-
kovacg
- OpenVpn Newbie
- Posts: 7
- Joined: Wed Feb 21, 2018 4:47 pm
Unknown Error (Code=10054)
Hello,
i set up VPN connection on win7 due to manual. I was trying to connect with client, but there is problem.
Wed Feb 21 17:41:08 2018 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Wed Feb 21 17:41:08 2018 Windows version 6.1 (Windows 7) 64bit
Wed Feb 21 17:41:08 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Wed Feb 21 17:41:08 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Wed Feb 21 17:41:08 2018 Need hold release from management interface, waiting…
Wed Feb 21 17:41:09 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘state on’
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘log all on’
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘echo all on’
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘hold off’
Wed Feb 21 17:41:09 2018 MANAGEMENT: CMD ‘hold release’
Wed Feb 21 17:41:09 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.167.xxx.xxxx:1194
Wed Feb 21 17:41:09 2018 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Feb 21 17:41:09 2018 UDP link local: (not bound)
Wed Feb 21 17:41:09 2018 UDP link remote: [AF_INET]185.167.xxx.xxx:1194
Wed Feb 21 17:41:09 2018 MANAGEMENT: >STATE:1519231269,WAIT,,,,,,
Wed Feb 21 17:41:09 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:41:11 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:41:15 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:41:23 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:41:39 2018 read UDP: Unknown error (code=10054)
Wed Feb 21 17:42:10 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Wed Feb 21 17:42:10 2018 TLS Error: TLS handshake failed
My ISP can´t give me an private IP. So he forward port 1194 to my router. There I forward port 1194 to ip of my server.
Is that possible? Do you somebody know where could be a problem?
Thanks for your help and sorry for my bad english
-
TinCanTech
- OpenVPN Protagonist
- Posts: 11142
- Joined: Fri Jun 03, 2016 1:17 pm
Re: Unknown Error (Code=10054)
Post
by TinCanTech » Wed Feb 21, 2018 6:33 pm
Does your server show any connections from this client ?
-
kovacg
- OpenVpn Newbie
- Posts: 7
- Joined: Wed Feb 21, 2018 4:47 pm
Re: Unknown Error (Code=10054)
Post
by kovacg » Wed Feb 21, 2018 9:45 pm
I was tried make set up again. And now I have this error message: Connection reset by peer (WSAECONNRESET) (code=10054)
On the server, I can´t see anything.
Thank you
-
TinCanTech
- OpenVPN Protagonist
- Posts: 11142
- Joined: Fri Jun 03, 2016 1:17 pm
Re: Unknown Error (Code=10054)
Post
by TinCanTech » Wed Feb 21, 2018 10:05 pm
kovacg wrote: ↑
Wed Feb 21, 2018 9:45 pm
On the server, I can´t see anything.
Because the packets are not getting to your server.
kovacg wrote: ↑
Wed Feb 21, 2018 4:53 pm
My ISP can´t give me an private IP. So he forward port 1194 to my router. There I forward port 1194 to ip of my server.
Make sure the port is forwarded correctly .. maybe you can use DMZ on your router ?
-
kovacg
- OpenVpn Newbie
- Posts: 7
- Joined: Wed Feb 21, 2018 4:47 pm
Re: Unknown Error (Code=10054)
Post
by kovacg » Thu Feb 22, 2018 5:08 pm
I think ports are forwarded correctly.
This is forwarded from my ISP
this is forwarded from my Router
Routers IP is xxx.xxx.90.5 and server ip is xxx.xxx.5.254
I don´t know how to use DMZ.
-
TinCanTech
- OpenVPN Protagonist
- Posts: 11142
- Joined: Fri Jun 03, 2016 1:17 pm
Re: Unknown Error (Code=10054)
Post
by TinCanTech » Thu Feb 22, 2018 8:52 pm
kovacg wrote: ↑
Wed Feb 21, 2018 4:53 pm
read UDP: Unknown error (code=10054)
This Windows error message means the connection was reset .. which almost certainly means you have not got either port forwarded correctly or firewall configured correctly.
-
kovacg
- OpenVpn Newbie
- Posts: 7
- Joined: Wed Feb 21, 2018 4:47 pm
Re: Unknown Error (Code=10054)
Post
by kovacg » Thu Feb 22, 2018 10:36 pm
So it could be firewall problem?
-
RRGraphixGuy
- OpenVpn Newbie
- Posts: 1
- Joined: Wed Apr 01, 2020 2:23 pm
Re: Unknown Error (Code=10054)
Post
by RRGraphixGuy » Wed Apr 01, 2020 2:32 pm
kovacg wrote: ↑
Thu Feb 22, 2018 10:36 pm
So it could be firewall problem?
Not only Windows Firewall, but third-party anti-virus and/or anti-malware applications as well. I was very frustrated yesterday on a particular computer until I discovered Avast was installed on it and running its network and application shields. Simply add OpenVPN as exception, problem solved.
OpenVPN greatly improves your online privacy. Often, OpenVPN clients do not work correctly and show up connection errors too.
One such error is “OpenVPN error 10054“. Unfortunately, it happens when the OpenVPN server connection gets a reset.
At Bobcares, we solve OpenVPN connection errors for our customers as part of our Managed VPN Services.
Today, we’ll see how our Support Engineers diagnose and fix “OpenVPN error 10054”.
What causes “OpenVPN error 10054”?
OpenVPN works on a client-server model. In simple words, the OpenVPN client initiates a connection to the OpenVPN server. Further, all communication happens via this channel. That’s how OpenVPN take care of the privacy of user data.
At times, when this connection is reset, it shows the error:
Jan 23 17:41:39 2019 read UDP: Unknown error (code=10054)
Jan 23 17:42:10 2019 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Jan 23 17:42:10 2019 TLS Error: TLS handshake failed
This errors shows that the UDP packets could not make it to the OpenVPN server.
Now, let’s see the top reasons that can cause this connection reset error.
