Note user option is not implemented on windows

Посмотрите https://forum.altlinux.org/index.php?topic=8557.msg163936#msg163936
и ниже.
Что-то с ключами.
Создайте по новой. Попробуйте варианты.
Проверьте работу сервера.

В части предложенной ссылки:

Создайте по новой. Попробуйте варианты.

В приведенной ссылке сказано:

Шаг № 1 Получаем готовые файлы

/var/lib/ssl/private/vova.key
/var/lib/ssl/certs/openvpn-client-CA.crt
/var/lib/ssl/certs/vova.cert

А процедура их генерации какая правильная?
Если не «берем ранее полученные» а «если надо добавить windows-клиента», то … ?
Я для генерации использовал создание нового ключа в разделе управления ssl-ключами (через веб-интерфейс) и подписывал полученный ключ в сооветствующем разделе УЦ, далее получил файл ответа (pem), брал подписанный (в примере это vova.cert), файл ключа брал с сервера сертификации и openvpn-client-CA.crt — это pem удостоверяющего центра. Потом забирал файлы по указанным путям полученные сертификаты.

Есть вариант сгенерировать комплект ключей посредством консоли? Так чтобы они выпали в конкретное место?

А также возник вопрос/просьба объяснить алгоритм работы (логику):
Есть УЦ на одной машине, есть openvpn сервер на другой. Как они связаны? Как работает «обновление сертификатов», если я на openvpn-сервере создал сертификат, перенёс его руками на другой ПК и подписал в УЦ — процесс закончился тем, что я получил файл ответа — и дальше что? На сервере я не нашёл «слепка» подписанного сертификата. Если пользователь (или удалённая сеть), скажем по-турецки, ёк, то что? УЦ сменился и всем переделывать сертификаты (ибо не сохранив старый уц мы не можем пересоздать сертификаты, но они работают до окончания срока их работы). А автообновление сертификатов — на кой оно? Только для внутренних сервисов?

И да, сертификат openvpn-сервера подтверждает только логин соединения? Так как всё, что есть у vpn-сервера — это наименование соединения, а сертификат — это только подтверждения принадлежности устанавливающего соединение к имени, которым он предствляется?

Простите, если вопросы покажутся глупыми, но … пока я много чего не понимаю, или не правильно использую.

И вообще, правильно ли я понимаю, что в приведенном примере:
vova.key получаем на сервере сертификации
openvpn-client-CA.crt — корневой сертификат удостоверяющего центра
vova.cert — это файл ответа (исходно pem-файл, получаемый в УЦ)?

Помогите настроить, гугль не помог, сдаюсь. Сервер на vps с kvm. С техподдержкой связывлся, говорят ограничений никаких.
Конфиг сервера

#################################################
# Sample OpenVPN 2.0 config file for            #
# multi-client server.                          #
#                                               #
# This file is for the server side              #
# of a many-clients <-> one-server              #
# OpenVPN configuration.                        #
#                                               #
# OpenVPN also supports                         #
# single-machine <-> single-machine             #
# configurations (See the Examples page         #
# on the web site for more info).               #
#                                               #
# This config should work on Windows            #
# or Linux/BSD systems.  Remember on            #
# Windows to quote pathnames and use            #
# double backslashes, e.g.:                     #
# "C:\\Program Files\\OpenVPN\\config\\foo.key" #
#                                               #
# Comments are preceded with '#' or ';'         #
#################################################

# Which local IP address should OpenVPN
# listen on? (optional)
;local a.b.c.d

# Which TCP/UDP port should OpenVPN listen on?
# If you want to run multiple OpenVPN instances
# on the same machine, use a different port
# number for each one.  You will need to
# open up this port on your firewall.
port 1194

# TCP or UDP server?
;proto tcp
proto udp

# "dev tun" will create a routed IP tunnel,
# "dev tap" will create an ethernet tunnel.
# Use "dev tap0" if you are ethernet bridging
# and have precreated a tap0 virtual interface
# and bridged it with your ethernet interface.
# If you want to control access policies
# over the VPN, you must create firewall
# rules for the the TUN/TAP interface.
# On non-Windows systems, you can give
# an explicit unit number, such as tun0.
# On Windows, use "dev-node" for this.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun

# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel if you
# have more than one.  On XP SP2 or higher,
# you may need to selectively disable the
# Windows firewall for the TAP adapter.
# Non-Windows systems usually don't need this.
;dev-node MyTap

# SSL/TLS root certificate (ca), certificate
# (cert), and private key (key).  Each client
# and the server must have their own cert and
# key file.  The server and all clients will
# use the same ca file.
#
# See the "easy-rsa" directory for a series
# of scripts for generating RSA certificates
# and private keys.  Remember to use
# a unique Common Name for the server
# and each of the client certificates.
#
# Any X509 key management system can be used.
# OpenVPN can also use a PKCS #12 formatted key file
# (see "pkcs12" directive in man page).
ca /etc/openvpn/ca.crt
cert /etc/openvpn/server.crt
key /etc/openvpn/server.key  # This file should be kept secret

# Diffie hellman parameters.
# Generate your own with:
#   openssl dhparam -out dh1024.pem 1024
# Substitute 2048 for 1024 if you are using
# 2048 bit keys.
dh /etc/openvpn/dh2048.pem

# Configure server mode and supply a VPN subnet
# for OpenVPN to draw client addresses from.
# The server will take 10.8.0.1 for itself,
# the rest will be made available to clients.
# Each client will be able to reach the server
# on 10.8.0.1. Comment this line out if you are
# ethernet bridging. See the man page for more info.
server 10.8.0.0 255.255.255.0

# Maintain a record of client <-> virtual IP address
# associations in this file.  If OpenVPN goes down or
# is restarted, reconnecting clients can be assigned
# the same virtual IP address from the pool that was
# previously assigned.
ifconfig-pool-persist ipp.txt

# Configure server mode for ethernet bridging.
# You must first use your OS's bridging capability
# to bridge the TAP interface with the ethernet
# NIC interface.  Then you must manually set the
# IP/netmask on the bridge interface, here we
# assume 10.8.0.4/255.255.255.0.  Finally we
# must set aside an IP range in this subnet
# (start=10.8.0.50 end=10.8.0.100) to allocate
# to connecting clients.  Leave this line commented
# out unless you are ethernet bridging.
;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100

# Configure server mode for ethernet bridging
# using a DHCP-proxy, where clients talk
# to the OpenVPN server-side DHCP server
# to receive their IP address allocation
# and DNS server addresses.  You must first use
# your OS's bridging capability to bridge the TAP
# interface with the ethernet NIC interface.
# Note: this mode only works on clients (such as
# Windows), where the client-side TAP adapter is
# bound to a DHCP client.
;server-bridge

# Push routes to the client to allow it
# to reach other private subnets behind
# the server.  Remember that these
# private subnets will also need
# to know to route the OpenVPN client
# address pool (10.8.0.0/255.255.255.0)
# back to the OpenVPN server.
;push "route 192.168.10.0 255.255.255.0"
;push "route 192.168.20.0 255.255.255.0"

# To assign specific IP addresses to specific
# clients or if a connecting client has a private
# subnet behind it that should also have VPN access,
# use the subdirectory "ccd" for client-specific
# configuration files (see man page for more info).

# EXAMPLE: Suppose the client
# having the certificate common name "Thelonious"
# also has a small subnet behind his connecting
# machine, such as 192.168.40.128/255.255.255.248.
# First, uncomment out these lines:
;client-config-dir ccd
;route 192.168.40.128 255.255.255.248
# Then create a file ccd/Thelonious with this line:
#   iroute 192.168.40.128 255.255.255.248
# This will allow Thelonious' private subnet to
# access the VPN.  This example will only work
# if you are routing, not bridging, i.e. you are
# using "dev tun" and "server" directives.

# EXAMPLE: Suppose you want to give
# Thelonious a fixed VPN IP address of 10.9.0.1.
# First uncomment out these lines:
;client-config-dir ccd
;route 10.9.0.0 255.255.255.252
# Then add this line to ccd/Thelonious:
#   ifconfig-push 10.9.0.1 10.9.0.2

# Suppose that you want to enable different
# firewall access policies for different groups
# of clients.  There are two methods:
# (1) Run multiple OpenVPN daemons, one for each
#     group, and firewall the TUN/TAP interface
#     for each group/daemon appropriately.
# (2) (Advanced) Create a script to dynamically
#     modify the firewall in response to access
#     from different clients.  See man
#     page for more info on learn-address script.
;learn-address ./script

# If enabled, this directive will configure
# all clients to redirect their default
# network gateway through the VPN, causing
# all IP traffic such as web browsing and
# and DNS lookups to go through the VPN
# (The OpenVPN server machine may need to NAT
# or bridge the TUN/TAP interface to the internet
# in order for this to work properly).
;push "redirect-gateway def1 bypass-dhcp"

# Certain Windows-specific network settings
# can be pushed to clients, such as DNS
# or WINS server addresses.  CAVEAT:
# http://openvpn.net/faq.html#dhcpcaveats
# The addresses below refer to the public
# DNS servers provided by opendns.com.
;push "dhcp-option DNS 208.67.222.222"
;push "dhcp-option DNS 208.67.220.220"

# Uncomment this directive to allow different
# clients to be able to "see" each other.
# By default, clients will only see the server.
# To force clients to only see the server, you
# will also need to appropriately firewall the
# server's TUN/TAP interface.
;client-to-client

# Uncomment this directive if multiple clients
# might connect with the same certificate/key
# files or common names.  This is recommended
# only for testing purposes.  For production use,
# each client should have its own certificate/key
# pair.
#
# IF YOU HAVE NOT GENERATED INDIVIDUAL
# CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
# EACH HAVING ITS OWN UNIQUE "COMMON NAME",
# UNCOMMENT THIS LINE OUT.
;duplicate-cn

# The keepalive directive causes ping-like
# messages to be sent back and forth over
# the link so that each side knows when
# the other side has gone down.
# Ping every 10 seconds, assume that remote
# peer is down if no ping received during
# a 120 second time period.
keepalive 10 120

# For extra security beyond that provided
# by SSL/TLS, create an "HMAC firewall"
# to help block DoS attacks and UDP port flooding.
#
# Generate with:
#   openvpn --genkey --secret ta.key
#
# The server and each client must have
# a copy of this key.
# The second parameter should be '0'
# on the server and '1' on the clients.
tls-auth ta.key 0 # This file is secret
key-direction 0

# Select a cryptographic cipher.
# This config item must be copied to
# the client config file as well.
;cipher BF-CBC        # Blowfish (default)
cipher AES-128-CBC   # AES
auth SHA256
;cipher DES-EDE3-CBC  # Triple-DES

# Enable compression on the VPN link.
# If you enable it here, you must also
# enable it in the client config file.
comp-lzo

# The maximum number of concurrently connected
# clients we want to allow.
;max-clients 100

# It's a good idea to reduce the OpenVPN
# daemon's privileges after initialization.
#
# You can uncomment this out on
# non-Windows systems.
user nobody
group nogroup

# The persist options will try to avoid
# accessing certain resources on restart
# that may no longer be accessible because
# of the privilege downgrade.
persist-key
persist-tun

# Output a short status file showing
# current connections, truncated
# and rewritten every minute.
status openvpn-status.log

# By default, log messages will go to the syslog (or
# on Windows, if running as a service, they will go to
# the "\Program Files\OpenVPN\log" directory).
# Use log or log-append to override this default.
# "log" will truncate the log file on OpenVPN startup,
# while "log-append" will append to it.  Use one
# or the other (but not both).
log         openvpn.log
;log-append  openvpn.log

# Set the appropriate level of log
# file verbosity.
#
# 0 is silent, except for fatal errors
# 4 is reasonable for general usage
# 5 and 6 can help to debug connection problems
# 9 is extremely verbose
verb 3

# Silence repeating messages.  At most 20
# sequential messages of the same message
# category will be output to the log.
;mute 20

Конфиг клиента

##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server.     #
#                                            #
# This configuration can be used by multiple #
# clients, however each client should have   #
# its own cert and key files.                #
#                                            #
# On Windows, you might want to rename this  #
# file so it has a .ovpn extension           #
##############################################

# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client

# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun

# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel
# if you have more than one.  On XP SP2,
# you may need to disable the firewall
# for the TAP adapter.
;dev-node MyTap

# Are we connecting to a TCP or
# UDP server?  Use the same setting as
# on the server.
;proto tcp
proto udp

# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote 1.1.1.1 1194
;remote my-server-2 1194

# Choose a random host from the remote
# list for load-balancing.  Otherwise
# try hosts in the order specified.
;remote-random

# Keep trying indefinitely to resolve the
# host name of the OpenVPN server.  Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite

# Most clients don't need to bind to
# a specific local port number.
nobind

# Downgrade privileges after initialization (non-Windows only)
user nobody
group nogroup

# Try to preserve some state across restarts.
persist-key
persist-tun

# If you are connecting through an
# HTTP proxy to reach the actual OpenVPN
# server, put the proxy server/IP and
# port number here.  See the man page
# if your proxy server requires
# authentication.
;http-proxy-retry # retry on connection failures
;http-proxy [proxy server] [proxy port #]

# Wireless networks often produce a lot
# of duplicate packets.  Set this flag
# to silence duplicate packet warnings.
;mute-replay-warnings

# SSL/TLS parms.
# See the server config file for more
# description.  It's best to use
# a separate .crt/.key file pair
# for each client.  A single ca
# file can be used for all clients.
#ca ca.crt
#cert client.crt
#key client.key

# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server".  This is an
# important precaution to protect against
# a potential attack discussed here:
#  http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server".  The build-key-server
# script in the easy-rsa folder will do this.
ns-cert-type server

# If a tls-auth key is used on the server
# then every client must also have the key.
;tls-auth ta.key 1

# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
cipher AES-128-CBC
auth SHA256
key-direction 1

# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo

# Set log file verbosity.
verb 3

# Silence repeating messages
;mute 20
<ca>
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
</ca>
<cert>
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 3 (0x3)
    Signature Algorithm: sha256WithRSAEncryption
        Issuer: C=RU, ST=TULA, L=TULA, O=4mainera, OU=vpnca, CN=4mainera CA/name=server/emailAddress=4mainera@gmail.com
        Validity
            Not Before: Mar 28 12:31:45 2017 GMT
            Not After : Mar 26 12:31:45 2027 GMT
        Subject: C=RU, ST=TULA, L=TULA, O=4mainera, OU=jobpc, CN=jobpc/name=server/emailAddress=4mainera@gmail.com
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:97:fd:e4:1d:4a:74:9d:69:6d:15:6f:d1:59:b4:
                    0c:4a:4c:bb:70:e8:9b:f1:00:66:6a:a6:bc:33:26:
                    6e:4c:cf:20:cd:66:c2:70:14:24:51:39:9d:37:a5:
                    61:ed:16:22:12:26:d1:4f:a3:de:bf:45:07:d6:52:
                    76:13:30:dd:60:94:76:17:89:24:cd:7e:58:b3:f6:
                    69:8f:f4:02:0e:53:9b:34:99:0b:7d:17:2b:b3:d0:
                    9f:7f:1c:9c:35:a4:24:58:83:52:42:49:fc:aa:fe:
                    f8:f6:e6:23:97:79:c9:a9:05:85:d0:33:1d:8e:2a:
                    9f:9b:1b:41:78:f6:1a:fb:bf:51:c6:a9:68:bd:ce:
                    9e:9a:b1:e5:0a:65:13:74:52:54:06:ec:ef:33:f6:
                    71:b9:e5:57:23:d7:8b:76:33:56:06:2d:cd:d8:ed:
                    c5:c2:ec:0e:19:ad:42:57:30:90:3d:a1:1e:ab:df:
                    53:6a:90:d1:18:e9:01:70:4b:0e:ea:4c:ff:ff:f2:
                    b5:81:9e:f3:b1:a1:60:ee:90:0f:54:29:14:17:34:
                    28:aa:0a:07:01:56:4d:0c:6e:32:eb:5b:e7:5b:1b:
                    72:9d:e4:92:cb:c6:67:94:65:87:21:08:7c:cc:3b:
                    3d:a5:89:fd:f4:71:21:c8:89:5b:f0:f1:d0:fc:37:
                    bb:6d
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            Netscape Comment:
                Easy-RSA Generated Certificate
            X509v3 Subject Key Identifier:
                48:BB:D5:75:3A:8E:23:9E:B1:BF:D5:65:21:F7:26:E1:CE:A2:FE:2B
            X509v3 Authority Key Identifier:
                keyid:D3:B9:D2:70:DC:71:37:8D:8F:C7:EB:01:57:11:66:CC:A9:6B:22:A5
                DirName:/C=RU/ST=TULA/L=TULA/O=4mainera/OU=vpnca/CN=4mainera CA/name=server/emailAddress=4mainera@gmail.com
                serial:E3:C9:1D:43:63:79:5C:11

            X509v3 Extended Key Usage:
                TLS Web Client Authentication
            X509v3 Key Usage:
                Digital Signature
            X509v3 Subject Alternative Name:
                DNS:jobpc
    Signature Algorithm: sha256WithRSAEncryption
         99:1a:db:bf:c3:55:d1:b9:c3:c2:99:f4:1e:81:4d:d6:bf:98:
         0f:e0:0e:0b:f0:db:59:14:4b:29:f7:89:7d:07:4f:06:5f:76:
         a7:f7:ba:35:f8:93:e9:53:8a:b4:13:25:f0:ff:a6:51:60:2e:
         77:0e:22:dc:7a:5a:23:86:c1:99:24:a5:b1:ce:74:2c:14:00:
         28:e3:2c:e0:11:9d:4a:eb:a5:d4:f3:d2:ef:b2:a8:a5:91:2a:
         0b:6b:15:37:1f:bd:03:41:12:95:f5:12:a4:81:8c:78:f9:7d:
         ea:99:3f:25:07:1d:d1:b2:27:b9:1f:5c:22:50:f5:6d:98:81:
         71:6c:06:8c:88:0d:27:bc:05:02:65:f6:96:41:c6:a6:67:a6:
         42:66:51:bb:2f:40:39:c0:fa:e9:49:3e:e2:93:f6:f8:5d:a8:
         08:9e:b5:b7:87:40:d1:c4:13:78:aa:18:ea:e3:d2:be:0c:1c:
         df:eb:5b:92:1d:c2:92:de:25:6a:49:d1:c9:da:44:50:0d:39:
         ee:50:fe:25:3e:98:e0:fa:09:96:ff:7e:5b:a3:4d:d7:8f:dd:
         c8:9f:d2:ef:1e:13:0a:56:fd:ee:57:33:e8:89:3b:52:68:04:
         66:da:a2:78:a9:22:a8:15:c6:66:98:a5:60:af:a3:91:98:85:
         32:90:c7:5d
-----BEGIN CERTIFICATE-----
MIIFCjCCA/KgAwIBAgIBAzANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCUlUx
DTALBgNVBAgTBFRVTEExDTALBgNVBAcTBFRVTEExETAPBgNVBAoTCDRtYWluZXJh
MQ4wDAYDVQQLEwV2cG5jYTEUMBIGA1UEAxMLNG1haW5lcmEgQ0ExDzANBgNVBCkT
BnNlcnZlcjEhMB8GCSqGSIb3DQEJARYSNG1haW5lcmFAZ21haWwuY29tMB4XDTE3
MDMyODEyMzE0NVoXDTI3MDMyNjEyMzE0NVowgZIxCzAJBgNVBAYTAlJVMQ0wCwYD
VQQIEwRUVUxBMQ0wCwYDVQQHEwRUVUxBMREwDwYDVQQKEwg0bWFpbmVyYTEOMAwG
A1UECxMFam9icGMxDjAMBgNVBAMTBWpvYnBjMQ8wDQYDVQQpEwZzZXJ2ZXIxITAf
BgkqhkiG9w0BCQEWEjRtYWluZXJhQGdtYWlsLmNvbTCCASIwDQYJKoZIhvcNAQEB
BQADggEPADCCAQoCggEBAJf95B1KdJ1pbRVv0Vm0DEpMu3Dom/EAZmqmvDMmbkzP
IM1mwnAUJFE5nTelYe0WIhIm0U+j3r9FB9ZSdhMw3WCUdheJJM1+WLP2aY/0Ag5T
mzSZC30XK7PQn38cnDWkJFiDUkJJ/Kr++PbmIpd5yakFhdAzHY4qn5sbQXj2Gvu/
UcapaL3Onpqx5QplE3RSVAbs7zP2cbnlVyPXi3YzVgYtzdjtxcLsDhmtQlcwkD2h
HqvfU2qQ0RjpAXBLDupM///ytYGe87GhYO6QD1QpFBc0KKoKBwFWTQxuMutb51sb
cp3kksvGZ5RlhyEIfMw7PaWJ/fRxIciJW/Dx0Pw3u20CAwEAAaOCAWEwggFdMAkG
A1UdEwQCMAAwLQYJYIZIAYb4QgENBCAWHkVhc3ktUlNBIEdlbmVyYXRlZCBDZXJ0
aWZpY2F0ZTAdBgNVHQ4EFgQUSLvVdTqOI56xv9VlIfcm4c6i/iswgc0GA1UdIwSB
xTCBwoAU07nScNxxN42Px+sBVxFmzKlrIqWhgZ6kgZswgZgxCzAJBgNVBAYTAlJV
MQ0wCwYDVQQIEwRUVUxBMQ0wCwYDVQQHEwRUVUxBMREwDwYDVQQKEwg0bWFpbmVy
YTEOMAwGA1UECxMFdnBuY2ExFDASBgNVBAMTCzRtYWluZXJhIENBMQ8wDQYDVQQp
EwZzZXJ2ZXIxITAfBgkqhkiG9w0BCQEWEjRtYWluZXJhQGdtYWlsLmNvbYIJAOPJ
HUNjeVwRMBMGA1UdJQQMMAoGCCsGAQUFBwMCMAsGA1UdDwQEAwIHgDAQBgNVHREE
CTAHggVqb2JwYzANBgkуhkiG9w0BAQsFAAOCAQEAmRrbv8NV0bnDwpn0HoFN1r+Y
D+AOC/DbWRRLKfeJfQdPBl92p/e6NfiT6VOKtBMl8P+mUWAudw4i3HpaI4bBmSSl
sc50LBQAKOMs4BGdSuul1PPS77KopZEqC2sVNx+9A0ESlfUSpIGMePl96pk/JQcd
0bInuR9cIlD1bZiBcWwGjIgNJ7wFAmX2lkHGpmemQmZRuy9AOcD66Uk+4pP2+F2o
CJ61t4dA0cQTeKoY6uPSvgwc3+tbkh3Ckt4laknRydpEUA057lD+JT6Y4PoJlv9+
W6NN14/dyJ/S7x4TClb97lcz6Ik7UmgEZtqieKkiqBXGZpilYK+jkZiFMpDHXQ==
-----END CERTIFICATE-----
</cert>
<key>
-----BEGIN PRIVATE KEY-----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уc/q5HUQZhgsZQYMPp1Wjm0sHfE5iPaPFoqm17QC1m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-----END PRIVATE KEY-----
</key>
<tls-auth>
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
26ec47ccb054c7f5caa3955818954483
9e3445e409da82cead0d676195c2041d
370449236f45af3fd3e2d303580bd121
0fb4aeb714db05405e54b3678686ee9f
6eb40b150cbcccc52ac17ef3e57bf000
0c5572d41f370f21e1be45ef706c2d9a
209a6c0a6e2c36a1fbf92279090c790e
56c53f68fc12c5c719676b2ddc969e95
64d589e2f4333d1c6de5497e8cb09d75
30c4816aa9b1500524f975a1233b76a6
7a81b7a9895dcff66725b7f715e7c79f
bae51779a16630dd166f7762759e98c2
be5b71c292d5cc71adу1a615c1848007
b9a28d020dfca144810387f72cf590b2
8db86130e64f8e15877eb4fc66775acd
a824536f760bf8611fcdf7b8758d22ab
-----END OpenVPN Static key V1-----
</tls-auth>

Лог сервера

Tue Mar 28 23:53:14 2017 OpenVPN 2.3.2 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] $
Tue Mar 28 23:53:14 2017 Diffie-Hellman initialized with 2048 bit key
Tue Mar 28 23:53:14 2017 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
Tue Mar 28 23:53:14 2017 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMA$
Tue Mar 28 23:53:14 2017 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMA$
Tue Mar 28 23:53:14 2017 Socket Buffers: R=[212992->131072] S=[212992->131072]
Tue Mar 28 23:53:14 2017 ROUTE_GATEWAY 212.109.218.1/255.255.254.0 IFACE=eth0 HWADDR=52:54:00:09:f3:34
Tue Mar 28 23:53:14 2017 TUN/TAP device tun0 opened
Tue Mar 28 23:53:14 2017 TUN/TAP TX queue length set to 100
Tue Mar 28 23:53:14 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Mar 28 23:53:14 2017 /sbin/ip link set dev tun0 up mtu 1500
Tue Mar 28 23:53:14 2017 /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2
Tue Mar 28 23:53:14 2017 /sbin/ip route add 10.8.0.0/24 via 10.8.0.2
Tue Mar 28 23:53:14 2017 GID set to nogroup
Tue Mar 28 23:53:14 2017 UID set to nobody
Tue Mar 28 23:53:14 2017 UDPv4 link local (bound): [undef]
Tue Mar 28 23:53:14 2017 UDPv4 link remote: [undef]
Tue Mar 28 23:53:14 2017 MULTI: multi_init called, r=256 v=256
Tue Mar 28 23:53:14 2017 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Tue Mar 28 23:53:14 2017 IFCONFIG POOL LIST
Tue Mar 28 23:53:14 2017 Initialization Sequence Completed
Лог клиента:

Wed Mar 29 00:15:02 2017 NOTE: --user option is not implemented on Windows
Wed Mar 29 00:15:02 2017 NOTE: --group option is not implemented on Windows
Wed Mar 29 00:15:02 2017 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Dec  7 2016
Wed Mar 29 00:15:02 2017 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Mar 29 00:15:02 2017 library versions: OpenSSL 1.0.2i  22 Sep 2016, LZO 2.09
Enter Management Password:
Wed Mar 29 00:15:02 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Wed Mar 29 00:15:02 2017 Need hold release from management interface, waiting...
Wed Mar 29 00:15:03 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Wed Mar 29 00:15:03 2017 MANAGEMENT: CMD 'state on'
Wed Mar 29 00:15:03 2017 MANAGEMENT: CMD 'log all on'
Wed Mar 29 00:15:03 2017 MANAGEMENT: CMD 'hold off'
Wed Mar 29 00:15:03 2017 MANAGEMENT: CMD 'hold release'
Wed Mar 29 00:15:03 2017 Control Channel Authentication: tls-auth using INLINE static key file
Wed Mar 29 00:15:03 2017 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 29 00:15:03 2017 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 29 00:15:03 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Mar 29 00:15:03 2017 UDPv4 link local: [undef]
Wed Mar 29 00:15:03 2017 UDPv4 link remote: [AF_INET]*.*.*.*:1194
Wed Mar 29 00:15:03 2017 MANAGEMENT: >STATE:1490735703,WAIT,,,
Wed Mar 29 00:16:03 2017 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Wed Mar 29 00:16:03 2017 TLS Error: TLS handshake failed
Wed Mar 29 00:16:03 2017 SIGUSR1[soft,tls-error] received, process restarting
Wed Mar 29 00:16:03 2017 MANAGEMENT: >STATE:1490735763,RECONNECTING,tls-error,,
Wed Mar 29 00:16:03 2017 Restart pause, 2 second(s)
Wed Mar 29 00:16:05 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Mar 29 00:16:05 2017 UDPv4 link local: [undef]
Wed Mar 29 00:16:05 2017 UDPv4 link remote: [AF_INET]*.*.*.*:1194
Wed Mar 29 00:16:05 2017 MANAGEMENT: >STATE:1490735765,WAIT,,,
Wed Mar 29 00:17:05 2017 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Wed Mar 29 00:17:05 2017 TLS Error: TLS handshake failed
Wed Mar 29 00:17:05 2017 SIGUSR1[soft,tls-error] received, process restarting
Wed Mar 29 00:17:05 2017 MANAGEMENT: >STATE:1490735825,RECONNECTING,tls-error,,
Wed Mar 29 00:17:05 2017 Restart pause, 2 second(s)
Wed Mar 29 00:17:07 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Mar 29 00:17:07 2017 UDPv4 link local: [undef]
Wed Mar 29 00:17:07 2017 UDPv4 link remote: [AF_INET]*.*.*.*:1194
Wed Mar 29 00:17:07 2017 MANAGEMENT: >STATE:1490735827,WAIT,,,
sudo ufw status

To                         Action      From
--                         ------      ----
1194/udp                   ALLOW       Anywhere
1194/udp (v6)              ALLOW       Anywhere (v6)
sudo netstat -ntulp

Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 0.0.0.0:2222            0.0.0.0:*               LISTEN      782/sshd
tcp        0      0 127.0.0.1:3306          0.0.0.0:*               LISTEN      854/mysqld
tcp6       0      0 :::2222                 :::*                    LISTEN      782/sshd
tcp6       0      0 :::80                   :::*                    LISTEN      977/apache2
udp        0      0 0.0.0.0:1194            0.0.0.0:*                           2339/openvpn

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

jasiubor

OpenVpn Newbie
Posts: 4
Joined: Sun Mar 25, 2018 5:25 pm

—user option is not … Error on Ubuntu 16.04 server

Hello,
my problem looks like this:

Code: Select all

Sun Mar 25 19:18:20 2018 NOTE: --user option is not implemented on Windows
Sun Mar 25 19:18:20 2018 NOTE: --group option is not implemented on Windows
Options error: Unrecognized option or missing or extra parameter(s) in client1.ovpn:135: < (2.4.5)
Use --help for more information.

I installed OpenVPN on Ubuntu Server 16.04 using this tutorial: link here this is polish version of this: digitalocean.com link

My client1.ovpn config looks like this:

Code: Select all


##############################################
# Sample client-side OpenVPN 2.0 config file #
# for connecting to multi-client server.     #
#                                            #
# This configuration can be used by multiple #
# clients, however each client should have   #
# its own cert and key files.                #
#                                            #
# On Windows, you might want to rename this  #
# file so it has a .ovpn extension           #
##############################################

# script-security 2
# up /etc/openvpn/update-resolv-conf
# down /etc/openvpn/update-resolv-conf

# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client

# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
;dev tap
dev tun


# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel
# if you have more than one.  On XP SP2,
# you may need to disable the firewall
# for the TAP adapter.
;dev-node MyTap

# Are we connecting to a TCP or
# UDP server?  Use the same setting as
# on the server.
;proto tcp
proto udp

# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
remote CENSORED 1194
;remote my-server-2 1194

# Choose a random host from the remote
# list for load-balancing.  Otherwise
# try hosts in the order specified.
;remote-random

# Keep trying indefinitely to resolve the
# host name of the OpenVPN server.  Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite

# Most clients don't need to bind to
# a specific local port number.
nobind

# Downgrade privileges after initialization (non-Windows only)
user nobody
group nogroup

# Try to preserve some state across restarts.
persist-key
persist-tun

# If you are connecting through an
# HTTP proxy to reach the actual OpenVPN
# server, put the proxy server/IP and
# port number here.  See the man page
# if your proxy server requires
# authentication.
;http-proxy-retry # retry on connection failures
;http-proxy [proxy server] [proxy port #]

# Wireless networks often produce a lot
# of duplicate packets.  Set this flag
# to silence duplicate packet warnings.
;mute-replay-warnings



# SSL/TLS parms.
# See the server config file for more
# description.  It's best to use
# a separate .crt/.key file pair
# for each client.  A single ca
# file can be used for all clients.
#ca ca.crt
#cert client.crt
#key client.key

# Verify server certificate by checking that the
# certicate has the correct key usage set.
# This is an important precaution to protect against
# a potential attack discussed here:
#  http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the keyUsage set to
#   digitalSignature, keyEncipherment
# and the extendedKeyUsage to
#   serverAuth
# EasyRSA can do this for you.
remote-cert-tls server

# If a tls-auth key is used on the server
# then every client must also have the key.
;tls-auth ta.key 1
auth SHA256
key-direction 1

# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
cipher AES-128-CBC

# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
comp-lzo

# Set log file verbosity.
verb 3

# Silence repeating messages
;mute 20
< ca >
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
< /ca >
< /cert >
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 2 (0x2)
    Signature Algorithm: sha256WithRSAEncryption
        Issuer: C=PL, ST=kujawsko-pomorskie, L=Aleksandrow Kujawski, O=Jan Borowicki's VPN, OU=Jan's Personal Usage (education purposes), CN=none, personal usage CA/name=server/emailAddress=jasiu4d@wp.pl
        Validity
            Not Before: Mar 25 16:11:39 2018 GMT
            Not After : Mar 22 16:11:39 2028 GMT
        Subject: C=PL, ST=kujawsko-pomorskie, L=Aleksandrow Kujawski, O=none, personal usage, OU=Jan's Personal Usage (education purposes), CN=client1/name=server/emailAddress=jasiu4d@wp.pl
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:da:9e:d4:1f:84:2f:6d:be:15:73:b5:87:0a:6e:
                    e3:e0:b0:55:7b:4a:a5:d7:f0:60:c7:5f:99:a5:3b:
                    be:2b:cc:09:88:de:5d:28:7a:90:6c:07:84:de:90:
                    78:c3:04:04:03:13:54:ef:90:d2:2a:68:96:77:25:
                    f6:bb:d1:21:85:d7:81:ce:b2:76:09:74:02:90:c8:
                    32:86:df:67:8e:60:10:b4:28:f1:d4:46:28:61:8b:
                    3e:4f:8f:6b:5d:59:8a:4b:d0:0d:e9:d4:37:c9:84:
                    af:43:9a:16:29:4b:52:a5:d9:7b:bb:d5:df:43:e1:
                    46:19:b3:2e:7d:d8:ed:cc:0b:87:49:e9:be:ef:6c:
                    e3:cc:4e:4b:fc:0d:c2:af:10:cd:8c:bd:df:ce:9d:
                    f3:8b:ac:48:11:2c:8e:95:c2:b1:a2:fa:59:f8:98:
                    70:29:6e:47:43:e9:8c:c5:52:58:43:87:60:54:13:
                    7a:df:50:e2:05:fc:48:3e:4b:0e:2c:86:ba:2a:09:
                    2f:fe:62:d1:57:0e:03:11:ca:14:28:6f:4b:58:ee:
                    21:dd:6d:34:e4:39:5b:62:47:0f:d9:c8:ea:b8:b7:
                    39:34:c1:41:e6:64:58:bb:3b:3b:62:1f:76:8e:57:
                    e4:f0:4c:ce:41:b9:fd:1f:6c:6b:2b:af:5e:74:c9:
                    5a:05
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints: 
                CA:FALSE
            Netscape Comment: 
                Easy-RSA Generated Certificate
            X509v3 Subject Key Identifier: 
                55:E3:3E:AB:19:27:04:30:EB:E3:70:4A:E1:84:2D:F2:A8:48:F0:2F
            X509v3 Authority Key Identifier: 
                keyid:37:82:2A:22:E0:C3:76:56:AA:F9:34:9F:BA:52:31:37:D0:78:7B:4B
                DirName:/C=PL/ST=kujawsko-pomorskie/L=Aleksandrow Kujawski/O=Jan Borowicki's VPN/OU=Jan's Personal Usage (education purposes)/CN=none, personal usage CA/name=server/emailAddress=jasiu4d@wp.pl
                serial:AD:89:27:AE:48:48:5B:38

            X509v3 Extended Key Usage: 
                TLS Web Client Authentication
            X509v3 Key Usage: 
                Digital Signature
            X509v3 Subject Alternative Name: 
                DNS:client1
    Signature Algorithm: sha256WithRSAEncryption
         d9:7b:88:30:d0:85:e1:da:79:a6:11:86:8f:3c:9e:be:41:52:
         b8:87:fa:e5:23:5d:56:a8:fb:9e:4d:06:32:31:f7:86:73:15:
         5a:b5:7c:5b:89:ca:3f:84:6f:8a:b8:31:59:01:3a:d2:ba:b4:
         34:7c:51:5e:d5:56:5b:0f:78:91:fd:6d:98:60:05:b3:04:1c:
         4f:bd:df:9d:dd:07:14:49:23:68:a5:a1:d7:91:ca:9d:55:b0:
         34:50:cb:33:b4:31:3a:e2:6c:fc:ad:8f:31:f5:fa:87:2c:7f:
         ab:99:68:d5:69:88:99:37:b5:9c:0a:35:70:27:df:d9:77:db:
         7f:58:6a:15:60:27:4f:3f:8c:bb:81:b6:c7:aa:db:2e:67:a2:
         08:e3:bd:d1:43:00:02:e7:34:ee:ce:89:87:de:da:13:d9:f8:
         0b:e7:a7:83:21:c6:21:e2:94:72:bc:78:25:20:aa:f4:d9:fa:
         34:14:af:7c:98:50:ff:7f:45:85:29:55:7b:2f:73:cd:9a:ab:
         4a:fc:5b:31:af:98:db:b9:24:c3:a6:18:7c:b3:85:56:2a:d2:
         0c:84:a3:c5:cd:2f:66:b2:97:f9:c6:33:af:4c:64:e8:56:4b:
         6d:85:e0:f3:a2:e9:3e:8d:5c:65:e8:ee:cc:52:a6:48:85:96:
         2a:dc:d8:b4
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
< /cert >
< /key >
-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----
< /key >
< /tls-auth >
#
# 2048 bit OpenVPN static key
#
-----BEGIN OpenVPN Static key V1-----
ec6843be9c2dd3f49ff069fe1c29d90c
7a1ee3fec456639b7398aa6c342fa448
53a3c26fc976156126bd060c155e96da
865057221edeb322ae825ee53f844503
797f2356ea41e3449c1fa673b12798f6
fea1a322299dd6c61895beda4fd784f8
4a56b5ea7dfe9a34a3418b69690180bf
12deaf5dc4ce0315441c276b3bb62278
2e4f300b8822318fea02e247c6f0a224
d16ee1a5d397a48e4e6167c2adaece3b
19b012978f7d04c22e86ebc6ddc1216d
a91d2117aabbc8248194b371aa0b9427
8c79088bad97f2f0ffd61e84c0b8a456
b542251901a7ffe9361fa553dc8bc4c8
adbcf9c6c7b6cc54191f4146a3f29237
735286b50c2288f02d0ef50cde33c556
-----END OpenVPN Static key V1-----
< /tls-auth >

I really do not know what is wrong with line 135 — «< ca >», I did everything as written in tutorial including de-commenting lines:

I am using OpenVPN client on Windows 10, propably Home Edition.


TinCanTech

OpenVPN Protagonist
Posts: 11139
Joined: Fri Jun 03, 2016 1:17 pm

Re: —user option is not … Error on Ubuntu 16.04 server

Post

by TinCanTech » Sun Mar 25, 2018 6:16 pm

jasiubor wrote: ↑

Sun Mar 25, 2018 5:43 pm

Options error: Unrecognized option or missing or extra parameter(s) in client1.ovpn:135: < (2.4.5) Use —help for more information.

Remove the spaces between < and > .. all of them. eg. <ca> etc ..


jasiubor

OpenVpn Newbie
Posts: 4
Joined: Sun Mar 25, 2018 5:25 pm

Re: —user option is not … Error on Ubuntu 16.04 server

Post

by jasiubor » Sun Mar 25, 2018 9:27 pm

TinCanTech wrote: ↑

Sun Mar 25, 2018 6:16 pm

jasiubor wrote: ↑

Sun Mar 25, 2018 5:43 pm

Options error: Unrecognized option or missing or extra parameter(s) in client1.ovpn:135: < (2.4.5) Use —help for more information.

Remove the spaces between < and > .. all of them. eg. <ca> etc ..

Now, this appears:

Code: Select all

Sun Mar 25 23:25:53 2018 NOTE: --user option is not implemented on Windows
Sun Mar 25 23:25:53 2018 NOTE: --group option is not implemented on Windows
Sun Mar 25 23:25:53 2018 ERROR: Endtag <//cert> missing
Sun Mar 25 23:25:53 2018 Exiting due to fatal error

I do not know where to put this tag <//cert> and I’m not sure why it has doubled slashes like «//» :/



jasiubor

OpenVpn Newbie
Posts: 4
Joined: Sun Mar 25, 2018 5:25 pm

Re: —user option is not … Error on Ubuntu 16.04 server

Post

by jasiubor » Mon Mar 26, 2018 2:21 pm

TinCanTech wrote: ↑

Sun Mar 25, 2018 10:21 pm

try harder ….

Man, I know it’s simple for you, but I do not know anything of these things in here. I just wanna get VPN for private usage.
Trying with adding

and

In different places didn’t work.



jasiubor

OpenVpn Newbie
Posts: 4
Joined: Sun Mar 25, 2018 5:25 pm

Re: —user option is not … Error on Ubuntu 16.04 server

Post

by jasiubor » Mon Mar 26, 2018 5:58 pm

How documentation can help me with placing end tag at correct position..
I won’t learn the basics of OpenVPN to edit 1 file.


Describe the bug
I notice these two lines when connecting with OpenVPN-2.6.0-I003-amd64:

Tue Jan 31 21:34:19 2023 NOTE: —user option is not implemented on Windows
Tue Jan 31 21:34:19 2023 NOTE: —group option is not implemented on Windows

To Reproduce

  1. In your normal ovpn, also have these two lines if you don’t already:
    user nobody
    group nogroup
  2. Connect
  3. View log

Expected behavior
I expected to connect, and do, and still do without the above lines, but I’m just wondering if it’s correct that these are no longer in the Windows client, and if so, what that means. Maybe it’s unimportant, but I thought it was for a security reason.

Version information (please complete the following information):

  • OS: Windows 11
  • OpenVPN version: 2.6.0

Additional context
All but sure this is new as of 2.6.0, but even if it’s not, the question stands.

Sat Dec 7 14:57:09 2019 us=768746 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jan 9 2019
Sat Dec 7 14:57:09 2019 us=768767 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
Sat Dec 7 14:57:09 2019 us=771119 Diffie-Hellman initialized with 2048 bit key
Sat Dec 7 14:57:09 2019 us=771666 Control Channel Authentication: using ‘ta.key’ as a OpenVPN static key file
Sat Dec 7 14:57:09 2019 us=771703 Outgoing Control Channel Authentication: Using 256 bit message hash ‘SHA256’ for HMAC authentication
Sat Dec 7 14:57:09 2019 us=771722 Incoming Control Channel Authentication: Using 256 bit message hash ‘SHA256’ for HMAC authentication
Sat Dec 7 14:57:09 2019 us=771753 TLS-Auth MTU parms [ L:1572 D:1170 EF:80 EB:0 ET:0 EL:3 ]
Sat Dec 7 14:57:09 2019 us=771784 Socket Buffers: R=[87380->87380] S=[16384->16384]
Sat Dec 7 14:57:09 2019 us=771894 ROUTE_GATEWAY ON_LINK IFACE=venet0 HWADDR=00:00:00:00:00:00
Sat Dec 7 14:57:09 2019 us=772733 TUN/TAP device tun0 opened
Sat Dec 7 14:57:09 2019 us=772769 TUN/TAP TX queue length set to 100
Sat Dec 7 14:57:09 2019 us=772796 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sat Dec 7 14:57:09 2019 us=772826 /sbin/ip link set dev tun0 up mtu 1500
Sat Dec 7 14:57:09 2019 us=778462 /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2
Sat Dec 7 14:57:09 2019 us=780703 /sbin/ip route add 10.8.0.0/24 via 10.8.0.2
Sat Dec 7 14:57:09 2019 us=782746 Data Channel MTU parms [ L:1572 D:1450 EF:72 EB:143 ET:0 EL:3 AF:3/1 ]
Sat Dec 7 14:57:09 2019 us=782795 Listening for incoming TCP connection on [undef]
Sat Dec 7 14:57:09 2019 us=782822 TCPv4_SERVER link local (bound): [undef]
Sat Dec 7 14:57:09 2019 us=782837 TCPv4_SERVER link remote: [undef]
Sat Dec 7 14:57:09 2019 us=782860 MULTI: multi_init called, r=256 v=256
Sat Dec 7 14:57:09 2019 us=782899 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Sat Dec 7 14:57:09 2019 us=782922 ifconfig_pool_read(), in=‘client1,10.8.0.4’, TODO: IPv6
Sat Dec 7 14:57:09 2019 us=782939 succeeded -> ifconfig_pool_set()
Sat Dec 7 14:57:09 2019 us=782952 ifconfig_pool_read(), in=‘client,10.8.0.8’, TODO: IPv6
Sat Dec 7 14:57:09 2019 us=782965 succeeded -> ifconfig_pool_set()
Sat Dec 7 14:57:09 2019 us=782980 IFCONFIG POOL LIST
Sat Dec 7 14:57:09 2019 us=783002 client1,10.8.0.4
Sat Dec 7 14:57:09 2019 us=783017 client,10.8.0.8
Sat Dec 7 14:57:09 2019 us=783050 MULTI: TCP INIT maxclients=1024 maxevents=1028
Sat Dec 7 14:57:09 2019 us=783089 Initialization Sequence Completed
Sat Dec 7 14:58:13 2019 us=173197 MULTI: multi_create_instance called
Sat Dec 7 14:58:13 2019 us=173300 Re-using SSL/TLS context
Sat Dec 7 14:58:13 2019 us=173344 LZO compression initialized
Sat Dec 7 14:58:13 2019 us=173486 Control Channel MTU parms [ L:1572 D:1170 EF:80 EB:0 ET:0 EL:3 ]
Sat Dec 7 14:58:13 2019 us=173524 Data Channel MTU parms [ L:1572 D:1450 EF:72 EB:143 ET:0 EL:3 AF:3/1 ]
Sat Dec 7 14:58:13 2019 us=173559 Local Options String: ‘V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto
TCPv4_SERVER,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server’
Sat Dec 7 14:58:13 2019 us=173574 Expected Remote Options String: ‘V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client’
Sat Dec 7 14:58:13 2019 us=173606 Local Options hash (VER=V4): ‘57076ab0’
Sat Dec 7 14:58:13 2019 us=173630 Expected Remote Options hash (VER=V4): ‘e022a93f’
Sat Dec 7 14:58:13 2019 us=173703 TCP connection established with [AF_INET]185.69.185.93:18690
Sat Dec 7 14:58:13 2019 us=173729 TCPv4_SERVER link local: [undef]
Sat Dec 7 14:58:13 2019 us=173744 TCPv4_SERVER link remote: [AF_INET]185.69.185.93:18690
Sat Dec 7 14:58:14 2019 us=82372 185.69.185.93:18690 TCPv4_SERVER READ [54] from [AF_INET]185.69.185.93:18690: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
Sat Dec 7 14:58:14 2019 us=82437 185.69.185.93:18690 TLS: Initial packet from [AF_INET]185.69.185.93:18690, sid=b9192d44 429b7265
Sat Dec 7 14:58:14 2019 us=82512 185.69.185.93:18690 TCPv4_SERVER WRITE [66] to [AF_INET]185.69.185.93:18690: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
Sat Dec 7 14:58:14 2019 us=177150 185.69.185.93:18690 TCPv4_SERVER READ [62] from [AF_INET]185.69.185.93:18690: P_ACK_V1 kid=0 pid=[ #2 ] [ 0 ]
Sat Dec 7 14:58:14 2019 us=302794 185.69.185.93:18690 TCPv4_SERVER READ [214] from [AF_INET]185.69.185.93:18690: P_CONTROL_V1 kid=0 pid=[ #3 ] [ ] pid=1 DATA len=160
Sat Dec 7 14:58:14 2019 us=319766 185.69.185.93:18690 TCPv4_SERVER WRITE [1156] to [AF_INET]185.69.185.93:18690: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1090
Sat Dec 7 14:58:14 2019 us=319883 185.69.185.93:18690 TCPv4_SERVER WRITE [1144] to [AF_INET]185.69.185.93:18690: P_CONTROL_V1 kid=0 pid=[ #3 ] [ ] pid=2 DATA len=1090
Sat Dec 7 14:58:14 2019 us=319960 185.69.185.93:18690 TCPv4_SERVER WRITE [1144] to [AF_INET]185.69.185.93:18690: P_CONTROL_V1 kid=0 pid=[ #4 ] [ ] pid=3 DATA len=1090
Sat Dec 7 14:58:14 2019 us=320054 185.69.185.93:18690 TCPv4_SERVER WRITE [587] to [AF_INET]185.69.185.93:18690: P_CONTROL_V1 kid=0 pid=[ #5 ] [ ] pid=4 DATA len=533
Sat Dec 7 14:58:14 2019 us=402080 185.69.185.93:18690 Connection reset, restarting [-1]
Sat Dec 7 14:58:14 2019 us=402289 185.69.185.93:18690 SIGUSR1[soft,connection-reset] received, client-instance restarting
Sat Dec 7 14:58:14 2019 us=402402 TCP/UDP: Closing socket

bayram
()

автор топика

  • Показать ответ
  • Ссылка

Понравилась статья? Поделить с друзьями:
0 0 голоса
Рейтинг статьи
Подписаться
Уведомить о
guest

0 комментариев
Старые
Новые Популярные
Межтекстовые Отзывы
Посмотреть все комментарии
  • Драйвер a2dp для windows 10
  • Не запускается hogwarts legacy на windows 10
  • Boot windows from vhd
  • Tethered shooting software hs v5 for windows
  • Как добавить эквалайзер в windows 10