sargarass@sargarass-pc: ~ ยป sudo openvpn --config /etc/openvpn/garda.conf [14:22:44]
Fri Jul 19 14:22:45 2019 WARNING: file '/etc/openvpn/garda.pass' is group or others accessible
Fri Jul 19 14:22:45 2019 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH/PKTINFO] [AEAD] built on Jul 19 2019
Fri Jul 19 14:22:45 2019 library versions: OpenSSL 1.0.2r 26 Feb 2019, LZO 2.10
Fri Jul 19 14:22:45 2019 Outgoing Control Channel Authentication: Using 128 bit message hash 'MD5' for HMAC authentication
Fri Jul 19 14:22:45 2019 Incoming Control Channel Authentication: Using 128 bit message hash 'MD5' for HMAC authentication
Fri Jul 19 14:22:45 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]192.162.88.135:443
Fri Jul 19 14:22:45 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
Fri Jul 19 14:22:45 2019 Attempting to establish TCP connection with [AF_INET]192.162.88.135:443 [nonblock]
Fri Jul 19 14:22:46 2019 TCP connection established with [AF_INET]192.162.88.135:443
Fri Jul 19 14:22:46 2019 TCP_CLIENT link local: (not bound)
Fri Jul 19 14:22:46 2019 TCP_CLIENT link remote: [AF_INET]192.162.88.135:443
Fri Jul 19 14:22:46 2019 TLS: Initial packet from [AF_INET]192.162.88.135:443, sid=a54a1d7c 6d8b39bc
Fri Jul 19 14:22:46 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri Jul 19 14:22:46 2019 VERIFY OK: depth=1, CN=vpn-ext.gardatech.ru
Fri Jul 19 14:22:46 2019 VERIFY KU OK
Fri Jul 19 14:22:46 2019 Validating certificate extended key usage
Fri Jul 19 14:22:46 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Jul 19 14:22:46 2019 VERIFY EKU OK
Fri Jul 19 14:22:46 2019 VERIFY OK: depth=0, CN=server
Fri Jul 19 14:22:46 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Jul 19 14:22:46 2019 [server] Peer Connection Initiated with [AF_INET]192.162.88.135:443
Fri Jul 19 14:22:47 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jul 19 14:22:47 2019 PUSH: Received control message: 'PUSH_REPLY,route 192.168.232.0 255.255.252.0,route 192.168.233.0 255.255.252.0,route 192.168.236.0 255.255.252.0,dhcp-option DOMAIN garda.local,dhcp-option DNS 192.168.232.8,route 172.20.20.1,topology net30,ping 10,ping-restart 120,ifconfig 172.20.20.6 172.20.20.5,peer-id 0,cipher AES-256-GCM'
Fri Jul 19 14:22:47 2019 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jul 19 14:22:47 2019 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jul 19 14:22:47 2019 OPTIONS IMPORT: route options modified
Fri Jul 19 14:22:47 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Jul 19 14:22:47 2019 OPTIONS IMPORT: peer-id set
Fri Jul 19 14:22:47 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
Fri Jul 19 14:22:47 2019 OPTIONS IMPORT: data channel crypto options modified
Fri Jul 19 14:22:47 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Jul 19 14:22:47 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:22:47 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:22:47 2019 ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=eno1 HWADDR=70:85:c2:73:0b:79
Fri Jul 19 14:22:47 2019 TUN/TAP device tun0 opened
Fri Jul 19 14:22:47 2019 TUN/TAP TX queue length set to 100
Fri Jul 19 14:22:47 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Fri Jul 19 14:22:47 2019 /bin/ifconfig tun0 172.20.20.6 pointopoint 172.20.20.5 mtu 1500
Fri Jul 19 14:22:50 2019 /bin/route add -net 192.168.232.0 netmask 255.255.252.0 gw 172.20.20.5
Fri Jul 19 14:22:50 2019 /bin/route add -net 192.168.233.0 netmask 255.255.252.0 gw 172.20.20.5
route: netmask doesn't match route address
Usage: inet_route [-vF] del {-host|-net} Target[/prefix] [gw Gw] [metric M] [[dev] If]
inet_route [-vF] add {-host|-net} Target[/prefix] [gw Gw] [metric M]
[netmask N] [mss Mss] [window W] [irtt I]
[mod] [dyn] [reinstate] [[dev] If]
inet_route [-vF] add {-host|-net} Target[/prefix] [metric M] reject
inet_route [-FC] flush NOT supported
Fri Jul 19 14:22:50 2019 ERROR: Linux route add command failed: external program exited with error status: 3
Fri Jul 19 14:22:50 2019 /bin/route add -net 192.168.236.0 netmask 255.255.252.0 gw 172.20.20.5
Fri Jul 19 14:22:50 2019 /bin/route add -net 172.20.20.1 netmask 255.255.255.255 gw 172.20.20.5
Fri Jul 19 14:22:50 2019 Initialization Sequence Completed
Fri Jul 19 14:22:53 2019 Connection reset, restarting [0]
Fri Jul 19 14:22:53 2019 SIGUSR1[soft,connection-reset] received, process restarting
Fri Jul 19 14:22:53 2019 Restart pause, 5 second(s)
Fri Jul 19 14:22:58 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]192.162.88.135:443
Fri Jul 19 14:22:58 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
Fri Jul 19 14:22:58 2019 Attempting to establish TCP connection with [AF_INET]192.162.88.135:443 [nonblock]
Fri Jul 19 14:22:59 2019 TCP connection established with [AF_INET]192.162.88.135:443
Fri Jul 19 14:22:59 2019 TCP_CLIENT link local: (not bound)
Fri Jul 19 14:22:59 2019 TCP_CLIENT link remote: [AF_INET]192.162.88.135:443
Fri Jul 19 14:22:59 2019 TLS: Initial packet from [AF_INET]192.162.88.135:443, sid=c7d1c7c1 28c16a73
Fri Jul 19 14:22:59 2019 VERIFY OK: depth=1, CN=vpn-ext.gardatech.ru
Fri Jul 19 14:22:59 2019 VERIFY KU OK
Fri Jul 19 14:22:59 2019 Validating certificate extended key usage
Fri Jul 19 14:22:59 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Jul 19 14:22:59 2019 VERIFY EKU OK
Fri Jul 19 14:22:59 2019 VERIFY OK: depth=0, CN=server
Fri Jul 19 14:22:59 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Jul 19 14:22:59 2019 [server] Peer Connection Initiated with [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:00 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jul 19 14:23:00 2019 PUSH: Received control message: 'PUSH_REPLY,route 192.168.232.0 255.255.252.0,route 192.168.233.0 255.255.252.0,route 192.168.236.0 255.255.252.0,dhcp-option DOMAIN garda.local,dhcp-option DNS 192.168.232.8,route 172.20.20.1,topology net30,ping 10,ping-restart 120,ifconfig 172.20.20.6 172.20.20.5,peer-id 0,cipher AES-256-GCM'
Fri Jul 19 14:23:00 2019 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jul 19 14:23:00 2019 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jul 19 14:23:00 2019 OPTIONS IMPORT: route options modified
Fri Jul 19 14:23:00 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Jul 19 14:23:00 2019 OPTIONS IMPORT: peer-id set
Fri Jul 19 14:23:00 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
Fri Jul 19 14:23:00 2019 OPTIONS IMPORT: data channel crypto options modified
Fri Jul 19 14:23:00 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Jul 19 14:23:00 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:23:00 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:23:00 2019 Preserving previous TUN/TAP instance: tun0
Fri Jul 19 14:23:00 2019 Initialization Sequence Completed
Fri Jul 19 14:23:06 2019 Connection reset, restarting [0]
Fri Jul 19 14:23:06 2019 SIGUSR1[soft,connection-reset] received, process restarting
Fri Jul 19 14:23:06 2019 Restart pause, 5 second(s)
Fri Jul 19 14:23:11 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:11 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
Fri Jul 19 14:23:11 2019 Attempting to establish TCP connection with [AF_INET]192.162.88.135:443 [nonblock]
Fri Jul 19 14:23:12 2019 TCP connection established with [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:12 2019 TCP_CLIENT link local: (not bound)
Fri Jul 19 14:23:12 2019 TCP_CLIENT link remote: [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:12 2019 TLS: Initial packet from [AF_INET]192.162.88.135:443, sid=cec1bad1 9bb0e235
Fri Jul 19 14:23:12 2019 VERIFY OK: depth=1, CN=vpn-ext.gardatech.ru
Fri Jul 19 14:23:12 2019 VERIFY KU OK
Fri Jul 19 14:23:12 2019 Validating certificate extended key usage
Fri Jul 19 14:23:12 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Jul 19 14:23:12 2019 VERIFY EKU OK
Fri Jul 19 14:23:12 2019 VERIFY OK: depth=0, CN=server
Fri Jul 19 14:23:12 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Jul 19 14:23:12 2019 [server] Peer Connection Initiated with [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:13 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jul 19 14:23:13 2019 PUSH: Received control message: 'PUSH_REPLY,route 192.168.232.0 255.255.252.0,route 192.168.233.0 255.255.252.0,route 192.168.236.0 255.255.252.0,dhcp-option DOMAIN garda.local,dhcp-option DNS 192.168.232.8,route 172.20.20.1,topology net30,ping 10,ping-restart 120,ifconfig 172.20.20.6 172.20.20.5,peer-id 0,cipher AES-256-GCM'
Fri Jul 19 14:23:13 2019 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jul 19 14:23:13 2019 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jul 19 14:23:13 2019 OPTIONS IMPORT: route options modified
Fri Jul 19 14:23:13 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Jul 19 14:23:13 2019 OPTIONS IMPORT: peer-id set
Fri Jul 19 14:23:13 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
Fri Jul 19 14:23:13 2019 OPTIONS IMPORT: data channel crypto options modified
Fri Jul 19 14:23:13 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Jul 19 14:23:13 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:23:13 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:23:13 2019 Preserving previous TUN/TAP instance: tun0
Fri Jul 19 14:23:13 2019 Initialization Sequence Completed
Fri Jul 19 14:23:19 2019 Connection reset, restarting [0]
Fri Jul 19 14:23:19 2019 SIGUSR1[soft,connection-reset] received, process restarting
Fri Jul 19 14:23:19 2019 Restart pause, 5 second(s)
Fri Jul 19 14:23:24 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:24 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
Fri Jul 19 14:23:24 2019 Attempting to establish TCP connection with [AF_INET]192.162.88.135:443 [nonblock]
Fri Jul 19 14:23:25 2019 TCP connection established with [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:25 2019 TCP_CLIENT link local: (not bound)
Fri Jul 19 14:23:25 2019 TCP_CLIENT link remote: [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:25 2019 TLS: Initial packet from [AF_INET]192.162.88.135:443, sid=7ef92bc1 0eb87931
Fri Jul 19 14:23:25 2019 VERIFY OK: depth=1, CN=vpn-ext.gardatech.ru
Fri Jul 19 14:23:25 2019 VERIFY KU OK
Fri Jul 19 14:23:25 2019 Validating certificate extended key usage
Fri Jul 19 14:23:25 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Jul 19 14:23:25 2019 VERIFY EKU OK
Fri Jul 19 14:23:25 2019 VERIFY OK: depth=0, CN=server
Fri Jul 19 14:23:25 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Jul 19 14:23:25 2019 [server] Peer Connection Initiated with [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:26 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jul 19 14:23:27 2019 PUSH: Received control message: 'PUSH_REPLY,route 192.168.232.0 255.255.252.0,route 192.168.233.0 255.255.252.0,route 192.168.236.0 255.255.252.0,dhcp-option DOMAIN garda.local,dhcp-option DNS 192.168.232.8,route 172.20.20.1,topology net30,ping 10,ping-restart 120,ifconfig 172.20.20.6 172.20.20.5,peer-id 0,cipher AES-256-GCM'
Fri Jul 19 14:23:27 2019 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jul 19 14:23:27 2019 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jul 19 14:23:27 2019 OPTIONS IMPORT: route options modified
Fri Jul 19 14:23:27 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Jul 19 14:23:27 2019 OPTIONS IMPORT: peer-id set
Fri Jul 19 14:23:27 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
Fri Jul 19 14:23:27 2019 OPTIONS IMPORT: data channel crypto options modified
Fri Jul 19 14:23:27 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Jul 19 14:23:27 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:23:27 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:23:27 2019 Preserving previous TUN/TAP instance: tun0
Fri Jul 19 14:23:27 2019 Initialization Sequence Completed
Fri Jul 19 14:23:32 2019 Connection reset, restarting [0]
Fri Jul 19 14:23:32 2019 SIGUSR1[soft,connection-reset] received, process restarting
Fri Jul 19 14:23:32 2019 Restart pause, 5 second(s)
Fri Jul 19 14:23:37 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:37 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
Fri Jul 19 14:23:37 2019 Attempting to establish TCP connection with [AF_INET]192.162.88.135:443 [nonblock]
Fri Jul 19 14:23:38 2019 TCP connection established with [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:38 2019 TCP_CLIENT link local: (not bound)
Fri Jul 19 14:23:38 2019 TCP_CLIENT link remote: [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:38 2019 TLS: Initial packet from [AF_INET]192.162.88.135:443, sid=af2e0e08 9a6534b6
Fri Jul 19 14:23:38 2019 VERIFY OK: depth=1, CN=vpn-ext.gardatech.ru
Fri Jul 19 14:23:38 2019 VERIFY KU OK
Fri Jul 19 14:23:38 2019 Validating certificate extended key usage
Fri Jul 19 14:23:38 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Jul 19 14:23:38 2019 VERIFY EKU OK
Fri Jul 19 14:23:38 2019 VERIFY OK: depth=0, CN=server
Fri Jul 19 14:23:38 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Jul 19 14:23:38 2019 [server] Peer Connection Initiated with [AF_INET]192.162.88.135:443
Fri Jul 19 14:23:39 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jul 19 14:23:39 2019 PUSH: Received control message: 'PUSH_REPLY,route 192.168.232.0 255.255.252.0,route 192.168.233.0 255.255.252.0,route 192.168.236.0 255.255.252.0,dhcp-option DOMAIN garda.local,dhcp-option DNS 192.168.232.8,route 172.20.20.1,topology net30,ping 10,ping-restart 120,ifconfig 172.20.20.6 172.20.20.5,peer-id 0,cipher AES-256-GCM'
Fri Jul 19 14:23:39 2019 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jul 19 14:23:39 2019 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jul 19 14:23:39 2019 OPTIONS IMPORT: route options modified
Fri Jul 19 14:23:39 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Jul 19 14:23:39 2019 OPTIONS IMPORT: peer-id set
Fri Jul 19 14:23:39 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
Fri Jul 19 14:23:39 2019 OPTIONS IMPORT: data channel crypto options modified
Fri Jul 19 14:23:39 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Fri Jul 19 14:23:39 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:23:39 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Jul 19 14:23:39 2019 Preserving previous TUN/TAP instance: tun0
Fri Jul 19 14:23:39 2019 Initialization Sequence Completed