Closed hildeb closed 1 year ago
Linux comet 5.19.0-30-generic #31-Ubuntu SMP PREEMPT_DYNAMIC Fri Jan 6 15:40:20 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
Can you try compiling the genl branch, please?
I rebuilt the "genl" branch and got this:
[ 65.355695] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
[ 65.357116] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-3-g2fbc4e8 -- (C) 2020-2022 OpenVPN, Inc.
[ 66.089373] ------------[ cut here ]------------
[ 66.089376] WARNING: CPU: 3 PID: 3742 at lib/nlattr.c:117 nla_get_range_unsigned+0xe9/0x150
[ 66.089383] Modules linked in: ovpn_dco(OE) ip6_udp_tunnel udp_tunnel ccm rfcomm snd_seq_dummy snd_hrtimer cmac algif_hash algif_skcipher af_alg bnep binfmt_misc zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) snd_hda_codec_hdmi snd_ctl_led snd_hda_codec_realtek snd_hda_codec_generic uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 btusb btrtl videobuf2_common btbcm btintel videodev btmtk mc bluetooth ecdh_generic ecc dell_rbtn snd_soc_avs snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep joydev snd_pcm intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp coretemp snd_seq_midi snd_seq_midi_event kvm_intel iwlmvm mei_hdcp mei_pxp dell_laptop snd_rawmidi intel_rapl_msr kvm mac80211 crct10dif_pclmul i915 snd_seq ghash_clmulni_intel
[ 66.089450] libarc4 aesni_intel dell_wmi snd_seq_device dell_smm_hwmon snd_timer crypto_simd iwlwifi ledtrig_audio cryptd drm_buddy ttm dell_smbios rapl dcdbas snd input_leds intel_cstate drm_display_helper dell_wmi_sysman serio_raw cfg80211 dell_wmi_descriptor wmi_bmof intel_wmi_thunderbolt firmware_attributes_class ee1004 soundcore nls_iso8859_1 hid_multitouch cec rc_core drm_kms_helper i2c_algo_bit dell_smo8800 int3403_thermal processor_thermal_device_pci_legacy mei_me fb_sys_fops processor_thermal_device processor_thermal_rfim syscopyarea ucsi_acpi sysfillrect mei processor_thermal_mbox processor_thermal_rapl typec_ucsi sysimgblt intel_rapl_common intel_hid int340x_thermal_zone int3400_thermal typec intel_soc_dts_iosf sparse_keymap intel_xhci_usb_role_switch acpi_thermal_rel mac_hid intel_pch_thermal acpi_pad msr parport_pc ppdev lp parport ramoops drm pstore_blk reed_solomon pstore_zone efi_pstore ip_tables x_tables autofs4 usbhid hid_generic rtsx_pci_sdmmc crc32_pclmul e1000e
[ 66.089508] i2c_i801 i2c_smbus rtsx_pci ahci intel_lpss_pci i2c_hid_acpi xhci_pci intel_lpss libahci i2c_hid xhci_pci_renesas idma64 wmi hid video
[ 66.089520] CPU: 3 PID: 3742 Comm: openvpn Tainted: P U OE 5.19.0-30-generic #31-Ubuntu
[ 66.089523] Hardware name: Dell Inc. Latitude 5590/0MM81M, BIOS 1.26.0 11/20/2022
[ 66.089524] RIP: 0010:nla_get_range_unsigned+0xe9/0x150
[ 66.089528] Code: ff ff 00 00 3c 0b 0f 84 72 ff ff ff 48 c7 c2 ff ff ff ff 3c 04 0f 84 63 ff ff ff 0f 0b 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc <0f> 0b 48 c7 06 00 00 00 00 0f b6 07 3c 03 0f 85 31 ff ff ff ba ff
[ 66.089530] RSP: 0018:ffffb2a4876bb6f0 EFLAGS: 00010286
[ 66.089532] RAX: 0000000000000000 RBX: 000000000000000b RCX: 000000000000003e
[ 66.089534] RDX: ffffb2a4876bba68 RSI: ffffb2a4876bb708 RDI: ffffffffc1517b70
[ 66.089535] RBP: ffffb2a4876bb748 R08: ffffb2a4876bb708 R09: 0000000000000001
[ 66.089537] R10: ffffb2a4876bba68 R11: 0000000000000000 R12: ffffffffc1517b70
[ 66.089538] R13: ffff9d646724a828 R14: ffffb2a4876bba68 R15: 0000000000000000
[ 66.089539] FS: 00007ff683683800(0000) GS:ffff9d675f4c0000(0000) knlGS:0000000000000000
[ 66.089541] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 66.089543] CR2: 0000559af69f1330 CR3: 00000001137b4001 CR4: 00000000003706e0
[ 66.089545] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 66.089546] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 66.089547] Call Trace:
[ 66.089549] <TASK>
[ 66.089550] ? nla_validate_int_range+0x81/0x2d0
[ 66.089557] validate_nla+0x4b3/0x790
[ 66.089561] __nla_validate_parse+0x11f/0x190
[ 66.089565] validate_nla+0x221/0x790
[ 66.089569] __nla_validate_parse+0x11f/0x190
[ 66.089572] __nla_parse+0x23/0x40
[ 66.089575] genl_family_rcv_msg_attrs_parse.constprop.0+0x93/0x100
[ 66.089580] genl_family_rcv_msg_doit+0x77/0x180
[ 66.089585] genl_rcv_msg+0xf0/0x200
[ 66.089588] ? ovpn_netlink_get_peer+0x1f0/0x1f0 [ovpn_dco]
[ 66.089594] ? genl_get_cmd+0x120/0x120
[ 66.089597] netlink_rcv_skb+0x54/0x110
[ 66.089601] genl_rcv+0x28/0x50
[ 66.089603] netlink_unicast+0x244/0x390
[ 66.089607] netlink_sendmsg+0x25e/0x4e0
[ 66.089611] sock_sendmsg+0x6a/0x70
[ 66.089614] ____sys_sendmsg+0x277/0x2c0
[ 66.089617] ? import_iovec+0x1b/0x30
[ 66.089622] ___sys_sendmsg+0x96/0xe0
[ 66.089628] __sys_sendmsg+0x86/0xf0
[ 66.089632] __x64_sys_sendmsg+0x1d/0x30
[ 66.089634] do_syscall_64+0x58/0x90
[ 66.089637] ? __x64_sys_poll+0xc7/0x150
[ 66.089640] ? exit_to_user_mode_prepare+0x30/0xb0
[ 66.089645] ? syscall_exit_to_user_mode+0x29/0x50
[ 66.089648] ? do_syscall_64+0x67/0x90
[ 66.089650] ? exit_to_user_mode_prepare+0x30/0xb0
[ 66.089653] ? irqentry_exit_to_user_mode+0x9/0x20
[ 66.089656] ? irqentry_exit+0x43/0x50
[ 66.089658] ? exc_page_fault+0x91/0x1b0
[ 66.089661] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 66.089664] RIP: 0033:0x7ff682f208d4
[ 66.089666] Code: 15 31 55 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 0d dd 0d 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
[ 66.089668] RSP: 002b:00007fff5ae359e8 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
[ 66.089670] RAX: ffffffffffffffda RBX: 0000559af6a69bf0 RCX: 00007ff682f208d4
[ 66.089672] RDX: 0000000000000000 RSI: 00007fff5ae35a20 RDI: 0000000000000004
[ 66.089673] RBP: 0000559af6a827c0 R08: 0000559af6a76818 R09: 0000000000000000
[ 66.089674] R10: 000000000000003e R11: 0000000000000202 R12: 0000559af6a71bc0
[ 66.089676] R13: 00007fff5ae35a20 R14: 00007fff5ae35c30 R15: 0000000000000001
[ 66.089679] </TASK>
[ 66.089680] ---[ end trace 0000000000000000 ]---
[ 102.594531] tun0: deleting peer with id 1, reason 1
can you try with kernel 2.6.0rc5 ?
he is referring to openvpn 2.6.0-rc2. Not the kernel (that is 6.2.0-rcX).
@hildeb can you please share your openvpn config? I feel this error is related to the input received from userspace.
can you try with kernel 2.6.0rc5 ?
he is referring to openvpn 2.6.0-rc2. Not the kernel (that is 6.2.0-rcX).
@hildeb can you please share your openvpn config? I feel this error is related to the input received from userspace.
sorry ... :_(
The client's config file:
client
tun-mtu 1500
dev tun
key-direction 1
<tls-auth>
-----BEGIN OpenVPN Static key V1-----
...
-----END OpenVPN Static key V1-----
</tls-auth>
# hostname v4/udp
<connection>
proto udp
remote openvpn-gw170-ext.charite.de
port 1194
explicit-exit-notify
nobind
</connection>
# hostname v4/tcp
<connection>
proto tcp
remote openvpn-gw170-ext.charite.de
port 1194
nobind
</connection>
resolv-retry infinite
auth SHA256
remote-cert-tls server
verify-x509-name 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de' subject
remote-cert-eku "TLS Web Server Authentication"
persist-key
persist-tun
verb 3
reneg-sec 0
auth-user-pass password.txt
auth-nocache
script-security 2
mute-replay-warnings
<ca>
-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----
</ca>
<key>
-----BEGIN PRIVATE KEY-----
...
-----END PRIVATE KEY-----
</key>
<cert>
-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----
</cert>
Hi,
On Mon, Jan 23, 2023 at 09:51:00AM -0800, hildeb wrote:
The client's config file:
Just to be sure: the backtrace happens on the client, not on the server?
Does it happen "on module load" or "on client connection"? If the latter, can you run the client with "verb 6" (this turns on DCO-related debugging, like "now I am going to put the key into the kernel") and see what happens at backtrace time?
(It shouldn't backtrace, ever, but if we know what triggers it, fixing might be easier)
gert -- "If was one thing all people took for granted, was conviction that if you feed honest figures into a computer, honest figures come out. Never doubted it myself till I met a computer with a sense of humor." Robert A. Heinlein, The Moon is a Harsh Mistress
Gert Doering - Munich, Germany @.***
Thanks! Would you mind also sharing the client log after adding 'verb 6' to the config?
1) The backtrace happens on the client 2) It happens on client connection 3) verb 6, no problem -- give me a sec :)
So, I first did a "modprobe ovpn-dco" to put some time between loading of the moule and initialization of the connection:
Jan 23 20:22:31 comet kernel: [ 42.666243] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
Jan 23 20:22:31 comet kernel: [ 42.668071] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-3-g2fbc4e8 -- (C) 2020-2022 OpenVPN, Inc.
Jan 23 20:22:49 comet kernel: [ 60.661242] ------------[ cut here ]------------
Jan 23 20:22:49 comet kernel: [ 60.661247] WARNING: CPU: 5 PID: 5544 at lib/nlattr.c:117 nla_get_range_unsigned+0xe9/0x150
Jan 23 20:22:49 comet kernel: [ 60.661258] Modules linked in: ovpn_dco(OE) ip6_udp_tunnel udp_tunnel ccm rfcomm snd_seq_dummy snd_hrtimer cmac algif_hash algif_skcipher af_alg bnep binfmt_misc zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) snd_hda_codec_hdmi snd_ctl_led snd_hda_codec_realtek snd_hda_codec_generic uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common btusb videodev btrtl btbcm btintel btmtk mc bluetooth ecdh_generic ecc dell_rbtn snd_soc_avs snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core intel_tcc_cooling snd_hwdep x86_pkg_temp_thermal intel_powerclamp coretemp snd_pcm iwlmvm kvm_intel dell_laptop joydev mac80211 snd_seq_midi kvm snd_seq_midi_event libarc4 mei_pxp snd_rawmidi mei_hdcp i915 crct10dif_pclmul ghash_clmulni_intel snd_seq
Jan 23 20:22:49 comet kernel: [ 60.661373] intel_rapl_msr iwlwifi aesni_intel dell_wmi drm_buddy ledtrig_audio crypto_simd ttm dell_smm_hwmon snd_seq_device dell_smbios cryptd drm_display_helper dcdbas input_leds snd_timer rapl dell_wmi_sysman intel_wmi_thunderbolt hid_multitouch dell_wmi_descriptor firmware_attributes_class cfg80211 nls_iso8859_1 wmi_bmof serio_raw ucsi_acpi intel_cstate cec snd mei_me rc_core ee1004 soundcore typec_ucsi mei typec drm_kms_helper intel_xhci_usb_role_switch i2c_algo_bit processor_thermal_device_pci_legacy processor_thermal_device processor_thermal_rfim fb_sys_fops syscopyarea processor_thermal_mbox sysfillrect processor_thermal_rapl sysimgblt int3400_thermal intel_rapl_common intel_hid mac_hid int3403_thermal dell_smo8800 intel_soc_dts_iosf acpi_thermal_rel int340x_thermal_zone intel_pch_thermal sparse_keymap acpi_pad msr parport_pc ppdev lp parport ramoops pstore_blk drm reed_solomon pstore_zone efi_pstore ip_tables x_tables autofs4 usbhid hid_generic rtsx_pci_sdmmc i2c_hid_acpi
Jan 23 20:22:49 comet kernel: [ 60.661460] i2c_hid crc32_pclmul i2c_i801 ahci e1000e rtsx_pci i2c_smbus intel_lpss_pci xhci_pci intel_lpss libahci idma64 xhci_pci_renesas wmi hid video
Jan 23 20:22:49 comet kernel: [ 60.661480] CPU: 5 PID: 5544 Comm: openvpn Tainted: P U OE 5.19.0-30-generic #31-Ubuntu
Jan 23 20:22:49 comet kernel: [ 60.661484] Hardware name: Dell Inc. Latitude 5590/0MM81M, BIOS 1.26.0 11/20/2022
Jan 23 20:22:49 comet kernel: [ 60.661487] RIP: 0010:nla_get_range_unsigned+0xe9/0x150
Jan 23 20:22:49 comet kernel: [ 60.661493] Code: ff ff 00 00 3c 0b 0f 84 72 ff ff ff 48 c7 c2 ff ff ff ff 3c 04 0f 84 63 ff ff ff 0f 0b 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc <0f> 0b 48 c7 06 00 00 00 00 0f b6 07 3c 03 0f 85 31 ff ff ff ba ff
Jan 23 20:22:49 comet kernel: [ 60.661496] RSP: 0018:ffffac4a470d3750 EFLAGS: 00010286
Jan 23 20:22:49 comet kernel: [ 60.661500] RAX: 0000000000000000 RBX: 000000000000000b RCX: 0000000000000065
Jan 23 20:22:49 comet kernel: [ 60.661502] RDX: ffffac4a470d3ac8 RSI: ffffac4a470d3768 RDI: ffffffffc1167b70
Jan 23 20:22:49 comet kernel: [ 60.661505] RBP: ffffac4a470d37a8 R08: ffffac4a470d3768 R09: 0000000000000001
Jan 23 20:22:49 comet kernel: [ 60.661507] R10: ffffac4a470d3ac8 R11: 0000000000000000 R12: ffffffffc1167b70
Jan 23 20:22:49 comet kernel: [ 60.661509] R13: ffff9390e1f0ca28 R14: ffffac4a470d3ac8 R15: 0000000000000000
Jan 23 20:22:49 comet kernel: [ 60.661511] FS: 00007f2b54660800(0000) GS:ffff93935f540000(0000) knlGS:0000000000000000
Jan 23 20:22:49 comet kernel: [ 60.661515] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 23 20:22:49 comet kernel: [ 60.661517] CR2: 0000555d1eedf3a8 CR3: 000000012d0fc001 CR4: 00000000003706e0
Jan 23 20:22:49 comet kernel: [ 60.661520] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 23 20:22:49 comet kernel: [ 60.661522] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 23 20:22:49 comet kernel: [ 60.661524] Call Trace:
Jan 23 20:22:49 comet kernel: [ 60.661526] <TASK>
Jan 23 20:22:49 comet kernel: [ 60.661528] ? nla_validate_int_range+0x81/0x2d0
Jan 23 20:22:49 comet kernel: [ 60.661539] validate_nla+0x4b3/0x790
Jan 23 20:22:49 comet kernel: [ 60.661544] ? _raw_spin_lock_irqsave+0xe/0x20
Jan 23 20:22:49 comet kernel: [ 60.661551] __nla_validate_parse+0x11f/0x190
Jan 23 20:22:49 comet kernel: [ 60.661557] validate_nla+0x221/0x790
Jan 23 20:22:49 comet kernel: [ 60.661564] __nla_validate_parse+0x11f/0x190
Jan 23 20:22:49 comet kernel: [ 60.661569] __nla_parse+0x23/0x40
Jan 23 20:22:49 comet kernel: [ 60.661574] genl_family_rcv_msg_attrs_parse.constprop.0+0x93/0x100
Jan 23 20:22:49 comet kernel: [ 60.661581] genl_family_rcv_msg_doit+0x77/0x180
Jan 23 20:22:49 comet kernel: [ 60.661589] genl_rcv_msg+0xf0/0x200
Jan 23 20:22:49 comet kernel: [ 60.661593] ? ovpn_netlink_get_peer+0x1f0/0x1f0 [ovpn_dco]
Jan 23 20:22:49 comet kernel: [ 60.661603] ? genl_get_cmd+0x120/0x120
Jan 23 20:22:49 comet kernel: [ 60.661608] netlink_rcv_skb+0x54/0x110
Jan 23 20:22:49 comet kernel: [ 60.661614] genl_rcv+0x28/0x50
Jan 23 20:22:49 comet kernel: [ 60.661618] netlink_unicast+0x244/0x390
Jan 23 20:22:49 comet kernel: [ 60.661623] netlink_sendmsg+0x25e/0x4e0
Jan 23 20:22:49 comet kernel: [ 60.661630] sock_sendmsg+0x6a/0x70
Jan 23 20:22:49 comet kernel: [ 60.661635] ____sys_sendmsg+0x277/0x2c0
Jan 23 20:22:49 comet kernel: [ 60.661640] ? import_iovec+0x1b/0x30
Jan 23 20:22:49 comet kernel: [ 60.661647] ___sys_sendmsg+0x96/0xe0
Jan 23 20:22:49 comet kernel: [ 60.661657] __sys_sendmsg+0x86/0xf0
Jan 23 20:22:49 comet kernel: [ 60.661662] __x64_sys_sendmsg+0x1d/0x30
Jan 23 20:22:49 comet kernel: [ 60.661665] do_syscall_64+0x58/0x90
Jan 23 20:22:49 comet kernel: [ 60.661669] ? syscall_exit_to_user_mode+0x29/0x50
Jan 23 20:22:49 comet kernel: [ 60.661674] ? do_syscall_64+0x67/0x90
Jan 23 20:22:49 comet kernel: [ 60.661677] ? exit_to_user_mode_prepare+0x30/0xb0
Jan 23 20:22:49 comet kernel: [ 60.661683] ? irqentry_exit_to_user_mode+0x9/0x20
Jan 23 20:22:49 comet kernel: [ 60.661688] ? irqentry_exit+0x43/0x50
Jan 23 20:22:49 comet kernel: [ 60.661692] ? exc_page_fault+0x91/0x1b0
Jan 23 20:22:49 comet kernel: [ 60.661697] entry_SYSCALL_64_after_hwframe+0x63/0xcd
Jan 23 20:22:49 comet kernel: [ 60.661700] RIP: 0033:0x7f2b53f208d4
Jan 23 20:22:49 comet kernel: [ 60.661703] Code: 15 31 55 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 0d dd 0d 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
Jan 23 20:22:49 comet kernel: [ 60.661706] RSP: 002b:00007ffc4a4417a8 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
Jan 23 20:22:49 comet kernel: [ 60.661710] RAX: ffffffffffffffda RBX: 0000555d1ef18980 RCX: 00007f2b53f208d4
Jan 23 20:22:49 comet kernel: [ 60.661712] RDX: 0000000000000000 RSI: 00007ffc4a4417e0 RDI: 0000000000000004
Jan 23 20:22:49 comet kernel: [ 60.661714] RBP: 0000555d1ef1c130 R08: 0000555d1ef25268 R09: 0000000000000000
Jan 23 20:22:49 comet kernel: [ 60.661716] R10: 0000000000000065 R11: 0000000000000202 R12: 0000555d1ef20630
Jan 23 20:22:49 comet kernel: [ 60.661718] R13: 00007ffc4a4417e0 R14: 00007ffc4a4419f0 R15: 0000000000000000
Jan 23 20:22:49 comet kernel: [ 60.661723] </TASK>
Jan 23 20:22:49 comet kernel: [ 60.661725] ---[ end trace 0000000000000000 ]---
Jan 23 20:22:55 comet kernel: [ 67.121046] sctp: Hash tables configured (bind 256/256)
the output from openvpn:
2023-01-23 20:22:48 us=580252 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback 'BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-01-23 20:22:48 us=580545 Current Parameter Settings:
2023-01-23 20:22:48 us=580563 config = 'charite-hildeb.ovpn'
2023-01-23 20:22:48 us=580580 mode = 0
2023-01-23 20:22:48 us=580599 persist_config = DISABLED
2023-01-23 20:22:48 us=580617 persist_mode = 1
2023-01-23 20:22:48 us=580635 show_ciphers = DISABLED
2023-01-23 20:22:48 us=580653 show_digests = DISABLED
2023-01-23 20:22:48 us=580670 show_engines = DISABLED
2023-01-23 20:22:48 us=580688 genkey = DISABLED
2023-01-23 20:22:48 us=580707 genkey_filename = '[UNDEF]'
2023-01-23 20:22:48 us=580725 key_pass_file = '[UNDEF]'
2023-01-23 20:22:48 us=580744 show_tls_ciphers = DISABLED
2023-01-23 20:22:48 us=580764 connect_retry_max = 0
2023-01-23 20:22:48 us=580781 Connection profiles [0]:
2023-01-23 20:22:48 us=580794 proto = udp
2023-01-23 20:22:48 us=580805 local = '[UNDEF]'
2023-01-23 20:22:48 us=580816 local_port = '[UNDEF]'
2023-01-23 20:22:48 us=580831 remote = 'openvpn-gw170-ext.charite.de'
2023-01-23 20:22:48 us=580850 remote_port = '1194'
2023-01-23 20:22:48 us=580867 remote_float = DISABLED
2023-01-23 20:22:48 us=580886 bind_defined = DISABLED
2023-01-23 20:22:48 us=580905 bind_local = DISABLED
2023-01-23 20:22:48 us=580924 bind_ipv6_only = DISABLED
2023-01-23 20:22:48 us=580944 connect_retry_seconds = 5
2023-01-23 20:22:48 us=580964 connect_timeout = 120
2023-01-23 20:22:48 us=580981 socks_proxy_server = '[UNDEF]'
2023-01-23 20:22:48 us=580999 socks_proxy_port = '[UNDEF]'
2023-01-23 20:22:48 us=581018 tun_mtu = 1500
2023-01-23 20:22:48 us=581037 tun_mtu_defined = ENABLED
2023-01-23 20:22:48 us=581056 link_mtu = 1500
2023-01-23 20:22:48 us=581089 link_mtu_defined = DISABLED
2023-01-23 20:22:48 us=581108 tun_mtu_extra = 0
2023-01-23 20:22:48 us=581125 tun_mtu_extra_defined = DISABLED
2023-01-23 20:22:48 us=581144 mtu_discover_type = -1
2023-01-23 20:22:48 us=581162 fragment = 0
2023-01-23 20:22:48 us=581180 mssfix = 1492
2023-01-23 20:22:48 us=581199 mssfix_encap = ENABLED
2023-01-23 20:22:48 us=581218 mssfix_fixed = DISABLED
2023-01-23 20:22:48 us=581239 explicit_exit_notification = 1
2023-01-23 20:22:48 us=581257 tls_auth_file = '[INLINE]'
2023-01-23 20:22:48 us=581277 key_direction = 1
2023-01-23 20:22:48 us=581295 tls_crypt_file = '[UNDEF]'
2023-01-23 20:22:48 us=581314 tls_crypt_v2_file = '[UNDEF]'
2023-01-23 20:22:48 us=581334 Connection profiles END
2023-01-23 20:22:48 us=581352 remote_random = DISABLED
2023-01-23 20:22:48 us=581370 ipchange = '[UNDEF]'
2023-01-23 20:22:48 us=581389 dev = 'tun'
2023-01-23 20:22:48 us=581407 dev_type = '[UNDEF]'
2023-01-23 20:22:48 us=581424 dev_node = '[UNDEF]'
2023-01-23 20:22:48 us=581443 tuntap_options.disable_dco = DISABLED
2023-01-23 20:22:48 us=581462 lladdr = '[UNDEF]'
2023-01-23 20:22:48 us=581481 topology = 1
2023-01-23 20:22:48 us=581500 ifconfig_local = '[UNDEF]'
2023-01-23 20:22:48 us=581518 ifconfig_remote_netmask = '[UNDEF]'
2023-01-23 20:22:48 us=581545 ifconfig_noexec = DISABLED
