-01-12 17:28:08 us=371629 push_ifconfig_ipv6_defined = DISABLED 2025-01-12 17:28:08 us=371646 push_ifconfig_ipv6_local = ::/0 2025-01-12 17:28:08 us=371667 push_ifconfig_ipv6_remote = :: 2025-01-12 17:28:08 us=374666 enable_c2c = DISABLED 2025-01-12 17:28:08 us=374878 duplicate_cn = ENABLED 2025-01-12 17:28:08 us=375280 cf_max = 0 2025-01-12 17:28:08 us=375470 cf_per = 0 2025-01-12 17:28:08 us=375662 max_clients = 1024 2025-01-12 17:28:08 us=375845 max_routes_per_client = 256 2025-01-12 17:28:08 us=376473 auth_user_pass_verify_script = '[UNDEF]' 2025-01-12 17:28:08 us=376672 auth_user_pass_verify_script_via_file = DISABLED 2025-01-12 17:28:08 us=376877 auth_token_generate = DISABLED 2025-01-12 17:28:08 us=377172 auth_token_lifetime = 0 2025-01-12 17:28:08 us=377799 auth_token_secret_file = '[UNDEF]' 2025-01-12 17:28:08 us=378012 port_share_host = '[UNDEF]' 2025-01-12 17:28:08 us=378216 port_share_port = '[UNDEF]' 2025-01-12 17:28:08 us=378501 vlan_tagging = DISABLED 2025-01-12 17:28:08 us=378538 vlan_accept = all 2025-01-12 17:28:08 us=378564 vlan_pvid = 1 2025-01-12 17:28:08 us=378588 client = DISABLED 2025-01-12 17:28:08 us=378612 pull = DISABLED 2025-01-12 17:28:08 us=378636 auth_user_pass_file = '[UNDEF]' 2025-01-12 17:28:08 us=378657 OpenVPN 2.5.6 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 24 2022 2025-01-12 17:28:08 us=378686 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 2025-01-12 17:28:08 us=378747 WARNING: --ifconfig-pool-persist will not work with --duplicate-cn 2025-01-12 17:28:08 us=379480 Diffie-Hellman initialized with 2048 bit key 2025-01-12 17:28:08 us=379892 CRL: loaded 1 CRLs from file /etc/openvpn/crl.pem 2025-01-12 17:28:08 us=379965 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 17:28:08 us=379984 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 17:28:08 us=380024 TLS-Auth MTU parms [ L:1621 D:1140 EF:110 EB:0 ET:0 EL:3 ] 2025-01-12 17:28:08 us=380167 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:03 2025-01-12 17:28:08 us=380536 TUN/TAP device tun0 opened 2025-01-12 17:28:08 us=380557 do_ifconfig, ipv4=1, ipv6=0 2025-01-12 17:28:08 us=380578 /sbin/ip link set dev tun0 up mtu 1500 2025-01-12 17:28:08 us=385247 /sbin/ip link set dev tun0 up 2025-01-12 17:28:08 us=386305 /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2 2025-01-12 17:28:08 us=388009 /sbin/ip route add 10.8.0.0/24 via 10.8.0.2 2025-01-12 17:28:08 us=391254 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ] 2025-01-12 17:28:08 us=391490 Could not determine IPv4/IPv6 protocol. Using AF_INET 2025-01-12 17:28:08 us=391734 Socket Buffers: R=[212992->212992] S=[212992->212992] 2025-01-12 17:28:08 us=391954 UDPv4 link local (bound): [AF_INET][undef]:1194 2025-01-12 17:28:08 us=392281 UDPv4 link remote: [AF_UNSPEC] 2025-01-12 17:28:08 us=392476 MULTI: multi_init called, r=256 v=256 2025-01-12 17:28:08 us=392702 IFCONFIG POOL IPv4: base=10.8.0.4 size=62 2025-01-12 17:28:08 us=393069 IFCONFIG POOL LIST 2025-01-12 17:28:08 us=393294 Initialization Sequence Completed Sun Jan 12 17:28:08 2025 /opt/Dockovpn_data/clients/Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/client.ovpn file has been generated Sun Jan 12 17:28:08 2025 Config server started, download your client.ovpn config at http://139.162.243.103:80/ Sun Jan 12 17:28:08 2025 NOTE: After you download your client config, http server will be shut down! |
Pressed Ctrl+PQ
and downloaded the client config:
sudo docker inspect dockovpn-verb | grep IPAddress wget -O client-verb.ovpn http://172.17.0.3:8080 |
Attached to the docker container:
sudo docker attach 966f926484bc |
Connected from my Windows 10 desktop machine with OpenVPN client and got the following logs at the server side:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 | 2025-01-12 17:31:38 us=927212 MULTI: multi_create_instance called 2025-01-12 17:31:38 us=927402 91.122.37.167:51987 Re-using SSL/TLS context 2025-01-12 17:31:38 us=927712 91.122.37.167:51987 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 17:31:38 us=927737 91.122.37.167:51987 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 17:31:38 us=928041 91.122.37.167:51987 Control Channel MTU parms [ L:1621 D:1140 EF:110 EB:0 ET:0 EL:3 ] 2025-01-12 17:31:38 us=928050 91.122.37.167:51987 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ] 2025-01-12 17:31:38 us=928176 91.122.37.167:51987 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server' 2025-01-12 17:31:38 us=928182 91.122.37.167:51987 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client' 2025-01-12 17:31:38 us=928259 91.122.37.167:51987 TLS: Initial packet from [AF_INET]91.122.37.167:51987, sid=d5ee4c3d 2fbbb52e 2025-01-12 17:31:39 us=46860 91.122.37.167:51987 VERIFY OK: depth=1, CN=Easy-RSA CA 2025-01-12 17:31:39 us=46957 91.122.37.167:51987 VERIFY OK: depth=0, CN=Ght7BgpjlktuxxEfj0msScZUmHYxkcgF 2025-01-12 17:31:39 us=47250 91.122.37.167:51987 peer info: IV_VER=2.6.9 2025-01-12 17:31:39 us=47258 91.122.37.167:51987 peer info: IV_PLAT=win 2025-01-12 17:31:39 us=47264 91.122.37.167:51987 peer info: IV_TCPNL=1 2025-01-12 17:31:39 us=47268 91.122.37.167:51987 peer info: IV_MTU=1600 2025-01-12 17:31:39 us=47272 91.122.37.167:51987 peer info: IV_NCP=2 2025-01-12 17:31:39 us=47276 91.122.37.167:51987 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM 2025-01-12 17:31:39 us=47281 91.122.37.167:51987 peer info: IV_PROTO=990 2025-01-12 17:31:39 us=47285 91.122.37.167:51987 peer info: IV_GUI_VER=OpenVPN_GUI_11.47.0.0 2025-01-12 17:31:39 us=47290 91.122.37.167:51987 peer info: IV_SSO=openurl,webauth,crtext 2025-01-12 17:31:39 us=102825 91.122.37.167:51987 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 2025-01-12 17:31:39 us=102854 91.122.37.167:51987 [Ght7BgpjlktuxxEfj0msScZUmHYxkcgF] Peer Connection Initiated with [AF_INET]91.122.37.167:51987 2025-01-12 17:31:39 us=102910 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled) 2025-01-12 17:31:39 us=102944 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: Learn: 10.8.0.6 -> Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 2025-01-12 17:31:39 us=102953 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: primary virtual IP for Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987: 10.8.0.6 2025-01-12 17:31:39 us=103036 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-01-12 17:31:39 us=103045 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-01-12 17:31:39 us=103099 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 SENT CONTROL [Ght7BgpjlktuxxEfj0msScZUmHYxkcgF]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5,peer-id 0,cipher AES-256-GCM' (status=1) 2025-01-12 17:31:42 us=201212 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=201252 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=207910 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=207935 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=207945 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=207957 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=207973 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=207983 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=207991 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=277249 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=277269 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=277279 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:42 us=462212 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [169.254.98.118], packet dropped 2025-01-12 17:31:43 us=156647 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [], packet dropped 2025-01-12 17:31:48 us=155582 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [], packet dropped 2025-01-12 17:31:55 us=881031 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [], packet dropped 2025-01-12 17:32:12 us=809704 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [], packet dropped 2025-01-12 17:32:45 us=753882 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [], packet dropped 2025-01-12 17:32:49 us=705038 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [], packet dropped 2025-01-12 17:32:57 us=708514 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:51987 MULTI: bad source address from client [], packet dropped |
From my Windows 10 desktop machine VPN worked well enough.
Tried to connect from my Android device over 4G and got the following server logs:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 | 2025-01-12 17:53:07 us=389524 MULTI: multi_create_instance called 2025-01-12 17:53:07 us=389664 176.15.163.46:36161 Re-using SSL/TLS context 2025-01-12 17:53:07 us=389811 176.15.163.46:36161 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 17:53:07 us=389831 176.15.163.46:36161 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 17:53:07 us=390135 176.15.163.46:36161 Control Channel MTU parms [ L:1621 D:1140 EF:110 EB:0 ET:0 EL:3 ] 2025-01-12 17:53:07 us=390144 176.15.163.46:36161 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ] 2025-01-12 17:53:07 us=390231 176.15.163.46:36161 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server' 2025-01-12 17:53:07 us=390240 176.15.163.46:36161 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client' 2025-01-12 17:53:07 us=390340 176.15.163.46:36161 TLS: Initial packet from [AF_INET]176.15.163.46:36161, sid=3a46eefa cbf9021d 2025-01-12 17:53:07 us=617700 176.15.163.46:36161 VERIFY OK: depth=1, CN=Easy-RSA CA 2025-01-12 17:53:07 us=617809 176.15.163.46:36161 VERIFY OK: depth=0, CN=Ght7BgpjlktuxxEfj0msScZUmHYxkcgF 2025-01-12 17:53:07 us=618222 176.15.163.46:36161 peer info: IV_VER=2.7_master 2025-01-12 17:53:07 us=618231 176.15.163.46:36161 peer info: IV_PLAT=android 2025-01-12 17:53:07 us=618237 176.15.163.46:36161 peer info: IV_TCPNL=1 2025-01-12 17:53:07 us=618241 176.15.163.46:36161 peer info: IV_MTU=1600 2025-01-12 17:53:07 us=618245 176.15.163.46:36161 peer info: IV_NCP=2 2025-01-12 17:53:07 us=618250 176.15.163.46:36161 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305 2025-01-12 17:53:07 us=618255 176.15.163.46:36161 peer info: IV_PROTO=2454 2025-01-12 17:53:07 us=622002 176.15.163.46:36161 peer info: IV_LZO_STUB=1 2025-01-12 17:53:07 us=622011 176.15.163.46:36161 peer info: IV_COMP_STUB=1 2025-01-12 17:53:07 us=622015 176.15.163.46:36161 peer info: IV_COMP_STUBv2=1 2025-01-12 17:53:07 us=622020 176.15.163.46:36161 peer info: IV_GUI_VER=de.blinkt.openvpn_0.7.54 2025-01-12 17:53:07 us=622034 176.15.163.46:36161 peer info: IV_SSO=openurl,webauth,crtext 2025-01-12 17:53:07 us=723729 176.15.163.46:36161 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 2025-01-12 17:53:07 us=723769 176.15.163.46:36161 [Ght7BgpjlktuxxEfj0msScZUmHYxkcgF] Peer Connection Initiated with [AF_INET]176.15.163.46:36161 2025-01-12 17:53:07 us=723830 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled) 2025-01-12 17:53:07 us=723866 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: Learn: 10.8.0.6 -> Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 2025-01-12 17:53:07 us=723874 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: primary virtual IP for Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161: 10.8.0.6 2025-01-12 17:53:07 us=723962 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-01-12 17:53:07 us=723970 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-01-12 17:53:07 us=724021 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 SENT CONTROL [Ght7BgpjlktuxxEfj0msScZUmHYxkcgF]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5,peer-id 0,cipher AES-256-GCM' (status=1) 2025-01-12 17:53:08 us=6834 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=31805 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=36737 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=39843 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=39867 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=111913 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=276728 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=346854 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=349537 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=361722 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=568665 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=624806 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=641804 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=641838 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=953849 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=954173 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:08 us=961605 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:09 us=53684 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:09 us=53711 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:09 us=113871 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:09 us=143714 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:09 us=216689 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:09 us=216713 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:10 us=183959 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:10 us=183999 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:10 us=366989 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:10 us=367020 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:10 us=983770 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:10 us=983820 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:10 us=983834 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:11 us=63710 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:11 us=63748 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:12 us=221846 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:12 us=378698 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:12 us=911681 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:12 us=911709 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:15 us=193710 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:15 us=193742 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:15 us=201607 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:15 us=223952 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:15 us=258722 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:16 us=473893 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:16 us=728675 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:17 us=521873 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:17 us=521899 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:19 us=232848 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 PID_ERR replay-window backtrack occurred [2] [SSL-0] [0__0000000000111222233333333444445555666777777777788889999999>>>] 0:115 0:113 t=1736704399[0] r=[-2,64,15,2,1] sl=[13,64,64,528] 2025-01-12 17:53:23 us=383725 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:23 us=413508 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:23 us=448610 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:24 us=658846 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:25 us=193654 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:26 us=721719 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:26 us=721763 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:38 us=63551 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:38 us=63602 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:39 us=558923 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:39 us=578959 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:41 us=48601 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:43 us=353679 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:45 us=422290 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:45 us=422401 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:58 us=993538 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:53:59 us=347018 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 PID_ERR replay-window backtrack occurred [3] [SSL-0] [00__000000000000000011111111111111111222222222233333333333445566] 0:509 0:506 t=1736704439[0] r=[-2,64,15,3,1] sl=[3,64,64,528] 2025-01-12 17:54:14 us=78724 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:54:18 us=174141 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:54:22 us=276883 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:54:22 us=276951 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:54:46 us=928807 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:54:46 us=928865 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:54:46 us=937765 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:54:46 us=937805 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:54:46 us=937817 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:55:13 us=360897 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:55:13 us=360955 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:55:25 us=493910 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:55:25 us=494114 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 MULTI: bad source address from client [13.150.182.28], packet dropped 2025-01-12 17:55:38 us=619238 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 17:55:40 us=235488 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 17:55:40 us=602667 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 17:55:41 us=2218 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 17:55:41 us=760613 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 17:55:43 us=285805 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 17:55:46 us=555565 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) |
tried to connect over WiFi:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 | 2025-01-12 17:59:19 us=196466 MULTI: multi_create_instance called 2025-01-12 17:59:19 us=196569 91.122.37.167:49212 Re-using SSL/TLS context 2025-01-12 17:59:19 us=196670 91.122.37.167:49212 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 17:59:19 us=196690 91.122.37.167:49212 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 17:59:19 us=196869 91.122.37.167:49212 Control Channel MTU parms [ L:1621 D:1140 EF:110 EB:0 ET:0 EL:3 ] 2025-01-12 17:59:19 us=196908 91.122.37.167:49212 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ] 2025-01-12 17:59:19 us=197016 91.122.37.167:49212 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server' 2025-01-12 17:59:19 us=197035 91.122.37.167:49212 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1549,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client' 2025-01-12 17:59:19 us=197079 91.122.37.167:49212 TLS: Initial packet from [AF_INET]91.122.37.167:49212, sid=0d5b53f3 abdb5cd6 2025-01-12 17:59:19 us=462697 91.122.37.167:49212 VERIFY OK: depth=1, CN=Easy-RSA CA 2025-01-12 17:59:19 us=462830 91.122.37.167:49212 VERIFY OK: depth=0, CN=Ght7BgpjlktuxxEfj0msScZUmHYxkcgF 2025-01-12 17:59:19 us=468159 91.122.37.167:49212 peer info: IV_VER=2.7_master 2025-01-12 17:59:19 us=468197 91.122.37.167:49212 peer info: IV_PLAT=android 2025-01-12 17:59:19 us=468721 91.122.37.167:49212 peer info: IV_TCPNL=1 2025-01-12 17:59:19 us=468828 91.122.37.167:49212 peer info: IV_MTU=1600 2025-01-12 17:59:19 us=468853 91.122.37.167:49212 peer info: IV_NCP=2 2025-01-12 17:59:19 us=468869 91.122.37.167:49212 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305 2025-01-12 17:59:19 us=468884 91.122.37.167:49212 peer info: IV_PROTO=2454 2025-01-12 17:59:19 us=468898 91.122.37.167:49212 peer info: IV_LZO_STUB=1 2025-01-12 17:59:19 us=468912 91.122.37.167:49212 peer info: IV_COMP_STUB=1 2025-01-12 17:59:19 us=468927 91.122.37.167:49212 peer info: IV_COMP_STUBv2=1 2025-01-12 17:59:19 us=468942 91.122.37.167:49212 peer info: IV_GUI_VER=de.blinkt.openvpn_0.7.54 2025-01-12 17:59:19 us=468956 91.122.37.167:49212 peer info: IV_SSO=openurl,webauth,crtext 2025-01-12 17:59:19 us=534932 91.122.37.167:49212 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 2025-01-12 17:59:19 us=534998 91.122.37.167:49212 [Ght7BgpjlktuxxEfj0msScZUmHYxkcgF] Peer Connection Initiated with [AF_INET]91.122.37.167:49212 2025-01-12 17:59:19 us=535056 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI_sva: pool returned IPv4=10.8.0.10, IPv6=(Not enabled) 2025-01-12 17:59:19 us=535104 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: Learn: 10.8.0.10 -> Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 2025-01-12 17:59:19 us=535126 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: primary virtual IP for Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212: 10.8.0.10 2025-01-12 17:59:19 us=535241 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-01-12 17:59:19 us=535267 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-01-12 17:59:19 us=535313 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 SENT CONTROL [Ght7BgpjlktuxxEfj0msScZUmHYxkcgF]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9,peer-id 1,cipher AES-256-GCM' (status=1) 2025-01-12 17:59:19 us=832447 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:19 us=832570 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:19 us=844943 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:19 us=845021 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:19 us=845058 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:19 us=845090 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:19 us=857510 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:19 us=857624 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=73315 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=133746 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=133836 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=318783 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=422027 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=422127 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=818764 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=836748 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=836837 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=859758 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=968302 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:20 us=968379 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:21 us=820216 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:22 us=62481 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:22 us=62532 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:22 us=991414 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:22 us=991491 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:23 us=9325 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:23 us=791207 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:24 us=325795 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:24 us=325853 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:26 us=894773 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:27 us=83870 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:27 us=922821 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:28 us=693391 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:28 us=693441 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:35 us=266396 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:35 us=266510 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:35 us=511878 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 [Ght7BgpjlktuxxEfj0msScZUmHYxkcgF] Inactivity timeout (--ping-restart), restarting 2025-01-12 17:59:35 us=511939 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/176.15.163.46:36161 SIGUSR1[soft,ping-restart] received, client-instance restarting 2025-01-12 17:59:35 us=903590 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:37 us=423547 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:37 us=423574 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:43 us=789596 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 PID_ERR replay-window backtrack occurred [3] [SSL-0] [00__00002333333333344667888999>>>>>>>>>>>>>>>>>>EEEEEEEEEEEEEEEE] 0:111 0:108 t=1736704783[0] r=[-4,64,15,3,1] sl=[17,64,64,528] 2025-01-12 17:59:49 us=852368 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:49 us=871631 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:49 us=871703 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:51 us=724928 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:56 us=98564 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 17:59:56 us=98595 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 18:00:24 us=788197 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 18:00:30 us=890788 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 18:00:30 us=890863 Ght7BgpjlktuxxEfj0msScZUmHYxkcgF/91.122.37.167:49212 MULTI: bad source address from client [192.168.0.181], packet dropped 2025-01-12 18:02:19 us=828419 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:20 us=26740 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:20 us=529991 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:20 us=637948 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:21 us=352326 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:21 us=656870 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:21 us=970285 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:22 us=372817 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:23 us=95945 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:24 us=418293 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:25 us=611 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:27 us=297628 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:29 us=854003 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:32 us=856968 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) 2025-01-12 18:02:39 us=672865 read UDPv4 [ECONNREFUSED]: Connection refused (code=111) |
The messages like us=828419 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
appeared when I disconnected.
With the both 4G and WiFi VPN connected, but no data was transferred and the browser did not open web pages.
