Serverstats - Aktuelle Infos zu den Servern

ECHT KLASSE

Das hat ja lange gehalten! Am 12. September hieß es, OpenVPN sei „gefixt“. Genau eine Woche lief’s – und seit eben geht wieder nix. Keine Verbindung über OpenVPN möglich, bei allen Servern das gleiche Problem. Hat jemand das auch oder kriegt ihr’s irgendwie hin?
Fri Sep 19 13:52:05 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:05 2025 MANAGEMENT: >STATE:1758282725,WAIT,,,,,, Fri Sep 19 13:52:05 2025 MANAGEMENT: >STATE:1758282725,AUTH,,,,,, Fri Sep 19 13:52:05 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=af18c4ae 8d386888 Fri Sep 19 13:52:05 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:05 2025 VERIFY KU OK Fri Sep 19 13:52:05 2025 Validating certificate extended key usage Fri Sep 19 13:52:05 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:05 2025 VERIFY EKU OK Fri Sep 19 13:52:05 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:05 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:05 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:05 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:05 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:06 2025 MANAGEMENT: >STATE:1758282726,GET_CONFIG,,,,,, Fri Sep 19 13:52:06 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:06 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:06 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:06 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:06 2025 MANAGEMENT: >STATE:1758282726,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:06 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:07 2025 Re-using SSL/TLS context Fri Sep 19 13:52:07 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:07 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:07 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:07 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:07 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:07 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:07 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:07 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:07 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:07 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:07 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:07 2025 MANAGEMENT: >STATE:1758282727,WAIT,,,,,, Fri Sep 19 13:52:07 2025 MANAGEMENT: >STATE:1758282727,AUTH,,,,,, Fri Sep 19 13:52:07 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=7d255c0f 07574f96 Fri Sep 19 13:52:07 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:07 2025 VERIFY KU OK Fri Sep 19 13:52:07 2025 Validating certificate extended key usage Fri Sep 19 13:52:07 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:07 2025 VERIFY EKU OK Fri Sep 19 13:52:07 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:07 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:07 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:07 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:07 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:09 2025 MANAGEMENT: >STATE:1758282729,GET_CONFIG,,,,,, Fri Sep 19 13:52:09 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:09 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:09 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:09 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:09 2025 MANAGEMENT: >STATE:1758282729,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:09 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:10 2025 Re-using SSL/TLS context Fri Sep 19 13:52:10 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:10 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:10 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:10 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:10 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:10 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:10 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:10 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:10 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:10 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:10 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:10 2025 MANAGEMENT: >STATE:1758282730,WAIT,,,,,, Fri Sep 19 13:52:10 2025 MANAGEMENT: >STATE:1758282730,AUTH,,,,,, Fri Sep 19 13:52:10 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=ee6e65b7 68d32266 Fri Sep 19 13:52:10 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:10 2025 VERIFY KU OK Fri Sep 19 13:52:10 2025 Validating certificate extended key usage Fri Sep 19 13:52:10 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:10 2025 VERIFY EKU OK Fri Sep 19 13:52:10 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:10 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:10 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:10 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:10 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:11 2025 MANAGEMENT: >STATE:1758282731,GET_CONFIG,,,,,, Fri Sep 19 13:52:11 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:11 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:11 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:11 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:11 2025 MANAGEMENT: >STATE:1758282731,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:11 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:12 2025 Re-using SSL/TLS context Fri Sep 19 13:52:12 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:12 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:12 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:12 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:12 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:12 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:12 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:12 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:12 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:12 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:12 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:12 2025 MANAGEMENT: >STATE:1758282732,WAIT,,,,,, Fri Sep 19 13:52:12 2025 MANAGEMENT: >STATE:1758282732,AUTH,,,,,, Fri Sep 19 13:52:12 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=65611dc3 03430022 Fri Sep 19 13:52:12 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:12 2025 VERIFY KU OK Fri Sep 19 13:52:12 2025 Validating certificate extended key usage Fri Sep 19 13:52:12 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:12 2025 VERIFY EKU OK Fri Sep 19 13:52:12 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:12 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:12 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:12 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:12 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:13 2025 MANAGEMENT: >STATE:1758282733,GET_CONFIG,,,,,, Fri Sep 19 13:52:13 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:13 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:13 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:13 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:13 2025 MANAGEMENT: >STATE:1758282733,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:13 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:14 2025 Re-using SSL/TLS context Fri Sep 19 13:52:14 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:14 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:14 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:14 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:14 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:14 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:14 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:14 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:14 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:14 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:14 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:14 2025 MANAGEMENT: >STATE:1758282734,WAIT,,,,,, Fri Sep 19 13:52:14 2025 MANAGEMENT: >STATE:1758282734,AUTH,,,,,, Fri Sep 19 13:52:14 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=296fe8b3 bee9f7b3 Fri Sep 19 13:52:14 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:14 2025 VERIFY KU OK Fri Sep 19 13:52:14 2025 Validating certificate extended key usage Fri Sep 19 13:52:14 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:14 2025 VERIFY EKU OK Fri Sep 19 13:52:14 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:14 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:14 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:14 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:14 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:15 2025 MANAGEMENT: >STATE:1758282735,GET_CONFIG,,,,,, Fri Sep 19 13:52:15 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:15 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:15 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:15 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:15 2025 MANAGEMENT: >STATE:1758282735,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:15 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:16 2025 Re-using SSL/TLS context Fri Sep 19 13:52:16 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:16 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:16 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:16 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:16 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:16 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:16 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:16 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:16 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:16 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:16 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:16 2025 MANAGEMENT: >STATE:1758282736,WAIT,,,,,, Fri Sep 19 13:52:16 2025 MANAGEMENT: >STATE:1758282736,AUTH,,,,,, Fri Sep 19 13:52:16 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=e34cd6dd 9c7c0257 Fri Sep 19 13:52:16 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:16 2025 VERIFY KU OK Fri Sep 19 13:52:16 2025 Validating certificate extended key usage Fri Sep 19 13:52:16 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:16 2025 VERIFY EKU OK Fri Sep 19 13:52:16 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:17 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:17 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:17 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:17 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:18 2025 MANAGEMENT: >STATE:1758282738,GET_CONFIG,,,,,, Fri Sep 19 13:52:18 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:18 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:18 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:18 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:18 2025 MANAGEMENT: >STATE:1758282738,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:18 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:19 2025 Re-using SSL/TLS context Fri Sep 19 13:52:19 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:19 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:19 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:19 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:19 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:19 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:19 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:19 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:19 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:19 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:19 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:19 2025 MANAGEMENT: >STATE:1758282739,WAIT,,,,,, Fri Sep 19 13:52:19 2025 MANAGEMENT: >STATE:1758282739,AUTH,,,,,, Fri Sep 19 13:52:19 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=f7e10353 36064e80 Fri Sep 19 13:52:19 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:19 2025 VERIFY KU OK Fri Sep 19 13:52:19 2025 Validating certificate extended key usage Fri Sep 19 13:52:19 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:19 2025 VERIFY EKU OK Fri Sep 19 13:52:19 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:19 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:19 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:19 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:19 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:20 2025 MANAGEMENT: >STATE:1758282740,GET_CONFIG,,,,,, Fri Sep 19 13:52:20 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:20 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:20 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:20 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:20 2025 MANAGEMENT: >STATE:1758282740,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:20 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:21 2025 Re-using SSL/TLS context Fri Sep 19 13:52:21 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:21 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:21 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:21 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:21 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:21 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:21 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:21 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:21 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:21 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:21 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:21 2025 MANAGEMENT: >STATE:1758282741,WAIT,,,,,, Fri Sep 19 13:52:21 2025 MANAGEMENT: >STATE:1758282741,AUTH,,,,,, Fri Sep 19 13:52:21 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=bcca23ae c7931289 Fri Sep 19 13:52:21 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:21 2025 VERIFY KU OK Fri Sep 19 13:52:21 2025 Validating certificate extended key usage Fri Sep 19 13:52:21 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:21 2025 VERIFY EKU OK Fri Sep 19 13:52:21 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:21 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:21 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:21 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:21 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:22 2025 MANAGEMENT: >STATE:1758282742,GET_CONFIG,,,,,, Fri Sep 19 13:52:22 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:22 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:22 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:22 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:22 2025 MANAGEMENT: >STATE:1758282742,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:22 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:23 2025 Re-using SSL/TLS context Fri Sep 19 13:52:23 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:23 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:23 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:23 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:23 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:23 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:23 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:23 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:23 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:23 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:23 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:23 2025 MANAGEMENT: >STATE:1758282743,WAIT,,,,,, Fri Sep 19 13:52:23 2025 MANAGEMENT: >STATE:1758282743,AUTH,,,,,, Fri Sep 19 13:52:23 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=03b2e42f 8bd933ec Fri Sep 19 13:52:23 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:23 2025 VERIFY KU OK Fri Sep 19 13:52:23 2025 Validating certificate extended key usage Fri Sep 19 13:52:23 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:23 2025 VERIFY EKU OK Fri Sep 19 13:52:23 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:23 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:23 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:23 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:23 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:24 2025 MANAGEMENT: >STATE:1758282744,GET_CONFIG,,,,,, Fri Sep 19 13:52:24 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:24 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:24 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:24 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:24 2025 MANAGEMENT: >STATE:1758282744,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:24 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:25 2025 Re-using SSL/TLS context Fri Sep 19 13:52:25 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:25 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:25 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:25 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:25 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:25 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:25 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:25 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:25 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:25 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:25 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:25 2025 MANAGEMENT: >STATE:1758282745,WAIT,,,,,, Fri Sep 19 13:52:25 2025 MANAGEMENT: >STATE:1758282745,AUTH,,,,,, Fri Sep 19 13:52:25 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=626a9a98 ebc84f63 Fri Sep 19 13:52:25 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:25 2025 VERIFY KU OK Fri Sep 19 13:52:25 2025 Validating certificate extended key usage Fri Sep 19 13:52:25 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:25 2025 VERIFY EKU OK Fri Sep 19 13:52:25 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:26 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:26 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:26 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:26 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:27 2025 MANAGEMENT: >STATE:1758282747,GET_CONFIG,,,,,, Fri Sep 19 13:52:27 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:27 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:27 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:27 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:27 2025 MANAGEMENT: >STATE:1758282747,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:27 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:28 2025 Re-using SSL/TLS context Fri Sep 19 13:52:28 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:28 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:28 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:28 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:28 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:28 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:28 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:28 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:28 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:28 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:28 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:28 2025 MANAGEMENT: >STATE:1758282748,WAIT,,,,,, Fri Sep 19 13:52:28 2025 MANAGEMENT: >STATE:1758282748,AUTH,,,,,, Fri Sep 19 13:52:28 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=c68a448a 50f64385 Fri Sep 19 13:52:28 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:28 2025 VERIFY KU OK Fri Sep 19 13:52:28 2025 Validating certificate extended key usage Fri Sep 19 13:52:28 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:28 2025 VERIFY EKU OK Fri Sep 19 13:52:28 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:28 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:28 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:28 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:28 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:29 2025 MANAGEMENT: >STATE:1758282749,GET_CONFIG,,,,,, Fri Sep 19 13:52:29 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:29 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:29 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:29 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:29 2025 MANAGEMENT: >STATE:1758282749,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:29 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:30 2025 Re-using SSL/TLS context Fri Sep 19 13:52:30 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:30 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:30 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:30 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:30 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:30 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:30 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:30 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:30 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:30 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:30 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:30 2025 MANAGEMENT: >STATE:1758282750,WAIT,,,,,, Fri Sep 19 13:52:30 2025 MANAGEMENT: >STATE:1758282750,AUTH,,,,,, Fri Sep 19 13:52:30 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=314f34d0 0ce8f53e Fri Sep 19 13:52:30 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:30 2025 VERIFY KU OK Fri Sep 19 13:52:30 2025 Validating certificate extended key usage Fri Sep 19 13:52:30 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:30 2025 VERIFY EKU OK Fri Sep 19 13:52:30 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:30 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:30 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:30 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:30 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:32 2025 MANAGEMENT: >STATE:1758282752,GET_CONFIG,,,,,, Fri Sep 19 13:52:32 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:32 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:32 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:32 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:32 2025 MANAGEMENT: >STATE:1758282752,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:32 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:33 2025 Re-using SSL/TLS context Fri Sep 19 13:52:33 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:33 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:33 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:33 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:33 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:33 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:33 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:33 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:33 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:33 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:33 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:33 2025 MANAGEMENT: >STATE:1758282753,WAIT,,,,,, Fri Sep 19 13:52:33 2025 MANAGEMENT: >STATE:1758282753,AUTH,,,,,, Fri Sep 19 13:52:33 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=1c5bdae7 4f4bc0de Fri Sep 19 13:52:33 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:33 2025 VERIFY KU OK Fri Sep 19 13:52:33 2025 Validating certificate extended key usage Fri Sep 19 13:52:33 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:33 2025 VERIFY EKU OK Fri Sep 19 13:52:33 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:33 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:33 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:33 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:33 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:34 2025 MANAGEMENT: >STATE:1758282754,GET_CONFIG,,,,,, Fri Sep 19 13:52:34 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:34 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:34 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:34 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:34 2025 MANAGEMENT: >STATE:1758282754,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:34 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:35 2025 Re-using SSL/TLS context Fri Sep 19 13:52:35 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:35 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:35 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:35 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:35 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:35 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:35 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:35 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:35 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:35 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:35 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:35 2025 MANAGEMENT: >STATE:1758282755,WAIT,,,,,, Fri Sep 19 13:52:35 2025 MANAGEMENT: >STATE:1758282755,AUTH,,,,,, Fri Sep 19 13:52:35 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=c2df7638 493ca456 Fri Sep 19 13:52:35 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:35 2025 VERIFY KU OK Fri Sep 19 13:52:35 2025 Validating certificate extended key usage Fri Sep 19 13:52:35 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:35 2025 VERIFY EKU OK Fri Sep 19 13:52:35 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:35 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:35 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:35 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:35 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:36 2025 MANAGEMENT: >STATE:1758282756,GET_CONFIG,,,,,, Fri Sep 19 13:52:36 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:36 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:36 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:36 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:36 2025 MANAGEMENT: >STATE:1758282756,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:36 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:37 2025 Re-using SSL/TLS context Fri Sep 19 13:52:37 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:37 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:37 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:37 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:37 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:37 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:37 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:37 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:37 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:37 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:37 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:37 2025 MANAGEMENT: >STATE:1758282757,WAIT,,,,,, Fri Sep 19 13:52:37 2025 MANAGEMENT: >STATE:1758282757,AUTH,,,,,, Fri Sep 19 13:52:37 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=bea08be1 14de71a6 Fri Sep 19 13:52:37 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:37 2025 VERIFY KU OK Fri Sep 19 13:52:37 2025 Validating certificate extended key usage Fri Sep 19 13:52:37 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:37 2025 VERIFY EKU OK Fri Sep 19 13:52:37 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:37 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:37 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:37 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:37 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted Fri Sep 19 13:52:38 2025 MANAGEMENT: >STATE:1758282758,GET_CONFIG,,,,,, Fri Sep 19 13:52:38 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1) Fri Sep 19 13:52:38 2025 AUTH: Received control message: AUTH_FAILED Fri Sep 19 13:52:38 2025 TCP/UDP: Closing socket Fri Sep 19 13:52:38 2025 SIGUSR1[soft,auth-failure] received, process restarting Fri Sep 19 13:52:38 2025 MANAGEMENT: >STATE:1758282758,RECONNECTING,auth-failure,,,,, Fri Sep 19 13:52:38 2025 Restart pause, 1 second(s) Fri Sep 19 13:52:39 2025 Re-using SSL/TLS context Fri Sep 19 13:52:39 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:39 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:39 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Fri Sep 19 13:52:39 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Fri Sep 19 13:52:39 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] Fri Sep 19 13:52:39 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:39 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ] Fri Sep 19 13:52:39 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:39 2025 Socket Buffers: R=[8192->8192] S=[8192->8192] Fri Sep 19 13:52:39 2025 UDPv4 link local: (not bound) Fri Sep 19 13:52:39 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:39 2025 MANAGEMENT: >STATE:1758282759,WAIT,,,,,, Fri Sep 19 13:52:39 2025 MANAGEMENT: >STATE:1758282759,AUTH,,,,,, Fri Sep 19 13:52:39 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=dde4ad06 bbd813cb Fri Sep 19 13:52:39 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:39 2025 VERIFY KU OK Fri Sep 19 13:52:39 2025 Validating certificate extended key usage Fri Sep 19 13:52:39 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri Sep 19 13:52:39 2025 VERIFY EKU OK Fri Sep 19 13:52:39 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com Fri Sep 19 13:52:39 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512 Fri Sep 19 13:52:39 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44 Fri Sep 19 13:52:39 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Fri Sep 19 13:52:39 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
 
Scheint seit gestern aufzutreten - bislang ist bei mir nur Riga betroffen, weil Riga öfter mal einen reconnect macht:
#grep AUTH * openvpn-Riga.log:2025-09-19 13:56:16 us=300049 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log:2025-09-19 14:00:54 us=294530 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log:2025-09-19 14:06:02 us=507943 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log:2025-09-19 14:10:55 us=169027 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log:2025-09-19 14:15:55 us=196100 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log:2025-09-19 14:20:55 us=122392 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log:2025-09-19 14:25:56 us=889042 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log:2025-09-19 14:30:57 us=913448 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log:2025-09-19 14:35:55 us=160110 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log.1:2025-09-18 22:33:08 us=894731 AUTH: Received control message: AUTH_FAILED openvpn-Riga.log.1:2025-09-18 22:35:56 us=692104 AUTH: Received control message: AUTH_FAILED
Riga hatte sich zwischenzeitlich wieder gefangen, ist aber seit heute 13:56 offline...
 
Auch bei mir ist auf dem PC wieder keine Verbindung möglich.
Weder mit OpenVPN noch mit IPSEC. Letzteres funktionierte letztes Mal auch nicht.
Android, wie letztes mal auch, keinerlei Probleme...
 
"Immer wieder freitags kommt die Erinnerung." 🎵
Jetzt ist erstmal Wochenende, bis Montag passiert erst mal nix.
Feinschmecker wissen das sehr zu schätzen.
 
Last edited:
  • Like
Reactions: ndr
Feinschmecker wissen das sehr zu schätzen.
in meinem Fall ist der Basis-Geschmack die restliche Abolaufzeit. Überaschungen, wie jetzt, sorgen für Abwechslung. Der Hobbyadmin lässt das alles 1-2 Wochen marinieren, plant aber unwissend schon den nächsten Konfigurationsfehler ein. Ein abgelaufenes Canary, abgelaufene Zertifikate, faule IPs,... Es gibt so viele Möglichkeiten und es ist einfach lecker!
 
Back
Top