Openvpn 10054 ошибка соединения

kovacg

OpenVpn Newbie
Posts: 7
Joined: Wed Feb 21, 2018 4:47 pm

Unknown Error (Code=10054)

Hello,

i set up VPN connection on win7 due to manual. I was trying to connect with client, but there is problem.

Wed Feb 21 17:41:08 2018 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Wed Feb 21 17:41:08 2018 Windows version 6.1 (Windows 7) 64bit
Wed Feb 21 17:41:08 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Wed Feb 21 17:41:08 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Wed Feb 21 17:41:08 2018 Need hold release from management interface, waiting…
Wed Feb 21 17:41:09 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘state on’
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘log all on’
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘echo all on’
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘hold off’
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘hold release’
Wed Feb 21 17:41:09 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.167.xxx.xxxx:1194
Wed Feb 21 17:41:09 2018 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Feb 21 17:41:09 2018 UDP link local: (not bound)
Wed Feb 21 17:41:09 2018 UDP link remote: [AF_INET]185.167.xxx.xxx:1194
Wed Feb 21 17:41:09 2018 MANAGEMENT: >STATE:1519231269,WAIT,,,,,,
Wed Feb 21 17:41:09 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:41:11 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:41:15 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:41:23 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:41:39 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:42:10 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Wed Feb 21 17:42:10 2018 TLS Error: TLS handshake failed

My ISP can´t give me an private IP. So he forward port 1194 to my router. There I forward port 1194 to ip of my server.
Is that possible? Do you somebody know where could be a problem?

Thanks for your help and sorry for my bad english


TinCanTech

OpenVPN Protagonist
Posts: 11142
Joined: Fri Jun 03, 2016 1:17 pm

Re: Unknown Error (Code=10054)

Post

by TinCanTech » Wed Feb 21, 2018 6:33 pm

Does your server show any connections from this client ?


kovacg

OpenVpn Newbie
Posts: 7
Joined: Wed Feb 21, 2018 4:47 pm

Re: Unknown Error (Code=10054)

Post

by kovacg » Wed Feb 21, 2018 9:45 pm

I was tried make set up again. And now I have this error message: Connection reset by peer (WSAECONNRESET) (code=10054)

On the server, I can´t see anything.

Thank you


TinCanTech

OpenVPN Protagonist
Posts: 11142
Joined: Fri Jun 03, 2016 1:17 pm

Re: Unknown Error (Code=10054)

Post

by TinCanTech » Wed Feb 21, 2018 10:05 pm

kovacg wrote: ↑

Wed Feb 21, 2018 9:45 pm


On the server, I can´t see anything.

Because the packets are not getting to your server.

kovacg wrote: ↑

Wed Feb 21, 2018 4:53 pm


My ISP can´t give me an private IP. So he forward port 1194 to my router. There I forward port 1194 to ip of my server.

Make sure the port is forwarded correctly .. maybe you can use DMZ on your router ?


kovacg

OpenVpn Newbie
Posts: 7
Joined: Wed Feb 21, 2018 4:47 pm

Re: Unknown Error (Code=10054)

Post

by kovacg » Thu Feb 22, 2018 5:08 pm

I think ports are forwarded correctly.

This is forwarded from my ISP

Image

this is forwarded from my Router

Image

Routers IP is xxx.xxx.90.5 and server ip is xxx.xxx.5.254

I don´t know how to use DMZ.


TinCanTech

OpenVPN Protagonist
Posts: 11142
Joined: Fri Jun 03, 2016 1:17 pm

Re: Unknown Error (Code=10054)

Post

by TinCanTech » Thu Feb 22, 2018 8:52 pm

kovacg wrote: ↑

Wed Feb 21, 2018 4:53 pm


read UDP: Unknown error (code=10054)

This Windows error message means the connection was reset .. which almost certainly means you have not got either port forwarded correctly or firewall configured correctly.


kovacg

OpenVpn Newbie
Posts: 7
Joined: Wed Feb 21, 2018 4:47 pm

Re: Unknown Error (Code=10054)

Post

by kovacg » Thu Feb 22, 2018 10:36 pm

So it could be firewall problem?


RRGraphixGuy

OpenVpn Newbie
Posts: 1
Joined: Wed Apr 01, 2020 2:23 pm

Re: Unknown Error (Code=10054)

Post

by RRGraphixGuy » Wed Apr 01, 2020 2:32 pm

kovacg wrote: ↑

Thu Feb 22, 2018 10:36 pm


So it could be firewall problem?

Not only Windows Firewall, but third-party anti-virus and/or anti-malware applications as well. I was very frustrated yesterday on a particular computer until I discovered Avast was installed on it and running its network and application shields. Simply add OpenVPN as exception, problem solved. :roll:


OpenVPN greatly improves your online privacy. Often, OpenVPN clients do not work correctly and show up connection errors too.

One such error is “OpenVPN error 10054“. Unfortunately, it happens when the OpenVPN server connection gets a reset.

At Bobcares, we solve OpenVPN connection errors for our customers as part of our Managed VPN Services.

Today, we’ll see how our Support Engineers diagnose and fix “OpenVPN error 10054”.

What causes “OpenVPN error 10054”?

OpenVPN works on a client-server model. In simple words, the OpenVPN client initiates a connection to the OpenVPN server. Further, all communication happens via this channel. That’s how OpenVPN take care of the privacy of user data.

At times, when this connection is reset, it shows the error:

Jan 23 17:41:39 2019 read UDP: Unknown error (code=10054)
Jan 23 17:42:10 2019 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Jan 23 17:42:10 2019 TLS Error: TLS handshake failed

This errors shows that the UDP packets could not make it to the OpenVPN server.

Now, let’s see the top reasons that can cause this connection reset error.

1. Wrong firewall settings

Primarily, VPN connection reset can happen due to the wrong Firewall settings on the computer that runs the OpenVPN client. As the firewall blocks the connection, the data packets do not even reach the server.

Sometimes, even the firewall at the Internet Service Provider (ISP) also can cause OpenVPN error.

Recently, when a customer reported problems with OpenVPN error 10054, it was the ISP firewall affecting the connection. Here, the ISP router was assigning all the devices the same public IP address, which created conflict.

2. Wrong port forwarding

Whenever VPN uses Network Address Translation aka NAT firewall,  then there is a need for remote port forwarding. Here, port forwarding forwards all incoming connections with a matching port number to the internal computer with specific address.

However, when there are wrong port forwarding rules set in the OpenVPN server, it can again result in “OpenVPN error 10054.

How we fix “OpenVPN error 10054”

We just saw the typical causes for the error. Now, let’s take a look on how our Support Engineers fix the OpenVPN connection.

1. Check server connection

Firstly, we check the connection from the home computer to the OpenVPN server. For this, we use the telnet command in the format

telnet  

If the connection do not work properly, we then check on the server side to see if there are connections reaching the OpenVPN server from this particular client.

2. Disabling firewall

If connections are not even reaching the server, obviously the client computer firewall will have a role in it. To isolate this firewall dependency, our Dedicated Engineers suggest customers to completely turn off firewall and repeat the telnet check. For example, in case of Windows customers, we ask them to disable Windows Firewall completely and try connecting.

Again, if there are further error messages, it means there is something beyond the computer firewall.

3. Edit port forwarding rules

At this point, we check the port forwarding rules in the OpenVPN server. We look for typos in the rules and fix them. That solves the OpenVPN error 10054, and make OpenVPN work fine.

[Are you getting “OpenVPN error 10054“? Our VPN experts can easily fix it for you.]

Conclusion

In short, OpenVPN error 10054 happens mainly due to firewall settings or wrong port forwarding rules in the OpenVPN server. Today, we saw the typical reasons for the error and how our Support Engineers restore VPN connectivity.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

var google_conversion_label = «owonCMyG5nEQ0aD71QM»;

ovpn log:

Sat Jun 30 00:05:17 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Sat Jun 30 00:05:17 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Sat Jun 30 00:05:17 2018 library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
Enter Management Password:
Sat Jun 30 00:05:17 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]107.182.231.79:1197
Sat Jun 30 00:05:17 2018 UDP link local: (not bound)
Sat Jun 30 00:05:17 2018 UDP link remote: [AF_INET]107.182.231.79:1197
Sat Jun 30 00:05:18 2018 [e139dafe9702261606c50313497b829c] Peer Connection Initiated with [AF_INET]107.182.231.79:1197
Sat Jun 30 00:05:19 2018 auth-token received, disabling auth-nocache for the authentication token
Sat Jun 30 00:05:19 2018 open_tun
Sat Jun 30 00:05:19 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{86ACEA81-E061-4917-A3DD-D4D6F12E414F}.tap
Sat Jun 30 00:05:19 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.10.6/255.255.255.252 on interface {86ACEA81-E061-4917-A3DD-D4D6F12E414F} [DHCP-serv: 10.15.10.5, lease-time: 31536000]
Sat Jun 30 00:05:19 2018 Successful ARP Flush on interface [9] {86ACEA81-E061-4917-A3DD-D4D6F12E414F}
Sat Jun 30 00:05:19 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sat Jun 30 00:05:19 2018 write UDP: Unknown error (code=10065)
Sat Jun 30 00:05:19 2018 write UDP: Unknown error (code=10065)
Sat Jun 30 00:05:24 2018 Initialization Sequence Completed
Sat Jun 30 01:32:33 2018 SIGHUP[hard,] received, process restarting
Sat Jun 30 01:32:33 2018 us=722754 Current Parameter Settings:
Sat Jun 30 01:32:33 2018 us=722754   config = 'NYC.ovpn'
Sat Jun 30 01:32:33 2018 us=722754   mode = 0
Sat Jun 30 01:32:33 2018 us=722754   show_ciphers = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   show_digests = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   show_engines = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   genkey = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   key_pass_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   show_tls_ciphers = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   connect_retry_max = 0
Sat Jun 30 01:32:33 2018 us=722754 Connection profiles [0]:
Sat Jun 30 01:32:33 2018 us=722754   proto = udp
Sat Jun 30 01:32:33 2018 us=722754   local = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   local_port = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   remote = 'us-newyorkcity.privateinternetaccess.com'
Sat Jun 30 01:32:33 2018 us=722754   remote_port = '1197'
Sat Jun 30 01:32:33 2018 us=722754   remote_float = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   bind_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   bind_local = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   bind_ipv6_only = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   connect_retry_seconds = 5
Sat Jun 30 01:32:33 2018 us=722754   connect_timeout = 120
Sat Jun 30 01:32:33 2018 us=722754   socks_proxy_server = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   socks_proxy_port = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   tun_mtu = 1500
Sat Jun 30 01:32:33 2018 us=722754   tun_mtu_defined = ENABLED
Sat Jun 30 01:32:33 2018 us=722754   link_mtu = 1500
Sat Jun 30 01:32:33 2018 us=722754   link_mtu_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   tun_mtu_extra = 0
Sat Jun 30 01:32:33 2018 us=722754   tun_mtu_extra_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   mtu_discover_type = -1
Sat Jun 30 01:32:33 2018 us=722754   fragment = 0
Sat Jun 30 01:32:33 2018 us=722754   mssfix = 1450
Sat Jun 30 01:32:33 2018 us=722754   explicit_exit_notification = 0
Sat Jun 30 01:32:33 2018 us=722754 Connection profiles END
Sat Jun 30 01:32:33 2018 us=722754   remote_random = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   ipchange = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   dev = 'tun'
Sat Jun 30 01:32:33 2018 us=722754   dev_type = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   dev_node = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   lladdr = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   topology = 1
Sat Jun 30 01:32:33 2018 us=722754   ifconfig_local = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   ifconfig_remote_netmask = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   ifconfig_noexec = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   ifconfig_nowarn = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   ifconfig_ipv6_local = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   ifconfig_ipv6_netbits = 0
Sat Jun 30 01:32:33 2018 us=722754   ifconfig_ipv6_remote = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   shaper = 0
Sat Jun 30 01:32:33 2018 us=722754   mtu_test = 0
Sat Jun 30 01:32:33 2018 us=722754   mlock = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   keepalive_ping = 0
Sat Jun 30 01:32:33 2018 us=722754   keepalive_timeout = 0
Sat Jun 30 01:32:33 2018 us=722754   inactivity_timeout = 0
Sat Jun 30 01:32:33 2018 us=722754   ping_send_timeout = 0
Sat Jun 30 01:32:33 2018 us=722754   ping_rec_timeout = 0
Sat Jun 30 01:32:33 2018 us=722754   ping_rec_timeout_action = 0
Sat Jun 30 01:32:33 2018 us=722754   ping_timer_remote = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   remap_sigusr1 = 0
Sat Jun 30 01:32:33 2018 us=722754   persist_tun = ENABLED
Sat Jun 30 01:32:33 2018 us=722754   persist_local_ip = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   persist_remote_ip = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   persist_key = ENABLED
Sat Jun 30 01:32:33 2018 us=722754   passtos = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   resolve_retry_seconds = 1000000000
Sat Jun 30 01:32:33 2018 us=722754   resolve_in_advance = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   username = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   groupname = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   chroot_dir = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   cd_dir = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   writepid = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   up_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   down_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   down_pre = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   up_restart = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   up_delay = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   daemon = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   inetd = 0
Sat Jun 30 01:32:33 2018 us=722754   log = ENABLED
Sat Jun 30 01:32:33 2018 us=722754   suppress_timestamps = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   machine_readable_output = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   nice = 0
Sat Jun 30 01:32:33 2018 us=722754   verbosity = 4
Sat Jun 30 01:32:33 2018 us=722754   mute = 0
Sat Jun 30 01:32:33 2018 us=722754   gremlin = 0
Sat Jun 30 01:32:33 2018 us=722754   status_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   status_file_version = 1
Sat Jun 30 01:32:33 2018 us=722754   status_file_update_freq = 60
Sat Jun 30 01:32:33 2018 us=722754   occ = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   rcvbuf = 0
Sat Jun 30 01:32:33 2018 us=722754   sndbuf = 0
Sat Jun 30 01:32:33 2018 us=722754   sockflags = 0
Sat Jun 30 01:32:33 2018 us=722754   fast_io = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   comp.alg = 2
Sat Jun 30 01:32:33 2018 us=722754   comp.flags = 1
Sat Jun 30 01:32:33 2018 us=722754   route_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   route_default_gateway = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   route_default_metric = 0
Sat Jun 30 01:32:33 2018 us=722754   route_noexec = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   route_delay = 5
Sat Jun 30 01:32:33 2018 us=722754   route_delay_window = 30
Sat Jun 30 01:32:33 2018 us=722754   route_delay_defined = ENABLED
Sat Jun 30 01:32:33 2018 us=722754   route_nopull = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   route_gateway_via_dhcp = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   allow_pull_fqdn = DISABLED
Sat Jun 30 01:32:33 2018 us=722754   Pull filters:
Sat Jun 30 01:32:33 2018 us=722754     ignore "dhcp-option DNS"
Sat Jun 30 01:32:33 2018 us=722754   route 192.168.0.0/255.255.0.0/192.168.1.1/default (not set)
Sat Jun 30 01:32:33 2018 us=722754   route plex.tv/255.255.255.255/192.168.1.1/default (not set)
Sat Jun 30 01:32:33 2018 us=722754   management_addr = '127.0.0.1'
