VPN keeps restarting

I’m having issues connecting to the vpn it keeps restarting every few seconds. I’m currently using TCP 443 to connect and it doesn’t seem to work. Below I have put a snipped of the log. I’m also experiencing the same issue with the hackthebox arena vpn. Any help is appreciated

2021-05-05 07:49:42 Restart pause, 5 second(s)
2021-05-05 07:49:47 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:49:47 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:49:47 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:49:47 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:49:47 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.58.77:443
2021-05-05 07:49:47 Socket Buffers: R=[131072->131072] S=[16384->16384]
2021-05-05 07:49:47 Attempting to establish TCP connection with [AF_INET]23.106.58.77:443 [nonblock]
2021-05-05 07:49:47 TCP connection established with [AF_INET]23.106.58.77:443
2021-05-05 07:49:47 TCP_CLIENT link local: (not bound)
2021-05-05 07:49:47 TCP_CLIENT link remote: [AF_INET]23.106.58.77:443
2021-05-05 07:49:47 TLS: Initial packet from [AF_INET]23.106.58.77:443, sid=c806e6b3 af1d387a
2021-05-05 07:49:47 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:49:47 VERIFY KU OK
2021-05-05 07:49:47 Validating certificate extended key usage
2021-05-05 07:49:47 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2021-05-05 07:49:47 VERIFY EKU OK
2021-05-05 07:49:47 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:49:48 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2021-05-05 07:49:48 [htb] Peer Connection Initiated with [AF_INET]23.106.58.77:443
2021-05-05 07:49:48 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1059/64 dead:beef:4::1,ifconfig 10.10.16.91 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2021-05-05 07:49:48 OPTIONS IMPORT: timers and/or timeouts modified
2021-05-05 07:49:48 OPTIONS IMPORT: --ifconfig/up options modified
2021-05-05 07:49:48 OPTIONS IMPORT: route options modified
2021-05-05 07:49:48 OPTIONS IMPORT: route-related options modified
2021-05-05 07:49:48 OPTIONS IMPORT: peer-id set
2021-05-05 07:49:48 OPTIONS IMPORT: adjusting link_mtu to 1627
2021-05-05 07:49:48 OPTIONS IMPORT: data channel crypto options modified
2021-05-05 07:49:48 Data Channel: using negotiated cipher 'AES-256-GCM'
2021-05-05 07:49:48 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:49:48 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:49:48 Preserving previous TUN/TAP instance: tun1
2021-05-05 07:49:48 Initialization Sequence Completed
2021-05-05 07:49:53 Connection reset, restarting [0]
2021-05-05 07:49:53 SIGUSR1[soft,connection-reset] received, process restarting
2021-05-05 07:49:53 Restart pause, 5 second(s)
2021-05-05 07:49:58 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:49:58 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:49:58 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:49:58 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:49:58 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.58.77:443
2021-05-05 07:49:58 Socket Buffers: R=[131072->131072] S=[16384->16384]
2021-05-05 07:49:58 Attempting to establish TCP connection with [AF_INET]23.106.58.77:443 [nonblock]
2021-05-05 07:49:58 TCP connection established with [AF_INET]23.106.58.77:443
2021-05-05 07:49:58 TCP_CLIENT link local: (not bound)
2021-05-05 07:49:58 TCP_CLIENT link remote: [AF_INET]23.106.58.77:443
2021-05-05 07:49:58 TLS: Initial packet from [AF_INET]23.106.58.77:443, sid=e3bff5d0 4cd018e3
2021-05-05 07:49:58 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:49:58 VERIFY KU OK
2021-05-05 07:49:58 Validating certificate extended key usage
2021-05-05 07:49:58 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2021-05-05 07:49:58 VERIFY EKU OK
2021-05-05 07:49:58 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:49:58 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2021-05-05 07:49:58 [htb] Peer Connection Initiated with [AF_INET]23.106.58.77:443
2021-05-05 07:49:58 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1059/64 dead:beef:4::1,ifconfig 10.10.16.91 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2021-05-05 07:49:58 OPTIONS IMPORT: timers and/or timeouts modified
2021-05-05 07:49:58 OPTIONS IMPORT: --ifconfig/up options modified
2021-05-05 07:49:58 OPTIONS IMPORT: route options modified
2021-05-05 07:49:58 OPTIONS IMPORT: route-related options modified
2021-05-05 07:49:58 OPTIONS IMPORT: peer-id set
2021-05-05 07:49:58 OPTIONS IMPORT: adjusting link_mtu to 1627
2021-05-05 07:49:58 OPTIONS IMPORT: data channel crypto options modified
2021-05-05 07:49:58 Data Channel: using negotiated cipher 'AES-256-GCM'
2021-05-05 07:49:58 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:49:58 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:49:58 Preserving previous TUN/TAP instance: tun1
2021-05-05 07:49:58 Initialization Sequence Completed
2021-05-05 07:50:03 Connection reset, restarting [0]
2021-05-05 07:50:03 SIGUSR1[soft,connection-reset] received, process restarting
2021-05-05 07:50:03 Restart pause, 5 second(s)
2021-05-05 07:50:08 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:08 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:08 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:08 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:08 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.58.77:443
2021-05-05 07:50:08 Socket Buffers: R=[131072->131072] S=[16384->16384]
2021-05-05 07:50:08 Attempting to establish TCP connection with [AF_INET]23.106.58.77:443 [nonblock]
2021-05-05 07:50:08 TCP connection established with [AF_INET]23.106.58.77:443
2021-05-05 07:50:08 TCP_CLIENT link local: (not bound)
2021-05-05 07:50:08 TCP_CLIENT link remote: [AF_INET]23.106.58.77:443
2021-05-05 07:50:08 TLS: Initial packet from [AF_INET]23.106.58.77:443, sid=94f684f5 09a7fc47
2021-05-05 07:50:08 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:08 VERIFY KU OK
2021-05-05 07:50:08 Validating certificate extended key usage
2021-05-05 07:50:08 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2021-05-05 07:50:08 VERIFY EKU OK
2021-05-05 07:50:08 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:08 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2021-05-05 07:50:08 [htb] Peer Connection Initiated with [AF_INET]23.106.58.77:443
2021-05-05 07:50:08 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1059/64 dead:beef:4::1,ifconfig 10.10.16.91 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2021-05-05 07:50:08 OPTIONS IMPORT: timers and/or timeouts modified
2021-05-05 07:50:08 OPTIONS IMPORT: --ifconfig/up options modified
2021-05-05 07:50:08 OPTIONS IMPORT: route options modified
2021-05-05 07:50:08 OPTIONS IMPORT: route-related options modified
2021-05-05 07:50:08 OPTIONS IMPORT: peer-id set
2021-05-05 07:50:08 OPTIONS IMPORT: adjusting link_mtu to 1627
2021-05-05 07:50:08 OPTIONS IMPORT: data channel crypto options modified
2021-05-05 07:50:08 Data Channel: using negotiated cipher 'AES-256-GCM'
2021-05-05 07:50:08 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:08 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:08 Preserving previous TUN/TAP instance: tun1
2021-05-05 07:50:08 Initialization Sequence Completed
2021-05-05 07:50:14 Connection reset, restarting [0]
2021-05-05 07:50:14 SIGUSR1[soft,connection-reset] received, process restarting
2021-05-05 07:50:14 Restart pause, 5 second(s)
2021-05-05 07:50:19 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:19 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:19 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:19 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:19 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.58.77:443
2021-05-05 07:50:19 Socket Buffers: R=[131072->131072] S=[16384->16384]
2021-05-05 07:50:19 Attempting to establish TCP connection with [AF_INET]23.106.58.77:443 [nonblock]
2021-05-05 07:50:19 TCP connection established with [AF_INET]23.106.58.77:443
2021-05-05 07:50:19 TCP_CLIENT link local: (not bound)
2021-05-05 07:50:19 TCP_CLIENT link remote: [AF_INET]23.106.58.77:443
2021-05-05 07:50:19 TLS: Initial packet from [AF_INET]23.106.58.77:443, sid=92523377 417f4d54
2021-05-05 07:50:19 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:19 VERIFY KU OK
2021-05-05 07:50:19 Validating certificate extended key usage
2021-05-05 07:50:19 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2021-05-05 07:50:19 VERIFY EKU OK
2021-05-05 07:50:19 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:19 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2021-05-05 07:50:19 [htb] Peer Connection Initiated with [AF_INET]23.106.58.77:443
2021-05-05 07:50:19 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1059/64 dead:beef:4::1,ifconfig 10.10.16.91 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2021-05-05 07:50:19 OPTIONS IMPORT: timers and/or timeouts modified
2021-05-05 07:50:19 OPTIONS IMPORT: --ifconfig/up options modified
2021-05-05 07:50:19 OPTIONS IMPORT: route options modified
2021-05-05 07:50:19 OPTIONS IMPORT: route-related options modified
2021-05-05 07:50:19 OPTIONS IMPORT: peer-id set
2021-05-05 07:50:19 OPTIONS IMPORT: adjusting link_mtu to 1627
2021-05-05 07:50:19 OPTIONS IMPORT: data channel crypto options modified
2021-05-05 07:50:19 Data Channel: using negotiated cipher 'AES-256-GCM'
2021-05-05 07:50:19 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:19 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:19 Preserving previous TUN/TAP instance: tun1
2021-05-05 07:50:19 Initialization Sequence Completed
2021-05-05 07:50:24 Connection reset, restarting [0]
2021-05-05 07:50:24 SIGUSR1[soft,connection-reset] received, process restarting
2021-05-05 07:50:24 Restart pause, 5 second(s)
2021-05-05 07:50:29 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:29 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:29 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:29 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:29 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.58.77:443
2021-05-05 07:50:29 Socket Buffers: R=[131072->131072] S=[16384->16384]
2021-05-05 07:50:29 Attempting to establish TCP connection with [AF_INET]23.106.58.77:443 [nonblock]
2021-05-05 07:50:29 TCP connection established with [AF_INET]23.106.58.77:443
2021-05-05 07:50:29 TCP_CLIENT link local: (not bound)
2021-05-05 07:50:29 TCP_CLIENT link remote: [AF_INET]23.106.58.77:443
2021-05-05 07:50:29 TLS: Initial packet from [AF_INET]23.106.58.77:443, sid=0c8fad8b 003e9bc6
2021-05-05 07:50:29 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:29 VERIFY KU OK
2021-05-05 07:50:29 Validating certificate extended key usage
2021-05-05 07:50:29 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2021-05-05 07:50:29 VERIFY EKU OK
2021-05-05 07:50:29 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:29 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2021-05-05 07:50:29 [htb] Peer Connection Initiated with [AF_INET]23.106.58.77:443
2021-05-05 07:50:29 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1059/64 dead:beef:4::1,ifconfig 10.10.16.91 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2021-05-05 07:50:29 OPTIONS IMPORT: timers and/or timeouts modified
2021-05-05 07:50:29 OPTIONS IMPORT: --ifconfig/up options modified
2021-05-05 07:50:29 OPTIONS IMPORT: route options modified
2021-05-05 07:50:29 OPTIONS IMPORT: route-related options modified
2021-05-05 07:50:29 OPTIONS IMPORT: peer-id set
2021-05-05 07:50:29 OPTIONS IMPORT: adjusting link_mtu to 1627
2021-05-05 07:50:29 OPTIONS IMPORT: data channel crypto options modified
2021-05-05 07:50:29 Data Channel: using negotiated cipher 'AES-256-GCM'
2021-05-05 07:50:29 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:29 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:29 Preserving previous TUN/TAP instance: tun1
2021-05-05 07:50:29 Initialization Sequence Completed
2021-05-05 07:50:35 Connection reset, restarting [0]
2021-05-05 07:50:35 SIGUSR1[soft,connection-reset] received, process restarting
2021-05-05 07:50:35 Restart pause, 5 second(s)
2021-05-05 07:50:40 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:40 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:40 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:40 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:40 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.58.77:443
2021-05-05 07:50:40 Socket Buffers: R=[131072->131072] S=[16384->16384]
2021-05-05 07:50:40 Attempting to establish TCP connection with [AF_INET]23.106.58.77:443 [nonblock]
2021-05-05 07:50:40 TCP connection established with [AF_INET]23.106.58.77:443
2021-05-05 07:50:40 TCP_CLIENT link local: (not bound)
2021-05-05 07:50:40 TCP_CLIENT link remote: [AF_INET]23.106.58.77:443
2021-05-05 07:50:40 TLS: Initial packet from [AF_INET]23.106.58.77:443, sid=6f28769b d14ed9c1
2021-05-05 07:50:40 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:40 VERIFY KU OK
2021-05-05 07:50:40 Validating certificate extended key usage
2021-05-05 07:50:40 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2021-05-05 07:50:40 VERIFY EKU OK
2021-05-05 07:50:40 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:40 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2021-05-05 07:50:40 [htb] Peer Connection Initiated with [AF_INET]23.106.58.77:443
