Hallo Zusammen,
ich habe das Ganze am Wochenende noch einmal genauer analysiert und konnte dabei den Fehler stark eingrenzen, d.h. meine bisherige Fehlerbeschreibung war zwar richtig - nur habe ich daraus leider die falschen Schlüsse gezogen ☹ . Ich gehe jetzt davon aus, dass die Konfiguration von OpenVPN-Server und Shadowsocks auf dem Ubuntu Server richtig sind. Dafür spricht dass OpenVPN mit Shadowsocks von Windows aus fehlerfrei funktioniert (siehe Logfiles).
Windows 10: OpenVPN ohne Shadowsocks → keine VPN-Verbindung!
Sat May 12 20:44:40 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 24 2018
Sat May 12 20:44:40 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Sat May 12 20:44:40 2018 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
Sat May 12 20:44:41 2018 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sat May 12 20:44:41 2018 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat May 12 20:44:41 2018 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sat May 12 20:44:41 2018 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat May 12 20:44:41 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1080
Sat May 12 20:44:41 2018 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1080 [nonblock] <- Und das war's, Verbindungsaufbau bricht ab!
Windows 10: OpenVPN mit Shadowsocks → VPN über Shadowsocks funktioniert!
Sat May 12 20:45:34 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 24 2018
Sat May 12 20:45:34 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Sat May 12 20:45:34 2018 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
Sat May 12 20:45:34 2018 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sat May 12 20:45:34 2018 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat May 12 20:45:34 2018 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Sat May 12 20:45:34 2018 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat May 12 20:45:34 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1080
Sat May 12 20:45:34 2018 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1080 [nonblock]
Sat May 12 20:45:34 2018 TCP connection established with [AF_INET]127.0.0.1:1080
Sat May 12 20:45:34 2018 TCPv4_CLIENT link local: (not bound)
Sat May 12 20:45:34 2018 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:1080
Sat May 12 20:45:35 2018 VERIFY OK: depth=1, CN=socks5-ca
Sat May 12 20:45:35 2018 VERIFY KU OK
Sat May 12 20:45:35 2018 Validating certificate extended key usage
Sat May 12 20:45:35 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat May 12 20:45:35 2018 VERIFY EKU OK
Sat May 12 20:45:35 2018 VERIFY OK: depth=0, CN=socks5
Sat May 12 20:45:35 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 521 bit EC, curve: secp521r1
Sat May 12 20:45:35 2018 [socks5] Peer Connection Initiated with [AF_INET]127.0.0.1:1080
Sat May 12 20:45:36 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
Sat May 12 20:45:36 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat May 12 20:45:36 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat May 12 20:45:36 2018 open_tun
Sat May 12 20:45:36 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{33B5C907-D578-40FB-B4B1-75DB88335506}.tap
Sat May 12 20:45:36 2018 Set TAP-Windows TUN subnet mode network/local/netmask = 10.55.0.0/10.55.0.21/255.255.255.0 [SUCCEEDED]
Sat May 12 20:45:36 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.55.0.21/255.255.255.0 on interface {33B5C907-D578-40FB-B4B1-75DB88335506} [DHCP-serv: 10.55.0.254, lease-time: 31536000]
Sat May 12 20:45:36 2018 Successful ARP Flush on interface [7] {33B5C907-D578-40FB-B4B1-75DB88335506}
Sat May 12 20:45:36 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sat May 12 20:45:41 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
Sat May 12 20:45:41 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
Sat May 12 20:45:41 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
Sat May 12 20:45:41 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
Sat May 12 20:45:41 2018 Initialization Sequence Completed <- VPN-Verbinding über Shadowsocks steht!
Soweit alles gut - jetzt zum eigentlichen Problem. Leider musste ich dann feststellen dass mein bisher verwendeter OpenVPN-Client ("OpenVPN-Connect", Closed-Source) gar keine SOCKS5-Proxy-Unterstützung hat und dabei meine "socks-proxy 127.0.0. 1080"-Anweisung einfach ohne Fehlermeldung ignorierte und einen normalen VPN ohne Shadowsocks-Proxy aufgebaut hat. Da mein Handy (Android 4.4.2) nicht gerootet ist gibt es dann nur noch eine andere Möglichkeit: "OpenVPN für Android", Open-Source, funktioniert auch ohne Root und hat http- als auch SOCKS5-Proxy-Unterstützung.
Die Shadowsocks-Verbindung zwischen Handy (auch aus dem Mobilfunknetz!) und Server steht auf jeden Fall auch, denn wenn ich Firefox auf SOCKS5 umstelle kann ich im Heimnetz als auch aus dem Mobilfunknetz über meinen Server surfen.
Firefox for Android: about:config
network.proxy.socks: 127.0.0.1
network.proxy.socks_port: 1080
network.proxy.type: 1
Soweit ist alles OK und funktioniert perfekt. Nur ich habe es bis jetzt nicht geschafft OpenVPN für Android dazu zu überreden einen VPN-Tunnel durch den Shadowsocks-Tunnel aufzubauen. Dazu habe ich mal den ausführlichen Log angehängt, vielleicht kann Jemand im Forum etwas damit anfangen! OpenVPN für Android erkennt zwar meine "socks-proxy 127.0.0.1 1080"-Anweisung in der config.ovpn, schafft es aber irgendwie nicht über den lokalen Port 1080 eine Verbindung mit meinem Server auf zu bauen.
2018-05-14 18:06:57 offizielle Version 0.7.5 läuft auf htc HTC One mini 2 (MSM8226), Android 4.4.2 (KOT49H) API 19, ABI armeabi-v7a, (htc/o2_uk/htc_memul:4.4.2/KOT49H/399404.4:user/release-keys)
2018-05-14 18:06:57 Generiere OpenVPN-Konfiguration…
2018-05-14 18:06:58 New OpenVPN Status (VPN_GENERATE_CONFIG->LEVEL_START):
2018-05-14 18:06:57 New OpenVPN Status (VPN_GENERATE_CONFIG->LEVEL_START):
2018-05-14 18:06:58 started Socket Thread
2018-05-14 18:06:58 Netzwerkstatus: CONNECTED to WIFI "DAHOIM"
2018-05-14 18:06:58 Debug state info: CONNECTED to WIFI "DAHOIM", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
2018-05-14 18:06:58 Debug state info: CONNECTED to WIFI "DAHOIM", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
2018-05-14 18:06:58 Current Parameter Settings:
2018-05-14 18:06:58 config = '/data/data/de.blinkt.openvpn/cache/android.conf'
2018-05-14 18:06:58 mode = 0
2018-05-14 18:06:58 show_ciphers = DISABLED
2018-05-14 18:06:58 show_digests = DISABLED
2018-05-14 18:06:58 show_engines = DISABLED
2018-05-14 18:06:58 genkey = DISABLED
2018-05-14 18:06:58 key_pass_file = '[UNDEF]'
2018-05-14 18:06:58 show_tls_ciphers = DISABLED
2018-05-14 18:06:58 connect_retry_max = 0
2018-05-14 18:06:58 Connection profiles [0]:
2018-05-14 18:06:58 proto = tcp-client
2018-05-14 18:06:58 Warte 0s Sekunden zwischen zwei Verbindungsversuchen
2018-05-14 18:06:58 local = '[UNDEF]'
2018-05-14 18:06:58 local_port = '[UNDEF]'
2018-05-14 18:06:58 remote = 'socks.dyndns.org'
2018-05-14 18:06:58 remote_port = '1194'
2018-05-14 18:06:58 remote_float = DISABLED
2018-05-14 18:06:58 bind_defined = DISABLED
2018-05-14 18:06:58 bind_local = DISABLED
2018-05-14 18:06:58 bind_ipv6_only = DISABLED
2018-05-14 18:06:58 connect_retry_seconds = 2
2018-05-14 18:06:58 connect_timeout = 120
2018-05-14 18:06:58 socks_proxy_server = '[UNDEF]'
2018-05-14 18:06:58 socks_proxy_port = '[UNDEF]'
2018-05-14 18:06:58 tun_mtu = 1500
2018-05-14 18:06:58 tun_mtu_defined = ENABLED
2018-05-14 18:06:58 link_mtu = 1500
2018-05-14 18:06:58 link_mtu_defined = DISABLED
2018-05-14 18:06:58 Verwende Proxy 127.0.0.1 127.0.0.1
