openvpn --script-security 2 --config openvpn.conf
Sun Apr 27 23:21:19 2014 OpenVPN 2.2.1 i486-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Jun 19 2013
Sun Apr 27 23:21:19 2014 WARNING: file 'passwort.txt' is group or others accessible
Sun Apr 27 23:21:19 2014 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Apr 27 23:21:19 2014 LZO compression initialized
Sun Apr 27 23:21:19 2014 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Sun Apr 27 23:21:19 2014 Socket Buffers: R=[163840->131072] S=[163840->131072]
Sun Apr 27 23:21:19 2014 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Sun Apr 27 23:21:19 2014 Local Options hash (VER=V4): '41690919'
Sun Apr 27 23:21:19 2014 Expected Remote Options hash (VER=V4): '530fdded'
Sun Apr 27 23:21:19 2014 UDPv4 link local: [undef]
Sun Apr 27 23:21:19 2014 UDPv4 link remote: [AF_INET]212.7.192.244:1194
Sun Apr 27 23:21:19 2014 TLS: Initial packet from [AF_INET]212.7.192.244:1194, sid=051cd1f5 4132b226
Sun Apr 27 23:21:19 2014 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Apr 27 23:21:19 2014 VERIFY OK: depth=1, /C=NV/ST=NV/L=nVPN/O=nVpn/CN=nVpn_CA/emailAddress=support@nvpn.net
Sun Apr 27 23:21:19 2014 VERIFY OK: nsCertType=SERVER
Sun Apr 27 23:21:19 2014 VERIFY OK: depth=0, /C=NV/ST=NV/L=nVPN/O=nVpn/CN=server/emailAddress=support@nvpn.net
Sun Apr 27 23:21:20 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Apr 27 23:21:20 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Apr 27 23:21:20 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Apr 27 23:21:20 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Apr 27 23:21:20 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sun Apr 27 23:21:20 2014 [server] Peer Connection Initiated with [AF_INET]212.7.192.244:1194
^[[ASun Apr 27 23:21:22 2014 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun Apr 27 23:21:22 2014 AUTH: Received AUTH_FAILED control message
Sun Apr 27 23:21:22 2014 TCP/UDP: Closing socket
Sun Apr 27 23:21:22 2014 SIGTERM[soft,auth-failure] received, process exiting