Unable to connect over TUN - TLS error

Support requests about VPN Client Pro
Post Reply
norcaldsm
Posts: 4
Joined: Mon Jan 23, 2023 12:50 am

Unable to connect over TUN - TLS error

Post by norcaldsm »

Downloaded and imported the following configuration from my Netgear Nighthawk router to my Android phone.

Code: Select all

client
dev tun
proto udp
remote xx.ddns.net 12973
resolv-retry infinite
nobind
persist-key
persist-tun
ca ca.crt
cert client.crt
key client.key
cipher AES-128-CBC
comp-lzo
verb 5
Pointed app to ca.crt client.crt and client.key

Attempted to connect:

Code: Select all

2023-01-22 18:44:42 VpnClientPro-google-api27-release-1.01.27 (23010127)
2023-01-22 18:44:42 Connecting request by user
2023-01-22 18:44:42 Current Parameter Settings:
2023-01-22 18:44:42   config = '/data/user/0/it.colucciweb.vpnclientpro/files/temp/78a6d301-02e9-49ea-97d3-0f36add865a2.conf'
2023-01-22 18:44:42   mode = 0
2023-01-22 18:44:42   persist_config = DISABLED
2023-01-22 18:44:42   persist_mode = 1
2023-01-22 18:44:42   show_ciphers = DISABLED
2023-01-22 18:44:42   show_digests = DISABLED
2023-01-22 18:44:42   show_engines = DISABLED
2023-01-22 18:44:42   genkey = DISABLED
2023-01-22 18:44:42   key_pass_file = '[UNDEF]'
2023-01-22 18:44:42   show_tls_ciphers = DISABLED
2023-01-22 18:44:42   connect_retry_max = 0
2023-01-22 18:44:42 Connection profiles [0]:
2023-01-22 18:44:42   proto = udp
2023-01-22 18:44:42   local = '[UNDEF]'
2023-01-22 18:44:42   local_port = '[UNDEF]'
2023-01-22 18:44:42   remote = 'xx.ddns.net'
2023-01-22 18:44:42   remote_port = '12973'
2023-01-22 18:44:42   remote_float = DISABLED
2023-01-22 18:44:42   bind_defined = DISABLED
2023-01-22 18:44:42   bind_local = DISABLED
2023-01-22 18:44:42   bind_ipv6_only = DISABLED
2023-01-22 18:44:42   connect_retry_seconds = 5
2023-01-22 18:44:42   connect_timeout = 120
2023-01-22 18:44:42   xormethod = 0
2023-01-22 18:44:42   xormask = ''
2023-01-22 18:44:42   xormasklen = 0
2023-01-22 18:44:42   socks_proxy_server = '[UNDEF]'
2023-01-22 18:44:42   socks_proxy_port = '[UNDEF]'
2023-01-22 18:44:42   tun_mtu = 1500
2023-01-22 18:44:42   tun_mtu_defined = ENABLED
2023-01-22 18:44:42   link_mtu = 1500
2023-01-22 18:44:42   link_mtu_defined = DISABLED
2023-01-22 18:44:42   tun_mtu_extra = 0
2023-01-22 18:44:42   tun_mtu_extra_defined = DISABLED
2023-01-22 18:44:42   mtu_discover_type = -1
2023-01-22 18:44:42   fragment = 0
2023-01-22 18:44:42   mssfix = 1450
2023-01-22 18:44:42   explicit_exit_notification = 0
2023-01-22 18:44:42 Connection profiles END
2023-01-22 18:44:42   remote_random = DISABLED
2023-01-22 18:44:42   ipchange = '[UNDEF]'
2023-01-22 18:44:42   dev = 'tun'
2023-01-22 18:44:42   dev_type = '[UNDEF]'
2023-01-22 18:44:42   dev_node = '[UNDEF]'
2023-01-22 18:44:42   lladdr = '[UNDEF]'
2023-01-22 18:44:42   topology = 1
2023-01-22 18:44:42   ifconfig_local = '[UNDEF]'
2023-01-22 18:44:42   ifconfig_remote_netmask = '[UNDEF]'
2023-01-22 18:44:42   ifconfig_noexec = DISABLED
2023-01-22 18:44:42   ifconfig_nowarn = DISABLED
2023-01-22 18:44:42   ifconfig_ipv6_local = '[UNDEF]'
2023-01-22 18:44:42   ifconfig_ipv6_netbits = 0
2023-01-22 18:44:42   ifconfig_ipv6_remote = '[UNDEF]'
2023-01-22 18:44:42   shaper = 0
2023-01-22 18:44:42   mtu_test = 0
2023-01-22 18:44:42   mlock = DISABLED
2023-01-22 18:44:42   keepalive_ping = 0
2023-01-22 18:44:42   keepalive_timeout = 0
2023-01-22 18:44:42   inactivity_timeout = 0
2023-01-22 18:44:42   ping_send_timeout = 0
2023-01-22 18:44:42   ping_rec_timeout = 0
2023-01-22 18:44:42   ping_rec_timeout_action = 0
2023-01-22 18:44:42   ping_timer_remote = DISABLED
2023-01-22 18:44:42   remap_sigusr1 = 0
2023-01-22 18:44:42   persist_tun = DISABLED
2023-01-22 18:44:42   persist_local_ip = DISABLED
2023-01-22 18:44:42   persist_remote_ip = DISABLED
2023-01-22 18:44:42   persist_key = DISABLED
2023-01-22 18:44:42   passtos = DISABLED
2023-01-22 18:44:42   resolve_retry_seconds = 1000000000
2023-01-22 18:44:42   resolve_in_advance = DISABLED
2023-01-22 18:44:42   username = '[UNDEF]'
2023-01-22 18:44:42   groupname = '[UNDEF]'
2023-01-22 18:44:42   chroot_dir = '[UNDEF]'
2023-01-22 18:44:42   cd_dir = '[UNDEF]'
2023-01-22 18:44:42   writepid = '[UNDEF]'
2023-01-22 18:44:42   up_script = '[UNDEF]'
2023-01-22 18:44:42   down_script = '[UNDEF]'
2023-01-22 18:44:42   down_pre = DISABLED
2023-01-22 18:44:42   up_restart = DISABLED
2023-01-22 18:44:42   up_delay = DISABLED
2023-01-22 18:44:42   daemon = DISABLED
2023-01-22 18:44:42   inetd = 0
2023-01-22 18:44:42   log = DISABLED
2023-01-22 18:44:42   suppress_timestamps = ENABLED
2023-01-22 18:44:42   machine_readable_output = DISABLED
2023-01-22 18:44:42   nice = 0
2023-01-22 18:44:42   verbosity = 5
2023-01-22 18:44:42   mute = 0
2023-01-22 18:44:42   gremlin = 0
2023-01-22 18:44:42   status_file = '[UNDEF]'
2023-01-22 18:44:42   status_file_version = 1
2023-01-22 18:44:42   status_file_update_freq = 60
2023-01-22 18:44:42   occ = ENABLED
2023-01-22 18:44:42   rcvbuf = 0
2023-01-22 18:44:42   sndbuf = 0
2023-01-22 18:44:42   sockflags = 0
2023-01-22 18:44:42   fast_io = DISABLED
2023-01-22 18:44:42   comp.alg = 2
2023-01-22 18:44:42   comp.flags = 1
2023-01-22 18:44:42   route_script = '[UNDEF]'
2023-01-22 18:44:42   route_default_gateway = '[UNDEF]'
2023-01-22 18:44:42   route_default_metric = 0
2023-01-22 18:44:42   route_noexec = DISABLED
2023-01-22 18:44:42   route_delay = 0
2023-01-22 18:44:42   route_delay_window = 30
2023-01-22 18:44:42   route_delay_defined = DISABLED
2023-01-22 18:44:42   route_nopull = DISABLED
2023-01-22 18:44:42   route_gateway_via_dhcp = DISABLED
2023-01-22 18:44:42   allow_pull_fqdn = DISABLED
2023-01-22 18:44:42   shared_secret_file = '[UNDEF]'
2023-01-22 18:44:42   key_direction = not set
2023-01-22 18:44:42   ciphername = 'AES-128-CBC'
2023-01-22 18:44:42   ncp_enabled = ENABLED
2023-01-22 18:44:42   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
2023-01-22 18:44:42   authname = 'SHA1'
2023-01-22 18:44:42   prng_hash = 'SHA1'
2023-01-22 18:44:42   prng_nonce_secret_len = 16
2023-01-22 18:44:42   keysize = 0
2023-01-22 18:44:42   engine = DISABLED
2023-01-22 18:44:42   replay = ENABLED
2023-01-22 18:44:42   mute_replay_warnings = DISABLED
2023-01-22 18:44:42   replay_window = 64
2023-01-22 18:44:42   replay_time = 15
2023-01-22 18:44:42   packet_id_file = '[UNDEF]'
2023-01-22 18:44:42   use_iv = ENABLED
2023-01-22 18:44:42   test_crypto = DISABLED
2023-01-22 18:44:42   tls_server = DISABLED
2023-01-22 18:44:42   tls_client = ENABLED
2023-01-22 18:44:42   key_method = 2
2023-01-22 18:44:42   ca_file = '[[INLINE]]'
2023-01-22 18:44:42   ca_path = '[UNDEF]'
2023-01-22 18:44:42   dh_file = '[UNDEF]'
2023-01-22 18:44:42   cert_file = '[[INLINE]]'
2023-01-22 18:44:42   extra_certs_file = '[UNDEF]'
2023-01-22 18:44:42   priv_key_file = '[[INLINE]]'
2023-01-22 18:44:42   pkcs12_file = '[UNDEF]'
2023-01-22 18:44:42   cipher_list = '[UNDEF]'
2023-01-22 18:44:42   cipher_list_tls13 = '[UNDEF]'
2023-01-22 18:44:42   tls_cert_profile = '[UNDEF]'
2023-01-22 18:44:42   tls_verify = '[UNDEF]'
2023-01-22 18:44:42   tls_export_cert = '[UNDEF]'
2023-01-22 18:44:42   verify_x509_type = 0
2023-01-22 18:44:42   verify_x509_name = '[UNDEF]'
2023-01-22 18:44:42   crl_file = '[UNDEF]'
2023-01-22 18:44:42   ns_cert_type = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_ku[i] = 0
2023-01-22 18:44:42   remote_cert_eku = '[UNDEF]'
2023-01-22 18:44:42   ssl_flags = 0
2023-01-22 18:44:42   tls_timeout = 2
2023-01-22 18:44:42   renegotiate_bytes = -1