1. Wrong firewall settings
Primarily, VPN connection reset can happen due to the wrong Firewall settings on the computer that runs the OpenVPN client. As the firewall blocks the connection, the data packets do not even reach the server.
Sometimes, even the firewall at the Internet Service Provider (ISP) also can cause OpenVPN error.
Recently, when a customer reported problems with OpenVPN error 10054, it was the ISP firewall affecting the connection. Here, the ISP router was assigning all the devices the same public IP address, which created conflict.
2. Wrong port forwarding
Whenever VPN uses Network Address Translation aka NAT firewall, then there is a need for remote port forwarding. Here, port forwarding forwards all incoming connections with a matching port number to the internal computer with specific address.
However, when there are wrong port forwarding rules set in the OpenVPN server, it can again result in “OpenVPN error 10054.”
How we fix “OpenVPN error 10054”
We just saw the typical causes for the error. Now, let’s take a look on how our Support Engineers fix the OpenVPN connection.
1. Check server connection
Firstly, we check the connection from the home computer to the OpenVPN server. For this, we use the telnet command in the format
telnet
If the connection do not work properly, we then check on the server side to see if there are connections reaching the OpenVPN server from this particular client.
2. Disabling firewall
If connections are not even reaching the server, obviously the client computer firewall will have a role in it. To isolate this firewall dependency, our Dedicated Engineers suggest customers to completely turn off firewall and repeat the telnet check. For example, in case of Windows customers, we ask them to disable Windows Firewall completely and try connecting.
Again, if there are further error messages, it means there is something beyond the computer firewall.
3. Edit port forwarding rules
At this point, we check the port forwarding rules in the OpenVPN server. We look for typos in the rules and fix them. That solves the OpenVPN error 10054, and make OpenVPN work fine.
[Are you getting “OpenVPN error 10054“? Our VPN experts can easily fix it for you.]
Conclusion
In short, OpenVPN error 10054 happens mainly due to firewall settings or wrong port forwarding rules in the OpenVPN server. Today, we saw the typical reasons for the error and how our Support Engineers restore VPN connectivity.
PREVENT YOUR SERVER FROM CRASHING!
Never again lose customers to poor server speed! Let us help you.
Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.
GET STARTED
var google_conversion_label = «owonCMyG5nEQ0aD71QM»;
ovpn log:
Sat Jun 30 00:05:17 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Sat Jun 30 00:05:17 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Sat Jun 30 00:05:17 2018 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
Enter Management Password:
Sat Jun 30 00:05:17 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]107.182.231.79:1197
Sat Jun 30 00:05:17 2018 UDP link local: (not bound)
Sat Jun 30 00:05:17 2018 UDP link remote: [AF_INET]107.182.231.79:1197
Sat Jun 30 00:05:18 2018 [e139dafe9702261606c50313497b829c] Peer Connection Initiated with [AF_INET]107.182.231.79:1197
Sat Jun 30 00:05:19 2018 auth-token received, disabling auth-nocache for the authentication token
Sat Jun 30 00:05:19 2018 open_tun
Sat Jun 30 00:05:19 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{86ACEA81-E061-4917-A3DD-D4D6F12E414F}.tap
Sat Jun 30 00:05:19 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.15.10.6/255.255.255.252 on interface {86ACEA81-E061-4917-A3DD-D4D6F12E414F} [DHCP-serv: 10.15.10.5, lease-time: 31536000]
Sat Jun 30 00:05:19 2018 Successful ARP Flush on interface [9] {86ACEA81-E061-4917-A3DD-D4D6F12E414F}
Sat Jun 30 00:05:19 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sat Jun 30 00:05:19 2018 write UDP: Unknown error (code=10065)
Sat Jun 30 00:05:19 2018 write UDP: Unknown error (code=10065)
Sat Jun 30 00:05:24 2018 Initialization Sequence Completed
Sat Jun 30 01:32:33 2018 SIGHUP[hard,] received, process restarting
Sat Jun 30 01:32:33 2018 us=722754 Current Parameter Settings:
Sat Jun 30 01:32:33 2018 us=722754 config = 'NYC.ovpn'
Sat Jun 30 01:32:33 2018 us=722754 mode = 0
Sat Jun 30 01:32:33 2018 us=722754 show_ciphers = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 show_digests = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 show_engines = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 genkey = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 key_pass_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 show_tls_ciphers = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 connect_retry_max = 0
Sat Jun 30 01:32:33 2018 us=722754 Connection profiles [0]:
Sat Jun 30 01:32:33 2018 us=722754 proto = udp
Sat Jun 30 01:32:33 2018 us=722754 local = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 local_port = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 remote = 'us-newyorkcity.privateinternetaccess.com'
Sat Jun 30 01:32:33 2018 us=722754 remote_port = '1197'
Sat Jun 30 01:32:33 2018 us=722754 remote_float = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 bind_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 bind_local = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 bind_ipv6_only = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 connect_retry_seconds = 5
Sat Jun 30 01:32:33 2018 us=722754 connect_timeout = 120
Sat Jun 30 01:32:33 2018 us=722754 socks_proxy_server = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 socks_proxy_port = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 tun_mtu = 1500
Sat Jun 30 01:32:33 2018 us=722754 tun_mtu_defined = ENABLED
Sat Jun 30 01:32:33 2018 us=722754 link_mtu = 1500
Sat Jun 30 01:32:33 2018 us=722754 link_mtu_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 tun_mtu_extra = 0
Sat Jun 30 01:32:33 2018 us=722754 tun_mtu_extra_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 mtu_discover_type = -1
Sat Jun 30 01:32:33 2018 us=722754 fragment = 0
Sat Jun 30 01:32:33 2018 us=722754 mssfix = 1450
Sat Jun 30 01:32:33 2018 us=722754 explicit_exit_notification = 0
Sat Jun 30 01:32:33 2018 us=722754 Connection profiles END
Sat Jun 30 01:32:33 2018 us=722754 remote_random = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 ipchange = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 dev = 'tun'
Sat Jun 30 01:32:33 2018 us=722754 dev_type = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 dev_node = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 lladdr = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 topology = 1
Sat Jun 30 01:32:33 2018 us=722754 ifconfig_local = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 ifconfig_remote_netmask = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 ifconfig_noexec = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 ifconfig_nowarn = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 ifconfig_ipv6_local = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 ifconfig_ipv6_netbits = 0
Sat Jun 30 01:32:33 2018 us=722754 ifconfig_ipv6_remote = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 shaper = 0
Sat Jun 30 01:32:33 2018 us=722754 mtu_test = 0
Sat Jun 30 01:32:33 2018 us=722754 mlock = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 keepalive_ping = 0
Sat Jun 30 01:32:33 2018 us=722754 keepalive_timeout = 0
Sat Jun 30 01:32:33 2018 us=722754 inactivity_timeout = 0
Sat Jun 30 01:32:33 2018 us=722754 ping_send_timeout = 0
Sat Jun 30 01:32:33 2018 us=722754 ping_rec_timeout = 0
Sat Jun 30 01:32:33 2018 us=722754 ping_rec_timeout_action = 0
Sat Jun 30 01:32:33 2018 us=722754 ping_timer_remote = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 remap_sigusr1 = 0
Sat Jun 30 01:32:33 2018 us=722754 persist_tun = ENABLED
Sat Jun 30 01:32:33 2018 us=722754 persist_local_ip = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 persist_remote_ip = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 persist_key = ENABLED
Sat Jun 30 01:32:33 2018 us=722754 passtos = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 resolve_retry_seconds = 1000000000
Sat Jun 30 01:32:33 2018 us=722754 resolve_in_advance = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 username = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 groupname = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 chroot_dir = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 cd_dir = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 writepid = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 up_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 down_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 down_pre = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 up_restart = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 up_delay = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 daemon = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 inetd = 0
Sat Jun 30 01:32:33 2018 us=722754 log = ENABLED
Sat Jun 30 01:32:33 2018 us=722754 suppress_timestamps = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 machine_readable_output = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 nice = 0
Sat Jun 30 01:32:33 2018 us=722754 verbosity = 4
Sat Jun 30 01:32:33 2018 us=722754 mute = 0
Sat Jun 30 01:32:33 2018 us=722754 gremlin = 0
Sat Jun 30 01:32:33 2018 us=722754 status_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 status_file_version = 1
Sat Jun 30 01:32:33 2018 us=722754 status_file_update_freq = 60
Sat Jun 30 01:32:33 2018 us=722754 occ = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 rcvbuf = 0
Sat Jun 30 01:32:33 2018 us=722754 sndbuf = 0
Sat Jun 30 01:32:33 2018 us=722754 sockflags = 0
Sat Jun 30 01:32:33 2018 us=722754 fast_io = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 comp.alg = 2
Sat Jun 30 01:32:33 2018 us=722754 comp.flags = 1
Sat Jun 30 01:32:33 2018 us=722754 route_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 route_default_gateway = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 route_default_metric = 0
Sat Jun 30 01:32:33 2018 us=722754 route_noexec = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 route_delay = 5
Sat Jun 30 01:32:33 2018 us=722754 route_delay_window = 30
Sat Jun 30 01:32:33 2018 us=722754 route_delay_defined = ENABLED
Sat Jun 30 01:32:33 2018 us=722754 route_nopull = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 route_gateway_via_dhcp = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 allow_pull_fqdn = DISABLED
Sat Jun 30 01:32:33 2018 us=722754 Pull filters:
Sat Jun 30 01:32:33 2018 us=722754 ignore "dhcp-option DNS"
Sat Jun 30 01:32:33 2018 us=722754 route 192.168.0.0/255.255.0.0/192.168.1.1/default (not set)
Sat Jun 30 01:32:33 2018 us=722754 route plex.tv/255.255.255.255/192.168.1.1/default (not set)
Sat Jun 30 01:32:33 2018 us=722754 management_addr = '127.0.0.1'
Sat Jun 30 01:32:33 2018 us=722754 management_port = '25340'
Sat Jun 30 01:32:33 2018 us=722754 management_user_pass = 'stdin'
Sat Jun 30 01:32:33 2018 us=722754 management_log_history_cache = 250
Sat Jun 30 01:32:33 2018 us=722754 management_echo_buffer_size = 100
Sat Jun 30 01:32:33 2018 us=722754 management_write_peer_info_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 management_client_user = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 management_client_group = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=722754 management_flags = 6
Sat Jun 30 01:32:33 2018 us=722754 shared_secret_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=738375 key_direction = not set
Sat Jun 30 01:32:33 2018 us=738375 ciphername = 'aes-256-cbc'
Sat Jun 30 01:32:33 2018 us=738375 ncp_enabled = ENABLED
Sat Jun 30 01:32:33 2018 us=738375 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
Sat Jun 30 01:32:33 2018 us=738375 authname = 'sha256'
Sat Jun 30 01:32:33 2018 us=738375 prng_hash = 'SHA1'
Sat Jun 30 01:32:33 2018 us=738375 prng_nonce_secret_len = 16
Sat Jun 30 01:32:33 2018 us=738375 keysize = 0
Sat Jun 30 01:32:33 2018 us=738375 engine = DISABLED
