Paste #131401 |
pasted on 23.01.2020 12:32
- Edit to this paste
- Raw
- The following pastes replied to this paste: # 146125 # 187134
- Show paste tree
-
Compare with paste
#
Text paste
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 | [root@192 openvpn]# openvpn --config client.ovpn Thu Jan 23 16:29:12 2020 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration Thu Jan 23 16:29:12 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov 1 2019 Thu Jan 23 16:29:12 2020 library versions: OpenSSL 1.1.1c FIPS 28 May 2019, LZO 2.08 Enter Auth Username: Failed to query password: Timer expired Enter Auth Password: *********** Thu Jan 23 16:31:16 2020 ERROR: Failed retrieving username or password Thu Jan 23 16:31:16 2020 Exiting due to fatal error [root@192 openvpn]# openvpn --config client.ovpn Thu Jan 23 16:31:19 2020 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration Thu Jan 23 16:31:19 2020 OpenVPN 2.4.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Nov 1 2019 Thu Jan 23 16:31:19 2020 library versions: OpenSSL 1.1.1c FIPS 28 May 2019, LZO 2.08 Enter Auth Username: intabia-elk Enter Auth Password: ******** Thu Jan 23 16:31:30 2020 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Thu Jan 23 16:31:30 2020 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Jan 23 16:31:30 2020 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Jan 23 16:31:30 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]195.189.222.1:17716 Thu Jan 23 16:31:30 2020 Socket Buffers: R=[212992->212992] S=[212992->212992] Thu Jan 23 16:31:30 2020 UDP link local: (not bound) Thu Jan 23 16:31:30 2020 UDP link remote: [AF_INET]195.189.222.1:17716 Thu Jan 23 16:31:30 2020 TLS: Initial packet from [AF_INET]195.189.222.1:17716, sid=a5a23cff 241bd9d4 Thu Jan 23 16:31:30 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Thu Jan 23 16:31:30 2020 VERIFY OK: depth=1, C=RU, ST=Novosibirsk, L=Npvpsibirsk, O=OOO CDEK, OU=CDEK, CN=vpn.cdek.ru, name=vpn, emailAddress=admin@cdek.ru Thu Jan 23 16:31:30 2020 VERIFY OK: nsCertType=SERVER Thu Jan 23 16:31:30 2020 VERIFY KU OK Thu Jan 23 16:31:30 2020 Validating certificate extended key usage Thu Jan 23 16:31:30 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Jan 23 16:31:30 2020 VERIFY EKU OK Thu Jan 23 16:31:30 2020 VERIFY OK: depth=0, C=RU, ST=Novosibirsk, L=Npvpsibirsk, O=OOO CDEK, OU=CDEK, CN=server, name=vpn, emailAddress=admin@cdek.ru Thu Jan 23 16:31:30 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Thu Jan 23 16:31:30 2020 [server] Peer Connection Initiated with [AF_INET]195.189.222.1:17716 Thu Jan 23 16:31:31 2020 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Thu Jan 23 16:31:31 2020 AUTH: Received control message: AUTH_FAILED Thu Jan 23 16:31:31 2020 SIGTERM[soft,auth-failure] received, process exiting [root@192 openvpn]# |