Sat Jun 30 01:32:33 2018 us=722754   management_port = '25340'
Sat Jun 30 01:32:33 2018 us=722754   management_user_pass = 'stdin'
Sat Jun 30 01:32:33 2018 us=722754   management_log_history_cache = 250
Sat Jun 30 01:32:33 2018 us=722754   management_echo_buffer_size = 100
Sat Jun 30 01:32:33 2018 us=722754   management_write_peer_info_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   management_client_user = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   management_client_group = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754   management_flags = 6
Sat Jun 30 01:32:33 2018 us=722754   shared_secret_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=738375   key_direction = not set
Sat Jun 30 01:32:33 2018 us=738375   ciphername = 'aes-256-cbc'
Sat Jun 30 01:32:33 2018 us=738375   ncp_enabled = ENABLED
Sat Jun 30 01:32:33 2018 us=738375   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
Sat Jun 30 01:32:33 2018 us=738375   authname = 'sha256'
Sat Jun 30 01:32:33 2018 us=738375   prng_hash = 'SHA1'
Sat Jun 30 01:32:33 2018 us=738375   prng_nonce_secret_len = 16
Sat Jun 30 01:32:33 2018 us=738375   keysize = 0
Sat Jun 30 01:32:33 2018 us=738375   engine = DISABLED
Sat Jun 30 01:32:33 2018 us=738375   replay = ENABLED
Sat Jun 30 01:32:33 2018 us=738375   mute_replay_warnings = ENABLED
Sat Jun 30 01:32:33 2018 us=738375   replay_window = 64
Sat Jun 30 01:32:33 2018 us=738375   replay_time = 15
Sat Jun 30 01:32:33 2018 us=738375   packet_id_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=738375   use_iv = ENABLED
Sat Jun 30 01:32:33 2018 us=738375   test_crypto = DISABLED
Sat Jun 30 01:32:33 2018 us=738375   tls_server = DISABLED
Sat Jun 30 01:32:33 2018 us=738375   tls_client = ENABLED
Sat Jun 30 01:32:33 2018 us=738375   key_method = 2
Sat Jun 30 01:32:33 2018 us=738375   ca_file = 'ca.rsa.4096.crt'
Sat Jun 30 01:32:33 2018 us=739062   ca_path = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   dh_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   cert_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   extra_certs_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   priv_key_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   pkcs12_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   cryptoapi_cert = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   cipher_list = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   tls_cert_profile = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   tls_verify = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   tls_export_cert = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   verify_x509_type = 0
Sat Jun 30 01:32:33 2018 us=739062   verify_x509_name = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062   crl_file = 'crl.rsa.4096.pem'
Sat Jun 30 01:32:33 2018 us=739062   ns_cert_type = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 65535
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=740058   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=740058   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=740058   remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=740058   remote_cert_eku = 'TLS Web Server Authentication'
Sat Jun 30 01:32:33 2018 us=740058   ssl_flags = 0
Sat Jun 30 01:32:33 2018 us=740058   tls_timeout = 2
Sat Jun 30 01:32:33 2018 us=740058   renegotiate_bytes = -1
Sat Jun 30 01:32:33 2018 us=740058   renegotiate_packets = 0
Sat Jun 30 01:32:33 2018 us=740058   renegotiate_seconds = 0
Sat Jun 30 01:32:33 2018 us=740058   handshake_window = 60
Sat Jun 30 01:32:33 2018 us=740058   transition_window = 3600
Sat Jun 30 01:32:33 2018 us=740058   single_session = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   push_peer_info = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   tls_exit = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   tls_auth_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=740058   tls_crypt_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_pin_cache_period = -1
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_id = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=742052   pkcs11_id_management = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   server_network = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052   server_netmask = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052   server_network_ipv6 = ::
Sat Jun 30 01:32:33 2018 us=742052   server_netbits_ipv6 = 0
Sat Jun 30 01:32:33 2018 us=742052   server_bridge_ip = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052   server_bridge_netmask = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052   server_bridge_pool_start = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052   server_bridge_pool_end = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052   ifconfig_pool_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   ifconfig_pool_start = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052   ifconfig_pool_end = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052   ifconfig_pool_netmask = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052   ifconfig_pool_persist_filename = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=742052   ifconfig_pool_persist_refresh_freq = 600
Sat Jun 30 01:32:33 2018 us=742052   ifconfig_ipv6_pool_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=742052   ifconfig_ipv6_pool_base = ::
Sat Jun 30 01:32:33 2018 us=742052   ifconfig_ipv6_pool_netbits = 0
Sat Jun 30 01:32:33 2018 us=742052   n_bcast_buf = 256
Sat Jun 30 01:32:33 2018 us=742052   tcp_queue_limit = 64
Sat Jun 30 01:32:33 2018 us=743050   real_hash_size = 256
Sat Jun 30 01:32:33 2018 us=743050   virtual_hash_size = 256
Sat Jun 30 01:32:33 2018 us=743050   client_connect_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050   learn_address_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050   client_disconnect_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050   client_config_dir = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050   ccd_exclusive = DISABLED
Sat Jun 30 01:32:33 2018 us=743050   tmp_dir = 'C:\Users\Tam\AppData\Local\Temp\'
Sat Jun 30 01:32:33 2018 us=743050   push_ifconfig_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=743050   push_ifconfig_local = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=743050   push_ifconfig_remote_netmask = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=743050   push_ifconfig_ipv6_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=743050   push_ifconfig_ipv6_local = ::/0
Sat Jun 30 01:32:33 2018 us=743050   push_ifconfig_ipv6_remote = ::
Sat Jun 30 01:32:33 2018 us=743050   enable_c2c = DISABLED
Sat Jun 30 01:32:33 2018 us=743050   duplicate_cn = DISABLED
Sat Jun 30 01:32:33 2018 us=743050   cf_max = 0
Sat Jun 30 01:32:33 2018 us=743050   cf_per = 0
Sat Jun 30 01:32:33 2018 us=743050   max_clients = 1024
Sat Jun 30 01:32:33 2018 us=743050   max_routes_per_client = 256
Sat Jun 30 01:32:33 2018 us=743050   auth_user_pass_verify_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050   auth_user_pass_verify_script_via_file = DISABLED
Sat Jun 30 01:32:33 2018 us=743050   auth_token_generate = DISABLED
Sat Jun 30 01:32:33 2018 us=743050   auth_token_lifetime = 0
Sat Jun 30 01:32:33 2018 us=743050   client = ENABLED
Sat Jun 30 01:32:33 2018 us=743050   pull = ENABLED
Sat Jun 30 01:32:33 2018 us=743050   auth_user_pass_file = 'passwd.txt'
Sat Jun 30 01:32:33 2018 us=743050   show_net_up = DISABLED
Sat Jun 30 01:32:33 2018 us=743050   route_method = 3
Sat Jun 30 01:32:33 2018 us=743050   block_outside_dns = DISABLED
Sat Jun 30 01:32:33 2018 us=744047   ip_win32_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=744047   ip_win32_type = 3
Sat Jun 30 01:32:33 2018 us=744047   dhcp_masq_offset = 0
Sat Jun 30 01:32:33 2018 us=744047   dhcp_lease_time = 31536000
Sat Jun 30 01:32:33 2018 us=744047   tap_sleep = 0
Sat Jun 30 01:32:33 2018 us=744047   dhcp_options = DISABLED
Sat Jun 30 01:32:33 2018 us=744047   dhcp_renew = DISABLED
Sat Jun 30 01:32:33 2018 us=744047   dhcp_pre_release = DISABLED
Sat Jun 30 01:32:33 2018 us=744047   domain = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=744047   netbios_scope = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=744047   netbios_node_type = 0
Sat Jun 30 01:32:33 2018 us=744047   disable_nbt = DISABLED
Sat Jun 30 01:32:33 2018 us=744047 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Sat Jun 30 01:32:33 2018 us=744047 Windows version 6.2 (Windows 8 or greater) 64bit