2023-01-22 18:44:42   renegotiate_packets = 0
2023-01-22 18:44:42   renegotiate_seconds = 3600
2023-01-22 18:44:42   handshake_window = 60
2023-01-22 18:44:42   transition_window = 3600
2023-01-22 18:44:42   single_session = DISABLED
2023-01-22 18:44:42   push_peer_info = DISABLED
2023-01-22 18:44:42   tls_exit = DISABLED
2023-01-22 18:44:42   tls_auth_file = '[UNDEF]'
2023-01-22 18:44:42   tls_crypt_file = '[UNDEF]'
2023-01-22 18:44:42   client = ENABLED
2023-01-22 18:44:42   pull = ENABLED
2023-01-22 18:44:42   auth_user_pass_file = '[UNDEF]'
2023-01-22 18:44:42 OpenVPN 2.4.9 android-arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Nov  7 2022
2023-01-22 18:44:42 library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
2023-01-22 18:44:42 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-22 18:44:42 LZO compression initializing
2023-01-22 18:44:42 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2023-01-22 18:44:42 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2023-01-22 18:44:42 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-22 18:44:42 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-22 18:44:42 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-22 18:44:42 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-01-22 18:44:42 UDPv4 link local: (not bound)
2023-01-22 18:44:42 UDPv4 link remote: [AF_INET]73.12.x.x:12973
2023-01-22 18:44:42 W
2023-01-22 18:44:45 W
2023-01-22 18:44:49 W
2023-01-22 18:44:57 W
2023-01-22 18:45:13 W
2023-01-22 18:45:43 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2023-01-22 18:45:43 TLS Error: TLS handshake failed
2023-01-22 18:45:43 TCP/UDP: Closing socket
2023-01-22 18:45:43 SIGUSR1[soft,tls-error] received, process restarting
2023-01-22 18:45:43 Restart pause, 5 second(s)
2023-01-22 18:45:48 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-22 18:45:48 LZO compression initializing
2023-01-22 18:45:48 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2023-01-22 18:45:48 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2023-01-22 18:45:48 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-22 18:45:48 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-22 18:45:48 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-22 18:45:48 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-01-22 18:45:48 UDPv4 link local: (not bound)
2023-01-22 18:45:48 UDPv4 link remote: [AF_INET]73.12.x.x:12973
2023-01-22 18:45:48 W
2023-01-22 18:45:50 W
2023-01-22 18:45:54 W
2023-01-22 18:46:02 W
2023-01-22 18:46:18 W
2023-01-22 18:51:10 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2023-01-22 18:51:10 TLS Error: TLS handshake failed
2023-01-22 18:51:10 TCP/UDP: Closing socket
2023-01-22 18:51:10 SIGUSR1[soft,tls-error] received, process restarting
2023-01-22 18:51:10 Restart pause, 5 second(s)
2023-01-22 18:51:15 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-22 18:51:15 LZO compression initializing
2023-01-22 18:51:15 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ]
2023-01-22 18:51:15 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2023-01-22 18:51:15 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-22 18:51:15 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-22 18:51:15 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-22 18:51:15 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-01-22 18:51:15 UDPv4 link local: (not bound)
2023-01-22 18:51:15 UDPv4 link remote: [AF_INET]73.12.x.x:12973
2023-01-22 18:51:15 W
2023-01-22 18:51:17 W
2023-01-22 18:51:21 W
2023-01-22 18:51:29 W
2023-01-22 18:51:39 Disconnecting request by user
2023-01-22 18:51:39 Disconnecting...
2023-01-22 18:51:39 TCP/UDP: Closing socket
2023-01-22 18:51:39 SIGINT[soft,] received, process exiting

