Compare Pastes

Differences between the pastes #131401 (23.01.2020 12:32) and #187134 (25.05.2021 22:50).
1
[root@192 openvpn]# openvpn --config client.ovpn 
2
Thu Jan 23 16:29:12 2020 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration
3
Thu Jan 23 16:29:12 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov  1 2019
4
Thu Jan 23 16:29:12 2020 library versions: OpenSSL 1.1.1c FIPS  28 May 2019, LZO 2.08
5
Enter Auth Username: 
6
Failed to query password: Timer expired
7
Enter Auth Password: ***********
8
Thu Jan 23 16:31:16 2020 ERROR: Failed retrieving username or password
9
Thu Jan 23 16:31:16 2020 Exiting due to fatal error
10
[root@192 openvpn]# openvpn --config client.ovpn 
11
Thu Jan 23 16:31:19 2020 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration
12
Thu Jan 23 16:31:19 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov  1 2019
13
Thu Jan 23 16:31:19 2020 library versions: OpenSSL 1.1.1c FIPS  28 May 2019, LZO 2.08
14
Enter Auth Username: intabia-elk
15
Enter Auth Password: ********
16
Thu Jan 23 16:31:30 2020 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
17
Thu Jan 23 16:31:30 2020 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
18
Thu Jan 23 16:31:30 2020 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
19
Thu Jan 23 16:31:30 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]195.189.222.1:17716
20
Thu Jan 23 16:31:30 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
21
Thu Jan 23 16:31:30 2020 UDP link local: (not bound)
22
Thu Jan 23 16:31:30 2020 UDP link remote: [AF_INET]195.189.222.1:17716
23
Thu Jan 23 16:31:30 2020 TLS: Initial packet from [AF_INET]195.189.222.1:17716, sid=a5a23cff 241bd9d4
24
Thu Jan 23 16:31:30 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
25
Thu Jan 23 16:31:30 2020 VERIFY OK: depth=1, C=RU, ST=Novosibirsk, L=Npvpsibirsk, O=OOO CDEK, OU=CDEK, CN=vpn.cdek.ru, name=vpn, emailAddress=admin@cdek.ru
26
Thu Jan 23 16:31:30 2020 VERIFY OK: nsCertType=SERVER
27
Thu Jan 23 16:31:30 2020 VERIFY KU OK
28
Thu Jan 23 16:31:30 2020 Validating certificate extended key usage
29
Thu Jan 23 16:31:30 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
30
Thu Jan 23 16:31:30 2020 VERIFY EKU OK
31
Thu Jan 23 16:31:30 2020 VERIFY OK: depth=0, C=RU, ST=Novosibirsk, L=Npvpsibirsk, O=OOO CDEK, OU=CDEK, CN=server, name=vpn, emailAddress=admin@cdek.ru
32
Thu Jan 23 16:31:30 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
33
Thu Jan 23 16:31:30 2020 [server] Peer Connection Initiated with [AF_INET]195.189.222.1:17716
34
Thu Jan 23 16:31:31 2020 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
35
Thu Jan 23 16:31:31 2020 AUTH: Received control message: AUTH_FAILED
36
Thu Jan 23 16:31:31 2020 SIGTERM[soft,auth-failure] received, process exiting
37
[root@192 openvpn]#