1 | Fri Feb 14 08:31:35 2020 OpenVPN 2.4.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 |
---|
2 | Fri Feb 14 08:31:35 2020 Windows version 6.2 (Windows 8 or greater) 64bit |
---|
3 | Fri Feb 14 08:31:35 2020 library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 |
---|
4 | Enter Management Password: |
---|
5 | Fri Feb 14 08:31:35 2020 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25351 |
---|
6 | Fri Feb 14 08:31:35 2020 Need hold release from management interface, waiting... |
---|
7 | Fri Feb 14 08:31:35 2020 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25351 |
---|
8 | Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'state on' |
---|
9 | Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'log all on' |
---|
10 | Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'echo all on' |
---|
11 | Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'bytecount 5' |
---|
12 | Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'hold off' |
---|
13 | Fri Feb 14 08:31:36 2020 MANAGEMENT: CMD 'hold release' |
---|
14 | Fri Feb 14 08:31:36 2020 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication |
---|
15 | Fri Feb 14 08:31:36 2020 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication |
---|
16 | Fri Feb 14 08:31:36 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.223.129:443 |
---|
17 | Fri Feb 14 08:31:36 2020 Socket Buffers: R=[65536->262144] S=[65536->262144] |
---|
18 | Fri Feb 14 08:31:36 2020 UDP link local: (not bound) |
---|
19 | Fri Feb 14 08:31:36 2020 UDP link remote: [AF_INET]199.249.223.129:443 |
---|
20 | Fri Feb 14 08:31:36 2020 MANAGEMENT: >STATE:1581697896,WAIT,,,,,, |
---|
21 | Fri Feb 14 08:31:36 2020 MANAGEMENT: >STATE:1581697896,AUTH,,,,,, |
---|
22 | Fri Feb 14 08:31:36 2020 TLS: Initial packet from [AF_INET]199.249.223.129:443, sid=722baa9c 945ffb5e |
---|
23 | Fri Feb 14 08:31:36 2020 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org |
---|
24 | Fri Feb 14 08:31:36 2020 VERIFY KU OK |
---|
25 | Fri Feb 14 08:31:36 2020 Validating certificate extended key usage |
---|
26 | Fri Feb 14 08:31:36 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
27 | Fri Feb 14 08:31:36 2020 VERIFY EKU OK |
---|
28 | Fri Feb 14 08:31:36 2020 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org |
---|
29 | Fri Feb 14 08:31:36 2020 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA |
---|
30 | Fri Feb 14 08:31:36 2020 [Aquila] Peer Connection Initiated with [AF_INET]199.249.223.129:443 |
---|
31 | Fri Feb 14 08:31:37 2020 MANAGEMENT: >STATE:1581697897,GET_CONFIG,,,,,, |
---|
32 | Fri Feb 14 08:31:37 2020 SENT CONTROL [Aquila]: 'PUSH_REQUEST' (status=1) |
---|
33 | Fri Feb 14 08:31:37 2020 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.9.176.1,route-gateway 10.9.176.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.9.176.11 255.255.255.0,peer-id 6,cipher AES-256-GCM' |
---|
34 | Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: timers and/or timeouts modified |
---|
35 | Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: compression parms modified |
---|
36 | Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: --ifconfig/up options modified |
---|
37 | Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: route options modified |
---|
38 | Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: route-related options modified |
---|
39 | Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified |
---|
40 | Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: peer-id set |
---|
41 | Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: adjusting link_mtu to 1625 |
---|
42 | Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: data channel crypto options modified |
---|
43 | Fri Feb 14 08:31:37 2020 Data Channel: using negotiated cipher 'AES-256-GCM' |
---|
44 | Fri Feb 14 08:31:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
45 | Fri Feb 14 08:31:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
46 | Fri Feb 14 08:31:37 2020 interactive service msg_channel=388 |
---|
47 | Fri Feb 14 08:31:37 2020 ROUTE_GATEWAY 172.31.98.1/255.255.254.0 I=4 HWADDR=f8:59:71:6a:11:98 |
---|
48 | Fri Feb 14 08:31:37 2020 open_tun |
---|
49 | Fri Feb 14 08:31:37 2020 TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{574C514E-37B6-4A31-AD8B-B05DCFCED282}.tap |
---|
50 | Fri Feb 14 08:31:37 2020 TAP-Windows Driver Version 9.24 |
---|
51 | Fri Feb 14 08:31:37 2020 Set TAP-Windows TUN subnet mode network/local/netmask = 10.9.176.0/10.9.176.11/255.255.255.0 [SUCCEEDED] |
---|
52 | Fri Feb 14 08:31:37 2020 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.176.11/255.255.255.0 on interface {574C514E-37B6-4A31-AD8B-B05DCFCED282} [DHCP-serv: 10.9.176.254, lease-time: 31536000] |
---|
53 | Fri Feb 14 08:31:37 2020 Successful ARP Flush on interface [14] {574C514E-37B6-4A31-AD8B-B05DCFCED282} |
---|
54 | Fri Feb 14 08:31:37 2020 MANAGEMENT: >STATE:1581697897,ASSIGN_IP,,10.9.176.11,,,, |
---|
55 | Fri Feb 14 08:31:42 2020 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up |
---|
56 | Fri Feb 14 08:31:42 2020 C:\Windows\system32\route.exe ADD 199.249.223.129 MASK 255.255.255.255 172.31.98.1 |
---|
57 | Fri Feb 14 08:31:42 2020 Route addition via service succeeded |
---|
58 | Fri Feb 14 08:31:42 2020 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.9.176.1 |
---|
59 | Fri Feb 14 08:31:42 2020 Route addition via service succeeded |
---|
60 | Fri Feb 14 08:31:42 2020 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.9.176.1 |
---|
61 | Fri Feb 14 08:31:42 2020 Route addition via service succeeded |
---|
62 | Fri Feb 14 08:31:42 2020 Initialization Sequence Completed |
---|
63 | Fri Feb 14 08:31:42 2020 MANAGEMENT: >STATE:1581697902,CONNECTED,SUCCESS,10.9.176.11,199.249.223.129,443,, |
---|
64 | Fri Feb 14 08:31:57 2020 SIGTERM received, sending exit notification to peer |
---|
65 | Fri Feb 14 08:32:02 2020 C:\Windows\system32\route.exe DELETE 199.249.223.129 MASK 255.255.255.255 172.31.98.1 |
---|
66 | Fri Feb 14 08:32:02 2020 Route deletion via service succeeded |
---|
67 | Fri Feb 14 08:32:02 2020 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.9.176.1 |
---|
68 | Fri Feb 14 08:32:02 2020 Route deletion via service succeeded |
---|
69 | Fri Feb 14 08:32:02 2020 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.9.176.1 |
---|
70 | Fri Feb 14 08:32:02 2020 Route deletion via service succeeded |
---|
71 | Fri Feb 14 08:32:02 2020 Closing TUN/TAP interface |
---|
72 | Fri Feb 14 08:32:02 2020 TAP: DHCP address released |
---|
73 | Fri Feb 14 08:32:02 2020 SIGTERM[soft,exit-with-notification] received, process exiting |
---|
74 | Fri Feb 14 08:32:02 2020 MANAGEMENT: >STATE:1581697922,EXITING,exit-with-notification,,,,, |
---|