2018-05-14 18:06:58 tun_mtu_extra = 0
2018-05-14 18:06:58 tun_mtu_extra_defined = DISABLED
2018-05-14 18:06:58 mtu_discover_type = -1
2018-05-14 18:06:58 fragment = 0
2018-05-14 18:06:58 mssfix = 1450
2018-05-14 18:06:58 explicit_exit_notification = 0
2018-05-14 18:06:58 Connection profiles END
2018-05-14 18:06:58 remote_random = DISABLED
2018-05-14 18:06:58 ipchange = '[UNDEF]'
2018-05-14 18:06:58 dev = 'tun'
2018-05-14 18:06:58 dev_type = '[UNDEF]'
2018-05-14 18:06:58 dev_node = '[UNDEF]'
2018-05-14 18:06:58 lladdr = '[UNDEF]'
2018-05-14 18:06:58 topology = 1
2018-05-14 18:06:58 ifconfig_local = '[UNDEF]'
2018-05-14 18:06:58 ifconfig_remote_netmask = '[UNDEF]'
2018-05-14 18:06:58 ifconfig_noexec = DISABLED
2018-05-14 18:06:58 ifconfig_nowarn = ENABLED
2018-05-14 18:06:58 ifconfig_ipv6_local = '[UNDEF]'
2018-05-14 18:06:58 ifconfig_ipv6_netbits = 0
2018-05-14 18:06:58 ifconfig_ipv6_remote = '[UNDEF]'
2018-05-14 18:06:58 shaper = 0
2018-05-14 18:06:58 mtu_test = 0
2018-05-14 18:06:58 mlock = DISABLED
2018-05-14 18:06:58 keepalive_ping = 0
2018-05-14 18:06:58 keepalive_timeout = 0
2018-05-14 18:06:58 inactivity_timeout = 0
2018-05-14 18:06:58 ping_send_timeout = 0
2018-05-14 18:06:58 ping_rec_timeout = 0
2018-05-14 18:06:58 ping_rec_timeout_action = 0
2018-05-14 18:06:58 ping_timer_remote = DISABLED
2018-05-14 18:06:58 remap_sigusr1 = 0
2018-05-14 18:06:58 persist_tun = ENABLED
2018-05-14 18:06:58 persist_local_ip = DISABLED
2018-05-14 18:06:58 persist_remote_ip = DISABLED
2018-05-14 18:06:58 persist_key = DISABLED
2018-05-14 18:06:58 passtos = DISABLED
2018-05-14 18:06:58 resolve_retry_seconds = 60
2018-05-14 18:06:58 resolve_in_advance = ENABLED
2018-05-14 18:06:58 username = '[UNDEF]'
2018-05-14 18:06:58 groupname = '[UNDEF]'
2018-05-14 18:06:58 chroot_dir = '[UNDEF]'
2018-05-14 18:06:58 cd_dir = '[UNDEF]'
2018-05-14 18:06:58 writepid = '[UNDEF]'
2018-05-14 18:06:58 up_script = '[UNDEF]'
2018-05-14 18:06:58 down_script = '[UNDEF]'
2018-05-14 18:06:58 down_pre = DISABLED
2018-05-14 18:06:58 up_restart = DISABLED
2018-05-14 18:06:58 up_delay = DISABLED
2018-05-14 18:06:58 daemon = DISABLED
2018-05-14 18:06:58 inetd = 0
2018-05-14 18:06:58 log = DISABLED
2018-05-14 18:06:58 suppress_timestamps = DISABLED
2018-05-14 18:06:58 machine_readable_output = ENABLED
2018-05-14 18:06:58 nice = 0
2018-05-14 18:06:58 verbosity = 4
2018-05-14 18:06:58 mute = 0
2018-05-14 18:06:58 gremlin = 0
2018-05-14 18:06:58 status_file = '[UNDEF]'
2018-05-14 18:06:58 status_file_version = 1
2018-05-14 18:06:58 status_file_update_freq = 60
2018-05-14 18:06:58 occ = ENABLED
2018-05-14 18:06:58 rcvbuf = 0
2018-05-14 18:06:58 sndbuf = 0
2018-05-14 18:06:58 sockflags = 0
2018-05-14 18:06:58 fast_io = DISABLED
2018-05-14 18:06:58 comp.alg = 2
2018-05-14 18:06:58 comp.flags = 1
2018-05-14 18:06:58 route_script = '[UNDEF]'
2018-05-14 18:06:58 route_default_gateway = '[UNDEF]'
2018-05-14 18:06:58 route_default_metric = 0
2018-05-14 18:06:58 route_noexec = DISABLED
2018-05-14 18:06:58 route_delay = 0
2018-05-14 18:06:58 route_delay_window = 30
2018-05-14 18:06:58 route_delay_defined = DISABLED
2018-05-14 18:06:58 route_nopull = DISABLED
2018-05-14 18:06:58 route_gateway_via_dhcp = DISABLED
2018-05-14 18:06:58 allow_pull_fqdn = DISABLED
2018-05-14 18:06:58 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'
2018-05-14 18:06:58 management_port = 'unix'
2018-05-14 18:06:58 management_user_pass = '[UNDEF]'
2018-05-14 18:06:58 management_log_history_cache = 250
2018-05-14 18:06:58 management_echo_buffer_size = 100
2018-05-14 18:06:58 management_write_peer_info_file = '[UNDEF]'
2018-05-14 18:06:58 management_client_user = '[UNDEF]'
2018-05-14 18:06:58 management_client_group = '[UNDEF]'
2018-05-14 18:06:58 management_flags = 4390
2018-05-14 18:06:58 shared_secret_file = '[UNDEF]'
2018-05-14 18:06:58 key_direction = not set
2018-05-14 18:06:58 ciphername = 'BF-CBC'
2018-05-14 18:06:58 ncp_enabled = ENABLED
2018-05-14 18:06:58 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
2018-05-14 18:06:58 authname = 'SHA512'
2018-05-14 18:06:58 prng_hash = 'SHA1'
2018-05-14 18:06:58 prng_nonce_secret_len = 16
2018-05-14 18:06:58 keysize = 0
2018-05-14 18:06:58 engine = DISABLED
2018-05-14 18:06:58 replay = ENABLED
2018-05-14 18:06:58 mute_replay_warnings = DISABLED
2018-05-14 18:06:58 replay_window = 64
2018-05-14 18:06:58 replay_time = 15
2018-05-14 18:06:58 packet_id_file = '[UNDEF]'
2018-05-14 18:06:58 test_crypto = DISABLED
2018-05-14 18:06:58 tls_server = DISABLED
2018-05-14 18:06:58 tls_client = ENABLED
2018-05-14 18:06:58 key_method = 2
2018-05-14 18:06:58 ca_file = '[[INLINE]]'
2018-05-14 18:06:58 ca_path = '[UNDEF]'
2018-05-14 18:06:58 dh_file = '[UNDEF]'
2018-05-14 18:06:58 cert_file = '[[INLINE]]'
2018-05-14 18:06:58 extra_certs_file = '[UNDEF]'
2018-05-14 18:06:58 priv_key_file = '[[INLINE]]'
2018-05-14 18:06:58 pkcs12_file = '[UNDEF]'
2018-05-14 18:06:58 cipher_list = '[UNDEF]'
2018-05-14 18:06:58 tls_cert_profile = '[UNDEF]'
2018-05-14 18:06:58 tls_verify = '[UNDEF]'
2018-05-14 18:06:58 tls_export_cert = '[UNDEF]'
2018-05-14 18:06:58 verify_x509_type = 0
2018-05-14 18:06:58 verify_x509_name = '[UNDEF]'
2018-05-14 18:06:58 crl_file = '[UNDEF]'
2018-05-14 18:06:58 ns_cert_type = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 65535
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_ku[i] = 0
2018-05-14 18:06:58 remote_cert_eku = 'TLS Web Server Authentication'
2018-05-14 18:06:58 ssl_flags = 0
2018-05-14 18:06:58 tls_timeout = 2
2018-05-14 18:06:58 renegotiate_bytes = -1
2018-05-14 18:06:58 renegotiate_packets = 0
2018-05-14 18:06:58 renegotiate_seconds = 3600
2018-05-14 18:06:58 handshake_window = 60
2018-05-14 18:06:58 transition_window = 3600
2018-05-14 18:06:58 single_session = DISABLED
2018-05-14 18:06:58 push_peer_info = DISABLED
2018-05-14 18:06:58 tls_exit = DISABLED
2018-05-14 18:06:58 tls_auth_file = '[UNDEF]'
2018-05-14 18:06:58 tls_crypt_file = '[[INLINE]]'
2018-05-14 18:06:58 client = ENABLED
2018-05-14 18:06:58 pull = ENABLED
2018-05-14 18:06:58 auth_user_pass_file = '[UNDEF]'
2018-05-14 18:06:58 OpenVPN 2.5-icsopenvpn [git:v2.4_rc2-301-g14adf04a] armeabi-v7a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 3 2018
2018-05-14 18:06:58 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
2018-05-14 18:06:58 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket
2018-05-14 18:06:58 MANAGEMENT: CMD 'version 2'
2018-05-14 18:06:58 MANAGEMENT: CMD 'hold release'
2018-05-14 18:06:58 MANAGEMENT: CMD 'bytecount 2'
2018-05-14 18:06:58 MANAGEMENT: CMD 'proxy SOCKS 127.0.0.1 1080'
2018-05-14 18:06:58 MANAGEMENT: CMD 'state on'
2018-05-14 18:06:59 MANAGEMENT: CMD 'password [...]'
2018-05-14 18:06:59 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2018-05-14 18:06:59 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2018-05-14 18:06:59 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2018-05-14 18:06:59 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
2018-05-14 18:06:59 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
2018-05-14 18:06:59 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2018-05-14 18:06:59 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2018-05-14 18:06:59 LZO compression initializing
2018-05-14 18:06:59 Control Channel MTU parms [ L:1624 D:1154 EF:96 EB:0 ET:0 EL:3 ]
2018-05-14 18:06:59 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2018-05-14 18:06:59 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1588,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA512,keysize 128,key-method 2,tls-client'
2018-05-14 18:06:59 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): init_instance,,,,,
2018-05-14 18:06:59 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): init_instance,,,,,
2018-05-14 18:06:59 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1588,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher BF-CBC,auth SHA512,keysize 128,key-method 2,tls-server'
2018-05-14 18:06:59 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1080
2018-05-14 18:06:59 Socket Buffers: R=[1048576->1048576] S=[524288->524288]
2018-05-14 18:06:59 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1080 [nonblock]
2018-05-14 18:06:59 MANAGEMENT: >STATE:1526314019,TCP_CONNECT,,,,,,
2018-05-14 18:06:59 TCP: connect to [AF_INET]127.0.0.1:1080 failed: Connection refused
2018-05-14 18:06:59 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
2018-05-14 18:06:59 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
2018-05-14 18:06:59 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2018-05-14 18:06:59 MANAGEMENT: >STATE:1526314019,RECONNECTING,init_instance,,,,,
2018-05-14 18:06:59 Warte 2s Sekunden zwischen zwei Verbindungsversuchen
2018-05-14 18:07:04 Verwende Proxy 127.0.0.1 127.0.0.1 <- Das verstehe ich nicht ganz!!
