[2021-04-28 16:36:42][INFO] : Lancement openvpn : sudo openvpn --config /tmp/jeedom/openvpn/openvpn_794.ovpn >> /var/www/html/core/class/../../log/openvpn_DNS_Jeedom 2>&1 & Wed Apr 28 16:36:42 2021 WARNING: file '/tmp/jeedom/openvpn/openvpn_auth_b5w6jPCAREOnEi4G6gyQXJ26CjtnX5.conf' is group or others accessible Wed Apr 28 16:36:42 2021 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 20 2019 Wed Apr 28 16:36:42 2021 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10 Wed Apr 28 16:36:42 2021 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Wed Apr 28 16:36:42 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]135.125.10.213:1196 Wed Apr 28 16:36:42 2021 UDP link local: (not bound) Wed Apr 28 16:36:42 2021 UDP link remote: [AF_INET]135.125.10.213:1196 Wed Apr 28 16:36:42 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Wed Apr 28 16:36:42 2021 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 16:36:42 2021 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 16:36:42 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA Wed Apr 28 16:36:42 2021 [server] Peer Connection Initiated with [AF_INET]135.125.10.213:1196 Wed Apr 28 16:36:43 2021 Data Channel: using negotiated cipher 'AES-256-GCM' Wed Apr 28 16:36:43 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 16:36:43 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 16:36:43 2021 TUN/TAP device tun0 opened Wed Apr 28 16:36:43 2021 /sbin/ip link set dev tun0 up mtu 1500 Wed Apr 28 16:36:43 2021 /sbin/ip addr add dev tun0 local 10.11.3.34 peer 10.11.3.33 Wed Apr 28 16:36:43 2021 Initialization Sequence Completed Wed Apr 28 17:36:42 2021 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 17:36:42 2021 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 17:36:42 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 17:36:42 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 17:36:42 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA Wed Apr 28 18:36:42 2021 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 18:36:42 2021 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 18:36:42 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 18:36:42 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 18:36:42 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA Wed Apr 28 19:36:42 2021 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 19:36:42 2021 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 19:36:42 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 19:36:42 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 19:36:42 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA Wed Apr 28 20:36:42 2021 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 20:36:42 2021 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com Wed Apr 28 20:36:42 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 20:36:42 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Wed Apr 28 20:36:42 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 1024 bit RSA Wed Apr 28 21:36:42 2021 NOTE: --mute triggered... Sun May 2 17:37:28 2021 460 variation(s) on previous 20 message(s) suppressed by --mute Sun May 2 17:37:28 2021 [server] Inactivity timeout (--ping-restart), restarting Sun May 2 17:37:28 2021 SIGUSR1[soft,ping-restart] received, process restarting Sun May 2 17:37:33 2021 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Sun May 2 17:37:33 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]135.125.10.213:1196 Sun May 2 17:37:33 2021 UDP link local: (not bound) Sun May 2 17:37:33 2021 UDP link remote: [AF_INET]135.125.10.213:1196 Sun May 2 17:38:33 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Sun May 2 17:38:33 2021 TLS Error: TLS handshake failed Sun May 2 17:38:33 2021 SIGUSR1[soft,tls-error] received, process restarting Sun May 2 17:38:38 2021 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Sun May 2 17:38:38 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]149.202.180.206:1196 Sun May 2 17:38:38 2021 UDP link local: (not bound) Sun May 2 17:38:38 2021 UDP link remote: [AF_INET]149.202.180.206:1196 Sun May 2 17:38:54 2021 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com Sun May 2 17:38:54 2021 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com Sun May 2 17:39:38 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Sun May 2 17:39:38 2021 TLS Error: TLS handshake failed Sun May 2 17:39:38 2021 SIGUSR1[soft,tls-error] received, process restarting Sun May 2 17:39:43 2021 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Sun May 2 17:39:43 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]135.125.10.213:1196 Sun May 2 17:39:43 2021 UDP link local: (not bound) Sun May 2 17:39:43 2021 UDP link remote: [AF_INET]135.125.10.213:1196 Sun May 2 17:40:12 2021 VERIFY OK: depth=1, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=jeedom.com CA, name=jeedom, emailAddress=postmaster@jeedom.com Sun May 2 17:40:12 2021 VERIFY OK: depth=0, C=FR, ST=IDF, L=Paris, O=jeedom.com, OU=jeedom.com, CN=server, name=jeedom, emailAddress=postmaster@jeedom.com Sun May 2 17:40:43 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Sun May 2 17:40:43 2021 TLS Error: TLS handshake failed Sun May 2 17:40:43 2021 SIGUSR1[soft,tls-error] received, process restarting Sun May 2 17:40:48 2021 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Sun May 2 17:40:49 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]149.202.180.206:1196 Sun May 2 17:40:49 2021 UDP link local: (not bound) Sun May 2 17:40:49 2021 UDP link remote: [AF_INET]149.202.180.206:1196