chào mọi người , mình đang làm lap về vpn server trên centos 5.8 dùng winx7 làm máy clinet để quay vpn
mình cấu hình theo hướng dẫn của http://www.server-world.info/en/note...&p=openvpn&f=1
nhưng khi thực hiện cấu hình xong (mọi dịch vụ restart đều ok), nhưng khồng thể quay vpn được mặc dù mình cũng đã tắt filewall
mong mọi người ai biết chỉ giúp mình cái
(ps/lần đầu post bài có gì sai sót mod bỏ qua cho, đừng delete bài em L-))
sau đây là nội dung các file cấu hình chình và filog của vpn client (dùng openvpn)
đây là file server.conf
///////////////////////////////////////////////////////////////////////////////////////////
đây là filen client.opvn
/////////////////////////////////////////////////////////////////////////////////////////
file iptables config
sau khi cấu hình xong dùng lệnh ifconfig | more đã có đường hầm tunnel được tạo ra
nhưng khi kết nối đến vpn server vẫn không được , đây là file log
mình cấu hình theo hướng dẫn của http://www.server-world.info/en/note...&p=openvpn&f=1
nhưng khi thực hiện cấu hình xong (mọi dịch vụ restart đều ok), nhưng khồng thể quay vpn được mặc dù mình cũng đã tắt filewall
mong mọi người ai biết chỉ giúp mình cái
(ps/lần đầu post bài có gì sai sót mod bỏ qua cho, đừng delete bài em L-))
sau đây là nội dung các file cấu hình chình và filog của vpn client (dùng openvpn)
đây là file server.conf
Code:
1 ################################################# 2 # Sample OpenVPN 2.0 config file for # 3 # multi-client server. # 4 # # 5 # This file is for the server side # 6 # of a many-clients <-> one-server # 7 # OpenVPN configuration. # 8 # # 9 # OpenVPN also supports # 10 # single-machine <-> single-machine # 11 # configurations (See the Examples page # 12 # on the web site for more info). # 13 # # 14 # This config should work on Windows # 15 # or Linux/BSD systems. Remember on # 16 # Windows to quote pathnames and use # 17 # double backslashes, e.g.: # 18 # "C:\\Program Files\\OpenVPN\\config\\foo.key" # 19 # # 20 # Comments are preceded with '#' or ';' # 21 ################################################# 22 23 # Which local IP address should OpenVPN 24 # listen on? (optional) 25 ;local a.b.c.d 26 27 # Which TCP/UDP port should OpenVPN listen on? 28 # If you want to run multiple OpenVPN instances 29 # on the same machine, use a different port 30 # number for each one. You will need to 31 # open up this port on your firewall. 32 port 1194 33 34 # TCP or UDP server? 35 #proto tcp 36 proto udp 37 38 # "dev tun" will create a routed IP tunnel, 39 # "dev tap" will create an ethernet tunnel. 40 # Use "dev tap0" if you are ethernet bridging 41 # and have precreated a tap0 virtual interface 42 # and bridged it with your ethernet interface. 43 # If you want to control access policies 44 # over the VPN, you must create firewall 45 # rules for the the TUN/TAP interface. 46 # On non-Windows systems, you can give 47 # an explicit unit number, such as tun0. 48 # On Windows, use "dev-node" for this. 49 # On most systems, the VPN will not function 50 # unless you partially or fully disable 51 # the firewall for the TUN/TAP interface. 52 ;dev tap 53 dev tun 54 55 # Windows needs the TAP-Win32 adapter name 56 # from the Network Connections panel if you 57 # have more than one. On XP SP2 or higher, 58 # you may need to selectively disable the 59 # Windows firewall for the TAP adapter. 60 # Non-Windows systems usually don't need this. 61 ;dev-node MyTap 62 63 # SSL/TLS root certificate (ca), certificate 64 # (cert), and private key (key). Each client 65 # and the server must have their own cert and 66 # key file. The server and all clients will 67 # use the same ca file. 68 # 69 # See the "easy-rsa" directory for a series 70 # of scripts for generating RSA certificates 71 # and private keys. Remember to use 72 # a unique Common Name for the server 73 # and each of the client certificates. 74 # 75 # Any X509 key management system can be used. 76 # OpenVPN can also use a PKCS #12 formatted key file 77 # (see "pkcs12" directive in man page). 78 ca ca.crt 79 cert server.crt 80 key server.key # This file should be kept secret 81 82 # Diffie hellman parameters. 83 # Generate your own with: 84 # openssl dhparam -out dh1024.pem 1024 85 # Substitute 2048 for 1024 if you are using 86 # 2048 bit keys. 87 dh dh1024.pem 88 89 # Configure server mode and supply a VPN subnet 90 # for OpenVPN to draw client addresses from. 91 # The server will take 10.8.0.1 for itself, 92 # the rest will be made available to clients. 