Sat Jun 30 01:32:33 2018 us=744047 library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
Sat Jun 30 01:32:33 2018 us=744047 Restart pause, 5 second(s)
Sat Jun 30 01:32:38 2018 us=783086 LZO compression initializing
Sat Jun 30 01:32:38 2018 us=783086 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Jun 30 01:32:38 2018 us=783086 MANAGEMENT: >STATE:1530336758,RESOLVE,,,,,,
Sat Jun 30 01:32:38 2018 us=783086 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sat Jun 30 01:32:38 2018 us=783086 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Jun 30 01:32:38 2018 us=783086 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Jun 30 01:32:38 2018 us=783086 TCP/UDP: Preserving recently used remote address: [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:38 2018 us=783086 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Jun 30 01:32:38 2018 us=783086 UDP link local: (not bound)
Sat Jun 30 01:32:38 2018 us=783086 UDP link remote: [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:38 2018 us=783086 MANAGEMENT: >STATE:1530336758,WAIT,,,,,,
Sat Jun 30 01:32:38 2018 us=798655 MANAGEMENT: >STATE:1530336758,AUTH,,,,,,
Sat Jun 30 01:32:38 2018 us=798655 TLS: Initial packet from [AF_INET]107.182.231.79:1197, sid=675a3fd6 be2fc259
Sat Jun 30 01:32:38 2018 us=864547 VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
Sat Jun 30 01:32:38 2018 us=864547 VERIFY KU OK
Sat Jun 30 01:32:38 2018 us=864547 Validating certificate extended key usage
Sat Jun 30 01:32:38 2018 us=864547 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Jun 30 01:32:38 2018 us=864547 VERIFY EKU OK
Sat Jun 30 01:32:38 2018 us=864547 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=e139dafe9702261606c50313497b829c, name=e139dafe9702261606c50313497b829c
Sat Jun 30 01:32:38 2018 us=942702 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Jun 30 01:32:38 2018 us=942702 [e139dafe9702261606c50313497b829c] Peer Connection Initiated with [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:40 2018 us=84250 MANAGEMENT: >STATE:1530336760,GET_CONFIG,,,,,,
Sat Jun 30 01:32:40 2018 us=84250 SENT CONTROL [e139dafe9702261606c50313497b829c]: 'PUSH_REQUEST' (status=1)
Sat Jun 30 01:32:40 2018 us=103076 AUTH: Received control message: AUTH_FAILED
Sat Jun 30 01:32:40 2018 us=103076 TCP/UDP: Closing socket
Sat Jun 30 01:32:40 2018 us=103076 SIGUSR1[soft,auth-failure] received, process restarting
Sat Jun 30 01:32:40 2018 us=103076 MANAGEMENT: >STATE:1530336760,RECONNECTING,auth-failure,,,,,
Sat Jun 30 01:32:40 2018 us=103076 Restart pause, 5 second(s)
Sat Jun 30 01:32:45 2018 us=153152 Re-using SSL/TLS context
Sat Jun 30 01:32:45 2018 us=153152 LZO compression initializing
Sat Jun 30 01:32:45 2018 us=153152 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Jun 30 01:32:45 2018 us=153152 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sat Jun 30 01:32:45 2018 us=153152 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Jun 30 01:32:45 2018 us=153152 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Jun 30 01:32:45 2018 us=153152 TCP/UDP: Preserving recently used remote address: [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:45 2018 us=153152 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Jun 30 01:32:45 2018 us=153152 UDP link local: (not bound)
Sat Jun 30 01:32:45 2018 us=153152 UDP link remote: [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:45 2018 us=153152 MANAGEMENT: >STATE:1530336765,WAIT,,,,,,
Sat Jun 30 01:32:45 2018 us=168774 MANAGEMENT: >STATE:1530336765,AUTH,,,,,,
Sat Jun 30 01:32:45 2018 us=168774 TLS: Initial packet from [AF_INET]107.182.231.79:1197, sid=76ae5b00 ce33b3f6
Sat Jun 30 01:32:45 2018 us=231262 VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
Sat Jun 30 01:32:45 2018 us=231262 VERIFY KU OK
Sat Jun 30 01:32:45 2018 us=231262 Validating certificate extended key usage
Sat Jun 30 01:32:45 2018 us=231262 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Jun 30 01:32:45 2018 us=231262 VERIFY EKU OK
Sat Jun 30 01:32:45 2018 us=231262 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=e139dafe9702261606c50313497b829c, name=e139dafe9702261606c50313497b829c
Sat Jun 30 01:32:45 2018 us=337991 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Jun 30 01:32:45 2018 us=337991 [e139dafe9702261606c50313497b829c] Peer Connection Initiated with [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:46 2018 us=397707 MANAGEMENT: >STATE:1530336766,GET_CONFIG,,,,,,
Sat Jun 30 01:32:46 2018 us=397707 SENT CONTROL [e139dafe9702261606c50313497b829c]: 'PUSH_REQUEST' (status=1)
Sat Jun 30 01:32:46 2018 us=397707 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.55.10.1,topology net30,ifconfig 10.55.10.6 10.55.10.5,auth-token'
Sat Jun 30 01:32:46 2018 us=397707 Pushed option removed by filter: 'dhcp-option DNS 209.222.18.222'
Sat Jun 30 01:32:46 2018 us=397707 Pushed option removed by filter: 'dhcp-option DNS 209.222.18.218'
Sat Jun 30 01:32:46 2018 us=397707 auth-token received, disabling auth-nocache for the authentication token
Sat Jun 30 01:32:46 2018 us=397707 OPTIONS IMPORT: timers and/or timeouts modified
Sat Jun 30 01:32:46 2018 us=397707 OPTIONS IMPORT: compression parms modified
Sat Jun 30 01:32:46 2018 us=397707 OPTIONS IMPORT: --ifconfig/up options modified
Sat Jun 30 01:32:46 2018 us=397707 OPTIONS IMPORT: route options modified
Sat Jun 30 01:32:46 2018 us=397707 Data Channel MTU parms [ L:1570 D:1450 EF:70 EB:406 ET:0 EL:3 ]
Sat Jun 30 01:32:46 2018 us=397707 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Jun 30 01:32:46 2018 us=397707 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat Jun 30 01:32:46 2018 us=397707 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Jun 30 01:32:46 2018 us=397707 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat Jun 30 01:32:46 2018 us=397707 interactive service msg_channel=880
Sat Jun 30 01:32:46 2018 us=397707 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=15 HWADDR=70:85:c2:6c:0d:ea
Sat Jun 30 01:32:46 2018 us=428901 open_tun
Sat Jun 30 01:32:46 2018 us=428901 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{86ACEA81-E061-4917-A3DD-D4D6F12E414F}.tap
Sat Jun 30 01:32:46 2018 us=428901 TAP-Windows Driver Version 9.21 
Sat Jun 30 01:32:46 2018 us=428901 TAP-Windows MTU=1500
Sat Jun 30 01:32:46 2018 us=428901 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.55.10.6/255.255.255.252 on interface {86ACEA81-E061-4917-A3DD-D4D6F12E414F} [DHCP-serv: 10.55.10.5, lease-time: 31536000]
Sat Jun 30 01:32:46 2018 us=428901 Successful ARP Flush on interface [9] {86ACEA81-E061-4917-A3DD-D4D6F12E414F}
Sat Jun 30 01:32:46 2018 us=444498 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sat Jun 30 01:32:46 2018 us=444498 MANAGEMENT: >STATE:1530336766,ASSIGN_IP,,10.55.10.6,,,,
Sat Jun 30 01:32:46 2018 us=444498 write UDP: Unknown error (code=10065)
Sat Jun 30 01:32:46 2018 us=460120 write UDP: Unknown error (code=10065)
Sat Jun 30 01:32:52 2018 us=40548 TEST ROUTES: 11/11 succeeded len=10 ret=1 a=0 u/d=up
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 107.182.231.79 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.55.10.5
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.55.10.5
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 MANAGEMENT: >STATE:1530336772,ADD_ROUTES,,,,,,
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 52.208.108.2 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 52.210.134.93 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 34.249.151.238 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 52.18.234.21 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 52.211.233.249 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 34.248.194.188 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 34.246.147.206 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 54.77.87.2 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=56124 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=56124 C:\WINDOWS\system32\route.exe ADD 192.168.0.0 MASK 255.255.0.0 192.168.1.1
Sat Jun 30 01:32:52 2018 us=56124 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=56124 C:\WINDOWS\system32\route.exe ADD 10.55.10.1 MASK 255.255.255.255 10.55.10.5
Sat Jun 30 01:32:52 2018 us=56124 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=56124 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Jun 30 01:32:52 2018 us=56124 Initialization Sequence Completed
Sat Jun 30 01:32:52 2018 us=56124 MANAGEMENT: >STATE:1530336772,CONNECTED,SUCCESS,10.55.10.6,107.182.231.79,1197,,

ipconfig

Microsoft Windows [Version 10.0.17134.112]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Users\Tam>ipconfig /all

Windows IP Configuration

   Host Name . . . . . . . . . . . . : BADASSMACHINEV3
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Ethernet 4:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : ASIX AX88179 USB 3.0 to Gigabit Ethernet Adapter
   Physical Address. . . . . . . . . : 8C-AE-4C-F4-FA-A8
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Ethernet adapter Ethernet 3:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Intel(R) Ethernet Connection (2) I219-V
   Physical Address. . . . . . . . . : 70-85-C2-6C-0D-EA
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::619f:97f6:45ad:6d5%15(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.1.3(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Friday, June 29, 2018 12:23:24 AM
   Lease Expires . . . . . . . . . . : Saturday, June 30, 2018 11:24:47 PM
   Default Gateway . . . . . . . . . : 192.168.1.1
   DHCP Server . . . . . . . . . . . : 192.168.1.1
   DHCPv6 IAID . . . . . . . . . . . : 208700866
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-7E-CA-47-70-85-C2-6C-0D-EA
   DNS Servers . . . . . . . . . . . : 192.168.1.12
                                       192.168.1.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Ethernet 2:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-86-AC-EA-81
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::864:b419:207f:66f1%9(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.55.10.6(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.252
   Lease Obtained. . . . . . . . . . : Saturday, June 30, 2018 1:32:46 AM
   Lease Expires . . . . . . . . . . : Sunday, June 30, 2019 1:32:45 AM
   Default Gateway . . . . . . . . . :
   DHCP Server . . . . . . . . . . . : 10.55.10.5
   DHCPv6 IAID . . . . . . . . . . . : 151060358
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-7E-CA-47-70-85-C2-6C-0D-EA
   DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
                                       fec0:0:0:ffff::2%1
                                       fec0:0:0:ffff::3%1
   NetBIOS over Tcpip. . . . . . . . : Enabled

C:\Users\Tam>

route

Microsoft Windows [Version 10.0.17134.112]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Users\Tam>route print
===========================================================================
Interface List
 16...8c ae 4c f4 fa a8 ......ASIX AX88179 USB 3.0 to Gigabit Ethernet Adapter
 15...70 85 c2 6c 0d ea ......Intel(R) Ethernet Connection (2) I219-V
  9...00 ff 86 ac ea 81 ......TAP-Windows Adapter V9
  1...........................Software Loopback Interface 1
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1      192.168.1.3     25
          0.0.0.0        128.0.0.0       10.30.1.17       10.55.10.6     35
          0.0.0.0        128.0.0.0       10.30.1.13       10.55.10.6     35
          0.0.0.0        128.0.0.0        10.30.1.5       10.55.10.6     35
          0.0.0.0        128.0.0.0       10.55.10.5       10.55.10.6    291
        10.30.1.1  255.255.255.255       10.30.1.17       10.55.10.6     35
        10.30.1.1  255.255.255.255       10.30.1.13       10.55.10.6     35
        10.30.1.1  255.255.255.255        10.30.1.5       10.55.10.6     35
       10.55.10.1  255.255.255.255       10.55.10.5       10.55.10.6    291
       10.55.10.4  255.255.255.252         On-link        10.55.10.6    291
       10.55.10.6  255.255.255.255         On-link        10.55.10.6    291
       10.55.10.7  255.255.255.255         On-link        10.55.10.6    291
   34.246.147.206  255.255.255.255      192.168.1.1      192.168.1.3    281
   34.248.194.188  255.255.255.255      192.168.1.1      192.168.1.3    281
   34.249.151.238  255.255.255.255      192.168.1.1      192.168.1.3    281
     52.18.234.21  255.255.255.255      192.168.1.1      192.168.1.3    281
     52.208.108.2  255.255.255.255      192.168.1.1      192.168.1.3    281
    52.210.134.93  255.255.255.255      192.168.1.1      192.168.1.3    281
   52.211.233.249  255.255.255.255      192.168.1.1      192.168.1.3    281
       54.77.87.2  255.255.255.255      192.168.1.1      192.168.1.3    281
   107.182.231.79  255.255.255.255      192.168.1.1      192.168.1.3    281
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    331
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    331
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    331
        128.0.0.0        128.0.0.0       10.30.1.17       10.55.10.6     35
        128.0.0.0        128.0.0.0       10.30.1.13       10.55.10.6     35
        128.0.0.0        128.0.0.0        10.30.1.5       10.55.10.6     35
        128.0.0.0        128.0.0.0       10.55.10.5       10.55.10.6    291
      192.168.0.0      255.255.0.0      192.168.1.1      192.168.1.3    281
      192.168.1.0    255.255.255.0         On-link       192.168.1.3    281
      192.168.1.3  255.255.255.255         On-link       192.168.1.3    281
    192.168.1.255  255.255.255.255         On-link       192.168.1.3    281
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    331
        224.0.0.0        240.0.0.0         On-link        10.55.10.6    291
        224.0.0.0        240.0.0.0         On-link       192.168.1.3    281
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    331
  255.255.255.255  255.255.255.255         On-link        10.55.10.6    291
  255.255.255.255  255.255.255.255         On-link       192.168.1.3    281
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
  1    331 ::1/128                  On-link
  9    291 fe80::/64                On-link
 15    281 fe80::/64                On-link
  9    291 fe80::864:b419:207f:66f1/128
                                    On-link
 15    281 fe80::619f:97f6:45ad:6d5/128
                                    On-link
  1    331 ff00::/8                 On-link
  9    291 ff00::/8                 On-link
 15    281 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None

C:\Users\Tam>

Что не так проброшено\настроено?

конфиг сервера

spoiler

port 1194
;proto tcp
proto udp
;dev tap
dev tun
;dev-node MyTap
ca ca.crt
cert server.crt
key server.key
dh dh2048.pem
;topology subnet
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100
;server-bridge
;push «route 192.168.10.0 255.255.255.0»
;push «route 192.168.20.0 255.255.255.0»
;client-config-dir ccd
;route 192.168.40.128 255.255.255.248
;client-config-dir ccd
;route 10.9.0.0 255.255.255.252
;learn-address ./script
;push «redirect-gateway def1 bypass-dhcp»
;push «dhcp-option DNS 208.67.222.222»
;push «dhcp-option DNS 208.67.220.220»
;client-to-client
;duplicate-cn
keepalive 10 120
#tls-auth ta.key 0 # This file is secret
cipher AES-256-CBC
;compress lz4-v2
;push «compress lz4-v2»
;comp-lzo
;max-clients 100
;user nobody
;group nobody
persist-key
persist-tun
status openvpn-status.log
;log openvpn.log
;log-append openvpn.log
verb 3
;mute 20
explicit-exit-notify 1

На стороне сервера нет доступа к рутёру, но по моей просьбе пробросили UDP 1194 и 5194

Лог:

spoiler

Wed Jan 16 09:05:00 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Wed Jan 16 09:05:00 2019 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Jan 16 09:05:00 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
Wed Jan 16 09:05:00 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Wed Jan 16 09:05:00 2019 Need hold release from management interface, waiting…
Wed Jan 16 09:05:01 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘state on’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘log all on’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘echo all on’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘bytecount 5’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘hold off’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘hold release’
Wed Jan 16 09:05:01 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]79.122.152.6:1194
Wed Jan 16 09:05:01 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Jan 16 09:05:01 2019 UDP link local: (not bound)
Wed Jan 16 09:05:01 2019 UDP link remote: [AF_INET]79.122.152.6:1194
Wed Jan 16 09:05:01 2019 MANAGEMENT: >STATE:1547618701,WAIT,,,,,,
Wed Jan 16 09:05:01 2019 read UDP: Unknown error (code=10054)

Open VPN uncommonly chips away at your electronic cover. Oftentimes, Open VPN clients don’t work successfully and show up connection errors also. This Windows error message suggests the connection was reset. which probably implies you need either port sent viably or firewall planned exactly.

