Hi,
To run my vpn I usally run this command :
Since 2 weeks I have this error while trying to run it :
...
2024-11-19 14:40:33 us=809858 OpenVPN 2.6.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2024-11-19 14:40:33 us=809872 library versions: OpenSSL 3.1.1 30 May 2023, LZO 2.10
2024-11-19 14:40:33 us=809893 DCO version: N/A
2024-11-19 14:40:33 us=811007 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-11-19 14:40:33 us=811026 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-11-19 14:40:33 us=811108 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2024-11-19 14:40:33 us=845928 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2024-11-19 14:40:33 us=845990 TCP/UDP: Preserving recently used remote address: [AF_INET6]2a02:6ea0:c91a::5:1194
2024-11-19 14:40:33 us=846008 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-11-19 14:40:33 us=846015 NOTE: setsockopt TCP_NODELAY=1 failed
2024-11-19 14:40:33 us=846024 UDPv6 link local: (not bound)
2024-11-19 14:40:33 us=846031 UDPv6 link remote: [AF_INET6]2a02:6ea0:c91a::5:1194
2024-11-19 14:40:33 us=846074 UDPv6 WRITE [54] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2024-11-19 14:40:33 us=861915 UDPv6 READ [66] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2024-11-19 14:40:33 us=861987 TLS: Initial packet from [AF_INET6]2a02:6ea0:c91a::5:1194, sid=671770e0 50cccf54
2024-11-19 14:40:33 us=862053 net_route_v4_best_gw query: dst 0.0.0.0
2024-11-19 14:40:33 us=862159 sitnl_send: checking for received messages
2024-11-19 14:40:33 us=862186 sitnl_send: rtnl: received 976 bytes
2024-11-19 14:40:33 us=862238 net_route_v4_best_gw result: via 192.168.1.1 dev wlp3s0
2024-11-19 14:40:33 us=862325 UDPv6 WRITE [341] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=275
2024-11-19 14:40:33 us=883124 UDPv6 READ [1316] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1250
2024-11-19 14:40:33 us=883533 UDPv6 WRITE [66] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 0 ] DATA len=0
2024-11-19 14:40:33 us=883634 UDPv6 READ [1221] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1155
2024-11-19 14:40:33 us=884155 VERIFY OK: depth=1, CN=CloudVPN Prod CA
2024-11-19 14:40:33 us=884300 VERIFY KU OK
2024-11-19 14:40:33 us=884309 Validating certificate extended key usage
2024-11-19 14:40:33 us=884315 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-11-19 14:40:33 us=884321 VERIFY EKU OK
2024-11-19 14:40:33 us=884326 VERIFY OK: depth=0, CN=fr-cdg-dc1-g1.cloud.openvpn.net
2024-11-19 14:40:33 us=885686 UDPv6 WRITE [1202] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 2 1 0 ] pid=2 DATA len=1128
2024-11-19 14:40:33 us=885800 UDPv6 WRITE [1202] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 2 1 0 ] pid=3 DATA len=1128
2024-11-19 14:40:33 us=885828 UDPv6 WRITE [402] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ 2 1 0 ] pid=4 DATA len=328
2024-11-19 14:40:33 us=897314 UDPv6 READ [66] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 1 2 ] DATA len=0
2024-11-19 14:40:33 us=897407 UDPv6 READ [232] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 1 2 3 ] pid=3 DATA len=158
2024-11-19 14:40:33 us=897528 UDPv6 WRITE [74] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #7 ] [ 3 2 1 0 ] DATA len=0
2024-11-19 14:40:33 us=898910 UDPv6 READ [311] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ 1 2 3 4 ] pid=4 DATA len=233
2024-11-19 14:40:33 us=899051 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2024-11-19 14:40:33 us=899078 [fr-cdg-dc1-g1.cloud.openvpn.net] Peer Connection Initiated with [AF_INET6]2a02:6ea0:c91a::5:1194
2024-11-19 14:40:33 us=899102 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2024-11-19 14:40:33 us=899170 TLS: tls_multi_process: initial untrusted session promoted to trusted
2024-11-19 14:40:33 us=899196 UDPv6 WRITE [78] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 0 ] DATA len=0
2024-11-19 14:40:35 us=29484 SENT CONTROL [fr-cdg-dc1-g1.cloud.openvpn.net]: 'PUSH_REQUEST' (status=1)
2024-11-19 14:40:35 us=29642 UDPv6 WRITE [113] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=5 DATA len=35
2024-11-19 14:40:35 us=41430 UDPv6 READ [74] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #7 ] [ 2 3 4 5 ] DATA len=0
2024-11-19 14:40:35 us=41526 UDPv6 READ [112] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 2 3 4 5 ] pid=5 DATA len=34
2024-11-19 14:40:35 us=41571 AUTH: Received control message: AUTH_FAILED
2024-11-19 14:40:35 us=41711 TCP/UDP: Closing socket
2024-11-19 14:40:35 us=41753 SIGTERM[soft,auth-failure] received, process exiting
My certificate is valid, I've checked with my company.
Any idea on what I should do ?
Thanks in advance,
Marine
To run my vpn I usally run this command :
Code:
sudo openvpn --config /home/marinfa/Documents/ovpn/config2.ovpn --verb 6
...
2024-11-19 14:40:33 us=809858 OpenVPN 2.6.8 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2024-11-19 14:40:33 us=809872 library versions: OpenSSL 3.1.1 30 May 2023, LZO 2.10
2024-11-19 14:40:33 us=809893 DCO version: N/A
2024-11-19 14:40:33 us=811007 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-11-19 14:40:33 us=811026 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2024-11-19 14:40:33 us=811108 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2024-11-19 14:40:33 us=845928 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2024-11-19 14:40:33 us=845990 TCP/UDP: Preserving recently used remote address: [AF_INET6]2a02:6ea0:c91a::5:1194
2024-11-19 14:40:33 us=846008 Socket Buffers: R=[212992->212992] S=[212992->212992]
2024-11-19 14:40:33 us=846015 NOTE: setsockopt TCP_NODELAY=1 failed
2024-11-19 14:40:33 us=846024 UDPv6 link local: (not bound)
2024-11-19 14:40:33 us=846031 UDPv6 link remote: [AF_INET6]2a02:6ea0:c91a::5:1194
2024-11-19 14:40:33 us=846074 UDPv6 WRITE [54] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2024-11-19 14:40:33 us=861915 UDPv6 READ [66] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2024-11-19 14:40:33 us=861987 TLS: Initial packet from [AF_INET6]2a02:6ea0:c91a::5:1194, sid=671770e0 50cccf54
2024-11-19 14:40:33 us=862053 net_route_v4_best_gw query: dst 0.0.0.0
2024-11-19 14:40:33 us=862159 sitnl_send: checking for received messages
2024-11-19 14:40:33 us=862186 sitnl_send: rtnl: received 976 bytes
2024-11-19 14:40:33 us=862238 net_route_v4_best_gw result: via 192.168.1.1 dev wlp3s0
2024-11-19 14:40:33 us=862325 UDPv6 WRITE [341] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=275
2024-11-19 14:40:33 us=883124 UDPv6 READ [1316] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1250
2024-11-19 14:40:33 us=883533 UDPv6 WRITE [66] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 0 ] DATA len=0
2024-11-19 14:40:33 us=883634 UDPv6 READ [1221] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1155
2024-11-19 14:40:33 us=884155 VERIFY OK: depth=1, CN=CloudVPN Prod CA
2024-11-19 14:40:33 us=884300 VERIFY KU OK
2024-11-19 14:40:33 us=884309 Validating certificate extended key usage
2024-11-19 14:40:33 us=884315 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-11-19 14:40:33 us=884321 VERIFY EKU OK
2024-11-19 14:40:33 us=884326 VERIFY OK: depth=0, CN=fr-cdg-dc1-g1.cloud.openvpn.net
2024-11-19 14:40:33 us=885686 UDPv6 WRITE [1202] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 2 1 0 ] pid=2 DATA len=1128
2024-11-19 14:40:33 us=885800 UDPv6 WRITE [1202] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 2 1 0 ] pid=3 DATA len=1128
2024-11-19 14:40:33 us=885828 UDPv6 WRITE [402] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ 2 1 0 ] pid=4 DATA len=328
2024-11-19 14:40:33 us=897314 UDPv6 READ [66] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 1 2 ] DATA len=0
2024-11-19 14:40:33 us=897407 UDPv6 READ [232] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 1 2 3 ] pid=3 DATA len=158
2024-11-19 14:40:33 us=897528 UDPv6 WRITE [74] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #7 ] [ 3 2 1 0 ] DATA len=0
2024-11-19 14:40:33 us=898910 UDPv6 READ [311] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ 1 2 3 4 ] pid=4 DATA len=233
2024-11-19 14:40:33 us=899051 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519
2024-11-19 14:40:33 us=899078 [fr-cdg-dc1-g1.cloud.openvpn.net] Peer Connection Initiated with [AF_INET6]2a02:6ea0:c91a::5:1194
2024-11-19 14:40:33 us=899102 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2024-11-19 14:40:33 us=899170 TLS: tls_multi_process: initial untrusted session promoted to trusted
2024-11-19 14:40:33 us=899196 UDPv6 WRITE [78] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 0 ] DATA len=0
2024-11-19 14:40:35 us=29484 SENT CONTROL [fr-cdg-dc1-g1.cloud.openvpn.net]: 'PUSH_REQUEST' (status=1)
2024-11-19 14:40:35 us=29642 UDPv6 WRITE [113] to [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=5 DATA len=35
2024-11-19 14:40:35 us=41430 UDPv6 READ [74] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_ACK_V1 kid=0 pid=[ #7 ] [ 2 3 4 5 ] DATA len=0
2024-11-19 14:40:35 us=41526 UDPv6 READ [112] from [AF_INET6]2a02:6ea0:c91a::5:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 2 3 4 5 ] pid=5 DATA len=34
2024-11-19 14:40:35 us=41571 AUTH: Received control message: AUTH_FAILED
2024-11-19 14:40:35 us=41711 TCP/UDP: Closing socket
2024-11-19 14:40:35 us=41753 SIGTERM[soft,auth-failure] received, process exiting
My certificate is valid, I've checked with my company.
Any idea on what I should do ?
Thanks in advance,
Marine