Tue Jun 14 18:06:37 2022 OpenVPN 2.3.17 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on May 7 2020
Tue Jun 14 18:06:37 2022 library versions: OpenSSL 1.0.2u-fips 20 Dec 2019, LZO 2.09
Tue Jun 14 18:06:37 2022 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Jun 14 18:06:37 2022 PLUGIN_INIT: POST /lib/openvpn/openvpn-down-root.so '[/lib/openvpn/openvpn-down-root.so] [/usr/syno/etc.defaults/synovpnclient/scripts/ip-down]' intercepted=PLUGIN_UP|PLUGIN_DOWN
Tue Jun 14 18:06:37 2022 Control Channel Authentication: tls-auth using INLINE static key file
Tue Jun 14 18:06:37 2022 Outgoing Control Channel Authentication: Using 384 bit message hash 'SHA384' for HMAC authentication
Tue Jun 14 18:06:37 2022 Incoming Control Channel Authentication: Using 384 bit message hash 'SHA384' for HMAC authentication
Tue Jun 14 18:06:37 2022 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jun 14 18:06:37 2022 UDPv4 link local: [undef]
Tue Jun 14 18:06:37 2022 UDPv4 link remote: [AF_INET]xx.xx.xx.xx:xxxxx
Tue Jun 14 18:06:37 2022 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:xxxxx, sid=e81e784b 8fca9b1d
Tue Jun 14 18:06:37 2022 VERIFY OK: depth=1, CN=Easy-RSA CA
Tue Jun 14 18:06:37 2022 Validating certificate key usage
Tue Jun 14 18:06:37 2022 ++ Certificate has key usage 00a0, expects 00a0
Tue Jun 14 18:06:37 2022 VERIFY KU OK
Tue Jun 14 18:06:37 2022 Validating certificate extended key usage
Tue Jun 14 18:06:37 2022 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jun 14 18:06:37 2022 VERIFY EKU OK
Tue Jun 14 18:06:37 2022 VERIFY OK: depth=0, CN=vpnnet
Tue Jun 14 18:06:37 2022 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1585', remote='link-mtu 1549'
Tue Jun 14 18:06:37 2022 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Tue Jun 14 18:06:37 2022 WARNING: 'auth' is used inconsistently, local='auth SHA384', remote='auth [null-digest]'
Tue Jun 14 18:06:37 2022 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Tue Jun 14 18:06:37 2022 Data Channel Encrypt: Using 384 bit message hash 'SHA384' for HMAC authentication
Tue Jun 14 18:06:37 2022 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Tue Jun 14 18:06:37 2022 Data Channel Decrypt: Using 384 bit message hash 'SHA384' for HMAC authentication
Tue Jun 14 18:06:37 2022 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Tue Jun 14 18:06:37 2022 [vpnnet] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:xxxxx
Tue Jun 14 18:06:40 2022 SENT CONTROL [vpnnet]: 'PUSH_REQUEST' (status=1)
Tue Jun 14 18:06:40 2022 SYNO_ERR_AUTH
Tue Jun 14 18:06:40 2022 AUTH: Received control message: AUTH_FAILED,Data channel cipher negotiation failed (no shared cipher)
Tue Jun 14 18:06:40 2022 PLUGIN_CLOSE: /lib/openvpn/openvpn-down-root.so
Tue Jun 14 18:06:40 2022 SIGTERM[soft,auth-failure] received, process exiting