Автор: khalilov
Дата сообщения: 05.04.2012 12:42
Обрывается соединение OpenVPN, происходит так: я подключаюсь, пингую сам севрер и сеть за сервером, мне необходимо подключиться к ИП-камере за сервером, подключаюсь к ней по http, все работает нормально, потом подключаюсь по rstp проходит около 1 минуты и VPN отваливается, и подключить уже не получается, в логи пишет вот это:
Thu Apr 05 11:30:14 2012 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011
Thu Apr 05 11:30:14 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu Apr 05 11:30:14 2012 Control Channel Authentication: using 'C:\OpenVPN\ssl\ta.key' as a OpenVPN static key file
Thu Apr 05 11:30:14 2012 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 11:30:14 2012 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 11:30:14 2012 LZO compression initialized
Thu Apr 05 11:30:14 2012 Control Channel MTU parms [ L:1576 D:168 EF:68 EB:0 ET:0 EL:0 ]
Thu Apr 05 11:30:14 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Apr 05 11:30:14 2012 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Apr 05 11:30:14 2012 Local Options hash (VER=V4): '69cab9b9'
Thu Apr 05 11:30:14 2012 Expected Remote Options hash (VER=V4): '6c3a1717'
Thu Apr 05 11:30:14 2012 Attempting to establish TCP connection with xxx.xxx.xxx.x:8888
Thu Apr 05 11:30:14 2012 TCP connection established with xxx.xxx.xxx.x:8888
Thu Apr 05 11:30:14 2012 TCPv4_CLIENT link local: [undef]
Thu Apr 05 11:30:14 2012 TCPv4_CLIENT link remote: xxx.xxx.xxx.x:8888
Thu Apr 05 11:30:17 2012 TLS: Initial packet from xxx.xxx.xxx.x:8888, sid=950e7168 50fe08c9
Thu Apr 05 11:30:24 2012 VERIFY OK: depth=1, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 11:30:24 2012 VERIFY OK: nsCertType=SERVER
Thu Apr 05 11:30:24 2012 VERIFY OK: depth=0, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 11:30:29 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 11:30:29 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 11:30:29 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 11:30:29 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 11:30:29 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Apr 05 11:30:29 2012 [changeme] Peer Connection Initiated with xxx.xxx.xxx.x:8888
Thu Apr 05 11:30:32 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 11:30:32 2012 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 10.10.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,route 192.168.1.0 255.255.255.0,ifconfig 10.10.0.10 10.10.0.9'
Thu Apr 05 11:30:32 2012 OPTIONS IMPORT: timers and/or timeouts modified
Thu Apr 05 11:30:32 2012 OPTIONS IMPORT: --ifconfig/up options modified
Thu Apr 05 11:30:32 2012 OPTIONS IMPORT: route options modified
Thu Apr 05 11:30:32 2012 ROUTE default_gateway=91.192.62.163
Thu Apr 05 11:30:32 2012 TAP-WIN32 device [Подключение по локальной сети 7] opened: \\.\Global\{DCB6C077-C774-4A4D-ACEF-487D2B6EF141}.tap
Thu Apr 05 11:30:32 2012 TAP-Win32 Driver Version 9.9
Thu Apr 05 11:30:32 2012 TAP-Win32 MTU=1500
Thu Apr 05 11:30:32 2012 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.10.0.10/255.255.255.252 on interface {DCB6C077-C774-4A4D-ACEF-487D2B6EF141} [DHCP-serv: 10.10.0.9, lease-time: 31536000]
Thu Apr 05 11:30:32 2012 Successful ARP Flush on interface [4] {DCB6C077-C774-4A4D-ACEF-487D2B6EF141}
Thu Apr 05 11:30:36 2012 TEST ROUTES: 3/3 succeeded len=3 ret=1 a=0 u/d=up
Thu Apr 05 11:30:36 2012 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 10.10.0.9
Thu Apr 05 11:30:36 2012 Route addition via IPAPI succeeded [adaptive]
Thu Apr 05 11:30:36 2012 C:\WINDOWS\system32\route.exe ADD 10.10.0.0 MASK 255.255.255.0 10.10.0.9
Thu Apr 05 11:30:36 2012 Route addition via IPAPI succeeded [adaptive]
Thu Apr 05 11:30:36 2012 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 10.10.0.9
Thu Apr 05 11:30:36 2012 Route addition via IPAPI succeeded [adaptive]
Thu Apr 05 11:30:36 2012 Initialization Sequence Completed
Thu Apr 05 12:30:29 2012 TLS: soft reset sec=0 bytes=759703/0 pkts=6966/0
Thu Apr 05 12:30:30 2012 VERIFY OK: depth=1, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 12:30:30 2012 VERIFY OK: nsCertType=SERVER
Thu Apr 05 12:30:30 2012 VERIFY OK: depth=0, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 12:30:31 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 12:30:31 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 12:30:31 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 12:30:31 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 12:30:31 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Apr 05 13:30:29 2012 TLS: tls_process: killed expiring key
Thu Apr 05 13:30:31 2012 VERIFY OK: depth=1, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 13:30:31 2012 VERIFY OK: nsCertType=SERVER
Thu Apr 05 13:30:31 2012 VERIFY OK: depth=0, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 13:30:32 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 13:30:32 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:30:32 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 13:30:32 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:30:32 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Apr 05 13:33:17 2012 [changeme] Inactivity timeout (--ping-restart), restarting
Thu Apr 05 13:33:17 2012 TCP/UDP: Closing socket
Thu Apr 05 13:33:17 2012 C:\WINDOWS\system32\route.exe DELETE 192.168.1.0 MASK 255.255.255.0 10.10.0.9
Thu Apr 05 13:33:17 2012 Route deletion via IPAPI succeeded [adaptive]
Thu Apr 05 13:33:17 2012 C:\WINDOWS\system32\route.exe DELETE 10.10.0.0 MASK 255.255.255.0 10.10.0.9
Thu Apr 05 13:33:17 2012 Route deletion via IPAPI succeeded [adaptive]
Thu Apr 05 13:33:17 2012 C:\WINDOWS\system32\route.exe DELETE 192.168.1.0 MASK 255.255.255.0 10.10.0.9
Thu Apr 05 13:33:17 2012 ROUTE: route deletion failed using DeleteIpForwardEntry: Параметр задан неверно.
