Habe gerade testweise die Firewall im Router deaktiviert ohne Ergebnis.
Auch habe ich OpenVPN im Netzwerk Untermenü aktiviert. Dort gibt es ein log file das ich in /etc/openvpn gefunden habe:
Alles anzeigen
Sind die WARNINGs vielleicht der Schlüssel zur Lösung des Problems ?
Auch habe ich OpenVPN im Netzwerk Untermenü aktiviert. Dort gibt es ein log file das ich in /etc/openvpn gefunden habe:
Quellcode
- Sun Dec 8 18:56:21 2019 OpenVPN 2.4.3 arm-oe-linux-gnueabi [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun 28 2019
- Sun Dec 8 18:56:21 2019 library versions: OpenSSL 1.0.2q 20 Nov 2018, LZO 2.10
- Sun Dec 8 18:56:21 2019 WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Sun Dec 8 18:56:21 2019 NOTE: --fast-io is disabled since we are not using UDP
- Sun Dec 8 18:56:21 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Dec 8 18:56:21 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Dec 8 18:56:21 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]185.226.65.150:1443
- Sun Dec 8 18:56:21 2019 Socket Buffers: R=[4194304->4194304] S=[4194304->4194304]
- Sun Dec 8 18:56:21 2019 Attempting to establish TCP connection with [AF_INET]185.226.65.150:1443 [nonblock]
- Sun Dec 8 18:56:22 2019 TCP connection established with [AF_INET]185.226.65.150:1443
- Sun Dec 8 18:56:22 2019 TCP_CLIENT link local: (not bound)
- Sun Dec 8 18:56:22 2019 TCP_CLIENT link remote: [AF_INET]185.226.65.150:1443
- Sun Dec 8 18:56:22 2019 TLS: Initial packet from [AF_INET]185.226.65.150:1443, sid=3db2d91d b5db6f61
- Sun Dec 8 18:56:22 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun Dec 8 18:56:23 2019 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
- Sun Dec 8 18:56:23 2019 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
- Sun Dec 8 18:56:23 2019 VERIFY KU OK
- Sun Dec 8 18:56:23 2019 Validating certificate extended key usage
- Sun Dec 8 18:56:23 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Dec 8 18:56:23 2019 VERIFY EKU OK
- Sun Dec 8 18:56:23 2019 VERIFY OK: depth=0, CN=gr-ath-v001.prod.surfshark.com
- Sun Dec 8 18:56:25 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1635', remote='link-mtu 1583'
- Sun Dec 8 18:56:25 2019 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
- Sun Dec 8 18:56:25 2019 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
- Sun Dec 8 18:56:25 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 8 18:56:25 2019 [gr-ath-v001.prod.surfshark.com] Peer Connection Initiated with [AF_INET]185.226.65.150:1443
- Sun Dec 8 18:56:26 2019 SENT CONTROL [gr-ath-v001.prod.surfshark.com]: 'PUSH_REQUEST' (status=1)
- Sun Dec 8 18:56:26 2019 AUTH: Received control message: AUTH_FAILED
- Sun Dec 8 18:56:26 2019 SIGTERM[soft,auth-failure] received, process exiting