May 31 17:50:32 openvpn[3488]: VERIFY OK: depth=1, C=SE, ST=Stockholm, L=Stockholm, O=octopus, OU=octopus xxxx@xxxxx.se, CN=octopus CA, name=EasyRSA, emailAddress=xxx@xxxxx.se
May 31 17:50:32 openvpn[3488]: VERIFY KU OK
May 31 17:50:32 openvpn[3488]: Validating certificate extended key usage
May 31 17:50:32 openvpn[3488]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
May 31 17:50:32 openvpn[3488]: VERIFY EKU OK
May 31 17:50:32 openvpn[3488]: VERIFY OK: depth=0, C=SE, ST=Stockholm, L=Stockholm, O=octopus, OU=octopus xxxx@xxxxx.se, CN=octopus, name=EasyRSA, emailAddress=xxxx@xxxxx.se
May 31 17:50:32 openvpn[3488]: Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
May 31 17:50:32 openvpn[3488]: Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
May 31 17:50:32 openvpn[3488]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 1024 bit RSA