93 # Each client will be able to reach the server 94 # on 10.8.0.1. Comment this line out if you are 95 # ethernet bridging. See the man page for more info. 96 server 172.16.1.0 255.255.255.0 97 98 # Maintain a record of client <-> virtual IP address 99 # associations in this file. If OpenVPN goes down or 100 # is restarted, reconnecting clients can be assigned 101 # the same virtual IP address from the pool that was 102 # previously assigned. 103 ifconfig-pool-persist ipp.txt 104 105 # Configure server mode for ethernet bridging. 106 # You must first use your OS's bridging capability 107 # to bridge the TAP interface with the ethernet 108 # NIC interface. Then you must manually set the 109 # IP/netmask on the bridge interface, here we 110 # assume 10.8.0.4/255.255.255.0. Finally we 111 # must set aside an IP range in this subnet 112 # (start=10.8.0.50 end=10.8.0.100) to allocate 113 # to connecting clients. Leave this line commented 114 # out unless you are ethernet bridging. 115 ;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100 116 117 # Configure server mode for ethernet bridging 118 # using a DHCP-proxy, where clients talk 119 # to the OpenVPN server-side DHCP server 120 # to receive their IP address allocation 121 # and DNS server addresses. You must first use 122 # your OS's bridging capability to bridge the TAP 123 # interface with the ethernet NIC interface. 124 # Note: this mode only works on clients (such as 125 # Windows), where the client-side TAP adapter is 126 # bound to a DHCP client. 127 ;server-bridge 128 129 # Push routes to the client to allow it 130 # to reach other private subnets behind 131 # the server. Remember that these 132 # private subnets will also need 133 # to know to route the OpenVPN client 134 # address pool (10.8.0.0/255.255.255.0) 135 # back to the OpenVPN server. 136 push "route 172.16.1.0 255.255.255.0" 137 push "route 10.0.0.0 255.255.255.0" 138 139 # To assign specific IP addresses to specific 140 # clients or if a connecting client has a private 141 # subnet behind it that should also have VPN access, 142 # use the subdirectory "ccd" for client-specific 143 # configuration files (see man page for more info). 144 145 # EXAMPLE: Suppose the client 146 # having the certificate common name "Thelonious" 147 # also has a small subnet behind his connecting 148 # machine, such as 192.168.40.128/255.255.255.248. 149 # First, uncomment out these lines: 150 ;client-config-dir ccd 151 ;route 192.168.40.128 255.255.255.248 152 # Then create a file ccd/Thelonious with this line: 153 # iroute 192.168.40.128 255.255.255.248 154 # This will allow Thelonious' private subnet to 155 # access the VPN. This example will only work 156 # if you are routing, not bridging, i.e. you are 157 # using "dev tun" and "server" directives. 158 159 # EXAMPLE: Suppose you want to give 160 # Thelonious a fixed VPN IP address of 10.9.0.1. 161 # First uncomment out these lines: 162 ;client-config-dir ccd 163 ;route 10.9.0.0 255.255.255.252 164 # Then add this line to ccd/Thelonious: 165 # ifconfig-push 10.9.0.1 10.9.0.2 166 167 # Suppose that you want to enable different 168 # firewall access policies for different groups 169 # of clients. There are two methods: 170 # (1) Run multiple OpenVPN daemons, one for each 171 # group, and firewall the TUN/TAP interface 172 # for each group/daemon appropriately. 173 # (2) (Advanced) Create a script to dynamically 174 # modify the firewall in response to access 175 # from different clients. See man 176 # page for more info on learn-address script. 177 ;learn-address ./script 178 179 # If enabled, this directive will configure 180 # all clients to redirect their default 181 # network gateway through the VPN, causing 182 # all IP traffic such as web browsing and 183 # and DNS lookups to go through the VPN 184 # (The OpenVPN server machine may need to NAT 185 # or bridge the TUN/TAP interface to the internet 186 # in order for this to work properly). 187 ;push "redirect-gateway def1 bypass-dhcp" 188 189 # Certain Windows-specific network settings 190 # can be pushed to clients, such as DNS 191 # or WINS server addresses. CAVEAT: 192 # http://openvpn.net/faq.html#dhcpcaveats 193 # The addresses below refer to the public 194 # DNS servers provided by opendns.com. 195 ;push "dhcp-option DNS 208.67.222.222" 196 ;push "dhcp-option DNS 208.67.220.220" 197 198 # Uncomment this directive to allow different 199 # clients to be able to "see" each other. 200 # By default, clients will only see the server. 201 # To force clients to only see the server, you 202 # will also need to appropriately firewall the 203 # server's TUN/TAP interface. 204 ;client-to-client 205 206 # Uncomment this directive if multiple clients 207 # might connect with the same certificate/key 208 # files or common names. This is recommended 209 # only for testing purposes. For production use, 210 # each client should have its own certificate/key 211 # pair. 212 # 213 # IF YOU HAVE NOT GENERATED INDIVIDUAL 214 # CERTIFICATE/KEY PAIRS FOR EACH CLIENT, 215 # EACH HAVING ITS OWN UNIQUE "COMMON NAME", 216 # UNCOMMENT THIS LINE OUT. 217 ;duplicate-cn 218 219 # The keepalive directive causes ping-like 220 # messages to be sent back and forth over 221 # the link so that each side knows when 222 # the other side has gone down. 223 # Ping every 10 seconds, assume that remote 224 # peer is down if no ping received during 225 # a 120 second time period. 226 keepalive 10 120 227 228 # For extra security beyond that provided 229 # by SSL/TLS, create an "HMAC firewall" 230 # to help block DoS attacks and UDP port flooding. 231 # 232 # Generate with: 233 # openvpn --genkey --secret ta.key 234 # 235 # The server and each client must have 236 # a copy of this key. 237 # The second parameter should be '0' 238 # on the server and '1' on the clients. 239 ;tls-auth ta.key 0 # This file is secret 240 241 # Select a cryptographic cipher. 242 # This config item must be copied to 243 # the client config file as well. 244 ;cipher BF-CBC # Blowfish (default) 245 ;cipher AES-128-CBC # AES 246 ;cipher DES-EDE3-CBC # Triple-DES 247 248 # Enable compression on the VPN link. 249 # If you enable it here, you must also 250 # enable it in the client config file. 251 comp-lzo 252 253 # The maximum number of concurrently connected 254 # clients we want to allow. 255 ;max-clients 100 256 257 # It's a good idea to reduce the OpenVPN 258 # daemon's privileges after initialization. 259 # 260 # You can uncomment this out on 261 # non-Windows systems. 262 ;user nobody 263 ;group nobody 264 265 # The persist options will try to avoid 266 # accessing certain resources on restart 267 # that may no longer be accessible because 268 # of the privilege downgrade. 269 persist-key 270 persist-tun 271 272 # Output a short status file showing 273 # current connections, truncated 274 # and rewritten every minute. 275 status openvpn-status.log 276 277 # By default, log messages will go to the syslog (or 278 # on Windows, if running as a service, they will go to 279 # the "\Program Files\OpenVPN\log" directory). 280 # Use log or log-append to override this default. 281 # "log" will truncate the log file on OpenVPN startup, 282 # while "log-append" will append to it. Use one 283 # or the other (but not both). 284 ;log openvpn.log 285 ;log-append openvpn.log 286 287 # Set the appropriate level of log 288 # file verbosity. 289 # 290 # 0 is silent, except for fatal errors 291 # 4 is reasonable for general usage 292 # 5 and 6 can help to debug connection problems 293 # 9 is extremely verbose 294 verb 3 295 296 # Silence repeating messages. At most 20 297 # sequential messages of the same message 298 # category will be output to the log. 299 ;mute 20 300 plugin /usr/lib/openvpn/plugin/lib/openvpn-auth-ldap.so /etc/openvpn /auth/ldap.conf 301 client-cert-not-required
đây là filen client.opvn
Code:
1 ############################################## 2 # Sample client-side OpenVPN 2.0 config file # 3 # for connecting to multi-client server. # 4 # # 5 # This configuration can be used by multiple # 6 # clients, however each client should have # 7 # its own cert and key files. # 8 # # 9 # On Windows, you might want to rename this # 10 # file so it has a .ovpn extension # 11 ############################################## 12 13 # Specify that we are a client and that we 14 # will be pulling certain config file directives 15 # from the server. 16 client 17 18 # Use the same setting as you are using on 19 # the server. 20 # On most systems, the VPN will not function 21 # unless you partially or fully disable 22 # the firewall for the TUN/TAP interface. 23 ;dev tap 24 dev tun 25 26 # Windows needs the TAP-Win32 adapter name 27 # from the Network Connections panel 28 # if you have more than one. On XP SP2, 29 # you may need to disable the firewall 30 # for the TAP adapter. 31 ;dev-node MyTap 32 33 # Are we connecting to a TCP or 34 # UDP server? Use the same setting as 35 # on the server. 36 ;proto tcp 37 proto udp 38 39 # The hostname/IP and port of the server. 40 # You can have multiple remote entries 41 # to load balance between the servers. 42 remote 192.168.1.200 1194 43 ;remote my-server-2 1194 44 45 # Choose a random host from the remote 46 # list for load-balancing. Otherwise 47 # try hosts in the order specified. 48 ;remote-random 49 50 # Keep trying indefinitely to resolve the 51 # host name of the OpenVPN server. Very useful 52 # on machines which are not permanently connected 53 # to the internet such as laptops. 54 resolv-retry infinite 55 56 # Most clients don't need to bind to 57 # a specific local port number. 58 nobind 59 60 # Downgrade privileges after initialization (non-Windows only) 61 ;user nobody 62 ;group nobody 63 64 # Try to preserve some state across restarts. 65 persist-key 66 persist-tun 67 68 # If you are connecting through an 69 # HTTP proxy to reach the actual OpenVPN 70 # server, put the proxy server/IP and 71 # port number here. See the man page 72 # if your proxy server requires 73 # authentication. 74 ;http-proxy-retry # retry on connection failures 75 ;http-proxy [proxy server] [proxy port #] 76 77 # Wireless networks often produce a lot 78 # of duplicate packets. Set this flag 79 # to silence duplicate packet warnings. 80 ;mute-replay-warnings 81 82 # SSL/TLS parms. 83 # See the server config file for more 84 # description. It's best to use 85 # a separate .crt/.key file pair 86 # for each client. A single ca 87 # file can be used for all clients. 88 ca ca.crt 89 #cert client.crt 90 #key client.key 91 92 # Verify server certificate by checking 93 # that the certicate has the nsCertType 94 # field set to "server". This is an 95 # important precaution to protect against 96 # a potential attack discussed here: 97 # http://openvpn.net/howto.html#mitm 98 # 99 # To use this feature, you will need to generate 100 # your server certificates with the nsCertType 101 # field set to "server". The build-key-server 102 # script in the easy-rsa folder will do this. 103 ns-cert-type server 104 105 # If a tls-auth key is used on the server 106 # then every client must also have the key. 107 ;tls-auth ta.key 1 108 109 # Select a cryptographic cipher. 110 # If the cipher option is used on the server 111 # then you must also specify it here. 112 ;cipher x 113 114 # Enable compression on the VPN link. 115 # Don't enable this unless it is also 116 # enabled in the server config file. 117 comp-lzo 118 119 # Set log file verbosity. 120 verb 3 121 122 # Silence repeating messages 123 ;mute 20 124 auth-user-pass
file iptables config
Code:
1 # Firewall configuration written by system-config-securitylevel 2 # Manual customization of this file is not recommended. 3 *filter 4 :INPUT ACCEPT [0:0] 5 :FORWARD ACCEPT [0:0] 6 :OUTPUT ACCEPT [0:0] 7 :RH-Firewall-1-INPUT - [0:0] 8 -A INPUT -j RH-Firewall-1-INPUT 9 -A FORWARD -j RH-Firewall-1-INPUT 10 -A RH-Firewall-1-INPUT -i lo -j ACCEPT 11 -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT 12 -A RH-Firewall-1-INPUT -p 50 -j ACCEPT 13 -A RH-Firewall-1-INPUT -p 51 -j ACCEPT 14 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 11 0 -j ACCEPT 15 -A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT 16 -A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT 17 -A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT 18 -A RH-Firewall-1-INPUT -p udp -m udp --dport 1194 -j ACCEPT 19 -A RH-Firewall-1-INPUT -p udp -m udp --dport 1194 -j ACCEPT 20 21 -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEP T 22 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT 23 -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited 24 COMMIT
nhưng khi kết nối đến vpn server vẫn không được , đây là file log
Code:
Mon Apr 15 18:11:40 2013 OpenVPN 2.0.9 Win32-MinGW [SSL] [LZO] built on Oct 1 2006 Mon Apr 15 18:11:48 2013 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port. Mon Apr 15 18:11:48 2013 LZO compression initialized Mon Apr 15 18:11:48 2013 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ] Mon Apr 15 18:11:48 2013 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ] Mon Apr 15 18:11:48 2013 Local Options hash (VER=V4): '41690919' Mon Apr 15 18:11:48 2013 Expected Remote Options hash (VER=V4): '530fdded' Mon Apr 15 18:11:48 2013 UDPv4 link local: [undef] Mon Apr 15 18:11:48 2013 UDPv4 link remote: 192.168.1.200:1194 Mon Apr 15 18:11:48 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:11:51 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:11:52 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:11:54 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:11:57 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:11:59 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:01 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:03 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:06 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:08 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:10 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:12 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:15 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:17 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:19 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:22 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:23 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:25 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:28 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:29 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:31 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:33 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:36 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:38 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:40 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:42 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:44 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:46 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:48 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Mon Apr 15 18:12:48 2013 TLS Error: TLS handshake failed Mon Apr 15 18:12:48 2013 TCP/UDP: Closing socket Mon Apr 15 18:12:48 2013 SIGUSR1[soft,tls-error] received, process restarting Mon Apr 15 18:12:48 2013 Restart pause, 2 second(s) Mon Apr 15 18:12:50 2013 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port. Mon Apr 15 18:12:50 2013 Re-using SSL/TLS context Mon Apr 15 18:12:50 2013 LZO compression initialized Mon Apr 15 18:12:50 2013 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ] Mon Apr 15 18:12:50 2013 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ] Mon Apr 15 18:12:50 2013 Local Options hash (VER=V4): '41690919' Mon Apr 15 18:12:50 2013 Expected Remote Options hash (VER=V4): '530fdded' Mon Apr 15 18:12:50 2013 UDPv4 link local: [undef] Mon Apr 15 18:12:50 2013 UDPv4 link remote: 192.168.1.200:1194 Mon Apr 15 18:12:50 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:52 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:55 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:56 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:12:58 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:00 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:02 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:04 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:06 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:08 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:10 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:13 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:15 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:18 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:20 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:22 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:25 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:27 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:29 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:32 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:34 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:36 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:38 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:40 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:42 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:44 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:47 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:49 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054) Mon Apr 15 18:13:50 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Mon Apr 15 18:13:50 2013 TLS Error: TLS handshake failed Mon Apr 15 18:13:50 2013 TCP/UDP: Closing socket
Comment