Mon Oct 12 12:53:07 2015 OpenVPN 2.3.4 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Jun 5 2014
Mon Oct 12 12:53:07 2015 library versions: OpenSSL 1.0.1h 5 Jun 2014, LZO 2.05
Enter Management Password:
Mon Oct 12 12:53:07 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Mon Oct 12 12:53:07 2015 Need hold release from management interface, waiting...
Mon Oct 12 12:53:08 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Mon Oct 12 12:53:08 2015 MANAGEMENT: CMD 'state on'
Mon Oct 12 12:53:08 2015 MANAGEMENT: CMD 'log all on'
Mon Oct 12 12:53:08 2015 MANAGEMENT: CMD 'hold off'
Mon Oct 12 12:53:08 2015 MANAGEMENT: CMD 'hold release'
Mon Oct 12 12:53:25 2015 MANAGEMENT: CMD 'username "Auth" "8g0olb1cl7h"'
Mon Oct 12 12:53:25 2015 MANAGEMENT: CMD 'password [...]'
Mon Oct 12 12:53:25 2015 Control Channel Authentication: tls-auth using INLINE static key file
Mon Oct 12 12:53:25 2015 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Oct 12 12:53:25 2015 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Oct 12 12:53:25 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Oct 12 12:53:25 2015 UDPv4 link local: [undef]
Mon Oct 12 12:53:25 2015 UDPv4 link remote: [AF_INET]50.7.205.138:3269
Mon Oct 12 12:53:25 2015 MANAGEMENT: >STATE:1444647205,WAIT,,,
Mon Oct 12 12:53:25 2015 MANAGEMENT: >STATE:1444647205,AUTH,,,
Mon Oct 12 12:53:25 2015 TLS: Initial packet from [AF_INET]50.7.205.138:3269, sid=e9e04c63 b96a10c3
Mon Oct 12 12:53:25 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Oct 12 12:53:25 2015 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=MyOrganizationalUnit, CN=Fort-Funston CA, name=EasyRSA, emailAddress=me@myhost.mydomain
Mon Oct 12 12:53:25 2015 VERIFY OK: nsCertType=SERVER
Mon Oct 12 12:53:25 2015 Validating certificate extended key usage
Mon Oct 12 12:53:25 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Oct 12 12:53:25 2015 VERIFY EKU OK
Mon Oct 12 12:53:25 2015 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=MyOrganizationalUnit, CN=server, name=EasyRSA, emailAddress=me@myhost.mydomain
Mon Oct 12 12:53:26 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Oct 12 12:53:26 2015 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Oct 12 12:53:26 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Oct 12 12:53:26 2015 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Oct 12 12:53:26 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-SHA, 4096 bit RSA
Mon Oct 12 12:53:26 2015 [server] Peer Connection Initiated with [AF_INET]50.7.205.138:3269
Mon Oct 12 12:53:28 2015 MANAGEMENT: >STATE:1444647208,GET_CONFIG,,,
Mon Oct 12 12:53:29 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Oct 12 12:53:29 2015 AUTH: Received control message: AUTH_FAILED
Mon Oct 12 12:53:29 2015 SIGUSR1[soft,auth-failure] received, process restarting
Mon Oct 12 12:53:29 2015 MANAGEMENT: >STATE:1444647209,RECONNECTING,auth-failure,,
Mon Oct 12 12:53:29 2015 Restart pause, 2 second(s)
Mon Oct 12 12:53:57 2015 MANAGEMENT: CMD 'username "Auth" "8g0olb1cl7h"'
Mon Oct 12 12:53:57 2015 MANAGEMENT: CMD 'password [...]'
Mon Oct 12 12:53:57 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Oct 12 12:53:57 2015 UDPv4 link local: [undef]
Mon Oct 12 12:53:57 2015 UDPv4 link remote: [AF_INET]50.7.205.138:3269
Mon Oct 12 12:53:57 2015 MANAGEMENT: >STATE:1444647237,WAIT,,,
Mon Oct 12 12:53:58 2015 MANAGEMENT: >STATE:1444647238,AUTH,,,
Mon Oct 12 12:53:58 2015 TLS: Initial packet from [AF_INET]50.7.205.138:3269, sid=9c00196c 95167f3b
Mon Oct 12 12:53:58 2015 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=MyOrganizationalUnit, CN=Fort-Funston CA, name=EasyRSA, emailAddress=me@myhost.mydomain
Mon Oct 12 12:53:58 2015 VERIFY OK: nsCertType=SERVER
Mon Oct 12 12:53:58 2015 Validating certificate extended key usage
Mon Oct 12 12:53:58 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Oct 12 12:53:58 2015 VERIFY EKU OK
Mon Oct 12 12:53:58 2015 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=MyOrganizationalUnit, CN=server, name=EasyRSA, emailAddress=me@myhost.mydomain
Mon Oct 12 12:53:59 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Oct 12 12:53:59 2015 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Oct 12 12:53:59 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Oct 12 12:53:59 2015 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Oct 12 12:53:59 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-SHA, 4096 bit RSA
Mon Oct 12 12:53:59 2015 [server] Peer Connection Initiated with [AF_INET]50.7.205.138:3269
Mon Oct 12 12:54:00 2015 MANAGEMENT: >STATE:1444647240,GET_CONFIG,,,
Mon Oct 12 12:54:01 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Oct 12 12:54:01 2015 AUTH: Received control message: AUTH_FAILED
Mon Oct 12 12:54:01 2015 SIGUSR1[soft,auth-failure] received, process restarting
Mon Oct 12 12:54:01 2015 MANAGEMENT: >STATE:1444647241,RECONNECTING,auth-failure,,
Mon Oct 12 12:54:01 2015 Restart pause, 2 second(s)
Mon Oct 12 12:54:01 2015 MANAGEMENT: CMD 'auth-retry none'
Mon Oct 12 12:54:03 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Oct 12 12:54:03 2015 UDPv4 link local: [undef]
Mon Oct 12 12:54:03 2015 UDPv4 link remote: [AF_INET]50.7.205.138:3269
Mon Oct 12 12:54:03 2015 MANAGEMENT: >STATE:1444647243,WAIT,,,
Mon Oct 12 12:54:03 2015 MANAGEMENT: >STATE:1444647243,AUTH,,,
Mon Oct 12 12:54:03 2015 TLS: Initial packet from [AF_INET]50.7.205.138:3269, sid=c489b1f3 1a4af34e
Mon Oct 12 12:54:50 2015 MANAGEMENT: Client disconnected
Mon Oct 12 12:54:50 2015 ERROR: could not read Auth username/password/ok/string from management interface
Mon Oct 12 12:54:50 2015 Exiting due to fatal error