2023-01-23 20:22:48 us=581565 ifconfig_nowarn = DISABLED
2023-01-23 20:22:48 us=581583 ifconfig_ipv6_local = '[UNDEF]'
2023-01-23 20:22:48 us=581602 ifconfig_ipv6_netbits = 0
2023-01-23 20:22:48 us=581621 ifconfig_ipv6_remote = '[UNDEF]'
2023-01-23 20:22:48 us=581641 shaper = 0
2023-01-23 20:22:48 us=581660 mtu_test = 0
2023-01-23 20:22:48 us=581677 mlock = DISABLED
2023-01-23 20:22:48 us=581696 keepalive_ping = 0
2023-01-23 20:22:48 us=581716 keepalive_timeout = 0
2023-01-23 20:22:48 us=581735 inactivity_timeout = 0
2023-01-23 20:22:48 us=581754 inactivity_minimum_bytes = 0
2023-01-23 20:22:48 us=581774 ping_send_timeout = 0
2023-01-23 20:22:48 us=581792 ping_rec_timeout = 0
2023-01-23 20:22:48 us=581812 ping_rec_timeout_action = 0
2023-01-23 20:22:48 us=581830 ping_timer_remote = DISABLED
2023-01-23 20:22:48 us=581848 remap_sigusr1 = 0
2023-01-23 20:22:48 us=581866 persist_tun = DISABLED
2023-01-23 20:22:48 us=581884 persist_local_ip = DISABLED
2023-01-23 20:22:48 us=581904 persist_remote_ip = DISABLED
2023-01-23 20:22:48 us=581922 persist_key = DISABLED
2023-01-23 20:22:48 us=581941 passtos = DISABLED
2023-01-23 20:22:48 us=581960 resolve_retry_seconds = 1000000000
2023-01-23 20:22:48 us=581979 resolve_in_advance = DISABLED
2023-01-23 20:22:48 us=581998 username = '[UNDEF]'
2023-01-23 20:22:48 us=582017 groupname = '[UNDEF]'
2023-01-23 20:22:48 us=582035 chroot_dir = '[UNDEF]'
2023-01-23 20:22:48 us=582054 cd_dir = '[UNDEF]'
2023-01-23 20:22:48 us=582073 writepid = '[UNDEF]'
2023-01-23 20:22:48 us=582092 up_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 20:22:48 us=582112 down_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 20:22:48 us=582131 down_pre = ENABLED
2023-01-23 20:22:48 us=582149 up_restart = DISABLED
2023-01-23 20:22:48 us=582166 up_delay = DISABLED
2023-01-23 20:22:48 us=582186 daemon = DISABLED
2023-01-23 20:22:48 us=582203 log = DISABLED
2023-01-23 20:22:48 us=582221 suppress_timestamps = DISABLED
2023-01-23 20:22:48 us=582239 machine_readable_output = DISABLED
2023-01-23 20:22:48 us=582259 nice = 0
2023-01-23 20:22:48 us=582277 verbosity = 6
2023-01-23 20:22:48 us=582295 mute = 0
2023-01-23 20:22:48 us=582313 gremlin = 0
2023-01-23 20:22:48 us=582332 status_file = '[UNDEF]'
2023-01-23 20:22:48 us=582350 status_file_version = 1
2023-01-23 20:22:48 us=582367 status_file_update_freq = 60
2023-01-23 20:22:48 us=582385 occ = ENABLED
2023-01-23 20:22:48 us=582402 rcvbuf = 0
2023-01-23 20:22:48 us=582422 sndbuf = 0
2023-01-23 20:22:48 us=582440 mark = 0
2023-01-23 20:22:48 us=582458 sockflags = 0
2023-01-23 20:22:48 us=582477 fast_io = DISABLED
2023-01-23 20:22:48 us=582496 comp.alg = 0
2023-01-23 20:22:48 us=582515 comp.flags = 24
2023-01-23 20:22:48 us=582535 route_script = '[UNDEF]'
2023-01-23 20:22:48 us=582554 route_default_gateway = '[UNDEF]'
2023-01-23 20:22:48 us=582571 route_default_metric = 0
2023-01-23 20:22:48 us=582592 route_noexec = DISABLED
2023-01-23 20:22:48 us=582611 route_delay = 0
2023-01-23 20:22:48 us=582630 route_delay_window = 30
2023-01-23 20:22:48 us=582649 route_delay_defined = DISABLED
2023-01-23 20:22:48 us=582669 route_nopull = DISABLED
2023-01-23 20:22:48 us=582688 route_gateway_via_dhcp = DISABLED
2023-01-23 20:22:48 us=582707 allow_pull_fqdn = DISABLED
2023-01-23 20:22:48 us=582725 management_addr = '[UNDEF]'
2023-01-23 20:22:48 us=582743 management_port = '[UNDEF]'
2023-01-23 20:22:48 us=582760 management_user_pass = '[UNDEF]'
2023-01-23 20:22:48 us=582780 management_log_history_cache = 250
2023-01-23 20:22:48 us=582800 management_echo_buffer_size = 100
2023-01-23 20:22:48 us=582819 management_client_user = '[UNDEF]'
2023-01-23 20:22:48 us=582838 management_client_group = '[UNDEF]'
2023-01-23 20:22:48 us=582858 management_flags = 0
2023-01-23 20:22:48 us=582878 shared_secret_file = '[UNDEF]'
2023-01-23 20:22:48 us=582897 key_direction = 1
2023-01-23 20:22:48 us=582916 ciphername = 'BF-CBC'
2023-01-23 20:22:48 us=582936 ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-01-23 20:22:48 us=582955 authname = 'SHA256'
2023-01-23 20:22:48 us=582974 engine = DISABLED
2023-01-23 20:22:48 us=582993 replay = ENABLED
2023-01-23 20:22:48 us=583012 mute_replay_warnings = DISABLED
2023-01-23 20:22:48 us=583031 replay_window = 64
2023-01-23 20:22:48 us=583050 replay_time = 15
2023-01-23 20:22:48 us=583070 packet_id_file = '[UNDEF]'
2023-01-23 20:22:48 us=583088 test_crypto = DISABLED
2023-01-23 20:22:48 us=583109 tls_server = DISABLED
2023-01-23 20:22:48 us=583128 tls_client = ENABLED
2023-01-23 20:22:48 us=583146 ca_file = '[INLINE]'
2023-01-23 20:22:48 us=583166 ca_path = '[UNDEF]'
2023-01-23 20:22:48 us=583185 dh_file = '[UNDEF]'
2023-01-23 20:22:48 us=583205 cert_file = '[INLINE]'
2023-01-23 20:22:48 us=583223 extra_certs_file = '[UNDEF]'
2023-01-23 20:22:48 us=583242 priv_key_file = '[INLINE]'
2023-01-23 20:22:48 us=583262 pkcs12_file = '[UNDEF]'
2023-01-23 20:22:48 us=583281 cipher_list = '[UNDEF]'
2023-01-23 20:22:48 us=583299 cipher_list_tls13 = '[UNDEF]'
2023-01-23 20:22:48 us=583318 tls_cert_profile = '[UNDEF]'
2023-01-23 20:22:48 us=583338 tls_verify = '[UNDEF]'
2023-01-23 20:22:48 us=583356 tls_export_cert = '[UNDEF]'
2023-01-23 20:22:48 us=583375 verify_x509_type = 1
2023-01-23 20:22:48 us=583393 verify_x509_name = 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de'
2023-01-23 20:22:48 us=583415 crl_file = '[UNDEF]'
2023-01-23 20:22:48 us=583433 ns_cert_type = 0
2023-01-23 20:22:48 us=583452 remote_cert_ku[i] = 65535
2023-01-23 20:22:48 us=583471 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583491 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583509 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583528 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583547 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583564 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583584 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583603 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583622 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583642 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583661 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583679 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583698 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583717 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583736 remote_cert_ku[i] = 0
2023-01-23 20:22:48 us=583755 remote_cert_eku = 'TLS Web Server Authentication'
2023-01-23 20:22:48 us=583776 ssl_flags = 192
2023-01-23 20:22:48 us=583795 tls_timeout = 2
2023-01-23 20:22:48 us=583815 renegotiate_bytes = -1
2023-01-23 20:22:48 us=583836 renegotiate_packets = 0
2023-01-23 20:22:48 us=583854 renegotiate_seconds = 0
2023-01-23 20:22:48 us=583874 handshake_window = 60
2023-01-23 20:22:48 us=583894 transition_window = 3600
2023-01-23 20:22:48 us=583915 single_session = DISABLED
2023-01-23 20:22:48 us=583934 push_peer_info = DISABLED
2023-01-23 20:22:48 us=583955 tls_exit = DISABLED
2023-01-23 20:22:48 us=583975 tls_crypt_v2_metadata = '[UNDEF]'
2023-01-23 20:22:48 us=583996 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584017 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584039 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584061 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584082 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584103 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584126 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584147 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584170 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584195 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584216 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584238 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584258 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584278 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584299 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584324 pkcs11_protected_authentication = DISABLED
2023-01-23 20:22:48 us=584346 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584368 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584388 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584411 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584432 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584455 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584478 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584497 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584519 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584541 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584560 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584582 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584601 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584623 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584645 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584666 pkcs11_private_mode = 00000000
2023-01-23 20:22:48 us=584688 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584709 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584730 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584750 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584774 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584796 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584817 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584838 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584861 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584881 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584902 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584922 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584940 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584958 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584978 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=584997 pkcs11_cert_private = DISABLED
2023-01-23 20:22:48 us=585018 pkcs11_pin_cache_period = -1
2023-01-23 20:22:48 us=585038 pkcs11_id = '[UNDEF]'
2023-01-23 20:22:48 us=585059 pkcs11_id_management = DISABLED
2023-01-23 20:22:48 us=585185 server_network = 0.0.0.0
2023-01-23 20:22:48 us=585209 server_netmask = 0.0.0.0
2023-01-23 20:22:48 us=585246 server_network_ipv6 = ::
2023-01-23 20:22:48 us=585266 server_netbits_ipv6 = 0
2023-01-23 20:22:48 us=585286 server_bridge_ip = 0.0.0.0
2023-01-23 20:22:48 us=585308 server_bridge_netmask = 0.0.0.0
2023-01-23 20:22:48 us=585329 server_bridge_pool_start = 0.0.0.0
2023-01-23 20:22:48 us=585349 server_bridge_pool_end = 0.0.0.0
2023-01-23 20:22:48 us=585369 ifconfig_pool_defined = DISABLED
2023-01-23 20:22:48 us=585390 ifconfig_pool_start = 0.0.0.0
2023-01-23 20:22:48 us=585411 ifconfig_pool_end = 0.0.0.0
2023-01-23 20:22:48 us=585432 ifconfig_pool_netmask = 0.0.0.0
2023-01-23 20:22:48 us=585451 ifconfig_pool_persist_filename = '[UNDEF]'
2023-01-23 20:22:48 us=585487 ifconfig_pool_persist_refresh_freq = 600
2023-01-23 20:22:48 us=585509 ifconfig_ipv6_pool_defined = DISABLED
2023-01-23 20:22:48 us=585531 ifconfig_ipv6_pool_base = ::
2023-01-23 20:22:48 us=585551 ifconfig_ipv6_pool_netbits = 0
2023-01-23 20:22:48 us=585571 n_bcast_buf = 256
2023-01-23 20:22:48 us=585591 tcp_queue_limit = 64
2023-01-23 20:22:48 us=585610 real_hash_size = 256
2023-01-23 20:22:48 us=585631 virtual_hash_size = 256
2023-01-23 20:22:48 us=585651 client_connect_script = '[UNDEF]'
2023-01-23 20:22:48 us=585669 learn_address_script = '[UNDEF]'
2023-01-23 20:22:48 us=585690 client_disconnect_script = '[UNDEF]'
2023-01-23 20:22:48 us=585709 client_config_dir = '[UNDEF]'
2023-01-23 20:22:48 us=585729 ccd_exclusive = DISABLED
2023-01-23 20:22:48 us=585749 tmp_dir = '/tmp'
2023-01-23 20:22:48 us=585768 push_ifconfig_defined = DISABLED
2023-01-23 20:22:48 us=585789 push_ifconfig_local = 0.0.0.0
2023-01-23 20:22:48 us=585811 push_ifconfig_remote_netmask = 0.0.0.0
2023-01-23 20:22:48 us=585830 push_ifconfig_ipv6_defined = DISABLED
2023-01-23 20:22:48 us=585851 push_ifconfig_ipv6_local = ::/0
2023-01-23 20:22:48 us=585871 push_ifconfig_ipv6_remote = ::
2023-01-23 20:22:48 us=585893 enable_c2c = DISABLED
2023-01-23 20:22:48 us=585912 duplicate_cn = DISABLED
2023-01-23 20:22:48 us=585931 cf_max = 0
2023-01-23 20:22:48 us=585951 cf_per = 0
2023-01-23 20:22:48 us=585971 max_clients = 1024
2023-01-23 20:22:48 us=585991 max_routes_per_client = 256
2023-01-23 20:22:48 us=586010 auth_user_pass_verify_script = '[UNDEF]'
2023-01-23 20:22:48 us=586029 auth_user_pass_verify_script_via_file = DISABLED
2023-01-23 20:22:48 us=586048 auth_token_generate = DISABLED
2023-01-23 20:22:48 us=586068 auth_token_lifetime = 0
2023-01-23 20:22:48 us=586088 auth_token_secret_file = '[UNDEF]'
2023-01-23 20:22:48 us=586107 port_share_host = '[UNDEF]'
2023-01-23 20:22:48 us=586127 port_share_port = '[UNDEF]'
2023-01-23 20:22:48 us=586146 vlan_tagging = DISABLED
2023-01-23 20:22:48 us=586166 vlan_accept = all
2023-01-23 20:22:48 us=586186 vlan_pvid = 1
2023-01-23 20:22:48 us=586204 client = ENABLED
2023-01-23 20:22:48 us=586224 pull = ENABLED
2023-01-23 20:22:48 us=586244 auth_user_pass_file = 'password.txt'
2023-01-23 20:22:48 us=586268 OpenVPN 2.6_git x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-01-23 20:22:48 us=586306 library versions: OpenSSL 3.0.5 5 Jul 2022, LZO 2.10
2023-01-23 20:22:48 us=586902 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-23 20:22:48 us=591288 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 20:22:48 us=591330 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 20:22:48 us=591477 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 headroom:126 payload:1376 tailroom:126 ET:0 ]
2023-01-23 20:22:48 us=595823 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 20:22:48 us=595931 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client'
2023-01-23 20:22:48 us=595946 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server'
2023-01-23 20:22:48 us=595990 TCP/UDP: Preserving recently used remote address: [AF_INET]193.175.73.170:1194
2023-01-23 20:22:48 us=596028 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-23 20:22:48 us=596052 UDPv4 link local: (not bound)
2023-01-23 20:22:48 us=596074 UDPv4 link remote: [AF_INET]193.175.73.170:1194
2023-01-23 20:22:48 us=596806 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=596841 UDPv4 WRITE [54] to [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2023-01-23 20:22:48 us=596890 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=614079 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2023-01-23 20:22:48 us=614116 TLS: Initial packet from [AF_INET]193.175.73.170:1194, sid=07f69284 4744ea58
2023-01-23 20:22:48 us=614207 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=614232 UDPv4 WRITE [343] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=277
2023-01-23 20:22:48 us=614280 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=633526 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1136
2023-01-23 20:22:48 us=633947 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=633979 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 ] DATA len=0
2023-01-23 20:22:48 us=634032 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=634057 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1136
2023-01-23 20:22:48 us=634091 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=634110 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 2 ] DATA len=0
2023-01-23 20:22:48 us=634146 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=634189 UDPv4 READ [1173] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 1 ] pid=3 DATA len=1107
2023-01-23 20:22:48 us=636159 VERIFY OK: depth=1, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=Charite-VPN CA, name=EasyRSA, emailAddress=vpn@charite.de
2023-01-23 20:22:48 us=636447 VERIFY KU OK
2023-01-23 20:22:48 us=636470 Validating certificate extended key usage
2023-01-23 20:22:48 us=636487 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-01-23 20:22:48 us=636502 VERIFY EKU OK
2023-01-23 20:22:48 us=636518 VERIFY X509NAME OK: C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 20:22:48 us=636534 VERIFY OK: depth=0, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 20:22:48 us=639223 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=639262 UDPv4 WRITE [1316] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 3 ] pid=2 DATA len=1250
2023-01-23 20:22:48 us=639346 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=639378 UDPv4 WRITE [1304] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=3 DATA len=1250
2023-01-23 20:22:48 us=639433 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=639461 UDPv4 WRITE [940] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=4 DATA len=886
2023-01-23 20:22:48 us=639501 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=655713 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 1 ] DATA len=0
2023-01-23 20:22:48 us=655775 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=656620 UDPv4 READ [70] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 2 1 ] DATA len=0
2023-01-23 20:22:48 us=656658 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=739215 UDPv4 READ [236] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ 4 3 2 1 ] pid=4 DATA len=158
2023-01-23 20:22:48 us=739367 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=739391 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 ] DATA len=0
2023-01-23 20:22:48 us=739436 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=739459 UDPv4 READ [324] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 ] pid=5 DATA len=246
2023-01-23 20:22:48 us=739493 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1549'
2023-01-23 20:22:48 us=739510 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]'
2023-01-23 20:22:48 us=739522 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
2023-01-23 20:22:48 us=739550 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-01-23 20:22:48 us=739569 [openvpn.charite.de] Peer Connection Initiated with [AF_INET]193.175.73.170:1194
2023-01-23 20:22:48 us=739587 dco_update_keys: peer_id=0
2023-01-23 20:22:48 us=739602 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #9 ] [ 5 ] DATA len=0
2023-01-23 20:22:48 us=739629 dco_update_keys: peer_id=0
2023-01-23 20:22:49 us=69954 UDPv4 READ [663] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=6 DATA len=585
2023-01-23 20:22:49 us=70044 SENT CONTROL [openvpn.charite.de]: 'PUSH_REQUEST' (status=1)
2023-01-23 20:22:49 us=70087 dco_update_keys: peer_id=0
2023-01-23 20:22:49 us=70128 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 141.42.1.1,dhcp-option DOMAIN charite.de,route-gateway 172.29.0.1,topology subnet,ping 10,ping-restart 30,route 10.27.0.0 255.255.0.0,route 10.28.0.0 255.254.0.0,route 10.32.0.0 255.224.0.0,route 172.16.0.0 255.254.0.0,route 192.168.192.0 255.255.192.0,route 141.42.0.0 255.255.0.0,route 193.175.72.0 255.255.255.0,route 193.175.74.0 255.255.254.0,route 193.175.174.0 255.255.255.192,route 172.19.252.0 255.255.255.224,route 194.94.4.0 255.255.254.0,ifconfig 172.29.0.2 255.255.248.0,peer-id 0,cipher AES-256-GCM,key-derivation tls-ekm'
2023-01-23 20:22:49 us=70303 OPTIONS IMPORT: timers and/or timeouts modified
2023-01-23 20:22:49 us=70321 OPTIONS IMPORT: --ifconfig/up options modified
2023-01-23 20:22:49 us=70332 OPTIONS IMPORT: route options modified
2023-01-23 20:22:49 us=70342 OPTIONS IMPORT: route-related options modified
2023-01-23 20:22:49 us=70352 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-01-23 20:22:49 us=70363 OPTIONS IMPORT: peer-id set
2023-01-23 20:22:49 us=70373 OPTIONS IMPORT: data channel crypto options modified
2023-01-23 20:22:49 us=70399 net_route_v4_best_gw query: dst 0.0.0.0
2023-01-23 20:22:49 us=70503 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=70537 sitnl_send: rtnl: received 496 bytes
2023-01-23 20:22:49 us=70590 net_route_v4_best_gw result: via 192.168.178.1 dev wlp2s0
2023-01-23 20:22:49 us=70667 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=wlp2s0 HWADDR=d0:c6:37:db:70:77
2023-01-23 20:22:49 us=71073 open_tun_dco: tun0
2023-01-23 20:22:49 us=71097 net_iface_new: add tun0 type ovpn-dco
2023-01-23 20:22:49 us=71838 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=71869 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=71941 ovpn_dco_register
2023-01-23 20:22:49 us=72085 DCO device tun0 opened
2023-01-23 20:22:49 us=72109 do_ifconfig, ipv4=1, ipv6=0
2023-01-23 20:22:49 us=72150 net_iface_mtu_set: mtu 1500 for tun0
2023-01-23 20:22:49 us=72232 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=72263 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=72321 net_iface_up: set tun0 up
2023-01-23 20:22:49 us=72580 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=72620 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=72654 net_addr_v4_add: 172.29.0.2/21 dev tun0
2023-01-23 20:22:49 us=72871 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=72902 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=72974 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 20:22:49 update-systemd-resolved: Link 'tun0' coming up
<14>Jan 23 20:22:49 update-systemd-resolved: Adding IPv4 DNS Server 141.42.1.1
<14>Jan 23 20:22:49 update-systemd-resolved: Adding DNS Domain charite.de
<14>Jan 23 20:22:49 update-systemd-resolved: SetLinkDNS(4 1 2 4 141 42 1 1)
<14>Jan 23 20:22:49 update-systemd-resolved: SetLinkDomains(4 1 charite.de false)
2023-01-23 20:22:49 us=140846 net_route_v4_add: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=141128 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=141182 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=141213 net_route_v4_add: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=141583 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=141662 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=141703 net_route_v4_add: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=142144 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=142373 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=142601 net_route_v4_add: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=143429 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=143460 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=143489 net_route_v4_add: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=143969 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=144020 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=144078 net_route_v4_add: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=144446 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=144479 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=144509 net_route_v4_add: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=144800 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=144827 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=144855 net_route_v4_add: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=145405 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=145500 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=145579 net_route_v4_add: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=145766 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=145792 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=145818 net_route_v4_add: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=146196 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=146323 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=146384 net_route_v4_add: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:49 us=146602 sitnl_send: checking for received messages
2023-01-23 20:22:49 us=146827 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:49 us=146924 dco_new_peer: peer-id 0, fd 3
2023-01-23 20:22:49 us=147048 Data Channel: using negotiated cipher 'AES-256-GCM'
2023-01-23 20:22:49 us=147117 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 20:22:49 us=147214 dco_install_key: peer_id=0 keyid=0
2023-01-23 20:22:49 us=147231 dco_new_key: slot 0, key-id 0, peer-id 0, cipher AES-256-GCM
2023-01-23 20:22:49 us=153240 dco_set_peer: peer-id 0, keepalive 10/30, mss 1400
2023-01-23 20:22:49 us=153298 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-01-23 20:22:49 us=153315 Initialization Sequence Completed
2023-01-23 20:22:49 us=153369 UDPv4 WRITE [101] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #10 ] [ 6 ] pid=5 DATA len=35
2023-01-23 20:22:49 us=153390 dco_do_write: peer-id 0, len=101
2023-01-23 20:22:49 us=153996 dco_update_keys: peer_id=0
2023-01-23 20:22:50 us=301004 dco_do_read
2023-01-23 20:22:50 us=301083 ovpn-dco: received OVPN_PACKET_ATTR_PACKET, ifindex: 4 peer-id: 0, len 78
2023-01-23 20:22:50 us=301120 UDPv4 READ [78] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #10 ] [ 5 4 3 2 1 ] DATA len=0
2023-01-23 20:22:50 us=301163 dco_update_keys: peer_id=0
^C2023-01-23 20:22:58 us=692141 event_wait : Interrupted system call (fd=-1,code=4)
2023-01-23 20:22:58 us=692217 SIGTERM received, sending exit notification to peer
2023-01-23 20:22:58 us=692263 dco_update_keys: peer_id=0
2023-01-23 20:22:58 us=692325 Attempting to send data packet while data channel offload is in use. Dropping packet
2023-01-23 20:22:59 us=729811 dco_del_peer: peer-id 0
2023-01-23 20:22:59 us=730536 TCP/UDP: Closing socket
2023-01-23 20:22:59 us=730662 net_route_v4_del: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=730936 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=731015 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=731086 net_route_v4_del: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=731243 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=731296 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=731349 net_route_v4_del: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=731470 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=731517 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=731575 net_route_v4_del: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=731745 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=731800 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=731863 net_route_v4_del: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=732049 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=732108 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=732168 net_route_v4_del: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=732332 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=732387 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=732452 net_route_v4_del: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=732613 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=732666 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=732740 net_route_v4_del: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=732910 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=732960 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=733030 net_route_v4_del: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=733736 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=733813 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=733893 net_route_v4_del: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=734052 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=734105 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=734169 net_route_v4_del: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 20:22:59 us=734316 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=734387 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=734497 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 20:22:59 update-systemd-resolved: Link 'tun0' going down
2023-01-23 20:22:59 us=811101 Closing TUN/TAP interface
2023-01-23 20:22:59 us=811226 net_addr_v4_del: 172.29.0.2 dev tun0
2023-01-23 20:22:59 us=813538 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=813605 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=813653 close_tun_dco
2023-01-23 20:22:59 us=813747 net_iface_del: delete tun0
2023-01-23 20:22:59 us=889448 sitnl_send: checking for received messages
2023-01-23 20:22:59 us=889541 sitnl_send: rtnl: received 36 bytes
2023-01-23 20:22:59 us=889892 SIGTERM[soft,exit-with-notification] received, process exiting
@hildeb where are you getting ovpn-dco from? I believe you have been compiling it from source, right? Are you patching it in any way?
@hildeb if you are compiling from source, would you mind recompiling it specifying DEBUG=1 to make? That should enable extra debugging messages that you should see in dmesg.
@ordex I used git clone https://github.com/OpenVPN/ovpn-dco.git
and then I just built it.
@ordex OK; I'll rebuild with DEBUG=1
So, moar DEBUG: first I modprob'ed, the I connected
Matching kern.log:
Jan 23 21:40:34 comet kernel: [ 47.394509] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
Jan 23 21:40:34 comet kernel: [ 47.395963] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-6-g93f1cf8 -- (C) 2020-2022 OpenVPN, Inc.
Jan 23 21:40:57 comet kernel: [ 69.563184] tun0 (uninitialized): ovpn_newlink: setting device (tun0) mode: 0
Jan 23 21:40:57 comet kernel: [ 69.564613] tun0: ovpn_netlink_register_packet: registering userspace at 2768245366
Jan 23 21:40:57 comet kernel: [ 69.566317] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.567752] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.567789] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.567816] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.567837] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.567859] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.567884] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.567906] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.567927] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.567948] tun0: no peer to send data to
Jan 23 21:40:57 comet kernel: [ 69.685447] tun0: ovpn_netlink_new_peer: adding peer with endpoint=193.175.73.170:1194/UDP id=0 VPN-IPv4=0.0.0.0 VPN-IPv6=::
Jan 23 21:40:57 comet kernel: [ 69.697368] ********* Cipher gcm(aes) (encrypt)
Jan 23 21:40:57 comet kernel: [ 69.697378] *** IV size=12
Jan 23 21:40:57 comet kernel: [ 69.697382] *** req size=88
Jan 23 21:40:57 comet kernel: [ 69.697386] *** block size=1
Jan 23 21:40:57 comet kernel: [ 69.697389] *** auth size=16
Jan 23 21:40:57 comet kernel: [ 69.697392] *** alignmask=0x0
Jan 23 21:40:57 comet kernel: [ 69.697409] ********* Cipher gcm(aes) (decrypt)
Jan 23 21:40:57 comet kernel: [ 69.697413] *** IV size=12
Jan 23 21:40:57 comet kernel: [ 69.697416] *** req size=88
Jan 23 21:40:57 comet kernel: [ 69.697420] *** block size=1
Jan 23 21:40:57 comet kernel: [ 69.697423] *** auth size=16
Jan 23 21:40:57 comet kernel: [ 69.697426] *** alignmask=0x0
Jan 23 21:40:57 comet kernel: [ 69.697430] tun0: ovpn_netlink_new_key: new key installed (id=0) for peer 0
Jan 23 21:40:57 comet kernel: [ 69.697597] tun0: ovpn_peer_keepalive_set: scheduling keepalive for peer 0: interval=10 timeout=30
Jan 23 21:40:57 comet kernel: [ 69.697826] ------------[ cut here ]------------
Jan 23 21:40:57 comet kernel: [ 69.697830] WARNING: CPU: 4 PID: 4726 at lib/nlattr.c:117 nla_get_range_unsigned+0xe9/0x150
Jan 23 21:40:57 comet kernel: [ 69.697850] Modules linked in: ovpn_dco(OE) ip6_udp_tunnel udp_tunnel ccm rfcomm snd_seq_dummy snd_hrtimer cmac algif_hash algif_skcipher af_alg bnep binfmt_misc zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) snd_hda_codec_hdmi snd_ctl_led snd_hda_codec_realtek snd_hda_codec_generic uvcvideo btusb videobuf2_vmalloc btrtl videobuf2_memops btbcm videobuf2_v4l2 btintel videobuf2_common btmtk videodev bluetooth mc ecdh_generic ecc dell_rbtn snd_soc_avs snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep intel_tcc_cooling snd_pcm x86_pkg_temp_thermal intel_powerclamp iwlmvm coretemp snd_seq_midi snd_seq_midi_event kvm_intel mac80211 snd_rawmidi libarc4 kvm snd_seq joydev dell_laptop crct10dif_pclmul iwlwifi ghash_clmulni_intel snd_seq_device snd_timer
Jan 23 21:40:57 comet kernel: [ 69.698047] mei_hdcp mei_pxp aesni_intel dell_wmi ledtrig_audio crypto_simd intel_rapl_msr i915 dell_smm_hwmon dell_smbios cryptd dcdbas snd rapl input_leds dell_wmi_sysman drm_buddy intel_cstate intel_wmi_thunderbolt wmi_bmof firmware_attributes_class dell_wmi_descriptor serio_raw cfg80211 ucsi_acpi ttm ee1004 soundcore hid_multitouch typec_ucsi drm_display_helper nls_iso8859_1 typec cec rc_core processor_thermal_device_pci_legacy drm_kms_helper processor_thermal_device processor_thermal_rfim i2c_algo_bit intel_hid int3400_thermal fb_sys_fops dell_smo8800 processor_thermal_mbox acpi_thermal_rel syscopyarea int3403_thermal sparse_keymap processor_thermal_rapl sysfillrect mei_me sysimgblt intel_rapl_common intel_xhci_usb_role_switch acpi_pad int340x_thermal_zone mac_hid mei intel_soc_dts_iosf intel_pch_thermal msr parport_pc ppdev lp parport ramoops drm pstore_blk reed_solomon pstore_zone efi_pstore ip_tables x_tables autofs4 usbhid hid_generic rtsx_pci_sdmmc crc32_pclmul i2c_i801
Jan 23 21:40:57 comet kernel: [ 69.698226] i2c_smbus e1000e intel_lpss_pci rtsx_pci ahci i2c_hid_acpi intel_lpss xhci_pci libahci i2c_hid idma64 xhci_pci_renesas wmi hid video
Jan 23 21:40:57 comet kernel: [ 69.698263] CPU: 4 PID: 4726 Comm: openvpn Tainted: P U OE 5.19.0-30-generic #31-Ubuntu
Jan 23 21:40:57 comet kernel: [ 69.698272] Hardware name: Dell Inc. Latitude 5590/0MM81M, BIOS 1.26.0 11/20/2022
Jan 23 21:40:57 comet kernel: [ 69.698276] RIP: 0010:nla_get_range_unsigned+0xe9/0x150
Jan 23 21:40:57 comet kernel: [ 69.698288] Code: ff ff 00 00 3c 0b 0f 84 72 ff ff ff 48 c7 c2 ff ff ff ff 3c 04 0f 84 63 ff ff ff 0f 0b 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc <0f> 0b 48 c7 06 00 00 00 00 0f b6 07 3c 03 0f 85 31 ff ff ff ba ff
Jan 23 21:40:57 comet kernel: [ 69.698294] RSP: 0018:ffffbab387217760 EFLAGS: 00010286
Jan 23 21:40:57 comet kernel: [ 69.698302] RAX: 0000000000000000 RBX: 000000000000000b RCX: 0000000000000065
Jan 23 21:40:57 comet kernel: [ 69.698307] RDX: ffffbab387217ad8 RSI: ffffbab387217778 RDI: ffffffffc1345a90
Jan 23 21:40:57 comet kernel: [ 69.698312] RBP: ffffbab3872177b8 R08: ffffbab387217778 R09: 0000000000000001
Jan 23 21:40:57 comet kernel: [ 69.698317] R10: ffffbab387217ad8 R11: 0000000000000000 R12: ffffffffc1345a90
Jan 23 21:40:57 comet kernel: [ 69.698321] R13: ffff9afea6fd8428 R14: ffffbab387217ad8 R15: 000000000000001f
Jan 23 21:40:57 comet kernel: [ 69.698327] FS: 00007f31f704b800(0000) GS:ffff9b019f500000(0000) knlGS:0000000000000000
Jan 23 21:40:57 comet kernel: [ 69.698333] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 23 21:40:57 comet kernel: [ 69.698339] CR2: 0000557d69a777e8 CR3: 000000017f2e8001 CR4: 00000000003706e0
Jan 23 21:40:57 comet kernel: [ 69.698344] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 23 21:40:57 comet kernel: [ 69.698349] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 23 21:40:57 comet kernel: [ 69.698354] Call Trace:
Jan 23 21:40:57 comet kernel: [ 69.698358] <TASK>
Jan 23 21:40:57 comet kernel: [ 69.698362] ? nla_validate_int_range+0x81/0x2d0
Jan 23 21:40:57 comet kernel: [ 69.698382] validate_nla+0x4b3/0x790
Jan 23 21:40:57 comet kernel: [ 69.698393] ? _printk+0x68/0x94
Jan 23 21:40:57 comet kernel: [ 69.698408] __nla_validate_parse+0x11f/0x190
Jan 23 21:40:57 comet kernel: [ 69.698421] validate_nla+0x221/0x790
Jan 23 21:40:57 comet kernel: [ 69.698430] ? __mod_timer+0x27a/0x400
Jan 23 21:40:57 comet kernel: [ 69.698442] __nla_validate_parse+0x11f/0x190
Jan 23 21:40:57 comet kernel: [ 69.698454] __nla_parse+0x23/0x40
Jan 23 21:40:57 comet kernel: [ 69.698463] genl_family_rcv_msg_attrs_parse.constprop.0+0x93/0x100
Jan 23 21:40:57 comet kernel: [ 69.698477] genl_family_rcv_msg_doit+0x77/0x180
Jan 23 21:40:57 comet kernel: [ 69.698493] genl_rcv_msg+0xf0/0x200
Jan 23 21:40:57 comet kernel: [ 69.698503] ? ovpn_netlink_get_peer+0x1f0/0x1f0 [ovpn_dco]
Jan 23 21:40:57 comet kernel: [ 69.698523] ? genl_get_cmd+0x120/0x120
Jan 23 21:40:57 comet kernel: [ 69.698533] netlink_rcv_skb+0x54/0x110
Jan 23 21:40:57 comet kernel: [ 69.698546] genl_rcv+0x28/0x50
Jan 23 21:40:57 comet kernel: [ 69.698554] netlink_unicast+0x244/0x390
Jan 23 21:40:57 comet kernel: [ 69.698566] netlink_sendmsg+0x25e/0x4e0
Jan 23 21:40:57 comet kernel: [ 69.698579] sock_sendmsg+0x6a/0x70
Jan 23 21:40:57 comet kernel: [ 69.698590] ____sys_sendmsg+0x277/0x2c0
Jan 23 21:40:57 comet kernel: [ 69.698599] ? import_iovec+0x1b/0x30
Jan 23 21:40:57 comet kernel: [ 69.698614] ___sys_sendmsg+0x96/0xe0
Jan 23 21:40:57 comet kernel: [ 69.698635] __sys_sendmsg+0x86/0xf0
Jan 23 21:40:57 comet kernel: [ 69.698646] __x64_sys_sendmsg+0x1d/0x30
Jan 23 21:40:57 comet kernel: [ 69.698652] do_syscall_64+0x58/0x90
Jan 23 21:40:57 comet kernel: [ 69.698661] ? exit_to_user_mode_prepare+0x30/0xb0
Jan 23 21:40:57 comet kernel: [ 69.698673] ? syscall_exit_to_user_mode+0x29/0x50
Jan 23 21:40:57 comet kernel: [ 69.698684] ? do_syscall_64+0x67/0x90
Jan 23 21:40:57 comet kernel: [ 69.698690] ? exc_page_fault+0x91/0x1b0
Jan 23 21:40:57 comet kernel: [ 69.698700] entry_SYSCALL_64_after_hwframe+0x63/0xcd
Jan 23 21:40:57 comet kernel: [ 69.698706] RIP: 0033:0x7f31f6f208d4
Jan 23 21:40:57 comet kernel: [ 69.698714] Code: 15 31 55 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 0d dd 0d 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
Jan 23 21:40:57 comet kernel: [ 69.698719] RSP: 002b:00007ffe47e3db88 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
Jan 23 21:40:57 comet kernel: [ 69.698727] RAX: ffffffffffffffda RBX: 0000557d69aff6e0 RCX: 00007f31f6f208d4
Jan 23 21:40:57 comet kernel: [ 69.698732] RDX: 0000000000000000 RSI: 00007ffe47e3dbc0 RDI: 0000000000000004
Jan 23 21:40:57 comet kernel: [ 69.698737] RBP: 0000557d69b02ef0 R08: 0000557d69b0c028 R09: 0000000000000000
Jan 23 21:40:57 comet kernel: [ 69.698741] R10: 0000000000000065 R11: 0000000000000202 R12: 0000557d69b073f0
Jan 23 21:40:57 comet kernel: [ 69.698746] R13: 00007ffe47e3dbc0 R14: 00007ffe47e3ddd0 R15: 0000000000000000
Jan 23 21:40:57 comet kernel: [ 69.698757] </TASK>
Jan 23 21:40:57 comet kernel: [ 69.698761] ---[ end trace 0000000000000000 ]---
Jan 23 21:40:57 comet kernel: [ 69.698768] tun0: ovpn_netlink_packet: sending userspace packet to peer 0...
Jan 23 21:40:58 comet kernel: [ 70.687231] tun0: ovpn_peer_update_local_endpoint: learning local IPv4 for peer 0 (0.0.0.0 -> 192.168.178.25)
Jan 23 21:40:58 comet kernel: [ 70.719934] tun0: ovpn_netlink_send_packet: sending packet to userspace, len: 78
Jan 23 21:40:59 comet kernel: [ 72.112484] sctp: Hash tables configured (bind 256/256)
Jan 23 21:41:03 comet kernel: [ 76.256804] tun0: ovpn_netlink_del_peer: peer id=0
Jan 23 21:41:03 comet kernel: [ 76.278672] tun0: deleting peer with id 0, reason 1
and openvpn output:
2023-01-23 21:40:56 us=482734 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback 'BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-01-23 21:40:56 us=483274 Current Parameter Settings:
2023-01-23 21:40:56 us=483312 config = 'charite-hildeb.ovpn'
2023-01-23 21:40:56 us=483333 mode = 0
2023-01-23 21:40:56 us=483352 persist_config = DISABLED
2023-01-23 21:40:56 us=483371 persist_mode = 1
2023-01-23 21:40:56 us=483388 show_ciphers = DISABLED
2023-01-23 21:40:56 us=483406 show_digests = DISABLED
2023-01-23 21:40:56 us=483424 show_engines = DISABLED
2023-01-23 21:40:56 us=483441 genkey = DISABLED
2023-01-23 21:40:56 us=483459 genkey_filename = '[UNDEF]'
2023-01-23 21:40:56 us=483477 key_pass_file = '[UNDEF]'
2023-01-23 21:40:56 us=483495 show_tls_ciphers = DISABLED
2023-01-23 21:40:56 us=483513 connect_retry_max = 0
2023-01-23 21:40:56 us=483531 Connection profiles [0]:
2023-01-23 21:40:56 us=483549 proto = udp
2023-01-23 21:40:56 us=483568 local = '[UNDEF]'
2023-01-23 21:40:56 us=483586 local_port = '[UNDEF]'
2023-01-23 21:40:56 us=483604 remote = 'openvpn-gw170-ext.charite.de'
2023-01-23 21:40:56 us=483623 remote_port = '1194'
2023-01-23 21:40:56 us=483641 remote_float = DISABLED
2023-01-23 21:40:56 us=483658 bind_defined = DISABLED
2023-01-23 21:40:56 us=483676 bind_local = DISABLED
2023-01-23 21:40:56 us=483694 bind_ipv6_only = DISABLED
2023-01-23 21:40:56 us=483712 connect_retry_seconds = 5
2023-01-23 21:40:56 us=483730 connect_timeout = 120
2023-01-23 21:40:56 us=483748 socks_proxy_server = '[UNDEF]'
2023-01-23 21:40:56 us=483767 socks_proxy_port = '[UNDEF]'
2023-01-23 21:40:56 us=483785 tun_mtu = 1500
2023-01-23 21:40:56 us=483803 tun_mtu_defined = ENABLED
2023-01-23 21:40:56 us=483821 link_mtu = 1500
2023-01-23 21:40:56 us=483839 link_mtu_defined = DISABLED
2023-01-23 21:40:56 us=483857 tun_mtu_extra = 0
2023-01-23 21:40:56 us=483875 tun_mtu_extra_defined = DISABLED
2023-01-23 21:40:56 us=483893 mtu_discover_type = -1
2023-01-23 21:40:56 us=483911 fragment = 0
2023-01-23 21:40:56 us=483929 mssfix = 1492
2023-01-23 21:40:56 us=483947 mssfix_encap = ENABLED
2023-01-23 21:40:56 us=483965 mssfix_fixed = DISABLED
2023-01-23 21:40:56 us=483985 explicit_exit_notification = 1
2023-01-23 21:40:56 us=484003 tls_auth_file = '[INLINE]'
2023-01-23 21:40:56 us=484021 key_direction = 1
2023-01-23 21:40:56 us=484039 tls_crypt_file = '[UNDEF]'
2023-01-23 21:40:56 us=484057 tls_crypt_v2_file = '[UNDEF]'
2023-01-23 21:40:56 us=484075 Connection profiles END
2023-01-23 21:40:56 us=484093 remote_random = DISABLED
2023-01-23 21:40:56 us=484111 ipchange = '[UNDEF]'
2023-01-23 21:40:56 us=484129 dev = 'tun'
2023-01-23 21:40:56 us=484147 dev_type = '[UNDEF]'
2023-01-23 21:40:56 us=484164 dev_node = '[UNDEF]'
2023-01-23 21:40:56 us=484182 tuntap_options.disable_dco = DISABLED
2023-01-23 21:40:56 us=484200 lladdr = '[UNDEF]'
2023-01-23 21:40:56 us=484219 topology = 1
2023-01-23 21:40:56 us=484236 ifconfig_local = '[UNDEF]'
2023-01-23 21:40:56 us=484254 ifconfig_remote_netmask = '[UNDEF]'
2023-01-23 21:40:56 us=484281 ifconfig_noexec = DISABLED
2023-01-23 21:40:56 us=484300 ifconfig_nowarn = DISABLED
2023-01-23 21:40:56 us=484318 ifconfig_ipv6_local = '[UNDEF]'
2023-01-23 21:40:56 us=484384 ifconfig_ipv6_netbits = 0
2023-01-23 21:40:56 us=484406 ifconfig_ipv6_remote = '[UNDEF]'
2023-01-23 21:40:56 us=484424 shaper = 0
2023-01-23 21:40:56 us=484442 mtu_test = 0
2023-01-23 21:40:56 us=484460 mlock = DISABLED
2023-01-23 21:40:56 us=484478 keepalive_ping = 0
2023-01-23 21:40:56 us=484496 keepalive_timeout = 0
2023-01-23 21:40:56 us=484514 inactivity_timeout = 0
2023-01-23 21:40:56 us=484532 inactivity_minimum_bytes = 0
2023-01-23 21:40:56 us=484550 ping_send_timeout = 0
2023-01-23 21:40:56 us=484567 ping_rec_timeout = 0
2023-01-23 21:40:56 us=484585 ping_rec_timeout_action = 0
2023-01-23 21:40:56 us=484624 ping_timer_remote = DISABLED
2023-01-23 21:40:56 us=484645 remap_sigusr1 = 0
2023-01-23 21:40:56 us=484663 persist_tun = DISABLED
2023-01-23 21:40:56 us=484681 persist_local_ip = DISABLED
2023-01-23 21:40:56 us=484699 persist_remote_ip = DISABLED
2023-01-23 21:40:56 us=484717 persist_key = DISABLED
2023-01-23 21:40:56 us=484735 passtos = DISABLED
2023-01-23 21:40:56 us=484753 resolve_retry_seconds = 1000000000
2023-01-23 21:40:56 us=484771 resolve_in_advance = DISABLED
2023-01-23 21:40:56 us=484789 username = '[UNDEF]'
2023-01-23 21:40:56 us=484807 groupname = '[UNDEF]'
2023-01-23 21:40:56 us=484825 chroot_dir = '[UNDEF]'
2023-01-23 21:40:56 us=484843 cd_dir = '[UNDEF]'
2023-01-23 21:40:56 us=484861 writepid = '[UNDEF]'
2023-01-23 21:40:56 us=484879 up_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 21:40:56 us=484897 down_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 21:40:56 us=484915 down_pre = ENABLED
2023-01-23 21:40:56 us=484934 up_restart = DISABLED
2023-01-23 21:40:56 us=484952 up_delay = DISABLED
2023-01-23 21:40:56 us=484969 daemon = DISABLED
2023-01-23 21:40:56 us=484988 log = DISABLED
2023-01-23 21:40:56 us=485006 suppress_timestamps = DISABLED
2023-01-23 21:40:56 us=485024 machine_readable_output = DISABLED
2023-01-23 21:40:56 us=485042 nice = 0
2023-01-23 21:40:56 us=485061 verbosity = 6
2023-01-23 21:40:56 us=485079 mute = 0
2023-01-23 21:40:56 us=485097 gremlin = 0
2023-01-23 21:40:56 us=485115 status_file = '[UNDEF]'
2023-01-23 21:40:56 us=485133 status_file_version = 1
2023-01-23 21:40:56 us=485152 status_file_update_freq = 60
2023-01-23 21:40:56 us=485170 occ = ENABLED
2023-01-23 21:40:56 us=485189 rcvbuf = 0
2023-01-23 21:40:56 us=485207 sndbuf = 0
2023-01-23 21:40:56 us=485225 mark = 0
2023-01-23 21:40:56 us=485243 sockflags = 0
2023-01-23 21:40:56 us=485261 fast_io = DISABLED
2023-01-23 21:40:56 us=485279 comp.alg = 0
2023-01-23 21:40:56 us=485297 comp.flags = 24
2023-01-23 21:40:56 us=485316 route_script = '[UNDEF]'
2023-01-23 21:40:56 us=485335 route_default_gateway = '[UNDEF]'
2023-01-23 21:40:56 us=485353 route_default_metric = 0
2023-01-23 21:40:56 us=485372 route_noexec = DISABLED
2023-01-23 21:40:56 us=485390 route_delay = 0
2023-01-23 21:40:56 us=485409 route_delay_window = 30
2023-01-23 21:40:56 us=485427 route_delay_defined = DISABLED
2023-01-23 21:40:56 us=485446 route_nopull = DISABLED
2023-01-23 21:40:56 us=485464 route_gateway_via_dhcp = DISABLED
2023-01-23 21:40:56 us=485482 allow_pull_fqdn = DISABLED
2023-01-23 21:40:56 us=485501 management_addr = '[UNDEF]'
2023-01-23 21:40:56 us=485520 management_port = '[UNDEF]'
2023-01-23 21:40:56 us=485538 management_user_pass = '[UNDEF]'
2023-01-23 21:40:56 us=485595 management_log_history_cache = 250
2023-01-23 21:40:56 us=485613 management_echo_buffer_size = 100
2023-01-23 21:40:56 us=485631 management_client_user = '[UNDEF]'
2023-01-23 21:40:56 us=485649 management_client_group = '[UNDEF]'
2023-01-23 21:40:56 us=485667 management_flags = 0
2023-01-23 21:40:56 us=485686 shared_secret_file = '[UNDEF]'
2023-01-23 21:40:56 us=485705 key_direction = 1
2023-01-23 21:40:56 us=485724 ciphername = 'BF-CBC'
2023-01-23 21:40:56 us=485743 ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-01-23 21:40:56 us=485762 authname = 'SHA256'
2023-01-23 21:40:56 us=485780 engine = DISABLED
2023-01-23 21:40:56 us=485799 replay = ENABLED
2023-01-23 21:40:56 us=485817 mute_replay_warnings = DISABLED
2023-01-23 21:40:56 us=485836 replay_window = 64
2023-01-23 21:40:56 us=485855 replay_time = 15
2023-01-23 21:40:56 us=485873 packet_id_file = '[UNDEF]'
2023-01-23 21:40:56 us=485892 test_crypto = DISABLED
2023-01-23 21:40:56 us=485911 tls_server = DISABLED
2023-01-23 21:40:56 us=485929 tls_client = ENABLED
2023-01-23 21:40:56 us=485948 ca_file = '[INLINE]'
2023-01-23 21:40:56 us=485966 ca_path = '[UNDEF]'
2023-01-23 21:40:56 us=485985 dh_file = '[UNDEF]'
2023-01-23 21:40:56 us=486015 cert_file = '[INLINE]'
2023-01-23 21:40:56 us=486034 extra_certs_file = '[UNDEF]'
2023-01-23 21:40:56 us=486053 priv_key_file = '[INLINE]'
2023-01-23 21:40:56 us=486072 pkcs12_file = '[UNDEF]'
2023-01-23 21:40:56 us=486090 cipher_list = '[UNDEF]'
2023-01-23 21:40:56 us=486109 cipher_list_tls13 = '[UNDEF]'
2023-01-23 21:40:56 us=486127 tls_cert_profile = '[UNDEF]'
2023-01-23 21:40:56 us=486145 tls_verify = '[UNDEF]'
2023-01-23 21:40:56 us=486164 tls_export_cert = '[UNDEF]'
2023-01-23 21:40:56 us=486182 verify_x509_type = 1
2023-01-23 21:40:56 us=486202 verify_x509_name = 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de'
2023-01-23 21:40:56 us=486220 crl_file = '[UNDEF]'
2023-01-23 21:40:56 us=486240 ns_cert_type = 0
2023-01-23 21:40:56 us=486258 remote_cert_ku[i] = 65535
2023-01-23 21:40:56 us=486276 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486295 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486313 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486331 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486349 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486367 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486385 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486403 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486421 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486439 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486457 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486474 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486492 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486510 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486528 remote_cert_ku[i] = 0
2023-01-23 21:40:56 us=486547 remote_cert_eku = 'TLS Web Server Authentication'
2023-01-23 21:40:56 us=486566 ssl_flags = 192
2023-01-23 21:40:56 us=486584 tls_timeout = 2
2023-01-23 21:40:56 us=486603 renegotiate_bytes = -1
2023-01-23 21:40:56 us=486621 renegotiate_packets = 0
2023-01-23 21:40:56 us=486640 renegotiate_seconds = 0
2023-01-23 21:40:56 us=486658 handshake_window = 60
2023-01-23 21:40:56 us=486676 transition_window = 3600
2023-01-23 21:40:56 us=486695 single_session = DISABLED
2023-01-23 21:40:56 us=486713 push_peer_info = DISABLED
2023-01-23 21:40:56 us=486731 tls_exit = DISABLED
2023-01-23 21:40:56 us=486749 tls_crypt_v2_metadata = '[UNDEF]'
2023-01-23 21:40:56 us=486768 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486786 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486805 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486823 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486841 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486859 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486878 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486896 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486914 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486932 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486951 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486969 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=486987 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=487005 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=487023 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=487042 pkcs11_protected_authentication = DISABLED
2023-01-23 21:40:56 us=487061 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487080 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487098 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487117 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487135 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487153 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487172 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487190 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487219 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487238 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487257 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487275 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487293 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487311 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487329 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487347 pkcs11_private_mode = 00000000
2023-01-23 21:40:56 us=487365 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487383 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487401 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487419 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487437 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487455 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487473 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487491 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487509 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487527 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487545 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487563 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487582 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487600 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487618 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487636 pkcs11_cert_private = DISABLED
2023-01-23 21:40:56 us=487655 pkcs11_pin_cache_period = -1
2023-01-23 21:40:56 us=487673 pkcs11_id = '[UNDEF]'
2023-01-23 21:40:56 us=487692 pkcs11_id_management = DISABLED
2023-01-23 21:40:56 us=487714 server_network = 0.0.0.0
2023-01-23 21:40:56 us=487735 server_netmask = 0.0.0.0
2023-01-23 21:40:56 us=487772 server_network_ipv6 = ::
2023-01-23 21:40:56 us=487793 server_netbits_ipv6 = 0
2023-01-23 21:40:56 us=487813 server_bridge_ip = 0.0.0.0
2023-01-23 21:40:56 us=487833 server_bridge_netmask = 0.0.0.0
2023-01-23 21:40:56 us=487854 server_bridge_pool_start = 0.0.0.0
2023-01-23 21:40:56 us=487874 server_bridge_pool_end = 0.0.0.0
2023-01-23 21:40:56 us=487893 ifconfig_pool_defined = DISABLED
2023-01-23 21:40:56 us=487913 ifconfig_pool_start = 0.0.0.0
2023-01-23 21:40:56 us=487934 ifconfig_pool_end = 0.0.0.0
2023-01-23 21:40:56 us=487954 ifconfig_pool_netmask = 0.0.0.0
2023-01-23 21:40:56 us=487983 ifconfig_pool_persist_filename = '[UNDEF]'
2023-01-23 21:40:56 us=488007 ifconfig_pool_persist_refresh_freq = 600
2023-01-23 21:40:56 us=488029 ifconfig_ipv6_pool_defined = DISABLED
2023-01-23 21:40:56 us=488056 ifconfig_ipv6_pool_base = ::
2023-01-23 21:40:56 us=488084 ifconfig_ipv6_pool_netbits = 0
2023-01-23 21:40:56 us=488109 n_bcast_buf = 256
2023-01-23 21:40:56 us=488132 tcp_queue_limit = 64
2023-01-23 21:40:56 us=488156 real_hash_size = 256
2023-01-23 21:40:56 us=488176 virtual_hash_size = 256
2023-01-23 21:40:56 us=488204 client_connect_script = '[UNDEF]'
2023-01-23 21:40:56 us=488232 learn_address_script = '[UNDEF]'
2023-01-23 21:40:56 us=488257 client_disconnect_script = '[UNDEF]'
2023-01-23 21:40:56 us=488279 client_config_dir = '[UNDEF]'
2023-01-23 21:40:56 us=488305 ccd_exclusive = DISABLED
2023-01-23 21:40:56 us=488361 tmp_dir = '/tmp'
2023-01-23 21:40:56 us=488401 push_ifconfig_defined = DISABLED
2023-01-23 21:40:56 us=488428 push_ifconfig_local = 0.0.0.0
2023-01-23 21:40:56 us=488453 push_ifconfig_remote_netmask = 0.0.0.0
2023-01-23 21:40:56 us=488475 push_ifconfig_ipv6_defined = DISABLED
2023-01-23 21:40:56 us=488501 push_ifconfig_ipv6_local = ::/0
2023-01-23 21:40:56 us=488524 push_ifconfig_ipv6_remote = ::
2023-01-23 21:40:56 us=488546 enable_c2c = DISABLED
2023-01-23 21:40:56 us=488568 duplicate_cn = DISABLED
2023-01-23 21:40:56 us=488590 cf_max = 0
2023-01-23 21:40:56 us=488610 cf_per = 0
2023-01-23 21:40:56 us=488630 max_clients = 1024
2023-01-23 21:40:56 us=488651 max_routes_per_client = 256
2023-01-23 21:40:56 us=488674 auth_user_pass_verify_script = '[UNDEF]'
2023-01-23 21:40:56 us=488717 auth_user_pass_verify_script_via_file = DISABLED
2023-01-23 21:40:56 us=488740 auth_token_generate = DISABLED
2023-01-23 21:40:56 us=488760 auth_token_lifetime = 0
2023-01-23 21:40:56 us=488782 auth_token_secret_file = '[UNDEF]'
2023-01-23 21:40:56 us=488803 port_share_host = '[UNDEF]'
2023-01-23 21:40:56 us=488825 port_share_port = '[UNDEF]'
2023-01-23 21:40:56 us=488848 vlan_tagging = DISABLED
2023-01-23 21:40:56 us=488872 vlan_accept = all
2023-01-23 21:40:56 us=488896 vlan_pvid = 1
2023-01-23 21:40:56 us=488918 client = ENABLED
2023-01-23 21:40:56 us=488940 pull = ENABLED
2023-01-23 21:40:56 us=488966 auth_user_pass_file = 'password.txt'
2023-01-23 21:40:56 us=488996 OpenVPN 2.6_git x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-01-23 21:40:56 us=489047 library versions: OpenSSL 3.0.5 5 Jul 2022, LZO 2.10
2023-01-23 21:40:56 us=489965 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-23 21:40:56 us=496879 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 21:40:56 us=496961 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 21:40:56 us=497217 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 headroom:126 payload:1376 tailroom:126 ET:0 ]
2023-01-23 21:40:56 us=502521 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 21:40:56 us=502716 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client'
2023-01-23 21:40:56 us=502745 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server'
2023-01-23 21:40:56 us=502803 TCP/UDP: Preserving recently used remote address: [AF_INET]193.175.73.170:1194
2023-01-23 21:40:56 us=502871 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-23 21:40:56 us=502901 UDPv4 link local: (not bound)
2023-01-23 21:40:56 us=502924 UDPv4 link remote: [AF_INET]193.175.73.170:1194
2023-01-23 21:40:56 us=504113 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=504191 UDPv4 WRITE [54] to [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2023-01-23 21:40:56 us=504303 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=522495 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2023-01-23 21:40:56 us=522582 TLS: Initial packet from [AF_INET]193.175.73.170:1194, sid=cf80dfe8 301793af
2023-01-23 21:40:56 us=522767 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=522824 UDPv4 WRITE [343] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=277
2023-01-23 21:40:56 us=522932 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=541862 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1136
2023-01-23 21:40:56 us=542726 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=542804 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 ] DATA len=0
2023-01-23 21:40:56 us=542912 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=542969 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1136
2023-01-23 21:40:56 us=543041 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=543080 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 2 ] DATA len=0
2023-01-23 21:40:56 us=543143 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=543190 UDPv4 READ [1173] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 1 ] pid=3 DATA len=1107
2023-01-23 21:40:56 us=545474 VERIFY OK: depth=1, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=Charite-VPN CA, name=EasyRSA, emailAddress=vpn@charite.de
2023-01-23 21:40:56 us=545973 VERIFY KU OK
2023-01-23 21:40:56 us=546015 Validating certificate extended key usage
2023-01-23 21:40:56 us=546037 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-01-23 21:40:56 us=546055 VERIFY EKU OK
2023-01-23 21:40:56 us=546073 VERIFY X509NAME OK: C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 21:40:56 us=546090 VERIFY OK: depth=0, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 21:40:56 us=550785 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=550855 UDPv4 WRITE [1316] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 3 ] pid=2 DATA len=1250
2023-01-23 21:40:56 us=550958 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=551002 UDPv4 WRITE [1304] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=3 DATA len=1250
2023-01-23 21:40:56 us=551077 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=551120 UDPv4 WRITE [940] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=4 DATA len=886
2023-01-23 21:40:56 us=551172 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=568905 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 1 ] DATA len=0
2023-01-23 21:40:56 us=569041 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=569098 UDPv4 READ [70] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 2 1 ] DATA len=0
2023-01-23 21:40:56 us=569140 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=814670 UDPv4 READ [236] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ 4 3 2 1 ] pid=4 DATA len=158
2023-01-23 21:40:56 us=815003 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=815065 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 ] DATA len=0
2023-01-23 21:40:56 us=815168 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=815222 UDPv4 READ [324] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 ] pid=5 DATA len=246
2023-01-23 21:40:56 us=815302 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1549'
2023-01-23 21:40:56 us=815338 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]'
2023-01-23 21:40:56 us=815367 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
2023-01-23 21:40:56 us=815428 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-01-23 21:40:56 us=815468 [openvpn.charite.de] Peer Connection Initiated with [AF_INET]193.175.73.170:1194
2023-01-23 21:40:56 us=815512 dco_update_keys: peer_id=0
2023-01-23 21:40:56 us=815551 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #9 ] [ 5 ] DATA len=0
2023-01-23 21:40:56 us=815613 dco_update_keys: peer_id=0
2023-01-23 21:40:57 us=122237 UDPv4 READ [663] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=6 DATA len=585
2023-01-23 21:40:57 us=122397 SENT CONTROL [openvpn.charite.de]: 'PUSH_REQUEST' (status=1)
2023-01-23 21:40:57 us=122471 dco_update_keys: peer_id=0
2023-01-23 21:40:57 us=122526 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 141.42.1.1,dhcp-option DOMAIN charite.de,route-gateway 172.29.0.1,topology subnet,ping 10,ping-restart 30,route 10.27.0.0 255.255.0.0,route 10.28.0.0 255.254.0.0,route 10.32.0.0 255.224.0.0,route 172.16.0.0 255.254.0.0,route 192.168.192.0 255.255.192.0,route 141.42.0.0 255.255.0.0,route 193.175.72.0 255.255.255.0,route 193.175.74.0 255.255.254.0,route 193.175.174.0 255.255.255.192,route 172.19.252.0 255.255.255.224,route 194.94.4.0 255.255.254.0,ifconfig 172.29.0.2 255.255.248.0,peer-id 0,cipher AES-256-GCM,key-derivation tls-ekm'
2023-01-23 21:40:57 us=122771 OPTIONS IMPORT: timers and/or timeouts modified
2023-01-23 21:40:57 us=122801 OPTIONS IMPORT: --ifconfig/up options modified
2023-01-23 21:40:57 us=122865 OPTIONS IMPORT: route options modified
2023-01-23 21:40:57 us=122886 OPTIONS IMPORT: route-related options modified
2023-01-23 21:40:57 us=122904 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-01-23 21:40:57 us=122922 OPTIONS IMPORT: peer-id set
2023-01-23 21:40:57 us=122940 OPTIONS IMPORT: data channel crypto options modified
2023-01-23 21:40:57 us=122983 net_route_v4_best_gw query: dst 0.0.0.0
2023-01-23 21:40:57 us=123127 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=123176 sitnl_send: rtnl: received 496 bytes
2023-01-23 21:40:57 us=123253 net_route_v4_best_gw result: via 192.168.178.1 dev wlp2s0
2023-01-23 21:40:57 us=123349 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=wlp2s0 HWADDR=d0:c6:37:db:70:77
2023-01-23 21:40:57 us=123769 open_tun_dco: tun0
2023-01-23 21:40:57 us=123802 net_iface_new: add tun0 type ovpn-dco
2023-01-23 21:40:57 us=125271 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=125352 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=125481 ovpn_dco_register
2023-01-23 21:40:57 us=125795 DCO device tun0 opened
2023-01-23 21:40:57 us=125845 do_ifconfig, ipv4=1, ipv6=0
2023-01-23 21:40:57 us=125926 net_iface_mtu_set: mtu 1500 for tun0
2023-01-23 21:40:57 us=126115 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=126172 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=126268 net_iface_up: set tun0 up
2023-01-23 21:40:57 us=127701 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=127786 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=127858 net_addr_v4_add: 172.29.0.2/21 dev tun0
2023-01-23 21:40:57 us=128252 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=128319 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=128490 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 21:40:57 update-systemd-resolved: Link 'tun0' coming up
<14>Jan 23 21:40:57 update-systemd-resolved: Adding IPv4 DNS Server 141.42.1.1
<14>Jan 23 21:40:57 update-systemd-resolved: Adding DNS Domain charite.de
<14>Jan 23 21:40:57 update-systemd-resolved: SetLinkDNS(4 1 2 4 141 42 1 1)
<14>Jan 23 21:40:57 update-systemd-resolved: SetLinkDomains(4 1 charite.de false)
2023-01-23 21:40:57 us=242999 net_route_v4_add: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=243272 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=243335 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=243397 net_route_v4_add: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=243597 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=243657 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=243719 net_route_v4_add: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=243941 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=243998 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=244057 net_route_v4_add: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=244245 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=244308 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=244425 net_route_v4_add: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=244614 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=244673 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=244732 net_route_v4_add: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=244895 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=244956 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=245017 net_route_v4_add: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=245190 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=245246 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=245302 net_route_v4_add: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=245515 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=245572 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=245634 net_route_v4_add: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=245808 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=245865 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=245925 net_route_v4_add: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=246089 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=246145 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=246200 net_route_v4_add: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:40:57 us=246346 sitnl_send: checking for received messages
2023-01-23 21:40:57 us=246405 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:40:57 us=246519 dco_new_peer: peer-id 0, fd 3
2023-01-23 21:40:57 us=246798 Data Channel: using negotiated cipher 'AES-256-GCM'
2023-01-23 21:40:57 us=246966 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 21:40:57 us=247176 dco_install_key: peer_id=0 keyid=0
2023-01-23 21:40:57 us=247225 dco_new_key: slot 0, key-id 0, peer-id 0, cipher AES-256-GCM
2023-01-23 21:40:57 us=258774 dco_set_peer: peer-id 0, keepalive 10/30, mss 1400
2023-01-23 21:40:57 us=258891 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-01-23 21:40:57 us=258930 Initialization Sequence Completed
2023-01-23 21:40:57 us=259009 UDPv4 WRITE [101] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #10 ] [ 6 ] pid=5 DATA len=35
2023-01-23 21:40:57 us=259031 dco_do_write: peer-id 0, len=101
2023-01-23 21:40:57 us=260173 dco_update_keys: peer_id=0
2023-01-23 21:40:58 us=282261 dco_do_read
2023-01-23 21:40:58 us=282390 ovpn-dco: received OVPN_PACKET_ATTR_PACKET, ifindex: 4 peer-id: 0, len 78
2023-01-23 21:40:58 us=282476 UDPv4 READ [78] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #10 ] [ 5 4 3 2 1 ] DATA len=0
2023-01-23 21:40:58 us=282586 dco_update_keys: peer_id=0
2023-01-23 21:41:02 us=676550 event_wait : Interrupted system call (fd=-1,code=4)
2023-01-23 21:41:02 us=676675 SIGTERM received, sending exit notification to peer
2023-01-23 21:41:02 us=676728 dco_update_keys: peer_id=0
2023-01-23 21:41:02 us=676768 Attempting to send data packet while data channel offload is in use. Dropping packet
2023-01-23 21:41:03 us=822416 dco_del_peer: peer-id 0
2023-01-23 21:41:03 us=823152 TCP/UDP: Closing socket
2023-01-23 21:41:03 us=823246 net_route_v4_del: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=823467 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=823536 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=823611 net_route_v4_del: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=823783 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=823843 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=823914 net_route_v4_del: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=824088 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=824150 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=824216 net_route_v4_del: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=824455 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=824532 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=824603 net_route_v4_del: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=824777 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=824847 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=824913 net_route_v4_del: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=825110 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=825218 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=825290 net_route_v4_del: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=825480 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=825541 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=825603 net_route_v4_del: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=825754 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=825819 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=825884 net_route_v4_del: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=826048 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=826109 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=826169 net_route_v4_del: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=826331 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=826390 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=826457 net_route_v4_del: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 21:41:03 us=826921 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=827698 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=827805 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 21:41:03 update-systemd-resolved: Link 'tun0' going down
2023-01-23 21:41:03 us=899355 Closing TUN/TAP interface
2023-01-23 21:41:03 us=899448 net_addr_v4_del: 172.29.0.2 dev tun0
2023-01-23 21:41:03 us=899862 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=899933 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=899987 close_tun_dco
2023-01-23 21:41:03 us=900071 net_iface_del: delete tun0
2023-01-23 21:41:03 us=992808 sitnl_send: checking for received messages
2023-01-23 21:41:03 us=992916 sitnl_send: rtnl: received 36 bytes
2023-01-23 21:41:03 us=993199 SIGTERM[soft,exit-with-notification] received, process exiting
@hildeb I have prepared a branch with some extra debugging messages which will help clearing out some doubts about the exact execution flow. Unfortunately your kernel is not compiled with full debug symbols, so the stacktrace is not fully making sense. This branch should help.
Please recompile ovpn-dco from the debug branch with DEBUG=1. Thanks a lot!
OK, I checkout out the "debug" branch, recompiled with DEBUG=1 and rebooted to make sure everything is pristine:
Jan 23 22:16:13 comet kernel: [ 42.455847] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
Jan 23 22:16:13 comet kernel: [ 42.457556] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-4-g11a549e -- (C) 2020-2022 OpenVPN, Inc.
Jan 23 22:16:41 comet kernel: [ 70.173854] tun0 (uninitialized): ovpn_newlink: setting device (tun0) mode: 0
Jan 23 22:16:41 comet kernel: [ 70.175214] tun0: ovpn_netlink_register_packet: registering userspace at 2365592167
Jan 23 22:16:41 comet kernel: [ 70.176890] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.180688] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.180732] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.180760] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.180783] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.180806] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.180831] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.180856] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.180880] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.180905] tun0: no peer to send data to
Jan 23 22:16:41 comet kernel: [ 70.306732] tun0: ovpn_netlink_new_peer: adding peer with endpoint=193.175.73.170:1194/UDP id=0 VPN-IPv4=0.0.0.0 VPN-IPv6=::
Jan 23 22:16:41 comet kernel: [ 70.319428] ********* Cipher gcm(aes) (encrypt)
Jan 23 22:16:41 comet kernel: [ 70.319438] *** IV size=12
Jan 23 22:16:41 comet kernel: [ 70.319443] *** req size=88
Jan 23 22:16:41 comet kernel: [ 70.319446] *** block size=1
Jan 23 22:16:41 comet kernel: [ 70.319449] *** auth size=16
Jan 23 22:16:41 comet kernel: [ 70.319453] *** alignmask=0x0
Jan 23 22:16:41 comet kernel: [ 70.319469] ********* Cipher gcm(aes) (decrypt)
Jan 23 22:16:41 comet kernel: [ 70.319473] *** IV size=12
Jan 23 22:16:41 comet kernel: [ 70.319476] *** req size=88
Jan 23 22:16:41 comet kernel: [ 70.319479] *** block size=1
Jan 23 22:16:41 comet kernel: [ 70.319482] *** auth size=16
Jan 23 22:16:41 comet kernel: [ 70.319486] *** alignmask=0x0
Jan 23 22:16:41 comet kernel: [ 70.319490] tun0: ovpn_netlink_new_key: new key installed (id=0) for peer 0
Jan 23 22:16:41 comet kernel: [ 70.319653] ovpn_netlink_set_peer: parsing message
Jan 23 22:16:41 comet kernel: [ 70.319658] ovpn_netlink_set_peer: message parsed 0
Jan 23 22:16:41 comet kernel: [ 70.319662] ovpn_netlink_set_peer: setting keepalive: 1
Jan 23 22:16:41 comet kernel: [ 70.319666] tun0: ovpn_peer_keepalive_set: scheduling keepalive for peer 0: interval=10 timeout=30
Jan 23 22:16:41 comet kernel: [ 70.319674] ovpn_netlink_set_peer: set keepalive
Jan 23 22:16:41 comet kernel: [ 70.319898] ------------[ cut here ]------------
Jan 23 22:16:41 comet kernel: [ 70.319902] WARNING: CPU: 7 PID: 4711 at lib/nlattr.c:117 nla_get_range_unsigned+0xe9/0x150
Jan 23 22:16:41 comet kernel: [ 70.319922] Modules linked in: ovpn_dco(OE) ip6_udp_tunnel udp_tunnel ccm rfcomm snd_seq_dummy snd_hrtimer cmac algif_hash algif_skcipher af_alg bnep binfmt_misc zfs(PO) zunicode(PO) zzstd(O) zlua(O) zavl(PO) icp(PO) zcommon(PO) znvpair(PO) spl(O) snd_hda_codec_hdmi snd_ctl_led snd_hda_codec_realtek snd_hda_codec_generic dell_rbtn btusb btrtl uvcvideo btbcm videobuf2_vmalloc btintel videobuf2_memops btmtk videobuf2_v4l2 videobuf2_common bluetooth videodev ecdh_generic mc ecc snd_soc_avs snd_soc_skl snd_soc_hdac_hda snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi intel_tcc_cooling snd_soc_core snd_compress x86_pkg_temp_thermal ac97_bus snd_pcm_dmaengine intel_powerclamp iwlmvm snd_hda_intel coretemp snd_intel_dspcfg dell_laptop snd_intel_sdw_acpi snd_hda_codec joydev kvm_intel mac80211 snd_hda_core dell_wmi i915 mei_pxp mei_hdcp intel_rapl_msr libarc4 ledtrig_audio snd_hwdep kvm snd_pcm dell_smm_hwmon drm_buddy snd_seq_midi ttm crct10dif_pclmul
Jan 23 22:16:41 comet kernel: [ 70.320121] snd_seq_midi_event ghash_clmulni_intel iwlwifi aesni_intel snd_rawmidi crypto_simd drm_display_helper cryptd dell_smbios rapl cec intel_wmi_thunderbolt snd_seq intel_cstate dcdbas rc_core cfg80211 snd_seq_device input_leds snd_timer drm_kms_helper wmi_bmof processor_thermal_device_pci_legacy dell_wmi_sysman processor_thermal_device serio_raw dell_wmi_descriptor firmware_attributes_class i2c_algo_bit ee1004 hid_multitouch processor_thermal_rfim snd fb_sys_fops processor_thermal_mbox syscopyarea processor_thermal_rapl sysfillrect intel_xhci_usb_role_switch soundcore sysimgblt nls_iso8859_1 ucsi_acpi mei_me typec_ucsi intel_rapl_common intel_pch_thermal intel_soc_dts_iosf mei typec intel_hid int3400_thermal int3403_thermal dell_smo8800 acpi_thermal_rel int340x_thermal_zone mac_hid sparse_keymap acpi_pad msr parport_pc ppdev lp parport drm ramoops pstore_blk reed_solomon pstore_zone efi_pstore ip_tables x_tables autofs4 usbhid hid_generic rtsx_pci_sdmmc crc32_pclmul i2c_i801
Jan 23 22:16:41 comet kernel: [ 70.320295] rtsx_pci intel_lpss_pci i2c_smbus e1000e i2c_hid_acpi intel_lpss ahci i2c_hid xhci_pci libahci idma64 xhci_pci_renesas wmi hid video
Jan 23 22:16:41 comet kernel: [ 70.320332] CPU: 7 PID: 4711 Comm: openvpn Tainted: P U OE 5.19.0-30-generic #31-Ubuntu
Jan 23 22:16:41 comet kernel: [ 70.320340] Hardware name: Dell Inc. Latitude 5590/0MM81M, BIOS 1.26.0 11/20/2022
Jan 23 22:16:41 comet kernel: [ 70.320345] RIP: 0010:nla_get_range_unsigned+0xe9/0x150
Jan 23 22:16:41 comet kernel: [ 70.320356] Code: ff ff 00 00 3c 0b 0f 84 72 ff ff ff 48 c7 c2 ff ff ff ff 3c 04 0f 84 63 ff ff ff 0f 0b 31 c0 31 d2 31 f6 31 ff c3 cc cc cc cc <0f> 0b 48 c7 06 00 00 00 00 0f b6 07 3c 03 0f 85 31 ff ff ff ba ff
Jan 23 22:16:41 comet kernel: [ 70.320363] RSP: 0018:ffffb2cec11af6f0 EFLAGS: 00010286
Jan 23 22:16:41 comet kernel: [ 70.320371] RAX: 0000000000000000 RBX: 000000000000000b RCX: 000000000000003e
Jan 23 22:16:41 comet kernel: [ 70.320375] RDX: ffffb2cec11afa68 RSI: ffffb2cec11af708 RDI: ffffffffc0d7fb90
Jan 23 22:16:41 comet kernel: [ 70.320380] RBP: ffffb2cec11af748 R08: ffffb2cec11af708 R09: 0000000000000001
Jan 23 22:16:41 comet kernel: [ 70.320385] R10: ffffb2cec11afa68 R11: 0000000000000000 R12: ffffffffc0d7fb90
Jan 23 22:16:41 comet kernel: [ 70.320389] R13: ffff988fb327dc28 R14: ffffb2cec11afa68 R15: 0000000000000000
Jan 23 22:16:41 comet kernel: [ 70.320394] FS: 00007f245806d800(0000) GS:ffff98929f5c0000(0000) knlGS:0000000000000000
Jan 23 22:16:41 comet kernel: [ 70.320401] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jan 23 22:16:41 comet kernel: [ 70.320406] CR2: 000055a3cacee7e8 CR3: 00000001935a4006 CR4: 00000000003706e0
Jan 23 22:16:41 comet kernel: [ 70.320412] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Jan 23 22:16:41 comet kernel: [ 70.320416] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Jan 23 22:16:41 comet kernel: [ 70.320421] Call Trace:
Jan 23 22:16:41 comet kernel: [ 70.320425] <TASK>
Jan 23 22:16:41 comet kernel: [ 70.320428] ? nla_validate_int_range+0x81/0x2d0
Jan 23 22:16:41 comet kernel: [ 70.320443] ? _prb_read_valid+0x26a/0x2f0
Jan 23 22:16:41 comet kernel: [ 70.320461] validate_nla+0x4b3/0x790
Jan 23 22:16:41 comet kernel: [ 70.320475] __nla_validate_parse+0x11f/0x190
Jan 23 22:16:41 comet kernel: [ 70.320488] validate_nla+0x221/0x790
Jan 23 22:16:41 comet kernel: [ 70.320502] __nla_validate_parse+0x11f/0x190
Jan 23 22:16:41 comet kernel: [ 70.320513] __nla_parse+0x23/0x40
Jan 23 22:16:41 comet kernel: [ 70.320523] genl_family_rcv_msg_attrs_parse.constprop.0+0x93/0x100
Jan 23 22:16:41 comet kernel: [ 70.320538] genl_family_rcv_msg_doit+0x77/0x180
Jan 23 22:16:41 comet kernel: [ 70.320554] genl_rcv_msg+0xf0/0x200
Jan 23 22:16:41 comet kernel: [ 70.320564] ? nla_parse_nested.constprop.0+0x90/0x90 [ovpn_dco]
Jan 23 22:16:41 comet kernel: [ 70.320584] ? genl_get_cmd+0x120/0x120
Jan 23 22:16:41 comet kernel: [ 70.320594] netlink_rcv_skb+0x54/0x110
Jan 23 22:16:41 comet kernel: [ 70.320607] genl_rcv+0x28/0x50
Jan 23 22:16:41 comet kernel: [ 70.320615] netlink_unicast+0x244/0x390
Jan 23 22:16:41 comet kernel: [ 70.320627] netlink_sendmsg+0x25e/0x4e0
Jan 23 22:16:41 comet kernel: [ 70.320640] sock_sendmsg+0x6a/0x70
Jan 23 22:16:41 comet kernel: [ 70.320652] ____sys_sendmsg+0x277/0x2c0
Jan 23 22:16:41 comet kernel: [ 70.320661] ? import_iovec+0x1b/0x30
Jan 23 22:16:41 comet kernel: [ 70.320677] ___sys_sendmsg+0x96/0xe0
Jan 23 22:16:41 comet kernel: [ 70.320698] __sys_sendmsg+0x86/0xf0
Jan 23 22:16:41 comet kernel: [ 70.320709] __x64_sys_sendmsg+0x1d/0x30
Jan 23 22:16:41 comet kernel: [ 70.320715] do_syscall_64+0x58/0x90
Jan 23 22:16:41 comet kernel: [ 70.320724] ? syscall_exit_to_user_mode+0x29/0x50
Jan 23 22:16:41 comet kernel: [ 70.320735] ? do_syscall_64+0x67/0x90
Jan 23 22:16:41 comet kernel: [ 70.320744] ? do_user_addr_fault+0x1df/0x680
Jan 23 22:16:41 comet kernel: [ 70.320755] ? exit_to_user_mode_prepare+0x30/0xb0
Jan 23 22:16:41 comet kernel: [ 70.320768] ? irqentry_exit_to_user_mode+0x9/0x20
Jan 23 22:16:41 comet kernel: [ 70.320778] ? irqentry_exit+0x43/0x50
Jan 23 22:16:41 comet kernel: [ 70.320786] ? exc_page_fault+0x91/0x1b0
Jan 23 22:16:41 comet kernel: [ 70.320796] entry_SYSCALL_64_after_hwframe+0x63/0xcd
Jan 23 22:16:41 comet kernel: [ 70.320803] RIP: 0033:0x7f24579208d4
Jan 23 22:16:41 comet kernel: [ 70.320811] Code: 15 31 55 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 0d dd 0d 00 00 74 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
Jan 23 22:16:41 comet kernel: [ 70.320816] RSP: 002b:00007ffd50544328 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
Jan 23 22:16:41 comet kernel: [ 70.320825] RAX: ffffffffffffffda RBX: 000055a3cad766e0 RCX: 00007f24579208d4
Jan 23 22:16:41 comet kernel: [ 70.320830] RDX: 0000000000000000 RSI: 00007ffd50544360 RDI: 0000000000000004
Jan 23 22:16:41 comet kernel: [ 70.320834] RBP: 000055a3cad8ef90 R08: 000055a3cad83028 R09: 0000000000000000
Jan 23 22:16:41 comet kernel: [ 70.320838] R10: 000000000000003e R11: 0000000000000202 R12: 000055a3cad7e3f0
Jan 23 22:16:41 comet kernel: [ 70.320843] R13: 00007ffd50544360 R14: 00007ffd50544570 R15: 0000000000000000
Jan 23 22:16:41 comet kernel: [ 70.320855] </TASK>
Jan 23 22:16:41 comet kernel: [ 70.320858] ---[ end trace 0000000000000000 ]---
Jan 23 22:16:41 comet kernel: [ 70.320865] ovpn_netlink_packet:, received packet. parsing
Jan 23 22:16:41 comet kernel: [ 70.320868] ovpn_netlink_packet: parsed: 0
Jan 23 22:16:41 comet kernel: [ 70.320872] tun0: ovpn_netlink_packet: sending userspace packet to peer 0...