Sat Jun 30 01:32:33 2018 us=738375 replay = ENABLED
Sat Jun 30 01:32:33 2018 us=738375 mute_replay_warnings = ENABLED
Sat Jun 30 01:32:33 2018 us=738375 replay_window = 64
Sat Jun 30 01:32:33 2018 us=738375 replay_time = 15
Sat Jun 30 01:32:33 2018 us=738375 packet_id_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=738375 use_iv = ENABLED
Sat Jun 30 01:32:33 2018 us=738375 test_crypto = DISABLED
Sat Jun 30 01:32:33 2018 us=738375 tls_server = DISABLED
Sat Jun 30 01:32:33 2018 us=738375 tls_client = ENABLED
Sat Jun 30 01:32:33 2018 us=738375 key_method = 2
Sat Jun 30 01:32:33 2018 us=738375 ca_file = 'ca.rsa.4096.crt'
Sat Jun 30 01:32:33 2018 us=739062 ca_path = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 dh_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 cert_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 extra_certs_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 priv_key_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 pkcs12_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 cryptoapi_cert = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 cipher_list = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 tls_cert_profile = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 tls_verify = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 tls_export_cert = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 verify_x509_type = 0
Sat Jun 30 01:32:33 2018 us=739062 verify_x509_name = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=739062 crl_file = 'crl.rsa.4096.pem'
Sat Jun 30 01:32:33 2018 us=739062 ns_cert_type = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 65535
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=739062 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=740058 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=740058 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=740058 remote_cert_ku[i] = 0
Sat Jun 30 01:32:33 2018 us=740058 remote_cert_eku = 'TLS Web Server Authentication'
Sat Jun 30 01:32:33 2018 us=740058 ssl_flags = 0
Sat Jun 30 01:32:33 2018 us=740058 tls_timeout = 2
Sat Jun 30 01:32:33 2018 us=740058 renegotiate_bytes = -1
Sat Jun 30 01:32:33 2018 us=740058 renegotiate_packets = 0
Sat Jun 30 01:32:33 2018 us=740058 renegotiate_seconds = 0
Sat Jun 30 01:32:33 2018 us=740058 handshake_window = 60
Sat Jun 30 01:32:33 2018 us=740058 transition_window = 3600
Sat Jun 30 01:32:33 2018 us=740058 single_session = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 push_peer_info = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 tls_exit = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 tls_auth_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=740058 tls_crypt_file = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=740058 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_protected_authentication = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_private_mode = 00000000
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=741055 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_cert_private = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_pin_cache_period = -1
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_id = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=742052 pkcs11_id_management = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 server_network = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052 server_netmask = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052 server_network_ipv6 = ::
Sat Jun 30 01:32:33 2018 us=742052 server_netbits_ipv6 = 0
Sat Jun 30 01:32:33 2018 us=742052 server_bridge_ip = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052 server_bridge_netmask = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052 server_bridge_pool_start = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052 server_bridge_pool_end = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052 ifconfig_pool_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 ifconfig_pool_start = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052 ifconfig_pool_end = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052 ifconfig_pool_netmask = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=742052 ifconfig_pool_persist_filename = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=742052 ifconfig_pool_persist_refresh_freq = 600
Sat Jun 30 01:32:33 2018 us=742052 ifconfig_ipv6_pool_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=742052 ifconfig_ipv6_pool_base = ::
Sat Jun 30 01:32:33 2018 us=742052 ifconfig_ipv6_pool_netbits = 0
Sat Jun 30 01:32:33 2018 us=742052 n_bcast_buf = 256
Sat Jun 30 01:32:33 2018 us=742052 tcp_queue_limit = 64
Sat Jun 30 01:32:33 2018 us=743050 real_hash_size = 256
Sat Jun 30 01:32:33 2018 us=743050 virtual_hash_size = 256
Sat Jun 30 01:32:33 2018 us=743050 client_connect_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050 learn_address_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050 client_disconnect_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050 client_config_dir = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050 ccd_exclusive = DISABLED
Sat Jun 30 01:32:33 2018 us=743050 tmp_dir = 'C:\Users\Tam\AppData\Local\Temp\'
Sat Jun 30 01:32:33 2018 us=743050 push_ifconfig_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=743050 push_ifconfig_local = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=743050 push_ifconfig_remote_netmask = 0.0.0.0
Sat Jun 30 01:32:33 2018 us=743050 push_ifconfig_ipv6_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=743050 push_ifconfig_ipv6_local = ::/0
Sat Jun 30 01:32:33 2018 us=743050 push_ifconfig_ipv6_remote = ::
Sat Jun 30 01:32:33 2018 us=743050 enable_c2c = DISABLED
Sat Jun 30 01:32:33 2018 us=743050 duplicate_cn = DISABLED
Sat Jun 30 01:32:33 2018 us=743050 cf_max = 0
Sat Jun 30 01:32:33 2018 us=743050 cf_per = 0
Sat Jun 30 01:32:33 2018 us=743050 max_clients = 1024
Sat Jun 30 01:32:33 2018 us=743050 max_routes_per_client = 256
Sat Jun 30 01:32:33 2018 us=743050 auth_user_pass_verify_script = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=743050 auth_user_pass_verify_script_via_file = DISABLED
Sat Jun 30 01:32:33 2018 us=743050 auth_token_generate = DISABLED
Sat Jun 30 01:32:33 2018 us=743050 auth_token_lifetime = 0
Sat Jun 30 01:32:33 2018 us=743050 client = ENABLED
Sat Jun 30 01:32:33 2018 us=743050 pull = ENABLED
Sat Jun 30 01:32:33 2018 us=743050 auth_user_pass_file = 'passwd.txt'
Sat Jun 30 01:32:33 2018 us=743050 show_net_up = DISABLED
Sat Jun 30 01:32:33 2018 us=743050 route_method = 3
Sat Jun 30 01:32:33 2018 us=743050 block_outside_dns = DISABLED
Sat Jun 30 01:32:33 2018 us=744047 ip_win32_defined = DISABLED
Sat Jun 30 01:32:33 2018 us=744047 ip_win32_type = 3
Sat Jun 30 01:32:33 2018 us=744047 dhcp_masq_offset = 0
Sat Jun 30 01:32:33 2018 us=744047 dhcp_lease_time = 31536000
Sat Jun 30 01:32:33 2018 us=744047 tap_sleep = 0
Sat Jun 30 01:32:33 2018 us=744047 dhcp_options = DISABLED
Sat Jun 30 01:32:33 2018 us=744047 dhcp_renew = DISABLED
Sat Jun 30 01:32:33 2018 us=744047 dhcp_pre_release = DISABLED
Sat Jun 30 01:32:33 2018 us=744047 domain = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=744047 netbios_scope = '[UNDEF]'
Sat Jun 30 01:32:33 2018 us=744047 netbios_node_type = 0
Sat Jun 30 01:32:33 2018 us=744047 disable_nbt = DISABLED
Sat Jun 30 01:32:33 2018 us=744047 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Sat Jun 30 01:32:33 2018 us=744047 Windows version 6.2 (Windows 8 or greater) 64bit
Sat Jun 30 01:32:33 2018 us=744047 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
Sat Jun 30 01:32:33 2018 us=744047 Restart pause, 5 second(s)
Sat Jun 30 01:32:38 2018 us=783086 LZO compression initializing
Sat Jun 30 01:32:38 2018 us=783086 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Jun 30 01:32:38 2018 us=783086 MANAGEMENT: >STATE:1530336758,RESOLVE,,,,,,
Sat Jun 30 01:32:38 2018 us=783086 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sat Jun 30 01:32:38 2018 us=783086 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Jun 30 01:32:38 2018 us=783086 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Jun 30 01:32:38 2018 us=783086 TCP/UDP: Preserving recently used remote address: [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:38 2018 us=783086 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Jun 30 01:32:38 2018 us=783086 UDP link local: (not bound)
Sat Jun 30 01:32:38 2018 us=783086 UDP link remote: [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:38 2018 us=783086 MANAGEMENT: >STATE:1530336758,WAIT,,,,,,
Sat Jun 30 01:32:38 2018 us=798655 MANAGEMENT: >STATE:1530336758,AUTH,,,,,,
Sat Jun 30 01:32:38 2018 us=798655 TLS: Initial packet from [AF_INET]107.182.231.79:1197, sid=675a3fd6 be2fc259
Sat Jun 30 01:32:38 2018 us=864547 VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
Sat Jun 30 01:32:38 2018 us=864547 VERIFY KU OK
Sat Jun 30 01:32:38 2018 us=864547 Validating certificate extended key usage
Sat Jun 30 01:32:38 2018 us=864547 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Jun 30 01:32:38 2018 us=864547 VERIFY EKU OK
Sat Jun 30 01:32:38 2018 us=864547 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=e139dafe9702261606c50313497b829c, name=e139dafe9702261606c50313497b829c
Sat Jun 30 01:32:38 2018 us=942702 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Jun 30 01:32:38 2018 us=942702 [e139dafe9702261606c50313497b829c] Peer Connection Initiated with [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:40 2018 us=84250 MANAGEMENT: >STATE:1530336760,GET_CONFIG,,,,,,
Sat Jun 30 01:32:40 2018 us=84250 SENT CONTROL [e139dafe9702261606c50313497b829c]: 'PUSH_REQUEST' (status=1)
Sat Jun 30 01:32:40 2018 us=103076 AUTH: Received control message: AUTH_FAILED
Sat Jun 30 01:32:40 2018 us=103076 TCP/UDP: Closing socket
Sat Jun 30 01:32:40 2018 us=103076 SIGUSR1[soft,auth-failure] received, process restarting
Sat Jun 30 01:32:40 2018 us=103076 MANAGEMENT: >STATE:1530336760,RECONNECTING,auth-failure,,,,,
Sat Jun 30 01:32:40 2018 us=103076 Restart pause, 5 second(s)
Sat Jun 30 01:32:45 2018 us=153152 Re-using SSL/TLS context
Sat Jun 30 01:32:45 2018 us=153152 LZO compression initializing
Sat Jun 30 01:32:45 2018 us=153152 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Sat Jun 30 01:32:45 2018 us=153152 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
Sat Jun 30 01:32:45 2018 us=153152 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'
Sat Jun 30 01:32:45 2018 us=153152 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'
Sat Jun 30 01:32:45 2018 us=153152 TCP/UDP: Preserving recently used remote address: [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:45 2018 us=153152 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Jun 30 01:32:45 2018 us=153152 UDP link local: (not bound)
Sat Jun 30 01:32:45 2018 us=153152 UDP link remote: [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:45 2018 us=153152 MANAGEMENT: >STATE:1530336765,WAIT,,,,,,
Sat Jun 30 01:32:45 2018 us=168774 MANAGEMENT: >STATE:1530336765,AUTH,,,,,,
Sat Jun 30 01:32:45 2018 us=168774 TLS: Initial packet from [AF_INET]107.182.231.79:1197, sid=76ae5b00 ce33b3f6
Sat Jun 30 01:32:45 2018 us=231262 VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
Sat Jun 30 01:32:45 2018 us=231262 VERIFY KU OK
Sat Jun 30 01:32:45 2018 us=231262 Validating certificate extended key usage
Sat Jun 30 01:32:45 2018 us=231262 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Jun 30 01:32:45 2018 us=231262 VERIFY EKU OK
Sat Jun 30 01:32:45 2018 us=231262 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=e139dafe9702261606c50313497b829c, name=e139dafe9702261606c50313497b829c
Sat Jun 30 01:32:45 2018 us=337991 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Jun 30 01:32:45 2018 us=337991 [e139dafe9702261606c50313497b829c] Peer Connection Initiated with [AF_INET]107.182.231.79:1197
Sat Jun 30 01:32:46 2018 us=397707 MANAGEMENT: >STATE:1530336766,GET_CONFIG,,,,,,
Sat Jun 30 01:32:46 2018 us=397707 SENT CONTROL [e139dafe9702261606c50313497b829c]: 'PUSH_REQUEST' (status=1)
Sat Jun 30 01:32:46 2018 us=397707 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.55.10.1,topology net30,ifconfig 10.55.10.6 10.55.10.5,auth-token'
Sat Jun 30 01:32:46 2018 us=397707 Pushed option removed by filter: 'dhcp-option DNS 209.222.18.222'
Sat Jun 30 01:32:46 2018 us=397707 Pushed option removed by filter: 'dhcp-option DNS 209.222.18.218'
Sat Jun 30 01:32:46 2018 us=397707 auth-token received, disabling auth-nocache for the authentication token
Sat Jun 30 01:32:46 2018 us=397707 OPTIONS IMPORT: timers and/or timeouts modified
Sat Jun 30 01:32:46 2018 us=397707 OPTIONS IMPORT: compression parms modified
Sat Jun 30 01:32:46 2018 us=397707 OPTIONS IMPORT: --ifconfig/up options modified
Sat Jun 30 01:32:46 2018 us=397707 OPTIONS IMPORT: route options modified
Sat Jun 30 01:32:46 2018 us=397707 Data Channel MTU parms [ L:1570 D:1450 EF:70 EB:406 ET:0 EL:3 ]
Sat Jun 30 01:32:46 2018 us=397707 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Jun 30 01:32:46 2018 us=397707 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat Jun 30 01:32:46 2018 us=397707 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Sat Jun 30 01:32:46 2018 us=397707 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat Jun 30 01:32:46 2018 us=397707 interactive service msg_channel=880
Sat Jun 30 01:32:46 2018 us=397707 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=15 HWADDR=70:85:c2:6c:0d:ea
Sat Jun 30 01:32:46 2018 us=428901 open_tun
Sat Jun 30 01:32:46 2018 us=428901 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{86ACEA81-E061-4917-A3DD-D4D6F12E414F}.tap
Sat Jun 30 01:32:46 2018 us=428901 TAP-Windows Driver Version 9.21
Sat Jun 30 01:32:46 2018 us=428901 TAP-Windows MTU=1500
Sat Jun 30 01:32:46 2018 us=428901 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.55.10.6/255.255.255.252 on interface {86ACEA81-E061-4917-A3DD-D4D6F12E414F} [DHCP-serv: 10.55.10.5, lease-time: 31536000]
Sat Jun 30 01:32:46 2018 us=428901 Successful ARP Flush on interface [9] {86ACEA81-E061-4917-A3DD-D4D6F12E414F}
Sat Jun 30 01:32:46 2018 us=444498 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sat Jun 30 01:32:46 2018 us=444498 MANAGEMENT: >STATE:1530336766,ASSIGN_IP,,10.55.10.6,,,,
Sat Jun 30 01:32:46 2018 us=444498 write UDP: Unknown error (code=10065)
Sat Jun 30 01:32:46 2018 us=460120 write UDP: Unknown error (code=10065)
Sat Jun 30 01:32:52 2018 us=40548 TEST ROUTES: 11/11 succeeded len=10 ret=1 a=0 u/d=up
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 107.182.231.79 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.55.10.5
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.55.10.5
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 MANAGEMENT: >STATE:1530336772,ADD_ROUTES,,,,,,
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 52.208.108.2 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 52.210.134.93 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 34.249.151.238 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 52.18.234.21 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 52.211.233.249 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 34.248.194.188 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 34.246.147.206 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=40548 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=40548 C:\WINDOWS\system32\route.exe ADD 54.77.87.2 MASK 255.255.255.255 192.168.1.1
Sat Jun 30 01:32:52 2018 us=56124 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=56124 C:\WINDOWS\system32\route.exe ADD 192.168.0.0 MASK 255.255.0.0 192.168.1.1
Sat Jun 30 01:32:52 2018 us=56124 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=56124 C:\WINDOWS\system32\route.exe ADD 10.55.10.1 MASK 255.255.255.255 10.55.10.5
Sat Jun 30 01:32:52 2018 us=56124 Route addition via service succeeded
Sat Jun 30 01:32:52 2018 us=56124 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Jun 30 01:32:52 2018 us=56124 Initialization Sequence Completed
Sat Jun 30 01:32:52 2018 us=56124 MANAGEMENT: >STATE:1530336772,CONNECTED,SUCCESS,10.55.10.6,107.182.231.79,1197,,
ipconfig
Microsoft Windows [Version 10.0.17134.112]
(c) 2018 Microsoft Corporation. All rights reserved.
C:\Users\Tam>ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : BADASSMACHINEV3
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
Ethernet adapter Ethernet 4:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : ASIX AX88179 USB 3.0 to Gigabit Ethernet Adapter
Physical Address. . . . . . . . . : 8C-AE-4C-F4-FA-A8
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Ethernet adapter Ethernet 3:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) Ethernet Connection (2) I219-V
Physical Address. . . . . . . . . : 70-85-C2-6C-0D-EA
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::619f:97f6:45ad:6d5%15(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.3(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Friday, June 29, 2018 12:23:24 AM
Lease Expires . . . . . . . . . . : Saturday, June 30, 2018 11:24:47 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 208700866
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-7E-CA-47-70-85-C2-6C-0D-EA
DNS Servers . . . . . . . . . . . : 192.168.1.12
192.168.1.1
NetBIOS over Tcpip. . . . . . . . : Enabled
Ethernet adapter Ethernet 2:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : TAP-Windows Adapter V9
Physical Address. . . . . . . . . : 00-FF-86-AC-EA-81
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::864:b419:207f:66f1%9(Preferred)
IPv4 Address. . . . . . . . . . . : 10.55.10.6(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.252
Lease Obtained. . . . . . . . . . : Saturday, June 30, 2018 1:32:46 AM
Lease Expires . . . . . . . . . . : Sunday, June 30, 2019 1:32:45 AM
Default Gateway . . . . . . . . . :
DHCP Server . . . . . . . . . . . : 10.55.10.5
DHCPv6 IAID . . . . . . . . . . . : 151060358
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-7E-CA-47-70-85-C2-6C-0D-EA
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled
C:\Users\Tam>
route
Microsoft Windows [Version 10.0.17134.112]
(c) 2018 Microsoft Corporation. All rights reserved.