I am able to connect from my laptop using OpenVPN and a TAP connection.
Any suggestions?
Thank you.
admin
Site Admin
Posts: 877
Joined: Fri Feb 15, 2019 4:04 pm
Contact:

Re: Unable to connect over TUN - TLS error

Post by admin »

2023-01-22 18:45:43 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
This error means that the client receives no response from the server. So sent and/or received packets are lost. This usually happens when there is a firewall between the client and the server and does not allow certain ports and/or protocols to be used.
norcaldsm
Posts: 4
Joined: Mon Jan 23, 2023 12:50 am

Re: Unable to connect over TUN - TLS error

Post by norcaldsm »

Still not having any luck.
The server is a Netgear Router. It provided the configuration file for both my laptop and android.
The laptop configuration connects fine.
The android one times out.
Only difference I can see is the laptop configuration is TAP while the android is TUN
Android can use PIA VPN without issue. Not seeing any firewall block.
Router logs don't show the android trying to connect. Only shows the laptop connecting.
I'm thinking an issue with TUN?
admin
Site Admin
Posts: 877
Joined: Fri Feb 15, 2019 4:04 pm
Contact:

Re: Unable to connect over TUN - TLS error

Post by admin »

Android can use PIA VPN without issue.
Probably this VPN uses another port and/or the TCP protocol.
Router logs don't show the android trying to connect.
This means that packets sent by the client are blocked.
I'm thinking an issue with TUN?
If the TUN/TAP configuration does not match the VPN connection is established anyway but then it is not possible to use it.

You can try changing the port used by the VPN or change the protocol from UDP to TCP. In any case, the changes must be made both on the router and on all VPN clients.
norcaldsm
Posts: 4
Joined: Mon Jan 23, 2023 12:50 am

Re: Unable to connect over TUN - TLS error

Post by norcaldsm »

Switched to TCP TUN over port 12973 on both router and android client.
Still appears to be timing out when connecting. Logs on router don't show any connection attempt.
Is there any reported issues with Android and TUN based connections?

Code: Select all

2023-01-24 14:23:26 VpnClientPro-google-api27-release-1.01.27 (23010127)
2023-01-24 14:23:26 Connecting request by user
2023-01-24 14:23:26 Current Parameter Settings:
2023-01-24 14:23:26   config = '/data/user/0/it.colucciweb.vpnclientpro/files/temp/78a6d301-02e9-49ea-97d3-0f36add865a2.conf'
2023-01-24 14:23:26   mode = 0
2023-01-24 14:23:26   persist_config = DISABLED
2023-01-24 14:23:26   persist_mode = 1
2023-01-24 14:23:26   show_ciphers = DISABLED
2023-01-24 14:23:26   show_digests = DISABLED
2023-01-24 14:23:26   show_engines = DISABLED
2023-01-24 14:23:26   genkey = DISABLED
2023-01-24 14:23:26   key_pass_file = '[UNDEF]'
2023-01-24 14:23:26   show_tls_ciphers = DISABLED
2023-01-24 14:23:26   connect_retry_max = 0
2023-01-24 14:23:26 Connection profiles [0]:
2023-01-24 14:23:26   proto = tcp-client
2023-01-24 14:23:26   local = '[UNDEF]'
2023-01-24 14:23:26   local_port = '[UNDEF]'
2023-01-24 14:23:26   remote = 'xx.ddns.net'
2023-01-24 14:23:26   remote_port = '12973'
2023-01-24 14:23:26   remote_float = DISABLED
2023-01-24 14:23:26   bind_defined = DISABLED
2023-01-24 14:23:26   bind_local = DISABLED
2023-01-24 14:23:26   bind_ipv6_only = DISABLED
2023-01-24 14:23:26   connect_retry_seconds = 5
2023-01-24 14:23:26   connect_timeout = 10
2023-01-24 14:23:26   xormethod = 0
2023-01-24 14:23:26   xormask = ''
2023-01-24 14:23:26   xormasklen = 0
2023-01-24 14:23:26   socks_proxy_server = '[UNDEF]'
2023-01-24 14:23:26   socks_proxy_port = '[UNDEF]'
2023-01-24 14:23:26   tun_mtu = 1500
2023-01-24 14:23:26   tun_mtu_defined = ENABLED
2023-01-24 14:23:26   link_mtu = 1500
2023-01-24 14:23:26   link_mtu_defined = DISABLED
2023-01-24 14:23:26   tun_mtu_extra = 0
2023-01-24 14:23:26   tun_mtu_extra_defined = DISABLED
2023-01-24 14:23:26   mtu_discover_type = -1
2023-01-24 14:23:26   fragment = 0
2023-01-24 14:23:26   mssfix = 1450
2023-01-24 14:23:26   explicit_exit_notification = 0
2023-01-24 14:23:26 Connection profiles END
2023-01-24 14:23:26   remote_random = DISABLED
2023-01-24 14:23:26   ipchange = '[UNDEF]'
2023-01-24 14:23:26   dev = 'tun'
2023-01-24 14:23:26   dev_type = '[UNDEF]'
2023-01-24 14:23:26   dev_node = '[UNDEF]'
2023-01-24 14:23:26   lladdr = '[UNDEF]'
2023-01-24 14:23:26   topology = 1
2023-01-24 14:23:26   ifconfig_local = '[UNDEF]'
2023-01-24 14:23:26   ifconfig_remote_netmask = '[UNDEF]'
2023-01-24 14:23:26   ifconfig_noexec = DISABLED
2023-01-24 14:23:26   ifconfig_nowarn = DISABLED
2023-01-24 14:23:26   ifconfig_ipv6_local = '[UNDEF]'
2023-01-24 14:23:26   ifconfig_ipv6_netbits = 0
2023-01-24 14:23:26   ifconfig_ipv6_remote = '[UNDEF]'
2023-01-24 14:23:26   shaper = 0
2023-01-24 14:23:26   mtu_test = 0
2023-01-24 14:23:26   mlock = DISABLED
2023-01-24 14:23:26   keepalive_ping = 0
2023-01-24 14:23:26   keepalive_timeout = 0
2023-01-24 14:23:26   inactivity_timeout = 0
2023-01-24 14:23:26   ping_send_timeout = 0
2023-01-24 14:23:26   ping_rec_timeout = 0
2023-01-24 14:23:26   ping_rec_timeout_action = 0
2023-01-24 14:23:26   ping_timer_remote = DISABLED
2023-01-24 14:23:26   remap_sigusr1 = 0
2023-01-24 14:23:26   persist_tun = DISABLED
2023-01-24 14:23:26   persist_local_ip = DISABLED
2023-01-24 14:23:26   persist_remote_ip = DISABLED
2023-01-24 14:23:26   persist_key = DISABLED
2023-01-24 14:23:26   passtos = DISABLED
2023-01-24 14:23:26   resolve_retry_seconds = 1000000000
2023-01-24 14:23:26   resolve_in_advance = DISABLED
2023-01-24 14:23:26   username = '[UNDEF]'
2023-01-24 14:23:26   groupname = '[UNDEF]'
2023-01-24 14:23:26   chroot_dir = '[UNDEF]'
2023-01-24 14:23:26   cd_dir = '[UNDEF]'
2023-01-24 14:23:26   writepid = '[UNDEF]'
2023-01-24 14:23:26   up_script = '[UNDEF]'
2023-01-24 14:23:26   down_script = '[UNDEF]'
2023-01-24 14:23:26   down_pre = DISABLED
2023-01-24 14:23:26   up_restart = DISABLED
2023-01-24 14:23:26   up_delay = DISABLED
2023-01-24 14:23:26   daemon = DISABLED
2023-01-24 14:23:26   inetd = 0
2023-01-24 14:23:26   log = DISABLED
2023-01-24 14:23:26   suppress_timestamps = ENABLED
2023-01-24 14:23:26   machine_readable_output = DISABLED
2023-01-24 14:23:26   nice = 0
2023-01-24 14:23:26   verbosity = 5
2023-01-24 14:23:26   mute = 0
2023-01-24 14:23:26   gremlin = 0
2023-01-24 14:23:26   status_file = '[UNDEF]'
2023-01-24 14:23:26   status_file_version = 1
2023-01-24 14:23:26   status_file_update_freq = 60
2023-01-24 14:23:26   occ = ENABLED
2023-01-24 14:23:26   rcvbuf = 0
2023-01-24 14:23:26   sndbuf = 0
2023-01-24 14:23:26   sockflags = 0
2023-01-24 14:23:26   fast_io = DISABLED
2023-01-24 14:23:26   comp.alg = 2
2023-01-24 14:23:26   comp.flags = 1
2023-01-24 14:23:26   route_script = '[UNDEF]'
2023-01-24 14:23:26   route_default_gateway = '[UNDEF]'
2023-01-24 14:23:26   route_default_metric = 0
2023-01-24 14:23:26   route_noexec = DISABLED
2023-01-24 14:23:26   route_delay = 0
2023-01-24 14:23:26   route_delay_window = 30
2023-01-24 14:23:26   route_delay_defined = DISABLED
2023-01-24 14:23:26   route_nopull = DISABLED
2023-01-24 14:23:26   route_gateway_via_dhcp = DISABLED
2023-01-24 14:23:26   allow_pull_fqdn = DISABLED
2023-01-24 14:23:26   shared_secret_file = '[UNDEF]'
2023-01-24 14:23:26   key_direction = not set
2023-01-24 14:23:26   ciphername = 'AES-128-CBC'
2023-01-24 14:23:26   ncp_enabled = ENABLED
2023-01-24 14:23:26   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
2023-01-24 14:23:26   authname = 'SHA1'
2023-01-24 14:23:26   prng_hash = 'SHA1'
2023-01-24 14:23:26   prng_nonce_secret_len = 16
2023-01-24 14:23:26   keysize = 0
2023-01-24 14:23:26   engine = DISABLED
2023-01-24 14:23:26   replay = ENABLED
2023-01-24 14:23:26   mute_replay_warnings = DISABLED
2023-01-24 14:23:26   replay_window = 64
2023-01-24 14:23:26   replay_time = 15
2023-01-24 14:23:26   packet_id_file = '[UNDEF]'
2023-01-24 14:23:26   use_iv = ENABLED
2023-01-24 14:23:26   test_crypto = DISABLED
2023-01-24 14:23:26   tls_server = DISABLED
2023-01-24 14:23:26   tls_client = ENABLED
2023-01-24 14:23:26   key_method = 2
2023-01-24 14:23:26   ca_file = '[[INLINE]]'
2023-01-24 14:23:26   ca_path = '[UNDEF]'
2023-01-24 14:23:26   dh_file = '[UNDEF]'
2023-01-24 14:23:26   cert_file = '[[INLINE]]'
2023-01-24 14:23:26   extra_certs_file = '[UNDEF]'
2023-01-24 14:23:26   priv_key_file = '[[INLINE]]'
2023-01-24 14:23:26   pkcs12_file = '[UNDEF]'
2023-01-24 14:23:26   cipher_list = '[UNDEF]'
2023-01-24 14:23:26   cipher_list_tls13 = '[UNDEF]'
2023-01-24 14:23:26   tls_cert_profile = '[UNDEF]'
2023-01-24 14:23:26   tls_verify = '[UNDEF]'
2023-01-24 14:23:26   tls_export_cert = '[UNDEF]'
2023-01-24 14:23:26   verify_x509_type = 0
2023-01-24 14:23:26   verify_x509_name = '[UNDEF]'
2023-01-24 14:23:26   crl_file = '[UNDEF]'
2023-01-24 14:23:26   ns_cert_type = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_ku[i] = 0
2023-01-24 14:23:26   remote_cert_eku = '[UNDEF]'
2023-01-24 14:23:26   ssl_flags = 0
2023-01-24 14:23:26   tls_timeout = 2
2023-01-24 14:23:26   renegotiate_bytes = -1
2023-01-24 14:23:26   renegotiate_packets = 0
2023-01-24 14:23:26   renegotiate_seconds = 3600
2023-01-24 14:23:26   handshake_window = 60
2023-01-24 14:23:26   transition_window = 3600
2023-01-24 14:23:26   single_session = DISABLED
2023-01-24 14:23:26   push_peer_info = DISABLED
2023-01-24 14:23:26   tls_exit = DISABLED
2023-01-24 14:23:26   tls_auth_file = '[UNDEF]'
2023-01-24 14:23:26   tls_crypt_file = '[UNDEF]'
2023-01-24 14:23:26   client = ENABLED
2023-01-24 14:23:26   pull = ENABLED
2023-01-24 14:23:26   auth_user_pass_file = '[UNDEF]'
2023-01-24 14:23:26 OpenVPN 2.4.9 android-arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Nov  7 2022
2023-01-24 14:23:26 library versions: OpenSSL 1.1.1s  1 Nov 2022, LZO 2.10
2023-01-24 14:23:26 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:23:26 LZO compression initializing
2023-01-24 14:23:26 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:23:26 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:23:26 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:23:26 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:23:26 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:23:26 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:23:26 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:23:27 TCP connection established with [AF_INET]73.12.x.x:12973
2023-01-24 14:23:27 TCPv4_CLIENT link local: (not bound)
2023-01-24 14:23:27 TCPv4_CLIENT link remote: [AF_INET]73.12.x.x:12973
2023-01-24 14:23:27 W
2023-01-24 14:23:27 R
2023-01-24 14:23:27 TLS: Initial packet from [AF_INET]73.12.x.x:12973, sid=c251dbbe 13dd03e5
2023-01-24 14:23:27 W
2023-01-24 14:23:27 W
2023-01-24 14:23:28 R
2023-01-24 14:23:28 W
2023-01-24 14:23:28 R
2023-01-24 14:23:28 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
2023-01-24 14:23:28 VERIFY OK: depth=0, C=TW, ST=TW, O=netgear, OU=netgear, CN=netgear, emailAddress=mail@netgear.com
2023-01-24 14:23:28 R
2023-01-24 14:23:28 W
2023-01-24 14:23:28 W
2023-01-24 14:23:28 W
2023-01-24 14:23:28 R
2023-01-24 14:23:28 R
2023-01-24 14:23:28 W
2023-01-24 14:23:28 R
2023-01-24 14:23:28 W
2023-01-24 14:23:28 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2023-01-24 14:23:28 [netgear] Peer Connection Initiated with [AF_INET]73.12.x.x:12973
2023-01-24 14:23:29 R
2023-01-24 14:23:29 Key [AF_INET]73.12.x.x:12973 [0] not initialized (yet), dropping packet.
2023-01-24 14:23:29 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2023-01-24 14:23:29 W
2023-01-24 14:23:29 R
2023-01-24 14:23:29 Key [AF_INET]73.12.x.x:12973 [0] not initialized (yet), dropping packet.
2023-01-24 14:23:29 R
2023-01-24 14:23:29 Key [AF_INET]73.12.x.x:12973 [0] not initialized (yet), dropping packet.
2023-01-24 14:23:31 W
2023-01-24 14:23:34 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2023-01-24 14:23:34 W
2023-01-24 14:23:35 W
2023-01-24 14:23:36 W
2023-01-24 14:23:39 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2023-01-24 14:23:39 W
2023-01-24 14:23:40 Connection reset, restarting [-1]
2023-01-24 14:23:40 TCP/UDP: Closing socket
2023-01-24 14:23:40 SIGUSR1[soft,connection-reset] received, process restarting
2023-01-24 14:23:40 Restart pause, 5 second(s)
2023-01-24 14:23:45 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:23:45 LZO compression initializing
2023-01-24 14:23:45 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:23:45 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:23:45 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:23:45 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:23:45 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:23:45 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:23:45 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:23:46 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:23:46 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:23:46 Restart pause, 5 second(s)
2023-01-24 14:23:51 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:23:51 LZO compression initializing
2023-01-24 14:23:51 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:23:51 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:23:51 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:23:51 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:23:51 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:23:51 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:23:51 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:23:52 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:23:52 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:23:52 Restart pause, 5 second(s)
2023-01-24 14:23:57 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:23:57 LZO compression initializing
2023-01-24 14:23:57 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:23:57 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:23:57 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:23:57 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:23:57 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:23:57 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:23:57 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:23:58 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:23:58 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:23:58 Restart pause, 5 second(s)
2023-01-24 14:24:03 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:24:03 LZO compression initializing
2023-01-24 14:24:03 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:24:03 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:24:03 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:24:03 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:24:03 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:24:03 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:24:03 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:24:04 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:24:04 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:24:04 Restart pause, 5 second(s)
2023-01-24 14:24:09 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:24:09 LZO compression initializing
2023-01-24 14:24:09 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:24:09 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:24:09 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:24:09 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:24:09 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:24:09 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:24:09 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:24:10 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:24:10 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:24:10 Restart pause, 5 second(s)
2023-01-24 14:24:16 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:24:16 LZO compression initializing
2023-01-24 14:24:16 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:24:16 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:24:16 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:24:16 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:24:16 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:24:16 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:24:16 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:24:17 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:24:17 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:24:17 Restart pause, 5 second(s)
2023-01-24 14:24:22 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:24:22 LZO compression initializing
2023-01-24 14:24:22 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:24:22 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:24:22 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:24:22 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:24:22 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:24:22 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:24:22 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:24:23 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:24:23 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:24:23 Restart pause, 5 second(s)
2023-01-24 14:24:28 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:24:28 LZO compression initializing
2023-01-24 14:24:28 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:24:28 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:24:28 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:24:28 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:24:28 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:24:28 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:24:28 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:24:30 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:24:30 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:24:30 Restart pause, 5 second(s)
2023-01-24 14:24:35 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:24:35 LZO compression initializing
2023-01-24 14:24:35 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:24:35 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:24:35 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:24:35 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:24:35 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:24:35 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:24:35 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:24:36 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:24:36 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:24:36 Restart pause, 5 second(s)
2023-01-24 14:24:41 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2023-01-24 14:24:41 LZO compression initializing
2023-01-24 14:24:41 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2023-01-24 14:24:41 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2023-01-24 14:24:41 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
2023-01-24 14:24:41 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
2023-01-24 14:24:41 TCP/UDP: Preserving recently used remote address: [AF_INET]73.12.x.x:12973
2023-01-24 14:24:41 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
2023-01-24 14:24:41 Attempting to establish TCP connection with [AF_INET]73.12.x.x:12973 [nonblock]
2023-01-24 14:24:43 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
2023-01-24 14:24:43 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2023-01-24 14:24:43 Restart pause, 5 second(s)
2023-01-24 14:24:43 Disconnecting request by user
2023-01-24 14:24:43 Disconnecting...
2023-01-24 14:24:43 SIGINT[soft,init_instance] received, process exiting
admin
Site Admin
Posts: 877
Joined: Fri Feb 15, 2019 4:04 pm
Contact:

Re: Unable to connect over TUN - TLS error

Post by admin »

2023-01-24 14:24:43 TCP: connect to [AF_INET]73.12.x.x:12973 failed: Connection refused
This error means that the connection was rejected by the remote host. This usually happens when the VPN server is not running or listening on another port or a firewall is rejecting TCP-SYN packets.
I'm sorry but all these problems you are having are not related to the app, instead they are due to some communication problems between the client and the server.
norcaldsm
Posts: 4
Joined: Mon Jan 23, 2023 12:50 am

Re: Unable to connect over TUN - TLS error

Post by norcaldsm »

For whatever reason, a TUN connection does not work between my Netgear Nighthawk and VPN Client Pro.
I purchased the Pro version and used a TAP connection without any problems.
Hopefully this information is useful for anyone else experiencing this issue.
Thank you for your assistance.
Post Reply