Xin chào ! Nếu đây là lần đầu tiên bạn đến với diễn đàn, xin vui lòng danh ra một phút bấm vào đây để đăng kí và tham gia thảo luận cùng VnPro.

Announcement

Collapse
No announcement yet.

lỗi khi kết nối openvpn client tren centos

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • lỗi khi kết nối openvpn client tren centos

    chào mọi người , mình đang làm lap về vpn server trên centos 5.8 dùng winx7 làm máy clinet để quay vpn
    mình cấu hình theo hướng dẫn của http://www.server-world.info/en/note...&p=openvpn&f=1
    nhưng khi thực hiện cấu hình xong (mọi dịch vụ restart đều ok), nhưng khồng thể quay vpn được mặc dù mình cũng đã tắt filewall
    mong mọi người ai biết chỉ giúp mình cái
    (ps/lần đầu post bài có gì sai sót mod bỏ qua cho, đừng delete bài em L-))
    sau đây là nội dung các file cấu hình chình và filog của vpn client (dùng openvpn)
    đây là file server.conf
    Code:
    1 #################################################
          2 # Sample OpenVPN 2.0 config file for            #
          3 # multi-client server.                          #
          4 #                                               #
          5 # This file is for the server side              #
          6 # of a many-clients <-> one-server              #
          7 # OpenVPN configuration.                        #
          8 #                                               #
          9 # OpenVPN also supports                         #
         10 # single-machine <-> single-machine             #
         11 # configurations (See the Examples page         #
         12 # on the web site for more info).               #
         13 #                                               #
         14 # This config should work on Windows            #
         15 # or Linux/BSD systems.  Remember on            #
         16 # Windows to quote pathnames and use            #
         17 # double backslashes, e.g.:                     #
         18 # "C:\\Program Files\\OpenVPN\\config\\foo.key" #
         19 #                                               #
         20 # Comments are preceded with '#' or ';'         #
         21 #################################################
         22 
         23 # Which local IP address should OpenVPN
    24 # listen on? (optional)
         25 ;local a.b.c.d
         26 
         27 # Which TCP/UDP port should OpenVPN listen on?
         28 # If you want to run multiple OpenVPN instances
         29 # on the same machine, use a different port
         30 # number for each one.  You will need to
         31 # open up this port on your firewall.
         32 port 1194
         33 
         34 # TCP or UDP server?
         35 #proto tcp
         36 proto udp
         37 
         38 # "dev tun" will create a routed IP tunnel,
         39 # "dev tap" will create an ethernet tunnel.
         40 # Use "dev tap0" if you are ethernet bridging
         41 # and have precreated a tap0 virtual interface
         42 # and bridged it with your ethernet interface.
         43 # If you want to control access policies
    44 # over the VPN, you must create firewall
         45 # rules for the the TUN/TAP interface.
         46 # On non-Windows systems, you can give
         47 # an explicit unit number, such as tun0.
         48 # On Windows, use "dev-node" for this.
         49 # On most systems, the VPN will not function
         50 # unless you partially or fully disable
         51 # the firewall for the TUN/TAP interface.
         52 ;dev tap
         53 dev tun
         54 
         55 # Windows needs the TAP-Win32 adapter name
         56 # from the Network Connections panel if you
         57 # have more than one.  On XP SP2 or higher,
         58 # you may need to selectively disable the
         59 # Windows firewall for the TAP adapter.
         60 # Non-Windows systems usually don't need this.
         61 ;dev-node MyTap
         62 
         63 # SSL/TLS root certificate (ca), certificate
    64 # (cert), and private key (key).  Each client
         65 # and the server must have their own cert and
         66 # key file.  The server and all clients will
         67 # use the same ca file.
         68 #
         69 # See the "easy-rsa" directory for a series
         70 # of scripts for generating RSA certificates
         71 # and private keys.  Remember to use
         72 # a unique Common Name for the server
         73 # and each of the client certificates.
         74 #
         75 # Any X509 key management system can be used.
         76 # OpenVPN can also use a PKCS #12 formatted key file
         77 # (see "pkcs12" directive in man page).
         78 ca ca.crt
         79 cert server.crt
         80 key server.key  # This file should be kept secret
         81 
         82 # Diffie hellman parameters.
         83 # Generate your own with:
    84 #   openssl dhparam -out dh1024.pem 1024
         85 # Substitute 2048 for 1024 if you are using
         86 # 2048 bit keys.
         87 dh dh1024.pem
         88 
         89 # Configure server mode and supply a VPN subnet
         90 # for OpenVPN to draw client addresses from.
         91 # The server will take 10.8.0.1 for itself,
         92 # the rest will be made available to clients.
         93 # Each client will be able to reach the server
         94 # on 10.8.0.1. Comment this line out if you are
         95 # ethernet bridging. See the man page for more info.
         96 server 172.16.1.0  255.255.255.0
         97 
         98 # Maintain a record of client <-> virtual IP address
         99 # associations in this file.  If OpenVPN goes down or
        100 # is restarted, reconnecting clients can be assigned
        101 # the same virtual IP address from the pool that was
        102 # previously assigned.
        103 ifconfig-pool-persist ipp.txt
        104 
    105 # Configure server mode for ethernet bridging.
        106 # You must first use your OS's bridging capability
        107 # to bridge the TAP interface with the ethernet
        108 # NIC interface.  Then you must manually set the
        109 # IP/netmask on the bridge interface, here we
        110 # assume 10.8.0.4/255.255.255.0.  Finally we
        111 # must set aside an IP range in this subnet
        112 # (start=10.8.0.50 end=10.8.0.100) to allocate
        113 # to connecting clients.  Leave this line commented
        114 # out unless you are ethernet bridging.
        115 ;server-bridge 10.8.0.4 255.255.255.0 10.8.0.50 10.8.0.100
        116 
        117 # Configure server mode for ethernet bridging
        118 # using a DHCP-proxy, where clients talk
        119 # to the OpenVPN server-side DHCP server
        120 # to receive their IP address allocation
        121 # and DNS server addresses.  You must first use
        122 # your OS's bridging capability to bridge the TAP
        123 # interface with the ethernet NIC interface.
        124 # Note: this mode only works on clients (such as
    125 # Windows), where the client-side TAP adapter is
        126 # bound to a DHCP client.
        127 ;server-bridge
        128 
        129 # Push routes to the client to allow it
        130 # to reach other private subnets behind
        131 # the server.  Remember that these
        132 # private subnets will also need
        133 # to know to route the OpenVPN client
        134 # address pool (10.8.0.0/255.255.255.0)
        135 # back to the OpenVPN server.
        136 push "route 172.16.1.0 255.255.255.0"
        137 push "route 10.0.0.0 255.255.255.0"
        138 
        139 # To assign specific IP addresses to specific
        140 # clients or if a connecting client has a private
        141 # subnet behind it that should also have VPN access,
    
    
    142 # use the subdirectory "ccd" for client-specific
        143 # configuration files (see man page for more info).
        144 
        145 # EXAMPLE: Suppose the client
        146 # having the certificate common name "Thelonious"
        147 # also has a small subnet behind his connecting
        148 # machine, such as 192.168.40.128/255.255.255.248.
        149 # First, uncomment out these lines:
        150 ;client-config-dir ccd
        151 ;route 192.168.40.128 255.255.255.248
        152 # Then create a file ccd/Thelonious with this line:
        153 #   iroute 192.168.40.128 255.255.255.248
        154 # This will allow Thelonious' private subnet to
        155 # access the VPN.  This example will only work
        156 # if you are routing, not bridging, i.e. you are
        157 # using "dev tun" and "server" directives.
        158 
        159 # EXAMPLE: Suppose you want to give
        160 # Thelonious a fixed VPN IP address of 10.9.0.1.
        161 # First uncomment out these lines:
        162 ;client-config-dir ccd
    163 ;route 10.9.0.0 255.255.255.252
        164 # Then add this line to ccd/Thelonious:
        165 #   ifconfig-push 10.9.0.1 10.9.0.2
        166 
        167 # Suppose that you want to enable different
        168 # firewall access policies for different groups
        169 # of clients.  There are two methods:
        170 # (1) Run multiple OpenVPN daemons, one for each
        171 #     group, and firewall the TUN/TAP interface
        172 #     for each group/daemon appropriately.
        173 # (2) (Advanced) Create a script to dynamically
        174 #     modify the firewall in response to access
        175 #     from different clients.  See man
        176 #     page for more info on learn-address script.
        177 ;learn-address ./script
        178 
        179 # If enabled, this directive will configure
        180 # all clients to redirect their default
        181 # network gateway through the VPN, causing
        182 # all IP traffic such as web browsing and
        183 # and DNS lookups to go through the VPN
     184 # (The OpenVPN server machine may need to NAT
        185 # or bridge the TUN/TAP interface to the internet
        186 # in order for this to work properly).
        187 ;push "redirect-gateway def1 bypass-dhcp"
        188 
        189 # Certain Windows-specific network settings
        190 # can be pushed to clients, such as DNS
        191 # or WINS server addresses.  CAVEAT:
        192 # http://openvpn.net/faq.html#dhcpcaveats
        193 # The addresses below refer to the public
        194 # DNS servers provided by opendns.com.
        195 ;push "dhcp-option DNS 208.67.222.222"
        196 ;push "dhcp-option DNS 208.67.220.220"
        197 
        198 # Uncomment this directive to allow different
        199 # clients to be able to "see" each other.
        200 # By default, clients will only see the server.
        201 # To force clients to only see the server, you
        202 # will also need to appropriately firewall the
        203 # server's TUN/TAP interface.
        204 ;client-to-client
    205 
        206 # Uncomment this directive if multiple clients
        207 # might connect with the same certificate/key
        208 # files or common names.  This is recommended
        209 # only for testing purposes.  For production use,
        210 # each client should have its own certificate/key
        211 # pair.
        212 #
        213 # IF YOU HAVE NOT GENERATED INDIVIDUAL
        214 # CERTIFICATE/KEY PAIRS FOR EACH CLIENT,
        215 # EACH HAVING ITS OWN UNIQUE "COMMON NAME",
        216 # UNCOMMENT THIS LINE OUT.
        217 ;duplicate-cn
        218 
        219 # The keepalive directive causes ping-like
        220 # messages to be sent back and forth over
        221 # the link so that each side knows when
        222 # the other side has gone down.
        223 # Ping every 10 seconds, assume that remote
        224 # peer is down if no ping received during
        225 # a 120 second time period.
    226 keepalive 10 120
        227 
        228 # For extra security beyond that provided
        229 # by SSL/TLS, create an "HMAC firewall"
        230 # to help block DoS attacks and UDP port flooding.
        231 #
        232 # Generate with:
        233 #   openvpn --genkey --secret ta.key
        234 #
        235 # The server and each client must have
        236 # a copy of this key.
        237 # The second parameter should be '0'
        238 # on the server and '1' on the clients.
        239 ;tls-auth ta.key 0 # This file is secret
        240 
        241 # Select a cryptographic cipher.
        242 # This config item must be copied to
        243 # the client config file as well.
        244 ;cipher BF-CBC        # Blowfish (default)
        245 ;cipher AES-128-CBC   # AES
        246 ;cipher DES-EDE3-CBC  # Triple-DES
    247 
        248 # Enable compression on the VPN link.
        249 # If you enable it here, you must also
        250 # enable it in the client config file.
        251 comp-lzo
        252 
        253 # The maximum number of concurrently connected
        254 # clients we want to allow.
        255 ;max-clients 100
        256 
        257 # It's a good idea to reduce the OpenVPN
        258 # daemon's privileges after initialization.
        259 #
        260 # You can uncomment this out on
        261 # non-Windows systems.
        262 ;user nobody
        263 ;group nobody
        264 
        265 # The persist options will try to avoid
        266 # accessing certain resources on restart
        267 # that may no longer be accessible because
    268 # of the privilege downgrade.
        269 persist-key
        270 persist-tun
        271 
        272 # Output a short status file showing
        273 # current connections, truncated
        274 # and rewritten every minute.
        275 status openvpn-status.log
        276 
        277 # By default, log messages will go to the syslog (or
        278 # on Windows, if running as a service, they will go to
        279 # the "\Program Files\OpenVPN\log" directory).
        280 # Use log or log-append to override this default.
        281 # "log" will truncate the log file on OpenVPN startup,
        282 # while "log-append" will append to it.  Use one
        283 # or the other (but not both).
        284 ;log         openvpn.log
        285 ;log-append  openvpn.log
        286 
        287 # Set the appropriate level of log
        288 # file verbosity.
    289 #
        290 # 0 is silent, except for fatal errors
        291 # 4 is reasonable for general usage
        292 # 5 and 6 can help to debug connection problems
        293 # 9 is extremely verbose
        294 verb 3
        295 
        296 # Silence repeating messages.  At most 20
        297 # sequential messages of the same message
        298 # category will be output to the log.
        299 ;mute 20
        300 plugin /usr/lib/openvpn/plugin/lib/openvpn-auth-ldap.so /etc/openvpn        /auth/ldap.conf
        301 client-cert-not-required
    ///////////////////////////////////////////////////////////////////////////////////////////
    đây là filen client.opvn
    Code:
    1 ##############################################
          2 # Sample client-side OpenVPN 2.0 config file #
          3 # for connecting to multi-client server.     #
          4 #                                            #
          5 # This configuration can be used by multiple #
          6 # clients, however each client should have   #
          7 # its own cert and key files.                #
          8 #                                            #
          9 # On Windows, you might want to rename this  #
         10 # file so it has a .ovpn extension           #
         11 ##############################################
         12 
         13 # Specify that we are a client and that we
         14 # will be pulling certain config file directives
         15 # from the server.
         16 client
         17 
         18 # Use the same setting as you are using on
         19 # the server.
         20 # On most systems, the VPN will not function
         21 # unless you partially or fully disable
     22 # the firewall for the TUN/TAP interface.
         23 ;dev tap
         24 dev tun
         25 
         26 # Windows needs the TAP-Win32 adapter name
         27 # from the Network Connections panel
         28 # if you have more than one.  On XP SP2,
         29 # you may need to disable the firewall
         30 # for the TAP adapter.
         31 ;dev-node MyTap
         32 
         33 # Are we connecting to a TCP or
         34 # UDP server?  Use the same setting as
         35 # on the server.
         36 ;proto tcp
         37 proto udp
         38 
         39 # The hostname/IP and port of the server.
         40 # You can have multiple remote entries
         41 # to load balance between the servers.
    42 remote 192.168.1.200 1194
         43 ;remote my-server-2 1194
         44 
         45 # Choose a random host from the remote
         46 # list for load-balancing.  Otherwise
         47 # try hosts in the order specified.
         48 ;remote-random
         49 
         50 # Keep trying indefinitely to resolve the
         51 # host name of the OpenVPN server.  Very useful
         52 # on machines which are not permanently connected
         53 # to the internet such as laptops.
         54 resolv-retry infinite
         55 
         56 # Most clients don't need to bind to
         57 # a specific local port number.
         58 nobind
         59 
         60 # Downgrade privileges after initialization (non-Windows only)
         61 ;user nobody
         62 ;group nobody
    63 
         64 # Try to preserve some state across restarts.
         65 persist-key
         66 persist-tun
         67 
         68 # If you are connecting through an
         69 # HTTP proxy to reach the actual OpenVPN
         70 # server, put the proxy server/IP and
         71 # port number here.  See the man page
         72 # if your proxy server requires
         73 # authentication.
         74 ;http-proxy-retry # retry on connection failures
         75 ;http-proxy [proxy server] [proxy port #]
         76 
         77 # Wireless networks often produce a lot
         78 # of duplicate packets.  Set this flag
         79 # to silence duplicate packet warnings.
         80 ;mute-replay-warnings
         81 
         82 # SSL/TLS parms.
         83 # See the server config file for more
    
    
    
    
     84 # description.  It's best to use
         85 # a separate .crt/.key file pair
         86 # for each client.  A single ca
         87 # file can be used for all clients.
         88 ca ca.crt
         89 #cert client.crt
         90 #key client.key
         91 
         92 # Verify server certificate by checking
         93 # that the certicate has the nsCertType
         94 # field set to "server".  This is an
         95 # important precaution to protect against
         96 # a potential attack discussed here:
         97 #  http://openvpn.net/howto.html#mitm
         98 #
         99 # To use this feature, you will need to generate
        100 # your server certificates with the nsCertType
        101 # field set to "server".  The build-key-server
        102 # script in the easy-rsa folder will do this.
        103 ns-cert-type server
        104 
    105 # If a tls-auth key is used on the server
        106 # then every client must also have the key.
        107 ;tls-auth ta.key 1
        108 
        109 # Select a cryptographic cipher.
        110 # If the cipher option is used on the server
        111 # then you must also specify it here.
        112 ;cipher x
        113 
        114 # Enable compression on the VPN link.
        115 # Don't enable this unless it is also
        116 # enabled in the server config file.
        117 comp-lzo
        118 
        119 # Set log file verbosity.
        120 verb 3
        121 
        122 # Silence repeating messages
        123 ;mute 20
        124 auth-user-pass
    /////////////////////////////////////////////////////////////////////////////////////////
    file iptables config
    Code:
    1 # Firewall configuration written by system-config-securitylevel
          2 # Manual customization of this file is not recommended.
          3 *filter
          4 :INPUT ACCEPT [0:0]
          5 :FORWARD ACCEPT [0:0]
          6 :OUTPUT ACCEPT [0:0]
          7 :RH-Firewall-1-INPUT - [0:0]
          8 -A INPUT -j RH-Firewall-1-INPUT
          9 -A FORWARD -j RH-Firewall-1-INPUT
         10 -A RH-Firewall-1-INPUT -i lo -j ACCEPT
         11 -A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
         12 -A RH-Firewall-1-INPUT -p 50 -j ACCEPT
         13 -A RH-Firewall-1-INPUT -p 51 -j ACCEPT
         14 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 11        0 -j ACCEPT
         15 -A RH-Firewall-1-INPUT -p udp --dport 5353 -d 224.0.0.251 -j ACCEPT
         16 -A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
         17 -A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
         18 -A RH-Firewall-1-INPUT -p udp -m udp --dport 1194 -j ACCEPT
         19 -A RH-Firewall-1-INPUT -p udp -m udp --dport 1194 -j ACCEPT
         20 
     21 -A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEP        T
         22 -A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22         -j ACCEPT
         23 -A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
         24 COMMIT
    sau khi cấu hình xong dùng lệnh ifconfig | more đã có đường hầm tunnel được tạo ra
    Click image for larger version

Name:	h1.jpg
Views:	1
Size:	90.0 KB
ID:	208760


    nhưng khi kết nối đến vpn server vẫn không được , đây là file log
    Code:
    Mon Apr 15 18:11:40 2013 OpenVPN 2.0.9 Win32-MinGW [SSL] [LZO] built on Oct  1 2006
    Mon Apr 15 18:11:48 2013 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA.  OpenVPN 2.0-beta16 and earlier used 5000 as the default port.
    Mon Apr 15 18:11:48 2013 LZO compression initialized
    Mon Apr 15 18:11:48 2013 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Mon Apr 15 18:11:48 2013 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
    Mon Apr 15 18:11:48 2013 Local Options hash (VER=V4): '41690919'
    Mon Apr 15 18:11:48 2013 Expected Remote Options hash (VER=V4): '530fdded'
    Mon Apr 15 18:11:48 2013 UDPv4 link local: [undef]
    Mon Apr 15 18:11:48 2013 UDPv4 link remote: 192.168.1.200:1194
    Mon Apr 15 18:11:48 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:11:51 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:11:52 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:11:54 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:11:57 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:11:59 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:01 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:03 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:06 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:08 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:10 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:12 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:15 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:17 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:19 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:22 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:23 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:25 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:28 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:29 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:31 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:33 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:36 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:38 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:40 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:42 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:44 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:46 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:48 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Mon Apr 15 18:12:48 2013 TLS Error: TLS handshake failed
    Mon Apr 15 18:12:48 2013 TCP/UDP: Closing socket
    Mon Apr 15 18:12:48 2013 SIGUSR1[soft,tls-error] received, process restarting
    Mon Apr 15 18:12:48 2013 Restart pause, 2 second(s)
    Mon Apr 15 18:12:50 2013 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA.  OpenVPN 2.0-beta16 and earlier used 5000 as the default port.
    Mon Apr 15 18:12:50 2013 Re-using SSL/TLS context
    Mon Apr 15 18:12:50 2013 LZO compression initialized
    Mon Apr 15 18:12:50 2013 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
    Mon Apr 15 18:12:50 2013 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
    Mon Apr 15 18:12:50 2013 Local Options hash (VER=V4): '41690919'
    Mon Apr 15 18:12:50 2013 Expected Remote Options hash (VER=V4): '530fdded'
    Mon Apr 15 18:12:50 2013 UDPv4 link local: [undef]
    Mon Apr 15 18:12:50 2013 UDPv4 link remote: 192.168.1.200:1194
    Mon Apr 15 18:12:50 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:52 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:55 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:56 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:12:58 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:00 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:02 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:04 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:06 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:08 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:10 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:13 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:15 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:18 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:20 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:22 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:25 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:27 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:29 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:32 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:34 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:36 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:38 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:40 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:42 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:44 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:47 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:49 2013 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
    Mon Apr 15 18:13:50 2013 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Mon Apr 15 18:13:50 2013 TLS Error: TLS handshake failed
    Mon Apr 15 18:13:50 2013 TCP/UDP: Closing socket

  • #2
    ai biết chỉ giúp mình cái , do mình đang cần gấp
    nếu bạn nào có thể hổ trợ hoặt suport mình với , mình đang cần gấp...

    Comment

    Working...
    X