2021-05-05 07:50:40 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1059/64 dead:beef:4::1,ifconfig 10.10.16.91 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2021-05-05 07:50:40 OPTIONS IMPORT: timers and/or timeouts modified
2021-05-05 07:50:40 OPTIONS IMPORT: --ifconfig/up options modified
2021-05-05 07:50:40 OPTIONS IMPORT: route options modified
2021-05-05 07:50:40 OPTIONS IMPORT: route-related options modified
2021-05-05 07:50:40 OPTIONS IMPORT: peer-id set
2021-05-05 07:50:40 OPTIONS IMPORT: adjusting link_mtu to 1627
2021-05-05 07:50:40 OPTIONS IMPORT: data channel crypto options modified
2021-05-05 07:50:40 Data Channel: using negotiated cipher 'AES-256-GCM'
2021-05-05 07:50:40 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:40 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:40 Preserving previous TUN/TAP instance: tun1
2021-05-05 07:50:40 Initialization Sequence Completed
2021-05-05 07:50:45 Connection reset, restarting [0]
2021-05-05 07:50:45 SIGUSR1[soft,connection-reset] received, process restarting
2021-05-05 07:50:45 Restart pause, 5 second(s)
2021-05-05 07:50:50 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:50 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:50 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:50:50 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:50:50 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.58.77:443
2021-05-05 07:50:50 Socket Buffers: R=[131072->131072] S=[16384->16384]
2021-05-05 07:50:50 Attempting to establish TCP connection with [AF_INET]23.106.58.77:443 [nonblock]
2021-05-05 07:50:50 TCP connection established with [AF_INET]23.106.58.77:443
2021-05-05 07:50:50 TCP_CLIENT link local: (not bound)
2021-05-05 07:50:50 TCP_CLIENT link remote: [AF_INET]23.106.58.77:443
2021-05-05 07:50:50 TLS: Initial packet from [AF_INET]23.106.58.77:443, sid=bf213616 956b5144
2021-05-05 07:50:50 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:50 VERIFY KU OK
2021-05-05 07:50:50 Validating certificate extended key usage
2021-05-05 07:50:50 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2021-05-05 07:50:50 VERIFY EKU OK
2021-05-05 07:50:50 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:50:50 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2021-05-05 07:50:50 [htb] Peer Connection Initiated with [AF_INET]23.106.58.77:443
2021-05-05 07:50:50 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1059/64 dead:beef:4::1,ifconfig 10.10.16.91 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2021-05-05 07:50:50 OPTIONS IMPORT: timers and/or timeouts modified
2021-05-05 07:50:50 OPTIONS IMPORT: --ifconfig/up options modified
2021-05-05 07:50:50 OPTIONS IMPORT: route options modified
2021-05-05 07:50:50 OPTIONS IMPORT: route-related options modified
2021-05-05 07:50:50 OPTIONS IMPORT: peer-id set
2021-05-05 07:50:50 OPTIONS IMPORT: adjusting link_mtu to 1627
2021-05-05 07:50:50 OPTIONS IMPORT: data channel crypto options modified
2021-05-05 07:50:50 Data Channel: using negotiated cipher 'AES-256-GCM'
2021-05-05 07:50:50 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:50 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:50:50 Preserving previous TUN/TAP instance: tun1
2021-05-05 07:50:50 Initialization Sequence Completed
2021-05-05 07:50:55 Connection reset, restarting [0]
2021-05-05 07:50:55 SIGUSR1[soft,connection-reset] received, process restarting
2021-05-05 07:50:55 Restart pause, 5 second(s)
2021-05-05 07:51:00 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:51:00 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:51:00 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:51:00 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:51:00 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.58.77:443
2021-05-05 07:51:00 Socket Buffers: R=[131072->131072] S=[16384->16384]
2021-05-05 07:51:00 Attempting to establish TCP connection with [AF_INET]23.106.58.77:443 [nonblock]
2021-05-05 07:51:00 TCP connection established with [AF_INET]23.106.58.77:443
2021-05-05 07:51:00 TCP_CLIENT link local: (not bound)
2021-05-05 07:51:00 TCP_CLIENT link remote: [AF_INET]23.106.58.77:443
2021-05-05 07:51:00 TLS: Initial packet from [AF_INET]23.106.58.77:443, sid=3ecdf23e 291fa349
2021-05-05 07:51:01 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:51:01 VERIFY KU OK
2021-05-05 07:51:01 Validating certificate extended key usage
