OpenVPN Windows/Linux Client not working after update 188

After update to 188 could not connect to OpenVPN. Fully recreate host-to-net vpn ( roadwarrior) and download Client Package. Try to use it on my main Fedora40 ( and beta Fedora41) systems and my reserve Windows11 system. Same result with new roadwarrior as i have with old one. Here is log from Windows11. ( Fedora’s Error messages looks same):
[Aug 1, 2024, 10:56:53] OpenVPN core 3.10_qa win x86_64 64-bit OVPN-DCO built on Jul 17 2024 14:22:15
⏎[Aug 1, 2024, 10:56:53] Frame=512/2112/512 mssfix-ctrl=1250
⏎[Aug 1, 2024, 10:56:53] NOTE: This configuration contains options that were not used:
⏎[Aug 1, 2024, 10:56:53] Option allowed only to be pushed by the server
⏎[Aug 1, 2024, 10:56:53] 0 [auth-token-user] [USER]
⏎[Aug 1, 2024, 10:56:53] 1 [auth-token] [TOTP]
⏎[Aug 1, 2024, 10:56:53] Unsupported option (ignored)
⏎[Aug 1, 2024, 10:56:53] 0 [auth-retry] [interact]
⏎[Aug 1, 2024, 10:56:53] EVENT: UNUSED_OPTIONS_ERROR Option allowed only to be pushed by the server: auth-token-user,auth-token
Unsupported option (ignored): auth-retry
⏎[Sep 20, 2024, 23:21:57] OpenVPN core 3.10_qa win x86_64 64-bit OVPN-DCO built on Jul 17 2024 14:22:15
⏎[Sep 20, 2024, 23:21:57] Frame=512/2112/512 mssfix-ctrl=1250
⏎[Sep 20, 2024, 23:21:57] NOTE: This configuration contains options that were not used:
⏎[Sep 20, 2024, 23:21:57] Unsupported option (ignored)
⏎[Sep 20, 2024, 23:21:57] 0 [auth-retry] [interact]
⏎[Sep 20, 2024, 23:21:57] EVENT: RESOLVE ⏎[Sep 20, 2024, 23:21:57] Contacting 46.252.240.35:1194 via UDP
⏎[Sep 20, 2024, 23:21:57] EVENT: WAIT ⏎[Sep 20, 2024, 23:21:57] WinCommandAgent: transmitting bypass route to 46.252.240.35
{
“host” : “46.252.240.35”,
“ipv6” : false
}

⏎[Sep 20, 2024, 23:21:57] Connecting to [46.252.240.35]:1194 (46.252.240.35) via UDP
⏎[Sep 20, 2024, 23:21:57] EVENT: CONNECTING ⏎[Sep 20, 2024, 23:21:57] Tunnel Options:V4,dev-type tun,link-mtu 1421,tun-mtu 1400,proto UDPv4,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client
⏎[Sep 20, 2024, 23:21:57] Creds: UsernameEmpty/PasswordEmpty
⏎[Sep 20, 2024, 23:21:57] Sending Peer Info:
IV_VER=3.10_qa
IV_PLAT=win
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2974
IV_MTU=1600
IV_CIPHERS=AES-128-CBC:AES-192-CBC:AES-256-CBC:AES-128-GCM:AES-192-GCM:AES-256-GCM:CHACHA20-POLY1305
IV_AUTO_SESS=1
IV_GUI_VER=OCWindows_3.5.0-3818
IV_SSO=webauth,crtext

⏎[Sep 20, 2024, 23:21:57] SSL Handshake: peer certificate: CN=ip-219.108.104.89.net.unnet.ru, 2048 bit RSA, cipher: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD

⏎[Sep 20, 2024, 23:21:57] Session is ACTIVE
⏎[Sep 20, 2024, 23:21:57] EVENT: GET_CONFIG ⏎[Sep 20, 2024, 23:21:57] Sending PUSH_REQUEST to server…
⏎[Sep 20, 2024, 23:21:57] AUTH_FAILED
⏎[Sep 20, 2024, 23:21:57] EVENT: AUTH_FAILED ⏎[Sep 20, 2024, 23:21:57] EVENT: DISCONNECTED ⏎[Sep 20, 2024, 23:22:04] OpenVPN core 3.10_qa win x86_64 64-bit OVPN-DCO built on Jul 17 2024 14:22:15

Additional info: journalctl on Fedora client show those messages:
NOTE: the current --script-security setting may allow this configuration to>
2]: TCP/UDP: Preserving recently used remote address: [AF_INET]46.252.240.35:11>
2]: UDPv4 link local: (not bound)
2]: UDPv4 link remote: [AF_INET]46.252.240.35:1194
2]: VERIFY ERROR: depth=1, error=self-signed certificate in certificate chain: >
2]: OpenSSL: error:0A000086:SSL routines::certificate verify failed:
2]: TLS_ERROR: BIO read tls_read_plaintext error
2]: TLS Error: TLS object → incoming plaintext read error
2]: TLS Error: TLS handshake failed
2]: SIGUSR1[soft,tls-error] received, process restarting

:thinking:
When you created the Host-to-Net connection again, the error described in the following topic did not occur?

No. I have not such type of problem. However I get Internal Server Error for Logs->OpenVPN Roadwarrior Connections Logs. But in Logs->System Logs->OpenVPN I found:
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 TLS: Initial packet from [AF_INET]178.71.174.161:60388, sid =f39aaa42 bdab96f9
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 VERIFY SCRIPT OK: depth=1, C=RU, ST=St.Petersburg, L=St.Pet ersburg, O=UNIX Education Center, OU=Training, CN=UNIX Education Center CA, emai lAddress=ran@unix-edu.ru
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 VERIFY OK: depth=1, C=RU, ST=St.Petersburg, L=St.Petersburg , O=UNIX Education Center, OU=Training, CN=UNIX Education Center CA, emailAddres s=ran@unix-edu.ru
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 VERIFY SCRIPT OK: depth=0, C=RU, ST=St.Petersburg, O=UNIX E ducation Center, CN=ran
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 VERIFY OK: depth=0, C=RU, ST=St.Petersburg, O=UNIX Educatio n Center, CN=ran
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_VER=2.6.12
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_PLAT=linux
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_TCPNL=1
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_MTU=1600
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_NCP=2
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY 1305
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_PROTO=990
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_LZO_STUB=1
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_COMP_STUB=1
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 peer info: IV_COMP_STUBv2=1
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 TLS: Username/Password authentication deferred for username ‘Q!_’
07:57:11 openvpnserver[2345]: MANAGEMENT: CMD ‘client-auth-nt 0 0’
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SH A384, peer certificate: 4096 bit RSA, signature: RSA-SHA256
07:57:11 openvpnserver[2345]: 178.71.174.161:60388 [ran] Peer Connection Initiated with [AF_INET]178.71.174.16 1:60388
07:57:11 openvpnserver[2345]: ran/178.71.174.161:60388 MULTI_sva: pool returned IPv4=172.20.20.6, IPv6=(Not en abled)
07:57:11 openvpnserver[2345]: ran/178.71.174.161:60388 OPTIONS IMPORT: reading client specific options from: / var/ipfire/ovpn/ccd/ran
07:57:11 openvpnserver[2345]: ran/178.71.174.161:60388 WARNING: Failed running command (–client-connect): ext ernal program exited with error status: 1
07:57:11 openvpnserver[2345]: ran/178.71.174.161:60388 WARNING: Failed running command (–client-disconnect): external program exited with error status: 1
07:57:12 openvpnserver[2345]: ran/178.71.174.161:60388 PUSH: Received control message: ‘PUSH_REQUEST’
07:57:12 openvpnserver[2345]: ran/178.71.174.161:60388 Delayed exit in 5 seconds
07:57:12 openvpnserver[2345]: ran/178.71.174.161:60388 SENT CONTROL [ran]: