Community discussions

MikroTik App
 
zglwolf
just joined
Topic Author
Posts: 3
Joined: Thu Feb 08, 2018 5:52 am

OpenVPN Client update no connect Routeos

Thu Feb 08, 2018 6:06 am

OpenVPN android Client form 1.1.17 update 1.1.27 no connect routeos
OpenVPN IOS Client update 1.12.7no connect routeos



2018-02-06 21:06:56 ----- OpenVPN Start -----
OpenVPN core 3.1.2 ios arm64 64-bit built on Jan 23 2018 15:56:53
2018-02-06 21:06:56 Frame=512/2048/512 mssfix-ctrl=1250
2018-02-06 21:06:56 UNUSED OPTIONS
0 [tls-client]
8 [ping-timer-rem]
9 [persist-tun]
10 [persist-key]
11 [mute-replay-warnings]
12 [verb] [3]
15 [pull]

2018-02-06 21:06:56 EVENT: RESOLVE
2018-02-06 21:06:57 Contacting [172.18.10.1]:1195/TCP via TCP
2018-02-06 21:06:57 EVENT: WAIT
2018-02-06 21:06:57 Connecting to [xxx.xxx.xx]:1195 (172.18.10.1) via TCPv4
2018-02-06 21:06:57 EVENT: CONNECTING
2018-02-06 21:06:57 Tunnel Options:V4,dev-type tun,link-mtu 1543,tun-mtu 1500,proto TCPv4_CLIENT,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client
2018-02-06 21:06:57 Creds: Username/Password
2018-02-06 21:06:57 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_BS64DL=1

2018-02-06 21:06:57 VERIFY OK : depth=0
cert. version : 3
serial number : 2F:19:59:68:8B:40:10:A5
issuer name : CN=xxx.xx.xx-ca
subject name : CN=xxx.xxx.xx-ca
issued on : 2016-10-01 03:43:25
expires on : 2026-09-29 03:43:25
signed using : RSA with SHA-256
RSA key size : 1024 bits
basic constraints : CA=true
key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Agreement, Key Cert Sign, CRL Sign, Encipher Only, Decipher Only
ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing, ???, ???, ???

2018-02-06 21:06:57 Client exception in transport_recv_excode: mbed TLS: SSL read error : SSL - Processing of the Certificate handshake message failed
2018-02-06 21:06:57 Client terminated, restarting in 2000 ms...
2018-02-06 21:06:58 EVENT: DISCONNECTED
2018-02-06 21:06:58 Raw stats on disconnect:
BYTES_IN : 1480
BYTES_OUT : 228
PACKETS_IN : 4
PACKETS_OUT : 3
SSL_ERROR : 1
2018-02-06 21:06:58 Performance stats on disconnect:
CPU usage (microseconds): 40926
Network bytes per CPU second: 41733
Tunnel bytes per CPU second: 0
2018-02-06 21:18:36 ----- OpenVPN Start -----
OpenVPN core 3.1.2 ios arm64 64-bit built on Jan 23 2018 15:56:53
2018-02-06 21:18:36 Frame=512/2048/512 mssfix-ctrl=1250
2018-02-06 21:18:36 UNUSED OPTIONS
0 [tls-client]
8 [ping-timer-rem]
9 [persist-tun]
10 [persist-key]
11 [mute-replay-warnings]
12 [verb] [3]
15 [pull]

2018-02-06 21:18:36 EVENT: RESOLVE
2018-02-06 21:18:36 Contacting [172.18.10.1]:1195/TCP via TCP
2018-02-06 21:18:36 EVENT: WAIT
2018-02-06 21:18:36 Connecting to [xxx.xxx.xx]:1195 (172.18.10.1) via TCPv4
2018-02-06 21:18:36 EVENT: CONNECTING
2018-02-06 21:18:36 Tunnel Options:V4,dev-type tun,link-mtu 1543,tun-mtu 1500,proto TCPv4_CLIENT,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client
2018-02-06 21:18:36 Creds: Username/Password
2018-02-06 21:18:36 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_BS64DL=1

2018-02-06 21:18:37 VERIFY OK : depth=0
cert. version : 3
serial number : 2F:19:59:68:8B:40:10:A5
issuer name : CN=xxx.xxx.xx-ca
subject name : CN=xxx.xxx.xx-ca
issued on : 2016-10-01 03:43:25
expires on : 2026-09-29 03:43:25
signed using : RSA with SHA-256
RSA key size : 1024 bits
basic constraints : CA=true
key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Agreement, Key Cert Sign, CRL Sign, Encipher Only, Decipher Only
ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing, ???, ???, ???

2018-02-06 21:18:37 Client exception in transport_recv_excode: mbed TLS: SSL read error : SSL - Processing of the Certificate handshake message failed
2018-02-06 21:18:37 Client terminated, restarting in 2000 ms...
2018-02-06 21:18:39 EVENT: RECONNECTING
2018-02-06 21:18:39 Contacting [172.18.10.1]:1195/TCP via TCP
2018-02-06 21:18:39 EVENT: WAIT
2018-02-06 21:18:39 Connecting to [xxx.xxx.xx]:1195 (172.18.10.1) via TCPv4
2018-02-06 21:18:39 EVENT: CONNECTING
2018-02-06 21:18:39 Tunnel Options:V4,dev-type tun,link-mtu 1543,tun-mtu 1500,proto TCPv4_CLIENT,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client
2018-02-06 21:18:39 Creds: Username/Password
2018-02-06 21:18:39 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_BS64DL=1

2018-02-06 21:18:40 VERIFY OK : depth=0
cert. version : 3
serial number : 2F:19:59:68:8B:40:10:A5
issuer name : CN=xxx.xxx.xx-ca
subject name : CN=xxx.xxx.xx-ca
issued on : 2016-10-01 03:43:25
expires on : 2026-09-29 03:43:25
signed using : RSA with SHA-256
RSA key size : 1024 bits
basic constraints : CA=true
key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Agreement, Key Cert Sign, CRL Sign, Encipher Only, Decipher Only
ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing, ???, ???, ???

2018-02-06 21:18:40 Client exception in transport_recv_excode: mbed TLS: SSL read error : SSL - Processing of the Certificate handshake message failed
2018-02-06 21:18:40 Client terminated, restarting in 2000 ms...
2018-02-06 21:18:42 EVENT: RECONNECTING

Who is online

Users browsing this forum: kolt, vingjfg and 45 guests