American Posted August 30, 2023 Share Posted August 30, 2023 Keenetic Extra, позавчера еще все работало нормально, OpenVPN, вчера и сегодня уже нет, подключаюсь через инет в Кинетику, соединение есть, но нет доступа ни к одному устройству, ничего не трогали на роутере за это время, в логах ошибка первая строка красным стала Wed Aug 30 19:42:11 2023 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). OpenVPN ignores --cipher for cipher negotiations. Wed Aug 30 19:42:11 2023 Note: ovpn-dco-win driver is missing, disabling data channel offload. Wed Aug 30 19:42:11 2023 OpenVPN 2.6.5 [git:v2.6.5/cbc9e0ce412e7b42] Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] [DCO] built on Jun 13 2023 Wed Aug 30 19:42:11 2023 Windows version 10.0 (Windows 10 or greater), amd64 executable Wed Aug 30 19:42:11 2023 library versions: OpenSSL 3.1.1 30 May 2023, LZO 2.10 Wed Aug 30 19:42:11 2023 DCO version: v0 Wed Aug 30 19:42:11 2023 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340 Wed Aug 30 19:42:11 2023 Need hold release from management interface, waiting... Wed Aug 30 19:42:12 2023 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:57720 Wed Aug 30 19:42:12 2023 MANAGEMENT: CMD 'state on' Wed Aug 30 19:42:12 2023 MANAGEMENT: CMD 'log on all' Wed Aug 30 19:42:12 2023 MANAGEMENT: CMD 'echo on all' Wed Aug 30 19:42:12 2023 MANAGEMENT: CMD 'bytecount 5' Wed Aug 30 19:42:12 2023 MANAGEMENT: CMD 'state' Wed Aug 30 19:42:12 2023 MANAGEMENT: CMD 'hold off' Wed Aug 30 19:42:12 2023 MANAGEMENT: CMD 'hold release' Wed Aug 30 19:42:12 2023 TCP/UDP: Preserving recently used remote address: [AF_INET]xxx.xxx.xxx.xxx:1194 Wed Aug 30 19:42:12 2023 Socket Buffers: R=[65536->65536] S=[65536->65536] Wed Aug 30 19:42:12 2023 UDPv4 link local: (not bound) Wed Aug 30 19:42:12 2023 UDPv4 link remote: [AF_INET]xxx.xxx.xxx.xxx:1194 Wed Aug 30 19:42:12 2023 MANAGEMENT: >STATE:1693413732,WAIT,,,,,, Wed Aug 30 19:42:12 2023 MANAGEMENT: >STATE:1693413732,AUTH,,,,,, Wed Aug 30 19:42:12 2023 TLS: Initial packet from [AF_INET]xxx.xxx.xxx.xxx:1194, sid=b35c977c c69a79c3 Wed Aug 30 19:42:13 2023 VERIFY OK: depth=1, C=RU, ST=TAT, L=Kazan, O=Vantar, OU=changeme, CN=VantarKeenetic, name=VantarKey, emailAddress=mail@host.domain Wed Aug 30 19:42:13 2023 VERIFY KU OK Wed Aug 30 19:42:13 2023 Validating certificate extended key usage Wed Aug 30 19:42:13 2023 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Wed Aug 30 19:42:13 2023 VERIFY EKU OK Wed Aug 30 19:42:13 2023 VERIFY OK: depth=0, C=RU, ST=TAT, L=Kazan, O=Yantar, OU=changeme, CN=YantarKeenetic, name=YantarKey, emailAddress=mail@host.domain Wed Aug 30 19:42:14 2023 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA256 Wed Aug 30 19:42:14 2023 [YantarKeenetic] Peer Connection Initiated with [AF_INET]217.66.21.10:1194 Wed Aug 30 19:42:14 2023 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Wed Aug 30 19:42:14 2023 TLS: tls_multi_process: initial untrusted session promoted to trusted что может быть? Может провайдер намудрил? Работало годами Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.