2018-05-14 18:07:04 MANAGEMENT: CMD 'hold release'
2018-05-14 18:07:04 MANAGEMENT: CMD 'proxy SOCKS 127.0.0.1 1080'
2018-05-14 18:07:04 MANAGEMENT: CMD 'bytecount 2'
2018-05-14 18:07:04 MANAGEMENT: CMD 'state on'
2018-05-14 18:07:05 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2018-05-14 18:07:05 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2018-05-14 18:07:05 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2018-05-14 18:07:05 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2018-05-14 18:07:05 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
2018-05-14 18:07:05 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
2018-05-14 18:07:05 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): init_instance,,,,,
2018-05-14 18:07:05 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): init_instance,,,,,
2018-05-14 18:07:05 LZO compression initializing
2018-05-14 18:07:05 Control Channel MTU parms [ L:1624 D:1154 EF:96 EB:0 ET:0 EL:3 ]
2018-05-14 18:07:05 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2018-05-14 18:07:05 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1588,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA512,keysize 128,key-method 2,tls-client'
2018-05-14 18:07:05 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1588,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher BF-CBC,auth SHA512,keysize 128,key-method 2,tls-server'
2018-05-14 18:07:05 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1080
2018-05-14 18:07:05 Socket Buffers: R=[1048576->1048576] S=[524288->524288]
2018-05-14 18:07:05 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1080 [nonblock]
2018-05-14 18:07:05 MANAGEMENT: >STATE:1526314025,TCP_CONNECT,,,,,,
2018-05-14 18:07:05 TCP: connect to [AF_INET]127.0.0.1:1080 failed: Connection refused
2018-05-14 18:07:05 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2018-05-14 18:07:05 MANAGEMENT: >STATE:1526314025,RECONNECTING,init_instance,,,,,
2018-05-14 18:07:05 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
2018-05-14 18:07:05 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
2018-05-14 18:07:05 Warte 2s Sekunden zwischen zwei Verbindungsversuchen
2018-05-14 18:07:10 Verwende Proxy 127.0.0.1 127.0.0.1
2018-05-14 18:07:10 MANAGEMENT: CMD 'hold release'
2018-05-14 18:07:10 MANAGEMENT: CMD 'proxy SOCKS 127.0.0.1 1080'
2018-05-14 18:07:10 MANAGEMENT: CMD 'bytecount 2'
2018-05-14 18:07:10 MANAGEMENT: CMD 'state on'
2018-05-14 18:07:11 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2018-05-14 18:07:11 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2018-05-14 18:07:11 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2018-05-14 18:07:11 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2018-05-14 18:07:11 LZO compression initializing
2018-05-14 18:07:11 Control Channel MTU parms [ L:1624 D:1154 EF:96 EB:0 ET:0 EL:3 ]
2018-05-14 18:07:11 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
2018-05-14 18:07:11 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1588,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher BF-CBC,auth SHA512,keysize 128,key-method 2,tls-client'
2018-05-14 18:07:11 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
2018-05-14 18:07:11 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
2018-05-14 18:07:11 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): init_instance,,,,,
2018-05-14 18:07:11 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): init_instance,,,,,
2018-05-14 18:07:11 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1588,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher BF-CBC,auth SHA512,keysize 128,key-method 2,tls-server'
2018-05-14 18:07:11 TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:1080
2018-05-14 18:07:11 Socket Buffers: R=[1048576->1048576] S=[524288->524288]
2018-05-14 18:07:11 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1080 [nonblock]
2018-05-14 18:07:11 MANAGEMENT: >STATE:1526314031,TCP_CONNECT,,,,,,
2018-05-14 18:07:11 TCP: connect to [AF_INET]127.0.0.1:1080 failed: Connection refused
2018-05-14 18:07:11 SIGUSR1[connection failed(soft),init_instance] received, process restarting
2018-05-14 18:07:11 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
2018-05-14 18:07:11 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
2018-05-14 18:07:11 MANAGEMENT: >STATE:1526314031,RECONNECTING,init_instance,,,,,
2018-05-14 18:07:11 Warte 2s Sekunden zwischen zwei Verbindungsversuchen
2018-05-14 18:07:14 MANAGEMENT: CMD 'signal SIGINT'
2018-05-14 18:07:16 New OpenVPN Status (EXITING->LEVEL_NOTCONNECTED): init_instance,,,,,
2018-05-14 18:07:14 New OpenVPN Status (EXITING->LEVEL_NOTCONNECTED): init_instance,,,,,
2018-05-14 18:07:14 SIGINT[hard,init_instance] received, process exiting
2018-05-14 18:07:14 MANAGEMENT: >STATE:1526314034,EXITING,init_instance,,,,,
2018-05-14 18:07:16 New OpenVPN Status (NOPROCESS->LEVEL_NOTCONNECTED): No process running.
2018-05-14 18:07:14 New OpenVPN Status (NOPROCESS->LEVEL_NOTCONNECTED): No process running.
Was mache ich da falsch? Kann mir da irgend Jemand einen Tipp geben? Oder muss ich dazu mein Handy rooten?
Schon mal vielen Dank!
Grüße vom Bodensee