Jan 23 22:16:43 comet kernel: [ 71.849944] tun0: ovpn_peer_update_local_endpoint: learning local IPv4 for peer 0 (0.0.0.0 -> 192.168.178.25)
Jan 23 22:16:45 comet kernel: [ 73.876963] sctp: Hash tables configured (bind 256/256)
Jan 23 22:16:48 comet kernel: [ 77.313354] tun0: ovpn_netlink_del_peer: peer id=0
Jan 23 22:16:48 comet kernel: [ 77.354351] tun0: deleting peer with id 0, reason 1
and openvpn output:
2023-01-23 22:16:40 us=917531 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback 'BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-01-23 22:16:40 us=918446 Current Parameter Settings:
2023-01-23 22:16:40 us=918486 config = 'charite-hildeb.ovpn'
2023-01-23 22:16:40 us=918508 mode = 0
2023-01-23 22:16:40 us=918527 persist_config = DISABLED
2023-01-23 22:16:40 us=918546 persist_mode = 1
2023-01-23 22:16:40 us=918564 show_ciphers = DISABLED
2023-01-23 22:16:40 us=918582 show_digests = DISABLED
2023-01-23 22:16:40 us=918599 show_engines = DISABLED
2023-01-23 22:16:40 us=918617 genkey = DISABLED
2023-01-23 22:16:40 us=918635 genkey_filename = '[UNDEF]'
2023-01-23 22:16:40 us=918654 key_pass_file = '[UNDEF]'
2023-01-23 22:16:40 us=918672 show_tls_ciphers = DISABLED
2023-01-23 22:16:40 us=918690 connect_retry_max = 0
2023-01-23 22:16:40 us=918708 Connection profiles [0]:
2023-01-23 22:16:40 us=918727 proto = udp
2023-01-23 22:16:40 us=918746 local = '[UNDEF]'
2023-01-23 22:16:40 us=918764 local_port = '[UNDEF]'
2023-01-23 22:16:40 us=918783 remote = 'openvpn-gw170-ext.charite.de'
2023-01-23 22:16:40 us=918801 remote_port = '1194'
2023-01-23 22:16:40 us=918819 remote_float = DISABLED
2023-01-23 22:16:40 us=918837 bind_defined = DISABLED
2023-01-23 22:16:40 us=918855 bind_local = DISABLED
2023-01-23 22:16:40 us=918873 bind_ipv6_only = DISABLED
2023-01-23 22:16:40 us=918891 connect_retry_seconds = 5
2023-01-23 22:16:40 us=918909 connect_timeout = 120
2023-01-23 22:16:40 us=918928 socks_proxy_server = '[UNDEF]'
2023-01-23 22:16:40 us=918946 socks_proxy_port = '[UNDEF]'
2023-01-23 22:16:40 us=918965 tun_mtu = 1500
2023-01-23 22:16:40 us=918983 tun_mtu_defined = ENABLED
2023-01-23 22:16:40 us=919001 link_mtu = 1500
2023-01-23 22:16:40 us=919019 link_mtu_defined = DISABLED
2023-01-23 22:16:40 us=919074 tun_mtu_extra = 0
2023-01-23 22:16:40 us=919093 tun_mtu_extra_defined = DISABLED
2023-01-23 22:16:40 us=919111 mtu_discover_type = -1
2023-01-23 22:16:40 us=919130 fragment = 0
2023-01-23 22:16:40 us=919148 mssfix = 1492
2023-01-23 22:16:40 us=919166 mssfix_encap = ENABLED
2023-01-23 22:16:40 us=919185 mssfix_fixed = DISABLED
2023-01-23 22:16:40 us=919205 explicit_exit_notification = 1
2023-01-23 22:16:40 us=919223 tls_auth_file = '[INLINE]'
2023-01-23 22:16:40 us=919242 key_direction = 1
2023-01-23 22:16:40 us=919260 tls_crypt_file = '[UNDEF]'
2023-01-23 22:16:40 us=919278 tls_crypt_v2_file = '[UNDEF]'
2023-01-23 22:16:40 us=919296 Connection profiles END
2023-01-23 22:16:40 us=919314 remote_random = DISABLED
2023-01-23 22:16:40 us=919332 ipchange = '[UNDEF]'
2023-01-23 22:16:40 us=919351 dev = 'tun'
2023-01-23 22:16:40 us=919369 dev_type = '[UNDEF]'
2023-01-23 22:16:40 us=919386 dev_node = '[UNDEF]'
2023-01-23 22:16:40 us=919405 tuntap_options.disable_dco = DISABLED
2023-01-23 22:16:40 us=919423 lladdr = '[UNDEF]'
2023-01-23 22:16:40 us=919441 topology = 1
2023-01-23 22:16:40 us=919459 ifconfig_local = '[UNDEF]'
2023-01-23 22:16:40 us=919477 ifconfig_remote_netmask = '[UNDEF]'
2023-01-23 22:16:40 us=919505 ifconfig_noexec = DISABLED
2023-01-23 22:16:40 us=919524 ifconfig_nowarn = DISABLED
2023-01-23 22:16:40 us=919542 ifconfig_ipv6_local = '[UNDEF]'
2023-01-23 22:16:40 us=919561 ifconfig_ipv6_netbits = 0
2023-01-23 22:16:40 us=919579 ifconfig_ipv6_remote = '[UNDEF]'
2023-01-23 22:16:40 us=919597 shaper = 0
2023-01-23 22:16:40 us=919633 mtu_test = 0
2023-01-23 22:16:40 us=919653 mlock = DISABLED
2023-01-23 22:16:40 us=919672 keepalive_ping = 0
2023-01-23 22:16:40 us=919690 keepalive_timeout = 0
2023-01-23 22:16:40 us=919711 inactivity_timeout = 0
2023-01-23 22:16:40 us=919729 inactivity_minimum_bytes = 0
2023-01-23 22:16:40 us=919747 ping_send_timeout = 0
2023-01-23 22:16:40 us=919765 ping_rec_timeout = 0
2023-01-23 22:16:40 us=919783 ping_rec_timeout_action = 0
2023-01-23 22:16:40 us=919820 ping_timer_remote = DISABLED
2023-01-23 22:16:40 us=919840 remap_sigusr1 = 0
2023-01-23 22:16:40 us=919858 persist_tun = DISABLED
2023-01-23 22:16:40 us=919877 persist_local_ip = DISABLED
2023-01-23 22:16:40 us=919895 persist_remote_ip = DISABLED
2023-01-23 22:16:40 us=919913 persist_key = DISABLED
2023-01-23 22:16:40 us=919932 passtos = DISABLED
2023-01-23 22:16:40 us=919950 resolve_retry_seconds = 1000000000
2023-01-23 22:16:40 us=919969 resolve_in_advance = DISABLED
2023-01-23 22:16:40 us=919987 username = '[UNDEF]'
2023-01-23 22:16:40 us=920005 groupname = '[UNDEF]'
2023-01-23 22:16:40 us=920023 chroot_dir = '[UNDEF]'
2023-01-23 22:16:40 us=920041 cd_dir = '[UNDEF]'
2023-01-23 22:16:40 us=920059 writepid = '[UNDEF]'
2023-01-23 22:16:40 us=920077 up_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 22:16:40 us=920096 down_script = '/etc/openvpn/update-systemd-resolved'
2023-01-23 22:16:40 us=920114 down_pre = ENABLED
2023-01-23 22:16:40 us=920132 up_restart = DISABLED
2023-01-23 22:16:40 us=920150 up_delay = DISABLED
2023-01-23 22:16:40 us=920168 daemon = DISABLED
2023-01-23 22:16:40 us=920186 log = DISABLED
2023-01-23 22:16:40 us=920204 suppress_timestamps = DISABLED
2023-01-23 22:16:40 us=920223 machine_readable_output = DISABLED
2023-01-23 22:16:40 us=920241 nice = 0
2023-01-23 22:16:40 us=920259 verbosity = 6
2023-01-23 22:16:40 us=920278 mute = 0
2023-01-23 22:16:40 us=920296 gremlin = 0
2023-01-23 22:16:40 us=920314 status_file = '[UNDEF]'
2023-01-23 22:16:40 us=920332 status_file_version = 1
2023-01-23 22:16:40 us=920351 status_file_update_freq = 60
2023-01-23 22:16:40 us=920369 occ = ENABLED
2023-01-23 22:16:40 us=920388 rcvbuf = 0
2023-01-23 22:16:40 us=920406 sndbuf = 0
2023-01-23 22:16:40 us=920424 mark = 0
2023-01-23 22:16:40 us=920443 sockflags = 0
2023-01-23 22:16:40 us=920461 fast_io = DISABLED
2023-01-23 22:16:40 us=920479 comp.alg = 0
2023-01-23 22:16:40 us=920498 comp.flags = 24
2023-01-23 22:16:40 us=920517 route_script = '[UNDEF]'
2023-01-23 22:16:40 us=920535 route_default_gateway = '[UNDEF]'
2023-01-23 22:16:40 us=920554 route_default_metric = 0
2023-01-23 22:16:40 us=920572 route_noexec = DISABLED
2023-01-23 22:16:40 us=920590 route_delay = 0
2023-01-23 22:16:40 us=920609 route_delay_window = 30
2023-01-23 22:16:40 us=920627 route_delay_defined = DISABLED
2023-01-23 22:16:40 us=920646 route_nopull = DISABLED
2023-01-23 22:16:40 us=920664 route_gateway_via_dhcp = DISABLED
2023-01-23 22:16:40 us=920683 allow_pull_fqdn = DISABLED
2023-01-23 22:16:40 us=920702 management_addr = '[UNDEF]'
2023-01-23 22:16:40 us=920721 management_port = '[UNDEF]'
2023-01-23 22:16:40 us=920739 management_user_pass = '[UNDEF]'
2023-01-23 22:16:40 us=920758 management_log_history_cache = 250
2023-01-23 22:16:40 us=920776 management_echo_buffer_size = 100
2023-01-23 22:16:40 us=920795 management_client_user = '[UNDEF]'
2023-01-23 22:16:40 us=920813 management_client_group = '[UNDEF]'
2023-01-23 22:16:40 us=920832 management_flags = 0
2023-01-23 22:16:40 us=920850 shared_secret_file = '[UNDEF]'
2023-01-23 22:16:40 us=920869 key_direction = 1
2023-01-23 22:16:40 us=920888 ciphername = 'BF-CBC'
2023-01-23 22:16:40 us=920906 ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-01-23 22:16:40 us=920925 authname = 'SHA256'
2023-01-23 22:16:40 us=920944 engine = DISABLED
2023-01-23 22:16:40 us=920962 replay = ENABLED
2023-01-23 22:16:40 us=920981 mute_replay_warnings = DISABLED
2023-01-23 22:16:40 us=920999 replay_window = 64
2023-01-23 22:16:40 us=921018 replay_time = 15
2023-01-23 22:16:40 us=921037 packet_id_file = '[UNDEF]'
2023-01-23 22:16:40 us=921055 test_crypto = DISABLED
2023-01-23 22:16:40 us=921073 tls_server = DISABLED
2023-01-23 22:16:40 us=921092 tls_client = ENABLED
2023-01-23 22:16:40 us=921110 ca_file = '[INLINE]'
2023-01-23 22:16:40 us=921129 ca_path = '[UNDEF]'
2023-01-23 22:16:40 us=921147 dh_file = '[UNDEF]'
2023-01-23 22:16:40 us=921178 cert_file = '[INLINE]'
2023-01-23 22:16:40 us=921197 extra_certs_file = '[UNDEF]'
2023-01-23 22:16:40 us=921216 priv_key_file = '[INLINE]'
2023-01-23 22:16:40 us=921235 pkcs12_file = '[UNDEF]'
2023-01-23 22:16:40 us=921254 cipher_list = '[UNDEF]'
2023-01-23 22:16:40 us=921272 cipher_list_tls13 = '[UNDEF]'
2023-01-23 22:16:40 us=921290 tls_cert_profile = '[UNDEF]'
2023-01-23 22:16:40 us=921309 tls_verify = '[UNDEF]'
2023-01-23 22:16:40 us=921327 tls_export_cert = '[UNDEF]'
2023-01-23 22:16:40 us=921345 verify_x509_type = 1
2023-01-23 22:16:40 us=921365 verify_x509_name = 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de'
2023-01-23 22:16:40 us=921384 crl_file = '[UNDEF]'
2023-01-23 22:16:40 us=921402 ns_cert_type = 0
2023-01-23 22:16:40 us=921421 remote_cert_ku[i] = 65535
2023-01-23 22:16:40 us=921440 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921458 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921476 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921494 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921513 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921531 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921549 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921568 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921586 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921604 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921622 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921640 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921658 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921676 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921694 remote_cert_ku[i] = 0
2023-01-23 22:16:40 us=921713 remote_cert_eku = 'TLS Web Server Authentication'
2023-01-23 22:16:40 us=921731 ssl_flags = 192
2023-01-23 22:16:40 us=921750 tls_timeout = 2
2023-01-23 22:16:40 us=921769 renegotiate_bytes = -1
2023-01-23 22:16:40 us=921787 renegotiate_packets = 0
2023-01-23 22:16:40 us=921806 renegotiate_seconds = 0
2023-01-23 22:16:40 us=921824 handshake_window = 60
2023-01-23 22:16:40 us=921843 transition_window = 3600
2023-01-23 22:16:40 us=921861 single_session = DISABLED
2023-01-23 22:16:40 us=921880 push_peer_info = DISABLED
2023-01-23 22:16:40 us=921898 tls_exit = DISABLED
2023-01-23 22:16:40 us=921917 tls_crypt_v2_metadata = '[UNDEF]'
2023-01-23 22:16:40 us=921936 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=921954 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=921973 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=921992 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922010 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922028 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922047 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922065 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922084 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922102 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922120 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922139 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922157 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922175 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922193 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922212 pkcs11_protected_authentication = DISABLED
2023-01-23 22:16:40 us=922231 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922250 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922269 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922288 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922307 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922325 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922344 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922362 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922392 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922411 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922430 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922448 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922466 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922485 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922503 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922521 pkcs11_private_mode = 00000000
2023-01-23 22:16:40 us=922539 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922557 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922575 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922593 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922611 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922629 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922647 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922665 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922683 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922701 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922719 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922738 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922756 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922774 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922792 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922810 pkcs11_cert_private = DISABLED
2023-01-23 22:16:40 us=922829 pkcs11_pin_cache_period = -1
2023-01-23 22:16:40 us=922847 pkcs11_id = '[UNDEF]'
2023-01-23 22:16:40 us=922866 pkcs11_id_management = DISABLED
2023-01-23 22:16:40 us=922888 server_network = 0.0.0.0
2023-01-23 22:16:40 us=922908 server_netmask = 0.0.0.0
2023-01-23 22:16:40 us=922941 server_network_ipv6 = ::
2023-01-23 22:16:40 us=922961 server_netbits_ipv6 = 0
2023-01-23 22:16:40 us=922981 server_bridge_ip = 0.0.0.0
2023-01-23 22:16:40 us=923000 server_bridge_netmask = 0.0.0.0
2023-01-23 22:16:40 us=923020 server_bridge_pool_start = 0.0.0.0
2023-01-23 22:16:40 us=923039 server_bridge_pool_end = 0.0.0.0
2023-01-23 22:16:40 us=923058 ifconfig_pool_defined = DISABLED
2023-01-23 22:16:40 us=923077 ifconfig_pool_start = 0.0.0.0
2023-01-23 22:16:40 us=923096 ifconfig_pool_end = 0.0.0.0
2023-01-23 22:16:40 us=923116 ifconfig_pool_netmask = 0.0.0.0
2023-01-23 22:16:40 us=923142 ifconfig_pool_persist_filename = '[UNDEF]'
2023-01-23 22:16:40 us=923162 ifconfig_pool_persist_refresh_freq = 600
2023-01-23 22:16:40 us=923181 ifconfig_ipv6_pool_defined = DISABLED
2023-01-23 22:16:40 us=923201 ifconfig_ipv6_pool_base = ::
2023-01-23 22:16:40 us=923219 ifconfig_ipv6_pool_netbits = 0
2023-01-23 22:16:40 us=923238 n_bcast_buf = 256
2023-01-23 22:16:40 us=923257 tcp_queue_limit = 64
2023-01-23 22:16:40 us=923275 real_hash_size = 256
2023-01-23 22:16:40 us=923293 virtual_hash_size = 256
2023-01-23 22:16:40 us=923311 client_connect_script = '[UNDEF]'
2023-01-23 22:16:40 us=923330 learn_address_script = '[UNDEF]'
2023-01-23 22:16:40 us=923348 client_disconnect_script = '[UNDEF]'
2023-01-23 22:16:40 us=923366 client_config_dir = '[UNDEF]'
2023-01-23 22:16:40 us=923384 ccd_exclusive = DISABLED
2023-01-23 22:16:40 us=923402 tmp_dir = '/tmp'
2023-01-23 22:16:40 us=923421 push_ifconfig_defined = DISABLED
2023-01-23 22:16:40 us=923440 push_ifconfig_local = 0.0.0.0
2023-01-23 22:16:40 us=923460 push_ifconfig_remote_netmask = 0.0.0.0
2023-01-23 22:16:40 us=923478 push_ifconfig_ipv6_defined = DISABLED
2023-01-23 22:16:40 us=923498 push_ifconfig_ipv6_local = ::/0
2023-01-23 22:16:40 us=923517 push_ifconfig_ipv6_remote = ::
2023-01-23 22:16:40 us=923536 enable_c2c = DISABLED
2023-01-23 22:16:40 us=923554 duplicate_cn = DISABLED
2023-01-23 22:16:40 us=923573 cf_max = 0
2023-01-23 22:16:40 us=923591 cf_per = 0
2023-01-23 22:16:40 us=923610 max_clients = 1024
2023-01-23 22:16:40 us=923651 max_routes_per_client = 256
2023-01-23 22:16:40 us=923671 auth_user_pass_verify_script = '[UNDEF]'
2023-01-23 22:16:40 us=923702 auth_user_pass_verify_script_via_file = DISABLED
2023-01-23 22:16:40 us=923724 auth_token_generate = DISABLED
2023-01-23 22:16:40 us=923742 auth_token_lifetime = 0
2023-01-23 22:16:40 us=923760 auth_token_secret_file = '[UNDEF]'
2023-01-23 22:16:40 us=923779 port_share_host = '[UNDEF]'
2023-01-23 22:16:40 us=923797 port_share_port = '[UNDEF]'
2023-01-23 22:16:40 us=923815 vlan_tagging = DISABLED
2023-01-23 22:16:40 us=923834 vlan_accept = all
2023-01-23 22:16:40 us=923852 vlan_pvid = 1
2023-01-23 22:16:40 us=923871 client = ENABLED
2023-01-23 22:16:40 us=923889 pull = ENABLED
2023-01-23 22:16:40 us=923908 auth_user_pass_file = 'password.txt'
2023-01-23 22:16:40 us=923929 OpenVPN 2.6_git x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-01-23 22:16:40 us=923969 library versions: OpenSSL 3.0.5 5 Jul 2022, LZO 2.10
2023-01-23 22:16:40 us=924649 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-23 22:16:40 us=931404 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 22:16:40 us=931480 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-23 22:16:40 us=931760 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 headroom:126 payload:1376 tailroom:126 ET:0 ]
2023-01-23 22:16:40 us=971486 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 22:16:40 us=971707 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client'
2023-01-23 22:16:40 us=971742 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server'
2023-01-23 22:16:40 us=971801 TCP/UDP: Preserving recently used remote address: [AF_INET]193.175.73.170:1194
2023-01-23 22:16:40 us=971868 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-23 22:16:40 us=971898 UDPv4 link local: (not bound)
2023-01-23 22:16:40 us=971921 UDPv4 link remote: [AF_INET]193.175.73.170:1194
2023-01-23 22:16:40 us=973048 dco_update_keys: peer_id=0
2023-01-23 22:16:40 us=973128 UDPv4 WRITE [54] to [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2023-01-23 22:16:40 us=973236 dco_update_keys: peer_id=0
2023-01-23 22:16:40 us=990371 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2023-01-23 22:16:40 us=990457 TLS: Initial packet from [AF_INET]193.175.73.170:1194, sid=b0ff83bc b185c913
2023-01-23 22:16:40 us=990642 dco_update_keys: peer_id=0
2023-01-23 22:16:40 us=990699 UDPv4 WRITE [343] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=277
2023-01-23 22:16:40 us=990801 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=10821 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1136
2023-01-23 22:16:41 us=11716 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=11793 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 ] DATA len=0
2023-01-23 22:16:41 us=11903 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=11959 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1136
2023-01-23 22:16:41 us=12032 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=12072 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 2 ] DATA len=0
2023-01-23 22:16:41 us=12132 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=12184 UDPv4 READ [1173] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 1 ] pid=3 DATA len=1107
2023-01-23 22:16:41 us=14425 VERIFY OK: depth=1, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=Charite-VPN CA, name=EasyRSA, emailAddress=vpn@charite.de
2023-01-23 22:16:41 us=14923 VERIFY KU OK
2023-01-23 22:16:41 us=14964 Validating certificate extended key usage
2023-01-23 22:16:41 us=14985 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-01-23 22:16:41 us=15003 VERIFY EKU OK
2023-01-23 22:16:41 us=15021 VERIFY X509NAME OK: C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 22:16:41 us=15039 VERIFY OK: depth=0, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-23 22:16:41 us=19842 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=19912 UDPv4 WRITE [1316] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 3 ] pid=2 DATA len=1250
2023-01-23 22:16:41 us=20014 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=20061 UDPv4 WRITE [1304] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=3 DATA len=1250
2023-01-23 22:16:41 us=20136 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=20176 UDPv4 WRITE [940] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=4 DATA len=886
2023-01-23 22:16:41 us=20226 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=37754 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 1 ] DATA len=0
2023-01-23 22:16:41 us=37889 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=37946 UDPv4 READ [70] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 2 1 ] DATA len=0
2023-01-23 22:16:41 us=37988 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=218821 UDPv4 READ [236] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ 4 3 2 1 ] pid=4 DATA len=158
2023-01-23 22:16:41 us=219207 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=219279 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 ] DATA len=0
2023-01-23 22:16:41 us=219394 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=219457 UDPv4 READ [324] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 ] pid=5 DATA len=246
2023-01-23 22:16:41 us=219551 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1549'
2023-01-23 22:16:41 us=219595 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]'
2023-01-23 22:16:41 us=219669 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
2023-01-23 22:16:41 us=219744 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-01-23 22:16:41 us=219793 [openvpn.charite.de] Peer Connection Initiated with [AF_INET]193.175.73.170:1194
2023-01-23 22:16:41 us=219847 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=219895 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #9 ] [ 5 ] DATA len=0
2023-01-23 22:16:41 us=219969 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=525716 UDPv4 READ [663] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=6 DATA len=585
2023-01-23 22:16:41 us=525895 dco_update_keys: peer_id=0
2023-01-23 22:16:41 us=525958 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 141.42.1.1,dhcp-option DOMAIN charite.de,route-gateway 172.29.0.1,topology subnet,ping 10,ping-restart 30,route 10.27.0.0 255.255.0.0,route 10.28.0.0 255.254.0.0,route 10.32.0.0 255.224.0.0,route 172.16.0.0 255.254.0.0,route 192.168.192.0 255.255.192.0,route 141.42.0.0 255.255.0.0,route 193.175.72.0 255.255.255.0,route 193.175.74.0 255.255.254.0,route 193.175.174.0 255.255.255.192,route 172.19.252.0 255.255.255.224,route 194.94.4.0 255.255.254.0,ifconfig 172.29.0.2 255.255.248.0,peer-id 0,cipher AES-256-GCM,key-derivation tls-ekm'
