Добрый день! Не работает подключение к OpenVPN серверу? при подключении клиента Openvpn выдает ошибку:
TLS Error: Unroutable control packet received from 85.93.53.125:19387 (si=3 op=P_CONTROL_V1)
Конфиг клиента
client
tls-client
tls-auth "c:\\Program Files (x86)\\OpenVPN\\config\\taserver.key"
dev tun
port 19387
proto udp
remote 85.93.53.127
pkcs12 "c:\\Program Files\\OpenVPN\\config\\user.p12"
comp-lzo
cipher AES-256-CBC 256
mssfix 1300
fragment 1300
float
verb 5
mute 10
Конфиг сервера
;Включаем tls-сервер
tls-server
tls-auth /etc/openvpn/taserver.key
;Режим работы сервера
dev tun
;crl-verify /etc/openvpn/easy-rsa/keys/crl.pem
dh /etc/openvpn/dh1024.pem
ca /etc/openvpn/ca.crt
cert /etc/openvpn/server.crt
key /etc/openvpn/server.key
;Включение сжатия данных
comp-lzo
;Шифрование
cipher AES-256-CBC 256
;dhcp-server - OpenVPN сеть
server 192.168.7.192 255.255.255.224
;От чьего имени работает сервер
group nogroup
user nobody
;На каком порту работает
proto udp
port 19387
;Объявление маршрутов на клиентские сети
route 192.168.7.0 255.255.255.240
#route 192.168.7.228 255.255.255.252
#route 192.168.7.34 255.255.255.252
;Фрагментация пакетов
mssfix 1300
fragment 1300
;Пингование и перезапуск серверной и клиентской части
keepalive 30 90
;Дополнительные опции загрузки клиентов
client-config-dir /etc/openvpn/clients
ccd-exclusive
client-to-client
persist-tun
persist-key
;Логирование
log /var/log/openvpn/server
verb 5
mute 20
Лог файл сервера
WWRMon Sep 24 14:51:20 2012 us=216858 89.254.252.37:19387 TLS Error: Cannot accept new session request from [AF_INET]89.254.252.37:19387 due to sessi$
RMon Sep 24 14:51:22 2012 us=416852 89.254.252.37:19387 TLS Error: Cannot accept new session request from [AF_INET]89.254.252.37:19387 due to session$
WMon Sep 24 14:51:25 2012 us=516024 89.254.252.37:19387 SIGTERM[soft,delayed-exit] received, client-instance exiting
Mon Sep 24 14:51:26 2012 us=816845 MULTI: multi_create_instance called
Mon Sep 24 14:51:26 2012 us=816876 89.254.252.37:19387 Re-using SSL/TLS context
Mon Sep 24 14:51:26 2012 us=816887 89.254.252.37:19387 LZO compression initialized
Mon Sep 24 14:51:26 2012 us=816919 89.254.252.37:19387 Control Channel MTU parms [ L:1562 D:166 EF:66 EB:0 ET:0 EL:0 ]
Mon Sep 24 14:51:26 2012 us=816932 89.254.252.37:19387 Data Channel MTU parms [ L:1562 D:1300 EF:62 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Sep 24 14:51:26 2012 us=816941 89.254.252.37:19387 Fragmentation MTU parms [ L:1562 D:1300 EF:61 EB:135 ET:1 EL:0 AF:3/1 ]
Mon Sep 24 14:51:26 2012 us=816959 89.254.252.37:19387 Local Options String: 'V4,dev-type tun,link-mtu 1562,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dyn$
Mon Sep 24 14:51:26 2012 us=816966 89.254.252.37:19387 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1562,tun-mtu 1500,proto UDPv4,comp-l$
Mon Sep 24 14:51:26 2012 us=816977 89.254.252.37:19387 Local Options hash (VER=V4): 'e9ad447f'
Mon Sep 24 14:51:26 2012 us=816987 89.254.252.37:19387 Expected Remote Options hash (VER=V4): 'cbcea534'
RMon Sep 24 14:51:26 2012 us=817006 89.254.252.37:19387 TLS: Initial packet from [AF_INET]89.254.252.35:19384, sid=9aca1b71 31b0fa34
WRRWRWRWWWWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRRRRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRWRMon Sep 24 14:51:28 2012 us=217075 89.254.252.37:1$
Mon Sep 24 14:51:28 2012 us=217170 89.254.252.37:19387 VERIFY OK: depth=0, /C=RU/ST=43/L=Kirov/O=OPS/OU=razdolje-strizhy/CN=razdolje/emailAddress=adm$
WRWRWRWRWWWWRWRWRWRWRWRWRWRWRWRRRRWRWRWRMon Sep 24 14:51:28 2012 us=717018 89.254.252.37:19387 TLS Auth Error: --client-config-dir authentication fai$
WWWRRRMon Sep 24 14:51:28 2012 us=916907 89.254.252.37:19387 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Sep 24 14:51:28 2012 us=916928 89.254.252.37:19387 [user] Peer Connection Initiated with [AF_INET]89.254.252.37:19387
RMon Sep 24 14:51:31 2012 us=16869 89.254.252.37:19387 PUSH: Received control message: 'PUSH_REQUEST'
Mon Sep 24 14:51:31 2012 us=16884 89.254.252.37:19387 Delayed exit in 5 seconds
Mon Sep 24 14:51:31 2012 us=16899 89.254.252.37:19387 SENT CONTROL [razdolje]: 'AUTH_FAILED' (status=1)
WWWMon Sep 24 14:51:36 2012 us=157995 89.254.252.37:19387 SIGTERM[soft,delayed-exit] received, client-instance exiting
Лог файл клиента
ig = 'user.ovpn'
Mon Sep 24 14:40:49 2012 us=157000 mode = 0
Mon Sep 24 14:40:49 2012 us=157000 show_ciphers = DISABLED
Mon Sep 24 14:40:49 2012 us=157000 show_digests = DISABLED
Mon Sep 24 14:40:49 2012 us=157000 show_engines = DISABLED
Mon Sep 24 14:40:49 2012 us=157000 genkey = DISABLED
Mon Sep 24 14:40:49 2012 us=157000 key_pass_file = '[UNDEF]'
Mon Sep 24 14:40:49 2012 us=157000 show_tls_ciphers = DISABLED
Mon Sep 24 14:40:49 2012 us=157000 Connection profiles [default]:
Mon Sep 24 14:40:49 2012 us=157000 NOTE: --mute triggered...
Mon Sep 24 14:40:49 2012 us=157000 263 variation(s) on previous 10 message(s) suppressed by --mute
Mon Sep 24 14:40:49 2012 us=157000 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011
Mon Sep 24 14:40:49 2012 us=157000 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Sep 24 14:40:49 2012 us=157000 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Mon Sep 24 14:40:49 2012 us=266000 Control Channel Authentication: using 'c:\Program Files (x86)\OpenVPN\config\taserver.key' as a OpenVPN static key file
Mon Sep 24 14:40:49 2012 us=266000 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 24 14:40:49 2012 us=266000 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 24 14:40:49 2012 us=266000 LZO compression initialized
Mon Sep 24 14:40:49 2012 us=266000 Control Channel MTU parms [ L:1562 D:166 EF:66 EB:0 ET:0 EL:0 ]
Mon Sep 24 14:40:49 2012 us=266000 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Sep 24 14:40:49 2012 us=266000 Data Channel MTU parms [ L:1562 D:1300 EF:62 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Sep 24 14:40:49 2012 us=266000 Fragmentation MTU parms [ L:1562 D:1300 EF:61 EB:135 ET:1 EL:0 AF:3/1 ]
Mon Sep 24 14:40:49 2012 us=266000 Local Options String: 'V4,dev-type tun,link-mtu 1562,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
Mon Sep 24 14:40:49 2012 us=266000 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1562,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
Mon Sep 24 14:40:49 2012 us=266000 Local Options hash (VER=V4): 'cbcea534'
Mon Sep 24 14:40:49 2012 us=266000 Expected Remote Options hash (VER=V4): 'e9ad447f'
Mon Sep 24 14:40:49 2012 us=266000 UDPv4 link local (bound): [undef]:19384
Mon Sep 24 14:40:49 2012 us=266000 UDPv4 link remote: 85.93.53.122:19384
Mon Sep 24 14:40:51 2012 us=528000 TLS Error: Unroutable control packet received from 85.93.53.122:19384 (si=3 op=P_CONTROL_V1)
Mon Sep 24 14:40:55 2012 us=927000 TLS: Initial packet from 85.93.53.122:19384, sid=ba827fd2 f223cdb1
Mon Sep 24 14:40:56 2012 us=535000 VERIFY OK: depth=1, /C=RU/ST=44/L=ov/O=O/OU=Sty/CN=striv/name=str-srv/emailAddress=g@ki.ru
Mon Sep 24 14:40:56 2012 us=535000 VERIFY OK: depth=0, /C=RU/ST=44/L=Kv/O=OPS/OU=Str/CN=server/emailAddress=admin@ru
Mon Sep 24 14:40:57 2012 us=924000 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Sep 24 14:40:57 2012 us=924000 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 24 14:40:57 2012 us=924000 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Sep 24 14:40:57 2012 us=924000 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Sep 24 14:40:57 2012 us=924000 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Sep 24 14:40:57 2012 us=924000 [server] Peer Connection Initiated with 85.93.53.122:19384
Mon Sep 24 14:41:00 2012 us=45000 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Sep 24 14:41:00 2012 us=123000 AUTH: Received AUTH_FAILED control message
Mon Sep 24 14:41:00 2012 us=123000 TCP/UDP: Closing socket
Mon Sep 24 14:41:00 2012 us=123000 SIGTERM[soft,auth-failure] received, process exiting