C:\Users\Tam>route print
===========================================================================
Interface List
16...8c ae 4c f4 fa a8 ......ASIX AX88179 USB 3.0 to Gigabit Ethernet Adapter
15...70 85 c2 6c 0d ea ......Intel(R) Ethernet Connection (2) I219-V
9...00 ff 86 ac ea 81 ......TAP-Windows Adapter V9
1...........................Software Loopback Interface 1
===========================================================================
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.3 25
0.0.0.0 128.0.0.0 10.30.1.17 10.55.10.6 35
0.0.0.0 128.0.0.0 10.30.1.13 10.55.10.6 35
0.0.0.0 128.0.0.0 10.30.1.5 10.55.10.6 35
0.0.0.0 128.0.0.0 10.55.10.5 10.55.10.6 291
10.30.1.1 255.255.255.255 10.30.1.17 10.55.10.6 35
10.30.1.1 255.255.255.255 10.30.1.13 10.55.10.6 35
10.30.1.1 255.255.255.255 10.30.1.5 10.55.10.6 35
10.55.10.1 255.255.255.255 10.55.10.5 10.55.10.6 291
10.55.10.4 255.255.255.252 On-link 10.55.10.6 291
10.55.10.6 255.255.255.255 On-link 10.55.10.6 291
10.55.10.7 255.255.255.255 On-link 10.55.10.6 291
34.246.147.206 255.255.255.255 192.168.1.1 192.168.1.3 281
34.248.194.188 255.255.255.255 192.168.1.1 192.168.1.3 281
34.249.151.238 255.255.255.255 192.168.1.1 192.168.1.3 281
52.18.234.21 255.255.255.255 192.168.1.1 192.168.1.3 281
52.208.108.2 255.255.255.255 192.168.1.1 192.168.1.3 281
52.210.134.93 255.255.255.255 192.168.1.1 192.168.1.3 281
52.211.233.249 255.255.255.255 192.168.1.1 192.168.1.3 281
54.77.87.2 255.255.255.255 192.168.1.1 192.168.1.3 281
107.182.231.79 255.255.255.255 192.168.1.1 192.168.1.3 281
127.0.0.0 255.0.0.0 On-link 127.0.0.1 331
127.0.0.1 255.255.255.255 On-link 127.0.0.1 331
127.255.255.255 255.255.255.255 On-link 127.0.0.1 331
128.0.0.0 128.0.0.0 10.30.1.17 10.55.10.6 35
128.0.0.0 128.0.0.0 10.30.1.13 10.55.10.6 35
128.0.0.0 128.0.0.0 10.30.1.5 10.55.10.6 35
128.0.0.0 128.0.0.0 10.55.10.5 10.55.10.6 291
192.168.0.0 255.255.0.0 192.168.1.1 192.168.1.3 281
192.168.1.0 255.255.255.0 On-link 192.168.1.3 281
192.168.1.3 255.255.255.255 On-link 192.168.1.3 281
192.168.1.255 255.255.255.255 On-link 192.168.1.3 281
224.0.0.0 240.0.0.0 On-link 127.0.0.1 331
224.0.0.0 240.0.0.0 On-link 10.55.10.6 291
224.0.0.0 240.0.0.0 On-link 192.168.1.3 281
255.255.255.255 255.255.255.255 On-link 127.0.0.1 331
255.255.255.255 255.255.255.255 On-link 10.55.10.6 291
255.255.255.255 255.255.255.255 On-link 192.168.1.3 281
===========================================================================
Persistent Routes:
None
IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
1 331 ::1/128 On-link
9 291 fe80::/64 On-link
15 281 fe80::/64 On-link
9 291 fe80::864:b419:207f:66f1/128
On-link
15 281 fe80::619f:97f6:45ad:6d5/128
On-link
1 331 ff00::/8 On-link
9 291 ff00::/8 On-link
15 281 ff00::/8 On-link
===========================================================================
Persistent Routes:
None
C:\Users\Tam>
Что не так проброшено\настроено?
конфиг сервера
spoiler
port 1194
;proto tcp
proto udp
;dev tap
dev tun
;dev-node MyTap
ca ca.crt
cert server.crt
key server.key
dh dh2048.pem
;topology subnet
server 10.8.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100
;server-bridge
;push «route 192.168.10.0 255.255.255.0»
;push «route 192.168.20.0 255.255.255.0»
;client-config-dir ccd
;route 192.168.40.128 255.255.255.248
;client-config-dir ccd
;route 10.9.0.0 255.255.255.252
;learn-address ./script
;push «redirect-gateway def1 bypass-dhcp»
;push «dhcp-option DNS 208.67.222.222»
;push «dhcp-option DNS 208.67.220.220»
;client-to-client
;duplicate-cn
keepalive 10 120
#tls-auth ta.key 0 # This file is secret
cipher AES-256-CBC
;compress lz4-v2
;push «compress lz4-v2»
;comp-lzo
;max-clients 100
;user nobody
;group nobody
persist-key
persist-tun
status openvpn-status.log
;log openvpn.log
;log-append openvpn.log
verb 3
;mute 20
explicit-exit-notify 1
На стороне сервера нет доступа к рутёру, но по моей просьбе пробросили UDP 1194 и 5194
Лог:
spoiler
Wed Jan 16 09:05:00 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
Wed Jan 16 09:05:00 2019 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Jan 16 09:05:00 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
Wed Jan 16 09:05:00 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Wed Jan 16 09:05:00 2019 Need hold release from management interface, waiting…
Wed Jan 16 09:05:01 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘state on’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘log all on’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘echo all on’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘bytecount 5’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘hold off’
Wed Jan 16 09:05:01 2019 MANAGEMENT: CMD ‘hold release’
Wed Jan 16 09:05:01 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]79.122.152.6:1194
Wed Jan 16 09:05:01 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Jan 16 09:05:01 2019 UDP link local: (not bound)
Wed Jan 16 09:05:01 2019 UDP link remote: [AF_INET]79.122.152.6:1194
Wed Jan 16 09:05:01 2019 MANAGEMENT: >STATE:1547618701,WAIT,,,,,,
Wed Jan 16 09:05:01 2019 read UDP: Unknown error (code=10054)
Open VPN uncommonly chips away at your electronic cover. Oftentimes, Open VPN clients don’t work successfully and show up connection errors also. This Windows error message suggests the connection was reset. which probably implies you need either port sent viably or firewall planned exactly.