2021-05-05 07:51:01 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2021-05-05 07:51:01 VERIFY EKU OK
2021-05-05 07:51:01 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:51:01 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2021-05-05 07:51:01 [htb] Peer Connection Initiated with [AF_INET]23.106.58.77:443
2021-05-05 07:51:01 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1059/64 dead:beef:4::1,ifconfig 10.10.16.91 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2021-05-05 07:51:01 OPTIONS IMPORT: timers and/or timeouts modified
2021-05-05 07:51:01 OPTIONS IMPORT: --ifconfig/up options modified
2021-05-05 07:51:01 OPTIONS IMPORT: route options modified
2021-05-05 07:51:01 OPTIONS IMPORT: route-related options modified
2021-05-05 07:51:01 OPTIONS IMPORT: peer-id set
2021-05-05 07:51:01 OPTIONS IMPORT: adjusting link_mtu to 1627
2021-05-05 07:51:01 OPTIONS IMPORT: data channel crypto options modified
2021-05-05 07:51:01 Data Channel: using negotiated cipher 'AES-256-GCM'
2021-05-05 07:51:01 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:51:01 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:51:01 Preserving previous TUN/TAP instance: tun1
2021-05-05 07:51:01 Initialization Sequence Completed
2021-05-05 07:51:06 Connection reset, restarting [0]
2021-05-05 07:51:06 SIGUSR1[soft,connection-reset] received, process restarting
2021-05-05 07:51:06 Restart pause, 5 second(s)
q2021-05-05 07:51:11 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:51:11 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:51:11 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2021-05-05 07:51:11 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2021-05-05 07:51:11 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.58.77:443
2021-05-05 07:51:11 Socket Buffers: R=[131072->131072] S=[16384->16384]
2021-05-05 07:51:11 Attempting to establish TCP connection with [AF_INET]23.106.58.77:443 [nonblock]
2021-05-05 07:51:11 TCP connection established with [AF_INET]23.106.58.77:443
2021-05-05 07:51:11 TCP_CLIENT link local: (not bound)
2021-05-05 07:51:11 TCP_CLIENT link remote: [AF_INET]23.106.58.77:443
2021-05-05 07:51:11 TLS: Initial packet from [AF_INET]23.106.58.77:443, sid=022c4743 6e2b70a2
2021-05-05 07:51:11 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:51:11 VERIFY KU OK
2021-05-05 07:51:11 Validating certificate extended key usage
2021-05-05 07:51:11 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2021-05-05 07:51:11 VERIFY EKU OK
2021-05-05 07:51:11 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2021-05-05 07:51:11 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2021-05-05 07:51:11 [htb] Peer Connection Initiated with [AF_INET]23.106.58.77:443
2021-05-05 07:51:11 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.255.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.16.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:4::1059/64 dead:beef:4::1,ifconfig 10.10.16.91 255.255.254.0,peer-id 0,cipher AES-256-GCM'
2021-05-05 07:51:11 OPTIONS IMPORT: timers and/or timeouts modified
2021-05-05 07:51:11 OPTIONS IMPORT: --ifconfig/up options modified
2021-05-05 07:51:11 OPTIONS IMPORT: route options modified
2021-05-05 07:51:11 OPTIONS IMPORT: route-related options modified
2021-05-05 07:51:11 OPTIONS IMPORT: peer-id set
2021-05-05 07:51:11 OPTIONS IMPORT: adjusting link_mtu to 1627
2021-05-05 07:51:11 OPTIONS IMPORT: data channel crypto options modified
2021-05-05 07:51:11 Data Channel: using negotiated cipher 'AES-256-GCM'
2021-05-05 07:51:11 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:51:11 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2021-05-05 07:51:11 Preserving previous TUN/TAP instance: tun1
2021-05-05 07:51:11 Initialization Sequence Completed
^C2021-05-05 07:51:11 event_wait : Interrupted system call (code=4)
2021-05-05 07:51:11 net_route_v4_del: 10.10.10.0/24 via 10.10.16.1 dev [NULL] table 0 metric -1
2021-05-05 07:51:11 delete_route_ipv6(dead:beef::/64)
2021-05-05 07:51:11 net_route_v6_del: dead:beef::/64 via :: dev tun1 table 0 metric -1
2021-05-05 07:51:11 Closing TUN/TAP interface
2021-05-05 07:51:11 net_addr_v4_del: 10.10.16.91 dev tun1
2021-05-05 07:51:11 net_addr_v6_del: dead:beef:4::1059/64 dev tun1
2021-05-05 07:51:11 SIGINT[hard,] received, process exiting

This has happened to me a few times before. I’m able to resolve it by connecting to a different VPN server. For example switching to a EU server if the connection to the US server keeps restarting.