1 | 16-11-22 17:21:13 Session is ACTIVE |
---|
2 | 2016-11-22 17:21:13 EVENT: GET_CONFIG |
---|
3 | 2016-11-22 17:21:13 Sending PUSH_REQUEST to server... |
---|
4 | 2016-11-22 17:21:14 OPTIONS: |
---|
5 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
6 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
7 | 2 [comp-lzo] [no] |
---|
8 | 3 [route-gateway] [10.30.0.1] |
---|
9 | 4 [topology] [subnet] |
---|
10 | 5 [ping] [10] |
---|
11 | 6 [ping-restart] [60] |
---|
12 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
13 | |
---|
14 | 2016-11-22 17:21:14 PROTOCOL OPTIONS: |
---|
15 | cipher: AES-256-CBC |
---|
16 | digest: SHA1 |
---|
17 | compress: LZO_STUB |
---|
18 | peer ID: -1 |
---|
19 | 2016-11-22 17:21:14 EVENT: ASSIGN_IP |
---|
20 | 2016-11-22 17:21:14 TunPersist: saving tun context: |
---|
21 | Session Name: 23.88.114.44 |
---|
22 | Layer: OSI_LAYER_3 |
---|
23 | Remote Address: 23.88.114.44 |
---|
24 | Tunnel Addresses: |
---|
25 | 10.30.0.41/16 -> 10.30.0.1 |
---|
26 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
27 | Block IPv6: no |
---|
28 | Add Routes: |
---|
29 | Exclude Routes: |
---|
30 | DNS Servers: |
---|
31 | 10.30.0.1 |
---|
32 | Search Domains: |
---|
33 | |
---|
34 | 2016-11-22 17:21:14 Connected via tun |
---|
35 | 2016-11-22 17:21:14 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
36 | 2016-11-22 17:21:14 LZO-ASYM init swap=0 asym=1 |
---|
37 | 2016-11-22 17:21:14 Comp-stub init swap=0 |
---|
38 | 2016-11-22 17:21:14 SetStatus Connected |
---|
39 | 2016-11-22 17:24:13 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
40 | 2016-11-22 17:24:16 RECONNECT TEST: ReachableViaWiFi |
---|
41 | 2016-11-22 17:24:16 EVENT: PAUSE |
---|
42 | 2016-11-22 17:24:17 RESUME TEST: ReachableViaWiFi |
---|
43 | 2016-11-22 17:24:17 EVENT: RESUME |
---|
44 | 2016-11-22 17:24:17 EVENT: RECONNECTING |
---|
45 | 2016-11-22 17:24:17 Contacting 23.88.114.44:2018 via UDP |
---|
46 | 2016-11-22 17:24:17 EVENT: WAIT |
---|
47 | 2016-11-22 17:24:17 SetTunnelSocket returned 1 |
---|
48 | 2016-11-22 17:24:17 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
49 | 2016-11-22 17:24:17 EVENT: CONNECTING |
---|
50 | 2016-11-22 17:24:17 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
51 | 2016-11-22 17:24:17 Peer Info: |
---|
52 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
53 | IV_VER=3.0.11 |
---|
54 | IV_PLAT=ios |
---|
55 | IV_NCP=2 |
---|
56 | IV_TCPNL=1 |
---|
57 | IV_PROTO=2 |
---|
58 | IV_LZO_STUB=1 |
---|
59 | IV_COMP_STUB=1 |
---|
60 | IV_COMP_STUBv2=1 |
---|
61 | |
---|
62 | 2016-11-22 17:24:17 VERIFY OK: depth=1 |
---|
63 | cert. version : 3 |
---|
64 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
65 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
66 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
67 | issued on : 2014-04-11 10:15:45 |
---|
68 | expires on : 2024-04-08 10:15:45 |
---|
69 | signed using : RSA with SHA1 |
---|
70 | RSA key size : 4096 bits |
---|
71 | basic constraints : CA=true |
---|
72 | |
---|
73 | 2016-11-22 17:24:17 VERIFY OK: depth=0 |
---|
74 | cert. version : 3 |
---|
75 | serial number : 01:0F |
---|
76 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
77 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
78 | issued on : 2016-03-10 08:48:14 |
---|
79 | expires on : 2026-03-08 08:48:14 |
---|
80 | signed using : RSA with SHA1 |
---|
81 | RSA key size : 4096 bits |
---|
82 | basic constraints : CA=false |
---|
83 | cert. type : SSL Server |
---|
84 | key usage : Digital Signature, Key Encipherment |
---|
85 | ext key usage : TLS Web Server Authentication |
---|
86 | |
---|
87 | 2016-11-22 17:24:17 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
88 | 2016-11-22 17:24:18 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
89 | 2016-11-22 17:24:18 Session is ACTIVE |
---|
90 | 2016-11-22 17:24:18 EVENT: GET_CONFIG |
---|
91 | 2016-11-22 17:24:18 Sending PUSH_REQUEST to server... |
---|
92 | 2016-11-22 17:24:19 OPTIONS: |
---|
93 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
94 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
95 | 2 [comp-lzo] [no] |
---|
96 | 3 [route-gateway] [10.30.0.1] |
---|
97 | 4 [topology] [subnet] |
---|
98 | 5 [ping] [10] |
---|
99 | 6 [ping-restart] [60] |
---|
100 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
101 | |
---|
102 | 2016-11-22 17:24:19 PROTOCOL OPTIONS: |
---|
103 | cipher: AES-256-CBC |
---|
104 | digest: SHA1 |
---|
105 | compress: LZO_STUB |
---|
106 | peer ID: -1 |
---|
107 | 2016-11-22 17:24:19 EVENT: ASSIGN_IP |
---|
108 | 2016-11-22 17:24:19 TunPersist: saving tun context: |
---|
109 | Session Name: 23.88.114.44 |
---|
110 | Layer: OSI_LAYER_3 |
---|
111 | Remote Address: 23.88.114.44 |
---|
112 | Tunnel Addresses: |
---|
113 | 10.30.0.41/16 -> 10.30.0.1 |
---|
114 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
115 | Block IPv6: no |
---|
116 | Add Routes: |
---|
117 | Exclude Routes: |
---|
118 | DNS Servers: |
---|
119 | 10.30.0.1 |
---|
120 | Search Domains: |
---|
121 | |
---|
122 | 2016-11-22 17:24:19 Connected via tun |
---|
123 | 2016-11-22 17:24:19 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
124 | 2016-11-22 17:24:19 LZO-ASYM init swap=0 asym=1 |
---|
125 | 2016-11-22 17:24:19 Comp-stub init swap=0 |
---|
126 | 2016-11-22 17:24:19 SetStatus Connected |
---|
127 | 2016-11-22 17:24:20 RECONNECT TEST: ReachableViaWiFi |
---|
128 | 2016-11-22 17:24:20 EVENT: PAUSE |
---|
129 | 2016-11-22 17:24:21 RESUME TEST: ReachableViaWiFi |
---|
130 | 2016-11-22 17:24:21 EVENT: RESUME |
---|
131 | 2016-11-22 17:24:21 EVENT: RECONNECTING |
---|
132 | 2016-11-22 17:24:21 Contacting 23.88.114.44:2018 via UDP |
---|
133 | 2016-11-22 17:24:21 EVENT: WAIT |
---|
134 | 2016-11-22 17:24:21 SetTunnelSocket returned 1 |
---|
135 | 2016-11-22 17:24:21 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
136 | 2016-11-22 17:24:21 EVENT: CONNECTING |
---|
137 | 2016-11-22 17:24:21 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
138 | 2016-11-22 17:24:21 Peer Info: |
---|
139 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
140 | IV_VER=3.0.11 |
---|
141 | IV_PLAT=ios |
---|
142 | IV_NCP=2 |
---|
143 | IV_TCPNL=1 |
---|
144 | IV_PROTO=2 |
---|
145 | IV_LZO_STUB=1 |
---|
146 | IV_COMP_STUB=1 |
---|
147 | IV_COMP_STUBv2=1 |
---|
148 | |
---|
149 | 2016-11-22 17:24:21 VERIFY OK: depth=1 |
---|
150 | cert. version : 3 |
---|
151 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
152 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
153 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
154 | issued on : 2014-04-11 10:15:45 |
---|
155 | expires on : 2024-04-08 10:15:45 |
---|
156 | signed using : RSA with SHA1 |
---|
157 | RSA key size : 4096 bits |
---|
158 | basic constraints : CA=true |
---|
159 | |
---|
160 | 2016-11-22 17:24:21 VERIFY OK: depth=0 |
---|
161 | cert. version : 3 |
---|
162 | serial number : 01:0F |
---|
163 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
164 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
165 | issued on : 2016-03-10 08:48:14 |
---|
166 | expires on : 2026-03-08 08:48:14 |
---|
167 | signed using : RSA with SHA1 |
---|
168 | RSA key size : 4096 bits |
---|
169 | basic constraints : CA=false |
---|
170 | cert. type : SSL Server |
---|
171 | key usage : Digital Signature, Key Encipherment |
---|
172 | ext key usage : TLS Web Server Authentication |
---|
173 | |
---|
174 | 2016-11-22 17:24:23 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
175 | 2016-11-22 17:24:23 Session is ACTIVE |
---|
176 | 2016-11-22 17:24:23 EVENT: GET_CONFIG |
---|
177 | 2016-11-22 17:24:23 Sending PUSH_REQUEST to server... |
---|
178 | 2016-11-22 17:24:24 OPTIONS: |
---|
179 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
180 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
181 | 2 [comp-lzo] [no] |
---|
182 | 3 [route-gateway] [10.30.0.1] |
---|
183 | 4 [topology] [subnet] |
---|
184 | 5 [ping] [10] |
---|
185 | 6 [ping-restart] [60] |
---|
186 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
187 | |
---|
188 | 2016-11-22 17:24:24 PROTOCOL OPTIONS: |
---|
189 | cipher: AES-256-CBC |
---|
190 | digest: SHA1 |
---|
191 | compress: LZO_STUB |
---|
192 | peer ID: -1 |
---|
193 | 2016-11-22 17:24:24 TunPersist: reused tun context |
---|
194 | 2016-11-22 17:24:24 Connected via tun |
---|
195 | 2016-11-22 17:24:24 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
196 | 2016-11-22 17:24:24 LZO-ASYM init swap=0 asym=1 |
---|
197 | 2016-11-22 17:24:24 Comp-stub init swap=0 |
---|
198 | 2016-11-22 17:24:24 SetStatus Connected |
---|
199 | 2016-11-22 17:24:24 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
200 | 2016-11-22 17:24:28 RECONNECT TEST: ReachableViaWiFi |
---|
201 | 2016-11-22 17:24:28 EVENT: PAUSE |
---|
202 | 2016-11-22 17:24:29 RESUME TEST: ReachableViaWiFi |
---|
203 | 2016-11-22 17:24:29 EVENT: RESUME |
---|
204 | 2016-11-22 17:24:29 EVENT: RECONNECTING |
---|
205 | 2016-11-22 17:24:29 Contacting 23.88.114.44:2018 via UDP |
---|
206 | 2016-11-22 17:24:29 EVENT: WAIT |
---|
207 | 2016-11-22 17:24:29 SetTunnelSocket returned 1 |
---|
208 | 2016-11-22 17:24:29 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
209 | 2016-11-22 17:24:29 EVENT: CONNECTING |
---|
210 | 2016-11-22 17:24:29 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
211 | 2016-11-22 17:24:29 Peer Info: |
---|
212 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
213 | IV_VER=3.0.11 |
---|
214 | IV_PLAT=ios |
---|
215 | IV_NCP=2 |
---|
216 | IV_TCPNL=1 |
---|
217 | IV_PROTO=2 |
---|
218 | IV_LZO_STUB=1 |
---|
219 | IV_COMP_STUB=1 |
---|
220 | IV_COMP_STUBv2=1 |
---|
221 | |
---|
222 | 2016-11-22 17:24:29 VERIFY OK: depth=1 |
---|
223 | cert. version : 3 |
---|
224 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
225 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
226 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
227 | issued on : 2014-04-11 10:15:45 |
---|
228 | expires on : 2024-04-08 10:15:45 |
---|
229 | signed using : RSA with SHA1 |
---|
230 | RSA key size : 4096 bits |
---|
231 | basic constraints : CA=true |
---|
232 | |
---|
233 | 2016-11-22 17:24:29 VERIFY OK: depth=0 |
---|
234 | cert. version : 3 |
---|
235 | serial number : 01:0F |
---|
236 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
237 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
238 | issued on : 2016-03-10 08:48:14 |
---|
239 | expires on : 2026-03-08 08:48:14 |
---|
240 | signed using : RSA with SHA1 |
---|
241 | RSA key size : 4096 bits |
---|
242 | basic constraints : CA=false |
---|
243 | cert. type : SSL Server |
---|
244 | key usage : Digital Signature, Key Encipherment |
---|
245 | ext key usage : TLS Web Server Authentication |
---|
246 | |
---|
247 | 2016-11-22 17:24:30 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
248 | 2016-11-22 17:24:30 Session is ACTIVE |
---|
249 | 2016-11-22 17:24:30 EVENT: GET_CONFIG |
---|
250 | 2016-11-22 17:24:30 Sending PUSH_REQUEST to server... |
---|
251 | 2016-11-22 17:24:31 OPTIONS: |
---|
252 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
253 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
254 | 2 [comp-lzo] [no] |
---|
255 | 3 [route-gateway] [10.30.0.1] |
---|
256 | 4 [topology] [subnet] |
---|
257 | 5 [ping] [10] |
---|
258 | 6 [ping-restart] [60] |
---|
259 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
260 | |
---|
261 | 2016-11-22 17:24:31 PROTOCOL OPTIONS: |
---|
262 | cipher: AES-256-CBC |
---|
263 | digest: SHA1 |
---|
264 | compress: LZO_STUB |
---|
265 | peer ID: -1 |
---|
266 | 2016-11-22 17:24:31 EVENT: ASSIGN_IP |
---|
267 | 2016-11-22 17:24:31 TunPersist: saving tun context: |
---|
268 | Session Name: 23.88.114.44 |
---|
269 | Layer: OSI_LAYER_3 |
---|
270 | Remote Address: 23.88.114.44 |
---|
271 | Tunnel Addresses: |
---|
272 | 10.30.0.41/16 -> 10.30.0.1 |
---|
273 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
274 | Block IPv6: no |
---|
275 | Add Routes: |
---|
276 | Exclude Routes: |
---|
277 | DNS Servers: |
---|
278 | 10.30.0.1 |
---|
279 | Search Domains: |
---|
280 | |
---|
281 | 2016-11-22 17:24:31 Connected via tun |
---|
282 | 2016-11-22 17:24:31 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
283 | 2016-11-22 17:24:31 LZO-ASYM init swap=0 asym=1 |
---|
284 | 2016-11-22 17:24:31 Comp-stub init swap=0 |
---|
285 | 2016-11-22 17:24:31 SetStatus Connected |
---|
286 | 2016-11-22 17:29:20 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
287 | 2016-11-22 17:29:21 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
288 | 2016-11-22 17:29:24 RECONNECT TEST: ReachableViaWiFi |
---|
289 | 2016-11-22 17:29:24 EVENT: PAUSE |
---|
290 | 2016-11-22 17:29:25 RESUME TEST: ReachableViaWiFi |
---|
291 | 2016-11-22 17:29:25 EVENT: RESUME |
---|
292 | 2016-11-22 17:29:25 EVENT: RECONNECTING |
---|
293 | 2016-11-22 17:29:25 Contacting 23.88.114.44:2018 via UDP |
---|
294 | 2016-11-22 17:29:25 EVENT: WAIT |
---|
295 | 2016-11-22 17:29:25 SetTunnelSocket returned 1 |
---|
296 | 2016-11-22 17:29:25 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
297 | 2016-11-22 17:29:25 EVENT: CONNECTING |
---|
298 | 2016-11-22 17:29:25 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
299 | 2016-11-22 17:29:25 Peer Info: |
---|
300 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
301 | IV_VER=3.0.11 |
---|
302 | IV_PLAT=ios |
---|
303 | IV_NCP=2 |
---|
304 | IV_TCPNL=1 |
---|
305 | IV_PROTO=2 |
---|
306 | IV_LZO_STUB=1 |
---|
307 | IV_COMP_STUB=1 |
---|
308 | IV_COMP_STUBv2=1 |
---|
309 | |
---|
310 | 2016-11-22 17:29:25 VERIFY OK: depth=1 |
---|
311 | cert. version : 3 |
---|
312 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
313 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
314 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
315 | issued on : 2014-04-11 10:15:45 |
---|
316 | expires on : 2024-04-08 10:15:45 |
---|
317 | signed using : RSA with SHA1 |
---|
318 | RSA key size : 4096 bits |
---|
319 | basic constraints : CA=true |
---|
320 | |
---|
321 | 2016-11-22 17:29:25 VERIFY OK: depth=0 |
---|
322 | cert. version : 3 |
---|
323 | serial number : 01:0F |
---|
324 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
325 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
326 | issued on : 2016-03-10 08:48:14 |
---|
327 | expires on : 2026-03-08 08:48:14 |
---|
328 | signed using : RSA with SHA1 |
---|
329 | RSA key size : 4096 bits |
---|
330 | basic constraints : CA=false |
---|
331 | cert. type : SSL Server |
---|
332 | key usage : Digital Signature, Key Encipherment |
---|
333 | ext key usage : TLS Web Server Authentication |
---|
334 | |
---|
335 | 2016-11-22 17:29:26 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
336 | 2016-11-22 17:29:26 Session is ACTIVE |
---|
337 | 2016-11-22 17:29:26 EVENT: GET_CONFIG |
---|
338 | 2016-11-22 17:29:26 Sending PUSH_REQUEST to server... |
---|
339 | 2016-11-22 17:29:27 OPTIONS: |
---|
340 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
341 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
342 | 2 [comp-lzo] [no] |
---|
343 | 3 [route-gateway] [10.30.0.1] |
---|
344 | 4 [topology] [subnet] |
---|
345 | 5 [ping] [10] |
---|
346 | 6 [ping-restart] [60] |
---|
347 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
348 | |
---|
349 | 2016-11-22 17:29:27 PROTOCOL OPTIONS: |
---|
350 | cipher: AES-256-CBC |
---|
351 | digest: SHA1 |
---|
352 | compress: LZO_STUB |
---|
353 | peer ID: -1 |
---|
354 | 2016-11-22 17:29:27 EVENT: ASSIGN_IP |
---|
355 | 2016-11-22 17:29:27 TunPersist: saving tun context: |
---|
356 | Session Name: 23.88.114.44 |
---|
357 | Layer: OSI_LAYER_3 |
---|
358 | Remote Address: 23.88.114.44 |
---|
359 | Tunnel Addresses: |
---|
360 | 10.30.0.41/16 -> 10.30.0.1 |
---|
361 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
362 | Block IPv6: no |
---|
363 | Add Routes: |
---|
364 | Exclude Routes: |
---|
365 | DNS Servers: |
---|
366 | 10.30.0.1 |
---|
367 | Search Domains: |
---|
368 | |
---|
369 | 2016-11-22 17:29:27 Connected via tun |
---|
370 | 2016-11-22 17:29:27 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
371 | 2016-11-22 17:29:27 LZO-ASYM init swap=0 asym=1 |
---|
372 | 2016-11-22 17:29:27 Comp-stub init swap=0 |
---|
373 | 2016-11-22 17:29:27 SetStatus Connected |
---|
374 | 2016-11-22 17:30:00 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
375 | 2016-11-22 17:30:03 RECONNECT TEST: ReachableViaWiFi |
---|
376 | 2016-11-22 17:30:03 EVENT: PAUSE |
---|
377 | 2016-11-22 17:30:04 RESUME TEST: ReachableViaWiFi |
---|
378 | 2016-11-22 17:30:04 EVENT: RESUME |
---|
379 | 2016-11-22 17:30:04 EVENT: RECONNECTING |
---|
380 | 2016-11-22 17:30:04 Contacting 23.88.114.44:2018 via UDP |
---|
381 | 2016-11-22 17:30:04 EVENT: WAIT |
---|
382 | 2016-11-22 17:30:04 SetTunnelSocket returned 1 |
---|
383 | 2016-11-22 17:30:04 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
384 | 2016-11-22 17:30:04 EVENT: CONNECTING |
---|
385 | 2016-11-22 17:30:04 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
386 | 2016-11-22 17:30:04 Peer Info: |
---|
387 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
388 | IV_VER=3.0.11 |
---|
389 | IV_PLAT=ios |
---|
390 | IV_NCP=2 |
---|
391 | IV_TCPNL=1 |
---|
392 | IV_PROTO=2 |
---|
393 | IV_LZO_STUB=1 |
---|
394 | IV_COMP_STUB=1 |
---|
395 | IV_COMP_STUBv2=1 |
---|
396 | |
---|
397 | 2016-11-22 17:30:04 VERIFY OK: depth=1 |
---|
398 | cert. version : 3 |
---|
399 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
400 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
401 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
402 | issued on : 2014-04-11 10:15:45 |
---|
403 | expires on : 2024-04-08 10:15:45 |
---|
404 | signed using : RSA with SHA1 |
---|
405 | RSA key size : 4096 bits |
---|
406 | basic constraints : CA=true |
---|
407 | |
---|
408 | 2016-11-22 17:30:04 VERIFY OK: depth=0 |
---|
409 | cert. version : 3 |
---|
410 | serial number : 01:0F |
---|
411 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
412 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
413 | issued on : 2016-03-10 08:48:14 |
---|
414 | expires on : 2026-03-08 08:48:14 |
---|
415 | signed using : RSA with SHA1 |
---|
416 | RSA key size : 4096 bits |
---|
417 | basic constraints : CA=false |
---|
418 | cert. type : SSL Server |
---|
419 | key usage : Digital Signature, Key Encipherment |
---|
420 | ext key usage : TLS Web Server Authentication |
---|
421 | |
---|
422 | 2016-11-22 17:30:05 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
423 | 2016-11-22 17:30:06 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
424 | 2016-11-22 17:30:06 Session is ACTIVE |
---|
425 | 2016-11-22 17:30:06 EVENT: GET_CONFIG |
---|
426 | 2016-11-22 17:30:06 Sending PUSH_REQUEST to server... |
---|
427 | 2016-11-22 17:30:06 OPTIONS: |
---|
428 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
429 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
430 | 2 [comp-lzo] [no] |
---|
431 | 3 [route-gateway] [10.30.0.1] |
---|
432 | 4 [topology] [subnet] |
---|
433 | 5 [ping] [10] |
---|
434 | 6 [ping-restart] [60] |
---|
435 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
436 | |
---|
437 | 2016-11-22 17:30:06 PROTOCOL OPTIONS: |
---|
438 | cipher: AES-256-CBC |
---|
439 | digest: SHA1 |
---|
440 | compress: LZO_STUB |
---|
441 | peer ID: -1 |
---|
442 | 2016-11-22 17:30:06 EVENT: ASSIGN_IP |
---|
443 | 2016-11-22 17:30:06 TunPersist: saving tun context: |
---|
444 | Session Name: 23.88.114.44 |
---|
445 | Layer: OSI_LAYER_3 |
---|
446 | Remote Address: 23.88.114.44 |
---|
447 | Tunnel Addresses: |
---|
448 | 10.30.0.41/16 -> 10.30.0.1 |
---|
449 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
450 | Block IPv6: no |
---|
451 | Add Routes: |
---|
452 | Exclude Routes: |
---|
453 | DNS Servers: |
---|
454 | 10.30.0.1 |
---|
455 | Search Domains: |
---|
456 | |
---|
457 | 2016-11-22 17:30:06 Connected via tun |
---|
458 | 2016-11-22 17:30:06 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
459 | 2016-11-22 17:30:06 LZO-ASYM init swap=0 asym=1 |
---|
460 | 2016-11-22 17:30:06 Comp-stub init swap=0 |
---|
461 | 2016-11-22 17:30:06 SetStatus Connected |
---|
462 | 2016-11-22 17:30:08 RECONNECT TEST: ReachableViaWiFi |
---|
463 | 2016-11-22 17:30:08 EVENT: PAUSE |
---|
464 | 2016-11-22 17:30:09 RESUME TEST: ReachableViaWiFi |
---|
465 | 2016-11-22 17:30:09 EVENT: RESUME |
---|
466 | 2016-11-22 17:30:09 EVENT: RECONNECTING |
---|
467 | 2016-11-22 17:30:09 Contacting 23.88.114.44:2018 via UDP |
---|
468 | 2016-11-22 17:30:09 EVENT: WAIT |
---|
469 | 2016-11-22 17:30:09 SetTunnelSocket returned 1 |
---|
470 | 2016-11-22 17:30:09 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
471 | 2016-11-22 17:30:09 EVENT: CONNECTING |
---|
472 | 2016-11-22 17:30:09 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
473 | 2016-11-22 17:30:09 Peer Info: |
---|
474 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
475 | IV_VER=3.0.11 |
---|
476 | IV_PLAT=ios |
---|
477 | IV_NCP=2 |
---|
478 | IV_TCPNL=1 |
---|
479 | IV_PROTO=2 |
---|
480 | IV_LZO_STUB=1 |
---|
481 | IV_COMP_STUB=1 |
---|
482 | IV_COMP_STUBv2=1 |
---|
483 | |
---|
484 | 2016-11-22 17:30:09 VERIFY OK: depth=1 |
---|
485 | cert. version : 3 |
---|
486 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
487 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
488 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
489 | issued on : 2014-04-11 10:15:45 |
---|
490 | expires on : 2024-04-08 10:15:45 |
---|
491 | signed using : RSA with SHA1 |
---|
492 | RSA key size : 4096 bits |
---|
493 | basic constraints : CA=true |
---|
494 | |
---|
495 | 2016-11-22 17:30:09 VERIFY OK: depth=0 |
---|
496 | cert. version : 3 |
---|
497 | serial number : 01:0F |
---|
498 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
499 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
500 | issued on : 2016-03-10 08:48:14 |
---|
501 | expires on : 2026-03-08 08:48:14 |
---|
502 | signed using : RSA with SHA1 |
---|
503 | RSA key size : 4096 bits |
---|
504 | basic constraints : CA=false |
---|
505 | cert. type : SSL Server |
---|
506 | key usage : Digital Signature, Key Encipherment |
---|
507 | ext key usage : TLS Web Server Authentication |
---|
508 | |
---|
509 | 2016-11-22 17:30:10 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
510 | 2016-11-22 17:30:10 Session is ACTIVE |
---|
511 | 2016-11-22 17:30:10 EVENT: GET_CONFIG |
---|
512 | 2016-11-22 17:30:10 Sending PUSH_REQUEST to server... |
---|
513 | 2016-11-22 17:30:11 OPTIONS: |
---|
514 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
515 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
516 | 2 [comp-lzo] [no] |
---|
517 | 3 [route-gateway] [10.30.0.1] |
---|
518 | 4 [topology] [subnet] |
---|
519 | 5 [ping] [10] |
---|
520 | 6 [ping-restart] [60] |
---|
521 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
522 | |
---|
523 | 2016-11-22 17:30:11 PROTOCOL OPTIONS: |
---|
524 | cipher: AES-256-CBC |
---|
525 | digest: SHA1 |
---|
526 | compress: LZO_STUB |
---|
527 | peer ID: -1 |
---|
528 | 2016-11-22 17:30:11 TunPersist: reused tun context |
---|
529 | 2016-11-22 17:30:11 Connected via tun |
---|
530 | 2016-11-22 17:30:11 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
531 | 2016-11-22 17:30:11 LZO-ASYM init swap=0 asym=1 |
---|
532 | 2016-11-22 17:30:11 Comp-stub init swap=0 |
---|
533 | 2016-11-22 17:30:11 SetStatus Connected |
---|
534 | 2016-11-22 17:30:12 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
535 | 2016-11-22 17:30:15 RECONNECT TEST: ReachableViaWiFi |
---|
536 | 2016-11-22 17:30:15 EVENT: PAUSE |
---|
537 | 2016-11-22 17:30:16 RESUME TEST: ReachableViaWiFi |
---|
538 | 2016-11-22 17:30:16 EVENT: RESUME |
---|
539 | 2016-11-22 17:30:16 EVENT: RECONNECTING |
---|
540 | 2016-11-22 17:30:16 Contacting 23.88.114.44:2018 via UDP |
---|
541 | 2016-11-22 17:30:16 EVENT: WAIT |
---|
542 | 2016-11-22 17:30:16 SetTunnelSocket returned 1 |
---|
543 | 2016-11-22 17:30:16 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
544 | 2016-11-22 17:30:16 EVENT: CONNECTING |
---|
545 | 2016-11-22 17:30:16 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
546 | 2016-11-22 17:30:16 Peer Info: |
---|
547 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
548 | IV_VER=3.0.11 |
---|
549 | IV_PLAT=ios |
---|
550 | IV_NCP=2 |
---|
551 | IV_TCPNL=1 |
---|
552 | IV_PROTO=2 |
---|
553 | IV_LZO_STUB=1 |
---|
554 | IV_COMP_STUB=1 |
---|
555 | IV_COMP_STUBv2=1 |
---|
556 | |
---|
557 | 2016-11-22 17:30:16 VERIFY OK: depth=1 |
---|
558 | cert. version : 3 |
---|
559 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
560 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
561 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
562 | issued on : 2014-04-11 10:15:45 |
---|
563 | expires on : 2024-04-08 10:15:45 |
---|
564 | signed using : RSA with SHA1 |
---|
565 | RSA key size : 4096 bits |
---|
566 | basic constraints : CA=true |
---|
567 | |
---|
568 | 2016-11-22 17:30:16 VERIFY OK: depth=0 |
---|
569 | cert. version : 3 |
---|
570 | serial number : 01:0F |
---|
571 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
572 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
573 | issued on : 2016-03-10 08:48:14 |
---|
574 | expires on : 2026-03-08 08:48:14 |
---|
575 | signed using : RSA with SHA1 |
---|
576 | RSA key size : 4096 bits |
---|
577 | basic constraints : CA=false |
---|
578 | cert. type : SSL Server |
---|
579 | key usage : Digital Signature, Key Encipherment |
---|
580 | ext key usage : TLS Web Server Authentication |
---|
581 | |
---|
582 | 2016-11-22 17:30:17 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
583 | 2016-11-22 17:30:17 Session is ACTIVE |
---|
584 | 2016-11-22 17:30:17 EVENT: GET_CONFIG |
---|
585 | 2016-11-22 17:30:17 Sending PUSH_REQUEST to server... |
---|
586 | 2016-11-22 17:30:18 OPTIONS: |
---|
587 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
588 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
589 | 2 [comp-lzo] [no] |
---|
590 | 3 [route-gateway] [10.30.0.1] |
---|
591 | 4 [topology] [subnet] |
---|
592 | 5 [ping] [10] |
---|
593 | 6 [ping-restart] [60] |
---|
594 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
595 | |
---|
596 | 2016-11-22 17:30:18 PROTOCOL OPTIONS: |
---|
597 | cipher: AES-256-CBC |
---|
598 | digest: SHA1 |
---|
599 | compress: LZO_STUB |
---|
600 | peer ID: -1 |
---|
601 | 2016-11-22 17:30:18 EVENT: ASSIGN_IP |
---|
602 | 2016-11-22 17:30:18 TunPersist: saving tun context: |
---|
603 | Session Name: 23.88.114.44 |
---|
604 | Layer: OSI_LAYER_3 |
---|
605 | Remote Address: 23.88.114.44 |
---|
606 | Tunnel Addresses: |
---|
607 | 10.30.0.41/16 -> 10.30.0.1 |
---|
608 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
609 | Block IPv6: no |
---|
610 | Add Routes: |
---|
611 | Exclude Routes: |
---|
612 | DNS Servers: |
---|
613 | 10.30.0.1 |
---|
614 | Search Domains: |
---|
615 | |
---|
616 | 2016-11-22 17:30:18 Connected via tun |
---|
617 | 2016-11-22 17:30:18 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
618 | 2016-11-22 17:30:18 LZO-ASYM init swap=0 asym=1 |
---|
619 | 2016-11-22 17:30:18 Comp-stub init swap=0 |
---|
620 | 2016-11-22 17:30:18 SetStatus Connected |
---|
621 | 2016-11-22 17:37:06 TUN reset routes |
---|
622 | 2016-11-22 17:37:07 EVENT: DISCONNECTED |
---|
623 | 2016-11-22 17:37:07 Raw stats on disconnect: |
---|
624 | BYTES_IN : 1786098858 |
---|
625 | BYTES_OUT : 53767003 |
---|
626 | PACKETS_IN : 1267703 |
---|
627 | PACKETS_OUT : 450702 |
---|
628 | TUN_BYTES_IN : 33317054 |
---|
629 | TUN_BYTES_OUT : 1723966271 |
---|
630 | TUN_PACKETS_IN : 449600 |
---|
631 | TUN_PACKETS_OUT : 1266656 |
---|
632 | KEEPALIVE_TIMEOUT : 1 |
---|
633 | N_PAUSE : 38 |
---|
634 | N_RECONNECT : 39 |
---|
635 | 2016-11-22 17:37:07 Performance stats on disconnect: |
---|
636 | CPU usage (microseconds): 167008093 |
---|
637 | Tunnel compression ratio (uplink): 1.6138 |
---|
638 | Tunnel compression ratio (downlink): 1.03604 |
---|
639 | Network bytes per CPU second: 11016626 |
---|
640 | Tunnel bytes per CPU second: 10522144 |
---|
641 | 2016-11-22 17:37:07 ----- OpenVPN Stop ----- |
---|
642 | 2016-11-22 22:18:47 ----- OpenVPN Start ----- |
---|
643 | OpenVPN core 3.0.11 ios arm64 64-bit built on Apr 15 2016 14:13:50 |
---|
644 | 2016-11-22 22:18:47 Frame=512/2048/512 mssfix-ctrl=1250 |
---|
645 | 2016-11-22 22:18:47 UNUSED OPTIONS |
---|
646 | 4 [resolv-retry] [infinite] |
---|
647 | 5 [nobind] |
---|
648 | 6 [persist-key] |
---|
649 | 7 [persist-tun] |
---|
650 | 11 [verb] [3] |
---|
651 | 12 [explicit-exit-notify] [5] |
---|
652 | |
---|
653 | 2016-11-22 22:18:47 EVENT: RESOLVE |
---|
654 | 2016-11-22 22:18:47 Contacting 23.88.114.44:2018 via UDP |
---|
655 | 2016-11-22 22:18:47 EVENT: WAIT |
---|
656 | 2016-11-22 22:18:47 SetTunnelSocket returned 1 |
---|
657 | 2016-11-22 22:18:47 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
658 | 2016-11-22 22:18:47 EVENT: CONNECTING |
---|
659 | 2016-11-22 22:18:47 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
660 | 2016-11-22 22:18:47 Peer Info: |
---|
661 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
662 | IV_VER=3.0.11 |
---|
663 | IV_PLAT=ios |
---|
664 | IV_NCP=2 |
---|
665 | IV_TCPNL=1 |
---|
666 | IV_PROTO=2 |
---|
667 | IV_LZO_STUB=1 |
---|
668 | IV_COMP_STUB=1 |
---|
669 | IV_COMP_STUBv2=1 |
---|
670 | |
---|
671 | 2016-11-22 22:18:48 VERIFY OK: depth=1 |
---|
672 | cert. version : 3 |
---|
673 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
674 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
675 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
676 | issued on : 2014-04-11 10:15:45 |
---|
677 | expires on : 2024-04-08 10:15:45 |
---|
678 | signed using : RSA with SHA1 |
---|
679 | RSA key size : 4096 bits |
---|
680 | basic constraints : CA=true |
---|
681 | |
---|
682 | 2016-11-22 22:18:48 VERIFY OK: depth=0 |
---|
683 | cert. version : 3 |
---|
684 | serial number : 01:0F |
---|
685 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
686 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
687 | issued on : 2016-03-10 08:48:14 |
---|
688 | expires on : 2026-03-08 08:48:14 |
---|
689 | signed using : RSA with SHA1 |
---|
690 | RSA key size : 4096 bits |
---|
691 | basic constraints : CA=false |
---|
692 | cert. type : SSL Server |
---|
693 | key usage : Digital Signature, Key Encipherment |
---|
694 | ext key usage : TLS Web Server Authentication |
---|
695 | |
---|
696 | 2016-11-22 22:18:48 NET WiFi:ReachableViaWiFi/-R t-----d |
---|
697 | 2016-11-22 22:18:48 NET Internet:ReachableViaWiFi/-R t------ |
---|
698 | 2016-11-22 22:18:49 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
699 | 2016-11-22 22:18:49 Session is ACTIVE |
---|
700 | 2016-11-22 22:18:49 EVENT: GET_CONFIG |
---|
701 | 2016-11-22 22:18:49 Sending PUSH_REQUEST to server... |
---|
702 | 2016-11-22 22:18:49 OPTIONS: |
---|
703 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
704 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
705 | 2 [comp-lzo] [no] |
---|
706 | 3 [route-gateway] [10.30.0.1] |
---|
707 | 4 [topology] [subnet] |
---|
708 | 5 [ping] [10] |
---|
709 | 6 [ping-restart] [60] |
---|
710 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
711 | |
---|
712 | 2016-11-22 22:18:49 PROTOCOL OPTIONS: |
---|
713 | cipher: AES-256-CBC |
---|
714 | digest: SHA1 |
---|
715 | compress: LZO_STUB |
---|
716 | peer ID: -1 |
---|
717 | 2016-11-22 22:18:49 EVENT: ASSIGN_IP |
---|
718 | 2016-11-22 22:18:49 TunPersist: saving tun context: |
---|
719 | Session Name: 23.88.114.44 |
---|
720 | Layer: OSI_LAYER_3 |
---|
721 | Remote Address: 23.88.114.44 |
---|
722 | Tunnel Addresses: |
---|
723 | 10.30.0.41/16 -> 10.30.0.1 |
---|
724 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
725 | Block IPv6: no |
---|
726 | Add Routes: |
---|
727 | Exclude Routes: |
---|
728 | DNS Servers: |
---|
729 | 10.30.0.1 |
---|
730 | Search Domains: |
---|
731 | |
---|
732 | 2016-11-22 22:18:49 Connected via tun |
---|
733 | 2016-11-22 22:18:49 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
734 | 2016-11-22 22:18:49 LZO-ASYM init swap=0 asym=1 |
---|
735 | 2016-11-22 22:18:49 Comp-stub init swap=0 |
---|
736 | 2016-11-22 22:18:50 SetStatus Connected |
---|
737 | 2016-11-22 22:50:44 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
738 | 2016-11-22 22:50:44 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
739 | 2016-11-22 22:50:47 RECONNECT TEST: ReachableViaWiFi |
---|
740 | 2016-11-22 22:50:47 EVENT: PAUSE |
---|
741 | 2016-11-22 22:50:48 RESUME TEST: ReachableViaWiFi |
---|
742 | 2016-11-22 22:50:48 EVENT: RESUME |
---|
743 | 2016-11-22 22:50:48 EVENT: RECONNECTING |
---|
744 | 2016-11-22 22:50:48 Contacting 23.88.114.44:2018 via UDP |
---|
745 | 2016-11-22 22:50:48 EVENT: WAIT |
---|
746 | 2016-11-22 22:50:48 SetTunnelSocket returned 1 |
---|
747 | 2016-11-22 22:50:48 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
748 | 2016-11-22 22:50:48 EVENT: CONNECTING |
---|
749 | 2016-11-22 22:50:48 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
750 | 2016-11-22 22:50:48 Peer Info: |
---|
751 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
752 | IV_VER=3.0.11 |
---|
753 | IV_PLAT=ios |
---|
754 | IV_NCP=2 |
---|
755 | IV_TCPNL=1 |
---|
756 | IV_PROTO=2 |
---|
757 | IV_LZO_STUB=1 |
---|
758 | IV_COMP_STUB=1 |
---|
759 | IV_COMP_STUBv2=1 |
---|
760 | |
---|
761 | 2016-11-22 22:50:49 VERIFY OK: depth=1 |
---|
762 | cert. version : 3 |
---|
763 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
764 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
765 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
766 | issued on : 2014-04-11 10:15:45 |
---|
767 | expires on : 2024-04-08 10:15:45 |
---|
768 | signed using : RSA with SHA1 |
---|
769 | RSA key size : 4096 bits |
---|
770 | basic constraints : CA=true |
---|
771 | |
---|
772 | 2016-11-22 22:50:49 VERIFY OK: depth=0 |
---|
773 | cert. version : 3 |
---|
774 | serial number : 01:0F |
---|
775 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
776 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
777 | issued on : 2016-03-10 08:48:14 |
---|
778 | expires on : 2026-03-08 08:48:14 |
---|
779 | signed using : RSA with SHA1 |
---|
780 | RSA key size : 4096 bits |
---|
781 | basic constraints : CA=false |
---|
782 | cert. type : SSL Server |
---|
783 | key usage : Digital Signature, Key Encipherment |
---|
784 | ext key usage : TLS Web Server Authentication |
---|
785 | |
---|
786 | 2016-11-22 22:50:50 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
787 | 2016-11-22 22:50:50 Session is ACTIVE |
---|
788 | 2016-11-22 22:50:50 EVENT: GET_CONFIG |
---|
789 | 2016-11-22 22:50:50 Sending PUSH_REQUEST to server... |
---|
790 | 2016-11-22 22:50:51 OPTIONS: |
---|
791 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
792 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
793 | 2 [comp-lzo] [no] |
---|
794 | 3 [route-gateway] [10.30.0.1] |
---|
795 | 4 [topology] [subnet] |
---|
796 | 5 [ping] [10] |
---|
797 | 6 [ping-restart] [60] |
---|
798 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
799 | |
---|
800 | 2016-11-22 22:50:51 PROTOCOL OPTIONS: |
---|
801 | cipher: AES-256-CBC |
---|
802 | digest: SHA1 |
---|
803 | compress: LZO_STUB |
---|
804 | peer ID: -1 |
---|
805 | 2016-11-22 22:50:51 EVENT: ASSIGN_IP |
---|
806 | 2016-11-22 22:50:51 TunPersist: saving tun context: |
---|
807 | Session Name: 23.88.114.44 |
---|
808 | Layer: OSI_LAYER_3 |
---|
809 | Remote Address: 23.88.114.44 |
---|
810 | Tunnel Addresses: |
---|
811 | 10.30.0.41/16 -> 10.30.0.1 |
---|
812 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
813 | Block IPv6: no |
---|
814 | Add Routes: |
---|
815 | Exclude Routes: |
---|
816 | DNS Servers: |
---|
817 | 10.30.0.1 |
---|
818 | Search Domains: |
---|
819 | |
---|
820 | 2016-11-22 22:50:51 Connected via tun |
---|
821 | 2016-11-22 22:50:51 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
822 | 2016-11-22 22:50:51 LZO-ASYM init swap=0 asym=1 |
---|
823 | 2016-11-22 22:50:51 Comp-stub init swap=0 |
---|
824 | 2016-11-22 22:50:51 SetStatus Connected |
---|
825 | 2016-11-22 22:51:19 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
826 | 2016-11-22 22:51:22 RECONNECT TEST: ReachableViaWiFi |
---|
827 | 2016-11-22 22:51:22 EVENT: PAUSE |
---|
828 | 2016-11-22 22:51:23 RESUME TEST: ReachableViaWiFi |
---|
829 | 2016-11-22 22:51:23 EVENT: RESUME |
---|
830 | 2016-11-22 22:51:23 EVENT: RECONNECTING |
---|
831 | 2016-11-22 22:51:23 Contacting 23.88.114.44:2018 via UDP |
---|
832 | 2016-11-22 22:51:23 EVENT: WAIT |
---|
833 | 2016-11-22 22:51:23 SetTunnelSocket returned 1 |
---|
834 | 2016-11-22 22:51:23 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
835 | 2016-11-22 22:51:23 EVENT: CONNECTING |
---|
836 | 2016-11-22 22:51:23 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
837 | 2016-11-22 22:51:23 Peer Info: |
---|
838 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
839 | IV_VER=3.0.11 |
---|
840 | IV_PLAT=ios |
---|
841 | IV_NCP=2 |
---|
842 | IV_TCPNL=1 |
---|
843 | IV_PROTO=2 |
---|
844 | IV_LZO_STUB=1 |
---|
845 | IV_COMP_STUB=1 |
---|
846 | IV_COMP_STUBv2=1 |
---|
847 | |
---|
848 | 2016-11-22 22:51:23 VERIFY OK: depth=1 |
---|
849 | cert. version : 3 |
---|
850 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
851 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
852 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
853 | issued on : 2014-04-11 10:15:45 |
---|
854 | expires on : 2024-04-08 10:15:45 |
---|
855 | signed using : RSA with SHA1 |
---|
856 | RSA key size : 4096 bits |
---|
857 | basic constraints : CA=true |
---|
858 | |
---|
859 | 2016-11-22 22:51:23 VERIFY OK: depth=0 |
---|
860 | cert. version : 3 |
---|
861 | serial number : 01:0F |
---|
862 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
863 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
864 | issued on : 2016-03-10 08:48:14 |
---|
865 | expires on : 2026-03-08 08:48:14 |
---|
866 | signed using : RSA with SHA1 |
---|
867 | RSA key size : 4096 bits |
---|
868 | basic constraints : CA=false |
---|
869 | cert. type : SSL Server |
---|
870 | key usage : Digital Signature, Key Encipherment |
---|
871 | ext key usage : TLS Web Server Authentication |
---|
872 | |
---|
873 | 2016-11-22 22:51:24 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
874 | 2016-11-22 22:51:24 Session is ACTIVE |
---|
875 | 2016-11-22 22:51:24 EVENT: GET_CONFIG |
---|
876 | 2016-11-22 22:51:24 Sending PUSH_REQUEST to server... |
---|
877 | 2016-11-22 22:51:25 OPTIONS: |
---|
878 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
879 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
880 | 2 [comp-lzo] [no] |
---|
881 | 3 [route-gateway] [10.30.0.1] |
---|
882 | 4 [topology] [subnet] |
---|
883 | 5 [ping] [10] |
---|
884 | 6 [ping-restart] [60] |
---|
885 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
886 | |
---|
887 | 2016-11-22 22:51:25 PROTOCOL OPTIONS: |
---|
888 | cipher: AES-256-CBC |
---|
889 | digest: SHA1 |
---|
890 | compress: LZO_STUB |
---|
891 | peer ID: -1 |
---|
892 | 2016-11-22 22:51:25 EVENT: ASSIGN_IP |
---|
893 | 2016-11-22 22:51:25 TunPersist: saving tun context: |
---|
894 | Session Name: 23.88.114.44 |
---|
895 | Layer: OSI_LAYER_3 |
---|
896 | Remote Address: 23.88.114.44 |
---|
897 | Tunnel Addresses: |
---|
898 | 10.30.0.41/16 -> 10.30.0.1 |
---|
899 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
900 | Block IPv6: no |
---|
901 | Add Routes: |
---|
902 | Exclude Routes: |
---|
903 | DNS Servers: |
---|
904 | 10.30.0.1 |
---|
905 | Search Domains: |
---|
906 | |
---|
907 | 2016-11-22 22:51:25 Connected via tun |
---|
908 | 2016-11-22 22:51:25 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
909 | 2016-11-22 22:51:25 LZO-ASYM init swap=0 asym=1 |
---|
910 | 2016-11-22 22:51:25 Comp-stub init swap=0 |
---|
911 | 2016-11-22 22:51:25 SetStatus Connected |
---|
912 | 2016-11-22 22:51:27 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
913 | 2016-11-22 22:51:30 RECONNECT TEST: ReachableViaWiFi |
---|
914 | 2016-11-22 22:51:30 EVENT: PAUSE |
---|
915 | 2016-11-22 22:51:31 RESUME TEST: ReachableViaWiFi |
---|
916 | 2016-11-22 22:51:31 EVENT: RESUME |
---|
917 | 2016-11-22 22:51:31 EVENT: RECONNECTING |
---|
918 | 2016-11-22 22:51:31 Contacting 23.88.114.44:2018 via UDP |
---|
919 | 2016-11-22 22:51:31 EVENT: WAIT |
---|
920 | 2016-11-22 22:51:31 SetTunnelSocket returned 1 |
---|
921 | 2016-11-22 22:51:31 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
922 | 2016-11-22 22:51:31 EVENT: CONNECTING |
---|
923 | 2016-11-22 22:51:31 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
924 | 2016-11-22 22:51:31 Peer Info: |
---|
925 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
926 | IV_VER=3.0.11 |
---|
927 | IV_PLAT=ios |
---|
928 | IV_NCP=2 |
---|
929 | IV_TCPNL=1 |
---|
930 | IV_PROTO=2 |
---|
931 | IV_LZO_STUB=1 |
---|
932 | IV_COMP_STUB=1 |
---|
933 | IV_COMP_STUBv2=1 |
---|
934 | |
---|
935 | 2016-11-22 22:51:31 VERIFY OK: depth=1 |
---|
936 | cert. version : 3 |
---|
937 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
938 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
939 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
940 | issued on : 2014-04-11 10:15:45 |
---|
941 | expires on : 2024-04-08 10:15:45 |
---|
942 | signed using : RSA with SHA1 |
---|
943 | RSA key size : 4096 bits |
---|
944 | basic constraints : CA=true |
---|
945 | |
---|
946 | 2016-11-22 22:51:31 VERIFY OK: depth=0 |
---|
947 | cert. version : 3 |
---|
948 | serial number : 01:0F |
---|
949 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
950 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
951 | issued on : 2016-03-10 08:48:14 |
---|
952 | expires on : 2026-03-08 08:48:14 |
---|
953 | signed using : RSA with SHA1 |
---|
954 | RSA key size : 4096 bits |
---|
955 | basic constraints : CA=false |
---|
956 | cert. type : SSL Server |
---|
957 | key usage : Digital Signature, Key Encipherment |
---|
958 | ext key usage : TLS Web Server Authentication |
---|
959 | |
---|
960 | 2016-11-22 22:51:32 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
961 | 2016-11-22 22:51:32 Session is ACTIVE |
---|
962 | 2016-11-22 22:51:32 EVENT: GET_CONFIG |
---|
963 | 2016-11-22 22:51:32 Sending PUSH_REQUEST to server... |
---|
964 | 2016-11-22 22:51:33 OPTIONS: |
---|
965 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
966 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
967 | 2 [comp-lzo] [no] |
---|
968 | 3 [route-gateway] [10.30.0.1] |
---|
969 | 4 [topology] [subnet] |
---|
970 | 5 [ping] [10] |
---|
971 | 6 [ping-restart] [60] |
---|
972 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
973 | |
---|
974 | 2016-11-22 22:51:33 PROTOCOL OPTIONS: |
---|
975 | cipher: AES-256-CBC |
---|
976 | digest: SHA1 |
---|
977 | compress: LZO_STUB |
---|
978 | peer ID: -1 |
---|
979 | 2016-11-22 22:51:33 EVENT: ASSIGN_IP |
---|
980 | 2016-11-22 22:51:33 TunPersist: saving tun context: |
---|
981 | Session Name: 23.88.114.44 |
---|
982 | Layer: OSI_LAYER_3 |
---|
983 | Remote Address: 23.88.114.44 |
---|
984 | Tunnel Addresses: |
---|
985 | 10.30.0.41/16 -> 10.30.0.1 |
---|
986 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
987 | Block IPv6: no |
---|
988 | Add Routes: |
---|
989 | Exclude Routes: |
---|
990 | DNS Servers: |
---|
991 | 10.30.0.1 |
---|
992 | Search Domains: |
---|
993 | |
---|
994 | 2016-11-22 22:51:33 Connected via tun |
---|
995 | 2016-11-22 22:51:33 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
996 | 2016-11-22 22:51:33 LZO-ASYM init swap=0 asym=1 |
---|
997 | 2016-11-22 22:51:33 Comp-stub init swap=0 |
---|
998 | 2016-11-22 22:51:33 SetStatus Connected |
---|
999 | 2016-11-22 22:51:37 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1000 | 2016-11-22 22:51:40 RECONNECT TEST: ReachableViaWiFi |
---|
1001 | 2016-11-22 22:51:40 EVENT: PAUSE |
---|
1002 | 2016-11-22 22:51:41 RESUME TEST: ReachableViaWiFi |
---|
1003 | 2016-11-22 22:51:41 EVENT: RESUME |
---|
1004 | 2016-11-22 22:51:41 EVENT: RECONNECTING |
---|
1005 | 2016-11-22 22:51:41 Contacting 23.88.114.44:2018 via UDP |
---|
1006 | 2016-11-22 22:51:41 EVENT: WAIT |
---|
1007 | 2016-11-22 22:51:41 SetTunnelSocket returned 1 |
---|
1008 | 2016-11-22 22:51:41 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
1009 | 2016-11-22 22:51:41 EVENT: CONNECTING |
---|
1010 | 2016-11-22 22:51:41 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1011 | 2016-11-22 22:51:41 Peer Info: |
---|
1012 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1013 | IV_VER=3.0.11 |
---|
1014 | IV_PLAT=ios |
---|
1015 | IV_NCP=2 |
---|
1016 | IV_TCPNL=1 |
---|
1017 | IV_PROTO=2 |
---|
1018 | IV_LZO_STUB=1 |
---|
1019 | IV_COMP_STUB=1 |
---|
1020 | IV_COMP_STUBv2=1 |
---|
1021 | |
---|
1022 | 2016-11-22 22:51:41 VERIFY OK: depth=1 |
---|
1023 | cert. version : 3 |
---|
1024 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1025 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1026 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1027 | issued on : 2014-04-11 10:15:45 |
---|
1028 | expires on : 2024-04-08 10:15:45 |
---|
1029 | signed using : RSA with SHA1 |
---|
1030 | RSA key size : 4096 bits |
---|
1031 | basic constraints : CA=true |
---|
1032 | |
---|
1033 | 2016-11-22 22:51:41 VERIFY OK: depth=0 |
---|
1034 | cert. version : 3 |
---|
1035 | serial number : 01:0F |
---|
1036 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1037 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1038 | issued on : 2016-03-10 08:48:14 |
---|
1039 | expires on : 2026-03-08 08:48:14 |
---|
1040 | signed using : RSA with SHA1 |
---|
1041 | RSA key size : 4096 bits |
---|
1042 | basic constraints : CA=false |
---|
1043 | cert. type : SSL Server |
---|
1044 | key usage : Digital Signature, Key Encipherment |
---|
1045 | ext key usage : TLS Web Server Authentication |
---|
1046 | |
---|
1047 | 2016-11-22 22:51:45 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
1048 | 2016-11-22 22:51:45 Session is ACTIVE |
---|
1049 | 2016-11-22 22:51:45 EVENT: GET_CONFIG |
---|
1050 | 2016-11-22 22:51:45 Sending PUSH_REQUEST to server... |
---|
1051 | 2016-11-22 22:51:46 OPTIONS: |
---|
1052 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
1053 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
1054 | 2 [comp-lzo] [no] |
---|
1055 | 3 [route-gateway] [10.30.0.1] |
---|
1056 | 4 [topology] [subnet] |
---|
1057 | 5 [ping] [10] |
---|
1058 | 6 [ping-restart] [60] |
---|
1059 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
1060 | |
---|
1061 | 2016-11-22 22:51:46 PROTOCOL OPTIONS: |
---|
1062 | cipher: AES-256-CBC |
---|
1063 | digest: SHA1 |
---|
1064 | compress: LZO_STUB |
---|
1065 | peer ID: -1 |
---|
1066 | 2016-11-22 22:51:46 EVENT: ASSIGN_IP |
---|
1067 | 2016-11-22 22:51:46 TunPersist: saving tun context: |
---|
1068 | Session Name: 23.88.114.44 |
---|
1069 | Layer: OSI_LAYER_3 |
---|
1070 | Remote Address: 23.88.114.44 |
---|
1071 | Tunnel Addresses: |
---|
1072 | 10.30.0.41/16 -> 10.30.0.1 |
---|
1073 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
1074 | Block IPv6: no |
---|
1075 | Add Routes: |
---|
1076 | Exclude Routes: |
---|
1077 | DNS Servers: |
---|
1078 | 10.30.0.1 |
---|
1079 | Search Domains: |
---|
1080 | |
---|
1081 | 2016-11-22 22:51:46 Connected via tun |
---|
1082 | 2016-11-22 22:51:46 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
1083 | 2016-11-22 22:51:46 LZO-ASYM init swap=0 asym=1 |
---|
1084 | 2016-11-22 22:51:46 Comp-stub init swap=0 |
---|
1085 | 2016-11-22 22:51:46 SetStatus Connected |
---|
1086 | 2016-11-22 22:53:06 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1087 | 2016-11-22 22:53:06 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1088 | 2016-11-22 22:53:09 RECONNECT TEST: ReachableViaWiFi |
---|
1089 | 2016-11-22 22:53:09 EVENT: PAUSE |
---|
1090 | 2016-11-22 22:53:10 RESUME TEST: ReachableViaWiFi |
---|
1091 | 2016-11-22 22:53:10 EVENT: RESUME |
---|
1092 | 2016-11-22 22:53:10 EVENT: RECONNECTING |
---|
1093 | 2016-11-22 22:53:10 Contacting 23.88.114.44:2018 via UDP |
---|
1094 | 2016-11-22 22:53:10 EVENT: WAIT |
---|
1095 | 2016-11-22 22:53:10 SetTunnelSocket returned 1 |
---|
1096 | 2016-11-22 22:53:10 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
1097 | 2016-11-22 22:53:11 EVENT: CONNECTING |
---|
1098 | 2016-11-22 22:53:11 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1099 | 2016-11-22 22:53:11 Peer Info: |
---|
1100 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1101 | IV_VER=3.0.11 |
---|
1102 | IV_PLAT=ios |
---|
1103 | IV_NCP=2 |
---|
1104 | IV_TCPNL=1 |
---|
1105 | IV_PROTO=2 |
---|
1106 | IV_LZO_STUB=1 |
---|
1107 | IV_COMP_STUB=1 |
---|
1108 | IV_COMP_STUBv2=1 |
---|
1109 | |
---|
1110 | 2016-11-22 22:53:11 VERIFY OK: depth=1 |
---|
1111 | cert. version : 3 |
---|
1112 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1113 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1114 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1115 | issued on : 2014-04-11 10:15:45 |
---|
1116 | expires on : 2024-04-08 10:15:45 |
---|
1117 | signed using : RSA with SHA1 |
---|
1118 | RSA key size : 4096 bits |
---|
1119 | basic constraints : CA=true |
---|
1120 | |
---|
1121 | 2016-11-22 22:53:11 VERIFY OK: depth=0 |
---|
1122 | cert. version : 3 |
---|
1123 | serial number : 01:0F |
---|
1124 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1125 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1126 | issued on : 2016-03-10 08:48:14 |
---|
1127 | expires on : 2026-03-08 08:48:14 |
---|
1128 | signed using : RSA with SHA1 |
---|
1129 | RSA key size : 4096 bits |
---|
1130 | basic constraints : CA=false |
---|
1131 | cert. type : SSL Server |
---|
1132 | key usage : Digital Signature, Key Encipherment |
---|
1133 | ext key usage : TLS Web Server Authentication |
---|
1134 | |
---|
1135 | 2016-11-22 22:53:12 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
1136 | 2016-11-22 22:53:12 Session is ACTIVE |
---|
1137 | 2016-11-22 22:53:12 EVENT: GET_CONFIG |
---|
1138 | 2016-11-22 22:53:12 Sending PUSH_REQUEST to server... |
---|
1139 | 2016-11-22 22:53:13 OPTIONS: |
---|
1140 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
1141 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
1142 | 2 [comp-lzo] [no] |
---|
1143 | 3 [route-gateway] [10.30.0.1] |
---|
1144 | 4 [topology] [subnet] |
---|
1145 | 5 [ping] [10] |
---|
1146 | 6 [ping-restart] [60] |
---|
1147 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
1148 | |
---|
1149 | 2016-11-22 22:53:13 PROTOCOL OPTIONS: |
---|
1150 | cipher: AES-256-CBC |
---|
1151 | digest: SHA1 |
---|
1152 | compress: LZO_STUB |
---|
1153 | peer ID: -1 |
---|
1154 | 2016-11-22 22:53:13 EVENT: ASSIGN_IP |
---|
1155 | 2016-11-22 22:53:13 TunPersist: saving tun context: |
---|
1156 | Session Name: 23.88.114.44 |
---|
1157 | Layer: OSI_LAYER_3 |
---|
1158 | Remote Address: 23.88.114.44 |
---|
1159 | Tunnel Addresses: |
---|
1160 | 10.30.0.41/16 -> 10.30.0.1 |
---|
1161 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
1162 | Block IPv6: no |
---|
1163 | Add Routes: |
---|
1164 | Exclude Routes: |
---|
1165 | DNS Servers: |
---|
1166 | 10.30.0.1 |
---|
1167 | Search Domains: |
---|
1168 | |
---|
1169 | 2016-11-22 22:53:13 Connected via tun |
---|
1170 | 2016-11-22 22:53:13 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
1171 | 2016-11-22 22:53:13 LZO-ASYM init swap=0 asym=1 |
---|
1172 | 2016-11-22 22:53:13 Comp-stub init swap=0 |
---|
1173 | 2016-11-22 22:53:13 SetStatus Connected |
---|
1174 | 2016-11-22 22:58:03 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1175 | 2016-11-22 22:58:06 RECONNECT TEST: ReachableViaWiFi |
---|
1176 | 2016-11-22 22:58:06 EVENT: PAUSE |
---|
1177 | 2016-11-22 22:58:07 RESUME TEST: ReachableViaWiFi |
---|
1178 | 2016-11-22 22:58:07 EVENT: RESUME |
---|
1179 | 2016-11-22 22:58:07 EVENT: RECONNECTING |
---|
1180 | 2016-11-22 22:58:07 Contacting 23.88.114.44:2018 via UDP |
---|
1181 | 2016-11-22 22:58:07 EVENT: WAIT |
---|
1182 | 2016-11-22 22:58:07 SetTunnelSocket returned 1 |
---|
1183 | 2016-11-22 22:58:07 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
1184 | 2016-11-22 22:58:08 EVENT: CONNECTING |
---|
1185 | 2016-11-22 22:58:08 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1186 | 2016-11-22 22:58:08 Peer Info: |
---|
1187 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1188 | IV_VER=3.0.11 |
---|
1189 | IV_PLAT=ios |
---|
1190 | IV_NCP=2 |
---|
1191 | IV_TCPNL=1 |
---|
1192 | IV_PROTO=2 |
---|
1193 | IV_LZO_STUB=1 |
---|
1194 | IV_COMP_STUB=1 |
---|
1195 | IV_COMP_STUBv2=1 |
---|
1196 | |
---|
1197 | 2016-11-22 22:58:08 VERIFY OK: depth=1 |
---|
1198 | cert. version : 3 |
---|
1199 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1200 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1201 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1202 | issued on : 2014-04-11 10:15:45 |
---|
1203 | expires on : 2024-04-08 10:15:45 |
---|
1204 | signed using : RSA with SHA1 |
---|
1205 | RSA key size : 4096 bits |
---|
1206 | basic constraints : CA=true |
---|
1207 | |
---|
1208 | 2016-11-22 22:58:08 VERIFY OK: depth=0 |
---|
1209 | cert. version : 3 |
---|
1210 | serial number : 01:0F |
---|
1211 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1212 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1213 | issued on : 2016-03-10 08:48:14 |
---|
1214 | expires on : 2026-03-08 08:48:14 |
---|
1215 | signed using : RSA with SHA1 |
---|
1216 | RSA key size : 4096 bits |
---|
1217 | basic constraints : CA=false |
---|
1218 | cert. type : SSL Server |
---|
1219 | key usage : Digital Signature, Key Encipherment |
---|
1220 | ext key usage : TLS Web Server Authentication |
---|
1221 | |
---|
1222 | 2016-11-22 22:58:09 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
1223 | 2016-11-22 22:58:09 Session is ACTIVE |
---|
1224 | 2016-11-22 22:58:09 EVENT: GET_CONFIG |
---|
1225 | 2016-11-22 22:58:09 Sending PUSH_REQUEST to server... |
---|
1226 | 2016-11-22 22:58:10 OPTIONS: |
---|
1227 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
1228 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
1229 | 2 [comp-lzo] [no] |
---|
1230 | 3 [route-gateway] [10.30.0.1] |
---|
1231 | 4 [topology] [subnet] |
---|
1232 | 5 [ping] [10] |
---|
1233 | 6 [ping-restart] [60] |
---|
1234 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
1235 | |
---|
1236 | 2016-11-22 22:58:10 PROTOCOL OPTIONS: |
---|
1237 | cipher: AES-256-CBC |
---|
1238 | digest: SHA1 |
---|
1239 | compress: LZO_STUB |
---|
1240 | peer ID: -1 |
---|
1241 | 2016-11-22 22:58:10 EVENT: ASSIGN_IP |
---|
1242 | 2016-11-22 22:58:10 TunPersist: saving tun context: |
---|
1243 | Session Name: 23.88.114.44 |
---|
1244 | Layer: OSI_LAYER_3 |
---|
1245 | Remote Address: 23.88.114.44 |
---|
1246 | Tunnel Addresses: |
---|
1247 | 10.30.0.41/16 -> 10.30.0.1 |
---|
1248 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
1249 | Block IPv6: no |
---|
1250 | Add Routes: |
---|
1251 | Exclude Routes: |
---|
1252 | DNS Servers: |
---|
1253 | 10.30.0.1 |
---|
1254 | Search Domains: |
---|
1255 | |
---|
1256 | 2016-11-22 22:58:10 Connected via tun |
---|
1257 | 2016-11-22 22:58:10 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
1258 | 2016-11-22 22:58:10 LZO-ASYM init swap=0 asym=1 |
---|
1259 | 2016-11-22 22:58:10 Comp-stub init swap=0 |
---|
1260 | 2016-11-22 22:58:10 SetStatus Connected |
---|
1261 | 2016-11-22 22:58:13 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1262 | 2016-11-22 22:58:16 RECONNECT TEST: ReachableViaWiFi |
---|
1263 | 2016-11-22 22:58:16 EVENT: PAUSE |
---|
1264 | 2016-11-22 22:58:17 RESUME TEST: ReachableViaWiFi |
---|
1265 | 2016-11-22 22:58:17 EVENT: RESUME |
---|
1266 | 2016-11-22 22:58:17 EVENT: RECONNECTING |
---|
1267 | 2016-11-22 22:58:17 Contacting 23.88.114.44:2018 via UDP |
---|
1268 | 2016-11-22 22:58:17 EVENT: WAIT |
---|
1269 | 2016-11-22 22:58:17 SetTunnelSocket returned 1 |
---|
1270 | 2016-11-22 22:58:17 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
1271 | 2016-11-22 22:58:17 EVENT: CONNECTING |
---|
1272 | 2016-11-22 22:58:17 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1273 | 2016-11-22 22:58:17 Peer Info: |
---|
1274 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1275 | IV_VER=3.0.11 |
---|
1276 | IV_PLAT=ios |
---|
1277 | IV_NCP=2 |
---|
1278 | IV_TCPNL=1 |
---|
1279 | IV_PROTO=2 |
---|
1280 | IV_LZO_STUB=1 |
---|
1281 | IV_COMP_STUB=1 |
---|
1282 | IV_COMP_STUBv2=1 |
---|
1283 | |
---|
1284 | 2016-11-22 22:58:17 VERIFY OK: depth=1 |
---|
1285 | cert. version : 3 |
---|
1286 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1287 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1288 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1289 | issued on : 2014-04-11 10:15:45 |
---|
1290 | expires on : 2024-04-08 10:15:45 |
---|
1291 | signed using : RSA with SHA1 |
---|
1292 | RSA key size : 4096 bits |
---|
1293 | basic constraints : CA=true |
---|
1294 | |
---|
1295 | 2016-11-22 22:58:17 VERIFY OK: depth=0 |
---|
1296 | cert. version : 3 |
---|
1297 | serial number : 01:0F |
---|
1298 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1299 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1300 | issued on : 2016-03-10 08:48:14 |
---|
1301 | expires on : 2026-03-08 08:48:14 |
---|
1302 | signed using : RSA with SHA1 |
---|
1303 | RSA key size : 4096 bits |
---|
1304 | basic constraints : CA=false |
---|
1305 | cert. type : SSL Server |
---|
1306 | key usage : Digital Signature, Key Encipherment |
---|
1307 | ext key usage : TLS Web Server Authentication |
---|
1308 | |
---|
1309 | 2016-11-22 22:58:20 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1310 | 2016-11-22 22:58:23 RECONNECT TEST: ReachableViaWiFi |
---|
1311 | 2016-11-22 22:58:23 EVENT: PAUSE |
---|
1312 | 2016-11-22 22:58:24 RESUME TEST: ReachableViaWiFi |
---|
1313 | 2016-11-22 22:58:24 EVENT: RESUME |
---|
1314 | 2016-11-22 22:58:24 EVENT: RECONNECTING |
---|
1315 | 2016-11-22 22:58:24 Contacting 23.88.114.44:2018 via UDP |
---|
1316 | 2016-11-22 22:58:24 EVENT: WAIT |
---|
1317 | 2016-11-22 22:58:24 SetTunnelSocket returned 1 |
---|
1318 | 2016-11-22 22:58:24 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
1319 | 2016-11-22 22:58:24 EVENT: CONNECTING |
---|
1320 | 2016-11-22 22:58:24 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1321 | 2016-11-22 22:58:24 Peer Info: |
---|
1322 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1323 | IV_VER=3.0.11 |
---|
1324 | IV_PLAT=ios |
---|
1325 | IV_NCP=2 |
---|
1326 | IV_TCPNL=1 |
---|
1327 | IV_PROTO=2 |
---|
1328 | IV_LZO_STUB=1 |
---|
1329 | IV_COMP_STUB=1 |
---|
1330 | IV_COMP_STUBv2=1 |
---|
1331 | |
---|
1332 | 2016-11-22 22:58:24 VERIFY OK: depth=1 |
---|
1333 | cert. version : 3 |
---|
1334 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1335 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1336 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1337 | issued on : 2014-04-11 10:15:45 |
---|
1338 | expires on : 2024-04-08 10:15:45 |
---|
1339 | signed using : RSA with SHA1 |
---|
1340 | RSA key size : 4096 bits |
---|
1341 | basic constraints : CA=true |
---|
1342 | |
---|
1343 | 2016-11-22 22:58:24 VERIFY OK: depth=0 |
---|
1344 | cert. version : 3 |
---|
1345 | serial number : 01:0F |
---|
1346 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1347 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1348 | issued on : 2016-03-10 08:48:14 |
---|
1349 | expires on : 2026-03-08 08:48:14 |
---|
1350 | signed using : RSA with SHA1 |
---|
1351 | RSA key size : 4096 bits |
---|
1352 | basic constraints : CA=false |
---|
1353 | cert. type : SSL Server |
---|
1354 | key usage : Digital Signature, Key Encipherment |
---|
1355 | ext key usage : TLS Web Server Authentication |
---|
1356 | |
---|
1357 | 2016-11-22 22:58:25 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
1358 | 2016-11-22 22:58:25 Session is ACTIVE |
---|
1359 | 2016-11-22 22:58:25 EVENT: GET_CONFIG |
---|
1360 | 2016-11-22 22:58:25 Sending PUSH_REQUEST to server... |
---|
1361 | 2016-11-22 22:58:26 OPTIONS: |
---|
1362 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
1363 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
1364 | 2 [comp-lzo] [no] |
---|
1365 | 3 [route-gateway] [10.30.0.1] |
---|
1366 | 4 [topology] [subnet] |
---|
1367 | 5 [ping] [10] |
---|
1368 | 6 [ping-restart] [60] |
---|
1369 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
1370 | |
---|
1371 | 2016-11-22 22:58:26 PROTOCOL OPTIONS: |
---|
1372 | cipher: AES-256-CBC |
---|
1373 | digest: SHA1 |
---|
1374 | compress: LZO_STUB |
---|
1375 | peer ID: -1 |
---|
1376 | 2016-11-22 22:58:26 EVENT: ASSIGN_IP |
---|
1377 | 2016-11-22 22:58:26 TunPersist: saving tun context: |
---|
1378 | Session Name: 23.88.114.44 |
---|
1379 | Layer: OSI_LAYER_3 |
---|
1380 | Remote Address: 23.88.114.44 |
---|
1381 | Tunnel Addresses: |
---|
1382 | 10.30.0.41/16 -> 10.30.0.1 |
---|
1383 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
1384 | Block IPv6: no |
---|
1385 | Add Routes: |
---|
1386 | Exclude Routes: |
---|
1387 | DNS Servers: |
---|
1388 | 10.30.0.1 |
---|
1389 | Search Domains: |
---|
1390 | |
---|
1391 | 2016-11-22 22:58:26 Connected via tun |
---|
1392 | 2016-11-22 22:58:26 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
1393 | 2016-11-22 22:58:26 LZO-ASYM init swap=0 asym=1 |
---|
1394 | 2016-11-22 22:58:26 Comp-stub init swap=0 |
---|
1395 | 2016-11-22 22:58:26 SetStatus Connected |
---|
1396 | 2016-11-22 23:58:24 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1397 | 2016-11-22 23:58:24 Peer Info: |
---|
1398 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1399 | IV_VER=3.0.11 |
---|
1400 | IV_PLAT=ios |
---|
1401 | IV_NCP=2 |
---|
1402 | IV_TCPNL=1 |
---|
1403 | IV_PROTO=2 |
---|
1404 | IV_LZO_STUB=1 |
---|
1405 | IV_COMP_STUB=1 |
---|
1406 | IV_COMP_STUBv2=1 |
---|
1407 | |
---|
1408 | 2016-11-22 23:58:24 VERIFY OK: depth=1 |
---|
1409 | cert. version : 3 |
---|
1410 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1411 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1412 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1413 | issued on : 2014-04-11 10:15:45 |
---|
1414 | expires on : 2024-04-08 10:15:45 |
---|
1415 | signed using : RSA with SHA1 |
---|
1416 | RSA key size : 4096 bits |
---|
1417 | basic constraints : CA=true |
---|
1418 | |
---|
1419 | 2016-11-22 23:58:24 VERIFY OK: depth=0 |
---|
1420 | cert. version : 3 |
---|
1421 | serial number : 01:0F |
---|
1422 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1423 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1424 | issued on : 2016-03-10 08:48:14 |
---|
1425 | expires on : 2026-03-08 08:48:14 |
---|
1426 | signed using : RSA with SHA1 |
---|
1427 | RSA key size : 4096 bits |
---|
1428 | basic constraints : CA=false |
---|
1429 | cert. type : SSL Server |
---|
1430 | key usage : Digital Signature, Key Encipherment |
---|
1431 | ext key usage : TLS Web Server Authentication |
---|
1432 | |
---|
1433 | 2016-11-22 23:58:25 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
1434 | 2016-11-22 23:58:25 LZO-ASYM init swap=0 asym=1 |
---|
1435 | 2016-11-22 23:58:25 Comp-stub init swap=0 |
---|
1436 | 2016-11-23 00:14:26 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1437 | 2016-11-23 00:14:29 RECONNECT TEST: ReachableViaWiFi |
---|
1438 | 2016-11-23 00:14:29 EVENT: PAUSE |
---|
1439 | 2016-11-23 00:14:30 RESUME TEST: ReachableViaWiFi |
---|
1440 | 2016-11-23 00:14:30 EVENT: RESUME |
---|
1441 | 2016-11-23 00:14:30 EVENT: RECONNECTING |
---|
1442 | 2016-11-23 00:14:30 Contacting 23.88.114.44:2018 via UDP |
---|
1443 | 2016-11-23 00:14:30 EVENT: WAIT |
---|
1444 | 2016-11-23 00:14:30 SetTunnelSocket returned 1 |
---|
1445 | 2016-11-23 00:14:30 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
1446 | 2016-11-23 00:14:30 EVENT: CONNECTING |
---|
1447 | 2016-11-23 00:14:30 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1448 | 2016-11-23 00:14:30 Peer Info: |
---|
1449 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1450 | IV_VER=3.0.11 |
---|
1451 | IV_PLAT=ios |
---|
1452 | IV_NCP=2 |
---|
1453 | IV_TCPNL=1 |
---|
1454 | IV_PROTO=2 |
---|
1455 | IV_LZO_STUB=1 |
---|
1456 | IV_COMP_STUB=1 |
---|
1457 | IV_COMP_STUBv2=1 |
---|
1458 | |
---|
1459 | 2016-11-23 00:14:30 VERIFY OK: depth=1 |
---|
1460 | cert. version : 3 |
---|
1461 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1462 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1463 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1464 | issued on : 2014-04-11 10:15:45 |
---|
1465 | expires on : 2024-04-08 10:15:45 |
---|
1466 | signed using : RSA with SHA1 |
---|
1467 | RSA key size : 4096 bits |
---|
1468 | basic constraints : CA=true |
---|
1469 | |
---|
1470 | 2016-11-23 00:14:30 VERIFY OK: depth=0 |
---|
1471 | cert. version : 3 |
---|
1472 | serial number : 01:0F |
---|
1473 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1474 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1475 | issued on : 2016-03-10 08:48:14 |
---|
1476 | expires on : 2026-03-08 08:48:14 |
---|
1477 | signed using : RSA with SHA1 |
---|
1478 | RSA key size : 4096 bits |
---|
1479 | basic constraints : CA=false |
---|
1480 | cert. type : SSL Server |
---|
1481 | key usage : Digital Signature, Key Encipherment |
---|
1482 | ext key usage : TLS Web Server Authentication |
---|
1483 | |
---|
1484 | 2016-11-23 00:14:32 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
1485 | 2016-11-23 00:14:32 Session is ACTIVE |
---|
1486 | 2016-11-23 00:14:32 EVENT: GET_CONFIG |
---|
1487 | 2016-11-23 00:14:32 Sending PUSH_REQUEST to server... |
---|
1488 | 2016-11-23 00:14:33 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1489 | 2016-11-23 00:14:33 OPTIONS: |
---|
1490 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
1491 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
1492 | 2 [comp-lzo] [no] |
---|
1493 | 3 [route-gateway] [10.30.0.1] |
---|
1494 | 4 [topology] [subnet] |
---|
1495 | 5 [ping] [10] |
---|
1496 | 6 [ping-restart] [60] |
---|
1497 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
1498 | |
---|
1499 | 2016-11-23 00:14:33 PROTOCOL OPTIONS: |
---|
1500 | cipher: AES-256-CBC |
---|
1501 | digest: SHA1 |
---|
1502 | compress: LZO_STUB |
---|
1503 | peer ID: -1 |
---|
1504 | 2016-11-23 00:14:33 EVENT: ASSIGN_IP |
---|
1505 | 2016-11-23 00:14:33 TunPersist: saving tun context: |
---|
1506 | Session Name: 23.88.114.44 |
---|
1507 | Layer: OSI_LAYER_3 |
---|
1508 | Remote Address: 23.88.114.44 |
---|
1509 | Tunnel Addresses: |
---|
1510 | 10.30.0.41/16 -> 10.30.0.1 |
---|
1511 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
1512 | Block IPv6: no |
---|
1513 | Add Routes: |
---|
1514 | Exclude Routes: |
---|
1515 | DNS Servers: |
---|
1516 | 10.30.0.1 |
---|
1517 | Search Domains: |
---|
1518 | |
---|
1519 | 2016-11-23 00:14:33 Connected via tun |
---|
1520 | 2016-11-23 00:14:33 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
1521 | 2016-11-23 00:14:33 LZO-ASYM init swap=0 asym=1 |
---|
1522 | 2016-11-23 00:14:33 Comp-stub init swap=0 |
---|
1523 | 2016-11-23 00:14:33 SetStatus Connected |
---|
1524 | 2016-11-23 00:14:36 RECONNECT TEST: ReachableViaWiFi |
---|
1525 | 2016-11-23 00:14:36 EVENT: PAUSE |
---|
1526 | 2016-11-23 00:14:37 RESUME TEST: ReachableViaWiFi |
---|
1527 | 2016-11-23 00:14:37 EVENT: RESUME |
---|
1528 | 2016-11-23 00:14:37 EVENT: RECONNECTING |
---|
1529 | 2016-11-23 00:14:37 Contacting 23.88.114.44:2018 via UDP |
---|
1530 | 2016-11-23 00:14:37 EVENT: WAIT |
---|
1531 | 2016-11-23 00:14:37 SetTunnelSocket returned 1 |
---|
1532 | 2016-11-23 00:14:37 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
1533 | 2016-11-23 00:14:37 EVENT: CONNECTING |
---|
1534 | 2016-11-23 00:14:37 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1535 | 2016-11-23 00:14:37 Peer Info: |
---|
1536 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1537 | IV_VER=3.0.11 |
---|
1538 | IV_PLAT=ios |
---|
1539 | IV_NCP=2 |
---|
1540 | IV_TCPNL=1 |
---|
1541 | IV_PROTO=2 |
---|
1542 | IV_LZO_STUB=1 |
---|
1543 | IV_COMP_STUB=1 |
---|
1544 | IV_COMP_STUBv2=1 |
---|
1545 | |
---|
1546 | 2016-11-23 00:14:37 VERIFY OK: depth=1 |
---|
1547 | cert. version : 3 |
---|
1548 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1549 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1550 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1551 | issued on : 2014-04-11 10:15:45 |
---|
1552 | expires on : 2024-04-08 10:15:45 |
---|
1553 | signed using : RSA with SHA1 |
---|
1554 | RSA key size : 4096 bits |
---|
1555 | basic constraints : CA=true |
---|
1556 | |
---|
1557 | 2016-11-23 00:14:37 VERIFY OK: depth=0 |
---|
1558 | cert. version : 3 |
---|
1559 | serial number : 01:0F |
---|
1560 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1561 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1562 | issued on : 2016-03-10 08:48:14 |
---|
1563 | expires on : 2026-03-08 08:48:14 |
---|
1564 | signed using : RSA with SHA1 |
---|
1565 | RSA key size : 4096 bits |
---|
1566 | basic constraints : CA=false |
---|
1567 | cert. type : SSL Server |
---|
1568 | key usage : Digital Signature, Key Encipherment |
---|
1569 | ext key usage : TLS Web Server Authentication |
---|
1570 | |
---|
1571 | 2016-11-23 00:14:38 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
1572 | 2016-11-23 00:14:38 Session is ACTIVE |
---|
1573 | 2016-11-23 00:14:38 EVENT: GET_CONFIG |
---|
1574 | 2016-11-23 00:14:38 Sending PUSH_REQUEST to server... |
---|
1575 | 2016-11-23 00:14:39 OPTIONS: |
---|
1576 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
1577 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
1578 | 2 [comp-lzo] [no] |
---|
1579 | 3 [route-gateway] [10.30.0.1] |
---|
1580 | 4 [topology] [subnet] |
---|
1581 | 5 [ping] [10] |
---|
1582 | 6 [ping-restart] [60] |
---|
1583 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
1584 | |
---|
1585 | 2016-11-23 00:14:39 PROTOCOL OPTIONS: |
---|
1586 | cipher: AES-256-CBC |
---|
1587 | digest: SHA1 |
---|
1588 | compress: LZO_STUB |
---|
1589 | peer ID: -1 |
---|
1590 | 2016-11-23 00:14:39 TunPersist: reused tun context |
---|
1591 | 2016-11-23 00:14:39 Connected via tun |
---|
1592 | 2016-11-23 00:14:39 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
1593 | 2016-11-23 00:14:39 LZO-ASYM init swap=0 asym=1 |
---|
1594 | 2016-11-23 00:14:39 Comp-stub init swap=0 |
---|
1595 | 2016-11-23 00:14:39 SetStatus Connected |
---|
1596 | 2016-11-23 00:31:13 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1597 | 2016-11-23 00:31:16 RECONNECT TEST: ReachableViaWiFi |
---|
1598 | 2016-11-23 00:31:16 EVENT: PAUSE |
---|
1599 | 2016-11-23 00:31:17 RESUME TEST: ReachableViaWiFi |
---|
1600 | 2016-11-23 00:31:17 EVENT: RESUME |
---|
1601 | 2016-11-23 00:31:17 EVENT: RECONNECTING |
---|
1602 | 2016-11-23 00:31:17 Contacting 23.88.114.44:2018 via UDP |
---|
1603 | 2016-11-23 00:31:17 EVENT: WAIT |
---|
1604 | 2016-11-23 00:31:17 SetTunnelSocket returned 1 |
---|
1605 | 2016-11-23 00:31:17 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
1606 | 2016-11-23 00:31:17 EVENT: CONNECTING |
---|
1607 | 2016-11-23 00:31:17 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1608 | 2016-11-23 00:31:17 Peer Info: |
---|
1609 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1610 | IV_VER=3.0.11 |
---|
1611 | IV_PLAT=ios |
---|
1612 | IV_NCP=2 |
---|
1613 | IV_TCPNL=1 |
---|
1614 | IV_PROTO=2 |
---|
1615 | IV_LZO_STUB=1 |
---|
1616 | IV_COMP_STUB=1 |
---|
1617 | IV_COMP_STUBv2=1 |
---|
1618 | |
---|
1619 | 2016-11-23 00:31:17 VERIFY OK: depth=1 |
---|
1620 | cert. version : 3 |
---|
1621 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1622 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1623 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1624 | issued on : 2014-04-11 10:15:45 |
---|
1625 | expires on : 2024-04-08 10:15:45 |
---|
1626 | signed using : RSA with SHA1 |
---|
1627 | RSA key size : 4096 bits |
---|
1628 | basic constraints : CA=true |
---|
1629 | |
---|
1630 | 2016-11-23 00:31:17 VERIFY OK: depth=0 |
---|
1631 | cert. version : 3 |
---|
1632 | serial number : 01:0F |
---|
1633 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1634 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1635 | issued on : 2016-03-10 08:48:14 |
---|
1636 | expires on : 2026-03-08 08:48:14 |
---|
1637 | signed using : RSA with SHA1 |
---|
1638 | RSA key size : 4096 bits |
---|
1639 | basic constraints : CA=false |
---|
1640 | cert. type : SSL Server |
---|
1641 | key usage : Digital Signature, Key Encipherment |
---|
1642 | ext key usage : TLS Web Server Authentication |
---|
1643 | |
---|
1644 | 2016-11-23 00:31:18 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi |
---|
1645 | 2016-11-23 00:31:19 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
1646 | 2016-11-23 00:31:19 Session is ACTIVE |
---|
1647 | 2016-11-23 00:31:19 EVENT: GET_CONFIG |
---|
1648 | 2016-11-23 00:31:19 Sending PUSH_REQUEST to server... |
---|
1649 | 2016-11-23 00:31:20 OPTIONS: |
---|
1650 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
1651 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
1652 | 2 [comp-lzo] [no] |
---|
1653 | 3 [route-gateway] [10.30.0.1] |
---|
1654 | 4 [topology] [subnet] |
---|
1655 | 5 [ping] [10] |
---|
1656 | 6 [ping-restart] [60] |
---|
1657 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
1658 | |
---|
1659 | 2016-11-23 00:31:20 PROTOCOL OPTIONS: |
---|
1660 | cipher: AES-256-CBC |
---|
1661 | digest: SHA1 |
---|
1662 | compress: LZO_STUB |
---|
1663 | peer ID: -1 |
---|
1664 | 2016-11-23 00:31:20 EVENT: ASSIGN_IP |
---|
1665 | 2016-11-23 00:31:20 TunPersist: saving tun context: |
---|
1666 | Session Name: 23.88.114.44 |
---|
1667 | Layer: OSI_LAYER_3 |
---|
1668 | Remote Address: 23.88.114.44 |
---|
1669 | Tunnel Addresses: |
---|
1670 | 10.30.0.41/16 -> 10.30.0.1 |
---|
1671 | Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ] |
---|
1672 | Block IPv6: no |
---|
1673 | Add Routes: |
---|
1674 | Exclude Routes: |
---|
1675 | DNS Servers: |
---|
1676 | 10.30.0.1 |
---|
1677 | Search Domains: |
---|
1678 | |
---|
1679 | 2016-11-23 00:31:20 Connected via tun |
---|
1680 | 2016-11-23 00:31:20 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
1681 | 2016-11-23 00:31:20 LZO-ASYM init swap=0 asym=1 |
---|
1682 | 2016-11-23 00:31:20 Comp-stub init swap=0 |
---|
1683 | 2016-11-23 00:31:20 SetStatus Connected |
---|
1684 | 2016-11-23 00:31:21 RECONNECT TEST: ReachableViaWiFi |
---|
1685 | 2016-11-23 00:31:21 EVENT: PAUSE |
---|
1686 | 2016-11-23 00:31:22 RESUME TEST: ReachableViaWiFi |
---|
1687 | 2016-11-23 00:31:22 EVENT: RESUME |
---|
1688 | 2016-11-23 00:31:22 EVENT: RECONNECTING |
---|
1689 | 2016-11-23 00:31:22 Contacting 23.88.114.44:2018 via UDP |
---|
1690 | 2016-11-23 00:31:22 EVENT: WAIT |
---|
1691 | 2016-11-23 00:31:22 SetTunnelSocket returned 1 |
---|
1692 | 2016-11-23 00:31:22 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4 |
---|
1693 | 2016-11-23 00:31:22 EVENT: CONNECTING |
---|
1694 | 2016-11-23 00:31:22 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client |
---|
1695 | 2016-11-23 00:31:22 Peer Info: |
---|
1696 | IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199 |
---|
1697 | IV_VER=3.0.11 |
---|
1698 | IV_PLAT=ios |
---|
1699 | IV_NCP=2 |
---|
1700 | IV_TCPNL=1 |
---|
1701 | IV_PROTO=2 |
---|
1702 | IV_LZO_STUB=1 |
---|
1703 | IV_COMP_STUB=1 |
---|
1704 | IV_COMP_STUBv2=1 |
---|
1705 | |
---|
1706 | 2016-11-23 00:31:22 VERIFY OK: depth=1 |
---|
1707 | cert. version : 3 |
---|
1708 | serial number : 8C:D8:43:EF:E4:5F:20:03 |
---|
1709 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1710 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1711 | issued on : 2014-04-11 10:15:45 |
---|
1712 | expires on : 2024-04-08 10:15:45 |
---|
1713 | signed using : RSA with SHA1 |
---|
1714 | RSA key size : 4096 bits |
---|
1715 | basic constraints : CA=true |
---|
1716 | |
---|
1717 | 2016-11-23 00:31:22 VERIFY OK: depth=0 |
---|
1718 | cert. version : 3 |
---|
1719 | serial number : 01:0F |
---|
1720 | issuer name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
1721 | subject name : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org |
---|
1722 | issued on : 2016-03-10 08:48:14 |
---|
1723 | expires on : 2026-03-08 08:48:14 |
---|
1724 | signed using : RSA with SHA1 |
---|
1725 | RSA key size : 4096 bits |
---|
1726 | basic constraints : CA=false |
---|
1727 | cert. type : SSL Server |
---|
1728 | key usage : Digital Signature, Key Encipherment |
---|
1729 | ext key usage : TLS Web Server Authentication |
---|
1730 | |
---|
1731 | 2016-11-23 00:31:24 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 |
---|
1732 | 2016-11-23 00:31:24 Session is ACTIVE |
---|
1733 | 2016-11-23 00:31:24 EVENT: GET_CONFIG |
---|
1734 | 2016-11-23 00:31:24 Sending PUSH_REQUEST to server... |
---|
1735 | 2016-11-23 00:31:24 OPTIONS: |
---|
1736 | 0 [redirect-gateway] [def1] [bypass-dhcp] |
---|
1737 | 1 [dhcp-option] [DNS] [10.30.0.1] |
---|
1738 | 2 [comp-lzo] [no] |
---|
1739 | 3 [route-gateway] [10.30.0.1] |
---|
1740 | 4 [topology] [subnet] |
---|
1741 | 5 [ping] [10] |
---|
1742 | 6 [ping-restart] [60] |
---|
1743 | 7 [ifconfig] [10.30.0.41] [255.255.0.0] |
---|
1744 | |
---|
1745 | 2016-11-23 00:31:24 PROTOCOL OPTIONS: |
---|
1746 | cipher: AES-256-CBC |
---|
1747 | digest: SHA1 |
---|
1748 | compress: LZO_STUB |
---|
1749 | peer ID: -1 |
---|
1750 | 2016-11-23 00:31:24 TunPersist: reused tun context |
---|
1751 | 2016-11-23 00:31:24 Connected via tun |
---|
1752 | 2016-11-23 00:31:24 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/ |
---|
1753 | 2016-11-23 00:31:24 LZO-ASYM init swap=0 asym=1 |
---|
1754 | 2016-11-23 00:31:24 Comp-stub init swap=0 |
---|
1755 | 2016-11-23 00:31:24 SetStatus Connected |
---|
1756 | |
---|
1757 | |
---|
1758 | Sent from my iPad |
---|