Nothing unusual that I see. Tunnelblick doesn't appear to notice
there's a problem for a long time and then it just restarts suddenly 5
- 10 minutes later and is all good again for the next 2 minutes.
I'm using 3.0b10, by the way. The latest version had problems for me,
so I stuck with what worked (until now). Here's the details for one
connection up until it dies and restarts. It dies like 2 minutes after
it successfully connected and the details don't show anything else
until it restarts a couple more minutes afterward.
Tue 05/04/10 10:35 AM: OpenVPN 2.1_rc15 i386-apple-darwin9.5.0 [SSL]
[LZO2] built on Nov 19 2008
Tue 05/04/10 10:35 AM: MANAGEMENT: TCP Socket listening on
127.0.0.1:1337
Tue 05/04/10 10:35 AM: waiting...
Tue 05/04/10 10:35 AM: MANAGEMENT: Client connected from
127.0.0.1:1337
Wed 12/31/69 07:00 PM: END
Wed 12/31/69 07:00 PM: SUCCESS: hold release succeeded
Tue 05/04/10 10:35 AM: NOTE: the current --script-security setting may
allow this configuration to call user-defined scripts
Wed 12/31/69 07:00 PM: but not yet verified
Tue 05/04/10 10:35 AM: WARNING: this configuration may cache passwords
in memory -- use the auth-nocache option to prevent this
Tue 05/04/10 10:35 AM: WARNING: file 'jprivett-desktop.key' is group
or others accessible
Tue 05/04/10 10:35 AM: Control Channel MTU parms [ L:1589 D:138 EF:38
EB:0 ET:0 EL:0 ]
Tue 05/04/10 10:35 AM: Data Channel MTU parms [ L:1589 D:1450 EF:57 EB:
4 ET:32 EL:0 ]
Tue 05/04/10 10:35 AM: Local Options hash (VER=V4): '7778e742'
Tue 05/04/10 10:35 AM: Expected Remote Options hash (VER=V4):
'3c42a582'
Tue 05/04/10 10:35 AM: or --up-delay
Tue 05/04/10 10:35 AM: Socket Buffers: R=[42080->65536] S=[9216-
>65536]
Tue 05/04/10 10:35 AM: UDPv4 link local: [undef]
Tue 05/04/10 10:35 AM: UDPv4 link remote:
69.16.130.6:1194
Tue 05/04/10 10:35 AM:
Tue 05/04/10 10:35 AM:
Tue 05/04/10 10:35 AM: sid=0666815c 2f59cc96
Tue 05/04/10 10:35 AM: /C=US/ST=AZ/L=Phoenix/
O=xxxxxxxxx_Support_OpenVPN/CN=xxxxxxxxx_Support_OpenVPN_CA/
emailAddress=xxxxxxxxx
Tue 05/04/10 10:35 AM: VERIFY OK: nsCertType=SERVER
Tue 05/04/10 10:35 AM: /C=US/ST=AZ/L=Phoenix/
O=xxxxxxxxx_Support_OpenVPN/CN=support/emailAddress=xxxxxxxxx
Tue 05/04/10 10:35 AM: Data Channel Encrypt: Cipher 'AES-256-CBC'
initialized with 256 bit key
Tue 05/04/10 10:35 AM: Data Channel Encrypt: Using 160 bit message
hash 'SHA1' for HMAC authentication
Tue 05/04/10 10:35 AM: Data Channel Decrypt: Cipher 'AES-256-CBC'
initialized with 256 bit key
Tue 05/04/10 10:35 AM: Data Channel Decrypt: Using 160 bit message
hash 'SHA1' for HMAC authentication
Tue 05/04/10 10:35 AM: 2048 bit RSA
Tue 05/04/10 10:35 AM: [support] Peer Connection Initiated with
xxxxxxxxx:1194
Tue 05/04/10 10:35 AM:
Tue 05/04/10 10:35 AM: SENT CONTROL [support]:
'PUSH_REQUEST' (status=1)
Tue 05/04/10 10:35 AM: ifconfig xxxxxxxxx 255.255.255.192'
Tue 05/04/10 10:35 AM: OPTIONS IMPORT: --ifconfig/up options modified
Tue 05/04/10 10:35 AM: OPTIONS IMPORT: route options modified
Tue 05/04/10 10:35 AM: OPTIONS IMPORT: route-related options modified
Tue 05/04/10 10:35 AM: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option
options modified
Tue 05/04/10 10:35 AM: ROUTE default_gateway=192.168.10.1
Tue 05/04/10 10:35 AM: TUN/TAP device /dev/tap1 opened
Tue 05/04/10 10:35 AM:
Tue 05/04/10 10:35 AM: /sbin/ifconfig tap1 delete
Tue 05/04/10 10:35 AM: NOTE: Tried to delete pre-existing tun/tap
instance -- No Problem if failure
Tue 05/04/10 10:35 AM: /sbin/ifconfig tap1 xxxxxxxxx netmask
255.255.255.192 mtu 1500 up
Tue 05/04/10 10:35 AM:
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.192.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.240.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.0.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.0.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.255.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.255.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.255.255
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.224.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.255.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.255.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.224.0
Tue 05/04/10 10:35 AM: /sbin/route add -net xxxxxxxxx xxxxxxxxx
255.255.255.255
Tue 05/04/10 10:35 AM: GID set to nobody
Tue 05/04/10 10:35 AM: UID set to nobody
Tue 05/04/10 10:35 AM: Initialization Sequence Completed
Tue 05/04/10 10:35 AM: xxxxxxxxx
Tue 05/04/10 10:39 AM: restarting
Tue 05/04/10 10:39 AM: TCP/UDP: Closing socket
Tue 05/04/10 10:39 AM: process restarting
Tue 05/04/10 10:39 AM:
Wed 12/31/69 07:00 PM: SUCCESS: hold release succeeded
Tue 05/04/10 10:39 AM: NOTE: the current --script-security setting may
allow this configuration to call user-defined scripts
Tue 05/04/10 10:39 AM: Re-using SSL/TLS context
I did find this in the system.log, through. May or may not be useful:
May 4 10:35:04 Argontia openvpn[809]: MANAGEMENT: >STATE:
1272983704,CONNECTED,SUCCESS,xxxxxxxxxxx,xxxxxxxxxx
May 4 10:39:03 Argontia openvpn[809]: [support] Inactivity timeout (--
ping-restart), restarting
May 4 10:39:03 Argontia openvpn[809]: TCP/UDP: Closing socket
May 4 10:39:03 Argontia openvpn[809]: SIGUSR1[soft,ping-restart]
received, process restarting
May 4 10:39:03 Argontia openvpn[809]: MANAGEMENT: >STATE:
1272983943,RECONNECTING,ping-restart,,
And here's my config file:
# Specify that we are a client and that we
# will be pulling certain config file directives
# from the server.
client
# Use the same setting as you are using on
# the server.
# On most systems, the VPN will not function
# unless you partially or fully disable
# the firewall for the TUN/TAP interface.
dev tap1
;dev tun
# Windows needs the TAP-Win32 adapter name
# from the Network Connections panel
# if you have more than one. On XP SP2,
# you may need to disable the firewall
# for the TAP adapter.
# Are we connecting to a TCP or
# UDP server? Use the same setting as
# on the server.
;proto tcp
proto udp
# The hostname/IP and port of the server.
# You can have multiple remote entries
# to load balance between the servers.
#
# Use this entry for public IP pool
remote xxxxxxxxxx 1194
# Use this entry for nat'd private IP pool (remember to change proto
to tcp)
;remote xxxxxxxxxx443
# Choose a random host from the remote
# list for load-balancing. Otherwise
# try hosts in the order specified.
;remote-random
# Keep trying indefinitely to resolve the
# host name of the OpenVPN server. Very useful
# on machines which are not permanently connected
# to the internet such as laptops.
resolv-retry infinite
# Most clients don't need to bind to
# a specific local port number.
nobind
# Downgrade privileges after initialization (non-Windows only)
user nobody
group nobody
# Try to preserve some state across restarts.
persist-key
persist-tun
# If you are connecting through an
# HTTP proxy to reach the actual OpenVPN
# server, put the proxy server/IP and
# port number here. See the man page
# if your proxy server requires
# authentication.
;http-proxy-retry # retry on connection failures
;http-proxy [proxy server] [proxy port #]
# Wireless networks often produce a lot
# of duplicate packets. Set this flag
# to silence duplicate packet warnings.
;mute-replay-warnings
# SSL/TLS parms.
# See the server config file for more
# description. It's best to use
# a separate .crt/.key file pair
# for each client. A single ca
# file can be used for all clients.
ca ca.crt
cert jprivett-desktop.crt
key jprivett-desktop.key
# Verify server certificate by checking
# that the certicate has the nsCertType
# field set to "server". This is an
# important precaution to protect against
# a potential attack discussed here:
#
http://openvpn.net/howto.html#mitm
#
# To use this feature, you will need to generate
# your server certificates with the nsCertType
# field set to "server". The build-key-server
# script in the easy-rsa folder will do this.
ns-cert-type server
# If a tls-auth key is used on the server
# then every client must also have the key.
;tls-auth ta.key 1
# Select a cryptographic cipher.
# If the cipher option is used on the server
# then you must also specify it here.
cipher AES-256-CBC
# Enable compression on the VPN link.
# Don't enable this unless it is also
# enabled in the server config file.
;comp-lzo
# Set log file verbosity.
verb 3
# Silence repeating messages
;mute 20
Thanks for your help.