以下為遠端openwrt顯示的訊息
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: Re-using SSL/TLS context
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: Control Channel MTU parms [ L:1559 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: Preserving previous TUN/TAP instance: tun0
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:395 ET:0 EL:3 ]
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: TCP/UDP: Preserving recently used remote address: [AF_INET]114.32.14.62:1194
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: Socket Buffers: R=[131072->131072] S=[16384->16384]
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: Attempting to establish TCP connection with [AF_INET]114.32.14.62:1194 [nonblock]
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: TCP connection established with [AF_INET]114.32.14.62:1194
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: TCP_CLIENT link local: (not bound)
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: TCP_CLIENT link remote: [AF_INET]114.32.14.62:1194
Fri Nov 18 11:26:07 2022 daemon.notice openvpn(NAS16)[2964]: TLS: Initial packet from [AF_INET]114.32.14.62:1194, sid=a0e4f0d9 560543ff
Fri Nov 18 11:26:08 2022 daemon.notice openvpn(NAS16)[2964]: VERIFY OK: depth=1, CN=CAopen
Fri Nov 18 11:26:08 2022 daemon.notice openvpn(NAS16)[2964]: VERIFY KU OK
Fri Nov 18 11:26:08 2022 daemon.notice openvpn(NAS16)[2964]: Validating certificate extended key usage
Fri Nov 18 11:26:08 2022 daemon.notice openvpn(NAS16)[2964]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Nov 18 11:26:08 2022 daemon.notice openvpn(NAS16)[2964]: VERIFY EKU OK
Fri Nov 18 11:26:08 2022 daemon.notice openvpn(NAS16)[2964]: VERIFY OK: depth=0, CN=SERVERopen
Fri Nov 18 11:27:07 2022 daemon.err openvpn(NAS16)[2964]: TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Fri Nov 18 11:27:07 2022 daemon.err openvpn(NAS16)[2964]: TLS Error: TLS handshake failed
Fri Nov 18 11:27:07 2022 daemon.err openvpn(NAS16)[2964]: Fatal TLS error (check_tls_errors_co), restarting
Fri Nov 18 11:27:07 2022 daemon.notice openvpn(NAS16)[2964]: TCP/UDP: Closing socket
Fri Nov 18 11:27:07 2022 daemon.notice openvpn(NAS16)[2964]: SIGUSR1[soft,tls-error] received, process restarting
Fri Nov 18 11:27:07 2022 daemon.notice openvpn(NAS16)[2964]: Restart pause, 300 second(s)
Fri Nov 18 11:32:07 2022 daemon.warn openvpn(NAS16)[2964]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts