WORKS!
using "ncp-disable" it works ;-)
if you could add in the next alpha to test, would be fine !
Apr 7 20:22:16 openvpn[1968]: OpenVPN 2.4.1 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 2 2017
Apr 7 20:22:16 openvpn[1968]: library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.08
Apr 7 20:22:16 openvpn[1969]: WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.
Apr 7 20:22:16 openvpn[1969]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Apr 7 20:22:16 openvpn[1969]: LZO compression initializing
Apr 7 20:22:16 openvpn[1969]: Control Channel MTU parms [ L:1626 D:1212 EF:38 EB:0 ET:0 EL:3 ]
Apr 7 20:22:16 openvpn[1969]: Data Channel MTU parms [ L:1626 D:1300 EF:126 EB:407 ET:0 EL:3 ]
Apr 7 20:22:16 openvpn[1969]: Fragmentation MTU parms [ L:1626 D:1300 EF:125 EB:407 ET:1 EL:3 ]
Apr 7 20:22:16 openvpn[1969]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1546,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
Apr 7 20:22:16 openvpn[1969]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1546,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
Apr 7 20:22:16 openvpn[1969]: TCP/UDP: Preserving recently used remote address: [AF_INET]xxx7:1194
Apr 7 20:22:16 openvpn[1969]: Socket Buffers: R=[122880->122880] S=[122880->122880]
Apr 7 20:22:16 openvpn[1969]: UDP link local: (not bound)
Apr 7 20:22:16 openvpn[1969]: UDP link remote: [AF_INET]xxx:1194
Apr 7 20:22:16 openvpn[1969]: TLS: Initial packet from [AF_INET]xxx:1194, sid=d64481dd 96b87694
Apr 7 20:22:16 openvpn[1969]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Apr 7 20:22:17 openvpn[1969]: VERIFY OK: depth=1, C=NV, ST=NV, L=nVPN, O=nVpn, CN=nVpn CA,
[email protected]
Apr 7 20:22:17 openvpn[1969]: VERIFY OK: depth=0, C=NV, ST=NV, L=nVPN, O=nVpn, CN=server,
[email protected]
Apr 7 20:22:17 openvpn[1969]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Apr 7 20:22:17 openvpn[1969]: [server] Peer Connection Initiated with [AF_INET]84.200.65.57:1194
Apr 7 20:22:18 openvpn[1969]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Apr 7 20:22:19 openvpn[1969]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route xx,topology net30,ping 10,ping-restart 120,ifconfig xxx,peer-id 0'
Apr 7 20:22:19 openvpn[1969]: OPTIONS IMPORT: timers and/or timeouts modified
Apr 7 20:22:19 openvpn[1969]: OPTIONS IMPORT: --ifconfig/up options modified
Apr 7 20:22:19 openvpn[1969]: OPTIONS IMPORT: route options modified
Apr 7 20:22:19 openvpn[1969]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Apr 7 20:22:19 openvpn[1969]: OPTIONS IMPORT: peer-id set
Apr 7 20:22:19 openvpn[1969]: OPTIONS IMPORT: adjusting link_mtu to 1629
Apr 7 20:22:19 openvpn[1969]: Data Channel MTU parms [ L:1549 D:1300 EF:49 EB:407 ET:0 EL:3 ]
Apr 7 20:22:19 openvpn[1969]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 7 20:22:19 openvpn[1969]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Apr 7 20:22:19 openvpn[1969]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 7 20:22:19 openvpn[1969]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 7 20:22:19 openvpn[1969]: WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Apr 7 20:22:19 openvpn[1969]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 7 20:22:19 openvpn[1969]: WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
Apr 7 20:22:19 openvpn[1969]: TUN/TAP device tun12 opened
Apr 7 20:22:19 openvpn[1969]: TUN/TAP TX queue length set to 100
Apr 7 20:22:19 openvpn[1969]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Apr 7 20:22:19 openvpn[1969]: /usr/sbin/ip link set dev tun12 up mtu 1500