KayOneX-24 Posted September 17, 2017 Share Posted September 17, 2017 Hello! It's been a while since my last post. I'm still very happy with my Netduma R1 and I'm using it everyday for gaming. Unfortunately, it's been a while since my VPN (CyberGhost VPN) has stopped working. I did no changes to the configuration or username and password, but it just doesn't want to work. I've tried many things like generating new certificates and so on, but it doesn't help. The user data (username and password) is typed in correctly into the boxes in the Neduma settings- For a better understanding I would like to show you my configuration file: - Long text begins here - client remote 1-us.cg-dialup.net 443 dev tun proto tcp auth-user-pass resolv-retry infinite redirect-gateway def1 persist-key persist-tun nobind cipher AES-256-CBC auth MD5 ping 15 ping-exit 90 ping-timer-rem script-security 2 remote-cert-tls server route-delay 5 verb 4 comp-lzo <ca> -----BEGIN CERTIFICATE----- Lines removed due to security reasons... -----END CERTIFICATE----- </ca> <cert> -----BEGIN CERTIFICATE----- Lines removed due to security reasons... -----END CERTIFICATE----- </cert> <key> -----BEGIN PRIVATE KEY----- Lines removed due to security reasons... -----END PRIVATE KEY----- </key> - Long text ends here - After trying to connect to the VPN servers this is what the log displays... - Long text begins again - Sun Sep 17 13:19:27 2017 us=900939 WARNING: file '/tmp/vpncred' is group or others accessible Sun Sep 17 13:19:27 2017 us=901178 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:19:27 2017 us=981642 LZO compression initialized Sun Sep 17 13:19:27 2017 us=990866 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:19:27 2017 us=991368 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:19:28 2017 us=20161 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:19:28 2017 us=20585 Attempting to establish TCP connection with [AF_INET]207.244.77.236:443 [nonblock] Sun Sep 17 13:19:29 2017 us=21277 TCP connection established with [AF_INET]207.244.77.236:443 Sun Sep 17 13:19:29 2017 us=21465 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:19:29 2017 us=21596 TCPv4_CLIENT link remote: [AF_INET]207.244.77.236:443 Sun Sep 17 13:19:29 2017 us=127249 TLS: Initial packet from [AF_INET]207.244.77.236:443, sid=1352c952 ecb47c69 Sun Sep 17 13:19:29 2017 us=128056 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sun Sep 17 13:19:29 2017 us=495240 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:19:29 2017 us=517015 Validating certificate key usage Sun Sep 17 13:19:29 2017 us=517261 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:19:29 2017 us=517434 VERIFY KU OK Sun Sep 17 13:19:29 2017 us=517647 Validating certificate extended key usage Sun Sep 17 13:19:29 2017 us=517851 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:19:29 2017 us=518031 VERIFY EKU OK Sun Sep 17 13:19:29 2017 us=518195 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server Washington-S04-I01, [email protected] Sun Sep 17 13:19:29 2017 us=518806 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:19:29 2017 us=519044 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:19:29 2017 us=519211 TLS Error: TLS handshake failed Sun Sep 17 13:19:29 2017 us=520365 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:19:29 2017 us=520809 TCP/UDP: Closing socket Sun Sep 17 13:19:29 2017 us=521340 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:19:29 2017 us=521579 Restart pause, 5 second(s) Sun Sep 17 13:19:34 2017 us=521835 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:19:34 2017 us=522077 Re-using SSL/TLS context Sun Sep 17 13:19:34 2017 us=522218 LZO compression initialized Sun Sep 17 13:19:34 2017 us=522826 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:19:34 2017 us=523113 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:19:34 2017 us=524478 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:19:34 2017 us=524747 Attempting to establish TCP connection with [AF_INET]38.95.111.41:443 [nonblock] Sun Sep 17 13:19:35 2017 us=525337 TCP connection established with [AF_INET]38.95.111.41:443 Sun Sep 17 13:19:35 2017 us=525528 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:19:35 2017 us=525656 TCPv4_CLIENT link remote: [AF_INET]38.95.111.41:443 Sun Sep 17 13:19:35 2017 us=690431 TLS: Initial packet from [AF_INET]38.95.111.41:443, sid=530c2cd8 aef68002 Sun Sep 17 13:19:36 2017 us=245286 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:19:36 2017 us=258392 Validating certificate key usage Sun Sep 17 13:19:36 2017 us=258636 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:19:36 2017 us=258796 VERIFY KU OK Sun Sep 17 13:19:36 2017 us=258999 Validating certificate extended key usage Sun Sep 17 13:19:36 2017 us=259194 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:19:36 2017 us=259384 VERIFY EKU OK Sun Sep 17 13:19:36 2017 us=259551 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server LosAngeles-S12-I01, [email protected] Sun Sep 17 13:19:36 2017 us=260014 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:19:36 2017 us=260240 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:19:36 2017 us=260462 TLS Error: TLS handshake failed Sun Sep 17 13:19:36 2017 us=261456 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:19:36 2017 us=261895 TCP/UDP: Closing socket Sun Sep 17 13:19:36 2017 us=262370 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:19:36 2017 us=262607 Restart pause, 5 second(s) Sun Sep 17 13:19:41 2017 us=262866 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:19:41 2017 us=263094 Re-using SSL/TLS context Sun Sep 17 13:19:41 2017 us=263221 LZO compression initialized Sun Sep 17 13:19:41 2017 us=263810 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:19:41 2017 us=264100 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:19:41 2017 us=265457 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:19:41 2017 us=265758 Attempting to establish TCP connection with [AF_INET]207.244.77.236:443 [nonblock] Sun Sep 17 13:19:42 2017 us=266358 TCP connection established with [AF_INET]207.244.77.236:443 Sun Sep 17 13:19:42 2017 us=266547 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:19:42 2017 us=266678 TCPv4_CLIENT link remote: [AF_INET]207.244.77.236:443 Sun Sep 17 13:19:42 2017 us=370730 TLS: Initial packet from [AF_INET]207.244.77.236:443, sid=9893fbac ee052bde Sun Sep 17 13:19:42 2017 us=737629 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:19:42 2017 us=752033 Validating certificate key usage Sun Sep 17 13:19:42 2017 us=752276 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:19:42 2017 us=752506 VERIFY KU OK Sun Sep 17 13:19:42 2017 us=752722 Validating certificate extended key usage Sun Sep 17 13:19:42 2017 us=752919 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:19:42 2017 us=753080 VERIFY EKU OK Sun Sep 17 13:19:42 2017 us=753237 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server Washington-S04-I01, [email protected] Sun Sep 17 13:19:42 2017 us=754247 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:19:42 2017 us=754482 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:19:42 2017 us=754654 TLS Error: TLS handshake failed Sun Sep 17 13:19:42 2017 us=755637 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:19:42 2017 us=756672 TCP/UDP: Closing socket Sun Sep 17 13:19:42 2017 us=757172 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:19:42 2017 us=757412 Restart pause, 5 second(s) Sun Sep 17 13:19:47 2017 us=757669 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:19:47 2017 us=757895 Re-using SSL/TLS context Sun Sep 17 13:19:47 2017 us=758025 LZO compression initialized Sun Sep 17 13:19:47 2017 us=758620 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:19:47 2017 us=758908 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:19:47 2017 us=760197 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:19:47 2017 us=760538 Attempting to establish TCP connection with [AF_INET]167.160.123.22:443 [nonblock] Sun Sep 17 13:19:48 2017 us=761145 TCP connection established with [AF_INET]167.160.123.22:443 Sun Sep 17 13:19:48 2017 us=761332 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:19:48 2017 us=761467 TCPv4_CLIENT link remote: [AF_INET]167.160.123.22:443 Sun Sep 17 13:19:48 2017 us=907843 TLS: Initial packet from [AF_INET]167.160.123.22:443, sid=329b99f3 cdb10cec Sun Sep 17 13:19:49 2017 us=412302 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:19:49 2017 us=452293 Validating certificate key usage Sun Sep 17 13:19:49 2017 us=452582 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:19:49 2017 us=452743 VERIFY KU OK Sun Sep 17 13:19:49 2017 us=452953 Validating certificate extended key usage Sun Sep 17 13:19:49 2017 us=453153 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:19:49 2017 us=453316 VERIFY EKU OK Sun Sep 17 13:19:49 2017 us=453477 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server Jackson-S02-I04, [email protected] Sun Sep 17 13:19:49 2017 us=454220 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:19:49 2017 us=454471 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:19:49 2017 us=454646 TLS Error: TLS handshake failed Sun Sep 17 13:19:49 2017 us=455626 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:19:49 2017 us=456060 TCP/UDP: Closing socket Sun Sep 17 13:19:49 2017 us=457970 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:19:49 2017 us=458219 Restart pause, 5 second(s) Sun Sep 17 13:19:54 2017 us=458475 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:19:54 2017 us=458719 Re-using SSL/TLS context Sun Sep 17 13:19:54 2017 us=458870 LZO compression initialized Sun Sep 17 13:19:54 2017 us=459488 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:19:54 2017 us=459775 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:19:54 2017 us=461141 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:19:54 2017 us=461440 Attempting to establish TCP connection with [AF_INET]38.95.109.54:443 [nonblock] Sun Sep 17 13:19:55 2017 us=462050 TCP connection established with [AF_INET]38.95.109.54:443 Sun Sep 17 13:19:55 2017 us=462240 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:19:55 2017 us=462372 TCPv4_CLIENT link remote: [AF_INET]38.95.109.54:443 Sun Sep 17 13:19:55 2017 us=627113 TLS: Initial packet from [AF_INET]38.95.109.54:443, sid=39688c86 3075cc14 Sun Sep 17 13:19:56 2017 us=189073 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:19:56 2017 us=201162 Validating certificate key usage Sun Sep 17 13:19:56 2017 us=201404 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:19:56 2017 us=201564 VERIFY KU OK Sun Sep 17 13:19:56 2017 us=201772 Validating certificate extended key usage Sun Sep 17 13:19:56 2017 us=201969 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:19:56 2017 us=202130 VERIFY EKU OK Sun Sep 17 13:19:56 2017 us=202293 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server LosAngeles-S05-I03, [email protected] Sun Sep 17 13:19:56 2017 us=202746 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:19:56 2017 us=202974 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:19:56 2017 us=203144 TLS Error: TLS handshake failed Sun Sep 17 13:19:56 2017 us=204130 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:19:56 2017 us=204609 TCP/UDP: Closing socket Sun Sep 17 13:19:56 2017 us=205042 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:19:56 2017 us=205201 Restart pause, 5 second(s) Sun Sep 17 13:20:01 2017 us=205394 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:20:01 2017 us=205614 Re-using SSL/TLS context Sun Sep 17 13:20:01 2017 us=205741 LZO compression initialized Sun Sep 17 13:20:01 2017 us=206333 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:20:01 2017 us=206618 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:20:01 2017 us=207921 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:20:01 2017 us=208149 Attempting to establish TCP connection with [AF_INET]23.81.27.205:443 [nonblock] Sun Sep 17 13:20:02 2017 us=208817 TCP connection established with [AF_INET]23.81.27.205:443 Sun Sep 17 13:20:02 2017 us=209007 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:20:02 2017 us=209135 TCPv4_CLIENT link remote: [AF_INET]23.81.27.205:443 Sun Sep 17 13:20:02 2017 us=328379 TLS: Initial packet from [AF_INET]23.81.27.205:443, sid=039a1d1f f57e248d Sun Sep 17 13:20:02 2017 us=742692 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:20:02 2017 us=754406 Validating certificate key usage Sun Sep 17 13:20:02 2017 us=754647 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:20:02 2017 us=754808 VERIFY KU OK Sun Sep 17 13:20:02 2017 us=755015 Validating certificate extended key usage Sun Sep 17 13:20:02 2017 us=755214 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:20:02 2017 us=755376 VERIFY EKU OK Sun Sep 17 13:20:02 2017 us=755535 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server Chicago-S03-I03, [email protected] Sun Sep 17 13:20:02 2017 us=755996 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:20:02 2017 us=756223 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:20:02 2017 us=756447 TLS Error: TLS handshake failed Sun Sep 17 13:20:02 2017 us=757444 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:20:02 2017 us=757878 TCP/UDP: Closing socket Sun Sep 17 13:20:02 2017 us=758352 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:20:02 2017 us=758592 Restart pause, 5 second(s) Sun Sep 17 13:20:07 2017 us=758859 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:20:07 2017 us=759084 Re-using SSL/TLS context Sun Sep 17 13:20:07 2017 us=759211 LZO compression initialized Sun Sep 17 13:20:07 2017 us=759804 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:20:07 2017 us=760090 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:20:07 2017 us=761406 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:20:07 2017 us=761707 Attempting to establish TCP connection with [AF_INET]64.20.33.206:443 [nonblock] Sun Sep 17 13:20:08 2017 us=762305 TCP connection established with [AF_INET]64.20.33.206:443 Sun Sep 17 13:20:08 2017 us=762492 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:20:08 2017 us=762624 TCPv4_CLIENT link remote: [AF_INET]64.20.33.206:443 Sun Sep 17 13:20:08 2017 us=859689 TLS: Initial packet from [AF_INET]64.20.33.206:443, sid=0829361b 75075856 Sun Sep 17 13:20:09 2017 us=198629 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:20:09 2017 us=210354 Validating certificate key usage Sun Sep 17 13:20:09 2017 us=210596 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:20:09 2017 us=210756 VERIFY KU OK Sun Sep 17 13:20:09 2017 us=210960 Validating certificate extended key usage Sun Sep 17 13:20:09 2017 us=211158 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:20:09 2017 us=211320 VERIFY EKU OK Sun Sep 17 13:20:09 2017 us=211480 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server NewJersey-S01-I04, [email protected] Sun Sep 17 13:20:09 2017 us=211973 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:20:09 2017 us=212206 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:20:09 2017 us=212441 TLS Error: TLS handshake failed Sun Sep 17 13:20:09 2017 us=213404 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:20:09 2017 us=213762 TCP/UDP: Closing socket Sun Sep 17 13:20:09 2017 us=214161 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:20:09 2017 us=214321 Restart pause, 5 second(s) Sun Sep 17 13:20:14 2017 us=214516 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:20:14 2017 us=214743 Re-using SSL/TLS context Sun Sep 17 13:20:14 2017 us=214870 LZO compression initialized Sun Sep 17 13:20:14 2017 us=215465 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:20:14 2017 us=215750 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:20:14 2017 us=218194 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:20:14 2017 us=218683 Attempting to establish TCP connection with [AF_INET]207.244.77.237:443 [nonblock] Sun Sep 17 13:20:15 2017 us=219484 TCP connection established with [AF_INET]207.244.77.237:443 Sun Sep 17 13:20:15 2017 us=219670 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:20:15 2017 us=219802 TCPv4_CLIENT link remote: [AF_INET]207.244.77.237:443 Sun Sep 17 13:20:15 2017 us=322024 TLS: Initial packet from [AF_INET]207.244.77.237:443, sid=a53cced5 19afd506 Sun Sep 17 13:20:15 2017 us=680278 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:20:15 2017 us=692558 Validating certificate key usage Sun Sep 17 13:20:15 2017 us=692803 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:20:15 2017 us=692962 VERIFY KU OK Sun Sep 17 13:20:15 2017 us=693169 Validating certificate extended key usage Sun Sep 17 13:20:15 2017 us=693366 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:20:15 2017 us=693529 VERIFY EKU OK Sun Sep 17 13:20:15 2017 us=693689 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server Washington-S04-I02, [email protected] Sun Sep 17 13:20:15 2017 us=694145 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:20:15 2017 us=694372 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:20:15 2017 us=694540 TLS Error: TLS handshake failed Sun Sep 17 13:20:15 2017 us=695521 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:20:15 2017 us=695957 TCP/UDP: Closing socket Sun Sep 17 13:20:15 2017 us=696836 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:20:15 2017 us=697072 Restart pause, 5 second(s) Sun Sep 17 13:20:20 2017 us=697331 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:20:20 2017 us=697559 Re-using SSL/TLS context Sun Sep 17 13:20:20 2017 us=697686 LZO compression initialized Sun Sep 17 13:20:20 2017 us=698278 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:20:20 2017 us=698564 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:20:20 2017 us=699857 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:20:20 2017 us=700083 Attempting to establish TCP connection with [AF_INET]38.95.111.42:443 [nonblock] Sun Sep 17 13:20:21 2017 us=700742 TCP connection established with [AF_INET]38.95.111.42:443 Sun Sep 17 13:20:21 2017 us=701036 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:20:21 2017 us=701189 TCPv4_CLIENT link remote: [AF_INET]38.95.111.42:443 Sun Sep 17 13:20:21 2017 us=873468 TLS: Initial packet from [AF_INET]38.95.111.42:443, sid=5654da97 1ffcd9cb Sun Sep 17 13:20:22 2017 us=436662 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:20:22 2017 us=448440 Validating certificate key usage Sun Sep 17 13:20:22 2017 us=448686 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:20:22 2017 us=448846 VERIFY KU OK Sun Sep 17 13:20:22 2017 us=449052 Validating certificate extended key usage Sun Sep 17 13:20:22 2017 us=449249 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:20:22 2017 us=449414 VERIFY EKU OK Sun Sep 17 13:20:22 2017 us=449573 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server LosAngeles-S12-I02, [email protected] Sun Sep 17 13:20:22 2017 us=450031 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:20:22 2017 us=450257 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:20:22 2017 us=450425 TLS Error: TLS handshake failed Sun Sep 17 13:20:22 2017 us=451409 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:20:22 2017 us=451841 TCP/UDP: Closing socket Sun Sep 17 13:20:22 2017 us=452359 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:20:22 2017 us=452601 Restart pause, 5 second(s) Sun Sep 17 13:20:27 2017 us=452855 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sun Sep 17 13:20:27 2017 us=453112 Re-using SSL/TLS context Sun Sep 17 13:20:27 2017 us=453279 LZO compression initialized Sun Sep 17 13:20:27 2017 us=453911 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Sep 17 13:20:27 2017 us=454196 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Sep 17 13:20:27 2017 us=455479 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ] Sun Sep 17 13:20:27 2017 us=455683 Attempting to establish TCP connection with [AF_INET]167.160.123.19:443 [nonblock] Sun Sep 17 13:20:28 2017 us=456223 TCP connection established with [AF_INET]167.160.123.19:443 Sun Sep 17 13:20:28 2017 us=457951 TCPv4_CLIENT link local: [undef] Sun Sep 17 13:20:28 2017 us=458226 TCPv4_CLIENT link remote: [AF_INET]167.160.123.19:443 Sun Sep 17 13:20:28 2017 us=604738 TLS: Initial packet from [AF_INET]167.160.123.19:443, sid=3006ebc2 695ec63d Sun Sep 17 13:20:29 2017 us=107736 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, [email protected] Sun Sep 17 13:20:29 2017 us=119419 Validating certificate key usage Sun Sep 17 13:20:29 2017 us=119666 ++ Certificate has key usage 00a0, expects 00a0 Sun Sep 17 13:20:29 2017 us=119828 VERIFY KU OK Sun Sep 17 13:20:29 2017 us=120032 Validating certificate extended key usage Sun Sep 17 13:20:29 2017 us=120230 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Sep 17 13:20:29 2017 us=120448 VERIFY EKU OK Sun Sep 17 13:20:29 2017 us=120622 VERIFY OK: depth=0, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost VPN Server Jackson-S02-I01, [email protected] Sun Sep 17 13:20:29 2017 us=121083 TLS_ERROR: BIO read tls_read_plaintext error: error:100AE081:lib(16):func(174):reason(129): error:1408D010:lib(20):func(141):reason(16) Sun Sep 17 13:20:29 2017 us=121313 TLS Error: TLS object -> incoming plaintext read error Sun Sep 17 13:20:29 2017 us=121487 TLS Error: TLS handshake failed Sun Sep 17 13:20:29 2017 us=122467 Fatal TLS error (check_tls_errors_co), restarting Sun Sep 17 13:20:29 2017 us=122909 TCP/UDP: Closing socket Sun Sep 17 13:20:29 2017 us=123387 SIGUSR1[soft,tls-error] received, process restarting Sun Sep 17 13:20:29 2017 us=123623 Restart pause, 5 second(s) - Long text ends again - Is there anything that I could do to solve this issue? I'm proud to be part of this community and I would like to thank you in advance for your help. Best regards, KayOneX-24 Link to comment Share on other sites More sharing options...
BIG__DOG Posted September 17, 2017 Share Posted September 17, 2017 have you tried getting a new config file from your vpn? I am with privateinternetaccess.com and a while ago they updated their config file.....just a suggestion 1 Link to comment Share on other sites More sharing options...
KayOneX-24 Posted September 17, 2017 Author Share Posted September 17, 2017 have you tried getting a new config file from your vpn? I am with privateinternetaccess.com and a while ago they updated their config file.....just a suggestion 1 Thank you very much for your response. I have downloaded fresh config files some hours ago. Unfortunately, that did not solve my issue. Link to comment Share on other sites More sharing options...
Netduma Staff Netduma Jack Posted September 19, 2017 Netduma Staff Share Posted September 19, 2017 Thank you very much for your response. I have downloaded fresh config files some hours ago. Unfortunately, that did not solve my issue. If you remove these lines: auth-user-pass resolv-retry infinite Does that help at all? The retry infinite line should prevent your log from being so massive due to retries. From what I can gather online, the crux of the issue is in the line 'Handshake Failed', and is usually related to either a firewall blocking a specific port or that port not being correctly forwarded. You could try finding out which port your VPN is using and forwarding it, as well as disabling your firewall or adding a port exception. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.