OpenVPN / ovpn-dco

OpenVPN Data Channel Offload in the linux kernel
101 stars 23 forks source link

Backtrace on first use (by openvpn-2.6.0rc2) #21

Closed hildeb closed 1 year ago

hildeb commented 1 year ago

While modprobing causes no backtrace:

[  106.031148] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
[  106.034095] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-3-g2fbc4e8 -- (C) 2020-2022 OpenVPN, Inc.

I'm getting a backtrace when openvpn-2.6.0rc2 first starts using dco:

[  174.474894] ------------[ cut here ]------------
[  174.474903] WARNING: CPU: 0 PID: 5469 at lib/nlattr.c:117 nla_get_range_unsigned+0xe9/0x150
[  174.474927] Modules linked in: ovpn_dco(OE) ip6_udp_tunnel udp_tunnel ccm rfcomm snd_seq_dummy snd_hrtimer cmac algif_hash algif_skcipher af_alg bnep binfmt_misc zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) snd_hda_codec_hdmi snd_ctl_led snd_hda_codec_realtek snd_hda_codec_generic btusb uvcvideo btrtl btbcm videobuf2_vmalloc btintel videobuf2_memops btmtk videobuf2_v4l2 videobuf2_common bluetooth videodev mc ecdh_generic ecc snd_soc_avs snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core snd_compress intel_tcc_cooling x86_pkg_temp_thermal ac97_bus dell_rbtn snd_pcm_dmaengine intel_powerclamp snd_hda_intel snd_intel_dspcfg coretemp snd_intel_sdw_acpi snd_hda_codec kvm_intel snd_hda_core snd_hwdep i915 mei_hdcp mei_pxp intel_rapl_msr snd_pcm joydev iwlmvm snd_seq_midi snd_seq_midi_event dell_laptop kvm snd_rawmidi drm_buddy crct10dif_pclmul mac80211 ttm ghash_clmulni_intel
[  174.475148]  dell_smm_hwmon snd_seq drm_display_helper aesni_intel libarc4 crypto_simd snd_seq_device cryptd cec snd_timer iwlwifi rc_core input_leds dell_wmi ledtrig_audio rapl drm_kms_helper snd dell_smbios i2c_algo_bit processor_thermal_device_pci_legacy dcdbas intel_cstate serio_raw dell_wmi_sysman fb_sys_fops processor_thermal_device soundcore ee1004 intel_wmi_thunderbolt cfg80211 processor_thermal_rfim syscopyarea dell_wmi_descriptor ucsi_acpi firmware_attributes_class wmi_bmof nls_iso8859_1 processor_thermal_mbox processor_thermal_rapl typec_ucsi mei_me sysfillrect intel_rapl_common hid_multitouch mei sysimgblt intel_pch_thermal intel_soc_dts_iosf intel_xhci_usb_role_switch typec int3403_thermal int340x_thermal_zone intel_hid int3400_thermal acpi_thermal_rel mac_hid dell_smo8800 acpi_pad sparse_keymap msr parport_pc ppdev lp parport ramoops drm reed_solomon pstore_blk pstore_zone efi_pstore ip_tables x_tables autofs4 usbhid hid_generic rtsx_pci_sdmmc crc32_pclmul e1000e i2c_i801
[  174.475351]  rtsx_pci ahci i2c_smbus intel_lpss_pci libahci intel_lpss xhci_pci idma64 i2c_hid_acpi xhci_pci_renesas i2c_hid wmi hid video
[  174.475390] CPU: 0 PID: 5469 Comm: openvpn Tainted: P     U     OE     5.19.0-30-generic #31-Ubuntu
[  174.475400] Hardware name: Dell Inc. Latitude 5590/0MM81M, BIOS 1.21.0 01/17/2022
[  174.475405] RIP: 0010:nla_get_range_unsigned+0xe9/0x150
[  174.475418] Code: ff ff 00 00 3c 0b 0f 84 72 ff ff ff 48 c7 c2 ff ff ff ff 3c 04 0f 84 63 ff ff ff 0f 0b 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc <0f> 0b 48 c7 06 00 00 00 00 0f b6 07 3c 03 0f 85 31 ff ff ff ba ff
[  174.475425] RSP: 0018:ffffada201267700 EFLAGS: 00010286
[  174.475434] RAX: 0000000000000000 RBX: 000000000000000b RCX: 000000000000003e
[  174.475439] RDX: ffffada201267a78 RSI: ffffada201267718 RDI: ffffffffc0d46b70
[  174.475445] RBP: ffffada201267758 R08: ffffada201267718 R09: 0000000000000001
[  174.475450] R10: ffffada201267a78 R11: 0000000000000000 R12: ffffffffc0d46b70
[  174.475455] R13: ffff9267e8505628 R14: ffffada201267a78 R15: 0000000000000000
[  174.475461] FS:  00007eff7ca8e800(0000) GS:ffff926adf400000(0000) knlGS:0000000000000000
[  174.475468] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  174.475474] CR2: 000055b48fb40330 CR3: 000000015f3ac002 CR4: 00000000003706f0
[  174.475480] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  174.475485] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  174.475491] Call Trace:
[  174.475495]  <TASK>
[  174.475499]  ? nla_validate_int_range+0x81/0x2d0
[  174.475522]  validate_nla+0x4b3/0x790
[  174.475534]  ? cryptd_aead_setauthsize+0x12/0x20 [cryptd]
[  174.475548]  ? crypto_aead_setauthsize+0x30/0x70
[  174.475560]  __nla_validate_parse+0x11f/0x190
[  174.475575]  validate_nla+0x221/0x790
[  174.475585]  ? lock_timer_base+0x3b/0xe0
[  174.475603]  __nla_validate_parse+0x11f/0x190
[  174.475615]  __nla_parse+0x23/0x40
[  174.475626]  genl_family_rcv_msg_attrs_parse.constprop.0+0x93/0x100
[  174.475642]  genl_family_rcv_msg_doit+0x77/0x180
[  174.475660]  genl_rcv_msg+0xf0/0x200
[  174.475671]  ? ovpn_netlink_get_peer+0x1f0/0x1f0 [ovpn_dco]
[  174.475692]  ? genl_get_cmd+0x120/0x120
[  174.475703]  netlink_rcv_skb+0x54/0x110
[  174.475718]  genl_rcv+0x28/0x50
[  174.475727]  netlink_unicast+0x244/0x390
[  174.475740]  netlink_sendmsg+0x25e/0x4e0
[  174.475755]  sock_sendmsg+0x6a/0x70
[  174.475767]  ____sys_sendmsg+0x277/0x2c0
[  174.475777]  ? import_iovec+0x1b/0x30
[  174.475794]  ___sys_sendmsg+0x96/0xe0
[  174.475817]  __sys_sendmsg+0x86/0xf0
[  174.475830]  __x64_sys_sendmsg+0x1d/0x30
[  174.475836]  do_syscall_64+0x58/0x90
[  174.475848]  ? __x64_sys_poll+0xc7/0x150
[  174.475859]  ? exit_to_user_mode_prepare+0x30/0xb0
[  174.475873]  ? syscall_exit_to_user_mode+0x29/0x50
[  174.475884]  ? do_syscall_64+0x67/0x90
[  174.475892]  ? irqentry_exit_to_user_mode+0x9/0x20
[  174.475902]  ? irqentry_exit+0x43/0x50
[  174.475912]  ? exc_page_fault+0x91/0x1b0
[  174.475923]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  174.475931] RIP: 0033:0x7eff7c9208d4
[  174.475940] Code: 15 31 55 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 0d dd 0d 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
[  174.475946] RSP: 002b:00007ffd507a5d08 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
[  174.475955] RAX: ffffffffffffffda RBX: 000055b48fbb8b90 RCX: 00007eff7c9208d4
[  174.475961] RDX: 0000000000000000 RSI: 00007ffd507a5d40 RDI: 0000000000000004
[  174.475966] RBP: 000055b48fbd1760 R08: 000055b48fbc57b8 R09: 0000000000000000
[  174.475970] R10: 000000000000003e R11: 0000000000000202 R12: 000055b48fbc0b60
[  174.475975] R13: 00007ffd507a5d40 R14: 00007ffd507a5f50 R15: 0000000000000001
[  174.475988]  </TASK>
[  174.475992] ---[ end trace 0000000000000000 ]---
[  390.808870] sctp: Hash tables configured (bind 256/256)
hildeb commented 1 year ago

uname -a

Linux comet 5.19.0-30-generic #31-Ubuntu SMP PREEMPT_DYNAMIC Fri Jan 6 15:40:20 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux

ordex commented 1 year ago

Can you try compiling the genl branch, please?

hildeb commented 1 year ago

I rebuilt the "genl" branch and got this:

[   65.355695] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
[   65.357116] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-3-g2fbc4e8 -- (C) 2020-2022 OpenVPN, Inc.
[   66.089373] ------------[ cut here ]------------
[   66.089376] WARNING: CPU: 3 PID: 3742 at lib/nlattr.c:117 nla_get_range_unsigned+0xe9/0x150
[   66.089383] Modules linked in: ovpn_dco(OE) ip6_udp_tunnel udp_tunnel ccm rfcomm snd_seq_dummy snd_hrtimer cmac algif_hash algif_skcipher af_alg bnep binfmt_misc zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) snd_hda_codec_hdmi snd_ctl_led snd_hda_codec_realtek snd_hda_codec_generic uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 btusb btrtl videobuf2_common btbcm btintel videodev btmtk mc bluetooth ecdh_generic ecc dell_rbtn snd_soc_avs snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep joydev snd_pcm intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp coretemp snd_seq_midi snd_seq_midi_event kvm_intel iwlmvm mei_hdcp mei_pxp dell_laptop snd_rawmidi intel_rapl_msr kvm mac80211 crct10dif_pclmul i915 snd_seq ghash_clmulni_intel
[   66.089450]  libarc4 aesni_intel dell_wmi snd_seq_device dell_smm_hwmon snd_timer crypto_simd iwlwifi ledtrig_audio cryptd drm_buddy ttm dell_smbios rapl dcdbas snd input_leds intel_cstate drm_display_helper dell_wmi_sysman serio_raw cfg80211 dell_wmi_descriptor wmi_bmof intel_wmi_thunderbolt firmware_attributes_class ee1004 soundcore nls_iso8859_1 hid_multitouch cec rc_core drm_kms_helper i2c_algo_bit dell_smo8800 int3403_thermal processor_thermal_device_pci_legacy mei_me fb_sys_fops processor_thermal_device processor_thermal_rfim syscopyarea ucsi_acpi sysfillrect mei processor_thermal_mbox processor_thermal_rapl typec_ucsi sysimgblt intel_rapl_common intel_hid int340x_thermal_zone int3400_thermal typec intel_soc_dts_iosf sparse_keymap intel_xhci_usb_role_switch acpi_thermal_rel mac_hid intel_pch_thermal acpi_pad msr parport_pc ppdev lp parport ramoops drm pstore_blk reed_solomon pstore_zone efi_pstore ip_tables x_tables autofs4 usbhid hid_generic rtsx_pci_sdmmc crc32_pclmul e1000e
[   66.089508]  i2c_i801 i2c_smbus rtsx_pci ahci intel_lpss_pci i2c_hid_acpi xhci_pci intel_lpss libahci i2c_hid xhci_pci_renesas idma64 wmi hid video
[   66.089520] CPU: 3 PID: 3742 Comm: openvpn Tainted: P     U     OE     5.19.0-30-generic #31-Ubuntu
[   66.089523] Hardware name: Dell Inc. Latitude 5590/0MM81M, BIOS 1.26.0 11/20/2022
[   66.089524] RIP: 0010:nla_get_range_unsigned+0xe9/0x150
[   66.089528] Code: ff ff 00 00 3c 0b 0f 84 72 ff ff ff 48 c7 c2 ff ff ff ff 3c 04 0f 84 63 ff ff ff 0f 0b 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc <0f> 0b 48 c7 06 00 00 00 00 0f b6 07 3c 03 0f 85 31 ff ff ff ba ff
[   66.089530] RSP: 0018:ffffb2a4876bb6f0 EFLAGS: 00010286
[   66.089532] RAX: 0000000000000000 RBX: 000000000000000b RCX: 000000000000003e
[   66.089534] RDX: ffffb2a4876bba68 RSI: ffffb2a4876bb708 RDI: ffffffffc1517b70
[   66.089535] RBP: ffffb2a4876bb748 R08: ffffb2a4876bb708 R09: 0000000000000001
[   66.089537] R10: ffffb2a4876bba68 R11: 0000000000000000 R12: ffffffffc1517b70
[   66.089538] R13: ffff9d646724a828 R14: ffffb2a4876bba68 R15: 0000000000000000
[   66.089539] FS:  00007ff683683800(0000) GS:ffff9d675f4c0000(0000) knlGS:0000000000000000
[   66.089541] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   66.089543] CR2: 0000559af69f1330 CR3: 00000001137b4001 CR4: 00000000003706e0
[   66.089545] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   66.089546] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   66.089547] Call Trace:
[   66.089549]  <TASK>
[   66.089550]  ? nla_validate_int_range+0x81/0x2d0
[   66.089557]  validate_nla+0x4b3/0x790
[   66.089561]  __nla_validate_parse+0x11f/0x190
[   66.089565]  validate_nla+0x221/0x790
[   66.089569]  __nla_validate_parse+0x11f/0x190
[   66.089572]  __nla_parse+0x23/0x40
[   66.089575]  genl_family_rcv_msg_attrs_parse.constprop.0+0x93/0x100
[   66.089580]  genl_family_rcv_msg_doit+0x77/0x180
[   66.089585]  genl_rcv_msg+0xf0/0x200
[   66.089588]  ? ovpn_netlink_get_peer+0x1f0/0x1f0 [ovpn_dco]
[   66.089594]  ? genl_get_cmd+0x120/0x120
[   66.089597]  netlink_rcv_skb+0x54/0x110
[   66.089601]  genl_rcv+0x28/0x50
[   66.089603]  netlink_unicast+0x244/0x390
[   66.089607]  netlink_sendmsg+0x25e/0x4e0
[   66.089611]  sock_sendmsg+0x6a/0x70
[   66.089614]  ____sys_sendmsg+0x277/0x2c0
[   66.089617]  ? import_iovec+0x1b/0x30
[   66.089622]  ___sys_sendmsg+0x96/0xe0
[   66.089628]  __sys_sendmsg+0x86/0xf0
[   66.089632]  __x64_sys_sendmsg+0x1d/0x30
[   66.089634]  do_syscall_64+0x58/0x90
[   66.089637]  ? __x64_sys_poll+0xc7/0x150
[   66.089640]  ? exit_to_user_mode_prepare+0x30/0xb0
[   66.089645]  ? syscall_exit_to_user_mode+0x29/0x50
[   66.089648]  ? do_syscall_64+0x67/0x90
[   66.089650]  ? exit_to_user_mode_prepare+0x30/0xb0
[   66.089653]  ? irqentry_exit_to_user_mode+0x9/0x20
[   66.089656]  ? irqentry_exit+0x43/0x50
[   66.089658]  ? exc_page_fault+0x91/0x1b0
[   66.089661]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   66.089664] RIP: 0033:0x7ff682f208d4
[   66.089666] Code: 15 31 55 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 0d dd 0d 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
[   66.089668] RSP: 002b:00007fff5ae359e8 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
[   66.089670] RAX: ffffffffffffffda RBX: 0000559af6a69bf0 RCX: 00007ff682f208d4
[   66.089672] RDX: 0000000000000000 RSI: 00007fff5ae35a20 RDI: 0000000000000004
[   66.089673] RBP: 0000559af6a827c0 R08: 0000559af6a76818 R09: 0000000000000000
[   66.089674] R10: 000000000000003e R11: 0000000000000202 R12: 0000559af6a71bc0
[   66.089676] R13: 00007fff5ae35a20 R14: 00007fff5ae35c30 R15: 0000000000000001
[   66.089679]  </TASK>
[   66.089680] ---[ end trace 0000000000000000 ]---
[  102.594531] tun0: deleting peer with id 1, reason 1
ordex commented 1 year ago

can you try with kernel 2.6.0rc5 ?

he is referring to openvpn 2.6.0-rc2. Not the kernel (that is 6.2.0-rcX).

@hildeb can you please share your openvpn config? I feel this error is related to the input received from userspace.

xevilstar commented 1 year ago

can you try with kernel 2.6.0rc5 ?

he is referring to openvpn 2.6.0-rc2. Not the kernel (that is 6.2.0-rcX).

@hildeb can you please share your openvpn config? I feel this error is related to the input received from userspace.

sorry ... :_(

hildeb commented 1 year ago

The client's config file:

client
tun-mtu 1500

dev tun

key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
...
-----END OpenVPN Static key V1-----
</tls-auth>

# hostname v4/udp
<connection>
proto udp
remote openvpn-gw170-ext.charite.de
port 1194
explicit-exit-notify
nobind
</connection>

# hostname v4/tcp
<connection>
proto tcp
remote openvpn-gw170-ext.charite.de
port 1194
nobind
</connection>

resolv-retry infinite

auth SHA256

remote-cert-tls server
verify-x509-name 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de' subject
remote-cert-eku "TLS Web Server Authentication"

persist-key
persist-tun
verb 3
reneg-sec 0
auth-user-pass password.txt
auth-nocache
script-security 2
mute-replay-warnings

<ca>
-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----
</ca>

<key>
-----BEGIN PRIVATE KEY-----
...
-----END PRIVATE KEY-----
</key>

<cert>
-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----
</cert>
cron2 commented 1 year ago

Hi,

On Mon, Jan 23, 2023 at 09:51:00AM -0800, hildeb wrote:

The client's config file:

Just to be sure: the backtrace happens on the client, not on the server?

Does it happen "on module load" or "on client connection"? If the latter, can you run the client with "verb 6" (this turns on DCO-related debugging, like "now I am going to put the key into the kernel") and see what happens at backtrace time?

(It shouldn't backtrace, ever, but if we know what triggers it, fixing might be easier)

gert -- "If was one thing all people took for granted, was conviction that if you feed honest figures into a computer, honest figures come out. Never doubted it myself till I met a computer with a sense of humor." Robert A. Heinlein, The Moon is a Harsh Mistress

Gert Doering - Munich, Germany @.***

ordex commented 1 year ago

Thanks! Would you mind also sharing the client log after adding 'verb 6' to the config?

hildeb commented 1 year ago

1) The backtrace happens on the client 2) It happens on client connection 3) verb 6, no problem -- give me a sec :)

hildeb commented 1 year ago

So, I first did a "modprobe ovpn-dco" to put some time between loading of the moule and initialization of the connection:

Jan 23 20:22:31 comet kernel: [   42.666243] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
Jan 23 20:22:31 comet kernel: [   42.668071] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-3-g2fbc4e8 -- (C) 2020-2022 OpenVPN, Inc.
Jan 23 20:22:49 comet kernel: [   60.661242] ------------[ cut here ]------------
Jan 23 20:22:49 comet kernel: [   60.661247] WARNING: CPU: 5 PID: 5544 at lib/nlattr.c:117 nla_get_range_unsigned+0xe9/0x150
Jan 23 20:22:49 comet kernel: [   60.661258] Modules linked in: ovpn_dco(OE) ip6_udp_tunnel udp_tunnel ccm rfcomm snd_seq_dummy snd_hrtimer cmac algif_hash algif_skcipher af_alg bnep binfmt_misc zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) snd_hda_codec_hdmi snd_ctl_led snd_hda_codec_realtek snd_hda_codec_generic uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common btusb videodev btrtl btbcm btintel btmtk mc bluetooth ecdh_generic ecc dell_rbtn snd_soc_avs snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core intel_tcc_cooling snd_hwdep x86_pkg_temp_thermal intel_powerclamp coretemp snd_pcm iwlmvm kvm_intel dell_laptop joydev mac80211 snd_seq_midi kvm snd_seq_midi_event libarc4 mei_pxp snd_rawmidi mei_hdcp i915 crct10dif_pclmul ghash_clmulni_intel snd_seq
Jan 23 20:22:49 comet kernel: [   60.661373]  intel_rapl_msr iwlwifi aesni_intel dell_wmi drm_buddy ledtrig_audio crypto_simd ttm dell_smm_hwmon snd_seq_device dell_smbios cryptd drm_display_helper dcdbas input_leds snd_timer rapl dell_wmi_sysman intel_wmi_thunderbolt hid_multitouch dell_wmi_descriptor firmware_attributes_class cfg80211 nls_iso8859_1 wmi_bmof serio_raw ucsi_acpi intel_cstate cec snd mei_me rc_core ee1004 soundcore typec_ucsi mei typec drm_kms_helper intel_xhci_usb_role_switch i2c_algo_bit processor_thermal_device_pci_legacy processor_thermal_device processor_thermal_rfim fb_sys_fops syscopyarea processor_thermal_mbox sysfillrect processor_thermal_rapl sysimgblt int3400_thermal intel_rapl_common intel_hid mac_hid int3403_thermal dell_smo8800 intel_soc_dts_iosf acpi_thermal_rel int340x_thermal_zone intel_pch_thermal sparse_keymap acpi_pad msr parport_pc ppdev lp parport ramoops pstore_blk drm reed_solomon pstore_zone efi_pstore ip_tables x_tables autofs4 usbhid hid_generic rtsx_pci_sdmmc i2c_hid_acpi
Jan 23 20:22:49 comet kernel: [   60.661460]  i2c_hid crc32_pclmul i2c_i801 ahci e1000e rtsx_pci i2c_smbus intel_lpss_pci xhci_pci intel_lpss libahci idma64 xhci_pci_renesas wmi hid video
Jan 23 20:22:49 comet kernel: [   60.661480] CPU: 5 PID: 5544 Comm: openvpn Tainted: P     U     OE     5.19.0-30-generic #31-Ubuntu
Jan 23 20:22:49 comet kernel: [   60.661484] Hardware name: Dell Inc. Latitude 5590/0MM81M, BIOS 1.26.0 11/20/2022
Jan 23 20:22:49 comet kernel: [   60.661487] RIP: 0010:nla_get_range_unsigned+0xe9/0x150
Jan 23 20:22:49 comet kernel: [   60.661493] Code: ff ff 00 00 3c 0b 0f 84 72 ff ff ff 48 c7 c2 ff ff ff ff 3c 04 0f 84 63 ff ff ff 0f 0b 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc <0f> 0b 48 c7 06 00 00 00 00 0f b6 07 3c 03 0f 85 31 ff ff ff ba ff
Jan 23 20:22:49 comet kernel: [   60.661496] RSP: 0018:ffffac4a470d3750 EFLAGS: 00010286
Jan 23 20:22:49 comet kernel: [   60.661500] RAX: 0000000000000000 RBX: 000000000000000b RCX: 0000000000000065
Jan 23 20:22:49 comet kernel: [   60.661502] RDX: ffffac4a470d3ac8 RSI: ffffac4a470d3768 RDI: ffffffffc1167b70
Jan 23 20:22:49 comet kernel: [   60.661505] RBP: ffffac4a470d37a8 R08: ffffac4a470d3768 R09: 0000000000000001
Jan 23 20:22:49 comet kernel: [   60.661507] R10: ffffac4a470d3ac8 R11: 0000000000000000 R12: ffffffffc1167b70
Jan 23 20:22:49 comet kernel: [   60.661509] R13: ffff9390e1f0ca28 R14: ffffac4a470d3ac8 R15: 0000000000000000
Jan 23 20:22:49 comet kernel: [   60.661511] FS:  00007f2b54660800(0000) GS:ffff93935f540000(0000) knlGS:0000000000000000
Jan 23 20:22:49 comet kernel: [   60.661515] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 23 20:22:49 comet kernel: [   60.661517] CR2: 0000555d1eedf3a8 CR3: 000000012d0fc001 CR4: 00000000003706e0
Jan 23 20:22:49 comet kernel: [   60.661520] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 23 20:22:49 comet kernel: [   60.661522] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 23 20:22:49 comet kernel: [   60.661524] Call Trace:
Jan 23 20:22:49 comet kernel: [   60.661526]  <TASK>
Jan 23 20:22:49 comet kernel: [   60.661528]  ? nla_validate_int_range+0x81/0x2d0
Jan 23 20:22:49 comet kernel: [   60.661539]  validate_nla+0x4b3/0x790
Jan 23 20:22:49 comet kernel: [   60.661544]  ? _raw_spin_lock_irqsave+0xe/0x20
Jan 23 20:22:49 comet kernel: [   60.661551]  __nla_validate_parse+0x11f/0x190
Jan 23 20:22:49 comet kernel: [   60.661557]  validate_nla+0x221/0x790
Jan 23 20:22:49 comet kernel: [   60.661564]  __nla_validate_parse+0x11f/0x190
Jan 23 20:22:49 comet kernel: [   60.661569]  __nla_parse+0x23/0x40
Jan 23 20:22:49 comet kernel: [   60.661574]  genl_family_rcv_msg_attrs_parse.constprop.0+0x93/0x100
Jan 23 20:22:49 comet kernel: [   60.661581]  genl_family_rcv_msg_doit+0x77/0x180
Jan 23 20:22:49 comet kernel: [   60.661589]  genl_rcv_msg+0xf0/0x200
Jan 23 20:22:49 comet kernel: [   60.661593]  ? ovpn_netlink_get_peer+0x1f0/0x1f0 [ovpn_dco]
Jan 23 20:22:49 comet kernel: [   60.661603]  ? genl_get_cmd+0x120/0x120
Jan 23 20:22:49 comet kernel: [   60.661608]  netlink_rcv_skb+0x54/0x110
Jan 23 20:22:49 comet kernel: [   60.661614]  genl_rcv+0x28/0x50
Jan 23 20:22:49 comet kernel: [   60.661618]  netlink_unicast+0x244/0x390
Jan 23 20:22:49 comet kernel: [   60.661623]  netlink_sendmsg+0x25e/0x4e0
Jan 23 20:22:49 comet kernel: [   60.661630]  sock_sendmsg+0x6a/0x70
Jan 23 20:22:49 comet kernel: [   60.661635]  ____sys_sendmsg+0x277/0x2c0
Jan 23 20:22:49 comet kernel: [   60.661640]  ? import_iovec+0x1b/0x30
Jan 23 20:22:49 comet kernel: [   60.661647]  ___sys_sendmsg+0x96/0xe0
Jan 23 20:22:49 comet kernel: [   60.661657]  __sys_sendmsg+0x86/0xf0
Jan 23 20:22:49 comet kernel: [   60.661662]  __x64_sys_sendmsg+0x1d/0x30
Jan 23 20:22:49 comet kernel: [   60.661665]  do_syscall_64+0x58/0x90
Jan 23 20:22:49 comet kernel: [   60.661669]  ? syscall_exit_to_user_mode+0x29/0x50
Jan 23 20:22:49 comet kernel: [   60.661674]  ? do_syscall_64+0x67/0x90
Jan 23 20:22:49 comet kernel: [   60.661677]  ? exit_to_user_mode_prepare+0x30/0xb0
Jan 23 20:22:49 comet kernel: [   60.661683]  ? irqentry_exit_to_user_mode+0x9/0x20
Jan 23 20:22:49 comet kernel: [   60.661688]  ? irqentry_exit+0x43/0x50
Jan 23 20:22:49 comet kernel: [   60.661692]  ? exc_page_fault+0x91/0x1b0
Jan 23 20:22:49 comet kernel: [   60.661697]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
Jan 23 20:22:49 comet kernel: [   60.661700] RIP: 0033:0x7f2b53f208d4
Jan 23 20:22:49 comet kernel: [   60.661703] Code: 15 31 55 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 0d dd 0d 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
Jan 23 20:22:49 comet kernel: [   60.661706] RSP: 002b:00007ffc4a4417a8 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
Jan 23 20:22:49 comet kernel: [   60.661710] RAX: ffffffffffffffda RBX: 0000555d1ef18980 RCX: 00007f2b53f208d4
Jan 23 20:22:49 comet kernel: [   60.661712] RDX: 0000000000000000 RSI: 00007ffc4a4417e0 RDI: 0000000000000004
Jan 23 20:22:49 comet kernel: [   60.661714] RBP: 0000555d1ef1c130 R08: 0000555d1ef25268 R09: 0000000000000000
Jan 23 20:22:49 comet kernel: [   60.661716] R10: 0000000000000065 R11: 0000000000000202 R12: 0000555d1ef20630
Jan 23 20:22:49 comet kernel: [   60.661718] R13: 00007ffc4a4417e0 R14: 00007ffc4a4419f0 R15: 0000000000000000
Jan 23 20:22:49 comet kernel: [   60.661723]  </TASK>
Jan 23 20:22:49 comet kernel: [   60.661725] ---[ end trace 0000000000000000 ]---
Jan 23 20:22:55 comet kernel: [   67.121046] sctp: Hash tables configured (bind 256/256)

the output from openvpn:

2023-01-23 20:22:48 us=580252 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback 'BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-01-23 20:22:48 us=580545 Current Parameter Settings:
2023-01-23 20:22:48 us=580563   config = 'charite-hildeb.ovpn'
2023-01-23 20:22:48 us=580580   mode = 0
2023-01-23 20:22:48 us=580599   persist_config = DISABLED
2023-01-23 20:22:48 us=580617   persist_mode = 1
2023-01-23 20:22:48 us=580635   show_ciphers = DISABLED
2023-01-23 20:22:48 us=580653   show_digests = DISABLED
2023-01-23 20:22:48 us=580670   show_engines = DISABLED
2023-01-23 20:22:48 us=580688   genkey = DISABLED
2023-01-23 20:22:48 us=580707   genkey_filename = '[UNDEF]'
2023-01-23 20:22:48 us=580725   key_pass_file = '[UNDEF]'
2023-01-23 20:22:48 us=580744   show_tls_ciphers = DISABLED
2023-01-23 20:22:48 us=580764   connect_retry_max = 0
2023-01-23 20:22:48 us=580781 Connection profiles [0]:
2023-01-23 20:22:48 us=580794   proto = udp
2023-01-23 20:22:48 us=580805   local = '[UNDEF]'
2023-01-23 20:22:48 us=580816   local_port = '[UNDEF]'
2023-01-23 20:22:48 us=580831   remote = 'openvpn-gw170-ext.charite.de'
2023-01-23 20:22:48 us=580850   remote_port = '1194'
2023-01-23 20:22:48 us=580867   remote_float = DISABLED
2023-01-23 20:22:48 us=580886   bind_defined = DISABLED
2023-01-23 20:22:48 us=580905   bind_local = DISABLED
2023-01-23 20:22:48 us=580924   bind_ipv6_only = DISABLED
2023-01-23 20:22:48 us=580944   connect_retry_seconds = 5
2023-01-23 20:22:48 us=580964   connect_timeout = 120
2023-01-23 20:22:48 us=580981   socks_proxy_server = '[UNDEF]'
2023-01-23 20:22:48 us=580999   socks_proxy_port = '[UNDEF]'
2023-01-23 20:22:48 us=581018   tun_mtu = 1500
2023-01-23 20:22:48 us=581037   tun_mtu_defined = ENABLED
2023-01-23 20:22:48 us=581056   link_mtu = 1500
2023-01-23 20:22:48 us=581089   link_mtu_defined = DISABLED
2023-01-23 20:22:48 us=581108   tun_mtu_extra = 0
2023-01-23 20:22:48 us=581125   tun_mtu_extra_defined = DISABLED
2023-01-23 20:22:48 us=581144   mtu_discover_type = -1
2023-01-23 20:22:48 us=581162   fragment = 0
2023-01-23 20:22:48 us=581180   mssfix = 1492
2023-01-23 20:22:48 us=581199   mssfix_encap = ENABLED
2023-01-23 20:22:48 us=581218   mssfix_fixed = DISABLED
2023-01-23 20:22:48 us=581239   explicit_exit_notification = 1
2023-01-23 20:22:48 us=581257   tls_auth_file = '[INLINE]'
2023-01-23 20:22:48 us=581277   key_direction = 1
2023-01-23 20:22:48 us=581295   tls_crypt_file = '[UNDEF]'
2023-01-23 20:22:48 us=581314   tls_crypt_v2_file = '[UNDEF]'
2023-01-23 20:22:48 us=581334 Connection profiles END
2023-01-23 20:22:48 us=581352   remote_random = DISABLED
2023-01-23 20:22:48 us=581370   ipchange = '[UNDEF]'
2023-01-23 20:22:48 us=581389   dev = 'tun'
2023-01-23 20:22:48 us=581407   dev_type = '[UNDEF]'
2023-01-23 20:22:48 us=581424   dev_node = '[UNDEF]'
2023-01-23 20:22:48 us=581443   tuntap_options.disable_dco = DISABLED
2023-01-23 20:22:48 us=581462   lladdr = '[UNDEF]'
2023-01-23 20:22:48 us=581481   topology = 1
2023-01-23 20:22:48 us=581500   ifconfig_local = '[UNDEF]'
2023-01-23 20:22:48 us=581518   ifconfig_remote_netmask = '[UNDEF]'
2023-01-23 20:22:48 us=581545   ifconfig_noexec = DISABLED
2023-01-23 20:22:48 us=581565   ifconfig_nowarn = DISABLED
2023-01-23 20:22:48 us=581583   ifconfig_ipv6_local = '[UNDEF]'
2023-01-23 20:22:48 us=581602   ifconfig_ipv6_netbits = 0
2023-01-23 20:22:48 us=581621   ifconfig_ipv6_remote = '[UNDEF]'
2023-01-23 20:22:48 us=581641   shaper = 0
2023-01-23 20:22:48 us=581660   mtu_test = 0
2023-01-23 20:22:48 us=581677   mlock = DISABLED
2023-01-23 20:22:48 us=581696   keepalive_ping = 0
2023-01-23 20:22:48 us=581716   keepalive_timeout = 0
2023-01-23 20:22:48 us=581735   inactivity_timeout = 0
2023-01-23 20:22:48 us=581754   inactivity_minimum_bytes = 0
2023-01-23 20:22:48 us=581774   ping_send_timeout = 0
2023-01-23 20:22:48 us=581792   ping_rec_timeout = 0
2023-01-23 20:22:48 us=581812   ping_rec_timeout_action = 0
2023-01-23 20:22:48 us=581830   ping_timer_remote = DISABLED
2023-01-23 20:22:48 us=581848   remap_sigusr1 = 0
2023-01-23 20:22:48 us=581866   persist_tun = DISABLED
2023-01-23 20:22:48 us=581884   persist_local_ip = DISABLED
2023-01-23 20:22:48 us=581904   persist_remote_ip = DISABLED
2023-01-23 20:22:48 us=581922   persist_key = DISABLED
2023-01-23 20:22:48 us=581941   passtos = DISABLED
2023-01-23 20:22:48 us=581960   resolve_retry_seconds = 1000000000
2023-01-23 20:22:48 us=581979   resolve_in_advance = DISABLED
2023-01-23 20:22:48 us=581998   username = '[UNDEF]'
2023-01-23 20:22:48 us=582017   groupname = '[UNDEF]'
2023-01-23 20:22:48 us=582035   chroot_dir = '[UNDEF]'
2023-01-23 20:22:48 us=582054   cd_dir = '[UNDEF]'
2023-01-23 20:22:48 us=582073   writepid = '[UNDEF]'
2023-01-23 20:22:48 us=582092   up_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 20:22:48 us=582112   down_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 20:22:48 us=582131   down_pre = ENABLED
2023-01-23 20:22:48 us=582149   up_restart = DISABLED
2023-01-23 20:22:48 us=582166   up_delay = DISABLED
2023-01-23 20:22:48 us=582186   daemon = DISABLED
2023-01-23 20:22:48 us=582203   log = DISABLED
2023-01-23 20:22:48 us=582221   suppress_timestamps = DISABLED
2023-01-23 20:22:48 us=582239   machine_readable_output = DISABLED
2023-01-23 20:22:48 us=582259   nice = 0
2023-01-23 20:22:48 us=582277   verbosity = 6
2023-01-23 20:22:48 us=582295   mute = 0
2023-01-23 20:22:48 us=582313   gremlin = 0
2023-01-23 20:22:48 us=582332   status_file = '[UNDEF]'
2023-01-23 20:22:48 us=582350   status_file_version = 1
2023-01-23 20:22:48 us=582367   status_file_update_freq = 60
2023-01-23 20:22:48 us=582385   occ = ENABLED
2023-01-23 20:22:48 us=582402   rcvbuf = 0
2023-01-23 20:22:48 us=582422   sndbuf = 0
2023-01-23 20:22:48 us=582440   mark = 0
2023-01-23 20:22:48 us=582458   sockflags = 0
2023-01-23 20:22:48 us=582477   fast_io = DISABLED
2023-01-23 20:22:48 us=582496   comp.alg = 0
2023-01-23 20:22:48 us=582515   comp.flags = 24
2023-01-23 20:22:48 us=582535   route_script = '[UNDEF]'
2023-01-23 20:22:48 us=582554   route_default_gateway = '[UNDEF]'
2023-01-23 20:22:48 us=582571   route_default_metric = 0
2023-01-23 20:22:48 us=582592   route_noexec = DISABLED
2023-01-23 20:22:48 us=582611   route_delay = 0
2023-01-23 20:22:48 us=582630   route_delay_window = 30
2023-01-23 20:22:48 us=582649   route_delay_defined = DISABLED
2023-01-23 20:22:48 us=582669   route_nopull = DISABLED
2023-01-23 20:22:48 us=582688   route_gateway_via_dhcp = DISABLED
2023-01-23 20:22:48 us=582707   allow_pull_fqdn = DISABLED
2023-01-23 20:22:48 us=582725   management_addr = '[UNDEF]'
2023-01-23 20:22:48 us=582743   management_port = '[UNDEF]'
2023-01-23 20:22:48 us=582760   management_user_pass = '[UNDEF]'
2023-01-23 20:22:48 us=582780   management_log_history_cache = 250
2023-01-23 20:22:48 us=582800   management_echo_buffer_size = 100
2023-01-23 20:22:48 us=582819   management_client_user = '[UNDEF]'
2023-01-23 20:22:48 us=582838   management_client_group = '[UNDEF]'
2023-01-23 20:22:48 us=582858   management_flags = 0
2023-01-23 20:22:48 us=582878   shared_secret_file = '[UNDEF]'
2023-01-23 20:22:48 us=582897   key_direction = 1
2023-01-23 20:22:48 us=582916   ciphername = 'BF-CBC'
2023-01-23 20:22:48 us=582936   ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-01-23 20:22:48 us=582955   authname = 'SHA256'
2023-01-23 20:22:48 us=582974   engine = DISABLED
2023-01-23 20:22:48 us=582993   replay = ENABLED
2023-01-23 20:22:48 us=583012   mute_replay_warnings = DISABLED
2023-01-23 20:22:48 us=583031   replay_window = 64
2023-01-23 20:22:48 us=583050   replay_time = 15
2023-01-23 20:22:48 us=583070   packet_id_file = '[UNDEF]'
2023-01-23 20:22:48 us=583088   test_crypto = DISABLED
2023-01-23 20:22:48 us=583109   tls_server = DISABLED
2023-01-23 20:22:48 us=583128   tls_client = ENABLED
2023-01-23 20:22:48 us=583146   ca_file = '[INLINE]'
2023-01-23 20:22:48 us=583166   ca_path = '[UNDEF]'
2023-01-23 20:22:48 us=583185   dh_file = '[UNDEF]'
2023-01-23 20:22:48 us=583205   cert_file = '[INLINE]'
2023-01-23 20:22:48 us=583223   extra_certs_file = '[UNDEF]'
2023-01-23 20:22:48 us=583242   priv_key_file = '[INLINE]'
2023-01-23 20:22:48 us=583262   pkcs12_file = '[UNDEF]'
2023-01-23 20:22:48 us=583281   cipher_list = '[UNDEF]'
2023-01-23 20:22:48 us=583299   cipher_list_tls13 = '[UNDEF]'
2023-01-23 20:22:48 us=583318   tls_cert_profile = '[UNDEF]'
2023-01-23 20:22:48 us=583338   tls_verify = '[UNDEF]'
2023-01-23 20:22:48 us=583356   tls_export_cert = '[UNDEF]'
2023-01-23 20:22:48 us=583375   verify_x509_type = 1
2023-01-23 20:22:48 us=583393   verify_x509_name = 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de'
2023-01-23 20:22:48 us=583415   crl_file = '[UNDEF]'
2023-01-23 20:22:48 us=583433   ns_cert_type = 0
2023-01-23 20:22:48 us=583452   remote_cert_ku[i] = 65535
2023-01-23 20:22:48 us=583471   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583491   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583509   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583528   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583547   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583564   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583584   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583603   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583622   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583642   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583661   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583679   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583698   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583717   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583736   remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583755   remote_cert_eku = 'TLS Web Server Authentication'
2023-01-23 20:22:48 us=583776   ssl_flags = 192
2023-01-23 20:22:48 us=583795   tls_timeout = 2
2023-01-23 20:22:48 us=583815   renegotiate_bytes = -1
2023-01-23 20:22:48 us=583836   renegotiate_packets = 0
2023-01-23 20:22:48 us=583854   renegotiate_seconds = 0
2023-01-23 20:22:48 us=583874   handshake_window = 60
2023-01-23 20:22:48 us=583894   transition_window = 3600
2023-01-23 20:22:48 us=583915   single_session = DISABLED
2023-01-23 20:22:48 us=583934   push_peer_info = DISABLED
2023-01-23 20:22:48 us=583955   tls_exit = DISABLED
2023-01-23 20:22:48 us=583975   tls_crypt_v2_metadata = '[UNDEF]'
2023-01-23 20:22:48 us=583996   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584017   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584039   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584061   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584082   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584103   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584126   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584147   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584170   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584195   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584216   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584238   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584258   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584278   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584299   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584324   pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584346   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584368   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584388   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584411   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584432   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584455   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584478   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584497   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584519   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584541   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584560   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584582   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584601   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584623   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584645   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584666   pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584688   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584709   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584730   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584750   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584774   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584796   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584817   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584838   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584861   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584881   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584902   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584922   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584940   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584958   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584978   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584997   pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=585018   pkcs11_pin_cache_period = -1
2023-01-23 20:22:48 us=585038   pkcs11_id = '[UNDEF]'
2023-01-23 20:22:48 us=585059   pkcs11_id_management = DISABLED
2023-01-23 20:22:48 us=585185   server_network = 0.0.0.0
2023-01-23 20:22:48 us=585209   server_netmask = 0.0.0.0
2023-01-23 20:22:48 us=585246   server_network_ipv6 = ::
2023-01-23 20:22:48 us=585266   server_netbits_ipv6 = 0
2023-01-23 20:22:48 us=585286   server_bridge_ip = 0.0.0.0
2023-01-23 20:22:48 us=585308   server_bridge_netmask = 0.0.0.0
2023-01-23 20:22:48 us=585329   server_bridge_pool_start = 0.0.0.0
2023-01-23 20:22:48 us=585349   server_bridge_pool_end = 0.0.0.0
2023-01-23 20:22:48 us=585369   ifconfig_pool_defined = DISABLED
2023-01-23 20:22:48 us=585390   ifconfig_pool_start = 0.0.0.0
2023-01-23 20:22:48 us=585411   ifconfig_pool_end = 0.0.0.0
2023-01-23 20:22:48 us=585432   ifconfig_pool_netmask = 0.0.0.0
2023-01-23 20:22:48 us=585451   ifconfig_pool_persist_filename = '[UNDEF]'
2023-01-23 20:22:48 us=585487   ifconfig_pool_persist_refresh_freq = 600
2023-01-23 20:22:48 us=585509   ifconfig_ipv6_pool_defined = DISABLED
2023-01-23 20:22:48 us=585531   ifconfig_ipv6_pool_base = ::
2023-01-23 20:22:48 us=585551   ifconfig_ipv6_pool_netbits = 0
2023-01-23 20:22:48 us=585571   n_bcast_buf = 256
2023-01-23 20:22:48 us=585591   tcp_queue_limit = 64
2023-01-23 20:22:48 us=585610   real_hash_size = 256
2023-01-23 20:22:48 us=585631   virtual_hash_size = 256
2023-01-23 20:22:48 us=585651   client_connect_script = '[UNDEF]'
2023-01-23 20:22:48 us=585669   learn_address_script = '[UNDEF]'
2023-01-23 20:22:48 us=585690   client_disconnect_script = '[UNDEF]'
2023-01-23 20:22:48 us=585709   client_config_dir = '[UNDEF]'
2023-01-23 20:22:48 us=585729   ccd_exclusive = DISABLED
2023-01-23 20:22:48 us=585749   tmp_dir = '/tmp'
2023-01-23 20:22:48 us=585768   push_ifconfig_defined = DISABLED
2023-01-23 20:22:48 us=585789   push_ifconfig_local = 0.0.0.0
2023-01-23 20:22:48 us=585811   push_ifconfig_remote_netmask = 0.0.0.0
2023-01-23 20:22:48 us=585830   push_ifconfig_ipv6_defined = DISABLED
2023-01-23 20:22:48 us=585851   push_ifconfig_ipv6_local = ::/0
2023-01-23 20:22:48 us=585871   push_ifconfig_ipv6_remote = ::
2023-01-23 20:22:48 us=585893   enable_c2c = DISABLED
2023-01-23 20:22:48 us=585912   duplicate_cn = DISABLED
2023-01-23 20:22:48 us=585931   cf_max = 0
2023-01-23 20:22:48 us=585951   cf_per = 0
2023-01-23 20:22:48 us=585971   max_clients = 1024
2023-01-23 20:22:48 us=585991   max_routes_per_client = 256
2023-01-23 20:22:48 us=586010   auth_user_pass_verify_script = '[UNDEF]'
2023-01-23 20:22:48 us=586029   auth_user_pass_verify_script_via_file = DISABLED
2023-01-23 20:22:48 us=586048   auth_token_generate = DISABLED
2023-01-23 20:22:48 us=586068   auth_token_lifetime = 0
2023-01-23 20:22:48 us=586088   auth_token_secret_file = '[UNDEF]'
2023-01-23 20:22:48 us=586107   port_share_host = '[UNDEF]'
2023-01-23 20:22:48 us=586127   port_share_port = '[UNDEF]'
2023-01-23 20:22:48 us=586146   vlan_tagging = DISABLED
2023-01-23 20:22:48 us=586166   vlan_accept = all
2023-01-23 20:22:48 us=586186   vlan_pvid = 1
2023-01-23 20:22:48 us=586204   client = ENABLED
2023-01-23 20:22:48 us=586224   pull = ENABLED
2023-01-23 20:22:48 us=586244   auth_user_pass_file = 'password.txt'
2023-01-23 20:22:48 us=586268 OpenVPN 2.6_git x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-01-23 20:22:48 us=586306 library versions: OpenSSL 3.0.5 5 Jul 2022, LZO 2.10
2023-01-23 20:22:48 us=586902 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-23 20:22:48 us=591288 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 20:22:48 us=591330 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 20:22:48 us=591477 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 headroom:126 payload:1376 tailroom:126 ET:0 ]
2023-01-23 20:22:48 us=595823 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 20:22:48 us=595931 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client'
2023-01-23 20:22:48 us=595946 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server'
2023-01-23 20:22:48 us=595990 TCP/UDP: Preserving recently used remote address: [AF_INET]193.175.73.170:1194
2023-01-23 20:22:48 us=596028 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-23 20:22:48 us=596052 UDPv4 link local: (not bound)
2023-01-23 20:22:48 us=596074 UDPv4 link remote: [AF_INET]193.175.73.170:1194
2023-01-23 20:22:48 us=596806 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=596841 UDPv4 WRITE [54] to [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2023-01-23 20:22:48 us=596890 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=614079 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2023-01-23 20:22:48 us=614116 TLS: Initial packet from [AF_INET]193.175.73.170:1194, sid=07f69284 4744ea58
2023-01-23 20:22:48 us=614207 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=614232 UDPv4 WRITE [343] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=277
2023-01-23 20:22:48 us=614280 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=633526 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1136
2023-01-23 20:22:48 us=633947 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=633979 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 ] DATA len=0
2023-01-23 20:22:48 us=634032 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=634057 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1136
2023-01-23 20:22:48 us=634091 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=634110 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 2 ] DATA len=0
2023-01-23 20:22:48 us=634146 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=634189 UDPv4 READ [1173] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 1 ] pid=3 DATA len=1107
2023-01-23 20:22:48 us=636159 VERIFY OK: depth=1, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=Charite-VPN CA, name=EasyRSA, emailAddress=vpn@charite.de
2023-01-23 20:22:48 us=636447 VERIFY KU OK
2023-01-23 20:22:48 us=636470 Validating certificate extended key usage
2023-01-23 20:22:48 us=636487 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-01-23 20:22:48 us=636502 VERIFY EKU OK
2023-01-23 20:22:48 us=636518 VERIFY X509NAME OK: C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 20:22:48 us=636534 VERIFY OK: depth=0, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 20:22:48 us=639223 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=639262 UDPv4 WRITE [1316] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 3 ] pid=2 DATA len=1250
2023-01-23 20:22:48 us=639346 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=639378 UDPv4 WRITE [1304] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=3 DATA len=1250
2023-01-23 20:22:48 us=639433 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=639461 UDPv4 WRITE [940] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=4 DATA len=886
2023-01-23 20:22:48 us=639501 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=655713 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 1 ] DATA len=0
2023-01-23 20:22:48 us=655775 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=656620 UDPv4 READ [70] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 2 1 ] DATA len=0
2023-01-23 20:22:48 us=656658 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=739215 UDPv4 READ [236] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ 4 3 2 1 ] pid=4 DATA len=158
2023-01-23 20:22:48 us=739367 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=739391 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 ] DATA len=0
2023-01-23 20:22:48 us=739436 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=739459 UDPv4 READ [324] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 ] pid=5 DATA len=246
2023-01-23 20:22:48 us=739493 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1549'
2023-01-23 20:22:48 us=739510 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]'
2023-01-23 20:22:48 us=739522 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
2023-01-23 20:22:48 us=739550 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-01-23 20:22:48 us=739569 [openvpn.charite.de] Peer Connection Initiated with [AF_INET]193.175.73.170:1194
2023-01-23 20:22:48 us=739587 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=739602 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #9 ] [ 5 ] DATA len=0
2023-01-23 20:22:48 us=739629 dco_update_keys: peer_id=0
2023-01-23 20:22:49 us=69954 UDPv4 READ [663] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=6 DATA len=585
2023-01-23 20:22:49 us=70044 SENT CONTROL [openvpn.charite.de]: 'PUSH_REQUEST' (status=1)
2023-01-23 20:22:49 us=70087 dco_update_keys: peer_id=0
2023-01-23 20:22:49 us=70128 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 141.42.1.1,dhcp-option DOMAIN charite.de,route-gateway 172.29.0.1,topology subnet,ping 10,ping-restart 30,route 10.27.0.0 255.255.0.0,route 10.28.0.0 255.254.0.0,route 10.32.0.0 255.224.0.0,route 172.16.0.0 255.254.0.0,route 192.168.192.0 255.255.192.0,route 141.42.0.0 255.255.0.0,route 193.175.72.0 255.255.255.0,route 193.175.74.0 255.255.254.0,route 193.175.174.0 255.255.255.192,route 172.19.252.0 255.255.255.224,route 194.94.4.0 255.255.254.0,ifconfig 172.29.0.2 255.255.248.0,peer-id 0,cipher AES-256-GCM,key-derivation tls-ekm'
2023-01-23 20:22:49 us=70303 OPTIONS IMPORT: timers and/or timeouts modified
2023-01-23 20:22:49 us=70321 OPTIONS IMPORT: --ifconfig/up options modified
2023-01-23 20:22:49 us=70332 OPTIONS IMPORT: route options modified
2023-01-23 20:22:49 us=70342 OPTIONS IMPORT: route-related options modified
2023-01-23 20:22:49 us=70352 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-01-23 20:22:49 us=70363 OPTIONS IMPORT: peer-id set
2023-01-23 20:22:49 us=70373 OPTIONS IMPORT: data channel crypto options modified
2023-01-23 20:22:49 us=70399 net_route_v4_best_gw query: dst 0.0.0.0
2023-01-23 20:22:49 us=70503 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=70537 sitnl_send: rtnl: received 496 bytes
2023-01-23 20:22:49 us=70590 net_route_v4_best_gw result: via 192.168.178.1 dev wlp2s0
2023-01-23 20:22:49 us=70667 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=wlp2s0 HWADDR=d0:c6:37:db:70:77
2023-01-23 20:22:49 us=71073 open_tun_dco: tun0
2023-01-23 20:22:49 us=71097 net_iface_new: add tun0 type ovpn-dco
2023-01-23 20:22:49 us=71838 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=71869 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=71941 ovpn_dco_register
2023-01-23 20:22:49 us=72085 DCO device tun0 opened
2023-01-23 20:22:49 us=72109 do_ifconfig, ipv4=1, ipv6=0
2023-01-23 20:22:49 us=72150 net_iface_mtu_set: mtu 1500 for tun0
2023-01-23 20:22:49 us=72232 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=72263 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=72321 net_iface_up: set tun0 up
2023-01-23 20:22:49 us=72580 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=72620 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=72654 net_addr_v4_add: 172.29.0.2/21 dev tun0
2023-01-23 20:22:49 us=72871 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=72902 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=72974 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 20:22:49 update-systemd-resolved: Link 'tun0' coming up
<14>Jan 23 20:22:49 update-systemd-resolved: Adding IPv4 DNS Server 141.42.1.1
<14>Jan 23 20:22:49 update-systemd-resolved: Adding DNS Domain charite.de
<14>Jan 23 20:22:49 update-systemd-resolved: SetLinkDNS(4 1 2 4 141 42 1 1)
<14>Jan 23 20:22:49 update-systemd-resolved: SetLinkDomains(4 1 charite.de false)
2023-01-23 20:22:49 us=140846 net_route_v4_add: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=141128 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=141182 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=141213 net_route_v4_add: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=141583 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=141662 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=141703 net_route_v4_add: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=142144 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=142373 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=142601 net_route_v4_add: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=143429 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=143460 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=143489 net_route_v4_add: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=143969 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=144020 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=144078 net_route_v4_add: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=144446 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=144479 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=144509 net_route_v4_add: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=144800 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=144827 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=144855 net_route_v4_add: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=145405 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=145500 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=145579 net_route_v4_add: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=145766 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=145792 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=145818 net_route_v4_add: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=146196 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=146323 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=146384 net_route_v4_add: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=146602 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=146827 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=146924 dco_new_peer: peer-id 0, fd 3
2023-01-23 20:22:49 us=147048 Data Channel: using negotiated cipher 'AES-256-GCM'
2023-01-23 20:22:49 us=147117 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 20:22:49 us=147214 dco_install_key: peer_id=0 keyid=0
2023-01-23 20:22:49 us=147231 dco_new_key: slot 0, key-id 0, peer-id 0, cipher AES-256-GCM
2023-01-23 20:22:49 us=153240 dco_set_peer: peer-id 0, keepalive 10/30, mss 1400
2023-01-23 20:22:49 us=153298 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-01-23 20:22:49 us=153315 Initialization Sequence Completed
2023-01-23 20:22:49 us=153369 UDPv4 WRITE [101] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #10 ] [ 6 ] pid=5 DATA len=35
2023-01-23 20:22:49 us=153390 dco_do_write: peer-id 0, len=101
2023-01-23 20:22:49 us=153996 dco_update_keys: peer_id=0
2023-01-23 20:22:50 us=301004 dco_do_read
2023-01-23 20:22:50 us=301083 ovpn-dco: received OVPN_PACKET_ATTR_PACKET, ifindex: 4 peer-id: 0, len 78
2023-01-23 20:22:50 us=301120 UDPv4 READ [78] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #10 ] [ 5 4 3 2 1 ] DATA len=0
2023-01-23 20:22:50 us=301163 dco_update_keys: peer_id=0
^C2023-01-23 20:22:58 us=692141 event_wait : Interrupted system call (fd=-1,code=4)
2023-01-23 20:22:58 us=692217 SIGTERM received, sending exit notification to peer
2023-01-23 20:22:58 us=692263 dco_update_keys: peer_id=0
2023-01-23 20:22:58 us=692325 Attempting to send data packet while data channel offload is in use. Dropping packet
2023-01-23 20:22:59 us=729811 dco_del_peer: peer-id 0
2023-01-23 20:22:59 us=730536 TCP/UDP: Closing socket
2023-01-23 20:22:59 us=730662 net_route_v4_del: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=730936 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=731015 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=731086 net_route_v4_del: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=731243 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=731296 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=731349 net_route_v4_del: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=731470 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=731517 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=731575 net_route_v4_del: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=731745 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=731800 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=731863 net_route_v4_del: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=732049 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=732108 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=732168 net_route_v4_del: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=732332 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=732387 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=732452 net_route_v4_del: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=732613 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=732666 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=732740 net_route_v4_del: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=732910 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=732960 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=733030 net_route_v4_del: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=733736 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=733813 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=733893 net_route_v4_del: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=734052 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=734105 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=734169 net_route_v4_del: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=734316 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=734387 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=734497 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 20:22:59 update-systemd-resolved: Link 'tun0' going down
2023-01-23 20:22:59 us=811101 Closing TUN/TAP interface
2023-01-23 20:22:59 us=811226 net_addr_v4_del: 172.29.0.2 dev tun0
2023-01-23 20:22:59 us=813538 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=813605 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=813653 close_tun_dco
2023-01-23 20:22:59 us=813747 net_iface_del: delete tun0
2023-01-23 20:22:59 us=889448 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=889541 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=889892 SIGTERM[soft,exit-with-notification] received, process exiting
ordex commented 1 year ago

