Mon Jul 19 20:03:26 2021 WARNING: file '/etc/openvpn/client/client.key' is group or others accessible Mon Jul 19 20:03:26 2021 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 28 2021 Mon Jul 19 20:03:26 2021 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10 Enter Auth Username: user_xyz Enter Auth Password: ************** Enter Private Key Password: ********* Mon Jul 19 20:03:45 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mon Jul 19 20:03:45 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]195.103.248.6:1194 Mon Jul 19 20:03:45 2021 Socket Buffers: R=[131072->131072] S=[16384->16384] Mon Jul 19 20:03:45 2021 Attempting to establish TCP connection with [AF_INET]195.103.248.6:1194 [nonblock] Mon Jul 19 20:03:46 2021 TCP connection established with [AF_INET]195.103.248.6:1194 Mon Jul 19 20:03:46 2021 TCP_CLIENT link local: (not bound) Mon Jul 19 20:03:46 2021 TCP_CLIENT link remote: [AF_INET]195.103.248.6:1194 Mon Jul 19 20:03:46 2021 TLS: Initial packet from [AF_INET]195.103.248.6:1194, sid=f02174b0 050471e2 Mon Jul 19 20:03:47 2021 VERIFY OK: depth=1, CN=a102.mywire.org Mon Jul 19 20:03:47 2021 VERIFY KU OK Mon Jul 19 20:03:47 2021 Validating certificate extended key usage Mon Jul 19 20:03:47 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mon Jul 19 20:03:47 2021 VERIFY EKU OK Mon Jul 19 20:03:47 2021 VERIFY OK: depth=0, CN=openvpn-server.a102.mywire.org Mon Jul 19 20:03:47 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mon Jul 19 20:03:47 2021 [openvpn-server.a102.mywire.org] Peer Connection Initiated with [AF_INET]195.103.248.6:1194 Mon Jul 19 20:03:48 2021 SENT CONTROL [openvpn-server.a102.mywire.org]: 'PUSH_REQUEST' (status=1) Mon Jul 19 20:03:54 2021 SENT CONTROL [openvpn-server.a102.mywire.org]: 'PUSH_REQUEST' (status=1) Mon Jul 19 20:03:59 2021 SENT CONTROL [openvpn-server.a102.mywire.org]: 'PUSH_REQUEST' (status=1) Mon Jul 19 20:03:59 2021 PUSH: Received control message: 'PUSH_REPLY,ping 20,ping-restart 60,topology subnet,route-gateway 192.168.100.1,ifconfig 192.168.100.100 255.255.255.0' Mon Jul 19 20:03:59 2021 OPTIONS IMPORT: timers and/or timeouts modified Mon Jul 19 20:03:59 2021 OPTIONS IMPORT: --ifconfig/up options modified Mon Jul 19 20:03:59 2021 OPTIONS IMPORT: route-related options modified Mon Jul 19 20:03:59 2021 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Jul 19 20:03:59 2021 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Jul 19 20:03:59 2021 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Jul 19 20:03:59 2021 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Jul 19 20:03:59 2021 ROUTE_GATEWAY 192.168.88.1/255.255.255.0 IFACE=wlp3s0 HWADDR=68:5d:43:ad:af:c5 Mon Jul 19 20:03:59 2021 TUN/TAP device tun0 opened Mon Jul 19 20:03:59 2021 TUN/TAP TX queue length set to 100 Mon Jul 19 20:03:59 2021 /sbin/ip link set dev tun0 up mtu 1500 Mon Jul 19 20:03:59 2021 /sbin/ip addr add dev tun0 192.168.100.100/24 broadcast 192.168.100.255 Mon Jul 19 20:03:59 2021 /sbin/ip route add 195.103.248.6/32 via 192.168.88.1 Mon Jul 19 20:03:59 2021 /sbin/ip route add 0.0.0.0/1 via 192.168.100.1 Mon Jul 19 20:03:59 2021 /sbin/ip route add 128.0.0.0/1 via 192.168.100.1 Mon Jul 19 20:03:59 2021 Initialization Sequence Completed