One such error is Open VPN error 10054. “Read UDP: Unknown Error (Code=10054)” happens when the OpenVPN server connection gets reset. Around here at ARZHOST, we address Open VPN connection errors for our customers as a part of our Managed VPN Services.

Today will see how our Hosting Expert Planners examine and fix OpenVPN error 10054.

What causes Open VPN error 10054?

OpenVPN manages a client-server model. In essential words, the OpenVPN client begins a relationship with the OpenVPN server. “Read UDP: Unknown Error (Code=10054)”, Further, all correspondence occurs through this channel. That is how OpenVPN manages the security of customer data.

Occasionally, when this connection is reset, it shows the slip-up:

  • ##Jan 23 17:41:39 2019 read UDP: Unknown mix-up (code=10054)
  • Jan 23 17:42:10 2019 TLS Error: TLS key trade fail to occur inside 60 seconds (truly investigate your association accessibility)
  • #Jan 23 17:42:10 2019 TLS Error: TLS handshake failed

This slip-up shows that the UDP bundles couldn’t go to the Open VPN server.

As of now, “Read UDP: Unknown Error (Code=10054)”, let’s see the top reasons that can cause this connection reset error.

1. Wrong firewall settings

VPN connection reset can happen given some unsuitable Firewall settings on the PC that runs the Open VPN client. As the firewall impedes the connection, the data packs don’t show up at the server.

To a great extent, “Read UDP: Unknown Error (Code=10054)”, even the firewall at the Internet Service Provider (ISP) moreover can cause Open VPN error.

Lately, when a customer uncovered issues with Open VPN error 10054, it was the ISP firewall affecting the connection. Here, the ISP switch was giving all of the devices a comparable public IP address, which made conflict.

2. Wrong port sending

Whenever VPN uses Network Address Translation otherwise called NAT firewall, then, there is a requirement for remote port sending. Here, port sending propels all moving toward a relationship with planning with the port number to within PC with the express area.

Regardless, when there are mistaken port sending rules set in the Open VPN server, it can again achieve Open VPN error 10054.

How do we fix Open VPN error 10054?

We just saw the ordinary purposes behind the error. As of now, “Read UDP: Unknown Error (Code=10054)”, let’s research how our Hosting Expert Planners fix the OpenVPN connection.

1. All things considered investigate server connection

First thing, we investigate the relationship between the home PC to the OpenVPN server. For this, we use the telnet request in the association

  • telnet <VPN address> <port>

Accepting the connection doesn’t fill in true to form. “Read UDP: Unknown Error (Code=10054)”, We then, mind the server side to check whether connections are showing up at the Open VPN server from this particular client.

2. Shocking firewall

On the off chance that connections are on no occasion, showing up at the server the client PC firewall will have an impact on it. To disengage this firewall dependence, our Dedicated Engineers prescribe customers to slow down the firewall and repeat the telnet check. For example, in the case of Windows customers, we demand that they cripple Windows Firewall absolutely and have a go at interfacing.

Again, if there are further screw-up messages, “Read UDP: Unknown Error (Code=10054)”, it suggests there is something past the PC firewall.

3. Adjust port sending rules

Presently, we check the port sending rules in the Open VPN server. We look for language errors in the rules and fix them. “Read UDP: Unknown Error (Code=10054)”, handles the Open VPN error 10054, and makes Open VPN end up extraordinary.

Conclusion

To lay it out simply, Open VPN error 10054 happens mainly due to firewall settings or wrong port sending rules in the Open VPN server. Today, “Read UDP: Unknown Error (Code=10054)”, we saw the normal clarifications behind the mistake and how our Hosting Expert Planners restore VPN openness.

People Also Ask

Question # 1: How do I fix network Socket Error 10054?

Answer: Solution 1. Check Peer Peer connection

  1. If the address of the computer or host is correct.
  2. The other computer or the host, if it is still on or disabled.
  3. Make sure the network between you and the other computer is still up.
  4. Check the network configuration of the other computer if it is unreachable.

Question # 2: What port should OpenVPN listen to?

Answer: By default, the OpenVPN Access Server comes configured with OpenVPN daemons that listen on port 1194 UDP, and OpenVPN daemons that listen on port 443 TCP. While the best connection for an OpenVPN tunnel is via the UDP port, we implement TCP 443 as a fallback method.

Read More———-

Question # 3: Does OpenVPN port forward?

Answer: One of the greatest benefits of OVPN is that it allows port forwarding when connected. By forwarding a port, you can, for example, run a web server on your device even though that device is connected to OVPN.

Question # 4: Where is the OpenVPN client config file?

Answer: 4. x subnet should have a port forward rule that says forward UDP port 1194 from my public IP address to 192.168. 4.4. Open up the server’s firewall to allow incoming connections to UDP port 1194 (or whatever TCP/UDP port you have configured in the server config file).

Question # 5: What is a socket error on the Internet speed test?

Answer: As it turns out, the ‘socket error’ when running an Internet speed test with your browser can be caused by your firewall – even if you’re using the built-in firewall (Windows Firewall). This scenario is most encountered on a Wi-Fi connection. Press Windows key + R to open up a Run dialog box. Next, type ‘firewall.

Понравилась статья? Поделить с друзьями:
  • Openserver ошибка файла hosts
  • Openserver ошибка приватности
  • Openserver ошибка при запуске 0xc000007b
  • Openserver ошибка запуска hosts
  • Openserver ошибка запуска apache