Ticket #1253: AirVPN_US-Fremont-California_Aquila_UDP-443.log

File AirVPN_US-Fremont-California_Aquila_UDP-443.log, 6.1 KB (added by John Navas, 7 months ago)

Log

Line 
1Fri Feb 14 08:31:35 2020 OpenVPN 2.4.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
2Fri Feb 14 08:31:35 2020 Windows version 6.2 (Windows 8 or greater) 64bit
3Fri Feb 14 08:31:35 2020 library versions: OpenSSL 1.1.0l  10 Sep 2019, LZO 2.10
4Enter Management Password:
5Fri Feb 14 08:31:35 2020 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25351
6Fri Feb 14 08:31:35 2020 Need hold release from management interface, waiting...
7Fri Feb 14 08:31:35 2020 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25351
8Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'state on'
9Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'log all on'
10Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'echo all on'
11Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'bytecount 5'
12Fri Feb 14 08:31:35 2020 MANAGEMENT: CMD 'hold off'
13Fri Feb 14 08:31:36 2020 MANAGEMENT: CMD 'hold release'
14Fri Feb 14 08:31:36 2020 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
15Fri Feb 14 08:31:36 2020 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
16Fri Feb 14 08:31:36 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.223.129:443
17Fri Feb 14 08:31:36 2020 Socket Buffers: R=[65536->262144] S=[65536->262144]
18Fri Feb 14 08:31:36 2020 UDP link local: (not bound)
19Fri Feb 14 08:31:36 2020 UDP link remote: [AF_INET]199.249.223.129:443
20Fri Feb 14 08:31:36 2020 MANAGEMENT: >STATE:1581697896,WAIT,,,,,,
21Fri Feb 14 08:31:36 2020 MANAGEMENT: >STATE:1581697896,AUTH,,,,,,
22Fri Feb 14 08:31:36 2020 TLS: Initial packet from [AF_INET]199.249.223.129:443, sid=722baa9c 945ffb5e
23Fri Feb 14 08:31:36 2020 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
24Fri Feb 14 08:31:36 2020 VERIFY KU OK
25Fri Feb 14 08:31:36 2020 Validating certificate extended key usage
26Fri Feb 14 08:31:36 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
27Fri Feb 14 08:31:36 2020 VERIFY EKU OK
28Fri Feb 14 08:31:36 2020 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Aquila, emailAddress=info@airvpn.org
29Fri Feb 14 08:31:36 2020 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
30Fri Feb 14 08:31:36 2020 [Aquila] Peer Connection Initiated with [AF_INET]199.249.223.129:443
31Fri Feb 14 08:31:37 2020 MANAGEMENT: >STATE:1581697897,GET_CONFIG,,,,,,
32Fri Feb 14 08:31:37 2020 SENT CONTROL [Aquila]: 'PUSH_REQUEST' (status=1)
33Fri Feb 14 08:31:37 2020 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.9.176.1,route-gateway 10.9.176.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.9.176.11 255.255.255.0,peer-id 6,cipher AES-256-GCM'
34Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: timers and/or timeouts modified
35Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: compression parms modified
36Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: --ifconfig/up options modified
37Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: route options modified
38Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: route-related options modified
39Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
40Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: peer-id set
41Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: adjusting link_mtu to 1625
42Fri Feb 14 08:31:37 2020 OPTIONS IMPORT: data channel crypto options modified
43Fri Feb 14 08:31:37 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
44Fri Feb 14 08:31:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
45Fri Feb 14 08:31:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
46Fri Feb 14 08:31:37 2020 interactive service msg_channel=388
47Fri Feb 14 08:31:37 2020 ROUTE_GATEWAY 172.31.98.1/255.255.254.0 I=4 HWADDR=f8:59:71:6a:11:98
48Fri Feb 14 08:31:37 2020 open_tun
49Fri Feb 14 08:31:37 2020 TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{574C514E-37B6-4A31-AD8B-B05DCFCED282}.tap
50Fri Feb 14 08:31:37 2020 TAP-Windows Driver Version 9.24
51Fri Feb 14 08:31:37 2020 Set TAP-Windows TUN subnet mode network/local/netmask = 10.9.176.0/10.9.176.11/255.255.255.0 [SUCCEEDED]
52Fri Feb 14 08:31:37 2020 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.176.11/255.255.255.0 on interface {574C514E-37B6-4A31-AD8B-B05DCFCED282} [DHCP-serv: 10.9.176.254, lease-time: 31536000]
53Fri Feb 14 08:31:37 2020 Successful ARP Flush on interface [14] {574C514E-37B6-4A31-AD8B-B05DCFCED282}
54Fri Feb 14 08:31:37 2020 MANAGEMENT: >STATE:1581697897,ASSIGN_IP,,10.9.176.11,,,,
55Fri Feb 14 08:31:42 2020 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
56Fri Feb 14 08:31:42 2020 C:\Windows\system32\route.exe ADD 199.249.223.129 MASK 255.255.255.255 172.31.98.1
57Fri Feb 14 08:31:42 2020 Route addition via service succeeded
58Fri Feb 14 08:31:42 2020 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.9.176.1
59Fri Feb 14 08:31:42 2020 Route addition via service succeeded
60Fri Feb 14 08:31:42 2020 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.9.176.1
61Fri Feb 14 08:31:42 2020 Route addition via service succeeded
62Fri Feb 14 08:31:42 2020 Initialization Sequence Completed
63Fri Feb 14 08:31:42 2020 MANAGEMENT: >STATE:1581697902,CONNECTED,SUCCESS,10.9.176.11,199.249.223.129,443,,
64Fri Feb 14 08:31:57 2020 SIGTERM received, sending exit notification to peer
65Fri Feb 14 08:32:02 2020 C:\Windows\system32\route.exe DELETE 199.249.223.129 MASK 255.255.255.255 172.31.98.1
66Fri Feb 14 08:32:02 2020 Route deletion via service succeeded
67Fri Feb 14 08:32:02 2020 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.9.176.1
68Fri Feb 14 08:32:02 2020 Route deletion via service succeeded
69Fri Feb 14 08:32:02 2020 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.9.176.1
70Fri Feb 14 08:32:02 2020 Route deletion via service succeeded
71Fri Feb 14 08:32:02 2020 Closing TUN/TAP interface
72Fri Feb 14 08:32:02 2020 TAP: DHCP address released
73Fri Feb 14 08:32:02 2020 SIGTERM[soft,exit-with-notification] received, process exiting
74Fri Feb 14 08:32:02 2020 MANAGEMENT: >STATE:1581697922,EXITING,exit-with-notification,,,,,