der Test mit XP und OpenVPN tut wie es soll! Keine Probleme mit HMAC tls-auth und Camellia inkl. Whirlpool 512:
Code: Select all
Fri May 30 07:15:43 2014 DEPRECATED OPTION: --tls-remote, please update your configuration
Fri May 30 07:15:43 2014 OpenVPN 2.3.4 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on May 2 2014
Fri May 30 07:15:43 2014 library versions: OpenSSL 1.0.1g 7 Apr 2014, LZO 2.05
Fri May 30 07:15:43 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Fri May 30 07:15:43 2014 Need hold release from management interface, waiting...
Fri May 30 07:15:44 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Fri May 30 07:15:44 2014 MANAGEMENT: CMD 'state on'
Fri May 30 07:15:44 2014 MANAGEMENT: CMD 'log all on'
Fri May 30 07:15:44 2014 MANAGEMENT: CMD 'hold off'
Fri May 30 07:15:44 2014 MANAGEMENT: CMD 'hold release'
Fri May 30 07:15:50 2014 MANAGEMENT: CMD 'password [...]'
Fri May 30 07:15:50 2014 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Fri May 30 07:15:50 2014 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
Fri May 30 07:15:50 2014 Outgoing Control Channel Authentication: Using 512 bit message hash 'whirlpool' for HMAC authentication
Fri May 30 07:15:50 2014 Incoming Control Channel Authentication: Using 512 bit message hash 'whirlpool' for HMAC authentication
Fri May 30 07:15:50 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri May 30 07:15:50 2014 MANAGEMENT: >STATE:1401426950,RESOLVE,,,
Fri May 30 07:15:50 2014 UDPv4 link local: [undef]
Fri May 30 07:15:50 2014 UDPv4 link remote: [AF_INET]93.xx.xx.xx:xx
Fri May 30 07:15:50 2014 MANAGEMENT: >STATE:1401426950,WAIT,,,
Fri May 30 07:15:50 2014 MANAGEMENT: >STATE:1401426950,AUTH,,,
Fri May 30 07:15:50 2014 TLS: Initial packet from [AF_INET]93.xx.xx.xx:xx, sid=eb229f4f 4d1917e7
Fri May 30 07:15:51 2014 VERIFY OK: depth=1, /C=DE/O=xx/CN=xx_CA
Fri May 30 07:15:51 2014 VERIFY OK: nsCertType=SERVER
Fri May 30 07:15:51 2014 VERIFY X509NAME OK: /C=DE/O=xx/CN=xx.spdns.org
Fri May 30 07:15:51 2014 VERIFY OK: depth=0, /C=DE/O=x/CN=xx.spdns.org
Fri May 30 07:15:52 2014 Data Channel Encrypt: Cipher 'CAMELLIA-256-CBC' initialized with 256 bit key
Fri May 30 07:15:52 2014 Data Channel Encrypt: Using 512 bit message hash 'whirlpool' for HMAC authentication
Fri May 30 07:15:52 2014 Data Channel Decrypt: Cipher 'CAMELLIA-256-CBC' initialized with 256 bit key
Fri May 30 07:15:52 2014 Data Channel Decrypt: Using 512 bit message hash 'whirlpool' for HMAC authentication
Fri May 30 07:15:52 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Fri May 30 07:15:52 2014 [xx.spdns.org] Peer Connection Initiated with [AF_INET]93.xx.xx.xx:xx
Fri May 30 07:15:53 2014 MANAGEMENT: >STATE:1401426953,GET_CONFIG,,,
Fri May 30 07:15:54 2014 SENT CONTROL [xx.spdns.org]: 'PUSH_REQUEST' (status=1)
Fri May 30 07:15:54 2014 PUSH: Received control message: 'PUSH_REPLY,route 10.xx.xx.0 255.255.255.0,redirect-gateway def1,dhcp-option DNS 192.168.xx.xx,route 10.xx.xx.1,topology net30,ping 10,ping-restart 60,route 192.168.xx.0 255.255.255.0,route 192.168.xx.0 255.255.255.0,dhcp-option DNS 192.168.xx.xx,ifconfig 10.xx.xx.14 10.xx.xx.13'
Fri May 30 07:15:54 2014 OPTIONS IMPORT: timers and/or timeouts modified
Fri May 30 07:15:54 2014 OPTIONS IMPORT: --ifconfig/up options modified
Fri May 30 07:15:54 2014 OPTIONS IMPORT: route options modified
Fri May 30 07:15:54 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri May 30 07:15:54 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Fri May 30 07:15:54 2014 MANAGEMENT: >STATE:1401426954,ASSIGN_IP,,10.xx.xx.14,
Fri May 30 07:15:54 2014 open_tun, tt->ipv6=0
Fri May 30 07:15:54 2014 TAP-WIN32 device [LAN-Verbindung 3] opened: \\.\Global\{3558BDDF-DFE0-4723-8F00-3BDD60AED85D}.tap
Fri May 30 07:15:54 2014 TAP-Windows Driver Version 9.9
Fri May 30 07:15:54 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.xx.xx.14/255.255.255.252 on interface {3558BDDF-DFE0-4723-8F00-3BDD60AED85D} [DHCP-serv: 10.xx.xx.13, lease-time: 31536000]
Fri May 30 07:15:54 2014 Successful ARP Flush on interface [65541] {3558BDDF-DFE0-4723-8F00-3BDD60AED85D}
Fri May 30 07:15:59 2014 TEST ROUTES: 5/5 succeeded len=4 ret=1 a=0 u/d=up
Fri May 30 07:15:59 2014 C:\WINDOWS\system32\route.exe ADD 93.xx.xx.xx MASK 255.255.255.255 192.168.xx.xx
Fri May 30 07:15:59 2014 Route addition via IPAPI succeeded [adaptive]
Fri May 30 07:15:59 2014 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.xx.xx.13
Fri May 30 07:15:59 2014 Route addition via IPAPI succeeded [adaptive]
Fri May 30 07:15:59 2014 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.xx.xx.13
Fri May 30 07:15:59 2014 Route addition via IPAPI succeeded [adaptive]
Fri May 30 07:15:59 2014 MANAGEMENT: >STATE:1401426959,ADD_ROUTES,,,
Fri May 30 07:15:59 2014 C:\WINDOWS\system32\route.exe ADD 10.xx.xx.0 MASK 255.255.255.0 10.xx.xx.13
Fri May 30 07:15:59 2014 Route addition via IPAPI succeeded [adaptive]
Fri May 30 07:15:59 2014 C:\WINDOWS\system32\route.exe ADD 10.xx.xx.1 MASK 255.255.255.255 10.xx.xx.13
Fri May 30 07:15:59 2014 Route addition via IPAPI succeeded [adaptive]
Fri May 30 07:15:59 2014 C:\WINDOWS\system32\route.exe ADD 192.168.xx.0 MASK 255.255.255.0 10.xx.xx.13
Fri May 30 07:15:59 2014 Route addition via IPAPI succeeded [adaptive]
Fri May 30 07:15:59 2014 C:\WINDOWS\system32\route.exe ADD 192.168.xx.0 MASK 255.255.255.0 10.xx.xx.13
Fri May 30 07:15:59 2014 Route addition via IPAPI succeeded [adaptive]
Fri May 30 07:15:59 2014 Initialization Sequence Completed
Fri May 30 07:15:59 2014 MANAGEMENT: >STATE:1401426959,CONNECTED,SUCCESS,10.xx.xx.14,93.xx.xx.xx
VG, 5p9