swever@k8s-master:~/openvpn-client$ sudo openvpn --config vpn-cr.ovpn Fri May 8 09:45:22 2020 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2019 Fri May 8 09:45:22 2020 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.08 Fri May 8 09:45:22 2020 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication Fri May 8 09:45:22 2020 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication Fri May 8 09:45:22 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]112.220.105.114:1194 Fri May 8 09:45:22 2020 Socket Buffers: R=[212992->212992] S=[212992->212992] Fri May 8 09:45:22 2020 UDP link local: (not bound) Fri May 8 09:45:22 2020 UDP link remote: [AF_INET]112.220.105.114:1194 Fri May 8 09:45:22 2020 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay Fri May 8 09:45:22 2020 TLS: Initial packet from [AF_INET]112.220.105.114:1194, sid=330b7563 a09d2804 Fri May 8 09:45:25 2020 VERIFY OK: depth=1, CN=Easy-RSA CA Fri May 8 09:45:25 2020 VERIFY KU OK Fri May 8 09:45:25 2020 Validating certificate extended key usage Fri May 8 09:45:25 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Fri May 8 09:45:25 2020 VERIFY EKU OK Fri May 8 09:45:25 2020 VERIFY OK: depth=0, CN=vpn-host Fri May 8 09:45:25 2020 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA Fri May 8 09:45:25 2020 [vpn-host] Peer Connection Initiated with [AF_INET]112.220.105.114:1194 Fri May 8 09:45:26 2020 SENT CONTROL [vpn-host]: 'PUSH_REQUEST' (status=1) Fri May 8 09:45:26 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5,peer-id 0,cipher AES-256-GCM' Fri May 8 09:45:26 2020 OPTIONS IMPORT: timers and/or timeouts modified Fri May 8 09:45:26 2020 OPTIONS IMPORT: --ifconfig/up options modified Fri May 8 09:45:26 2020 OPTIONS IMPORT: route options modified Fri May 8 09:45:26 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Fri May 8 09:45:26 2020 OPTIONS IMPORT: peer-id set Fri May 8 09:45:26 2020 OPTIONS IMPORT: adjusting link_mtu to 1624 Fri May 8 09:45:26 2020 OPTIONS IMPORT: data channel crypto options modified Fri May 8 09:45:26 2020 Data Channel: using negotiated cipher 'AES-256-GCM' Fri May 8 09:45:26 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Fri May 8 09:45:26 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Fri May 8 09:45:26 2020 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=enp5s0 HWADDR=78:d0:04:25:9e:bd Fri May 8 09:45:26 2020 TUN/TAP device tun0 opened Fri May 8 09:45:26 2020 TUN/TAP TX queue length set to 100 Fri May 8 09:45:26 2020 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Fri May 8 09:45:26 2020 /sbin/ip link set dev tun0 up mtu 1500 Fri May 8 09:45:26 2020 /sbin/ip addr add dev tun0 local 10.8.0.6 peer 10.8.0.5 Fri May 8 09:45:26 2020 /sbin/ip route add 112.220.105.114/32 via 192.168.1.1 Fri May 8 09:45:26 2020 /sbin/ip route add 0.0.0.0/1 via 10.8.0.5 Fri May 8 09:45:26 2020 /sbin/ip route add 128.0.0.0/1 via 10.8.0.5 Fri May 8 09:45:26 2020 /sbin/ip route add 10.8.0.1/32 via 10.8.0.5 Fri May 8 09:45:26 2020 GID set to nogroup Fri May 8 09:45:26 2020 UID set to nobody Fri May 8 09:45:26 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Fri May 8 09:45:26 2020 Initialization Sequence Completed