I just upgraded to this build and now my OpenVPN client wont connect --- I changed nothing & this is now what i'm getting.. Any help?
Jun 1 18:19:34 ovpn-client1[31350]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jun 1 18:19:34 ovpn-client1[31350]: VERIFY EKU OK
Jun 1 18:19:34 ovpn-client1[31350]: VERIFY OK: depth=0, C=SK, ST=Bratislava, L=Bratislava, O=Tiger At Work & Co. k. s., OU=tigerVPN, CN=tigervpn.com, name=tigerVPN, emailAddress=
help@tigervpn.com
Jun 1 18:19:34 ovpn-client1[31350]: UDP WRITE [152] to [AF_INET]162.250.2.18:1194: P_CONTROL_V1 kid=0 [ 3 ] pid=2 DATA len=126
Jun 1 18:19:34 ovpn-client1[31350]: UDP READ [77] from [AF_INET]162.250.2.18:1194: P_CONTROL_V1 kid=0 [ 2 ] pid=4 DATA len=51
Jun 1 18:19:34 ovpn-client1[31350]: UDP WRITE [529] to [AF_INET]162.250.2.18:1194: P_CONTROL_V1 kid=0 [ 4 ] pid=3 DATA len=503
Jun 1 18:19:34 ovpn-client1[31350]: UDP READ [261] from [AF_INET]162.250.2.18:1194: P_CONTROL_V1 kid=0 [ 3 ] pid=5 DATA len=235
Jun 1 18:19:34 ovpn-client1[31350]: UDP WRITE [22] to [AF_INET]162.250.2.18:1194: P_ACK_V1 kid=0 [ 5 ]
Jun 1 18:19:34 ovpn-client1[31350]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA1
Jun 1 18:19:34 ovpn-client1[31350]: [tigervpn.com] Peer Connection Initiated with [AF_INET]162.250.2.18:1194
Jun 1 18:19:35 ovpn-client1[31350]: SENT CONTROL [tigervpn.com]: 'PUSH_REQUEST' (status=1)
Jun 1 18:19:35 ovpn-client1[31350]: UDP WRITE [56] to [AF_INET]162.250.2.18:1194: P_CONTROL_V1 kid=0 [ ] pid=4 DATA len=42
Jun 1 18:19:35 ovpn-client1[31350]: UDP READ [22] from [AF_INET]162.250.2.18:1194: P_ACK_V1 kid=0 [ 4 ]
Jun 1 18:19:35 ovpn-client1[31350]: UDP READ [86] from [AF_INET]162.250.2.18:1194: P_CONTROL_V1 kid=0 [ ] pid=6 DATA len=72
Jun 1 18:19:35 ovpn-client1[31350]: AUTH: Received control message: AUTH_FAILED,Username or password incorrect