Also I set verb
to 4
in client-verb.ovpn
and got the following Android client log:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 | 2025-01-12 21:39:30 official build 0.7.54 running on samsung SM-A546E (s5e8835), Android 14 (UP1A.231005.007) API 34, ABI arm64-v8a, (samsung/a54xnsxx/a54x:14/UP1A.231005.007/A546EXXSACXI3:user/release-keys) 2025-01-12 21:39:30 Building configuration… 2025-01-12 21:39:30 Fetched VPN profile (client-verb4) triggered by main profile list 2025-01-12 21:39:30 Scheduling VPN keep alive for VPN client-verb4 2025-01-12 21:39:30 started Socket Thread 2025-01-12 21:39:30 Network Status: CONNECTED to WIFI 2025-01-12 21:39:30 Debug state info: CONNECTED to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 2025-01-12 21:39:30 Debug state info: CONNECTED to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 2025-01-12 21:39:30 P:WARNING: linker: Warning: "/data/app/~~jYbQKF1GxoCjTxZkZ4Nb3g==/de.blinkt.openvpn-STns5KXY6Jlh4_UpD4FFwA==/lib/arm64/libovpnexec.so" is not a directory (ignoring) 2025-01-12 21:39:30 Current Parameter Settings: 2025-01-12 21:39:30 config = 'stdin' 2025-01-12 21:39:30 mode = 0 2025-01-12 21:39:30 show_ciphers = DISABLED 2025-01-12 21:39:30 show_digests = DISABLED 2025-01-12 21:39:30 show_engines = DISABLED 2025-01-12 21:39:30 genkey = DISABLED 2025-01-12 21:39:30 genkey_filename = '[UNDEF]' 2025-01-12 21:39:30 key_pass_file = '[UNDEF]' 2025-01-12 21:39:30 show_tls_ciphers = DISABLED 2025-01-12 21:39:30 connect_retry_max = 0 2025-01-12 21:39:30 Connection profiles [0]: 2025-01-12 21:39:30 proto = udp 2025-01-12 21:39:30 local = '[UNDEF]' 2025-01-12 21:39:30 local_port = '[UNDEF]' 2025-01-12 21:39:30 remote = '139.162.243.103' 2025-01-12 21:39:30 remote_port = '1194' 2025-01-12 21:39:30 remote_float = DISABLED 2025-01-12 21:39:30 bind_defined = DISABLED 2025-01-12 21:39:30 bind_local = DISABLED 2025-01-12 21:39:30 bind_ipv6_only = DISABLED 2025-01-12 21:39:30 connect_retry_seconds = 2 2025-01-12 21:39:30 connect_timeout = 120 2025-01-12 21:39:30 socks_proxy_server = '[UNDEF]' 2025-01-12 21:39:30 socks_proxy_port = '[UNDEF]' 2025-01-12 21:39:30 tun_mtu = 1500 2025-01-12 21:39:30 tun_mtu_defined = ENABLED 2025-01-12 21:39:30 link_mtu = 1500 2025-01-12 21:39:30 link_mtu_defined = DISABLED 2025-01-12 21:39:30 tun_mtu_extra = 0 2025-01-12 21:39:30 tun_mtu_extra_defined = DISABLED 2025-01-12 21:39:30 tls_mtu = 1250 2025-01-12 21:39:30 mtu_discover_type = -1 2025-01-12 21:39:30 fragment = 0 2025-01-12 21:39:30 mssfix = 1492 2025-01-12 21:39:30 mssfix_encap = ENABLED 2025-01-12 21:39:30 mssfix_fixed = DISABLED 2025-01-12 21:39:30 explicit_exit_notification = 0 2025-01-12 21:39:30 tls_auth_file = '[INLINE]' 2025-01-12 21:39:30 key_direction = 1 2025-01-12 21:39:30 tls_crypt_file = '[UNDEF]' 2025-01-12 21:39:30 tls_crypt_v2_file = '[UNDEF]' 2025-01-12 21:39:30 Connection profiles END 2025-01-12 21:39:30 Waiting 0s seconds between connection attempt 2025-01-12 21:39:30 remote_random = DISABLED 2025-01-12 21:39:30 ipchange = '[UNDEF]' 2025-01-12 21:39:30 dev = 'tun' 2025-01-12 21:39:30 dev_type = '[UNDEF]' 2025-01-12 21:39:30 dev_node = '[UNDEF]' 2025-01-12 21:39:30 lladdr = '[UNDEF]' 2025-01-12 21:39:30 topology = 1 2025-01-12 21:39:30 ifconfig_local = '[UNDEF]' 2025-01-12 21:39:30 ifconfig_remote_netmask = '[UNDEF]' 2025-01-12 21:39:30 ifconfig_noexec = DISABLED 2025-01-12 21:39:30 ifconfig_nowarn = ENABLED 2025-01-12 21:39:30 ifconfig_ipv6_local = '[UNDEF]' 2025-01-12 21:39:30 ifconfig_ipv6_netbits = 0 2025-01-12 21:39:30 ifconfig_ipv6_remote = '[UNDEF]' 2025-01-12 21:39:30 shaper = 0 2025-01-12 21:39:30 mtu_test = 0 2025-01-12 21:39:30 mlock = DISABLED 2025-01-12 21:39:30 keepalive_ping = 0 2025-01-12 21:39:30 keepalive_timeout = 0 2025-01-12 21:39:30 inactivity_timeout = 0 2025-01-12 21:39:30 session_timeout = 0 2025-01-12 21:39:30 inactivity_minimum_bytes = 0 2025-01-12 21:39:30 ping_send_timeout = 0 2025-01-12 21:39:30 ping_rec_timeout = 0 2025-01-12 21:39:30 ping_rec_timeout_action = 0 2025-01-12 21:39:30 ping_timer_remote = DISABLED 2025-01-12 21:39:30 remap_sigusr1 = 0 2025-01-12 21:39:30 persist_tun = ENABLED 2025-01-12 21:39:30 persist_local_ip = DISABLED 2025-01-12 21:39:30 persist_remote_ip = DISABLED 2025-01-12 21:39:30 passtos = DISABLED 2025-01-12 21:39:30 resolve_retry_seconds = 1000000000 2025-01-12 21:39:30 