Mar 13 15:13:03 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:03 2020 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Mar 13 15:13:03 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:03 2020 TLS Error: TLS handshake failed Mar 13 15:13:03 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:03 2020 Fatal TLS error (check_tls_errors_co), restarting ...skipping... Mar 13 15:13:03 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:03 2020 SIGUSR1[soft,tls-error] received, process restarting Mar 13 15:13:03 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:03 2020 Restart pause, 20 second(s) Mar 13 15:13:23 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:23 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mar 13 15:13:26 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:26 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]51.15.127.56:443 Mar 13 15:13:26 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:26 2020 Socket Buffers: R=[87380->87380] S=[16384->16384] Mar 13 15:13:26 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:26 2020 Attempting to establish TCP connection with [AF_INET]51.15.127.56:443 [nonblock] Mar 13 15:13:27 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:27 2020 TCP connection established with [AF_INET]51.15.127.56:443 Mar 13 15:13:27 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:27 2020 TCP_CLIENT link local: (not bound) Mar 13 15:13:27 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:27 2020 TCP_CLIENT link remote: [AF_INET]51.15.127.56:443 Mar 13 15:13:28 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:28 2020 TLS: Initial packet from [AF_INET]51.15.127.56:443, sid=ce2cd81a 7f1fed6f Mar 13 15:13:29 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:29 2020 VERIFY OK: depth=1, CN=vpn-ca.domain.org Mar 13 15:13:29 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:29 2020 VERIFY KU OK Mar 13 15:13:29 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:29 2020 Validating certificate extended key usage Mar 13 15:13:29 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:29 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mar 13 15:13:29 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:29 2020 VERIFY EKU OK Mar 13 15:13:29 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:29 2020 VERIFY OK: depth=0, CN=vpn.domain.org Mar 13 15:13:36 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:36 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Mar 13 15:13:36 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:36 2020 [vpn.domains4life.org] Peer Connection Initiated with [AF_INET]51.15.127.56:443 Mar 13 15:13:37 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:37 2020 SENT CONTROL [vpn.domains4life.org]: 'PUSH_REQUEST' (status=1) Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 PUSH: Received control message: 'PUSH_REPLY,sndbuf 0,rcvbuf 0,route 10.240.0.1,ping 10,ping-restart 60,socket-flag> Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 OPTIONS IMPORT: timers and/or timeouts modified Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 Socket Buffers: R=[341760->341760] S=[44800->44800] Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 OPTIONS IMPORT: --socket-flags option modified Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 Socket flags: TCP_NODELAY=1 succeeded Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 OPTIONS IMPORT: --ifconfig/up options modified Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 OPTIONS IMPORT: route options modified Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 OPTIONS IMPORT: peer-id set Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 OPTIONS IMPORT: adjusting link_mtu to 1627 Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 OPTIONS IMPORT: data channel crypto options modified Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 ROUTE_GATEWAY 10.190.0.97/255.255.255.240 IFACE=wwan0 HWADDR=00:1e:10:1f:00:00 Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 TUN/TAP device resin-vpn opened Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 TUN/TAP TX queue length set to 100 Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 /sbin/ip link set dev resin-vpn up mtu 1500 Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 /sbin/ip addr add dev resin-vpn local 10.240.0.35 peer 10.240.0.1 Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 /etc/openvpn-misc/upscript.sh resin-vpn 1500 1555 10.240.0.35 10.240.0.1 init Mar 13 15:13:38 9bdd4a2 openvpn[853]: resin-ntp-config: Found config.json in /mnt/boot/config.json . Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 /sbin/ip route add 10.240.0.1/32 via 10.240.0.1 Mar 13 15:13:38 9bdd4a2 openvpn[853]: ip: RTNETLINK answers: File exists Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 ERROR: Linux route add command failed: external program exited with error status: 2 Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 GID set to openvpn Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 UID set to openvpn Mar 13 15:13:38 9bdd4a2 openvpn[853]: Fri Mar 13 15:13:38 2020 Initialization Sequence Completed