Thu Apr 05 13:33:17 2012 Route deletion via IPAPI failed [adaptive]
Thu Apr 05 13:33:17 2012 Route deletion fallback to route.exe
ЌҐ - ©¤Ґ- гЄ § --л© ¬ аиагв.
Thu Apr 05 13:33:17 2012 Closing TUN/TAP interface
Thu Apr 05 13:33:17 2012 SIGUSR1[soft,ping-restart] received, process restarting
Thu Apr 05 13:33:17 2012 Restart pause, 5 second(s)
Thu Apr 05 13:33:22 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu Apr 05 13:33:22 2012 Control Channel Authentication: using 'C:\OpenVPN\ssl\ta.key' as a OpenVPN static key file
Thu Apr 05 13:33:22 2012 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:33:22 2012 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:33:22 2012 LZO compression initialized
Thu Apr 05 13:33:22 2012 Control Channel MTU parms [ L:1576 D:168 EF:68 EB:0 ET:0 EL:0 ]
Thu Apr 05 13:33:22 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Apr 05 13:33:22 2012 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Apr 05 13:33:22 2012 Local Options hash (VER=V4): '69cab9b9'
Thu Apr 05 13:33:22 2012 Expected Remote Options hash (VER=V4): '6c3a1717'
Thu Apr 05 13:33:22 2012 Attempting to establish TCP connection with xxx.xxx.xxx.x:8888
Thu Apr 05 13:33:22 2012 TCP connection established with xxx.xxx.xxx.x:8888
Thu Apr 05 13:33:22 2012 TCPv4_CLIENT link local: [undef]
Thu Apr 05 13:33:22 2012 TCPv4_CLIENT link remote: xxx.xxx.xxx.x:8888
Thu Apr 05 13:33:22 2012 TLS: Initial packet from xxx.xxx.xxx.x:8888, sid=4524d13b 2357644f
Thu Apr 05 13:33:23 2012 VERIFY OK: depth=1, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 13:33:23 2012 VERIFY OK: nsCertType=SERVER
Thu Apr 05 13:33:23 2012 VERIFY OK: depth=0, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 13:33:24 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 13:33:24 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:33:24 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 13:33:24 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:33:24 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Apr 05 13:33:24 2012 [changeme] Peer Connection Initiated with xxx.xxx.xxx.x:8888
Thu Apr 05 13:33:26 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:33:31 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:33:36 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:33:41 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:33:46 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:33:51 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:37:47 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:37:53 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:37:58 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:03 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:03 2012 Connection reset, restarting [0]
Thu Apr 05 13:38:03 2012 TCP/UDP: Closing socket
Thu Apr 05 13:38:03 2012 SIGUSR1[soft,connection-reset] received, process restarting
Thu Apr 05 13:38:03 2012 Restart pause, 5 second(s)
Thu Apr 05 13:38:08 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Thu Apr 05 13:38:08 2012 Control Channel Authentication: using 'C:\OpenVPN\ssl\ta.key' as a OpenVPN static key file
Thu Apr 05 13:38:08 2012 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:38:08 2012 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:38:08 2012 LZO compression initialized
Thu Apr 05 13:38:08 2012 Control Channel MTU parms [ L:1576 D:168 EF:68 EB:0 ET:0 EL:0 ]
Thu Apr 05 13:38:08 2012 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Apr 05 13:38:08 2012 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ]
Thu Apr 05 13:38:08 2012 Local Options hash (VER=V4): '69cab9b9'
Thu Apr 05 13:38:08 2012 Expected Remote Options hash (VER=V4): '6c3a1717'
Thu Apr 05 13:38:08 2012 Attempting to establish TCP connection with xxx.xxx.xxx.x:8888
Thu Apr 05 13:38:08 2012 TCP connection established with xxx.xxx.xxx.x:8888
Thu Apr 05 13:38:08 2012 TCPv4_CLIENT link local: [undef]
Thu Apr 05 13:38:08 2012 TCPv4_CLIENT link remote: xxx.xx.xxx.x:8888
Thu Apr 05 13:38:08 2012 TLS: Initial packet from xxx.xx.xxx.x:8888, sid=2eb06f49 b3fff3c7
Thu Apr 05 13:38:09 2012 VERIFY OK: depth=1, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 13:38:09 2012 VERIFY OK: nsCertType=SERVER
Thu Apr 05 13:38:09 2012 VERIFY OK: depth=0, /C=RU/ST=RU/L=Lipetsk/O=OpenVPN/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
Thu Apr 05 13:38:09 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 13:38:09 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:38:09 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Apr 05 13:38:09 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Apr 05 13:38:09 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Thu Apr 05 13:38:09 2012 [changeme] Peer Connection Initiated with xxx.xxx.xxx.x:8888
Thu Apr 05 13:38:11 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:16 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:21 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:26 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:31 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:36 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:41 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:46 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:51 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:38:56 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
Thu Apr 05 13:39:01 2012 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)