Пост #131401

     
сохранен 23.01.2020 12:32
  • Редактировать пост
  • Печать
  • Скачать
  • Посты-ответы на этот пост:  # 146125 # 187134
  • Посмотреть дерево постов
  • Сравнить с постом
    #  
  • Нумерация строк
  • Подсветка синтаксиса  
Текст поста
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
[root@192 openvpn]# openvpn --config client.ovpn 
Thu Jan 23 16:29:12 2020 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration
Thu Jan 23 16:29:12 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov  1 2019
Thu Jan 23 16:29:12 2020 library versions: OpenSSL 1.1.1c FIPS  28 May 2019, LZO 2.08
Enter Auth Username: 
Failed to query password: Timer expired
Enter Auth Password: ***********
Thu Jan 23 16:31:16 2020 ERROR: Failed retrieving username or password
Thu Jan 23 16:31:16 2020 Exiting due to fatal error
[root@192 openvpn]# openvpn --config client.ovpn 
Thu Jan 23 16:31:19 2020 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration
Thu Jan 23 16:31:19 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov  1 2019
Thu Jan 23 16:31:19 2020 library versions: OpenSSL 1.1.1c FIPS  28 May 2019, LZO 2.08
Enter Auth Username: intabia-elk
Enter Auth Password: ********
Thu Jan 23 16:31:30 2020 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
Thu Jan 23 16:31:30 2020 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 23 16:31:30 2020 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Jan 23 16:31:30 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]195.189.222.1:17716
Thu Jan 23 16:31:30 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
Thu Jan 23 16:31:30 2020 UDP link local: (not bound)
Thu Jan 23 16:31:30 2020 UDP link remote: [AF_INET]195.189.222.1:17716
Thu Jan 23 16:31:30 2020 TLS: Initial packet from [AF_INET]195.189.222.1:17716, sid=a5a23cff 241bd9d4
Thu Jan 23 16:31:30 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Jan 23 16:31:30 2020 VERIFY OK: depth=1, C=RU, ST=Novosibirsk, L=Npvpsibirsk, O=OOO CDEK, OU=CDEK, CN=vpn.cdek.ru, name=vpn, emailAddress=admin@cdek.ru
Thu Jan 23 16:31:30 2020 VERIFY OK: nsCertType=SERVER
Thu Jan 23 16:31:30 2020 VERIFY KU OK
Thu Jan 23 16:31:30 2020 Validating certificate extended key usage
Thu Jan 23 16:31:30 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Jan 23 16:31:30 2020 VERIFY EKU OK
Thu Jan 23 16:31:30 2020 VERIFY OK: depth=0, C=RU, ST=Novosibirsk, L=Npvpsibirsk, O=OOO CDEK, OU=CDEK, CN=server, name=vpn, emailAddress=admin@cdek.ru
Thu Jan 23 16:31:30 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Jan 23 16:31:30 2020 [server] Peer Connection Initiated with [AF_INET]195.189.222.1:17716
Thu Jan 23 16:31:31 2020 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu Jan 23 16:31:31 2020 AUTH: Received control message: AUTH_FAILED
Thu Jan 23 16:31:31 2020 SIGTERM[soft,auth-failure] received, process exiting
[root@192 openvpn]# 
Добавить комментарий
Автор