Wed Mar 23 16:57:01 2022 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 1 2020
Wed Mar 23 16:57:01 2022 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
Wed Mar 23 16:57:01 2022 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 23 16:57:01 2022 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 23 16:57:01 2022 TCP/UDP: Preserving recently used remote address: [AF_INET]52.83.136.200:1194
Wed Mar 23 16:57:01 2022 Socket Buffers: R=[2097152->2097152] S=[212992->212992]
Wed Mar 23 16:57:01 2022 UDP link local: (not bound)
Wed Mar 23 16:57:01 2022 UDP link remote: [AF_INET]52.83.136.200:1194
Wed Mar 23 16:57:01 2022 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Wed Mar 23 16:57:01 2022 TLS: Initial packet from [AF_INET]52.83.136.200:1194, sid=ba26bcd1 1e52fb04
Wed Mar 23 16:57:01 2022 VERIFY OK: depth=1, CN=Easy-RSA CA
Wed Mar 23 16:57:01 2022 VERIFY KU OK
Wed Mar 23 16:57:01 2022 Validating certificate extended key usage
Wed Mar 23 16:57:01 2022 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Mar 23 16:57:01 2022 VERIFY EKU OK
Wed Mar 23 16:57:01 2022 VERIFY OK: depth=0, CN=server
Wed Mar 23 16:57:01 2022 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Wed Mar 23 16:57:01 2022 [server] Peer Connection Initiated with [AF_INET]52.83.136.200:1194
Wed Mar 23 16:57:02 2022 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Mar 23 16:57:02 2022 PUSH: Received control message: 'PUSH_REPLY,route 10.0.0.0 255.255.0.0,route 10.1.0.0 255.255.0.0,route 10.4.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 172.37.0.0 255.255.0.0,route 10.6.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.6.5.174 10.6.5.173'
Wed Mar 23 16:57:02 2022 OPTIONS IMPORT: timers and/or timeouts modified
Wed Mar 23 16:57:02 2022 OPTIONS IMPORT: --ifconfig/up options modified
Wed Mar 23 16:57:02 2022 OPTIONS IMPORT: route options modified
Wed Mar 23 16:57:02 2022 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Mar 23 16:57:02 2022 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 23 16:57:02 2022 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Mar 23 16:57:02 2022 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 23 16:57:02 2022 ROUTE_GATEWAY 10.10.100.1/255.255.255.0 IFACE=wlp3s0 HWADDR=38:fc:98:8c:69:23
Wed Mar 23 16:57:02 2022 TUN/TAP device tun2 opened
Wed Mar 23 16:57:02 2022 TUN/TAP TX queue length set to 100
Wed Mar 23 16:57:02 2022 /sbin/ip link set dev tun2 up mtu 1500
Wed Mar 23 16:57:02 2022 /sbin/ip addr add dev tun2 local 10.6.5.174 peer 10.6.5.173
Wed Mar 23 16:57:02 2022 /sbin/ip route add 10.0.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 10.1.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 10.4.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 172.31.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 172.37.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 10.6.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 GID set to nogroup
Wed Mar 23 16:57:03 2022 UID set to nobody
Wed Mar 23 16:57:03 2022 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Mar 23 16:57:03 2022 Initialization Sequence Completed
执行 sudo openvpn -config xxxx.xx.ovpn以后
Initialization Sequence Completed 加载到初始化阶段,就开始卡住,超时
以下是日志
Wed Mar 23 16:57:01 2022 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 1 2020
Wed Mar 23 16:57:01 2022 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
Wed Mar 23 16:57:01 2022 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 23 16:57:01 2022 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 23 16:57:01 2022 TCP/UDP: Preserving recently used remote address: [AF_INET]52.83.136.200:1194
Wed Mar 23 16:57:01 2022 Socket Buffers: R=[2097152->2097152] S=[212992->212992]
Wed Mar 23 16:57:01 2022 UDP link local: (not bound)
Wed Mar 23 16:57:01 2022 UDP link remote: [AF_INET]52.83.136.200:1194
Wed Mar 23 16:57:01 2022 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
Wed Mar 23 16:57:01 2022 TLS: Initial packet from [AF_INET]52.83.136.200:1194, sid=ba26bcd1 1e52fb04
Wed Mar 23 16:57:01 2022 VERIFY OK: depth=1, CN=Easy-RSA CA
Wed Mar 23 16:57:01 2022 VERIFY KU OK
Wed Mar 23 16:57:01 2022 Validating certificate extended key usage
Wed Mar 23 16:57:01 2022 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Mar 23 16:57:01 2022 VERIFY EKU OK
Wed Mar 23 16:57:01 2022 VERIFY OK: depth=0, CN=server
Wed Mar 23 16:57:01 2022 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Wed Mar 23 16:57:01 2022 [server] Peer Connection Initiated with [AF_INET]52.83.136.200:1194
Wed Mar 23 16:57:02 2022 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Mar 23 16:57:02 2022 PUSH: Received control message: 'PUSH_REPLY,route 10.0.0.0 255.255.0.0,route 10.1.0.0 255.255.0.0,route 10.4.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 172.37.0.0 255.255.0.0,route 10.6.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.6.5.174 10.6.5.173'
Wed Mar 23 16:57:02 2022 OPTIONS IMPORT: timers and/or timeouts modified
Wed Mar 23 16:57:02 2022 OPTIONS IMPORT: --ifconfig/up options modified
Wed Mar 23 16:57:02 2022 OPTIONS IMPORT: route options modified
Wed Mar 23 16:57:02 2022 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Mar 23 16:57:02 2022 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 23 16:57:02 2022 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Mar 23 16:57:02 2022 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
Wed Mar 23 16:57:02 2022 ROUTE_GATEWAY 10.10.100.1/255.255.255.0 IFACE=wlp3s0 HWADDR=38:fc:98:8c:69:23
Wed Mar 23 16:57:02 2022 TUN/TAP device tun2 opened
Wed Mar 23 16:57:02 2022 TUN/TAP TX queue length set to 100
Wed Mar 23 16:57:02 2022 /sbin/ip link set dev tun2 up mtu 1500
Wed Mar 23 16:57:02 2022 /sbin/ip addr add dev tun2 local 10.6.5.174 peer 10.6.5.173
Wed Mar 23 16:57:02 2022 /sbin/ip route add 10.0.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 10.1.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 10.4.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 172.31.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 172.37.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 /sbin/ip route add 10.6.0.0/16 via 10.6.5.173
Wed Mar 23 16:57:03 2022 GID set to nogroup
Wed Mar 23 16:57:03 2022 UID set to nobody
Wed Mar 23 16:57:03 2022 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Mar 23 16:57:03 2022 Initialization Sequence Completed