2023-01-23 22:16:41 us=526202 OPTIONS IMPORT: timers and/or timeouts modified
2023-01-23 22:16:41 us=526231 OPTIONS IMPORT: --ifconfig/up options modified
2023-01-23 22:16:41 us=526250 OPTIONS IMPORT: route options modified
2023-01-23 22:16:41 us=526267 OPTIONS IMPORT: route-related options modified
2023-01-23 22:16:41 us=526317 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-01-23 22:16:41 us=526337 OPTIONS IMPORT: peer-id set
2023-01-23 22:16:41 us=526355 OPTIONS IMPORT: data channel crypto options modified
2023-01-23 22:16:41 us=526399 net_route_v4_best_gw query: dst 0.0.0.0
2023-01-23 22:16:41 us=526530 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=526597 sitnl_send: rtnl: received 496 bytes
2023-01-23 22:16:41 us=526677 net_route_v4_best_gw result: via 192.168.178.1 dev wlp2s0
2023-01-23 22:16:41 us=526775 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=wlp2s0 HWADDR=d0:c6:37:db:70:77
2023-01-23 22:16:41 us=527198 open_tun_dco: tun0
2023-01-23 22:16:41 us=527229 net_iface_new: add tun0 type ovpn-dco
2023-01-23 22:16:41 us=528615 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=528694 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=528817 ovpn_dco_register
2023-01-23 22:16:41 us=529102 DCO device tun0 opened
2023-01-23 22:16:41 us=529155 do_ifconfig, ipv4=1, ipv6=0
2023-01-23 22:16:41 us=529236 net_iface_mtu_set: mtu 1500 for tun0
2023-01-23 22:16:41 us=529412 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=529474 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=529570 net_iface_up: set tun0 up
2023-01-23 22:16:41 us=531284 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=531369 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=531442 net_addr_v4_add: 172.29.0.2/21 dev tun0
2023-01-23 22:16:41 us=533046 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=533152 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=533308 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 22:16:41 update-systemd-resolved: Link 'tun0' coming up
<14>Jan 23 22:16:41 update-systemd-resolved: Adding IPv4 DNS Server 141.42.1.1
<14>Jan 23 22:16:41 update-systemd-resolved: Adding DNS Domain charite.de
<14>Jan 23 22:16:41 update-systemd-resolved: SetLinkDNS(4 1 2 4 141 42 1 1)
<14>Jan 23 22:16:41 update-systemd-resolved: SetLinkDomains(4 1 charite.de false)
2023-01-23 22:16:41 us=657122 net_route_v4_add: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=657381 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=657446 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=657513 net_route_v4_add: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=657696 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=657755 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=657820 net_route_v4_add: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=657999 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=658059 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=658118 net_route_v4_add: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=658268 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=658326 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=658386 net_route_v4_add: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=658553 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=658611 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=658672 net_route_v4_add: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=658875 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=658930 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=658985 net_route_v4_add: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=659147 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=659206 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=659265 net_route_v4_add: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=659413 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=659501 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=659560 net_route_v4_add: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=659766 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=659829 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=659890 net_route_v4_add: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=660021 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=660071 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=660121 net_route_v4_add: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:41 us=660260 sitnl_send: checking for received messages
2023-01-23 22:16:41 us=660308 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:41 us=660401 dco_new_peer: peer-id 0, fd 3
2023-01-23 22:16:41 us=660661 Data Channel: using negotiated cipher 'AES-256-GCM'
2023-01-23 22:16:41 us=660806 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-23 22:16:41 us=661021 dco_install_key: peer_id=0 keyid=0
2023-01-23 22:16:41 us=661067 dco_new_key: slot 0, key-id 0, peer-id 0, cipher AES-256-GCM
2023-01-23 22:16:41 us=673410 dco_set_peer: peer-id 0, keepalive 10/30, mss 1400
2023-01-23 22:16:41 us=673539 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-01-23 22:16:41 us=673578 Initialization Sequence Completed
2023-01-23 22:16:41 us=673658 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #10 ] [ 6 ] DATA len=0
2023-01-23 22:16:41 us=673681 dco_do_write: peer-id 0, len=62
2023-01-23 22:16:41 us=674872 dco_update_keys: peer_id=0
2023-01-23 22:16:47 us=610068 event_wait : Interrupted system call (fd=-1,code=4)
2023-01-23 22:16:47 us=610165 SIGTERM received, sending exit notification to peer
2023-01-23 22:16:47 us=610194 dco_update_keys: peer_id=0
2023-01-23 22:16:47 us=610226 Attempting to send data packet while data channel offload is in use. Dropping packet
2023-01-23 22:16:48 us=666597 dco_del_peer: peer-id 0
2023-01-23 22:16:48 us=667357 TCP/UDP: Closing socket
2023-01-23 22:16:48 us=667451 net_route_v4_del: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=667737 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=667816 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=667894 net_route_v4_del: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=668106 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=668175 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=668245 net_route_v4_del: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=668417 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=668486 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=668551 net_route_v4_del: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=668738 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=668808 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=668875 net_route_v4_del: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=669059 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=669121 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=669186 net_route_v4_del: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=669330 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=669387 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=669456 net_route_v4_del: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=669610 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=669670 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=669737 net_route_v4_del: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=669920 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=670020 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=670087 net_route_v4_del: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=670273 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=670343 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=670411 net_route_v4_del: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=670592 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=670651 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=670718 net_route_v4_del: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-23 22:16:48 us=670895 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=670964 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=671089 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 23 22:16:48 update-systemd-resolved: Link 'tun0' going down
2023-01-23 22:16:48 us=745415 Closing TUN/TAP interface
2023-01-23 22:16:48 us=745506 net_addr_v4_del: 172.29.0.2 dev tun0
2023-01-23 22:16:48 us=746607 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=746686 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=746755 close_tun_dco
2023-01-23 22:16:48 us=746841 net_iface_del: delete tun0
2023-01-23 22:16:48 us=827839 sitnl_send: checking for received messages
2023-01-23 22:16:48 us=827943 sitnl_send: rtnl: received 36 bytes
2023-01-23 22:16:48 us=828222 SIGTERM[soft,exit-with-notification] received, process exiting
very interesting. thanks a lot! This log excluded all my clues. Digging more into the code..
@hildeb could you pull the debug branch and test again with debug enabled? I have added an extra message, but also a potential fix.
It's weird that only you are seeing this message...but still...
and please reboot to make sure that the warning will print again when triggered.
@ordex I pulled the branch again and rebuilt:
2023-01-24 08:14:00 us=869748 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback 'BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-01-24 08:14:00 us=870063 Current Parameter Settings:
2023-01-24 08:14:00 us=870081 config = 'charite-hildeb.ovpn'
2023-01-24 08:14:00 us=870090 mode = 0
2023-01-24 08:14:00 us=870099 persist_config = DISABLED
2023-01-24 08:14:00 us=870107 persist_mode = 1
2023-01-24 08:14:00 us=870114 show_ciphers = DISABLED
2023-01-24 08:14:00 us=870122 show_digests = DISABLED
2023-01-24 08:14:00 us=870130 show_engines = DISABLED
2023-01-24 08:14:00 us=870148 genkey = DISABLED
2023-01-24 08:14:00 us=870163 genkey_filename = '[UNDEF]'
2023-01-24 08:14:00 us=870172 key_pass_file = '[UNDEF]'
2023-01-24 08:14:00 us=870181 show_tls_ciphers = DISABLED
2023-01-24 08:14:00 us=870190 connect_retry_max = 0
2023-01-24 08:14:00 us=870199 Connection profiles [0]:
2023-01-24 08:14:00 us=870209 proto = udp
2023-01-24 08:14:00 us=870218 local = '[UNDEF]'
2023-01-24 08:14:00 us=870227 local_port = '[UNDEF]'
2023-01-24 08:14:00 us=870241 remote = 'openvpn-gw170-ext.charite.de'
2023-01-24 08:14:00 us=870253 remote_port = '1194'
2023-01-24 08:14:00 us=870261 remote_float = DISABLED
2023-01-24 08:14:00 us=870269 bind_defined = DISABLED
2023-01-24 08:14:00 us=870276 bind_local = DISABLED
2023-01-24 08:14:00 us=870284 bind_ipv6_only = DISABLED
2023-01-24 08:14:00 us=870293 connect_retry_seconds = 5
2023-01-24 08:14:00 us=870301 connect_timeout = 120
2023-01-24 08:14:00 us=870309 socks_proxy_server = '[UNDEF]'
2023-01-24 08:14:00 us=870320 socks_proxy_port = '[UNDEF]'
2023-01-24 08:14:00 us=870334 tun_mtu = 1500
2023-01-24 08:14:00 us=870343 tun_mtu_defined = ENABLED
2023-01-24 08:14:00 us=870352 link_mtu = 1500
2023-01-24 08:14:00 us=870361 link_mtu_defined = DISABLED
2023-01-24 08:14:00 us=870370 tun_mtu_extra = 0
2023-01-24 08:14:00 us=870378 tun_mtu_extra_defined = DISABLED
2023-01-24 08:14:00 us=870387 mtu_discover_type = -1
2023-01-24 08:14:00 us=870397 fragment = 0
2023-01-24 08:14:00 us=870415 mssfix = 1492
2023-01-24 08:14:00 us=870431 mssfix_encap = ENABLED
2023-01-24 08:14:00 us=870448 mssfix_fixed = DISABLED
2023-01-24 08:14:00 us=870466 explicit_exit_notification = 1
2023-01-24 08:14:00 us=870484 tls_auth_file = '[INLINE]'
2023-01-24 08:14:00 us=870501 key_direction = 1
2023-01-24 08:14:00 us=870518 tls_crypt_file = '[UNDEF]'
2023-01-24 08:14:00 us=870534 tls_crypt_v2_file = '[UNDEF]'
2023-01-24 08:14:00 us=870551 Connection profiles END
2023-01-24 08:14:00 us=870567 remote_random = DISABLED
2023-01-24 08:14:00 us=870579 ipchange = '[UNDEF]'
2023-01-24 08:14:00 us=870595 dev = 'tun'
2023-01-24 08:14:00 us=870611 dev_type = '[UNDEF]'
2023-01-24 08:14:00 us=870623 dev_node = '[UNDEF]'
2023-01-24 08:14:00 us=870640 tuntap_options.disable_dco = DISABLED
2023-01-24 08:14:00 us=870659 lladdr = '[UNDEF]'
2023-01-24 08:14:00 us=870676 topology = 1
2023-01-24 08:14:00 us=870694 ifconfig_local = '[UNDEF]'
2023-01-24 08:14:00 us=870711 ifconfig_remote_netmask = '[UNDEF]'
2023-01-24 08:14:00 us=870736 ifconfig_noexec = DISABLED
2023-01-24 08:14:00 us=870753 ifconfig_nowarn = DISABLED
2023-01-24 08:14:00 us=870769 ifconfig_ipv6_local = '[UNDEF]'
2023-01-24 08:14:00 us=870785 ifconfig_ipv6_netbits = 0
2023-01-24 08:14:00 us=870798 ifconfig_ipv6_remote = '[UNDEF]'
2023-01-24 08:14:00 us=870811 shaper = 0
2023-01-24 08:14:00 us=870823 mtu_test = 0
2023-01-24 08:14:00 us=870840 mlock = DISABLED
2023-01-24 08:14:00 us=870859 keepalive_ping = 0
2023-01-24 08:14:00 us=870877 keepalive_timeout = 0
2023-01-24 08:14:00 us=870893 inactivity_timeout = 0
2023-01-24 08:14:00 us=870909 inactivity_minimum_bytes = 0
2023-01-24 08:14:00 us=870922 ping_send_timeout = 0
2023-01-24 08:14:00 us=870939 ping_rec_timeout = 0
2023-01-24 08:14:00 us=870957 ping_rec_timeout_action = 0
2023-01-24 08:14:00 us=870970 ping_timer_remote = DISABLED
2023-01-24 08:14:00 us=870988 remap_sigusr1 = 0
2023-01-24 08:14:00 us=871002 persist_tun = DISABLED
2023-01-24 08:14:00 us=871020 persist_local_ip = DISABLED
2023-01-24 08:14:00 us=871034 persist_remote_ip = DISABLED
2023-01-24 08:14:00 us=871047 persist_key = DISABLED
2023-01-24 08:14:00 us=871063 passtos = DISABLED
2023-01-24 08:14:00 us=871079 resolve_retry_seconds = 1000000000
2023-01-24 08:14:00 us=871092 resolve_in_advance = DISABLED
2023-01-24 08:14:00 us=871104 username = '[UNDEF]'
2023-01-24 08:14:00 us=871120 groupname = '[UNDEF]'
2023-01-24 08:14:00 us=871138 chroot_dir = '[UNDEF]'
2023-01-24 08:14:00 us=871155 cd_dir = '[UNDEF]'
2023-01-24 08:14:00 us=871173 writepid = '[UNDEF]'
2023-01-24 08:14:00 us=871186 up_script = '/etc/openvpn/update-systemd-resolved'
2023-01-24 08:14:00 us=871199 down_script = '/etc/openvpn/update-systemd-resolved'
2023-01-24 08:14:00 us=871217 down_pre = ENABLED
2023-01-24 08:14:00 us=871232 up_restart = DISABLED
2023-01-24 08:14:00 us=871249 up_delay = DISABLED
2023-01-24 08:14:00 us=871265 daemon = DISABLED
2023-01-24 08:14:00 us=871281 log = DISABLED
2023-01-24 08:14:00 us=871298 suppress_timestamps = DISABLED
2023-01-24 08:14:00 us=871316 machine_readable_output = DISABLED
2023-01-24 08:14:00 us=871329 nice = 0
2023-01-24 08:14:00 us=871342 verbosity = 6
2023-01-24 08:14:00 us=871359 mute = 0
2023-01-24 08:14:00 us=871375 gremlin = 0
2023-01-24 08:14:00 us=871392 status_file = '[UNDEF]'
2023-01-24 08:14:00 us=871409 status_file_version = 1
2023-01-24 08:14:00 us=871427 status_file_update_freq = 60
2023-01-24 08:14:00 us=871444 occ = ENABLED
2023-01-24 08:14:00 us=871461 rcvbuf = 0
2023-01-24 08:14:00 us=871474 sndbuf = 0
2023-01-24 08:14:00 us=871492 mark = 0
2023-01-24 08:14:00 us=871508 sockflags = 0
2023-01-24 08:14:00 us=871525 fast_io = DISABLED
2023-01-24 08:14:00 us=871543 comp.alg = 0
2023-01-24 08:14:00 us=871558 comp.flags = 24
2023-01-24 08:14:00 us=871572 route_script = '[UNDEF]'
2023-01-24 08:14:00 us=871584 route_default_gateway = '[UNDEF]'
2023-01-24 08:14:00 us=871596 route_default_metric = 0
2023-01-24 08:14:00 us=871614 route_noexec = DISABLED
2023-01-24 08:14:00 us=871630 route_delay = 0
2023-01-24 08:14:00 us=871647 route_delay_window = 30
2023-01-24 08:14:00 us=871664 route_delay_defined = DISABLED
2023-01-24 08:14:00 us=871680 route_nopull = DISABLED
2023-01-24 08:14:00 us=871699 route_gateway_via_dhcp = DISABLED
2023-01-24 08:14:00 us=871716 allow_pull_fqdn = DISABLED
2023-01-24 08:14:00 us=871732 management_addr = '[UNDEF]'
2023-01-24 08:14:00 us=871745 management_port = '[UNDEF]'
2023-01-24 08:14:00 us=871763 management_user_pass = '[UNDEF]'
2023-01-24 08:14:00 us=871780 management_log_history_cache = 250
2023-01-24 08:14:00 us=871795 management_echo_buffer_size = 100
2023-01-24 08:14:00 us=871808 management_client_user = '[UNDEF]'
2023-01-24 08:14:00 us=871824 management_client_group = '[UNDEF]'
2023-01-24 08:14:00 us=871840 management_flags = 0
2023-01-24 08:14:00 us=871853 shared_secret_file = '[UNDEF]'
2023-01-24 08:14:00 us=871866 key_direction = 1
2023-01-24 08:14:00 us=871881 ciphername = 'BF-CBC'
2023-01-24 08:14:00 us=871897 ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-01-24 08:14:00 us=871915 authname = 'SHA256'
2023-01-24 08:14:00 us=871933 engine = DISABLED
2023-01-24 08:14:00 us=871947 replay = ENABLED
2023-01-24 08:14:00 us=871960 mute_replay_warnings = DISABLED
2023-01-24 08:14:00 us=871977 replay_window = 64
2023-01-24 08:14:00 us=871990 replay_time = 15
2023-01-24 08:14:00 us=872007 packet_id_file = '[UNDEF]'
2023-01-24 08:14:00 us=872024 test_crypto = DISABLED
2023-01-24 08:14:00 us=872041 tls_server = DISABLED
2023-01-24 08:14:00 us=872059 tls_client = ENABLED
2023-01-24 08:14:00 us=872076 ca_file = '[INLINE]'
2023-01-24 08:14:00 us=872094 ca_path = '[UNDEF]'
2023-01-24 08:14:00 us=872111 dh_file = '[UNDEF]'
2023-01-24 08:14:00 us=872128 cert_file = '[INLINE]'
2023-01-24 08:14:00 us=872143 extra_certs_file = '[UNDEF]'
2023-01-24 08:14:00 us=872156 priv_key_file = '[INLINE]'
2023-01-24 08:14:00 us=872169 pkcs12_file = '[UNDEF]'
2023-01-24 08:14:00 us=872186 cipher_list = '[UNDEF]'
2023-01-24 08:14:00 us=872204 cipher_list_tls13 = '[UNDEF]'
2023-01-24 08:14:00 us=872221 tls_cert_profile = '[UNDEF]'
2023-01-24 08:14:00 us=872238 tls_verify = '[UNDEF]'
2023-01-24 08:14:00 us=872257 tls_export_cert = '[UNDEF]'
2023-01-24 08:14:00 us=872272 verify_x509_type = 1
2023-01-24 08:14:00 us=872285 verify_x509_name = 'C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de'
2023-01-24 08:14:00 us=872298 crl_file = '[UNDEF]'
2023-01-24 08:14:00 us=872311 ns_cert_type = 0
2023-01-24 08:14:00 us=872326 remote_cert_ku[i] = 65535
2023-01-24 08:14:00 us=872342 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872359 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872371 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872387 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872402 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872415 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872430 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872445 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872458 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872470 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872487 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872504 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872518 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872530 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872543 remote_cert_ku[i] = 0
2023-01-24 08:14:00 us=872560 remote_cert_eku = 'TLS Web Server Authentication'
2023-01-24 08:14:00 us=872577 ssl_flags = 192
2023-01-24 08:14:00 us=872593 tls_timeout = 2
2023-01-24 08:14:00 us=872608 renegotiate_bytes = -1
2023-01-24 08:14:00 us=872623 renegotiate_packets = 0
2023-01-24 08:14:00 us=872640 renegotiate_seconds = 0
2023-01-24 08:14:00 us=872658 handshake_window = 60
2023-01-24 08:14:00 us=872674 transition_window = 3600
2023-01-24 08:14:00 us=872689 single_session = DISABLED
2023-01-24 08:14:00 us=872705 push_peer_info = DISABLED
2023-01-24 08:14:00 us=872721 tls_exit = DISABLED
2023-01-24 08:14:00 us=872739 tls_crypt_v2_metadata = '[UNDEF]'
2023-01-24 08:14:00 us=872756 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872770 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872783 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872800 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872816 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872833 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872851 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872867 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872880 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872898 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872911 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872929 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872947 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872963 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872976 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=872988 pkcs11_protected_authentication = DISABLED
2023-01-24 08:14:00 us=873006 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873023 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873040 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873058 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873074 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873091 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873109 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873124 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873140 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873153 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873172 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873188 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873205 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873223 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873239 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873253 pkcs11_private_mode = 00000000
2023-01-24 08:14:00 us=873269 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873285 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873303 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873319 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873335 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873352 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873368 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873384 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873396 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873414 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873428 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873445 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873463 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873479 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873493 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873509 pkcs11_cert_private = DISABLED
2023-01-24 08:14:00 us=873537 pkcs11_pin_cache_period = -1
2023-01-24 08:14:00 us=873547 pkcs11_id = '[UNDEF]'
2023-01-24 08:14:00 us=873557 pkcs11_id_management = DISABLED