@hildeb where are you getting ovpn-dco from? I believe you have been compiling it from source, right? Are you patching it in any way?

ordex commented 1 year ago

@hildeb if you are compiling from source, would you mind recompiling it specifying DEBUG=1 to make? That should enable extra debugging messages that you should see in dmesg.

hildeb commented 1 year ago

@ordex I used git clone https://github.com/OpenVPN/ovpn-dco.git and then I just built it.

hildeb commented 1 year ago

@ordex OK; I'll rebuild with DEBUG=1

hildeb commented 1 year ago

So, moar DEBUG: first I modprob'ed, the I connected

hildeb commented 1 year ago

Matching kern.log:

Jan 23 21:40:34 comet kernel: [   47.394509] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
Jan 23 21:40:34 comet kernel: [   47.395963] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-6-g93f1cf8 -- (C) 2020-2022 OpenVPN, Inc.
Jan 23 21:40:57 comet kernel: [   69.563184] tun0 (uninitialized): ovpn_newlink: setting device (tun0) mode: 0
Jan 23 21:40:57 comet kernel: [   69.564613] tun0: ovpn_netlink_register_packet: registering userspace at 2768245366
Jan 23 21:40:57 comet kernel: [   69.566317] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.567752] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.567789] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.567816] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.567837] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.567859] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.567884] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.567906] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.567927] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.567948] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [   69.685447] tun0: ovpn_netlink_new_peer: adding peer with endpoint=193.175.73.170:1194/UDP id=0 VPN-IPv4=0.0.0.0 VPN-IPv6=::
Jan 23 21:40:57 comet kernel: [   69.697368] ********* Cipher gcm(aes) (encrypt)
Jan 23 21:40:57 comet kernel: [   69.697378] *** IV size=12
Jan 23 21:40:57 comet kernel: [   69.697382] *** req size=88
Jan 23 21:40:57 comet kernel: [   69.697386] *** block size=1
Jan 23 21:40:57 comet kernel: [   69.697389] *** auth size=16
Jan 23 21:40:57 comet kernel: [   69.697392] *** alignmask=0x0
Jan 23 21:40:57 comet kernel: [   69.697409] ********* Cipher gcm(aes) (decrypt)
Jan 23 21:40:57 comet kernel: [   69.697413] *** IV size=12
Jan 23 21:40:57 comet kernel: [   69.697416] *** req size=88
Jan 23 21:40:57 comet kernel: [   69.697420] *** block size=1
Jan 23 21:40:57 comet kernel: [   69.697423] *** auth size=16
Jan 23 21:40:57 comet kernel: [   69.697426] *** alignmask=0x0
Jan 23 21:40:57 comet kernel: [   69.697430] tun0: ovpn_netlink_new_key: new key installed (id=0) for peer 0
Jan 23 21:40:57 comet kernel: [   69.697597] tun0: ovpn_peer_keepalive_set: scheduling keepalive for peer 0: interval=10 timeout=30
Jan 23 21:40:57 comet kernel: [   69.697826] ------------[ cut here ]------------
Jan 23 21:40:57 comet kernel: [   69.697830] WARNING: CPU: 4 PID: 4726 at lib/nlattr.c:117 nla_get_range_unsigned+0xe9/0x150
Jan 23 21:40:57 comet kernel: [   69.697850] Modules linked in: ovpn_dco(OE) ip6_udp_tunnel udp_tunnel ccm rfcomm snd_seq_dummy snd_hrtimer cmac algif_hash algif_skcipher af_alg bnep binfmt_misc zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) snd_hda_codec_hdmi snd_ctl_led snd_hda_codec_realtek snd_hda_codec_generic uvcvideo btusb videobuf2_vmalloc btrtl videobuf2_memops btbcm videobuf2_v4l2 btintel videobuf2_common btmtk videodev bluetooth mc ecdh_generic ecc dell_rbtn snd_soc_avs snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep intel_tcc_cooling snd_pcm x86_pkg_temp_thermal intel_powerclamp iwlmvm coretemp snd_seq_midi snd_seq_midi_event kvm_intel mac80211 snd_rawmidi libarc4 kvm snd_seq joydev dell_laptop crct10dif_pclmul iwlwifi ghash_clmulni_intel snd_seq_device snd_timer
Jan 23 21:40:57 comet kernel: [   69.698047]  mei_hdcp mei_pxp aesni_intel dell_wmi ledtrig_audio crypto_simd intel_rapl_msr i915 dell_smm_hwmon dell_smbios cryptd dcdbas snd rapl input_leds dell_wmi_sysman drm_buddy intel_cstate intel_wmi_thunderbolt wmi_bmof firmware_attributes_class dell_wmi_descriptor serio_raw cfg80211 ucsi_acpi ttm ee1004 soundcore hid_multitouch typec_ucsi drm_display_helper nls_iso8859_1 typec cec rc_core processor_thermal_device_pci_legacy drm_kms_helper processor_thermal_device processor_thermal_rfim i2c_algo_bit intel_hid int3400_thermal fb_sys_fops dell_smo8800 processor_thermal_mbox acpi_thermal_rel syscopyarea int3403_thermal sparse_keymap processor_thermal_rapl sysfillrect mei_me sysimgblt intel_rapl_common intel_xhci_usb_role_switch acpi_pad int340x_thermal_zone mac_hid mei intel_soc_dts_iosf intel_pch_thermal msr parport_pc ppdev lp parport ramoops drm pstore_blk reed_solomon pstore_zone efi_pstore ip_tables x_tables autofs4 usbhid hid_generic rtsx_pci_sdmmc crc32_pclmul i2c_i801
Jan 23 21:40:57 comet kernel: [   69.698226]  i2c_smbus e1000e intel_lpss_pci rtsx_pci ahci i2c_hid_acpi intel_lpss xhci_pci libahci i2c_hid idma64 xhci_pci_renesas wmi hid video
Jan 23 21:40:57 comet kernel: [   69.698263] CPU: 4 PID: 4726 Comm: openvpn Tainted: P     U     OE     5.19.0-30-generic #31-Ubuntu
Jan 23 21:40:57 comet kernel: [   69.698272] Hardware name: Dell Inc. Latitude 5590/0MM81M, BIOS 1.26.0 11/20/2022
Jan 23 21:40:57 comet kernel: [   69.698276] RIP: 0010:nla_get_range_unsigned+0xe9/0x150
Jan 23 21:40:57 comet kernel: [   69.698288] Code: ff ff 00 00 3c 0b 0f 84 72 ff ff ff 48 c7 c2 ff ff ff ff 3c 04 0f 84 63 ff ff ff 0f 0b 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc <0f> 0b 48 c7 06 00 00 00 00 0f b6 07 3c 03 0f 85 31 ff ff ff ba ff
Jan 23 21:40:57 comet kernel: [   69.698294] RSP: 0018:ffffbab387217760 EFLAGS: 00010286
Jan 23 21:40:57 comet kernel: [   69.698302] RAX: 0000000000000000 RBX: 000000000000000b RCX: 0000000000000065
Jan 23 21:40:57 comet kernel: [   69.698307] RDX: ffffbab387217ad8 RSI: ffffbab387217778 RDI: ffffffffc1345a90
Jan 23 21:40:57 comet kernel: [   69.698312] RBP: ffffbab3872177b8 R08: ffffbab387217778 R09: 0000000000000001
Jan 23 21:40:57 comet kernel: [   69.698317] R10: ffffbab387217ad8 R11: 0000000000000000 R12: ffffffffc1345a90
Jan 23 21:40:57 comet kernel: [   69.698321] R13: ffff9afea6fd8428 R14: ffffbab387217ad8 R15: 000000000000001f
Jan 23 21:40:57 comet kernel: [   69.698327] FS:  00007f31f704b800(0000) GS:ffff9b019f500000(0000) knlGS:0000000000000000
Jan 23 21:40:57 comet kernel: [   69.698333] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 23 21:40:57 comet kernel: [   69.698339] CR2: 0000557d69a777e8 CR3: 000000017f2e8001 CR4: 00000000003706e0
Jan 23 21:40:57 comet kernel: [   69.698344] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 23 21:40:57 comet kernel: [   69.698349] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 23 21:40:57 comet kernel: [   69.698354] Call Trace:
Jan 23 21:40:57 comet kernel: [   69.698358]  <TASK>
Jan 23 21:40:57 comet kernel: [   69.698362]  ? nla_validate_int_range+0x81/0x2d0
Jan 23 21:40:57 comet kernel: [   69.698382]  validate_nla+0x4b3/0x790
Jan 23 21:40:57 comet kernel: [   69.698393]  ? _printk+0x68/0x94
Jan 23 21:40:57 comet kernel: [   69.698408]  __nla_validate_parse+0x11f/0x190
Jan 23 21:40:57 comet kernel: [   69.698421]  validate_nla+0x221/0x790
Jan 23 21:40:57 comet kernel: [   69.698430]  ? __mod_timer+0x27a/0x400
Jan 23 21:40:57 comet kernel: [   69.698442]  __nla_validate_parse+0x11f/0x190
Jan 23 21:40:57 comet kernel: [   69.698454]  __nla_parse+0x23/0x40
Jan 23 21:40:57 comet kernel: [   69.698463]  genl_family_rcv_msg_attrs_parse.constprop.0+0x93/0x100
Jan 23 21:40:57 comet kernel: [   69.698477]  genl_family_rcv_msg_doit+0x77/0x180
Jan 23 21:40:57 comet kernel: [   69.698493]  genl_rcv_msg+0xf0/0x200
Jan 23 21:40:57 comet kernel: [   69.698503]  ? ovpn_netlink_get_peer+0x1f0/0x1f0 [ovpn_dco]
Jan 23 21:40:57 comet kernel: [   69.698523]  ? genl_get_cmd+0x120/0x120
Jan 23 21:40:57 comet kernel: [   69.698533]  netlink_rcv_skb+0x54/0x110
Jan 23 21:40:57 comet kernel: [   69.698546]  genl_rcv+0x28/0x50
Jan 23 21:40:57 comet kernel: [   69.698554]  netlink_unicast+0x244/0x390
Jan 23 21:40:57 comet kernel: [   69.698566]  netlink_sendmsg+0x25e/0x4e0
Jan 23 21:40:57 comet kernel: [   69.698579]  sock_sendmsg+0x6a/0x70
Jan 23 21:40:57 comet kernel: [   69.698590]  ____sys_sendmsg+0x277/0x2c0
Jan 23 21:40:57 comet kernel: [   69.698599]  ? import_iovec+0x1b/0x30
Jan 23 21:40:57 comet kernel: [   69.698614]  ___sys_sendmsg+0x96/0xe0
Jan 23 21:40:57 comet kernel: [   69.698635]  __sys_sendmsg+0x86/0xf0
Jan 23 21:40:57 comet kernel: [   69.698646]  __x64_sys_sendmsg+0x1d/0x30
Jan 23 21:40:57 comet kernel: [   69.698652]  do_syscall_64+0x58/0x90
Jan 23 21:40:57 comet kernel: [   69.698661]  ? exit_to_user_mode_prepare+0x30/0xb0
Jan 23 21:40:57 comet kernel: [   69.698673]  ? syscall_exit_to_user_mode+0x29/0x50
Jan 23 21:40:57 comet kernel: [   69.698684]  ? do_syscall_64+0x67/0x90
Jan 23 21:40:57 comet kernel: [   69.698690]  ? exc_page_fault+0x91/0x1b0
Jan 23 21:40:57 comet kernel: [   69.698700]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
Jan 23 21:40:57 comet kernel: [   69.698706] RIP: 0033:0x7f31f6f208d4
Jan 23 21:40:57 comet kernel: [   69.698714] Code: 15 31 55 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 0d dd 0d 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
Jan 23 21:40:57 comet kernel: [   69.698719] RSP: 002b:00007ffe47e3db88 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
Jan 23 21:40:57 comet kernel: [   69.698727] RAX: ffffffffffffffda RBX: 0000557d69aff6e0 RCX: 00007f31f6f208d4
Jan 23 21:40:57 comet kernel: [   69.698732] RDX: 0000000000000000 RSI: 00007ffe47e3dbc0 RDI: 0000000000000004
Jan 23 21:40:57 comet kernel: [   69.698737] RBP: 0000557d69b02ef0 R08: 0000557d69b0c028 R09: 0000000000000000
Jan 23 21:40:57 comet kernel: [   69.698741] R10: 0000000000000065 R11: 0000000000000202 R12: 0000557d69b073f0
Jan 23 21:40:57 comet kernel: [   69.698746] R13: 00007ffe47e3dbc0 R14: 00007ffe47e3ddd0 R15: 0000000000000000
Jan 23 21:40:57 comet kernel: [   69.698757]  </TASK>
Jan 23 21:40:57 comet kernel: [   69.698761] ---[ end trace 0000000000000000 ]---
Jan 23 21:40:57 comet kernel: [   69.698768] tun0: ovpn_netlink_packet: sending userspace packet to peer 0...
Jan 23 21:40:58 comet kernel: [   70.687231] tun0: ovpn_peer_update_local_endpoint: learning local IPv4 for peer 0 (0.0.0.0 -> 192.168.178.25)
Jan 23 21:40:58 comet kernel: [   70.719934] tun0: ovpn_netlink_send_packet: sending packet to userspace, len: 78
Jan 23 21:40:59 comet kernel: [   72.112484] sctp: Hash tables configured (bind 256/256)
Jan 23 21:41:03 comet kernel: [   76.256804] tun0: ovpn_netlink_del_peer: peer id=0
Jan 23 21:41:03 comet kernel: [   76.278672] tun0: deleting peer with id 0, reason 1

and openvpn output:

2023-01-23 21:40:56 us=482734 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback 'BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-01-23 21:40:56 us=483274 Current Parameter Settings:
2023-01-23 21:40:56 us=483312   config = 'charite-hildeb.ovpn'
2023-01-23 21:40:56 us=483333   mode = 0
2023-01-23 21:40:56 us=483352   persist_config = DISABLED
2023-01-23 21:40:56 us=483371   persist_mode = 1
2023-01-23 21:40:56 us=483388   show_ciphers = DISABLED
2023-01-23 21:40:56 us=483406   show_digests = DISABLED
2023-01-23 21:40:56 us=483424   show_engines = DISABLED
2023-01-23 21:40:56 us=483441   genkey = DISABLED
2023-01-23 21:40:56 us=483459   genkey_filename = '[UNDEF]'
2023-01-23 21:40:56 us=483477   key_pass_file = '[UNDEF]'
2023-01-23 21:40:56 us=483495   show_tls_ciphers = DISABLED
2023-01-23 21:40:56 us=483513   connect_retry_max = 0
2023-01-23 21:40:56 us=483531 Connection profiles [0]:
2023-01-23 21:40:56 us=483549   proto = udp
2023-01-23 21:40:56 us=483568   local = '[UNDEF]'
2023-01-23 21:40:56 us=483586   local_port = '[UNDEF]'
2023-01-23 21:40:56 us=483604   remote = 'openvpn-gw170-ext.charite.de'
2023-01-23 21:40:56 us=483623   remote_port = '1194'
2023-01-23 21:40:56 us=483641   remote_float = DISABLED
2023-01-23 21:40:56 us=483658   bind_defined = DISABLED
2023-01-23 21:40:56 us=483676   bind_local = DISABLED
2023-01-23 21:40:56 us=483694   bind_ipv6_only = DISABLED
2023-01-23 21:40:56 us=483712   connect_retry_seconds = 5
2023-01-23 21:40:56 us=483730   connect_timeout = 120
2023-01-23 21:40:56 us=483748   socks_proxy_server = '[UNDEF]'
2023-01-23 21:40:56 us=483767   socks_proxy_port = '[UNDEF]'
2023-01-23 21:40:56 us=483785   tun_mtu = 1500
2023-01-23 21:40:56 us=483803   tun_mtu_defined = ENABLED
2023-01-23 21:40:56 us=483821   link_mtu = 1500
2023-01-23 21:40:56 us=483839   link_mtu_defined = DISABLED
2023-01-23 21:40:56 us=483857   tun_mtu_extra = 0
2023-01-23 21:40:56 us=483875   tun_mtu_extra_defined = DISABLED
2023-01-23 21:40:56 us=483893   mtu_discover_type = -1
2023-01-23 21:40:56 us=483911   fragment = 0
2023-01-23 21:40:56 us=483929   mssfix = 1492
2023-01-23 21:40:56 us=483947   mssfix_encap = ENABLED
2023-01-23 21:40:56 us=483965   mssfix_fixed = DISABLED
2023-01-23 21:40:56 us=483985   explicit_exit_notification = 1
2023-01-23 21:40:56 us=484003   tls_auth_file = '[INLINE]'
2023-01-23 21:40:56 us=484021   key_direction = 1
2023-01-23 21:40:56 us=484039   tls_crypt_file = '[UNDEF]'
2023-01-23 21:40:56 us=484057   tls_crypt_v2_file = '[UNDEF]'
2023-01-23 21:40:56 us=484075 Connection profiles END
2023-01-23 21:40:56 us=484093   remote_random = DISABLED
2023-01-23 21:40:56 us=484111   ipchange = '[UNDEF]'
2023-01-23 21:40:56 us=484129   dev = 'tun'
2023-01-23 21:40:56 us=484147   dev_type = '[UNDEF]'
2023-01-23 21:40:56 us=484164   dev_node = '[UNDEF]'
2023-01-23 21:40:56 us=484182   tuntap_options.disable_dco = DISABLED
2023-01-23 21:40:56 us=484200   lladdr = '[UNDEF]'
2023-01-23 21:40:56 us=484219   topology = 1
2023-01-23 21:40:56 us=484236   ifconfig_local = '[UNDEF]'
2023-01-23 21:40:56 us=484254   ifconfig_remote_netmask = '[UNDEF]'
2023-01-23 21:40:56 us=484281   ifconfig_noexec = DISABLED
2023-01-23 21:40:56 us=484300   ifconfig_nowarn = DISABLED
2023-01-23 21:40:56 us=484318   ifconfig_ipv6_local = '[UNDEF]'
2023-01-23 21:40:56 us=484384   ifconfig_ipv6_netbits = 0
2023-01-23 21:40:56 us=484406   ifconfig_ipv6_remote = '[UNDEF]'
2023-01-23 21:40:56 us=484424   shaper = 0
2023-01-23 21:40:56 us=484442   mtu_test = 0
2023-01-23 21:40:56 us=484460   mlock = DISABLED
2023-01-23 21:40:56 us=484478   keepalive_ping = 0
2023-01-23 21:40:56 us=484496   keepalive_timeout = 0
2023-01-23 21:40:56 us=484514   inactivity_timeout = 0
2023-01-23 21:40:56 us=484532   inactivity_minimum_bytes = 0
2023-01-23 21:40:56 us=484550   ping_send_timeout = 0
2023-01-23 21:40:56 us=484567   ping_rec_timeout = 0
2023-01-23 21:40:56 us=484585   ping_rec_timeout_action = 0
2023-01-23 21:40:56 us=484624   ping_timer_remote = DISABLED
2023-01-23 21:40:56 us=484645   remap_sigusr1 = 0
2023-01-23 21:40:56 us=484663   persist_tun = DISABLED
2023-01-23 21:40:56 us=484681   persist_local_ip = DISABLED
2023-01-23 21:40:56 us=484699   persist_remote_ip = DISABLED
2023-01-23 21:40:56 us=484717   persist_key = DISABLED
2023-01-23 21:40:56 us=484735   passtos = DISABLED
2023-01-23 21:40:56 us=484753   resolve_retry_seconds = 1000000000
2023-01-23 21:40:56 us=484771   resolve_in_advance = DISABLED
2023-01-23 21:40:56 us=484789   username = '[UNDEF]'
2023-01-23 21:40:56 us=484807   groupname = '[UNDEF]'
2023-01-23 21:40:56 us=484825   chroot_dir = '[UNDEF]'
2023-01-23 21:40:56 us=484843   cd_dir = '[UNDEF]'
2023-01-23 21:40:56 us=484861   writepid = '[UNDEF]'
2023-01-23 21:40:56 us=484879   up_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 21:40:56 us=484897   down_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 21:40:56 us=484915   down_pre = ENABLED
2023-01-23 21:40:56 us=484934   up_restart = DISABLED
2023-01-23 21:40:56 us=484952   up_delay = DISABLED
2023-01-23 21:40:56 us=484969   daemon = DISABLED
2023-01-23 21:40:56 us=484988   log = DISABLED
2023-01-23 21:40:56 us=485006   suppress_timestamps = DISABLED
2023-01-23 21:40:56 us=485024   machine_readable_output = DISABLED
2023-01-23 21:40:56 us=485042   nice = 0
2023-01-23 21:40:56 us=485061   verbosity = 6
2023-01-23 21:40:56 us=485079   mute = 0
2023-01-23 21:40:56 us=485097   gremlin = 0
2023-01-23 21:40:56 us=485115   status_file = '[UNDEF]'
2023-01-23 21:40:56 us=485133   status_file_version = 1
2023-01-23 21:40:56 us=485152   status_file_update_freq = 60
2023-01-23 21:40:56 us=485170   occ = ENABLED
2023-01-23 21:40:56 us=485189   rcvbuf = 0
2023-01-23 21:40:56 us=485207   sndbuf = 0
2023-01-23 21:40:56 us=485225   mark = 0
2023-01-23 21:40:56 us=485243   sockflags = 0
2023-01-23 21:40:56 us=485261   fast_io = DISABLED
2023-01-23 21:40:56 us=485279   comp.alg = 0
2023-01-23 21:40:56 us=485297   comp.flags = 24
2023-01-23 21:40:56 us=485316   route_script = '[UNDEF]'
2023-01-23 21:40:56 us=485335   route_default_gateway = '[UNDEF]'
2023-01-23 21:40:56 us=485353   route_default_metric = 0
2023-01-23 21:40:56 us=485372   route_noexec = DISABLED
2023-01-23 21:40:56 us=485390   route_delay = 0
2023-01-23 21:40:56 us=485409   route_delay_window = 30
2023-01-23 21:40:56 us=485427   route_delay_defined = DISABLED
2023-01-23 21:40:56 us=485446   route_nopull = DISABLED
2023-01-23 21:40:56 us=485464   route_gateway_via_dhcp = DISABLED
2023-01-23 21:40:56 us=485482   allow_pull_fqdn = DISABLED
2023-01-23 21:40:56 us=485501   management_addr = '[UNDEF]'
2023-01-23 21:40:56 us=485520   management_port = '[UNDEF]'
2023-01-23 21:40:56 us=485538   management_user_pass = '[UNDEF]'
2023-01-23 21:40:56 us=485595   management_log_history_cache = 250
2023-01-23 21:40:56 us=485613   management_echo_buffer_size = 100
2023-01-23 21:40:56 us=485631   management_client_user = '[UNDEF]'
2023-01-23 21:40:56 us=485649   management_client_group = '[UNDEF]'
2023-01-23 21:40:56 us=485667   management_flags = 0
2023-01-23 21:40:56 us=485686   shared_secret_file = '[UNDEF]'
2023-01-23 21:40:56 us=485705   key_direction = 1
2023-01-23 21:40:56 us=485724   ciphername = 'BF-CBC'
2023-01-23 21:40:56 us=485743   ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-01-23 21:40:56 us=485762   authname = 'SHA256'
2023-01-23 21:40:56 us=485780   engine = DISABLED
2023-01-23 21:40:56 us=485799   replay = ENABLED
2023-01-23 21:40:56 us=485817   mute_replay_warnings = DISABLED
2023-01-23 21:40:56 us=485836   replay_window = 64
2023-01-23 21:40:56 us=485855   replay_time = 15
2023-01-23 21:40:56 us=485873   packet_id_file = '[UNDEF]'
2023-01-23 21:40:56 us=485892   test_crypto = DISABLED
2023-01-23 21:40:56 us=485911   tls_server = DISABLED
2023-01-23 21:40:56 us=485929   tls_client = ENABLED
2023-01-23 21:40:56 us=485948   ca_file = '[INLINE]'
2023-01-23 21:40:56 us=485966   ca_path = '[UNDEF]'
2023-01-23 21:40:56 us=485985   dh_file = '[UNDEF]'
2023-01-23 21:40:56 us=486015   cert_file = '[INLINE]'
2023-01-23 21:40:56 us=486034   extra_certs_file = '[UNDEF]'
2023-01-23 21:40:56 us=486053   priv_key_file = '[INLINE]'
2023-01-23 21:40:56 us=486072   pkcs12_file = '[UNDEF]'
2023-01-23 21:40:56 us=486090   cipher_list = '[UNDEF]'
2023-01-23 21:40:56 us=486109   cipher_list_tls13 = '[UNDEF]'
2023-01-23 21:40:56 us=486127   tls_cert_profile = '[UNDEF]'
2023-01-23 21:40:56 us=486145   tls_verify = '[UNDEF]'
2023-01-23 21:40:56 us=486164   tls_export_cert = '[UNDEF]'
2023-01-23 21:40:56 us=486182   verify_x509_type = 1
2023-01-23 21:40:56 us=486202   verify_x509_name = 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de'
2023-01-23 21:40:56 us=486220   crl_file = '[UNDEF]'
2023-01-23 21:40:56 us=486240   ns_cert_type = 0
2023-01-23 21:40:56 us=486258   remote_cert_ku[i] = 65535
2023-01-23 21:40:56 us=486276   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486295   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486313   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486331   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486349   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486367   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486385   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486403   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486421   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486439   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486457   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486474   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486492   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486510   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486528   remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486547   remote_cert_eku = 'TLS Web Server Authentication'
2023-01-23 21:40:56 us=486566   ssl_flags = 192
2023-01-23 21:40:56 us=486584   tls_timeout = 2
2023-01-23 21:40:56 us=486603   renegotiate_bytes = -1
2023-01-23 21:40:56 us=486621   renegotiate_packets = 0
2023-01-23 21:40:56 us=486640   renegotiate_seconds = 0
2023-01-23 21:40:56 us=486658   handshake_window = 60
2023-01-23 21:40:56 us=486676   transition_window = 3600
2023-01-23 21:40:56 us=486695   single_session = DISABLED
2023-01-23 21:40:56 us=486713   push_peer_info = DISABLED
2023-01-23 21:40:56 us=486731   tls_exit = DISABLED
2023-01-23 21:40:56 us=486749   tls_crypt_v2_metadata = '[UNDEF]'
2023-01-23 21:40:56 us=486768   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486786   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486805   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486823   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486841   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486859   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486878   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486896   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486914   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486932   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486951   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486969   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486987   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=487005   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=487023   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=487042   pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=487061   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487080   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487098   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487117   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487135   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487153   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487172   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487190   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487219   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487238   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487257   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487275   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487293   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487311   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487329   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487347   pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487365   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487383   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487401   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487419   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487437   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487455   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487473   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487491   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487509   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487527   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487545   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487563   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487582   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487600   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487618   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487636   pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487655   pkcs11_pin_cache_period = -1
2023-01-23 21:40:56 us=487673   pkcs11_id = '[UNDEF]'
2023-01-23 21:40:56 us=487692   pkcs11_id_management = DISABLED
2023-01-23 21:40:56 us=487714   server_network = 0.0.0.0
2023-01-23 21:40:56 us=487735   server_netmask = 0.0.0.0
2023-01-23 21:40:56 us=487772   server_network_ipv6 = ::
2023-01-23 21:40:56 us=487793   server_netbits_ipv6 = 0
2023-01-23 21:40:56 us=487813   server_bridge_ip = 0.0.0.0
2023-01-23 21:40:56 us=487833   server_bridge_netmask = 0.0.0.0
2023-01-23 21:40:56 us=487854   server_bridge_pool_start = 0.0.0.0
2023-01-23 21:40:56 us=487874   server_bridge_pool_end = 0.0.0.0
2023-01-23 21:40:56 us=487893   ifconfig_pool_defined = DISABLED
2023-01-23 21:40:56 us=487913   ifconfig_pool_start = 0.0.0.0
2023-01-23 21:40:56 us=487934   ifconfig_pool_end = 0.0.0.0
2023-01-23 21:40:56 us=487954   ifconfig_pool_netmask = 0.0.0.0
2023-01-23 21:40:56 us=487983   ifconfig_pool_persist_filename = '[UNDEF]'
2023-01-23 21:40:56 us=488007   ifconfig_pool_persist_refresh_freq = 600
2023-01-23 21:40:56 us=488029   ifconfig_ipv6_pool_defined = DISABLED
2023-01-23 21:40:56 us=488056   ifconfig_ipv6_pool_base = ::
2023-01-23 21:40:56 us=488084   ifconfig_ipv6_pool_netbits = 0
2023-01-23 21:40:56 us=488109   n_bcast_buf = 256
2023-01-23 21:40:56 us=488132   tcp_queue_limit = 64
2023-01-23 21:40:56 us=488156   real_hash_size = 256
2023-01-23 21:40:56 us=488176   virtual_hash_size = 256
2023-01-23 21:40:56 us=488204   client_connect_script = '[UNDEF]'
2023-01-23 21:40:56 us=488232   learn_address_script = '[UNDEF]'
2023-01-23 21:40:56 us=488257   client_disconnect_script = '[UNDEF]'
2023-01-23 21:40:56 us=488279   client_config_dir = '[UNDEF]'
2023-01-23 21:40:56 us=488305   ccd_exclusive = DISABLED
2023-01-23 21:40:56 us=488361   tmp_dir = '/tmp'
2023-01-23 21:40:56 us=488401   push_ifconfig_defined = DISABLED
2023-01-23 21:40:56 us=488428   push_ifconfig_local = 0.0.0.0
2023-01-23 21:40:56 us=488453   push_ifconfig_remote_netmask = 0.0.0.0
2023-01-23 21:40:56 us=488475   push_ifconfig_ipv6_defined = DISABLED
2023-01-23 21:40:56 us=488501   push_ifconfig_ipv6_local = ::/0
2023-01-23 21:40:56 us=488524   push_ifconfig_ipv6_remote = ::
2023-01-23 21:40:56 us=488546   enable_c2c = DISABLED
2023-01-23 21:40:56 us=488568   duplicate_cn = DISABLED
2023-01-23 21:40:56 us=488590   cf_max = 0
2023-01-23 21:40:56 us=488610   cf_per = 0
2023-01-23 21:40:56 us=488630   max_clients = 1024
2023-01-23 21:40:56 us=488651   max_routes_per_client = 256
2023-01-23 21:40:56 us=488674   auth_user_pass_verify_script = '[UNDEF]'
2023-01-23 21:40:56 us=488717   auth_user_pass_verify_script_via_file = DISABLED
2023-01-23 21:40:56 us=488740   auth_token_generate = DISABLED
2023-01-23 21:40:56 us=488760   auth_token_lifetime = 0
2023-01-23 21:40:56 us=488782   auth_token_secret_file = '[UNDEF]'
2023-01-23 21:40:56 us=488803   port_share_host = '[UNDEF]'
2023-01-23 21:40:56 us=488825   port_share_port = '[UNDEF]'
2023-01-23 21:40:56 us=488848   vlan_tagging = DISABLED
2023-01-23 21:40:56 us=488872   vlan_accept = all
2023-01-23 21:40:56 us=488896   vlan_pvid = 1
2023-01-23 21:40:56 us=488918   client = ENABLED
2023-01-23 21:40:56 us=488940   pull = ENABLED
2023-01-23 21:40:56 us=488966   auth_user_pass_file = 'password.txt'
2023-01-23 21:40:56 us=488996 OpenVPN 2.6_git x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-01-23 21:40:56 us=489047 library versions: OpenSSL 3.0.5 5 Jul 2022, LZO 2.10
2023-01-23 21:40:56 us=489965 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-23 21:40:56 us=496879 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 21:40:56 us=496961 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 21:40:56 us=497217 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 headroom:126 payload:1376 tailroom:126 ET:0 ]
2023-01-23 21:40:56 us=502521 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 21:40:56 us=502716 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client'
2023-01-23 21:40:56 us=502745 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server'
2023-01-23 21:40:56 us=502803 TCP/UDP: Preserving recently used remote address: [AF_INET]193.175.73.170:1194
2023-01-23 21:40:56 us=502871 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-23 21:40:56 us=502901 UDPv4 link local: (not bound)
2023-01-23 21:40:56 us=502924 UDPv4 link remote: [AF_INET]193.175.73.170:1194
2023-01-23 21:40:56 us=504113 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=504191 UDPv4 WRITE [54] to [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2023-01-23 21:40:56 us=504303 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=522495 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2023-01-23 21:40:56 us=522582 TLS: Initial packet from [AF_INET]193.175.73.170:1194, sid=cf80dfe8 301793af
2023-01-23 21:40:56 us=522767 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=522824 UDPv4 WRITE [343] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=277
2023-01-23 21:40:56 us=522932 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=541862 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1136
2023-01-23 21:40:56 us=542726 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=542804 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 ] DATA len=0
2023-01-23 21:40:56 us=542912 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=542969 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1136
2023-01-23 21:40:56 us=543041 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=543080 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 2 ] DATA len=0
2023-01-23 21:40:56 us=543143 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=543190 UDPv4 READ [1173] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 1 ] pid=3 DATA len=1107
2023-01-23 21:40:56 us=545474 VERIFY OK: depth=1, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=Charite-VPN CA, name=EasyRSA, emailAddress=vpn@charite.de
2023-01-23 21:40:56 us=545973 VERIFY KU OK
2023-01-23 21:40:56 us=546015 Validating certificate extended key usage
2023-01-23 21:40:56 us=546037 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-01-23 21:40:56 us=546055 VERIFY EKU OK
2023-01-23 21:40:56 us=546073 VERIFY X509NAME OK: C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 21:40:56 us=546090 VERIFY OK: depth=0, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 21:40:56 us=550785 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=550855 UDPv4 WRITE [1316] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 3 ] pid=2 DATA len=1250
2023-01-23 21:40:56 us=550958 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=551002 UDPv4 WRITE [1304] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=3 DATA len=1250
2023-01-23 21:40:56 us=551077 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=551120 UDPv4 WRITE [940] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=4 DATA len=886
2023-01-23 21:40:56 us=551172 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=568905 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 1 ] DATA len=0
2023-01-23 21:40:56 us=569041 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=569098 UDPv4 READ [70] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 2 1 ] DATA len=0
2023-01-23 21:40:56 us=569140 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=814670 UDPv4 READ [236] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ 4 3 2 1 ] pid=4 DATA len=158
2023-01-23 21:40:56 us=815003 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=815065 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 ] DATA len=0
2023-01-23 21:40:56 us=815168 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=815222 UDPv4 READ [324] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 ] pid=5 DATA len=246
2023-01-23 21:40:56 us=815302 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1549'
2023-01-23 21:40:56 us=815338 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]'
2023-01-23 21:40:56 us=815367 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
2023-01-23 21:40:56 us=815428 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-01-23 21:40:56 us=815468 [openvpn.charite.de] Peer Connection Initiated with [AF_INET]193.175.73.170:1194
2023-01-23 21:40:56 us=815512 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=815551 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #9 ] [ 5 ] DATA len=0
2023-01-23 21:40:56 us=815613 dco_update_keys: peer_id=0
2023-01-23 21:40:57 us=122237 UDPv4 READ [663] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=6 DATA len=585
2023-01-23 21:40:57 us=122397 SENT CONTROL [openvpn.charite.de]: 'PUSH_REQUEST' (status=1)
2023-01-23 21:40:57 us=122471 dco_update_keys: peer_id=0
2023-01-23 21:40:57 us=122526 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 141.42.1.1,dhcp-option DOMAIN charite.de,route-gateway 172.29.0.1,topology subnet,ping 10,ping-restart 30,route 10.27.0.0 255.255.0.0,route 10.28.0.0 255.254.0.0,route 10.32.0.0 255.224.0.0,route 172.16.0.0 255.254.0.0,route 192.168.192.0 255.255.192.0,route 141.42.0.0 255.255.0.0,route 193.175.72.0 255.255.255.0,route 193.175.74.0 255.255.254.0,route 193.175.174.0 255.255.255.192,route 172.19.252.0 255.255.255.224,route 194.94.4.0 255.255.254.0,ifconfig 172.29.0.2 255.255.248.0,peer-id 0,cipher AES-256-GCM,key-derivation tls-ekm'
2023-01-23 21:40:57 us=122771 OPTIONS IMPORT: timers and/or timeouts modified
2023-01-23 21:40:57 us=122801 OPTIONS IMPORT: --ifconfig/up options modified
2023-01-23 21:40:57 us=122865 OPTIONS IMPORT: route options modified
2023-01-23 21:40:57 us=122886 OPTIONS IMPORT: route-related options modified
2023-01-23 21:40:57 us=122904 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-01-23 21:40:57 us=122922 OPTIONS IMPORT: peer-id set
2023-01-23 21:40:57 us=122940 OPTIONS IMPORT: data channel crypto options modified
2023-01-23 21:40:57 us=122983 net_route_v4_best_gw query: dst 0.0.0.0
2023-01-23 21:40:57 us=123127 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=123176 sitnl_send: rtnl: received 496 bytes
2023-01-23 21:40:57 us=123253 net_route_v4_best_gw result: via 192.168.178.1 dev wlp2s0
2023-01-23 21:40:57 us=123349 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=wlp2s0 HWADDR=d0:c6:37:db:70:77
2023-01-23 21:40:57 us=123769 open_tun_dco: tun0
2023-01-23 21:40:57 us=123802 net_iface_new: add tun0 type ovpn-dco
2023-01-23 21:40:57 us=125271 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=125352 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=125481 ovpn_dco_register
2023-01-23 21:40:57 us=125795 DCO device tun0 opened
2023-01-23 21:40:57 us=125845 do_ifconfig, ipv4=1, ipv6=0
2023-01-23 21:40:57 us=125926 net_iface_mtu_set: mtu 1500 for tun0
2023-01-23 21:40:57 us=126115 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=126172 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=126268 net_iface_up: set tun0 up
2023-01-23 21:40:57 us=127701 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=127786 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=127858 net_addr_v4_add: 172.29.0.2/21 dev tun0
2023-01-23 21:40:57 us=128252 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=128319 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=128490 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 21:40:57 update-systemd-resolved: Link 'tun0' coming up
<14>Jan 23 21:40:57 update-systemd-resolved: Adding IPv4 DNS Server 141.42.1.1
<14>Jan 23 21:40:57 update-systemd-resolved: Adding DNS Domain charite.de
<14>Jan 23 21:40:57 update-systemd-resolved: SetLinkDNS(4 1 2 4 141 42 1 1)
<14>Jan 23 21:40:57 update-systemd-resolved: SetLinkDomains(4 1 charite.de false)
2023-01-23 21:40:57 us=242999 net_route_v4_add: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=243272 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=243335 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=243397 net_route_v4_add: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=243597 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=243657 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=243719 net_route_v4_add: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=243941 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=243998 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=244057 net_route_v4_add: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=244245 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=244308 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=244425 net_route_v4_add: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=244614 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=244673 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=244732 net_route_v4_add: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=244895 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=244956 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=245017 net_route_v4_add: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=245190 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=245246 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=245302 net_route_v4_add: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=245515 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=245572 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=245634 net_route_v4_add: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=245808 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=245865 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=245925 net_route_v4_add: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=246089 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=246145 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=246200 net_route_v4_add: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=246346 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=246405 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=246519 dco_new_peer: peer-id 0, fd 3
2023-01-23 21:40:57 us=246798 Data Channel: using negotiated cipher 'AES-256-GCM'
2023-01-23 21:40:57 us=246966 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 21:40:57 us=247176 dco_install_key: peer_id=0 keyid=0
2023-01-23 21:40:57 us=247225 dco_new_key: slot 0, key-id 0, peer-id 0, cipher AES-256-GCM
2023-01-23 21:40:57 us=258774 dco_set_peer: peer-id 0, keepalive 10/30, mss 1400
2023-01-23 21:40:57 us=258891 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-01-23 21:40:57 us=258930 Initialization Sequence Completed
2023-01-23 21:40:57 us=259009 UDPv4 WRITE [101] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #10 ] [ 6 ] pid=5 DATA len=35
2023-01-23 21:40:57 us=259031 dco_do_write: peer-id 0, len=101
2023-01-23 21:40:57 us=260173 dco_update_keys: peer_id=0
2023-01-23 21:40:58 us=282261 dco_do_read
2023-01-23 21:40:58 us=282390 ovpn-dco: received OVPN_PACKET_ATTR_PACKET, ifindex: 4 peer-id: 0, len 78
2023-01-23 21:40:58 us=282476 UDPv4 READ [78] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #10 ] [ 5 4 3 2 1 ] DATA len=0
2023-01-23 21:40:58 us=282586 dco_update_keys: peer_id=0
2023-01-23 21:41:02 us=676550 event_wait : Interrupted system call (fd=-1,code=4)
2023-01-23 21:41:02 us=676675 SIGTERM received, sending exit notification to peer
2023-01-23 21:41:02 us=676728 dco_update_keys: peer_id=0
2023-01-23 21:41:02 us=676768 Attempting to send data packet while data channel offload is in use. Dropping packet
2023-01-23 21:41:03 us=822416 dco_del_peer: peer-id 0
2023-01-23 21:41:03 us=823152 TCP/UDP: Closing socket
2023-01-23 21:41:03 us=823246 net_route_v4_del: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=823467 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=823536 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=823611 net_route_v4_del: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=823783 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=823843 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=823914 net_route_v4_del: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=824088 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=824150 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=824216 net_route_v4_del: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=824455 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=824532 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=824603 net_route_v4_del: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=824777 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=824847 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=824913 net_route_v4_del: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=825110 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=825218 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=825290 net_route_v4_del: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=825480 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=825541 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=825603 net_route_v4_del: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=825754 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=825819 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=825884 net_route_v4_del: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=826048 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=826109 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=826169 net_route_v4_del: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=826331 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=826390 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=826457 net_route_v4_del: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=826921 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=827698 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=827805 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 21:41:03 update-systemd-resolved: Link 'tun0' going down
2023-01-23 21:41:03 us=899355 Closing TUN/TAP interface
2023-01-23 21:41:03 us=899448 net_addr_v4_del: 172.29.0.2 dev tun0
2023-01-23 21:41:03 us=899862 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=899933 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=899987 close_tun_dco
2023-01-23 21:41:03 us=900071 net_iface_del: delete tun0
2023-01-23 21:41:03 us=992808 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=992916 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=993199 SIGTERM[soft,exit-with-notification] received, process exiting
ordex commented 1 year ago

@hildeb I have prepared a branch with some extra debugging messages which will help clearing out some doubts about the exact execution flow. Unfortunately your kernel is not compiled with full debug symbols, so the stacktrace is not fully making sense. This branch should help.

Please recompile ovpn-dco from the debug branch with DEBUG=1. Thanks a lot!

hildeb commented 1 year ago

OK, I checkout out the "debug" branch, recompiled with DEBUG=1 and rebooted to make sure everything is pristine:

Jan 23 22:16:13 comet kernel: [   42.455847] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
Jan 23 22:16:13 comet kernel: [   42.457556] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-4-g11a549e -- (C) 2020-2022 OpenVPN, Inc.
Jan 23 22:16:41 comet kernel: [   70.173854] tun0 (uninitialized): ovpn_newlink: setting device (tun0) mode: 0
Jan 23 22:16:41 comet kernel: [   70.175214] tun0: ovpn_netlink_register_packet: registering userspace at 2365592167
Jan 23 22:16:41 comet kernel: [   70.176890] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.180688] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.180732] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.180760] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.180783] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.180806] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.180831] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.180856] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.180880] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.180905] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [   70.306732] tun0: ovpn_netlink_new_peer: adding peer with endpoint=193.175.73.170:1194/UDP id=0 VPN-IPv4=0.0.0.0 VPN-IPv6=::
Jan 23 22:16:41 comet kernel: [   70.319428] ********* Cipher gcm(aes) (encrypt)
Jan 23 22:16:41 comet kernel: [   70.319438] *** IV size=12
Jan 23 22:16:41 comet kernel: [   70.319443] *** req size=88
Jan 23 22:16:41 comet kernel: [   70.319446] *** block size=1
Jan 23 22:16:41 comet kernel: [   70.319449] *** auth size=16
Jan 23 22:16:41 comet kernel: [   70.319453] *** alignmask=0x0
Jan 23 22:16:41 comet kernel: [   70.319469] ********* Cipher gcm(aes) (decrypt)
Jan 23 22:16:41 comet kernel: [   70.319473] *** IV size=12
Jan 23 22:16:41 comet kernel: [   70.319476] *** req size=88
Jan 23 22:16:41 comet kernel: [   70.319479] *** block size=1
Jan 23 22:16:41 comet kernel: [   70.319482] *** auth size=16
Jan 23 22:16:41 comet kernel: [   70.319486] *** alignmask=0x0
Jan 23 22:16:41 comet kernel: [   70.319490] tun0: ovpn_netlink_new_key: new key installed (id=0) for peer 0
Jan 23 22:16:41 comet kernel: [   70.319653] ovpn_netlink_set_peer: parsing message
Jan 23 22:16:41 comet kernel: [   70.319658] ovpn_netlink_set_peer: message parsed 0
Jan 23 22:16:41 comet kernel: [   70.319662] ovpn_netlink_set_peer: setting keepalive: 1
Jan 23 22:16:41 comet kernel: [   70.319666] tun0: ovpn_peer_keepalive_set: scheduling keepalive for peer 0: interval=10 timeout=30
Jan 23 22:16:41 comet kernel: [   70.319674] ovpn_netlink_set_peer: set keepalive
Jan 23 22:16:41 comet kernel: [   70.319898] ------------[ cut here ]------------
Jan 23 22:16:41 comet kernel: [   70.319902] WARNING: CPU: 7 PID: 4711 at lib/nlattr.c:117 nla_get_range_unsigned+0xe9/0x150
Jan 23 22:16:41 comet kernel: [   70.319922] Modules linked in: ovpn_dco(OE) ip6_udp_tunnel udp_tunnel ccm rfcomm snd_seq_dummy snd_hrtimer cmac algif_hash algif_skcipher af_alg bnep binfmt_misc zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) snd_hda_codec_hdmi snd_ctl_led snd_hda_codec_realtek snd_hda_codec_generic dell_rbtn btusb btrtl uvcvideo btbcm videobuf2_vmalloc btintel videobuf2_memops btmtk videobuf2_v4l2 videobuf2_common bluetooth videodev ecdh_generic mc ecc snd_soc_avs snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi intel_tcc_cooling snd_soc_core snd_compress x86_pkg_temp_thermal ac97_bus snd_pcm_dmaengine intel_powerclamp iwlmvm snd_hda_intel coretemp snd_intel_dspcfg dell_laptop snd_intel_sdw_acpi snd_hda_codec joydev kvm_intel mac80211 snd_hda_core dell_wmi i915 mei_pxp mei_hdcp intel_rapl_msr libarc4 ledtrig_audio snd_hwdep kvm snd_pcm dell_smm_hwmon drm_buddy snd_seq_midi ttm crct10dif_pclmul
Jan 23 22:16:41 comet kernel: [   70.320121]  snd_seq_midi_event ghash_clmulni_intel iwlwifi aesni_intel snd_rawmidi crypto_simd drm_display_helper cryptd dell_smbios rapl cec intel_wmi_thunderbolt snd_seq intel_cstate dcdbas rc_core cfg80211 snd_seq_device input_leds snd_timer drm_kms_helper wmi_bmof processor_thermal_device_pci_legacy dell_wmi_sysman processor_thermal_device serio_raw dell_wmi_descriptor firmware_attributes_class i2c_algo_bit ee1004 hid_multitouch processor_thermal_rfim snd fb_sys_fops processor_thermal_mbox syscopyarea processor_thermal_rapl sysfillrect intel_xhci_usb_role_switch soundcore sysimgblt nls_iso8859_1 ucsi_acpi mei_me typec_ucsi intel_rapl_common intel_pch_thermal intel_soc_dts_iosf mei typec intel_hid int3400_thermal int3403_thermal dell_smo8800 acpi_thermal_rel int340x_thermal_zone mac_hid sparse_keymap acpi_pad msr parport_pc ppdev lp parport drm ramoops pstore_blk reed_solomon pstore_zone efi_pstore ip_tables x_tables autofs4 usbhid hid_generic rtsx_pci_sdmmc crc32_pclmul i2c_i801
Jan 23 22:16:41 comet kernel: [   70.320295]  rtsx_pci intel_lpss_pci i2c_smbus e1000e i2c_hid_acpi intel_lpss ahci i2c_hid xhci_pci libahci idma64 xhci_pci_renesas wmi hid video
Jan 23 22:16:41 comet kernel: [   70.320332] CPU: 7 PID: 4711 Comm: openvpn Tainted: P     U     OE     5.19.0-30-generic #31-Ubuntu
Jan 23 22:16:41 comet kernel: [   70.320340] Hardware name: Dell Inc. Latitude 5590/0MM81M, BIOS 1.26.0 11/20/2022
Jan 23 22:16:41 comet kernel: [   70.320345] RIP: 0010:nla_get_range_unsigned+0xe9/0x150
Jan 23 22:16:41 comet kernel: [   70.320356] Code: ff ff 00 00 3c 0b 0f 84 72 ff ff ff 48 c7 c2 ff ff ff ff 3c 04 0f 84 63 ff ff ff 0f 0b 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc <0f> 0b 48 c7 06 00 00 00 00 0f b6 07 3c 03 0f 85 31 ff ff ff ba ff
Jan 23 22:16:41 comet kernel: [   70.320363] RSP: 0018:ffffb2cec11af6f0 EFLAGS: 00010286
Jan 23 22:16:41 comet kernel: [   70.320371] RAX: 0000000000000000 RBX: 000000000000000b RCX: 000000000000003e
Jan 23 22:16:41 comet kernel: [   70.320375] RDX: ffffb2cec11afa68 RSI: ffffb2cec11af708 RDI: ffffffffc0d7fb90
Jan 23 22:16:41 comet kernel: [   70.320380] RBP: ffffb2cec11af748 R08: ffffb2cec11af708 R09: 0000000000000001
Jan 23 22:16:41 comet kernel: [   70.320385] R10: ffffb2cec11afa68 R11: 0000000000000000 R12: ffffffffc0d7fb90
Jan 23 22:16:41 comet kernel: [   70.320389] R13: ffff988fb327dc28 R14: ffffb2cec11afa68 R15: 0000000000000000
Jan 23 22:16:41 comet kernel: [   70.320394] FS:  00007f245806d800(0000) GS:ffff98929f5c0000(0000) knlGS:0000000000000000
Jan 23 22:16:41 comet kernel: [   70.320401] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 23 22:16:41 comet kernel: [   70.320406] CR2: 000055a3cacee7e8 CR3: 00000001935a4006 CR4: 00000000003706e0
Jan 23 22:16:41 comet kernel: [   70.320412] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 23 22:16:41 comet kernel: [   70.320416] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 23 22:16:41 comet kernel: [   70.320421] Call Trace:
Jan 23 22:16:41 comet kernel: [   70.320425]  <TASK>
Jan 23 22:16:41 comet kernel: [   70.320428]  ? nla_validate_int_range+0x81/0x2d0
Jan 23 22:16:41 comet kernel: [   70.320443]  ? _prb_read_valid+0x26a/0x2f0
Jan 23 22:16:41 comet kernel: [   70.320461]  validate_nla+0x4b3/0x790
Jan 23 22:16:41 comet kernel: [   70.320475]  __nla_validate_parse+0x11f/0x190
Jan 23 22:16:41 comet kernel: [   70.320488]  validate_nla+0x221/0x790
Jan 23 22:16:41 comet kernel: [   70.320502]  __nla_validate_parse+0x11f/0x190
Jan 23 22:16:41 comet kernel: [   70.320513]  __nla_parse+0x23/0x40
Jan 23 22:16:41 comet kernel: [   70.320523]  genl_family_rcv_msg_attrs_parse.constprop.0+0x93/0x100
Jan 23 22:16:41 comet kernel: [   70.320538]  genl_family_rcv_msg_doit+0x77/0x180
Jan 23 22:16:41 comet kernel: [   70.320554]  genl_rcv_msg+0xf0/0x200
Jan 23 22:16:41 comet kernel: [   70.320564]  ? nla_parse_nested.constprop.0+0x90/0x90 [ovpn_dco]
Jan 23 22:16:41 comet kernel: [   70.320584]  ? genl_get_cmd+0x120/0x120
Jan 23 22:16:41 comet kernel: [   70.320594]  netlink_rcv_skb+0x54/0x110
Jan 23 22:16:41 comet kernel: [   70.320607]  genl_rcv+0x28/0x50
Jan 23 22:16:41 comet kernel: [   70.320615]  netlink_unicast+0x244/0x390
Jan 23 22:16:41 comet kernel: [   70.320627]  netlink_sendmsg+0x25e/0x4e0
Jan 23 22:16:41 comet kernel: [   70.320640]  sock_sendmsg+0x6a/0x70
Jan 23 22:16:41 comet kernel: [   70.320652]  ____sys_sendmsg+0x277/0x2c0
Jan 23 22:16:41 comet kernel: [   70.320661]  ? import_iovec+0x1b/0x30
Jan 23 22:16:41 comet kernel: [   70.320677]  ___sys_sendmsg+0x96/0xe0
Jan 23 22:16:41 comet kernel: [   70.320698]  __sys_sendmsg+0x86/0xf0
Jan 23 22:16:41 comet kernel: [   70.320709]  __x64_sys_sendmsg+0x1d/0x30
Jan 23 22:16:41 comet kernel: [   70.320715]  do_syscall_64+0x58/0x90
Jan 23 22:16:41 comet kernel: [   70.320724]  ? syscall_exit_to_user_mode+0x29/0x50
Jan 23 22:16:41 comet kernel: [   70.320735]  ? do_syscall_64+0x67/0x90
Jan 23 22:16:41 comet kernel: [   70.320744]  ? do_user_addr_fault+0x1df/0x680
Jan 23 22:16:41 comet kernel: [   70.320755]  ? exit_to_user_mode_prepare+0x30/0xb0
Jan 23 22:16:41 comet kernel: [   70.320768]  ? irqentry_exit_to_user_mode+0x9/0x20
Jan 23 22:16:41 comet kernel: [   70.320778]  ? irqentry_exit+0x43/0x50
Jan 23 22:16:41 comet kernel: [   70.320786]  ? exc_page_fault+0x91/0x1b0
Jan 23 22:16:41 comet kernel: [   70.320796]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
Jan 23 22:16:41 comet kernel: [   70.320803] RIP: 0033:0x7f24579208d4
Jan 23 22:16:41 comet kernel: [   70.320811] Code: 15 31 55 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 0d dd 0d 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
Jan 23 22:16:41 comet kernel: [   70.320816] RSP: 002b:00007ffd50544328 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
Jan 23 22:16:41 comet kernel: [   70.320825] RAX: ffffffffffffffda RBX: 000055a3cad766e0 RCX: 00007f24579208d4
Jan 23 22:16:41 comet kernel: [   70.320830] RDX: 0000000000000000 RSI: 00007ffd50544360 RDI: 0000000000000004
Jan 23 22:16:41 comet kernel: [   70.320834] RBP: 000055a3cad8ef90 R08: 000055a3cad83028 R09: 0000000000000000
Jan 23 22:16:41 comet kernel: [   70.320838] R10: 000000000000003e R11: 0000000000000202 R12: 000055a3cad7e3f0
Jan 23 22:16:41 comet kernel: [   70.320843] R13: 00007ffd50544360 R14: 00007ffd50544570 R15: 0000000000000000
Jan 23 22:16:41 comet kernel: [   70.320855]  </TASK>
Jan 23 22:16:41 comet kernel: [   70.320858] ---[ end trace 0000000000000000 ]---
Jan 23 22:16:41 comet kernel: [   70.320865] ovpn_netlink_packet:, received packet. parsing
Jan 23 22:16:41 comet kernel: [   70.320868] ovpn_netlink_packet: parsed: 0
Jan 23 22:16:41 comet kernel: [   70.320872] tun0: ovpn_netlink_packet: sending userspace packet to peer 0...
Jan 23 22:16:43 comet kernel: [   71.849944] tun0: ovpn_peer_update_local_endpoint: learning local IPv4 for peer 0 (0.0.0.0 -> 192.168.178.25)
Jan 23 22:16:45 comet kernel: [   73.876963] sctp: Hash tables configured (bind 256/256)
Jan 23 22:16:48 comet kernel: [   77.313354] tun0: ovpn_netlink_del_peer: peer id=0
Jan 23 22:16:48 comet kernel: [   77.354351] tun0: deleting peer with id 0, reason 1

and openvpn output:

2023-01-23 22:16:40 us=917531 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback 'BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-01-23 22:16:40 us=918446 Current Parameter Settings:
2023-01-23 22:16:40 us=918486   config = 'charite-hildeb.ovpn'
2023-01-23 22:16:40 us=918508   mode = 0
2023-01-23 22:16:40 us=918527   persist_config = DISABLED
2023-01-23 22:16:40 us=918546   persist_mode = 1
2023-01-23 22:16:40 us=918564   show_ciphers = DISABLED
2023-01-23 22:16:40 us=918582   show_digests = DISABLED
2023-01-23 22:16:40 us=918599   show_engines = DISABLED
2023-01-23 22:16:40 us=918617   genkey = DISABLED
2023-01-23 22:16:40 us=918635   genkey_filename = '[UNDEF]'
2023-01-23 22:16:40 us=918654   key_pass_file = '[UNDEF]'
2023-01-23 22:16:40 us=918672   show_tls_ciphers = DISABLED
2023-01-23 22:16:40 us=918690   connect_retry_max = 0
2023-01-23 22:16:40 us=918708 Connection profiles [0]:
2023-01-23 22:16:40 us=918727   proto = udp
2023-01-23 22:16:40 us=918746   local = '[UNDEF]'
2023-01-23 22:16:40 us=918764   local_port = '[UNDEF]'
2023-01-23 22:16:40 us=918783   remote = 'openvpn-gw170-ext.charite.de'
2023-01-23 22:16:40 us=918801   remote_port = '1194'
2023-01-23 22:16:40 us=918819   remote_float = DISABLED
2023-01-23 22:16:40 us=918837   bind_defined = DISABLED
2023-01-23 22:16:40 us=918855   bind_local = DISABLED
2023-01-23 22:16:40 us=918873   bind_ipv6_only = DISABLED
2023-01-23 22:16:40 us=918891   connect_retry_seconds = 5
2023-01-23 22:16:40 us=918909   connect_timeout = 120
2023-01-23 22:16:40 us=918928   socks_proxy_server = '[UNDEF]'
2023-01-23 22:16:40 us=918946   socks_proxy_port = '[UNDEF]'
2023-01-23 22:16:40 us=918965   tun_mtu = 1500
2023-01-23 22:16:40 us=918983   tun_mtu_defined = ENABLED
2023-01-23 22:16:40 us=919001   link_mtu = 1500
2023-01-23 22:16:40 us=919019   link_mtu_defined = DISABLED
2023-01-23 22:16:40 us=919074   tun_mtu_extra = 0
2023-01-23 22:16:40 us=919093   tun_mtu_extra_defined = DISABLED
2023-01-23 22:16:40 us=919111   mtu_discover_type = -1
2023-01-23 22:16:40 us=919130   fragment = 0
2023-01-23 22:16:40 us=919148   mssfix = 1492
2023-01-23 22:16:40 us=919166   mssfix_encap = ENABLED
2023-01-23 22:16:40 us=919185   mssfix_fixed = DISABLED
2023-01-23 22:16:40 us=919205   explicit_exit_notification = 1
2023-01-23 22:16:40 us=919223   tls_auth_file = '[INLINE]'
2023-01-23 22:16:40 us=919242   key_direction = 1
2023-01-23 22:16:40 us=919260   tls_crypt_file = '[UNDEF]'
2023-01-23 22:16:40 us=919278   tls_crypt_v2_file = '[UNDEF]'
2023-01-23 22:16:40 us=919296 Connection profiles END
2023-01-23 22:16:40 us=919314   remote_random = DISABLED
2023-01-23 22:16:40 us=919332   ipchange = '[UNDEF]'
2023-01-23 22:16:40 us=919351   dev = 'tun'
2023-01-23 22:16:40 us=919369   dev_type = '[UNDEF]'
2023-01-23 22:16:40 us=919386   dev_node = '[UNDEF]'
2023-01-23 22:16:40 us=919405   tuntap_options.disable_dco = DISABLED
2023-01-23 22:16:40 us=919423   lladdr = '[UNDEF]'
2023-01-23 22:16:40 us=919441   topology = 1
2023-01-23 22:16:40 us=919459   ifconfig_local = '[UNDEF]'
2023-01-23 22:16:40 us=919477   ifconfig_remote_netmask = '[UNDEF]'
2023-01-23 22:16:40 us=919505   ifconfig_noexec = DISABLED
2023-01-23 22:16:40 us=919524   ifconfig_nowarn = DISABLED
2023-01-23 22:16:40 us=919542   ifconfig_ipv6_local = '[UNDEF]'
2023-01-23 22:16:40 us=919561   ifconfig_ipv6_netbits = 0
2023-01-23 22:16:40 us=919579   ifconfig_ipv6_remote = '[UNDEF]'
2023-01-23 22:16:40 us=919597   shaper = 0
2023-01-23 22:16:40 us=919633   mtu_test = 0
2023-01-23 22:16:40 us=919653   mlock = DISABLED
2023-01-23 22:16:40 us=919672   keepalive_ping = 0
2023-01-23 22:16:40 us=919690   keepalive_timeout = 0
2023-01-23 22:16:40 us=919711   inactivity_timeout = 0
2023-01-23 22:16:40 us=919729   inactivity_minimum_bytes = 0
2023-01-23 22:16:40 us=919747   ping_send_timeout = 0
2023-01-23 22:16:40 us=919765   ping_rec_timeout = 0
2023-01-23 22:16:40 us=919783   ping_rec_timeout_action = 0
2023-01-23 22:16:40 us=919820   ping_timer_remote = DISABLED
2023-01-23 22:16:40 us=919840   remap_sigusr1 = 0
2023-01-23 22:16:40 us=919858   persist_tun = DISABLED
2023-01-23 22:16:40 us=919877   persist_local_ip = DISABLED
2023-01-23 22:16:40 us=919895   persist_remote_ip = DISABLED
2023-01-23 22:16:40 us=919913   persist_key = DISABLED
2023-01-23 22:16:40 us=919932   passtos = DISABLED
2023-01-23 22:16:40 us=919950   resolve_retry_seconds = 1000000000
2023-01-23 22:16:40 us=919969   resolve_in_advance = DISABLED
2023-01-23 22:16:40 us=919987   username = '[UNDEF]'
2023-01-23 22:16:40 us=920005   groupname = '[UNDEF]'
2023-01-23 22:16:40 us=920023   chroot_dir = '[UNDEF]'
2023-01-23 22:16:40 us=920041   cd_dir = '[UNDEF]'
2023-01-23 22:16:40 us=920059   writepid = '[UNDEF]'
2023-01-23 22:16:40 us=920077   up_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 22:16:40 us=920096   down_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 22:16:40 us=920114   down_pre = ENABLED
2023-01-23 22:16:40 us=920132   up_restart = DISABLED
2023-01-23 22:16:40 us=920150   up_delay = DISABLED
2023-01-23 22:16:40 us=920168   daemon = DISABLED
2023-01-23 22:16:40 us=920186   log = DISABLED
2023-01-23 22:16:40 us=920204   suppress_timestamps = DISABLED
2023-01-23 22:16:40 us=920223   machine_readable_output = DISABLED
2023-01-23 22:16:40 us=920241   nice = 0
2023-01-23 22:16:40 us=920259   verbosity = 6
2023-01-23 22:16:40 us=920278   mute = 0
2023-01-23 22:16:40 us=920296   gremlin = 0
2023-01-23 22:16:40 us=920314   status_file = '[UNDEF]'
2023-01-23 22:16:40 us=920332   status_file_version = 1
2023-01-23 22:16:40 us=920351   status_file_update_freq = 60
2023-01-23 22:16:40 us=920369   occ = ENABLED
2023-01-23 22:16:40 us=920388   rcvbuf = 0
2023-01-23 22:16:40 us=920406   sndbuf = 0
2023-01-23 22:16:40 us=920424   mark = 0
2023-01-23 22:16:40 us=920443   sockflags = 0
2023-01-23 22:16:40 us=920461   fast_io = DISABLED
2023-01-23 22:16:40 us=920479   comp.alg = 0
2023-01-23 22:16:40 us=920498   comp.flags = 24
2023-01-23 22:16:40 us=920517   route_script = '[UNDEF]'
2023-01-23 22:16:40 us=920535   route_default_gateway = '[UNDEF]'
2023-01-23 22:16:40 us=920554   route_default_metric = 0
2023-01-23 22:16:40 us=920572   route_noexec = DISABLED
2023-01-23 22:16:40 us=920590   route_delay = 0
2023-01-23 22:16:40 us=920609   route_delay_window = 30
2023-01-23 22:16:40 us=920627   route_delay_defined = DISABLED
2023-01-23 22:16:40 us=920646   route_nopull = DISABLED
2023-01-23 22:16:40 us=920664   route_gateway_via_dhcp = DISABLED
2023-01-23 22:16:40 us=920683   allow_pull_fqdn = DISABLED
2023-01-23 22:16:40 us=920702   management_addr = '[UNDEF]'
2023-01-23 22:16:40 us=920721   management_port = '[UNDEF]'
2023-01-23 22:16:40 us=920739   management_user_pass = '[UNDEF]'
2023-01-23 22:16:40 us=920758   management_log_history_cache = 250
2023-01-23 22:16:40 us=920776   management_echo_buffer_size = 100
2023-01-23 22:16:40 us=920795   management_client_user = '[UNDEF]'
2023-01-23 22:16:40 us=920813   management_client_group = '[UNDEF]'
2023-01-23 22:16:40 us=920832   management_flags = 0
2023-01-23 22:16:40 us=920850   shared_secret_file = '[UNDEF]'
2023-01-23 22:16:40 us=920869   key_direction = 1
2023-01-23 22:16:40 us=920888   ciphername = 'BF-CBC'
2023-01-23 22:16:40 us=920906   ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-01-23 22:16:40 us=920925   authname = 'SHA256'
2023-01-23 22:16:40 us=920944   engine = DISABLED
2023-01-23 22:16:40 us=920962   replay = ENABLED
2023-01-23 22:16:40 us=920981   mute_replay_warnings = DISABLED
2023-01-23 22:16:40 us=920999   replay_window = 64
2023-01-23 22:16:40 us=921018   replay_time = 15
2023-01-23 22:16:40 us=921037   packet_id_file = '[UNDEF]'
2023-01-23 22:16:40 us=921055   test_crypto = DISABLED
2023-01-23 22:16:40 us=921073   tls_server = DISABLED
2023-01-23 22:16:40 us=921092   tls_client = ENABLED
2023-01-23 22:16:40 us=921110   ca_file = '[INLINE]'
2023-01-23 22:16:40 us=921129   ca_path = '[UNDEF]'
2023-01-23 22:16:40 us=921147   dh_file = '[UNDEF]'
2023-01-23 22:16:40 us=921178   cert_file = '[INLINE]'
2023-01-23 22:16:40 us=921197   extra_certs_file = '[UNDEF]'
2023-01-23 22:16:40 us=921216   priv_key_file = '[INLINE]'
2023-01-23 22:16:40 us=921235   pkcs12_file = '[UNDEF]'
2023-01-23 22:16:40 us=921254   cipher_list = '[UNDEF]'
2023-01-23 22:16:40 us=921272   cipher_list_tls13 = '[UNDEF]'
2023-01-23 22:16:40 us=921290   tls_cert_profile = '[UNDEF]'
2023-01-23 22:16:40 us=921309   tls_verify = '[UNDEF]'
2023-01-23 22:16:40 us=921327   tls_export_cert = '[UNDEF]'
2023-01-23 22:16:40 us=921345   verify_x509_type = 1
2023-01-23 22:16:40 us=921365   verify_x509_name = 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de'
2023-01-23 22:16:40 us=921384   crl_file = '[UNDEF]'
2023-01-23 22:16:40 us=921402   ns_cert_type = 0
2023-01-23 22:16:40 us=921421   remote_cert_ku[i] = 65535
2023-01-23 22:16:40 us=921440   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921458   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921476   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921494   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921513   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921531   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921549   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921568   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921586   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921604   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921622   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921640   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921658   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921676   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921694   remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921713   remote_cert_eku = 'TLS Web Server Authentication'
2023-01-23 22:16:40 us=921731   ssl_flags = 192
2023-01-23 22:16:40 us=921750   tls_timeout = 2
2023-01-23 22:16:40 us=921769   renegotiate_bytes = -1
2023-01-23 22:16:40 us=921787   renegotiate_packets = 0
2023-01-23 22:16:40 us=921806   renegotiate_seconds = 0
2023-01-23 22:16:40 us=921824   handshake_window = 60
2023-01-23 22:16:40 us=921843   transition_window = 3600
2023-01-23 22:16:40 us=921861   single_session = DISABLED
2023-01-23 22:16:40 us=921880   push_peer_info = DISABLED
2023-01-23 22:16:40 us=921898   tls_exit = DISABLED
2023-01-23 22:16:40 us=921917   tls_crypt_v2_metadata = '[UNDEF]'
2023-01-23 22:16:40 us=921936   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=921954   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=921973   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=921992   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922010   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922028   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922047   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922065   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922084   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922102   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922120   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922139   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922157   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922175   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922193   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922212   pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922231   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922250   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922269   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922288   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922307   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922325   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922344   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922362   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922392   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922411   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922430   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922448   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922466   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922485   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922503   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922521   pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922539   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922557   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922575   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922593   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922611   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922629   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922647   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922665   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922683   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922701   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922719   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922738   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922756   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922774   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922792   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922810   pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922829   pkcs11_pin_cache_period = -1
2023-01-23 22:16:40 us=922847   pkcs11_id = '[UNDEF]'
2023-01-23 22:16:40 us=922866   pkcs11_id_management = DISABLED
2023-01-23 22:16:40 us=922888   server_network = 0.0.0.0
2023-01-23 22:16:40 us=922908   server_netmask = 0.0.0.0
2023-01-23 22:16:40 us=922941   server_network_ipv6 = ::
2023-01-23 22:16:40 us=922961   server_netbits_ipv6 = 0
2023-01-23 22:16:40 us=922981   server_bridge_ip = 0.0.0.0
2023-01-23 22:16:40 us=923000   server_bridge_netmask = 0.0.0.0
2023-01-23 22:16:40 us=923020   server_bridge_pool_start = 0.0.0.0
2023-01-23 22:16:40 us=923039   server_bridge_pool_end = 0.0.0.0
2023-01-23 22:16:40 us=923058   ifconfig_pool_defined = DISABLED
2023-01-23 22:16:40 us=923077   ifconfig_pool_start = 0.0.0.0
2023-01-23 22:16:40 us=923096   ifconfig_pool_end = 0.0.0.0
2023-01-23 22:16:40 us=923116   ifconfig_pool_netmask = 0.0.0.0
2023-01-23 22:16:40 us=923142   ifconfig_pool_persist_filename = '[UNDEF]'
2023-01-23 22:16:40 us=923162   ifconfig_pool_persist_refresh_freq = 600
2023-01-23 22:16:40 us=923181   ifconfig_ipv6_pool_defined = DISABLED
2023-01-23 22:16:40 us=923201   ifconfig_ipv6_pool_base = ::
2023-01-23 22:16:40 us=923219   ifconfig_ipv6_pool_netbits = 0
2023-01-23 22:16:40 us=923238   n_bcast_buf = 256
2023-01-23 22:16:40 us=923257   tcp_queue_limit = 64
2023-01-23 22:16:40 us=923275   real_hash_size = 256
2023-01-23 22:16:40 us=923293   virtual_hash_size = 256
2023-01-23 22:16:40 us=923311   client_connect_script = '[UNDEF]'
2023-01-23 22:16:40 us=923330   learn_address_script = '[UNDEF]'
2023-01-23 22:16:40 us=923348   client_disconnect_script = '[UNDEF]'
2023-01-23 22:16:40 us=923366   client_config_dir = '[UNDEF]'
2023-01-23 22:16:40 us=923384   ccd_exclusive = DISABLED
2023-01-23 22:16:40 us=923402   tmp_dir = '/tmp'
2023-01-23 22:16:40 us=923421   push_ifconfig_defined = DISABLED
2023-01-23 22:16:40 us=923440   push_ifconfig_local = 0.0.0.0
2023-01-23 22:16:40 us=923460   push_ifconfig_remote_netmask = 0.0.0.0
2023-01-23 22:16:40 us=923478   push_ifconfig_ipv6_defined = DISABLED
2023-01-23 22:16:40 us=923498   push_ifconfig_ipv6_local = ::/0
2023-01-23 22:16:40 us=923517   push_ifconfig_ipv6_remote = ::
2023-01-23 22:16:40 us=923536   enable_c2c = DISABLED
2023-01-23 22:16:40 us=923554   duplicate_cn = DISABLED
2023-01-23 22:16:40 us=923573   cf_max = 0
2023-01-23 22:16:40 us=923591   cf_per = 0
2023-01-23 22:16:40 us=923610   max_clients = 1024
2023-01-23 22:16:40 us=923651   max_routes_per_client = 256
2023-01-23 22:16:40 us=923671   auth_user_pass_verify_script = '[UNDEF]'
2023-01-23 22:16:40 us=923702   auth_user_pass_verify_script_via_file = DISABLED
2023-01-23 22:16:40 us=923724   auth_token_generate = DISABLED
2023-01-23 22:16:40 us=923742   auth_token_lifetime = 0
2023-01-23 22:16:40 us=923760   auth_token_secret_file = '[UNDEF]'
2023-01-23 22:16:40 us=923779   port_share_host = '[UNDEF]'
2023-01-23 22:16:40 us=923797   port_share_port = '[UNDEF]'
2023-01-23 22:16:40 us=923815   vlan_tagging = DISABLED
2023-01-23 22:16:40 us=923834   vlan_accept = all
2023-01-23 22:16:40 us=923852   vlan_pvid = 1
2023-01-23 22:16:40 us=923871   client = ENABLED
2023-01-23 22:16:40 us=923889   pull = ENABLED
2023-01-23 22:16:40 us=923908   auth_user_pass_file = 'password.txt'
2023-01-23 22:16:40 us=923929 OpenVPN 2.6_git x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-01-23 22:16:40 us=923969 library versions: OpenSSL 3.0.5 5 Jul 2022, LZO 2.10
2023-01-23 22:16:40 us=924649 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-23 22:16:40 us=931404 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 22:16:40 us=931480 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 22:16:40 us=931760 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 headroom:126 payload:1376 tailroom:126 ET:0 ]
2023-01-23 22:16:40 us=971486 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 22:16:40 us=971707 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client'
2023-01-23 22:16:40 us=971742 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server'
2023-01-23 22:16:40 us=971801 TCP/UDP: Preserving recently used remote address: [AF_INET]193.175.73.170:1194
2023-01-23 22:16:40 us=971868 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-23 22:16:40 us=971898 UDPv4 link local: (not bound)
2023-01-23 22:16:40 us=971921 UDPv4 link remote: [AF_INET]193.175.73.170:1194
2023-01-23 22:16:40 us=973048 dco_update_keys: peer_id=0
2023-01-23 22:16:40 us=973128 UDPv4 WRITE [54] to [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2023-01-23 22:16:40 us=973236 dco_update_keys: peer_id=0
2023-01-23 22:16:40 us=990371 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2023-01-23 22:16:40 us=990457 TLS: Initial packet from [AF_INET]193.175.73.170:1194, sid=b0ff83bc b185c913
2023-01-23 22:16:40 us=990642 dco_update_keys: peer_id=0
2023-01-23 22:16:40 us=990699 UDPv4 WRITE [343] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=277
2023-01-23 22:16:40 us=990801 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=10821 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1136
2023-01-23 22:16:41 us=11716 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=11793 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 ] DATA len=0
2023-01-23 22:16:41 us=11903 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=11959 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1136
2023-01-23 22:16:41 us=12032 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=12072 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 2 ] DATA len=0
2023-01-23 22:16:41 us=12132 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=12184 UDPv4 READ [1173] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 1 ] pid=3 DATA len=1107
2023-01-23 22:16:41 us=14425 VERIFY OK: depth=1, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=Charite-VPN CA, name=EasyRSA, emailAddress=vpn@charite.de
2023-01-23 22:16:41 us=14923 VERIFY KU OK
2023-01-23 22:16:41 us=14964 Validating certificate extended key usage
2023-01-23 22:16:41 us=14985 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-01-23 22:16:41 us=15003 VERIFY EKU OK
2023-01-23 22:16:41 us=15021 VERIFY X509NAME OK: C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 22:16:41 us=15039 VERIFY OK: depth=0, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 22:16:41 us=19842 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=19912 UDPv4 WRITE [1316] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 3 ] pid=2 DATA len=1250
2023-01-23 22:16:41 us=20014 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=20061 UDPv4 WRITE [1304] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=3 DATA len=1250
2023-01-23 22:16:41 us=20136 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=20176 UDPv4 WRITE [940] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=4 DATA len=886
2023-01-23 22:16:41 us=20226 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=37754 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 1 ] DATA len=0
2023-01-23 22:16:41 us=37889 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=37946 UDPv4 READ [70] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 2 1 ] DATA len=0
2023-01-23 22:16:41 us=37988 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=218821 UDPv4 READ [236] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ 4 3 2 1 ] pid=4 DATA len=158
2023-01-23 22:16:41 us=219207 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=219279 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 ] DATA len=0
2023-01-23 22:16:41 us=219394 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=219457 UDPv4 READ [324] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 ] pid=5 DATA len=246
2023-01-23 22:16:41 us=219551 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1549'
2023-01-23 22:16:41 us=219595 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]'
2023-01-23 22:16:41 us=219669 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
2023-01-23 22:16:41 us=219744 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-01-23 22:16:41 us=219793 [openvpn.charite.de] Peer Connection Initiated with [AF_INET]193.175.73.170:1194
2023-01-23 22:16:41 us=219847 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=219895 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #9 ] [ 5 ] DATA len=0
2023-01-23 22:16:41 us=219969 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=525716 UDPv4 READ [663] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=6 DATA len=585
2023-01-23 22:16:41 us=525895 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=525958 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 141.42.1.1,dhcp-option DOMAIN charite.de,route-gateway 172.29.0.1,topology subnet,ping 10,ping-restart 30,route 10.27.0.0 255.255.0.0,route 10.28.0.0 255.254.0.0,route 10.32.0.0 255.224.0.0,route 172.16.0.0 255.254.0.0,route 192.168.192.0 255.255.192.0,route 141.42.0.0 255.255.0.0,route 193.175.72.0 255.255.255.0,route 193.175.74.0 255.255.254.0,route 193.175.174.0 255.255.255.192,route 172.19.252.0 255.255.255.224,route 194.94.4.0 255.255.254.0,ifconfig 172.29.0.2 255.255.248.0,peer-id 0,cipher AES-256-GCM,key-derivation tls-ekm'
2023-01-23 22:16:41 us=526202 OPTIONS IMPORT: timers and/or timeouts modified
2023-01-23 22:16:41 us=526231 OPTIONS IMPORT: --ifconfig/up options modified
2023-01-23 22:16:41 us=526250 OPTIONS IMPORT: route options modified
2023-01-23 22:16:41 us=526267 OPTIONS IMPORT: route-related options modified
2023-01-23 22:16:41 us=526317 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-01-23 22:16:41 us=526337 OPTIONS IMPORT: peer-id set
2023-01-23 22:16:41 us=526355 OPTIONS IMPORT: data channel crypto options modified
2023-01-23 22:16:41 us=526399 net_route_v4_best_gw query: dst 0.0.0.0
2023-01-23 22:16:41 us=526530 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=526597 sitnl_send: rtnl: received 496 bytes
2023-01-23 22:16:41 us=526677 net_route_v4_best_gw result: via 192.168.178.1 dev wlp2s0
2023-01-23 22:16:41 us=526775 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=wlp2s0 HWADDR=d0:c6:37:db:70:77
2023-01-23 22:16:41 us=527198 open_tun_dco: tun0
2023-01-23 22:16:41 us=527229 net_iface_new: add tun0 type ovpn-dco
2023-01-23 22:16:41 us=528615 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=528694 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=528817 ovpn_dco_register
2023-01-23 22:16:41 us=529102 DCO device tun0 opened
2023-01-23 22:16:41 us=529155 do_ifconfig, ipv4=1, ipv6=0
2023-01-23 22:16:41 us=529236 net_iface_mtu_set: mtu 1500 for tun0
2023-01-23 22:16:41 us=529412 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=529474 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=529570 net_iface_up: set tun0 up
2023-01-23 22:16:41 us=531284 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=531369 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=531442 net_addr_v4_add: 172.29.0.2/21 dev tun0
2023-01-23 22:16:41 us=533046 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=533152 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=533308 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 22:16:41 update-systemd-resolved: Link 'tun0' coming up
<14>Jan 23 22:16:41 update-systemd-resolved: Adding IPv4 DNS Server 141.42.1.1
<14>Jan 23 22:16:41 update-systemd-resolved: Adding DNS Domain charite.de
<14>Jan 23 22:16:41 update-systemd-resolved: SetLinkDNS(4 1 2 4 141 42 1 1)
<14>Jan 23 22:16:41 update-systemd-resolved: SetLinkDomains(4 1 charite.de false)
2023-01-23 22:16:41 us=657122 net_route_v4_add: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=657381 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=657446 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=657513 net_route_v4_add: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=657696 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=657755 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=657820 net_route_v4_add: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=657999 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=658059 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=658118 net_route_v4_add: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=658268 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=658326 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=658386 net_route_v4_add: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=658553 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=658611 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=658672 net_route_v4_add: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=658875 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=658930 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=658985 net_route_v4_add: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=659147 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=659206 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=659265 net_route_v4_add: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=659413 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=659501 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=659560 net_route_v4_add: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=659766 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=659829 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=659890 net_route_v4_add: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=660021 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=660071 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=660121 net_route_v4_add: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=660260 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=660308 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=660401 dco_new_peer: peer-id 0, fd 3
2023-01-23 22:16:41 us=660661 Data Channel: using negotiated cipher 'AES-256-GCM'
2023-01-23 22:16:41 us=660806 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 22:16:41 us=661021 dco_install_key: peer_id=0 keyid=0
2023-01-23 22:16:41 us=661067 dco_new_key: slot 0, key-id 0, peer-id 0, cipher AES-256-GCM
2023-01-23 22:16:41 us=673410 dco_set_peer: peer-id 0, keepalive 10/30, mss 1400
2023-01-23 22:16:41 us=673539 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-01-23 22:16:41 us=673578 Initialization Sequence Completed
2023-01-23 22:16:41 us=673658 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #10 ] [ 6 ] DATA len=0
2023-01-23 22:16:41 us=673681 dco_do_write: peer-id 0, len=62
2023-01-23 22:16:41 us=674872 dco_update_keys: peer_id=0
2023-01-23 22:16:47 us=610068 event_wait : Interrupted system call (fd=-1,code=4)
2023-01-23 22:16:47 us=610165 SIGTERM received, sending exit notification to peer
2023-01-23 22:16:47 us=610194 dco_update_keys: peer_id=0
2023-01-23 22:16:47 us=610226 Attempting to send data packet while data channel offload is in use. Dropping packet
2023-01-23 22:16:48 us=666597 dco_del_peer: peer-id 0
2023-01-23 22:16:48 us=667357 TCP/UDP: Closing socket
2023-01-23 22:16:48 us=667451 net_route_v4_del: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=667737 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=667816 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=667894 net_route_v4_del: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=668106 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=668175 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=668245 net_route_v4_del: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=668417 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=668486 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=668551 net_route_v4_del: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=668738 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=668808 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=668875 net_route_v4_del: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=669059 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=669121 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=669186 net_route_v4_del: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=669330 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=669387 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=669456 net_route_v4_del: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=669610 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=669670 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=669737 net_route_v4_del: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=669920 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=670020 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=670087 net_route_v4_del: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=670273 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=670343 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=670411 net_route_v4_del: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=670592 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=670651 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=670718 net_route_v4_del: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=670895 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=670964 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=671089 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 22:16:48 update-systemd-resolved: Link 'tun0' going down
2023-01-23 22:16:48 us=745415 Closing TUN/TAP interface
2023-01-23 22:16:48 us=745506 net_addr_v4_del: 172.29.0.2 dev tun0
2023-01-23 22:16:48 us=746607 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=746686 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=746755 close_tun_dco
2023-01-23 22:16:48 us=746841 net_iface_del: delete tun0
2023-01-23 22:16:48 us=827839 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=827943 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=828222 SIGTERM[soft,exit-with-notification] received, process exiting
ordex commented 1 year ago

very interesting. thanks a lot! This log excluded all my clues. Digging more into the code..

ordex commented 1 year ago

@hildeb could you pull the debug branch and test again with debug enabled? I have added an extra message, but also a potential fix.

It's weird that only you are seeing this message...but still...

ordex commented 1 year ago

and please reboot to make sure that the warning will print again when triggered.

hildeb commented 1 year ago

@ordex I pulled the branch again and rebuilt:

2023-01-24 08:14:00 us=869748 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback 'BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-01-24 08:14:00 us=870063 Current Parameter Settings:
2023-01-24 08:14:00 us=870081   config = 'charite-hildeb.ovpn'
2023-01-24 08:14:00 us=870090   mode = 0
2023-01-24 08:14:00 us=870099   persist_config = DISABLED
2023-01-24 08:14:00 us=870107   persist_mode = 1
2023-01-24 08:14:00 us=870114   show_ciphers = DISABLED
2023-01-24 08:14:00 us=870122   show_digests = DISABLED
2023-01-24 08:14:00 us=870130   show_engines = DISABLED
2023-01-24 08:14:00 us=870148   genkey = DISABLED
2023-01-24 08:14:00 us=870163   genkey_filename = '[UNDEF]'
2023-01-24 08:14:00 us=870172   key_pass_file = '[UNDEF]'
2023-01-24 08:14:00 us=870181   show_tls_ciphers = DISABLED
2023-01-24 08:14:00 us=870190   connect_retry_max = 0
2023-01-24 08:14:00 us=870199 Connection profiles [0]:
2023-01-24 08:14:00 us=870209   proto = udp
2023-01-24 08:14:00 us=870218   local = '[UNDEF]'
2023-01-24 08:14:00 us=870227   local_port = '[UNDEF]'
2023-01-24 08:14:00 us=870241   remote = 'openvpn-gw170-ext.charite.de'
2023-01-24 08:14:00 us=870253   remote_port = '1194'
2023-01-24 08:14:00 us=870261   remote_float = DISABLED
2023-01-24 08:14:00 us=870269   bind_defined = DISABLED
2023-01-24 08:14:00 us=870276   bind_local = DISABLED
2023-01-24 08:14:00 us=870284   bind_ipv6_only = DISABLED
2023-01-24 08:14:00 us=870293   connect_retry_seconds = 5
2023-01-24 08:14:00 us=870301   connect_timeout = 120
2023-01-24 08:14:00 us=870309   socks_proxy_server = '[UNDEF]'
2023-01-24 08:14:00 us=870320   socks_proxy_port = '[UNDEF]'
2023-01-24 08:14:00 us=870334   tun_mtu = 1500
2023-01-24 08:14:00 us=870343   tun_mtu_defined = ENABLED
2023-01-24 08:14:00 us=870352   link_mtu = 1500
2023-01-24 08:14:00 us=870361   link_mtu_defined = DISABLED
2023-01-24 08:14:00 us=870370   tun_mtu_extra = 0
2023-01-24 08:14:00 us=870378   tun_mtu_extra_defined = DISABLED
2023-01-24 08:14:00 us=870387   mtu_discover_type = -1
2023-01-24 08:14:00 us=870397   fragment = 0
2023-01-24 08:14:00 us=870415   mssfix = 1492
2023-01-24 08:14:00 us=870431   mssfix_encap = ENABLED
2023-01-24 08:14:00 us=870448   mssfix_fixed = DISABLED
2023-01-24 08:14:00 us=870466   explicit_exit_notification = 1
2023-01-24 08:14:00 us=870484   tls_auth_file = '[INLINE]'
2023-01-24 08:14:00 us=870501   key_direction = 1
2023-01-24 08:14:00 us=870518   tls_crypt_file = '[UNDEF]'
2023-01-24 08:14:00 us=870534   tls_crypt_v2_file = '[UNDEF]'
2023-01-24 08:14:00 us=870551 Connection profiles END
2023-01-24 08:14:00 us=870567   remote_random = DISABLED
2023-01-24 08:14:00 us=870579   ipchange = '[UNDEF]'
2023-01-24 08:14:00 us=870595   dev = 'tun'
2023-01-24 08:14:00 us=870611   dev_type = '[UNDEF]'
2023-01-24 08:14:00 us=870623   dev_node = '[UNDEF]'
2023-01-24 08:14:00 us=870640   tuntap_options.disable_dco = DISABLED
2023-01-24 08:14:00 us=870659   lladdr = '[UNDEF]'
2023-01-24 08:14:00 us=870676   topology = 1
2023-01-24 08:14:00 us=870694   ifconfig_local = '[UNDEF]'
2023-01-24 08:14:00 us=870711   ifconfig_remote_netmask = '[UNDEF]'
2023-01-24 08:14:00 us=870736   ifconfig_noexec = DISABLED
2023-01-24 08:14:00 us=870753   ifconfig_nowarn = DISABLED
2023-01-24 08:14:00 us=870769   ifconfig_ipv6_local = '[UNDEF]'
2023-01-24 08:14:00 us=870785   ifconfig_ipv6_netbits = 0
2023-01-24 08:14:00 us=870798   ifconfig_ipv6_remote = '[UNDEF]'
2023-01-24 08:14:00 us=870811   shaper = 0
2023-01-24 08:14:00 us=870823   mtu_test = 0
2023-01-24 08:14:00 us=870840   mlock = DISABLED
2023-01-24 08:14:00 us=870859   keepalive_ping = 0
2023-01-24 08:14:00 us=870877   keepalive_timeout = 0
2023-01-24 08:14:00 us=870893   inactivity_timeout = 0
2023-01-24 08:14:00 us=870909   inactivity_minimum_bytes = 0
2023-01-24 08:14:00 us=870922   ping_send_timeout = 0
2023-01-24 08:14:00 us=870939   ping_rec_timeout = 0
2023-01-24 08:14:00 us=870957   ping_rec_timeout_action = 0
2023-01-24 08:14:00 us=870970   ping_timer_remote = DISABLED
2023-01-24 08:14:00 us=870988   remap_sigusr1 = 0
2023-01-24 08:14:00 us=871002   persist_tun = DISABLED
2023-01-24 08:14:00 us=871020   persist_local_ip = DISABLED
2023-01-24 08:14:00 us=871034   persist_remote_ip = DISABLED
2023-01-24 08:14:00 us=871047   persist_key = DISABLED
2023-01-24 08:14:00 us=871063   passtos = DISABLED
2023-01-24 08:14:00 us=871079   resolve_retry_seconds = 1000000000
2023-01-24 08:14:00 us=871092   resolve_in_advance = DISABLED
2023-01-24 08:14:00 us=871104   username = '[UNDEF]'
2023-01-24 08:14:00 us=871120   groupname = '[UNDEF]'
2023-01-24 08:14:00 us=871138   chroot_dir = '[UNDEF]'
2023-01-24 08:14:00 us=871155   cd_dir = '[UNDEF]'
2023-01-24 08:14:00 us=871173   writepid = '[UNDEF]'
2023-01-24 08:14:00 us=871186   up_script = '/etc/openvpn/update-systemd-resolved'
2023-01-24 08:14:00 us=871199   down_script = '/etc/openvpn/update-systemd-resolved'
2023-01-24 08:14:00 us=871217   down_pre = ENABLED
2023-01-24 08:14:00 us=871232   up_restart = DISABLED
2023-01-24 08:14:00 us=871249   up_delay = DISABLED
2023-01-24 08:14:00 us=871265   daemon = DISABLED
2023-01-24 08:14:00 us=871281   log = DISABLED
2023-01-24 08:14:00 us=871298   suppress_timestamps = DISABLED
2023-01-24 08:14:00 us=871316   machine_readable_output = DISABLED
2023-01-24 08:14:00 us=871329   nice = 0
2023-01-24 08:14:00 us=871342   verbosity = 6
2023-01-24 08:14:00 us=871359   mute = 0
2023-01-24 08:14:00 us=871375   gremlin = 0
2023-01-24 08:14:00 us=871392   status_file = '[UNDEF]'
2023-01-24 08:14:00 us=871409   status_file_version = 1
2023-01-24 08:14:00 us=871427   status_file_update_freq = 60
2023-01-24 08:14:00 us=871444   occ = ENABLED
2023-01-24 08:14:00 us=871461   rcvbuf = 0
2023-01-24 08:14:00 us=871474   sndbuf = 0
2023-01-24 08:14:00 us=871492   mark = 0
2023-01-24 08:14:00 us=871508   sockflags = 0
2023-01-24 08:14:00 us=871525   fast_io = DISABLED
2023-01-24 08:14:00 us=871543   comp.alg = 0
2023-01-24 08:14:00 us=871558   comp.flags = 24
2023-01-24 08:14:00 us=871572   route_script = '[UNDEF]'
2023-01-24 08:14:00 us=871584   route_default_gateway = '[UNDEF]'
2023-01-24 08:14:00 us=871596   route_default_metric = 0
2023-01-24 08:14:00 us=871614   route_noexec = DISABLED
2023-01-24 08:14:00 us=871630   route_delay = 0
2023-01-24 08:14:00 us=871647   route_delay_window = 30
2023-01-24 08:14:00 us=871664   route_delay_defined = DISABLED
2023-01-24 08:14:00 us=871680   route_nopull = DISABLED
2023-01-24 08:14:00 us=871699   route_gateway_via_dhcp = DISABLED
2023-01-24 08:14:00 us=871716   allow_pull_fqdn = DISABLED
2023-01-24 08:14:00 us=871732   management_addr = '[UNDEF]'
2023-01-24 08:14:00 us=871745   management_port = '[UNDEF]'
2023-01-24 08:14:00 us=871763   management_user_pass = '[UNDEF]'
2023-01-24 08:14:00 us=871780   management_log_history_cache = 250
2023-01-24 08:14:00 us=871795   management_echo_buffer_size = 100
2023-01-24 08:14:00 us=871808   management_client_user = '[UNDEF]'
2023-01-24 08:14:00 us=871824   management_client_group = '[UNDEF]'
2023-01-24 08:14:00 us=871840   management_flags = 0
2023-01-24 08:14:00 us=871853   shared_secret_file = '[UNDEF]'
2023-01-24 08:14:00 us=871866   key_direction = 1
2023-01-24 08:14:00 us=871881   ciphername = 'BF-CBC'
2023-01-24 08:14:00 us=871897   ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-01-24 08:14:00 us=871915   authname = 'SHA256'
2023-01-24 08:14:00 us=871933   engine = DISABLED
2023-01-24 08:14:00 us=871947   replay = ENABLED
2023-01-24 08:14:00 us=871960   mute_replay_warnings = DISABLED
2023-01-24 08:14:00 us=871977   replay_window = 64
2023-01-24 08:14:00 us=871990   replay_time = 15
2023-01-24 08:14:00 us=872007   packet_id_file = '[UNDEF]'
2023-01-24 08:14:00 us=872024   test_crypto = DISABLED
2023-01-24 08:14:00 us=872041   tls_server = DISABLED
2023-01-24 08:14:00 us=872059   tls_client = ENABLED
2023-01-24 08:14:00 us=872076   ca_file = '[INLINE]'
2023-01-24 08:14:00 us=872094   ca_path = '[UNDEF]'
2023-01-24 08:14:00 us=872111   dh_file = '[UNDEF]'
2023-01-24 08:14:00 us=872128   cert_file = '[INLINE]'
2023-01-24 08:14:00 us=872143   extra_certs_file = '[UNDEF]'
2023-01-24 08:14:00 us=872156   priv_key_file = '[INLINE]'
2023-01-24 08:14:00 us=872169   pkcs12_file = '[UNDEF]'
2023-01-24 08:14:00 us=872186   cipher_list = '[UNDEF]'
2023-01-24 08:14:00 us=872204   cipher_list_tls13 = '[UNDEF]'
2023-01-24 08:14:00 us=872221   tls_cert_profile = '[UNDEF]'
2023-01-24 08:14:00 us=872238   tls_verify = '[UNDEF]'
2023-01-24 08:14:00 us=872257   tls_export_cert = '[UNDEF]'
2023-01-24 08:14:00 us=872272   verify_x509_type = 1
2023-01-24 08:14:00 us=872285   verify_x509_name = 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de'
2023-01-24 08:14:00 us=872298   crl_file = '[UNDEF]'
2023-01-24 08:14:00 us=872311   ns_cert_type = 0
2023-01-24 08:14:00 us=872326   remote_cert_ku[i] = 65535
2023-01-24 08:14:00 us=872342   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872359   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872371   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872387   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872402   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872415   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872430   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872445   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872458   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872470   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872487   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872504   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872518   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872530   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872543   remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872560   remote_cert_eku = 'TLS Web Server Authentication'
2023-01-24 08:14:00 us=872577   ssl_flags = 192
2023-01-24 08:14:00 us=872593   tls_timeout = 2
2023-01-24 08:14:00 us=872608   renegotiate_bytes = -1
2023-01-24 08:14:00 us=872623   renegotiate_packets = 0
2023-01-24 08:14:00 us=872640   renegotiate_seconds = 0
2023-01-24 08:14:00 us=872658   handshake_window = 60
2023-01-24 08:14:00 us=872674   transition_window = 3600
2023-01-24 08:14:00 us=872689   single_session = DISABLED
2023-01-24 08:14:00 us=872705   push_peer_info = DISABLED
2023-01-24 08:14:00 us=872721   tls_exit = DISABLED
2023-01-24 08:14:00 us=872739   tls_crypt_v2_metadata = '[UNDEF]'
2023-01-24 08:14:00 us=872756   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872770   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872783   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872800   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872816   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872833   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872851   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872867   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872880   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872898   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872911   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872929   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872947   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872963   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872976   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872988   pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=873006   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873023   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873040   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873058   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873074   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873091   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873109   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873124   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873140   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873153   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873172   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873188   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873205   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873223   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873239   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873253   pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873269   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873285   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873303   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873319   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873335   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873352   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873368   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873384   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873396   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873414   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873428   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873445   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873463   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873479   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873493   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873509   pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873537   pkcs11_pin_cache_period = -1
2023-01-24 08:14:00 us=873547   pkcs11_id = '[UNDEF]'
2023-01-24 08:14:00 us=873557   pkcs11_id_management = DISABLED
2023-01-24 08:14:00 us=873570   server_network = 0.0.0.0
2023-01-24 08:14:00 us=873581   server_netmask = 0.0.0.0
2023-01-24 08:14:00 us=873596   server_network_ipv6 = ::
2023-01-24 08:14:00 us=873605   server_netbits_ipv6 = 0
2023-01-24 08:14:00 us=873616   server_bridge_ip = 0.0.0.0
2023-01-24 08:14:00 us=873626   server_bridge_netmask = 0.0.0.0
2023-01-24 08:14:00 us=873638   server_bridge_pool_start = 0.0.0.0
2023-01-24 08:14:00 us=873648   server_bridge_pool_end = 0.0.0.0
2023-01-24 08:14:00 us=873658   ifconfig_pool_defined = DISABLED
2023-01-24 08:14:00 us=873667   ifconfig_pool_start = 0.0.0.0
2023-01-24 08:14:00 us=873678   ifconfig_pool_end = 0.0.0.0
2023-01-24 08:14:00 us=873690   ifconfig_pool_netmask = 0.0.0.0
2023-01-24 08:14:00 us=873702   ifconfig_pool_persist_filename = '[UNDEF]'
2023-01-24 08:14:00 us=873717   ifconfig_pool_persist_refresh_freq = 600
2023-01-24 08:14:00 us=873726   ifconfig_ipv6_pool_defined = DISABLED
2023-01-24 08:14:00 us=873738   ifconfig_ipv6_pool_base = ::
2023-01-24 08:14:00 us=873748   ifconfig_ipv6_pool_netbits = 0
2023-01-24 08:14:00 us=873759   n_bcast_buf = 256
2023-01-24 08:14:00 us=873781   tcp_queue_limit = 64
2023-01-24 08:14:00 us=873792   real_hash_size = 256
2023-01-24 08:14:00 us=873802   virtual_hash_size = 256
2023-01-24 08:14:00 us=873812   client_connect_script = '[UNDEF]'
2023-01-24 08:14:00 us=873824   learn_address_script = '[UNDEF]'
2023-01-24 08:14:00 us=873832   client_disconnect_script = '[UNDEF]'
2023-01-24 08:14:00 us=873842   client_config_dir = '[UNDEF]'
2023-01-24 08:14:00 us=873853   ccd_exclusive = DISABLED
2023-01-24 08:14:00 us=873863   tmp_dir = '/tmp'
2023-01-24 08:14:00 us=873871   push_ifconfig_defined = DISABLED
2023-01-24 08:14:00 us=873882   push_ifconfig_local = 0.0.0.0
2023-01-24 08:14:00 us=873891   push_ifconfig_remote_netmask = 0.0.0.0
2023-01-24 08:14:00 us=873902   push_ifconfig_ipv6_defined = DISABLED
2023-01-24 08:14:00 us=873912   push_ifconfig_ipv6_local = ::/0
2023-01-24 08:14:00 us=873920   push_ifconfig_ipv6_remote = ::
2023-01-24 08:14:00 us=873930   enable_c2c = DISABLED
2023-01-24 08:14:00 us=873938   duplicate_cn = DISABLED
2023-01-24 08:14:00 us=873948   cf_max = 0
2023-01-24 08:14:00 us=873956   cf_per = 0
2023-01-24 08:14:00 us=873966   max_clients = 1024
2023-01-24 08:14:00 us=873974   max_routes_per_client = 256
2023-01-24 08:14:00 us=873984   auth_user_pass_verify_script = '[UNDEF]'
2023-01-24 08:14:00 us=873994   auth_user_pass_verify_script_via_file = DISABLED
2023-01-24 08:14:00 us=874005   auth_token_generate = DISABLED
2023-01-24 08:14:00 us=874016   auth_token_lifetime = 0
2023-01-24 08:14:00 us=874026   auth_token_secret_file = '[UNDEF]'
2023-01-24 08:14:00 us=874036   port_share_host = '[UNDEF]'
2023-01-24 08:14:00 us=874043   port_share_port = '[UNDEF]'
2023-01-24 08:14:00 us=874053   vlan_tagging = DISABLED
2023-01-24 08:14:00 us=874063   vlan_accept = all
2023-01-24 08:14:00 us=874073   vlan_pvid = 1
2023-01-24 08:14:00 us=874081   client = ENABLED
2023-01-24 08:14:00 us=874091   pull = ENABLED
2023-01-24 08:14:00 us=874099   auth_user_pass_file = 'password.txt'
2023-01-24 08:14:00 us=874111 OpenVPN 2.6_git x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-01-24 08:14:00 us=874128 library versions: OpenSSL 3.0.5 5 Jul 2022, LZO 2.10
2023-01-24 08:14:00 us=874480 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-24 08:14:00 us=878555 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-24 08:14:00 us=878582 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-24 08:14:00 us=878669 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 headroom:126 payload:1376 tailroom:126 ET:0 ]
2023-01-24 08:14:00 us=924325 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-24 08:14:00 us=924485 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client'
2023-01-24 08:14:00 us=924517 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server'
2023-01-24 08:14:00 us=924583 TCP/UDP: Preserving recently used remote address: [AF_INET]193.175.73.170:1194
2023-01-24 08:14:00 us=924647 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-24 08:14:00 us=924686 UDPv4 link local: (not bound)
2023-01-24 08:14:00 us=924706 UDPv4 link remote: [AF_INET]193.175.73.170:1194
2023-01-24 08:14:00 us=925658 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=925721 UDPv4 WRITE [54] to [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2023-01-24 08:14:00 us=925843 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=943674 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2023-01-24 08:14:00 us=943762 TLS: Initial packet from [AF_INET]193.175.73.170:1194, sid=e6f40f3c e2e0cbe3
2023-01-24 08:14:00 us=943981 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=944049 UDPv4 WRITE [343] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=277
2023-01-24 08:14:00 us=944191 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=975511 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1136
2023-01-24 08:14:00 us=976418 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=976507 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 ] DATA len=0
2023-01-24 08:14:00 us=976641 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=976715 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1136
2023-01-24 08:14:00 us=976828 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=976894 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 2 ] DATA len=0
2023-01-24 08:14:00 us=976986 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=977068 UDPv4 READ [1173] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 1 ] pid=3 DATA len=1107
2023-01-24 08:14:00 us=981144 VERIFY OK: depth=1, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=Charite-VPN CA, name=EasyRSA, emailAddress=vpn@charite.de
2023-01-24 08:14:00 us=981709 VERIFY KU OK
2023-01-24 08:14:00 us=981756 Validating certificate extended key usage
2023-01-24 08:14:00 us=981818 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-01-24 08:14:00 us=981853 VERIFY EKU OK
2023-01-24 08:14:00 us=981885 VERIFY X509NAME OK: C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-24 08:14:00 us=981920 VERIFY OK: depth=0, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-24 08:14:00 us=987715 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=987834 UDPv4 WRITE [1316] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 3 ] pid=2 DATA len=1250
2023-01-24 08:14:00 us=988014 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=988091 UDPv4 WRITE [1304] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=3 DATA len=1250
2023-01-24 08:14:00 us=988211 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=988279 UDPv4 WRITE [940] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=4 DATA len=886
2023-01-24 08:14:00 us=988355 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=4669 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 1 ] DATA len=0
2023-01-24 08:14:01 us=4772 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=5809 UDPv4 READ [70] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 2 1 ] DATA len=0
2023-01-24 08:14:01 us=5867 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=141469 UDPv4 READ [236] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ 4 3 2 1 ] pid=4 DATA len=158
2023-01-24 08:14:01 us=141918 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=141991 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 ] DATA len=0
2023-01-24 08:14:01 us=142115 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=142187 UDPv4 READ [324] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 ] pid=5 DATA len=246
2023-01-24 08:14:01 us=142286 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1549'
2023-01-24 08:14:01 us=142328 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]'
2023-01-24 08:14:01 us=142358 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
2023-01-24 08:14:01 us=142457 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-01-24 08:14:01 us=142526 [openvpn.charite.de] Peer Connection Initiated with [AF_INET]193.175.73.170:1194
2023-01-24 08:14:01 us=142609 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=142673 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #9 ] [ 5 ] DATA len=0
2023-01-24 08:14:01 us=142779 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=518701 UDPv4 READ [663] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=6 DATA len=585
2023-01-24 08:14:01 us=518898 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=518966 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 141.42.1.1,dhcp-option DOMAIN charite.de,route-gateway 172.29.0.1,topology subnet,ping 10,ping-restart 30,route 10.27.0.0 255.255.0.0,route 10.28.0.0 255.254.0.0,route 10.32.0.0 255.224.0.0,route 172.16.0.0 255.254.0.0,route 192.168.192.0 255.255.192.0,route 141.42.0.0 255.255.0.0,route 193.175.72.0 255.255.255.0,route 193.175.74.0 255.255.254.0,route 193.175.174.0 255.255.255.192,route 172.19.252.0 255.255.255.224,route 194.94.4.0 255.255.254.0,ifconfig 172.29.0.2 255.255.248.0,peer-id 0,cipher AES-256-GCM,key-derivation tls-ekm'
2023-01-24 08:14:01 us=519320 OPTIONS IMPORT: timers and/or timeouts modified
2023-01-24 08:14:01 us=519363 OPTIONS IMPORT: --ifconfig/up options modified
2023-01-24 08:14:01 us=519407 OPTIONS IMPORT: route options modified
2023-01-24 08:14:01 us=519444 OPTIONS IMPORT: route-related options modified
2023-01-24 08:14:01 us=519481 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-01-24 08:14:01 us=519517 OPTIONS IMPORT: peer-id set
2023-01-24 08:14:01 us=519556 OPTIONS IMPORT: data channel crypto options modified
2023-01-24 08:14:01 us=519640 net_route_v4_best_gw query: dst 0.0.0.0
2023-01-24 08:14:01 us=519831 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=519893 sitnl_send: rtnl: received 496 bytes
2023-01-24 08:14:01 us=519997 net_route_v4_best_gw result: via 192.168.178.1 dev wlp2s0
2023-01-24 08:14:01 us=520150 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=wlp2s0 HWADDR=d0:c6:37:db:70:77
2023-01-24 08:14:01 us=520701 open_tun_dco: tun0
2023-01-24 08:14:01 us=520744 net_iface_new: add tun0 type ovpn-dco
2023-01-24 08:14:01 us=522410 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=522517 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=522669 ovpn_dco_register
2023-01-24 08:14:01 us=523002 DCO device tun0 opened
2023-01-24 08:14:01 us=523045 do_ifconfig, ipv4=1, ipv6=0
2023-01-24 08:14:01 us=523140 net_iface_mtu_set: mtu 1500 for tun0
2023-01-24 08:14:01 us=523328 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=523403 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=523510 net_iface_up: set tun0 up
2023-01-24 08:14:01 us=523974 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=524035 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=524091 net_addr_v4_add: 172.29.0.2/21 dev tun0
2023-01-24 08:14:01 us=524462 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=524539 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=524682 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 24 08:14:01 update-systemd-resolved: Link 'tun0' coming up
<14>Jan 24 08:14:01 update-systemd-resolved: Adding IPv4 DNS Server 141.42.1.1
<14>Jan 24 08:14:01 update-systemd-resolved: Adding DNS Domain charite.de
<14>Jan 24 08:14:01 update-systemd-resolved: SetLinkDNS(4 1 2 4 141 42 1 1)
<14>Jan 24 08:14:01 update-systemd-resolved: SetLinkDomains(4 1 charite.de false)
2023-01-24 08:14:01 us=575422 net_route_v4_add: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575506 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575526 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575544 net_route_v4_add: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575596 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575615 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575635 net_route_v4_add: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575691 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575704 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575719 net_route_v4_add: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575759 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575774 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575794 net_route_v4_add: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575835 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575848 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575864 net_route_v4_add: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575908 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575922 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575937 net_route_v4_add: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575983 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575998 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576016 net_route_v4_add: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=576059 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=576074 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576090 net_route_v4_add: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=576139 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=576160 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576177 net_route_v4_add: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=576223 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=576238 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576254 net_route_v4_add: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=576296 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=576310 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576343 dco_new_peer: peer-id 0, fd 3
2023-01-24 08:14:01 us=576441 Data Channel: using negotiated cipher 'AES-256-GCM'
2023-01-24 08:14:01 us=576485 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-24 08:14:01 us=576557 dco_install_key: peer_id=0 keyid=0
2023-01-24 08:14:01 us=576569 dco_new_key: slot 0, key-id 0, peer-id 0, cipher AES-256-GCM
2023-01-24 08:14:01 us=580662 dco_set_peer: peer-id 0, keepalive 10/30, mss 1400
2023-01-24 08:14:01 us=580715 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-01-24 08:14:01 us=580733 Initialization Sequence Completed
2023-01-24 08:14:01 us=580767 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #10 ] [ 6 ] DATA len=0
2023-01-24 08:14:01 us=580776 dco_do_write: peer-id 0, len=62
2023-01-24 08:14:01 us=580868 dco_update_keys: peer_id=0
^C2023-01-24 08:14:05 us=23240 event_wait : Interrupted system call (fd=-1,code=4)
2023-01-24 08:14:05 us=23300 SIGTERM received, sending exit notification to peer
2023-01-24 08:14:05 us=23323 dco_update_keys: peer_id=0
2023-01-24 08:14:05 us=23349 Attempting to send data packet while data channel offload is in use. Dropping packet
2023-01-24 08:14:06 us=281920 dco_del_peer: peer-id 0
2023-01-24 08:14:06 us=282641 TCP/UDP: Closing socket
2023-01-24 08:14:06 us=282749 net_route_v4_del: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=282968 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=283038 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=283107 net_route_v4_del: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=283261 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=283310 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=283360 net_route_v4_del: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=283511 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=283557 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=283618 net_route_v4_del: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=283772 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=283818 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=283885 net_route_v4_del: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=284020 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=284078 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=284146 net_route_v4_del: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=284279 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=284338 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=284392 net_route_v4_del: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=284520 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=284576 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=284644 net_route_v4_del: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=284788 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=284843 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=284894 net_route_v4_del: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=285042 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=285094 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=285145 net_route_v4_del: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=285275 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=285337 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=285403 net_route_v4_del: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=285541 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=285596 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=285700 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 24 08:14:06 update-systemd-resolved: Link 'tun0' going down
2023-01-24 08:14:06 us=321654 Closing TUN/TAP interface
2023-01-24 08:14:06 us=321700 net_addr_v4_del: 172.29.0.2 dev tun0
2023-01-24 08:14:06 us=322228 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=322567 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=322621 close_tun_dco
2023-01-24 08:14:06 us=322668 net_iface_del: delete tun0
2023-01-24 08:14:06 us=426236 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=426332 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=426647 SIGTERM[soft,exit-with-notification] received, process exiting

and the kern.log:

Jan 24 08:13:35 comet kernel: [   64.769639] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
Jan 24 08:13:35 comet kernel: [   64.772489] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-6-g1663e85 -- (C) 2020-2022 OpenVPN, Inc.
Jan 24 08:14:01 comet kernel: [   90.534941] tun0 (uninitialized): ovpn_newlink: setting device (tun0) mode: 0
Jan 24 08:14:01 comet kernel: [   90.536460] ovpn_pre_doit: cmd=7
Jan 24 08:14:01 comet kernel: [   90.536473] tun0: ovpn_netlink_register_packet: registering userspace at 3837793595
Jan 24 08:14:01 comet kernel: [   90.539249] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.540334] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.540347] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.540356] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.540364] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.540371] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.540378] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.540385] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.540392] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.540399] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [   90.589884] ovpn_pre_doit: cmd=1
Jan 24 08:14:01 comet kernel: [   90.589921] tun0: ovpn_netlink_new_peer: adding peer with endpoint=193.175.73.170:1194/UDP id=0 VPN-IPv4=0.0.0.0 VPN-IPv6=::
Jan 24 08:14:01 comet kernel: [   90.590101] ovpn_pre_doit: cmd=4
Jan 24 08:14:01 comet kernel: [   90.594108] ********* Cipher gcm(aes) (encrypt)
Jan 24 08:14:01 comet kernel: [   90.594112] *** IV size=12
Jan 24 08:14:01 comet kernel: [   90.594114] *** req size=88
Jan 24 08:14:01 comet kernel: [   90.594115] *** block size=1
Jan 24 08:14:01 comet kernel: [   90.594116] *** auth size=16
Jan 24 08:14:01 comet kernel: [   90.594117] *** alignmask=0x0
Jan 24 08:14:01 comet kernel: [   90.594122] ********* Cipher gcm(aes) (decrypt)
Jan 24 08:14:01 comet kernel: [   90.594124] *** IV size=12
Jan 24 08:14:01 comet kernel: [   90.594125] *** req size=88
Jan 24 08:14:01 comet kernel: [   90.594126] *** block size=1
Jan 24 08:14:01 comet kernel: [   90.594127] *** auth size=16
Jan 24 08:14:01 comet kernel: [   90.594128] *** alignmask=0x0
Jan 24 08:14:01 comet kernel: [   90.594130] tun0: ovpn_netlink_new_key: new key installed (id=0) for peer 0
Jan 24 08:14:01 comet kernel: [   90.594202] ovpn_pre_doit: cmd=2
Jan 24 08:14:01 comet kernel: [   90.594205] ovpn_netlink_set_peer: parsing message
Jan 24 08:14:01 comet kernel: [   90.594206] ovpn_netlink_set_peer: message parsed 0
Jan 24 08:14:01 comet kernel: [   90.594207] ovpn_netlink_set_peer: setting keepalive: 1
Jan 24 08:14:01 comet kernel: [   90.594208] tun0: ovpn_peer_keepalive_set: scheduling keepalive for peer 0: interval=10 timeout=30
Jan 24 08:14:01 comet kernel: [   90.594212] ovpn_netlink_set_peer: set keepalive
Jan 24 08:14:01 comet kernel: [   90.594303] ovpn_pre_doit: cmd=8
Jan 24 08:14:01 comet kernel: [   90.594305] ovpn_netlink_packet:, received packet. parsing
Jan 24 08:14:01 comet kernel: [   90.594306] ovpn_netlink_packet: parsed: 0
Jan 24 08:14:01 comet kernel: [   90.594307] tun0: ovpn_netlink_packet: sending userspace packet to peer 0...
Jan 24 08:14:03 comet kernel: [   92.265577] tun0: ovpn_peer_update_local_endpoint: learning local IPv4 for peer 0 (0.0.0.0 -> 192.168.178.25)
Jan 24 08:14:06 comet kernel: [   95.295072] ovpn_pre_doit: cmd=3
Jan 24 08:14:06 comet kernel: [   95.295087] tun0: ovpn_netlink_del_peer: peer id=0
Jan 24 08:14:06 comet kernel: [   95.326863] tun0: deleting peer with id 0, reason 1

It seems the backtrace is gone?!

ordex commented 1 year ago

@hildeb did you reboot before testing? because the warning shows up only once. Anyway, it's truly possible that it's "gone". However it was harmless and just a cosmetic issue.

hildeb commented 1 year ago

@hildeb did you reboot before testing? because the warning shows up only once. Anyway, it's truly possible that it's "gone". However it was harmless and just a cosmetic issue.

of course I rebooted :) !

ordex commented 1 year ago

Thanks for confirming! I'll merge the "fix" soon.