OVPN Server Issue

Hi
I’ve a RB3011UiAS with the 6.49.15 RouterOS
since 2 weeks ago i’ve no problem to use the ovpn server of the Router with a MACOS client using tunnelblick now the client remain in this state

2024-11-02 12:24:30.142800 TCP_CLIENT WRITE [14] to [AF_INET]79.27.97.100:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=244370e0 f528c18d [ ] pid=0 DATA 
2024-11-02 12:24:30.143106 TCP_CLIENT write returned 16

under the full log

2024-11-02 12:24:26.202732 *Tunnelblick: macOS 14.6.1 (23G93); Tunnelblick 4.0.1 (build 5971); prior version 3.8.8e (build 5779.1)
2024-11-02 12:24:26.505714 *Tunnelblick: Attempting connection with Casa Nuova2 using shadow copy; Set nameserver = 0x00000b01; monitoring connection
2024-11-02 12:24:26.506732 *Tunnelblick: openvpnstart start Casa\ Nuova2.tblk 56008 0x00000b01 0 1 0 0x0210c130 -ptADGNWradsgnw 2.4.12-openssl-1.1.1w <password>
2024-11-02 12:24:26.541373 *Tunnelblick: openvpnstart starting OpenVPN
2024-11-02 12:24:26.864394 NOTE: debug verbosity (--verb 11) is enabled but this build lacks debug support.
2024-11-02 12:24:26.864565 NOTE: debug verbosity (--verb 11) is enabled but this build lacks debug support.
2024-11-02 12:24:26.864826 Current Parameter Settings:
2024-11-02 12:24:26.864839   config = '/Library/Application Support/Tunnelblick/Users/axlerose/Casa Nuova2.tblk/Contents/Resources/config.ovpn'
2024-11-02 12:24:26.864846   mode = 0
2024-11-02 12:24:26.864852   show_ciphers = DISABLED
2024-11-02 12:24:26.864858   show_digests = DISABLED
2024-11-02 12:24:26.864865   show_engines = DISABLED
2024-11-02 12:24:26.864870   genkey = DISABLED
2024-11-02 12:24:26.864876   key_pass_file = '[UNDEF]'
2024-11-02 12:24:26.864882   show_tls_ciphers = DISABLED
2024-11-02 12:24:26.864893   connect_retry_max = 0
2024-11-02 12:24:26.864899 NOTE: --mute triggered...
2024-11-02 12:24:26.864916 272 variation(s) on previous 10 message(s) suppressed by --mute
2024-11-02 12:24:26.864922 OpenVPN 2.4.12 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Mar 12 2024
2024-11-02 12:24:26.864935 library versions: OpenSSL 1.1.1w  11 Sep 2023, LZO 2.10
2024-11-02 12:24:26.865832 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:56008
2024-11-02 12:24:26.865850 Need hold release from management interface, waiting...
2024-11-02 12:24:27.773166 *Tunnelblick: openvpnstart log:
     OpenVPN started successfully.
     Command used to start OpenVPN (one argument per displayed line):
          /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.4.12-openssl-1.1.1w/openvpn
          --daemon
          --log-append /Library/Application Support/Tunnelblick/Logs/-SUsers-Saxlerose-SLibrary-SApplication Support-STunnelblick-SConfigurations-SCasa Nuova2.tblk-SContents-SResources-Sconfig.ovpn.2817_0_1_0_34652464.56008.openvpn.log
          --cd /Library/Application Support/Tunnelblick/Users/axlerose/Casa Nuova2.tblk/Contents/Resources
          --machine-readable-output
          --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5971 4.0.1 (build 5971)"
          --verb 11
          --config /Library/Application Support/Tunnelblick/Users/axlerose/Casa Nuova2.tblk/Contents/Resources/config.ovpn
          --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Users/axlerose/Casa Nuova2.tblk/Contents/Resources
          --verb 11
          --cd /Library/Application Support/Tunnelblick/Users/axlerose/Casa Nuova2.tblk/Contents/Resources
          --management 127.0.0.1 56008 /Library/Application Support/Tunnelblick/Mips/Casa Nuova2.tblk.mip
          --setenv IV_SSO webauth
          --management-query-passwords
          --management-hold
          --script-security 2
          --route-up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
          --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
2024-11-02 12:24:27.784115 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:56008
2024-11-02 12:24:27.815278 *Tunnelblick: Established communication with OpenVPN
2024-11-02 12:24:27.818184 MANAGEMENT: CMD 'pid'
2024-11-02 12:24:27.819180 MANAGEMENT: CMD 'auth-retry interact'
2024-11-02 12:24:27.819260 MANAGEMENT: CMD 'state on'
2024-11-02 12:24:27.819302 MANAGEMENT: CMD 'state'
2024-11-02 12:24:27.819572 MANAGEMENT: CMD 'bytecount 1'
2024-11-02 12:24:27.839813 *Tunnelblick: >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
2024-11-02 12:24:27.840873 MANAGEMENT: CMD 'hold release'
2024-11-02 12:24:27.847495 *Tunnelblick: Obtained VPN username and password from the Keychain
2024-11-02 12:24:27.848501 MANAGEMENT: CMD 'username "Auth" "axlerose"'
2024-11-02 12:24:27.848641 MANAGEMENT: CMD 'password [...]'
2024-11-02 12:24:27.853009 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-11-02 12:24:27.857567 *Tunnelblick: Obtained passphrase from the Keychain
2024-11-02 12:24:27.858225 MANAGEMENT: CMD 'password [...]'
2024-11-02 12:24:27.863851 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2024-11-02 12:24:27.863930 MANAGEMENT: >STATE:1730546667,RESOLVE,,,,,,
2024-11-02 12:24:27.878190 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
2024-11-02 12:24:27.878279 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2024-11-02 12:24:27.878309 calc_options_string_link_mtu: link-mtu 1623 -> 1559
2024-11-02 12:24:27.878339 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2024-11-02 12:24:27.878356 calc_options_string_link_mtu: link-mtu 1623 -> 1559
2024-11-02 12:24:27.878377 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
2024-11-02 12:24:27.878393 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
2024-11-02 12:24:27.878420 TCP/UDP: Preserving recently used remote address: [AF_INET]79.27.97.100:1194
2024-11-02 12:24:27.878484 Socket Buffers: R=[131072->131072] S=[131072->131072]
2024-11-02 12:24:27.878509 Attempting to establish TCP connection with [AF_INET]79.27.97.100:1194 [nonblock]
2024-11-02 12:24:27.878528 MANAGEMENT: >STATE:1730546667,TCP_CONNECT,,,,,,
2024-11-02 12:24:28.928067 TCP connection established with [AF_INET]79.27.97.100:1194
2024-11-02 12:24:28.928104 TCP_CLIENT link local: (not bound)
2024-11-02 12:24:28.928123 TCP_CLIENT link remote: [AF_INET]79.27.97.100:1194
2024-11-02 12:24:28.928149 MANAGEMENT: >STATE:1730546668,WAIT,,,,,,
2024-11-02 12:24:28.928278  event_wait returned 1
2024-11-02 12:24:28.928301 TCP_CLIENT WRITE [14] to [AF_INET]79.27.97.100:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=244370e0 f528c18d [ ] pid=0 DATA 
2024-11-02 12:24:28.928462 TCP_CLIENT write returned 16
2024-11-02 12:24:30.142503  event_wait returned 0
2024-11-02 12:24:30.142749  event_wait returned 1
2024-11-02 12:24:30.142800 TCP_CLIENT WRITE [14] to [AF_INET]79.27.97.100:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=244370e0 f528c18d [ ] pid=0 DATA 
2024-11-02 12:24:30.143106 TCP_CLIENT write returned 16
2024-11-02 12:24:31.355473  event_wait returned 0
2024-11-02 12:24:32.570207  event_wait returned 0
2024-11-02 12:24:33.779164  event_wait returned 0
2024-11-02 12:24:34.987215  event_wait returned 0
2024-11-02 12:24:34.987482  event_wait returned 1
2024-11-02 12:24:34.987558 TCP_CLIENT WRITE [14] to [AF_INET]79.27.97.100:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=244370e0 f528c18d [ ] pid=0 DATA 
2024-11-02 12:24:34.987818 TCP_CLIENT write returned 16
2024-11-02 12:24:36.204311  event_wait returned 0
2024-11-02 12:24:37.412747  event_wait returned 0
2024-11-02 12:24:38.601462  event_wait returned 0
2024-11-02 12:24:39.742851  event_wait returned 0
2024-11-02 12:24:40.883253  event_wait returned 0
2024-11-02 12:24:41.983861  event_wait returned 0
2024-11-02 12:24:43.124721  event_wait returned 0
2024-11-02 12:24:43.125032  event_wait returned 1
2024-11-02 12:24:43.125098 TCP_CLIENT WRITE [14] to [AF_INET]79.27.97.100:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=244370e0 f528c18d [ ] pid=0 DATA 
2024-11-02 12:24:43.125204 TCP_CLIENT write returned 16
2024-11-02 12:24:44.255532  event_wait returned 0
2024-11-02 12:24:45.397932  event_wait returned 0
2024-11-02 12:24:46.494954  event_wait returned 0
2024-11-02 12:24:46.976938  event_wait returned 1
2024-11-02 12:24:46.977183 TCP_CLIENT read returned -1
2024-11-02 12:24:46.977215 read TCP_CLIENT: Operation timed out (code=60)
2024-11-02 12:24:46.977277 TCP_CLIENT READ [0] from [AF_INET]79.27.97.100:1194: DATA UNDEF len=-1
2024-11-02 12:24:46.977328  event_wait returned 1
2024-11-02 12:24:46.977361 Connection reset, restarting [0]
2024-11-02 12:24:46.977528 TCP/UDP: Closing socket
2024-11-02 12:24:46.977621 SIGUSR1[soft,connection-reset] received, process restarting
2024-11-02 12:24:46.977654 MANAGEMENT: >STATE:1730546686,RECONNECTING,connection-reset,,,,,
2024-11-02 12:24:46.981456 MANAGEMENT: CMD 'hold release'
2024-11-02 12:24:46.981800 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-11-02 12:24:46.981828 Re-using SSL/TLS context
2024-11-02 12:24:46.981969 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2024-11-02 12:24:46.982097 MANAGEMENT: >STATE:1730546686,RESOLVE,,,,,,
2024-11-02 12:24:46.985212 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
2024-11-02 12:24:46.985348 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2024-11-02 12:24:46.985364 calc_options_string_link_mtu: link-mtu 1623 -> 1559
2024-11-02 12:24:46.985406 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 56 bytes
2024-11-02 12:24:46.985428 calc_options_string_link_mtu: link-mtu 1623 -> 1559
2024-11-02 12:24:46.985445 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
2024-11-02 12:24:46.985457 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
2024-11-02 12:24:46.985477 TCP/UDP: Preserving recently used remote address: [AF_INET]79.27.97.100:1194
2024-11-02 12:24:46.985565 Socket Buffers: R=[131072->131072] S=[131072->131072]
2024-11-02 12:24:46.985584 Attempting to establish TCP connection with [AF_INET]79.27.97.100:1194 [nonblock]
2024-11-02 12:24:46.985616 MANAGEMENT: >STATE:1730546686,TCP_CONNECT,,,,,,
2024-11-02 12:24:46.985994 MANAGEMENT: CMD 'hold release'
2024-11-02 12:24:48.060868 TCP connection established with [AF_INET]79.27.97.100:1194
2024-11-02 12:24:48.061107 TCP_CLIENT link local: (not bound)
2024-11-02 12:24:48.061130 TCP_CLIENT link remote: [AF_INET]79.27.97.100:1194
2024-11-02 12:24:48.061184 MANAGEMENT: >STATE:1730546688,WAIT,,,,,,
2024-11-02 12:24:48.061403  event_wait returned 1
2024-11-02 12:24:48.061469 TCP_CLIENT WRITE [14] to [AF_INET]79.27.97.100:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=dc5f05fd 9acb9a43 [ ] pid=0 DATA 
2024-11-02 12:24:48.062635 TCP_CLIENT write returned 16
2024-11-02 12:24:49.172954  event_wait returned 0
2024-11-02 12:24:50.074119 *Tunnelblick: Disconnecting; VPN Details… window disconnect button pressed
2024-11-02 12:24:50.227467 *Tunnelblick: Disconnecting using 'kill'
2024-11-02 12:24:50.282168  event_wait returned 0
2024-11-02 12:24:50.282358  event_wait returned 1
2024-11-02 12:24:50.282409 TCP_CLIENT WRITE [14] to [AF_INET]79.27.97.100:1194: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=dc5f05fd 9acb9a43 [ ] pid=0 DATA 
2024-11-02 12:24:50.282569 TCP_CLIENT write returned 16
2024-11-02 12:24:50.407900  event_wait returned -1
2024-11-02 12:24:50.407927 event_wait : Interrupted system call (code=4)
2024-11-02 12:24:50.407973 PKCS#11: __pkcs11h_openssl_ex_data_free entered - parent=0x14401ea40, ptr=0x0, ad=0x14401eaa8, idx=1, argl=0, argp=0x100622fc5
2024-11-02 12:24:50.407999 PKCS#11: __pkcs11h_openssl_ex_data_free entered - parent=0x144109b40, ptr=0x0, ad=0x144109ba8, idx=1, argl=0, argp=0x100622fc5
2024-11-02 12:24:50.408015 PKCS#11: __pkcs11h_openssl_ex_data_free entered - parent=0x14401ce40, ptr=0x0, ad=0x14401cea8, idx=1, argl=0, argp=0x100622fc5
2024-11-02 12:24:50.408023 TCP/UDP: Closing socket
2024-11-02 12:24:50.408094 SIGTERM[hard,] received, process exiting
2024-11-02 12:24:50.408104 MANAGEMENT: >STATE:1730546690,EXITING,SIGTERM,,,,,
2024-11-02 12:24:50.408180 PKCS#11: pkcs11h_terminate entry
2024-11-02 12:24:50.408186 PKCS#11: Terminating openssl
2024-11-02 12:24:50.408190 PKCS#11: _pkcs11h_openssl_terminate
2024-11-02 12:24:50.408194 PKCS#11: Removing providers
2024-11-02 12:24:50.408197 PKCS#11: Releasing sessions
2024-11-02 12:24:50.408201 PKCS#11: Marking as uninitialized
2024-11-02 12:24:50.971424 *Tunnelblick: Expected disconnection occurred.

if i set the log on the router /system logging add topics=ovpn,debug action=memory i didn’t see any message.

this is my client eocnfiguration

client
dev tun
proto tcp-client
remote xxxx.sn.mynetname.net
port 1194
nobind
persist-key
persist-tun
tls-client
tls-cipher DEFAULT
remote-cert-tls server
verb 4
mute 10
cipher AES-256-CBC
auth SHA1
auth-user-pass
auth-nocache

;redirect-gateway def1

route 192.168.10.0 255.255.255.0 192.168.11.1

<ca>
-----BEGIN CERTIFICATE-----
MIIFyTCCA.....
-----END CERTIFICATE-----
</ca>

<cert>
-----BEGIN CERTIFICATE-----
Mfgt....
-----END CERTIFICATE-----
</cert>

<key>
-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIJnzBJBgk........
-----END ENCRYPTED PRIVATE KEY-----
</key>