One such error is Open VPN error 10054. “Read UDP: Unknown Error (Code=10054)” happens when the OpenVPN server connection gets reset. Around here at ARZHOST, we address Open VPN connection errors for our customers as a part of our Managed VPN Services.
Today will see how our Hosting Expert Planners examine and fix OpenVPN error 10054.
What causes Open VPN error 10054?
OpenVPN manages a client-server model. In essential words, the OpenVPN client begins a relationship with the OpenVPN server. “Read UDP: Unknown Error (Code=10054)”, Further, all correspondence occurs through this channel. That is how OpenVPN manages the security of customer data.
Occasionally, when this connection is reset, it shows the slip-up:
- ##Jan 23 17:41:39 2019 read UDP: Unknown mix-up (code=10054)
- Jan 23 17:42:10 2019 TLS Error: TLS key trade fail to occur inside 60 seconds (truly investigate your association accessibility)
- #Jan 23 17:42:10 2019 TLS Error: TLS handshake failed
This slip-up shows that the UDP bundles couldn’t go to the Open VPN server.
As of now, “Read UDP: Unknown Error (Code=10054)”, let’s see the top reasons that can cause this connection reset error.
1. Wrong firewall settings
VPN connection reset can happen given some unsuitable Firewall settings on the PC that runs the Open VPN client. As the firewall impedes the connection, the data packs don’t show up at the server.
To a great extent, “Read UDP: Unknown Error (Code=10054)”, even the firewall at the Internet Service Provider (ISP) moreover can cause Open VPN error.
Lately, when a customer uncovered issues with Open VPN error 10054, it was the ISP firewall affecting the connection. Here, the ISP switch was giving all of the devices a comparable public IP address, which made conflict.
2. Wrong port sending
Whenever VPN uses Network Address Translation otherwise called NAT firewall, then, there is a requirement for remote port sending. Here, port sending propels all moving toward a relationship with planning with the port number to within PC with the express area.
Regardless, when there are mistaken port sending rules set in the Open VPN server, it can again achieve Open VPN error 10054.
How do we fix Open VPN error 10054?
We just saw the ordinary purposes behind the error. As of now, “Read UDP: Unknown Error (Code=10054)”, let’s research how our Hosting Expert Planners fix the OpenVPN connection.
1. All things considered investigate server connection
First thing, we investigate the relationship between the home PC to the OpenVPN server. For this, we use the telnet request in the association
- telnet <VPN address> <port>
Accepting the connection doesn’t fill in true to form. “Read UDP: Unknown Error (Code=10054)”, We then, mind the server side to check whether connections are showing up at the Open VPN server from this particular client.
2. Shocking firewall
On the off chance that connections are on no occasion, showing up at the server the client PC firewall will have an impact on it. To disengage this firewall dependence, our Dedicated Engineers prescribe customers to slow down the firewall and repeat the telnet check. For example, in the case of Windows customers, we demand that they cripple Windows Firewall absolutely and have a go at interfacing.
Again, if there are further screw-up messages, “Read UDP: Unknown Error (Code=10054)”, it suggests there is something past the PC firewall.
3. Adjust port sending rules
Presently, we check the port sending rules in the Open VPN server. We look for language errors in the rules and fix them. “Read UDP: Unknown Error (Code=10054)”, handles the Open VPN error 10054, and makes Open VPN end up extraordinary.
Conclusion
To lay it out simply, Open VPN error 10054 happens mainly due to firewall settings or wrong port sending rules in the Open VPN server. Today, “Read UDP: Unknown Error (Code=10054)”, we saw the normal clarifications behind the mistake and how our Hosting Expert Planners restore VPN openness.
People Also Ask
Question # 1: How do I fix network Socket Error 10054?
Answer: Solution 1. Check Peer Peer connection
- If the address of the computer or host is correct.
- The other computer or the host, if it is still on or disabled.
- Make sure the network between you and the other computer is still up.
- Check the network configuration of the other computer if it is unreachable.
Question # 2: What port should OpenVPN listen to?
Answer: By default, the OpenVPN Access Server comes configured with OpenVPN daemons that listen on port 1194 UDP, and OpenVPN daemons that listen on port 443 TCP. While the best connection for an OpenVPN tunnel is via the UDP port, we implement TCP 443 as a fallback method.
Read More———-
Question # 3: Does OpenVPN port forward?
Answer: One of the greatest benefits of OVPN is that it allows port forwarding when connected. By forwarding a port, you can, for example, run a web server on your device even though that device is connected to OVPN.
Question # 4: Where is the OpenVPN client config file?
Answer: 4. x subnet should have a port forward rule that says forward UDP port 1194 from my public IP address to 192.168. 4.4. Open up the server’s firewall to allow incoming connections to UDP port 1194 (or whatever TCP/UDP port you have configured in the server config file).
Question # 5: What is a socket error on the Internet speed test?
Answer: As it turns out, the ‘socket error’ when running an Internet speed test with your browser can be caused by your firewall – even if you’re using the built-in firewall (Windows Firewall). This scenario is most encountered on a Wi-Fi connection. Press Windows key + R to open up a Run dialog box. Next, type ‘firewall.