20160621 08:50:19 W WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.
20160621 08:50:19 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
20160621 08:50:19 I Re-using SSL/TLS context
20160621 08:50:19 Control Channel MTU parms [ L:1553 D:138 EF:38 EB:0 ET:0 EL:0 ]
20160621 08:50:19 Socket Buffers: R=[32767->65534] S=[32767->65534]
20160621 08:50:19 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:4 ET:0 EL:0 ]
20160621 08:50:19 Local Options String: 'V4 dev-type tun link-mtu 1553 tun-mtu 1500 proto UDPv4 cipher BF-CBC auth SHA256 keysize 128 key-method 2 tls-client'
20160621 08:50:19 Expected Remote Options String: 'V4 dev-type tun link-mtu 1553 tun-mtu 1500 proto UDPv4 cipher BF-CBC auth SHA256 keysize 128 key-method 2 tls-server'
20160621 08:50:19 Local Options hash (VER=V4): '200d4846'
20160621 08:50:19 Expected Remote Options hash (VER=V4): '8971655f'
20160621 08:50:19 I UDPv4 link local: [undef]
20160621 08:50:19 I UDPv4 link remote: <SERVER_IP>:1194
20160621 08:50:19 TLS: Initial packet from <SERVER_IP>:1194 sid=e1ca7114 d763bd07
20160621 08:50:20 VERIFY OK: depth=1 /C=DE/ST=HE/L=Idstein/O=ckn/OU=sublimity/CN=ckn_CA/name=EasyRSA/emailAddress=openvpn@freibrief.net
20160621 08:50:20 VERIFY OK: depth=0 /C=DE/ST=HE/L=Idstein/O=ckn/OU=sublimity/CN=server/name=EasyRSA/emailAddress=openvpn@freibrief.net
20160621 08:50:20 W WARNING: 'link-mtu' is used inconsistently local='link-mtu 1553' remote='link-mtu 1541'
20160621 08:50:20 W WARNING: 'auth' is used inconsistently local='auth SHA256' remote='auth SHA1'
20160621 08:50:20 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
20160621 08:50:20 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
20160621 08:50:20 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
20160621 08:50:20 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
20160621 08:50:20 Control Channel: TLSv1 cipher TLSv1/SSLv3 AES128-SHA 2048 bit RSA
20160621 08:50:20 I [server] Peer Connection Initiated with <SERVER_IP>:1194
20160621 08:50:22 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
20160621 08:50:22 PUSH: Received control message: 'PUSH_REPLY dhcp-option DNS 208.67.222.222 dhcp-option DNS 208.67.220.220 route 10.8.0.1 topology net30 ping 10 ping-restart 120 ifconfig 10.8.0.6 10.8.0.5'
20160621 08:50:22 OPTIONS IMPORT: timers and/or timeouts modified
20160621 08:50:22 OPTIONS IMPORT: --ifconfig/up options modified
20160621 08:50:22 OPTIONS IMPORT: route options modified
20160621 08:50:22 NOTE: --mute triggered...
20160621 08:50:22 1 variation(s) on previous 5 message(s) suppressed by --mute
20160621 08:50:22 I Preserving previous TUN/TAP instance: tun1
20160621 08:50:22 I Initialization Sequence Completed
20160621 08:50:32 N Authenticate/Decrypt packet error: packet HMAC authentication failed
20160621 08:50:42 N Authenticate/Decrypt packet error: packet HMAC authentication failed
20160621 08:50:52 N Authenticate/Decrypt packet error: packet HMAC authentication failed
20160621 08:51:02 N Authenticate/Decrypt packet error: packet HMAC authentication failed
20160621 08:51:12 N Authenticate/Decrypt packet error: packet HMAC authentication failed
20160621 08:51:22 NOTE: --mute triggered...
20160621 08:52:14 6 variation(s) on previous 5 message(s) suppressed by --mute
20160621 08:52:14 MANAGEMENT: Client connected from 127.0.0.1:5001
20160621 08:52:14 D MANAGEMENT: CMD 'state'
20160621 08:52:14 MANAGEMENT: Client disconnected
20160621 08:52:14 MANAGEMENT: Client connected from 127.0.0.1:5001
20160621 08:52:14 D MANAGEMENT: CMD 'state'
20160621 08:52:14 MANAGEMENT: Client disconnected
20160621 08:52:14 MANAGEMENT: Client connected from 127.0.0.1:5001
20160621 08:52:14 D MANAGEMENT: CMD 'state'
20160621 08:52:14 MANAGEMENT: Client disconnected
20160621 08:52:14 MANAGEMENT: Client connected from 127.0.0.1:5001
20160621 08:52:14 D MANAGEMENT: CMD 'log 500'