2023-01-24 08:14:00 us=873570 server_network = 0.0.0.0
2023-01-24 08:14:00 us=873581 server_netmask = 0.0.0.0
2023-01-24 08:14:00 us=873596 server_network_ipv6 = ::
2023-01-24 08:14:00 us=873605 server_netbits_ipv6 = 0
2023-01-24 08:14:00 us=873616 server_bridge_ip = 0.0.0.0
2023-01-24 08:14:00 us=873626 server_bridge_netmask = 0.0.0.0
2023-01-24 08:14:00 us=873638 server_bridge_pool_start = 0.0.0.0
2023-01-24 08:14:00 us=873648 server_bridge_pool_end = 0.0.0.0
2023-01-24 08:14:00 us=873658 ifconfig_pool_defined = DISABLED
2023-01-24 08:14:00 us=873667 ifconfig_pool_start = 0.0.0.0
2023-01-24 08:14:00 us=873678 ifconfig_pool_end = 0.0.0.0
2023-01-24 08:14:00 us=873690 ifconfig_pool_netmask = 0.0.0.0
2023-01-24 08:14:00 us=873702 ifconfig_pool_persist_filename = '[UNDEF]'
2023-01-24 08:14:00 us=873717 ifconfig_pool_persist_refresh_freq = 600
2023-01-24 08:14:00 us=873726 ifconfig_ipv6_pool_defined = DISABLED
2023-01-24 08:14:00 us=873738 ifconfig_ipv6_pool_base = ::
2023-01-24 08:14:00 us=873748 ifconfig_ipv6_pool_netbits = 0
2023-01-24 08:14:00 us=873759 n_bcast_buf = 256
2023-01-24 08:14:00 us=873781 tcp_queue_limit = 64
2023-01-24 08:14:00 us=873792 real_hash_size = 256
2023-01-24 08:14:00 us=873802 virtual_hash_size = 256
2023-01-24 08:14:00 us=873812 client_connect_script = '[UNDEF]'
2023-01-24 08:14:00 us=873824 learn_address_script = '[UNDEF]'
2023-01-24 08:14:00 us=873832 client_disconnect_script = '[UNDEF]'
2023-01-24 08:14:00 us=873842 client_config_dir = '[UNDEF]'
2023-01-24 08:14:00 us=873853 ccd_exclusive = DISABLED
2023-01-24 08:14:00 us=873863 tmp_dir = '/tmp'
2023-01-24 08:14:00 us=873871 push_ifconfig_defined = DISABLED
2023-01-24 08:14:00 us=873882 push_ifconfig_local = 0.0.0.0
2023-01-24 08:14:00 us=873891 push_ifconfig_remote_netmask = 0.0.0.0
2023-01-24 08:14:00 us=873902 push_ifconfig_ipv6_defined = DISABLED
2023-01-24 08:14:00 us=873912 push_ifconfig_ipv6_local = ::/0
2023-01-24 08:14:00 us=873920 push_ifconfig_ipv6_remote = ::
2023-01-24 08:14:00 us=873930 enable_c2c = DISABLED
2023-01-24 08:14:00 us=873938 duplicate_cn = DISABLED
2023-01-24 08:14:00 us=873948 cf_max = 0
2023-01-24 08:14:00 us=873956 cf_per = 0
2023-01-24 08:14:00 us=873966 max_clients = 1024
2023-01-24 08:14:00 us=873974 max_routes_per_client = 256
2023-01-24 08:14:00 us=873984 auth_user_pass_verify_script = '[UNDEF]'
2023-01-24 08:14:00 us=873994 auth_user_pass_verify_script_via_file = DISABLED
2023-01-24 08:14:00 us=874005 auth_token_generate = DISABLED
2023-01-24 08:14:00 us=874016 auth_token_lifetime = 0
2023-01-24 08:14:00 us=874026 auth_token_secret_file = '[UNDEF]'
2023-01-24 08:14:00 us=874036 port_share_host = '[UNDEF]'
2023-01-24 08:14:00 us=874043 port_share_port = '[UNDEF]'
2023-01-24 08:14:00 us=874053 vlan_tagging = DISABLED
2023-01-24 08:14:00 us=874063 vlan_accept = all
2023-01-24 08:14:00 us=874073 vlan_pvid = 1
2023-01-24 08:14:00 us=874081 client = ENABLED
2023-01-24 08:14:00 us=874091 pull = ENABLED
2023-01-24 08:14:00 us=874099 auth_user_pass_file = 'password.txt'
2023-01-24 08:14:00 us=874111 OpenVPN 2.6_git x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2023-01-24 08:14:00 us=874128 library versions: OpenSSL 3.0.5 5 Jul 2022, LZO 2.10
2023-01-24 08:14:00 us=874480 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2023-01-24 08:14:00 us=878555 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-24 08:14:00 us=878582 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-01-24 08:14:00 us=878669 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 headroom:126 payload:1376 tailroom:126 ET:0 ]
2023-01-24 08:14:00 us=924325 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-24 08:14:00 us=924485 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client'
2023-01-24 08:14:00 us=924517 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server'
2023-01-24 08:14:00 us=924583 TCP/UDP: Preserving recently used remote address: [AF_INET]193.175.73.170:1194
2023-01-24 08:14:00 us=924647 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-01-24 08:14:00 us=924686 UDPv4 link local: (not bound)
2023-01-24 08:14:00 us=924706 UDPv4 link remote: [AF_INET]193.175.73.170:1194
2023-01-24 08:14:00 us=925658 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=925721 UDPv4 WRITE [54] to [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
2023-01-24 08:14:00 us=925843 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=943674 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
2023-01-24 08:14:00 us=943762 TLS: Initial packet from [AF_INET]193.175.73.170:1194, sid=e6f40f3c e2e0cbe3
2023-01-24 08:14:00 us=943981 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=944049 UDPv4 WRITE [343] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 0 ] pid=1 DATA len=277
2023-01-24 08:14:00 us=944191 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=975511 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1136
2023-01-24 08:14:00 us=976418 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=976507 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #3 ] [ 1 ] DATA len=0
2023-01-24 08:14:00 us=976641 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=976715 UDPv4 READ [1202] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #3 ] [ 1 ] pid=2 DATA len=1136
2023-01-24 08:14:00 us=976828 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=976894 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #4 ] [ 2 ] DATA len=0
2023-01-24 08:14:00 us=976986 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=977068 UDPv4 READ [1173] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #4 ] [ 1 ] pid=3 DATA len=1107
2023-01-24 08:14:00 us=981144 VERIFY OK: depth=1, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=Charite-VPN CA, name=EasyRSA, emailAddress=vpn@charite.de
2023-01-24 08:14:00 us=981709 VERIFY KU OK
2023-01-24 08:14:00 us=981756 Validating certificate extended key usage
2023-01-24 08:14:00 us=981818 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-01-24 08:14:00 us=981853 VERIFY EKU OK
2023-01-24 08:14:00 us=981885 VERIFY X509NAME OK: C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-24 08:14:00 us=981920 VERIFY OK: depth=0, C=DE, ST=Berlin, L=Berlin, O=Charite-VPN, OU=GB-IT, CN=openvpn.charite.de, emailAddress=vpn@charite.de
2023-01-24 08:14:00 us=987715 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=987834 UDPv4 WRITE [1316] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #5 ] [ 3 ] pid=2 DATA len=1250
2023-01-24 08:14:00 us=988014 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=988091 UDPv4 WRITE [1304] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=3 DATA len=1250
2023-01-24 08:14:00 us=988211 dco_update_keys: peer_id=0
2023-01-24 08:14:00 us=988279 UDPv4 WRITE [940] to [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=4 DATA len=886
2023-01-24 08:14:00 us=988355 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=4669 UDPv4 READ [66] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 1 ] DATA len=0
2023-01-24 08:14:01 us=4772 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=5809 UDPv4 READ [70] from [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 2 1 ] DATA len=0
2023-01-24 08:14:01 us=5867 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=141469 UDPv4 READ [236] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #7 ] [ 4 3 2 1 ] pid=4 DATA len=158
2023-01-24 08:14:01 us=141918 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=141991 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #8 ] [ 4 ] DATA len=0
2023-01-24 08:14:01 us=142115 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=142187 UDPv4 READ [324] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #8 ] [ 4 3 2 1 ] pid=5 DATA len=246
2023-01-24 08:14:01 us=142286 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1549'
2023-01-24 08:14:01 us=142328 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]'
2023-01-24 08:14:01 us=142358 WARNING: 'keysize' is used inconsistently, local='keysize 128', remote='keysize 256'
2023-01-24 08:14:01 us=142457 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-01-24 08:14:01 us=142526 [openvpn.charite.de] Peer Connection Initiated with [AF_INET]193.175.73.170:1194
2023-01-24 08:14:01 us=142609 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=142673 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #9 ] [ 5 ] DATA len=0
2023-01-24 08:14:01 us=142779 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=518701 UDPv4 READ [663] from [AF_INET]193.175.73.170:1194: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 4 3 2 1 ] pid=6 DATA len=585
2023-01-24 08:14:01 us=518898 dco_update_keys: peer_id=0
2023-01-24 08:14:01 us=518966 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 141.42.1.1,dhcp-option DOMAIN charite.de,route-gateway 172.29.0.1,topology subnet,ping 10,ping-restart 30,route 10.27.0.0 255.255.0.0,route 10.28.0.0 255.254.0.0,route 10.32.0.0 255.224.0.0,route 172.16.0.0 255.254.0.0,route 192.168.192.0 255.255.192.0,route 141.42.0.0 255.255.0.0,route 193.175.72.0 255.255.255.0,route 193.175.74.0 255.255.254.0,route 193.175.174.0 255.255.255.192,route 172.19.252.0 255.255.255.224,route 194.94.4.0 255.255.254.0,ifconfig 172.29.0.2 255.255.248.0,peer-id 0,cipher AES-256-GCM,key-derivation tls-ekm'
2023-01-24 08:14:01 us=519320 OPTIONS IMPORT: timers and/or timeouts modified
2023-01-24 08:14:01 us=519363 OPTIONS IMPORT: --ifconfig/up options modified
2023-01-24 08:14:01 us=519407 OPTIONS IMPORT: route options modified
2023-01-24 08:14:01 us=519444 OPTIONS IMPORT: route-related options modified
2023-01-24 08:14:01 us=519481 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-01-24 08:14:01 us=519517 OPTIONS IMPORT: peer-id set
2023-01-24 08:14:01 us=519556 OPTIONS IMPORT: data channel crypto options modified
2023-01-24 08:14:01 us=519640 net_route_v4_best_gw query: dst 0.0.0.0
2023-01-24 08:14:01 us=519831 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=519893 sitnl_send: rtnl: received 496 bytes
2023-01-24 08:14:01 us=519997 net_route_v4_best_gw result: via 192.168.178.1 dev wlp2s0
2023-01-24 08:14:01 us=520150 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 IFACE=wlp2s0 HWADDR=d0:c6:37:db:70:77
2023-01-24 08:14:01 us=520701 open_tun_dco: tun0
2023-01-24 08:14:01 us=520744 net_iface_new: add tun0 type ovpn-dco
2023-01-24 08:14:01 us=522410 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=522517 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=522669 ovpn_dco_register
2023-01-24 08:14:01 us=523002 DCO device tun0 opened
2023-01-24 08:14:01 us=523045 do_ifconfig, ipv4=1, ipv6=0
2023-01-24 08:14:01 us=523140 net_iface_mtu_set: mtu 1500 for tun0
2023-01-24 08:14:01 us=523328 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=523403 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=523510 net_iface_up: set tun0 up
2023-01-24 08:14:01 us=523974 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=524035 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=524091 net_addr_v4_add: 172.29.0.2/21 dev tun0
2023-01-24 08:14:01 us=524462 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=524539 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=524682 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 24 08:14:01 update-systemd-resolved: Link 'tun0' coming up
<14>Jan 24 08:14:01 update-systemd-resolved: Adding IPv4 DNS Server 141.42.1.1
<14>Jan 24 08:14:01 update-systemd-resolved: Adding DNS Domain charite.de
<14>Jan 24 08:14:01 update-systemd-resolved: SetLinkDNS(4 1 2 4 141 42 1 1)
<14>Jan 24 08:14:01 update-systemd-resolved: SetLinkDomains(4 1 charite.de false)
2023-01-24 08:14:01 us=575422 net_route_v4_add: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575506 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575526 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575544 net_route_v4_add: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575596 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575615 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575635 net_route_v4_add: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575691 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575704 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575719 net_route_v4_add: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575759 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575774 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575794 net_route_v4_add: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575835 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575848 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575864 net_route_v4_add: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575908 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575922 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=575937 net_route_v4_add: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=575983 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=575998 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576016 net_route_v4_add: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=576059 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=576074 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576090 net_route_v4_add: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=576139 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=576160 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576177 net_route_v4_add: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=576223 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=576238 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576254 net_route_v4_add: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:01 us=576296 sitnl_send: checking for received messages
2023-01-24 08:14:01 us=576310 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:01 us=576343 dco_new_peer: peer-id 0, fd 3
2023-01-24 08:14:01 us=576441 Data Channel: using negotiated cipher 'AES-256-GCM'
2023-01-24 08:14:01 us=576485 Data Channel MTU parms [ mss_fix:1400 max_frag:0 tun_mtu:1500 headroom:136 payload:1736 tailroom:557 ET:0 ]
2023-01-24 08:14:01 us=576557 dco_install_key: peer_id=0 keyid=0
2023-01-24 08:14:01 us=576569 dco_new_key: slot 0, key-id 0, peer-id 0, cipher AES-256-GCM
2023-01-24 08:14:01 us=580662 dco_set_peer: peer-id 0, keepalive 10/30, mss 1400
2023-01-24 08:14:01 us=580715 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-01-24 08:14:01 us=580733 Initialization Sequence Completed
2023-01-24 08:14:01 us=580767 UDPv4 WRITE [62] to [AF_INET]193.175.73.170:1194: P_ACK_V1 kid=0 pid=[ #10 ] [ 6 ] DATA len=0
2023-01-24 08:14:01 us=580776 dco_do_write: peer-id 0, len=62
2023-01-24 08:14:01 us=580868 dco_update_keys: peer_id=0
^C2023-01-24 08:14:05 us=23240 event_wait : Interrupted system call (fd=-1,code=4)
2023-01-24 08:14:05 us=23300 SIGTERM received, sending exit notification to peer
2023-01-24 08:14:05 us=23323 dco_update_keys: peer_id=0
2023-01-24 08:14:05 us=23349 Attempting to send data packet while data channel offload is in use. Dropping packet
2023-01-24 08:14:06 us=281920 dco_del_peer: peer-id 0
2023-01-24 08:14:06 us=282641 TCP/UDP: Closing socket
2023-01-24 08:14:06 us=282749 net_route_v4_del: 10.27.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=282968 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=283038 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=283107 net_route_v4_del: 10.28.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=283261 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=283310 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=283360 net_route_v4_del: 10.32.0.0/11 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=283511 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=283557 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=283618 net_route_v4_del: 172.16.0.0/15 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=283772 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=283818 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=283885 net_route_v4_del: 192.168.192.0/18 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=284020 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=284078 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=284146 net_route_v4_del: 141.42.0.0/16 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=284279 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=284338 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=284392 net_route_v4_del: 193.175.72.0/24 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=284520 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=284576 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=284644 net_route_v4_del: 193.175.74.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=284788 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=284843 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=284894 net_route_v4_del: 193.175.174.0/26 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=285042 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=285094 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=285145 net_route_v4_del: 172.19.252.0/27 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=285275 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=285337 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=285403 net_route_v4_del: 194.94.4.0/23 via 172.29.0.1 dev [NULL] table 0 metric 200
2023-01-24 08:14:06 us=285541 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=285596 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=285700 /etc/openvpn/update-systemd-resolved tun0 1500 0 172.29.0.2 255.255.248.0 init
<14>Jan 24 08:14:06 update-systemd-resolved: Link 'tun0' going down
2023-01-24 08:14:06 us=321654 Closing TUN/TAP interface
2023-01-24 08:14:06 us=321700 net_addr_v4_del: 172.29.0.2 dev tun0
2023-01-24 08:14:06 us=322228 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=322567 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=322621 close_tun_dco
2023-01-24 08:14:06 us=322668 net_iface_del: delete tun0
2023-01-24 08:14:06 us=426236 sitnl_send: checking for received messages
2023-01-24 08:14:06 us=426332 sitnl_send: rtnl: received 36 bytes
2023-01-24 08:14:06 us=426647 SIGTERM[soft,exit-with-notification] received, process exiting
and the kern.log:
Jan 24 08:13:35 comet kernel: [ 64.769639] ovpn_dco: module verification failed: signature and/or required key missing - tainting kernel
Jan 24 08:13:35 comet kernel: [ 64.772489] OpenVPN data channel offload (ovpn-dco) 0.1.20221107-6-g1663e85 -- (C) 2020-2022 OpenVPN, Inc.
Jan 24 08:14:01 comet kernel: [ 90.534941] tun0 (uninitialized): ovpn_newlink: setting device (tun0) mode: 0
Jan 24 08:14:01 comet kernel: [ 90.536460] ovpn_pre_doit: cmd=7
Jan 24 08:14:01 comet kernel: [ 90.536473] tun0: ovpn_netlink_register_packet: registering userspace at 3837793595
Jan 24 08:14:01 comet kernel: [ 90.539249] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.540334] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.540347] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.540356] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.540364] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.540371] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.540378] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.540385] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.540392] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.540399] tun0: no peer to send data to
Jan 24 08:14:01 comet kernel: [ 90.589884] ovpn_pre_doit: cmd=1
Jan 24 08:14:01 comet kernel: [ 90.589921] tun0: ovpn_netlink_new_peer: adding peer with endpoint=193.175.73.170:1194/UDP id=0 VPN-IPv4=0.0.0.0 VPN-IPv6=::
Jan 24 08:14:01 comet kernel: [ 90.590101] ovpn_pre_doit: cmd=4
Jan 24 08:14:01 comet kernel: [ 90.594108] ********* Cipher gcm(aes) (encrypt)
Jan 24 08:14:01 comet kernel: [ 90.594112] *** IV size=12
Jan 24 08:14:01 comet kernel: [ 90.594114] *** req size=88
Jan 24 08:14:01 comet kernel: [ 90.594115] *** block size=1
Jan 24 08:14:01 comet kernel: [ 90.594116] *** auth size=16
Jan 24 08:14:01 comet kernel: [ 90.594117] *** alignmask=0x0
Jan 24 08:14:01 comet kernel: [ 90.594122] ********* Cipher gcm(aes) (decrypt)
Jan 24 08:14:01 comet kernel: [ 90.594124] *** IV size=12
Jan 24 08:14:01 comet kernel: [ 90.594125] *** req size=88
Jan 24 08:14:01 comet kernel: [ 90.594126] *** block size=1
Jan 24 08:14:01 comet kernel: [ 90.594127] *** auth size=16
Jan 24 08:14:01 comet kernel: [ 90.594128] *** alignmask=0x0
Jan 24 08:14:01 comet kernel: [ 90.594130] tun0: ovpn_netlink_new_key: new key installed (id=0) for peer 0
Jan 24 08:14:01 comet kernel: [ 90.594202] ovpn_pre_doit: cmd=2
Jan 24 08:14:01 comet kernel: [ 90.594205] ovpn_netlink_set_peer: parsing message
Jan 24 08:14:01 comet kernel: [ 90.594206] ovpn_netlink_set_peer: message parsed 0
Jan 24 08:14:01 comet kernel: [ 90.594207] ovpn_netlink_set_peer: setting keepalive: 1
Jan 24 08:14:01 comet kernel: [ 90.594208] tun0: ovpn_peer_keepalive_set: scheduling keepalive for peer 0: interval=10 timeout=30
Jan 24 08:14:01 comet kernel: [ 90.594212] ovpn_netlink_set_peer: set keepalive
Jan 24 08:14:01 comet kernel: [ 90.594303] ovpn_pre_doit: cmd=8
Jan 24 08:14:01 comet kernel: [ 90.594305] ovpn_netlink_packet:, received packet. parsing
Jan 24 08:14:01 comet kernel: [ 90.594306] ovpn_netlink_packet: parsed: 0
Jan 24 08:14:01 comet kernel: [ 90.594307] tun0: ovpn_netlink_packet: sending userspace packet to peer 0...
Jan 24 08:14:03 comet kernel: [ 92.265577] tun0: ovpn_peer_update_local_endpoint: learning local IPv4 for peer 0 (0.0.0.0 -> 192.168.178.25)
Jan 24 08:14:06 comet kernel: [ 95.295072] ovpn_pre_doit: cmd=3
Jan 24 08:14:06 comet kernel: [ 95.295087] tun0: ovpn_netlink_del_peer: peer id=0
Jan 24 08:14:06 comet kernel: [ 95.326863] tun0: deleting peer with id 0, reason 1
It seems the backtrace is gone?!
@hildeb did you reboot before testing? because the warning shows up only once. Anyway, it's truly possible that it's "gone". However it was harmless and just a cosmetic issue.
@hildeb did you reboot before testing? because the warning shows up only once. Anyway, it's truly possible that it's "gone". However it was harmless and just a cosmetic issue.
of course I rebooted :) !
Thanks for confirming! I'll merge the "fix" soon.
While modprobing causes no backtrace:
I'm getting a backtrace when openvpn-2.6.0rc2 first starts using dco: