Сравнение постов
Различия между постами
#131401 (23.01.2020 12:32)
и
#187134 (25.05.2021 22:50).
1 | [root@192 openvpn]# openvpn --config client.ovpn | |
2 | Thu Jan 23 16:29:12 2020 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration | |
3 | Thu Jan 23 16:29:12 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov 1 2019 | |
4 | Thu Jan 23 16:29:12 2020 library versions: OpenSSL 1.1.1c FIPS 28 May 2019, LZO 2.08 | |
5 | Enter Auth Username: | |
6 | Failed to query password: Timer expired | |
7 | Enter Auth Password: *********** | |
8 | Thu Jan 23 16:31:16 2020 ERROR: Failed retrieving username or password | |
9 | Thu Jan 23 16:31:16 2020 Exiting due to fatal error | |
10 | [root@192 openvpn]# openvpn --config client.ovpn | |
11 | Thu Jan 23 16:31:19 2020 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration | |
12 | Thu Jan 23 16:31:19 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov 1 2019 | |
13 | Thu Jan 23 16:31:19 2020 library versions: OpenSSL 1.1.1c FIPS 28 May 2019, LZO 2.08 | |
14 | Enter Auth Username: intabia-elk | |
15 | Enter Auth Password: ******** | |
16 | Thu Jan 23 16:31:30 2020 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. | |
17 | Thu Jan 23 16:31:30 2020 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
18 | Thu Jan 23 16:31:30 2020 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
19 | Thu Jan 23 16:31:30 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]195.189.222.1:17716 | |
20 | Thu Jan 23 16:31:30 2020 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
21 | Thu Jan 23 16:31:30 2020 UDP link local: (not bound) | |
22 | Thu Jan 23 16:31:30 2020 UDP link remote: [AF_INET]195.189.222.1:17716 | |
23 | Thu Jan 23 16:31:30 2020 TLS: Initial packet from [AF_INET]195.189.222.1:17716, sid=a5a23cff 241bd9d4 | |
24 | Thu Jan 23 16:31:30 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this | |
25 | Thu Jan 23 16:31:30 2020 VERIFY OK: depth=1, C=RU, ST=Novosibirsk, L=Npvpsibirsk, O=OOO CDEK, OU=CDEK, CN=vpn.cdek.ru, name=vpn, emailAddress=admin@cdek.ru | |
26 | Thu Jan 23 16:31:30 2020 VERIFY OK: nsCertType=SERVER | |
27 | Thu Jan 23 16:31:30 2020 VERIFY KU OK | |
28 | Thu Jan 23 16:31:30 2020 Validating certificate extended key usage | |
29 | Thu Jan 23 16:31:30 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
30 | Thu Jan 23 16:31:30 2020 VERIFY EKU OK | |
31 | Thu Jan 23 16:31:30 2020 VERIFY OK: depth=0, C=RU, ST=Novosibirsk, L=Npvpsibirsk, O=OOO CDEK, OU=CDEK, CN=server, name=vpn, emailAddress=admin@cdek.ru | |
32 | Thu Jan 23 16:31:30 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | |
33 | Thu Jan 23 16:31:30 2020 [server] Peer Connection Initiated with [AF_INET]195.189.222.1:17716 | |
34 | Thu Jan 23 16:31:31 2020 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) | |
35 | Thu Jan 23 16:31:31 2020 AUTH: Received control message: AUTH_FAILED | |
36 | Thu Jan 23 16:31:31 2020 SIGTERM[soft,auth-failure] received, process exiting | |
37 | [root@192 openvpn]# |