resolve_in_advance = ENABLED 2025-01-12 21:39:30 username = '[UNDEF]' 2025-01-12 21:39:30 groupname = '[UNDEF]' 2025-01-12 21:39:30 chroot_dir = '[UNDEF]' 2025-01-12 21:39:30 cd_dir = '[UNDEF]' 2025-01-12 21:39:30 writepid = '[UNDEF]' 2025-01-12 21:39:30 up_script = '[UNDEF]' 2025-01-12 21:39:30 down_script = '[UNDEF]' 2025-01-12 21:39:30 down_pre = DISABLED 2025-01-12 21:39:30 up_restart = DISABLED 2025-01-12 21:39:30 up_delay = DISABLED 2025-01-12 21:39:30 daemon = DISABLED 2025-01-12 21:39:30 log = DISABLED 2025-01-12 21:39:30 suppress_timestamps = DISABLED 2025-01-12 21:39:30 machine_readable_output = ENABLED 2025-01-12 21:39:30 nice = 0 2025-01-12 21:39:30 verbosity = 4 2025-01-12 21:39:30 mute = 0 2025-01-12 21:39:30 gremlin = 0 2025-01-12 21:39:30 status_file = '[UNDEF]' 2025-01-12 21:39:30 status_file_version = 1 2025-01-12 21:39:30 status_file_update_freq = 60 2025-01-12 21:39:30 occ = ENABLED 2025-01-12 21:39:30 rcvbuf = 0 2025-01-12 21:39:30 sndbuf = 0 2025-01-12 21:39:30 sockflags = 0 2025-01-12 21:39:30 fast_io = DISABLED 2025-01-12 21:39:30 comp.alg = 0 2025-01-12 21:39:30 comp.flags = 24 2025-01-12 21:39:30 route_script = '[UNDEF]' 2025-01-12 21:39:30 route_default_gateway = '[UNDEF]' 2025-01-12 21:39:30 route_default_metric = 0 2025-01-12 21:39:30 route_noexec = DISABLED 2025-01-12 21:39:30 route_delay = 0 2025-01-12 21:39:30 route_delay_window = 30 2025-01-12 21:39:30 route_delay_defined = DISABLED 2025-01-12 21:39:30 route_nopull = DISABLED 2025-01-12 21:39:30 route_gateway_via_dhcp = DISABLED 2025-01-12 21:39:30 allow_pull_fqdn = DISABLED 2025-01-12 21:39:30 management_addr = '/data/user/0/de.blinkt.openvpn/cache/mgmtsocket' 2025-01-12 21:39:30 management_port = 'unix' 2025-01-12 21:39:30 management_user_pass = '[UNDEF]' 2025-01-12 21:39:30 management_log_history_cache = 250 2025-01-12 21:39:30 management_echo_buffer_size = 100 2025-01-12 21:39:30 management_client_user = '[UNDEF]' 2025-01-12 21:39:30 management_client_group = '[UNDEF]' 2025-01-12 21:39:30 management_flags = 16678 2025-01-12 21:39:30 shared_secret_file = '[UNDEF]' 2025-01-12 21:39:30 key_direction = 1 2025-01-12 21:39:30 ciphername = 'AES-256-GCM' 2025-01-12 21:39:30 ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305' 2025-01-12 21:39:30 authname = 'SHA512' 2025-01-12 21:39:30 engine = DISABLED 2025-01-12 21:39:30 mute_replay_warnings = DISABLED 2025-01-12 21:39:30 replay_window = 64 2025-01-12 21:39:30 replay_time = 15 2025-01-12 21:39:30 packet_id_file = '[UNDEF]' 2025-01-12 21:39:30 test_crypto = DISABLED 2025-01-12 21:39:30 tls_server = DISABLED 2025-01-12 21:39:30 tls_client = ENABLED 2025-01-12 21:39:30 ca_file = '[INLINE]' 2025-01-12 21:39:30 ca_path = '[UNDEF]' 2025-01-12 21:39:30 dh_file = '[UNDEF]' 2025-01-12 21:39:30 cert_file = '[INLINE]' 2025-01-12 21:39:30 extra_certs_file = '[UNDEF]' 2025-01-12 21:39:30 priv_key_file = '[INLINE]' 2025-01-12 21:39:30 pkcs12_file = '[UNDEF]' 2025-01-12 21:39:30 cipher_list = '[UNDEF]' 2025-01-12 21:39:30 cipher_list_tls13 = '[UNDEF]' 2025-01-12 21:39:30 tls_cert_profile = '[UNDEF]' 2025-01-12 21:39:30 tls_verify = '[UNDEF]' 2025-01-12 21:39:30 tls_export_peer_cert_dir = '[UNDEF]' 2025-01-12 21:39:30 verify_x509_type = 0 2025-01-12 21:39:30 verify_x509_name = '[UNDEF]' 2025-01-12 21:39:30 crl_file = '[UNDEF]' 2025-01-12 21:39:30 ns_cert_type = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 65535 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_ku[i] = 0 2025-01-12 21:39:30 remote_cert_eku = 'TLS Web Server Authentication' 2025-01-12 21:39:30 ssl_flags = 192 2025-01-12 21:39:30 tls_timeout = 2 2025-01-12 21:39:30 renegotiate_bytes = -1 2025-01-12 21:39:30 renegotiate_packets = 0 2025-01-12 21:39:30 renegotiate_seconds = 3600 2025-01-12 21:39:30 handshake_window = 60 2025-01-12 21:39:30 transition_window = 3600 2025-01-12 21:39:30 single_session = DISABLED 2025-01-12 21:39:30 push_peer_info = DISABLED 2025-01-12 21:39:30 tls_exit = DISABLED 2025-01-12 21:39:30 tls_crypt_v2_metadata = '[UNDEF]' 2025-01-12 21:39:30 server_network = 0.0.0.0 2025-01-12 21:39:30 server_netmask = 0.0.0.0 2025-01-12 21:39:30 server_network_ipv6 = :: 2025-01-12 21:39:30 server_netbits_ipv6 = 0 2025-01-12 21:39:30 server_bridge_ip = 0.0.0.0 2025-01-12 21:39:30 server_bridge_netmask = 0.0.0.0 2025-01-12 21:39:30 server_bridge_pool_start = 0.0.0.0 2025-01-12 21:39:30 server_bridge_pool_end = 0.0.0.0 2025-01-12 21:39:30 ifconfig_pool_defined = DISABLED 2025-01-12 21:39:30 ifconfig_pool_start = 0.0.0.0 2025-01-12 21:39:30 ifconfig_pool_end = 0.0.0.0 2025-01-12 21:39:30 ifconfig_pool_netmask = 0.0.0.0 2025-01-12 21:39:30 ifconfig_pool_persist_filename = '[UNDEF]' 2025-01-12 21:39:30 ifconfig_pool_persist_refresh_freq = 600 2025-01-12 21:39:30 ifconfig_ipv6_pool_defined = DISABLED 2025-01-12 21:39:30 ifconfig_ipv6_pool_base = :: 2025-01-12 21:39:30 ifconfig_ipv6_pool_netbits = 0 2025-01-12 21:39:30 n_bcast_buf = 256 2025-01-12 21:39:30 tcp_queue_limit = 64 2025-01-12 21:39:30 real_hash_size = 256 2025-01-12 21:39:30 virtual_hash_size = 256 2025-01-12 21:39:30 client_connect_script = '[UNDEF]' 2025-01-12 21:39:30 learn_address_script = '[UNDEF]' 2025-01-12 21:39:30 client_disconnect_script = '[UNDEF]' 2025-01-12 21:39:30 client_crresponse_script = '[UNDEF]' 2025-01-12 21:39:30 client_config_dir = '[UNDEF]' 2025-01-12 21:39:30 ccd_exclusive = DISABLED 2025-01-12 21:39:30 tmp_dir = '/data/data/de.blinkt.openvpn/cache' 2025-01-12 21:39:30 push_ifconfig_defined = DISABLED 2025-01-12 21:39:30 push_ifconfig_local = 0.0.0.0 2025-01-12 21:39:30 push_ifconfig_remote_netmask = 0.0.0.0 2025-01-12 21:39:30 push_ifconfig_ipv6_defined = DISABLED 2025-01-12 21:39:30 push_ifconfig_ipv6_local = ::/0 2025-01-12 21:39:30 push_ifconfig_ipv6_remote = :: 2025-01-12 21:39:30 enable_c2c = DISABLED 2025-01-12 21:39:30 duplicate_cn = DISABLED 2025-01-12 21:39:30 cf_max = 0 2025-01-12 21:39:30 cf_per = 0 2025-01-12 21:39:30 cf_initial_max = 100 2025-01-12 21:39:30 cf_initial_per = 10 2025-01-12 21:39:30 max_clients = 1024 2025-01-12 21:39:30 max_routes_per_client = 256 2025-01-12 21:39:30 auth_user_pass_verify_script = '[UNDEF]' 2025-01-12 21:39:30 auth_user_pass_verify_script_via_file = DISABLED 2025-01-12 21:39:30 auth_token_generate = DISABLED 2025-01-12 21:39:30 force_key_material_export = DISABLED 2025-01-12 21:39:30 auth_token_lifetime = 0 2025-01-12 21:39:30 auth_token_secret_file = '[UNDEF]' 2025-01-12 21:39:30 port_share_host = '[UNDEF]' 2025-01-12 21:39:30 port_share_port = '[UNDEF]' 2025-01-12 21:39:30 vlan_tagging = DISABLED 2025-01-12 21:39:30 vlan_accept = all 2025-01-12 21:39:30 vlan_pvid = 1 2025-01-12 21:39:30 client = ENABLED 2025-01-12 21:39:30 pull = ENABLED 2025-01-12 21:39:30 auth_user_pass_file = '[UNDEF]' 2025-01-12 21:39:30 OpenVPN 2.7-icsopenvpn [git:icsopenvpn/v0.7.54-0-gee0100b4] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 4 2024 2025-01-12 21:39:30 library versions: OpenSSL 3.4.0 22 Oct 2024, LZO 2.10 2025-01-12 21:39:30 MANAGEMENT: Connected to management server at /data/user/0/de.blinkt.openvpn/cache/mgmtsocket 2025-01-12 21:39:30 MANAGEMENT: CMD 'version 3' 2025-01-12 21:39:30 MANAGEMENT: CMD 'hold release' 2025-01-12 21:39:30 MANAGEMENT: CMD 'bytecount 2' 2025-01-12 21:39:30 MANAGEMENT: CMD 'state on' 2025-01-12 21:39:30 MANAGEMENT: CMD 'proxy NONE' 2025-01-12 21:39:31 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 21:39:31 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication 2025-01-12 21:39:31 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2025-01-12 21:39:31 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2025-01-12 21:39:31 TCP/UDP: Preserving recently used remote address: [AF_INET]139.162.243.103:1194 2025-01-12 21:39:31 Socket Buffers: R=[327680->327680] S=[2805760->2805760] 2025-01-12 21:39:31 MANAGEMENT: CMD 'needok 'PROTECTFD' ok' 2025-01-12 21:39:31 UDPv4 link local: (not bound) 2025-01-12 21:39:31 UDPv4 link remote: [AF_INET]139.162.243.103:1194 2025-01-12 21:39:31 MANAGEMENT: >STATE:1736707171,WAIT,,,,,, 2025-01-12 21:39:31 MANAGEMENT: >STATE:1736707171,AUTH,,,,,, 2025-01-12 21:39:31 TLS: Initial packet from [AF_INET]139.162.243.103:1194, sid=57cb6a2f cb2a16ba 2025-01-12 21:39:32 VERIFY OK: depth=1, CN=Easy-RSA CA 2025-01-12 21:39:32 VERIFY KU OK 2025-01-12 21:39:32 Validating certificate extended key usage 2025-01-12 21:39:32 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 2025-01-12 21:39:32 VERIFY EKU OK 2025-01-12 21:39:32 VERIFY OK: depth=0, CN=MyReq 2025-01-12 21:39:32 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519, peer signing digest/type: SHA256 RSASSA-PSS 2025-01-12 21:39:32 [MyReq] Peer Connection Initiated with [AF_INET]139.162.243.103:1194 2025-01-12 21:39:32 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 2025-01-12 21:39:32 TLS: tls_multi_process: initial untrusted session promoted to trusted 2025-01-12 21:39:32 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9,peer-id 1,cipher AES-256-GCM' 2025-01-12 21:39:32 OPTIONS IMPORT: --ifconfig/up options modified 2025-01-12 21:39:32 OPTIONS IMPORT: route options modified 2025-01-12 21:39:32 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 2025-01-12 21:39:32 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw 2025-01-12 21:39:32 do_ifconfig, ipv4=1, ipv6=0 2025-01-12 21:39:32 MANAGEMENT: >STATE:1736707172,ASSIGN_IP,,10.8.0.10,,,, 2025-01-12 21:39:32 MANAGEMENT: CMD 'needok 'IFCONFIG' ok' 2025-01-12 21:39:32 MANAGEMENT: CMD 'needok 'ROUTE' ok' 2025-01-12 21:39:32 MANAGEMENT: >STATE:1736707172,ADD_ROUTES,,,,,, 2025-01-12 21:39:32 MANAGEMENT: CMD 'needok 'ROUTE' ok' 2025-01-12 21:39:32 MANAGEMENT: CMD 'needok 'DNSSERVER' ok' 2025-01-12 21:39:32 MANAGEMENT: CMD 'needok 'DNSSERVER' ok' 2025-01-12 21:39:32 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE' 2025-01-12 21:39:32 Opening tun interface: 2025-01-12 21:39:32 Local IPv4: 10.8.0.10/30 IPv6: (not set) MTU: 1500 2025-01-12 21:39:32 DNS Server: 208.67.222.222, 208.67.220.220, Domain: null 2025-01-12 21:39:32 Routes: 0.0.0.0/0, 10.8.0.1/32, 10.8.0.8/30 2025-01-12 21:39:32 Routes excluded: 192.168.0.181/24 fe80:0:0:0:34a3:4fff:fe11:f095/64 2025-01-12 21:39:32 Disallowed VPN apps: 2025-01-12 21:39:32 MANAGEMENT: CMD 'needok 'OPENTUN' ok' 2025-01-12 21:39:32 tun/tap device [vpnservice-tun] opened 2025-01-12 21:39:32 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2025-01-12 21:39:32 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-01-12 21:39:32 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2025-01-12 21:39:32 Initialization Sequence Completed 2025-01-12 21:39:32 MANAGEMENT: >STATE:1736707172,CONNECTED,SUCCESS,10.8.0.10,139.162.243.103,1194,, 2025-01-12 21:39:32 Data Channel: cipher 'AES-256-GCM', peer-id: 1 2025-01-12 21:39:32 Timers: ping 10, ping-restart 120 2025-01-12 21:39:32 Debug state info: CONNECTED to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED |
I am not sure if I selected a right Security Profile in the client app:

Persisting the configuration
sudo docker-compose up -d sudo docker inspect dockovpn_dockovpn_1 | grep IPAddress wget -O client4.ovpn http: //172 .18.0.2:8080 |
Generating new client
docker exec dockovpn . /genclient .sh wget -O client5.ovpn http: //172 .18.0.2:8080 |
https://unix.stackexchange.com/questions/40560/how-to-know-if-a-network-interface-is-tap-tun-bridge-or-physical
The answer is to run ethtool -i tunOrTapDeviceName.
$ ethtool -i tapfffb93e9-6a
driver: tun
version: 1.6
firmware-version:
bus-info: tap
supports-statistics: no
supports-test: no
supports-eeprom-access: no
supports-register-dump: no
supports-priv-flags: no
Ubuntu Linux Display List of Ethernet Adapter
https://www.cyberciti.biz/faq/show-ethernet-adapter-ubuntu-linux/
lspci command – List all PCI device including Ethernet cards (NICs) on Linux.
ip command – Display or manipulate routing, devices, policy routing and tunnels on Linux operating systems.
ifconfig command – Display or configure a network interface on Linux or Unix like operating systems.
lshw command – See hardware including list of Ethernet device on Linux.
Where does my traffic go when I use a VPN? Tcpdump shows no outgoing traffic when VPN enabled
https://stackoverflow.com/questions/58918733/where-does-my-traffic-go-when-i-use-a-vpn-tcpdump-shows-no-outgoing-traffic-whe
When you initially capture packets, you are seeing traffic on your default interface (whichever that is). When you enable your VPN, part of the setup process is to make the VPN virtual interface the default interface. Depending on your system, this will mean giving the VPN interface a higher routing metric or higher routing priority in the list.
openvpn server not showing traffic using tcpdump
https://serverfault.com/questions/1052645/openvpn-server-not-showing-traffic-using-tcpdump
and I try to capture traffic using tcpdump -i tun0 icmp –immediate-mode -l -n
How does “restart: always” policy work in docker-compose?
https://serverfault.com/questions/884759/how-does-restart-always-policy-work-in-docker-compose