os: Solaris [server ~]# openvpn --version OpenVPN 2.4.1 i386-pc-solaris2.11 [SSL (OpenSSL)] [LZO] [LZ4] [MH/PKTINFO] [AEAD] built on Apr 11 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.10 Originally developed by James Yonan Copyright (C) 2002-2017 OpenVPN Technologies, Inc. Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto=yes enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=no enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_management=yes enable_multi=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no enable_pf=yes enable_pkcs11=no enable_plugin_auth_pam=no enable_plugin_down_root=no enable_plugins=no enable_port_share=yes enable_selinux=no enable_server=yes enable_shared=no enable_shared_with_static_runtimes=no enable_small=no enable_static=yes enable_strict=no enable_strict_options=no enable_systemd=no enable_werror=no enable_win32_dll=yes enable_x509_alt_username=no with_crypto_library=openssl with_gnu_ld=no with_mem_check=no with_sysroot=no [full server log (verb 5)] 09:04:10 MULTI: multi_create_instance called 09:04:10 1.2.3.4:1194 Re-using SSL/TLS context 09:04:10 1.2.3.4:1194 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ] 09:04:10 1.2.3.4:1194 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ] 09:04:10 1.2.3.4:1194 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server' 09:04:10 1.2.3.4:1194 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1541,tun-mtu 1500,proto UDPv4,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client' 09:04:10 1.2.3.4:1194 TLS: Initial packet from [AF_INET]1.2.3.4:1194, sid=a4fff120 2f7011d9 09:04:10 1.2.3.4:1194 peer info: IV_VER=2.4.1 09:04:10 1.2.3.4:1194 peer info: IV_PLAT=win 09:04:10 1.2.3.4:1194 peer info: IV_PROTO=2 09:04:10 1.2.3.4:1194 peer info: IV_NCP=2 09:04:10 1.2.3.4:1194 peer info: IV_LZ4=1 09:04:10 1.2.3.4:1194 peer info: IV_LZ4v2=1 09:04:10 1.2.3.4:1194 peer info: IV_LZO=1 09:04:10 1.2.3.4:1194 peer info: IV_COMP_STUB=1 09:04:10 1.2.3.4:1194 peer info: IV_COMP_STUBv2=1 09:04:10 1.2.3.4:1194 peer info: IV_TCPNL=1 09:04:10 1.2.3.4:1194 peer info: IV_GUI_VER=OpenVPN_GUI_11 09:04:10 1.2.3.4:1194 TLS: Username/Password authentication succeeded for username 'foo' [CN SET] 09:04:10 1.2.3.4:1194 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384 09:04:10 1.2.3.4:1194 [foo] Peer Connection Initiated with [AF_INET]1.2.3.4:1194 09:04:10 foo/1.2.3.4:1194 MULTI_sva: pool returned IPv4=10.144.0.6, IPv6=(Not enabled) 09:04:10 foo/1.2.3.4:1194 MULTI: Learn: 10.144.0.6 -> foo/1.2.3.4:1194 09:04:10 foo/1.2.3.4:1194 MULTI: primary virtual IP for foo/1.2.3.4:1194: 10.144.0.6 09:04:12 foo/1.2.3.4:1194 PUSH: Received control message: 'PUSH_REQUEST' 09:04:12 foo/1.2.3.4:1194 SENT CONTROL [foo]: 'PUSH_REPLY,ping 45,route 3.2.1.69,route 3.2.1.72,route 3.2.1.44,route 10.144.0.1,topology net30,ifconfig 10.144.0.6 10.144.0.5,peer-id 0,cipher AES-256-GCM' (status=1) 09:04:12 foo/1.2.3.4:1194 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ] 09:04:12 foo/1.2.3.4:1194 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 09:04:12 foo/1.2.3.4:1194 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 09:04:12 foo/1.2.3.4:1194 MULTI: bad source address from client [::], packet dropped 09:04:42 foo/1.2.3.4:1194 TLS: new session incoming connection from [AF_INET]1.2.3.4:1194 09:04:42 foo/1.2.3.4:1194 peer info: IV_VER=2.4.1 09:04:42 foo/1.2.3.4:1194 peer info: IV_PLAT=win 09:04:42 foo/1.2.3.4:1194 peer info: IV_PROTO=2 09:04:42 foo/1.2.3.4:1194 peer info: IV_NCP=2 09:04:42 foo/1.2.3.4:1194 peer info: IV_LZ4=1 09:04:42 foo/1.2.3.4:1194 peer info: IV_LZ4v2=1 09:04:42 foo/1.2.3.4:1194 peer info: IV_LZO=1 09:04:42 foo/1.2.3.4:1194 peer info: IV_COMP_STUB=1 09:04:42 foo/1.2.3.4:1194 peer info: IV_COMP_STUBv2=1 09:04:42 foo/1.2.3.4:1194 peer info: IV_TCPNL=1 09:04:42 foo/1.2.3.4:1194 peer info: IV_GUI_VER=OpenVPN_GUI_11 09:04:42 foo/1.2.3.4:1194 TLS: Username/Password authentication succeeded for username 'foo' [CN SET] 09:04:42 foo/1.2.3.4:1194 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 09:04:42 foo/1.2.3.4:1194 TLS: tls_multi_process: untrusted session promoted to semi-trusted 09:04:42 foo/1.2.3.4:1194 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384 09:04:43 foo/1.2.3.4:1194 PUSH: Received control message: 'PUSH_REQUEST' 09:04:43 foo/1.2.3.4:1194 SENT CONTROL [foo]: 'PUSH_REPLY,ping 45,route 3.2.1.69,route 3.2.1.72,route 3.2.1.44,route 10.144.0.1,topology net30,ifconfig 10.144.0.6 10.144.0.5,peer-id 0,cipher AES-256-GCM' (status=1) 09:04:43 foo/1.2.3.4:1194 Data Channel MTU parms [ L:1477 D:1450 EF:-23 EB:406 ET:0 EL:3 ] 09:04:43 foo/1.2.3.4:1194 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 09:04:43 foo/1.2.3.4:1194 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 09:04:43 foo/1.2.3.4:1194 MULTI: bad source address from client [::], packet dropped 09:05:23 foo/1.2.3.4:1194 TLS: new session incoming connection from [AF_INET]1.2.3.4:1194 09:05:23 foo/1.2.3.4:1194 peer info: IV_VER=2.4.1 09:05:23 foo/1.2.3.4:1194 peer info: IV_PLAT=win 09:05:23 foo/1.2.3.4:1194 peer info: IV_PROTO=2 09:05:23 foo/1.2.3.4:1194 peer info: IV_NCP=2 09:05:23 foo/1.2.3.4:1194 peer info: IV_LZ4=1 09:05:23 foo/1.2.3.4:1194 peer info: IV_LZ4v2=1 09:05:23 foo/1.2.3.4:1194 peer info: IV_LZO=1 09:05:23 foo/1.2.3.4:1194 peer info: IV_COMP_STUB=1 09:05:23 foo/1.2.3.4:1194 peer info: IV_COMP_STUBv2=1 09:05:23 foo/1.2.3.4:1194 peer info: IV_TCPNL=1 09:05:23 foo/1.2.3.4:1194 peer info: IV_GUI_VER=OpenVPN_GUI_11 09:05:23 foo/1.2.3.4:1194 TLS: Username/Password authentication succeeded for username 'foo' [CN SET] 09:05:23 foo/1.2.3.4:1194 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 09:05:23 foo/1.2.3.4:1194 TLS: tls_multi_process: untrusted session promoted to semi-trusted 09:05:23 foo/1.2.3.4:1194 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384 09:05:24 foo/1.2.3.4:1194 PUSH: Received control message: 'PUSH_REQUEST' 09:05:24 foo/1.2.3.4:1194 SENT CONTROL [foo]: 'PUSH_REPLY,ping 45,route 3.2.1.69,route 3.2.1.72,route 3.2.1.44,route 10.144.0.1,topology net30,ifconfig 10.144.0.6 10.144.0.5,peer-id 0,cipher AES-256-GCM' (status=1) 09:05:24 foo/1.2.3.4:1194 Data Channel MTU parms [ L:1405 D:1405 EF:-95 EB:406 ET:0 EL:3 ] 09:05:24 foo/1.2.3.4:1194 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 09:05:24 foo/1.2.3.4:1194 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 09:05:25 foo/1.2.3.4:1194 MULTI: bad source address from client [::], packet dropped 09:05:30 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1405) 09:11:39 last message repeated 67 times 09:11:43 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1405) 09:12:29 last message repeated 3 times 09:12:39 foo/1.2.3.4:1194 TLS: new session incoming connection from [AF_INET]1.2.3.4:1194 09:12:39 foo/1.2.3.4:1194 peer info: IV_VER=2.4.1 09:12:39 foo/1.2.3.4:1194 peer info: IV_PLAT=win 09:12:39 foo/1.2.3.4:1194 peer info: IV_PROTO=2 09:12:39 foo/1.2.3.4:1194 peer info: IV_NCP=2 09:12:39 foo/1.2.3.4:1194 peer info: IV_LZ4=1 09:12:39 foo/1.2.3.4:1194 peer info: IV_LZ4v2=1 09:12:39 foo/1.2.3.4:1194 peer info: IV_LZO=1 09:12:39 foo/1.2.3.4:1194 peer info: IV_COMP_STUB=1 09:12:39 foo/1.2.3.4:1194 peer info: IV_COMP_STUBv2=1 09:12:39 foo/1.2.3.4:1194 peer info: IV_TCPNL=1 09:12:39 foo/1.2.3.4:1194 peer info: IV_GUI_VER=OpenVPN_GUI_11 09:12:39 foo/1.2.3.4:1194 TLS: Username/Password authentication succeeded for username 'foo' [CN SET] 09:12:39 foo/1.2.3.4:1194 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 09:12:39 foo/1.2.3.4:1194 TLS: tls_multi_process: untrusted session promoted to semi-trusted 09:12:39 foo/1.2.3.4:1194 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384 09:12:41 foo/1.2.3.4:1194 PUSH: Received control message: 'PUSH_REQUEST' 09:12:41 foo/1.2.3.4:1194 SENT CONTROL [foo]: 'PUSH_REPLY,ping 45,route 3.2.1.69,route 3.2.1.72,route 3.2.1.44,route 10.144.0.1,topology net30,ifconfig 10.144.0.6 10.144.0.5,peer-id 0,cipher AES-256-GCM' (status=1) 09:12:41 foo/1.2.3.4:1194 Data Channel MTU parms [ L:1333 D:1333 EF:-167 EB:406 ET:0 EL:3 ] 09:12:41 foo/1.2.3.4:1194 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 09:12:41 foo/1.2.3.4:1194 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 09:12:41 foo/1.2.3.4:1194 MULTI: bad source address from client [::], packet dropped 09:13:23 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1333) 09:16:23 last message repeated 3 times 10:12:39 foo/1.2.3.4:1194 TLS: soft reset sec=0 bytes=23248/-1 pkts=237/0 10:12:39 foo/1.2.3.4:1194 peer info: IV_VER=2.4.1 10:12:39 foo/1.2.3.4:1194 peer info: IV_PLAT=win 10:12:39 foo/1.2.3.4:1194 peer info: IV_PROTO=2 10:12:39 foo/1.2.3.4:1194 peer info: IV_LZ4=1 10:12:39 foo/1.2.3.4:1194 peer info: IV_LZ4v2=1 10:12:39 foo/1.2.3.4:1194 peer info: IV_LZO=1 10:12:39 foo/1.2.3.4:1194 peer info: IV_COMP_STUB=1 10:12:39 foo/1.2.3.4:1194 peer info: IV_COMP_STUBv2=1 10:12:39 foo/1.2.3.4:1194 peer info: IV_TCPNL=1 10:12:39 foo/1.2.3.4:1194 peer info: IV_GUI_VER=OpenVPN_GUI_11 10:12:39 foo/1.2.3.4:1194 TLS: Username/Password authentication succeeded for username 'foo' [CN SET] 10:12:39 foo/1.2.3.4:1194 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 10:12:39 foo/1.2.3.4:1194 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 10:12:39 foo/1.2.3.4:1194 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384 10:45:34 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1333) 10:51:32 last message repeated 59 times 10:51:52 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1333) 10:55:27 last message repeated 39 times 10:55:27 foo/1.2.3.4:1194 NOTE: --mute triggered... 11:08:06 foo/1.2.3.4:1194 42 variation(s) on previous 100 message(s) suppressed by --mute 11:08:06 foo/1.2.3.4:1194 TLS: new session incoming connection from [AF_INET]1.2.3.4:1194 11:08:06 foo/1.2.3.4:1194 peer info: IV_VER=2.4.1 11:08:06 foo/1.2.3.4:1194 peer info: IV_PLAT=win 11:08:06 foo/1.2.3.4:1194 peer info: IV_PROTO=2 11:08:06 foo/1.2.3.4:1194 peer info: IV_NCP=2 11:08:06 foo/1.2.3.4:1194 peer info: IV_LZ4=1 11:08:06 foo/1.2.3.4:1194 peer info: IV_LZ4v2=1 11:08:06 foo/1.2.3.4:1194 peer info: IV_LZO=1 11:08:06 foo/1.2.3.4:1194 peer info: IV_COMP_STUB=1 11:08:06 foo/1.2.3.4:1194 peer info: IV_COMP_STUBv2=1 11:08:06 foo/1.2.3.4:1194 peer info: IV_TCPNL=1 11:08:06 foo/1.2.3.4:1194 peer info: IV_GUI_VER=OpenVPN_GUI_11 11:08:06 foo/1.2.3.4:1194 TLS: Username/Password authentication succeeded for username 'foo' [CN SET] 11:08:06 foo/1.2.3.4:1194 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 11:08:06 foo/1.2.3.4:1194 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 11:08:06 foo/1.2.3.4:1194 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 11:08:06 foo/1.2.3.4:1194 TLS: tls_multi_process: untrusted session promoted to semi-trusted 11:08:06 foo/1.2.3.4:1194 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384 11:08:07 foo/1.2.3.4:1194 PUSH: Received control message: 'PUSH_REQUEST' 11:08:07 foo/1.2.3.4:1194 PUSH: client wants to negotiate cipher (NCP), but server has already generated data channel keys, ignoring client request 11:08:07 foo/1.2.3.4:1194 SENT CONTROL [foo]: 'PUSH_REPLY,ping 45,route 3.2.1.69,route 3.2.1.72,route 3.2.1.44,route 10.144.0.1,topology net30,ifconfig 10.144.0.6 10.144.0.5,peer-id 0' (status=1) 11:08:07 foo/1.2.3.4:1194 AEAD Decrypt error: cipher final failed 11:08:10 last message repeated 16 times 11:08:10 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1333) 11:08:11 foo/1.2.3.4:1194 AEAD Decrypt error: cipher final failed 11:08:34 last message repeated 14 times 11:08:36 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1333) 11:08:38 foo/1.2.3.4:1194 AEAD Decrypt error: cipher final failed 11:09:10 last message repeated 1 time 11:09:29 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1333) 11:09:55 foo/1.2.3.4:1194 AEAD Decrypt error: cipher final failed 11:10:11 foo/1.2.3.4:1194 TLS: new session incoming connection from [AF_INET]1.2.3.4:1194 11:10:11 foo/1.2.3.4:1194 peer info: IV_VER=2.4.1 11:10:11 foo/1.2.3.4:1194 peer info: IV_PLAT=win 11:10:11 foo/1.2.3.4:1194 peer info: IV_PROTO=2 11:10:11 foo/1.2.3.4:1194 peer info: IV_NCP=2 11:10:11 foo/1.2.3.4:1194 peer info: IV_LZ4=1 11:10:11 foo/1.2.3.4:1194 peer info: IV_LZ4v2=1 11:10:11 foo/1.2.3.4:1194 peer info: IV_LZO=1 11:10:11 foo/1.2.3.4:1194 peer info: IV_COMP_STUB=1 11:10:11 foo/1.2.3.4:1194 peer info: IV_COMP_STUBv2=1 11:10:11 foo/1.2.3.4:1194 peer info: IV_TCPNL=1 11:10:11 foo/1.2.3.4:1194 peer info: IV_GUI_VER=OpenVPN_GUI_11 11:10:11 foo/1.2.3.4:1194 TLS: Username/Password authentication succeeded for username 'foo' [CN SET] 11:10:11 foo/1.2.3.4:1194 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 11:10:11 foo/1.2.3.4:1194 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 11:10:11 foo/1.2.3.4:1194 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 11:10:11 foo/1.2.3.4:1194 TLS: tls_multi_process: untrusted session promoted to semi-trusted 11:10:11 foo/1.2.3.4:1194 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384 11:10:13 foo/1.2.3.4:1194 PUSH: Received control message: 'PUSH_REQUEST' 11:10:13 foo/1.2.3.4:1194 PUSH: client wants to negotiate cipher (NCP), but server has already generated data channel keys, ignoring client request 11:10:13 foo/1.2.3.4:1194 SENT CONTROL [foo]: 'PUSH_REPLY,ping 45,route 3.2.1.69,route 3.2.1.72,route 3.2.1.44,route 10.144.0.1,topology net30,ifconfig 10.144.0.6 10.144.0.5,peer-id 0' (status=1) 11:10:13 foo/1.2.3.4:1194 AEAD Decrypt error: cipher final failed 11:10:28 last message repeated 21 times 11:10:29 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1333) 11:10:44 foo/1.2.3.4:1194 AEAD Decrypt error: cipher final failed 11:11:16 last message repeated 1 time 11:11:29 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1333) 11:12:01 foo/1.2.3.4:1194 AEAD Decrypt error: cipher final failed 11:12:18 foo/1.2.3.4:1194 TLS: new session incoming connection from [AF_INET]1.2.3.4:1194 11:12:18 foo/1.2.3.4:1194 peer info: IV_VER=2.4.1 11:12:18 foo/1.2.3.4:1194 peer info: IV_PLAT=win 11:12:18 foo/1.2.3.4:1194 peer info: IV_PROTO=2 11:12:18 foo/1.2.3.4:1194 peer info: IV_NCP=2 11:12:18 foo/1.2.3.4:1194 peer info: IV_LZ4=1 11:12:18 foo/1.2.3.4:1194 peer info: IV_LZ4v2=1 11:12:18 foo/1.2.3.4:1194 peer info: IV_LZO=1 11:12:18 foo/1.2.3.4:1194 peer info: IV_COMP_STUB=1 11:12:18 foo/1.2.3.4:1194 peer info: IV_COMP_STUBv2=1 11:12:18 foo/1.2.3.4:1194 peer info: IV_TCPNL=1 11:12:18 foo/1.2.3.4:1194 peer info: IV_GUI_VER=OpenVPN_GUI_11 11:12:18 foo/1.2.3.4:1194 TLS: Username/Password authentication succeeded for username 'foo' [CN SET] 11:12:18 foo/1.2.3.4:1194 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 11:12:18 foo/1.2.3.4:1194 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key 11:12:18 foo/1.2.3.4:1194 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 11:12:18 foo/1.2.3.4:1194 TLS: tls_multi_process: untrusted session promoted to semi-trusted 11:12:18 foo/1.2.3.4:1194 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384 11:12:19 foo/1.2.3.4:1194 PUSH: Received control message: 'PUSH_REQUEST' 11:12:19 foo/1.2.3.4:1194 PUSH: client wants to negotiate cipher (NCP), but server has already generated data channel keys, ignoring client request 11:12:19 foo/1.2.3.4:1194 SENT CONTROL [foo]: 'PUSH_REPLY,ping 45,route 3.2.1.69,route 3.2.1.72,route 3.2.1.44,route 10.144.0.1,topology net30,ifconfig 10.144.0.6 10.144.0.5,peer-id 0' (status=1) 11:12:19 foo/1.2.3.4:1194 AEAD Decrypt error: cipher final failed 11:12:28 last message repeated 20 times 11:12:29 foo/1.2.3.4:1194 TCP/UDP packet too large on write to [AF_INET]1.2.3.4:1194 (tried=1419,max=1333) 11:12:34 foo/1.2.3.4:1194 AEAD Decrypt error: cipher final failed [server ~]# kill -USR2 17119 13:18:28 OpenVPN CLIENT LIST 13:18:28 Updated,Thu Apr 27 13:18:28 2017 13:18:28 Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since 13:18:28 foo,1.2.3.4:1194,409392,347692,Thu Apr 27 09:04:10 2017 13:18:28 ROUTING TABLE 13:18:28 Virtual Address,Common Name,Real Address,Last Ref 13:18:28 10.144.0.6,foo,1.2.3.4:1194,Thu Apr 27 11:12:29 2017 13:18:28 GLOBAL STATS 13:18:28 Max bcast/mcast queue length,0 13:18:28 END