Mon Aug 3 15:35:11 2020 WARNING: file '/tmp/jeedom/openvpn/openvpn_auth_tvT4IPUr0JcOgseYJ0Nm6ucEbeWKbP.conf' is group or others accessible Mon Aug 3 15:35:11 2020 OpenVPN 2.4.7 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 20 2019 Mon Aug 3 15:35:11 2020 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10 Mon Aug 3 15:35:11 2020 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Aug 3 15:35:11 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]149.202.176.140:1201 Mon Aug 3 15:35:11 2020 UDP link local: (not bound) Mon Aug 3 15:35:11 2020 UDP link remote: [AF_INET]149.202.176.140:1201 Mon Aug 3 15:35:11 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Mon Aug 3 15:35:11 2020 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com Mon Aug 3 15:35:11 2020 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com Mon Aug 3 15:35:11 2020 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA Mon Aug 3 15:35:11 2020 [server] Peer Connection Initiated with [AF_INET]149.202.176.140:1201 Mon Aug 3 15:35:13 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Mon Aug 3 15:35:13 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Aug 3 15:35:13 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Aug 3 15:35:13 2020 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such file or directory (errno=2) Mon Aug 3 15:35:13 2020 Exiting due to fatal error