Ticket #1272: openvpn-ticket1272.log

File openvpn-ticket1272.log, 30.7 KB (added by kia0, 2 years ago)

Example log

Line 
1Wed Apr  8 15:15:54 2020 us=372733 MULTI: multi_create_instance called
2Wed Apr  8 15:15:54 2020 us=372779 185.97.aa.bb:13057 Re-using SSL/TLS context
3Wed Apr  8 15:15:54 2020 us=372791 185.97.aa.bb:13057 LZO compression initializing
4Wed Apr  8 15:15:54 2020 us=372877 185.97.aa.bb:13057 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
5Wed Apr  8 15:15:54 2020 us=372891 185.97.aa.bb:13057 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
6Wed Apr  8 15:15:54 2020 us=372934 185.97.aa.bb:13057 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
7Wed Apr  8 15:15:54 2020 us=372942 185.97.aa.bb:13057 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
8Wed Apr  8 15:15:54 2020 us=372972 185.97.aa.bb:13057 TLS: Initial packet from [AF_INET]185.97.aa.bb:13057, sid=65634234 86f665e1
9Wed Apr  8 15:15:54 2020 us=580045 185.97.aa.bb:13057 VERIFY OK: depth=1, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Tech. department, CN=SOLVO, emailAddress=tech@domain.com
10Wed Apr  8 15:15:54 2020 us=580165 185.97.aa.bb:13057 VERIFY OK: depth=0, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=RADIO, CN=akuznetcov, emailAddress=akuznetcov@domain.com
11Wed Apr  8 15:15:54 2020 us=584348 185.97.aa.bb:13057 peer info: IV_VER=2.4.8
12Wed Apr  8 15:15:54 2020 us=584366 185.97.aa.bb:13057 peer info: IV_PLAT=win
13Wed Apr  8 15:15:54 2020 us=584374 185.97.aa.bb:13057 peer info: IV_PROTO=2
14Wed Apr  8 15:15:54 2020 us=584380 185.97.aa.bb:13057 peer info: IV_NCP=2
15Wed Apr  8 15:15:54 2020 us=584386 185.97.aa.bb:13057 peer info: IV_LZ4=1
16Wed Apr  8 15:15:54 2020 us=584393 185.97.aa.bb:13057 peer info: IV_LZ4v2=1
17Wed Apr  8 15:15:54 2020 us=584399 185.97.aa.bb:13057 peer info: IV_LZO=1
18Wed Apr  8 15:15:54 2020 us=584405 185.97.aa.bb:13057 peer info: IV_COMP_STUB=1
19Wed Apr  8 15:15:54 2020 us=584411 185.97.aa.bb:13057 peer info: IV_COMP_STUBv2=1
20Wed Apr  8 15:15:54 2020 us=584417 185.97.aa.bb:13057 peer info: IV_TCPNL=1
21Wed Apr  8 15:15:54 2020 us=584424 185.97.aa.bb:13057 peer info: IV_GUI_VER=OpenVPN_GUI_11
22Wed Apr  8 15:15:54 2020 us=599650 185.97.aa.bb:13057 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
23Wed Apr  8 15:15:54 2020 us=599675 185.97.aa.bb:13057 [akuznetcov] Peer Connection Initiated with [AF_INET]185.97.aa.bb:13057
24Wed Apr  8 15:15:54 2020 us=599722 akuznetcov/185.97.aa.bb:13057 MULTI_sva: pool returned IPv4=172.16.87.216, IPv6=(Not enabled)
25Wed Apr  8 15:15:54 2020 us=601354 akuznetcov/185.97.aa.bb:13057 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_6b5ced94ce05df7b4a2c6bf990683dec.tmp
26Wed Apr  8 15:15:54 2020 us=601425 akuznetcov/185.97.aa.bb:13057 MULTI: Learn: 172.16.87.216 -> akuznetcov/185.97.aa.bb:13057
27Wed Apr  8 15:15:54 2020 us=601436 akuznetcov/185.97.aa.bb:13057 MULTI: primary virtual IP for akuznetcov/185.97.aa.bb:13057: 172.16.87.216
28Wed Apr  8 15:15:55 2020 us=463716 akuznetcov/185.97.aa.bb:13057 PUSH: Received control message: 'PUSH_REQUEST'
29Wed Apr  8 15:15:55 2020 us=463754 akuznetcov/185.97.aa.bb:13057 SENT CONTROL [akuznetcov]: 'PUSH_REPLY,topology subnet,route-gateway 172.16.87.1,route 172.16.80.0 255.255.240.0 vpn_gateway,dhcp-option DNS 172.16.80.4,dhcp-option DNS 172.16.80.5,dhcp-option WINS 172.16.80.23,register-dns,ping 10,ping-restart 60,ifconfig 172.16.87.216 255.255.255.0,peer-id 115,cipher AES-256-GCM' (status=1)
30Wed Apr  8 15:15:55 2020 us=463764 akuznetcov/185.97.aa.bb:13057 Data Channel: using negotiated cipher 'AES-256-GCM'
31Wed Apr  8 15:15:55 2020 us=463777 akuznetcov/185.97.aa.bb:13057 Data Channel MTU parms [ L:1550 D:1450 EF:50 EB:406 ET:0 EL:3 ]
32Wed Apr  8 15:15:55 2020 us=463834 akuznetcov/185.97.aa.bb:13057 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
33Wed Apr  8 15:15:55 2020 us=463843 akuznetcov/185.97.aa.bb:13057 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
34
35Wed Apr  8 16:15:54 2020 us=437973 akuznetcov/185.97.aa.bb:13057 TLS: soft reset sec=0 bytes=5021089/-1 pkts=13290/0
36Wed Apr  8 16:15:54 2020 us=582596 akuznetcov/185.97.aa.bb:13057 VERIFY OK: depth=1, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Tech. department, CN=SOLVO, emailAddress=tech@domain.com
37Wed Apr  8 16:15:54 2020 us=582730 akuznetcov/185.97.aa.bb:13057 VERIFY OK: depth=0, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=RADIO, CN=akuznetcov, emailAddress=akuznetcov@domain.com
38Wed Apr  8 16:15:54 2020 us=620331 akuznetcov/185.97.aa.bb:13057 peer info: IV_VER=2.4.8
39Wed Apr  8 16:15:54 2020 us=620349 akuznetcov/185.97.aa.bb:13057 peer info: IV_PLAT=win
40Wed Apr  8 16:15:54 2020 us=620362 akuznetcov/185.97.aa.bb:13057 peer info: IV_PROTO=2
41Wed Apr  8 16:15:54 2020 us=620369 akuznetcov/185.97.aa.bb:13057 peer info: IV_LZ4=1
42Wed Apr  8 16:15:54 2020 us=620376 akuznetcov/185.97.aa.bb:13057 peer info: IV_LZ4v2=1
43Wed Apr  8 16:15:54 2020 us=620382 akuznetcov/185.97.aa.bb:13057 peer info: IV_LZO=1
44Wed Apr  8 16:15:54 2020 us=620388 akuznetcov/185.97.aa.bb:13057 peer info: IV_COMP_STUB=1
45Wed Apr  8 16:15:54 2020 us=620394 akuznetcov/185.97.aa.bb:13057 peer info: IV_COMP_STUBv2=1
46Wed Apr  8 16:15:54 2020 us=620401 akuznetcov/185.97.aa.bb:13057 peer info: IV_TCPNL=1
47Wed Apr  8 16:15:54 2020 us=620407 akuznetcov/185.97.aa.bb:13057 peer info: IV_GUI_VER=OpenVPN_GUI_11
48Wed Apr  8 16:15:54 2020 us=620476 akuznetcov/185.97.aa.bb:13057 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
49Wed Apr  8 16:15:54 2020 us=620486 akuznetcov/185.97.aa.bb:13057 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
50Wed Apr  8 16:15:54 2020 us=639534 akuznetcov/185.97.aa.bb:13057 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
51
52Wed Apr  8 16:16:16 2020 us=73019 MULTI: multi_create_instance called
53Wed Apr  8 16:16:16 2020 us=73069 188.170.cc.dd:44427 Re-using SSL/TLS context
54Wed Apr  8 16:16:16 2020 us=73079 188.170.cc.dd:44427 LZO compression initializing
55Wed Apr  8 16:16:16 2020 us=73140 188.170.cc.dd:44427 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
56Wed Apr  8 16:16:16 2020 us=73150 188.170.cc.dd:44427 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
57Wed Apr  8 16:16:16 2020 us=73173 188.170.cc.dd:44427 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
58Wed Apr  8 16:16:16 2020 us=73180 188.170.cc.dd:44427 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
59Wed Apr  8 16:16:16 2020 us=73210 188.170.cc.dd:44427 TLS: Initial packet from [AF_INET]188.170.cc.dd:44427, sid=d254080c e8d63d57
60Wed Apr  8 16:16:16 2020 us=404338 188.170.cc.dd:44427 VERIFY OK: depth=1, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Tech. department, CN=SOLVO, emailAddress=tech@domain.com
61Wed Apr  8 16:16:16 2020 us=404456 188.170.cc.dd:44427 VERIFY OK: depth=0, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Administration, CN=magma, emailAddress=magma@domain.com
62Wed Apr  8 16:16:16 2020 us=463646 188.170.cc.dd:44427 peer info: IV_VER=2.4.6
63Wed Apr  8 16:16:16 2020 us=463675 188.170.cc.dd:44427 peer info: IV_PLAT=win
64Wed Apr  8 16:16:16 2020 us=463683 188.170.cc.dd:44427 peer info: IV_PROTO=2
65Wed Apr  8 16:16:16 2020 us=463689 188.170.cc.dd:44427 peer info: IV_NCP=2
66Wed Apr  8 16:16:16 2020 us=463695 188.170.cc.dd:44427 peer info: IV_LZ4=1
67Wed Apr  8 16:16:16 2020 us=463701 188.170.cc.dd:44427 peer info: IV_LZ4v2=1
68Wed Apr  8 16:16:16 2020 us=463707 188.170.cc.dd:44427 peer info: IV_LZO=1
69Wed Apr  8 16:16:16 2020 us=463713 188.170.cc.dd:44427 peer info: IV_COMP_STUB=1
70Wed Apr  8 16:16:16 2020 us=463720 188.170.cc.dd:44427 peer info: IV_COMP_STUBv2=1
71Wed Apr  8 16:16:16 2020 us=463727 188.170.cc.dd:44427 peer info: IV_TCPNL=1
72Wed Apr  8 16:16:16 2020 us=463733 188.170.cc.dd:44427 peer info: IV_GUI_VER=OpenVPN_GUI_11
73Wed Apr  8 16:16:16 2020 us=543333 188.170.cc.dd:44427 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
74Wed Apr  8 16:16:16 2020 us=543372 188.170.cc.dd:44427 [magma] Peer Connection Initiated with [AF_INET]188.170.cc.dd:44427
75Wed Apr  8 16:16:16 2020 us=543423 magma/188.170.cc.dd:44427 MULTI_sva: pool returned IPv4=172.16.87.183, IPv6=(Not enabled)
76Wed Apr  8 16:16:16 2020 us=544841 magma/188.170.cc.dd:44427 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_45fd7049e35a45755560e29bf9506df3.tmp
77Wed Apr  8 16:16:16 2020 us=544907 magma/188.170.cc.dd:44427 MULTI: Learn: 172.16.87.183 -> magma/188.170.cc.dd:44427
78Wed Apr  8 16:16:16 2020 us=544918 magma/188.170.cc.dd:44427 MULTI: primary virtual IP for magma/188.170.cc.dd:44427: 172.16.87.183
79Wed Apr  8 16:16:17 2020 us=263417 magma/188.170.cc.dd:44427 PUSH: Received control message: 'PUSH_REQUEST'
80Wed Apr  8 16:16:17 2020 us=263460 magma/188.170.cc.dd:44427 SENT CONTROL [magma]: 'PUSH_REPLY,topology subnet,route-gateway 172.16.87.1,route 172.16.80.0 255.255.240.0 vpn_gateway,dhcp-option DNS 172.16.80.4,dhcp-option DNS 172.16.80.5,dhcp-option WINS 172.16.80.23,register-dns,ping 10,ping-restart 60,ifconfig 172.16.87.183 255.255.255.0,peer-id 33,cipher AES-256-GCM' (status=1)
81Wed Apr  8 16:16:17 2020 us=263470 magma/188.170.cc.dd:44427 Data Channel: using negotiated cipher 'AES-256-GCM'
82Wed Apr  8 16:16:17 2020 us=263483 magma/188.170.cc.dd:44427 Data Channel MTU parms [ L:1550 D:1450 EF:50 EB:406 ET:0 EL:3 ]
83Wed Apr  8 16:16:17 2020 us=263540 magma/188.170.cc.dd:44427 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
84Wed Apr  8 16:16:17 2020 us=263548 magma/188.170.cc.dd:44427 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
85
86Wed Apr  8 16:16:20 2020 us=269532 MULTI: multi_create_instance called
87Wed Apr  8 16:16:20 2020 us=269584 185.97.aa.bb:13059 Re-using SSL/TLS context
88Wed Apr  8 16:16:20 2020 us=269594 185.97.aa.bb:13059 LZO compression initializing
89Wed Apr  8 16:16:20 2020 us=269650 185.97.aa.bb:13059 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
90Wed Apr  8 16:16:20 2020 us=269660 185.97.aa.bb:13059 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
91Wed Apr  8 16:16:20 2020 us=269683 185.97.aa.bb:13059 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
92Wed Apr  8 16:16:20 2020 us=269690 185.97.aa.bb:13059 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
93Wed Apr  8 16:16:20 2020 us=269720 185.97.aa.bb:13059 TLS: Initial packet from [AF_INET]185.97.aa.bb:13059, sid=7a458fd6 4c6c3c97
94Wed Apr  8 16:16:20 2020 us=371900 185.97.aa.bb:13059 VERIFY OK: depth=1, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Tech. department, CN=SOLVO, emailAddress=tech@domain.com
95Wed Apr  8 16:16:20 2020 us=372018 185.97.aa.bb:13059 VERIFY OK: depth=0, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=RADIO, CN=akuznetcov, emailAddress=akuznetcov@domain.com
96Wed Apr  8 16:16:20 2020 us=397955 185.97.aa.bb:13059 peer info: IV_GUI_VER=OC30Android
97Wed Apr  8 16:16:20 2020 us=397972 185.97.aa.bb:13059 peer info: IV_VER=3.git::f225fcd0:Release
98Wed Apr  8 16:16:20 2020 us=397979 185.97.aa.bb:13059 peer info: IV_PLAT=android
99Wed Apr  8 16:16:20 2020 us=397986 185.97.aa.bb:13059 peer info: IV_NCP=2
100Wed Apr  8 16:16:20 2020 us=397992 185.97.aa.bb:13059 peer info: IV_TCPNL=1
101Wed Apr  8 16:16:20 2020 us=397998 185.97.aa.bb:13059 peer info: IV_PROTO=2
102Wed Apr  8 16:16:20 2020 us=398004 185.97.aa.bb:13059 peer info: IV_LZO_STUB=1
103Wed Apr  8 16:16:20 2020 us=398010 185.97.aa.bb:13059 peer info: IV_COMP_STUB=1
104Wed Apr  8 16:16:20 2020 us=398017 185.97.aa.bb:13059 peer info: IV_COMP_STUBv2=1
105Wed Apr  8 16:16:20 2020 us=398023 185.97.aa.bb:13059 peer info: IV_AUTO_SESS=1
106Wed Apr  8 16:16:20 2020 us=398029 185.97.aa.bb:13059 peer info: IV_BS64DL=1
107Wed Apr  8 16:16:20 2020 us=405011 185.97.aa.bb:13059 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
108Wed Apr  8 16:16:20 2020 us=405040 185.97.aa.bb:13059 [akuznetcov] Peer Connection Initiated with [AF_INET]185.97.aa.bb:13059
109Wed Apr  8 16:16:20 2020 us=406630 MULTI: new connection by client 'akuznetcov' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
110Wed Apr  8 16:16:20 2020 us=406673 MULTI_sva: pool returned IPv4=172.16.87.216, IPv6=(Not enabled)
111Wed Apr  8 16:16:20 2020 us=407676 MULTI: Learn: 172.16.87.216 -> akuznetcov/185.97.aa.bb:13059
112Wed Apr  8 16:16:20 2020 us=407688 MULTI: primary virtual IP for akuznetcov/185.97.aa.bb:13059: 172.16.87.216
113Wed Apr  8 16:16:20 2020 us=407834 akuznetcov/185.97.aa.bb:13059 PUSH: Received control message: 'PUSH_REQUEST'
114Wed Apr  8 16:16:20 2020 us=407858 akuznetcov/185.97.aa.bb:13059 SENT CONTROL [akuznetcov]: 'PUSH_REPLY,topology subnet,route-gateway 172.16.87.1,route 172.16.80.0 255.255.240.0 vpn_gateway,dhcp-option DNS 172.16.80.4,dhcp-option DNS 172.16.80.5,dhcp-option WINS 172.16.80.23,register-dns,ping 10,ping-restart 60,ifconfig 172.16.87.216 255.255.255.0,peer-id 138,cipher AES-256-GCM' (status=1)
115Wed Apr  8 16:16:20 2020 us=407866 akuznetcov/185.97.aa.bb:13059 Data Channel: using negotiated cipher 'AES-256-GCM'
116Wed Apr  8 16:16:20 2020 us=407878 akuznetcov/185.97.aa.bb:13059 Data Channel MTU parms [ L:1550 D:1450 EF:50 EB:406 ET:0 EL:3 ]
117Wed Apr  8 16:16:20 2020 us=407934 akuznetcov/185.97.aa.bb:13059 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
118Wed Apr  8 16:16:20 2020 us=407942 akuznetcov/185.97.aa.bb:13059 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
119Wed Apr  8 16:16:21 2020 us=533215 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
120Wed Apr  8 16:16:21 2020 us=533331 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
121Wed Apr  8 16:16:22 2020 us=547954 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
122Wed Apr  8 16:16:22 2020 us=548153 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
123Wed Apr  8 16:16:23 2020 us=571655 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
124Wed Apr  8 16:16:23 2020 us=572454 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
125Wed Apr  8 16:16:24 2020 us=595034 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
126Wed Apr  8 16:16:24 2020 us=598894 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
127Wed Apr  8 16:16:25 2020 us=626648 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
128Wed Apr  8 16:16:25 2020 us=626679 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
129Wed Apr  8 16:16:27 2020 us=634846 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
130Wed Apr  8 16:16:27 2020 us=635894 akuznetcov/185.97.aa.bb:13059 MULTI: bad source address from client [192.168.31.112], packet dropped
131Wed Apr  8 16:16:31 2020 us=365149 akuznetcov/185.97.aa.bb:13059 SIGTERM[soft,remote-exit] received, client-instance exiting
132
133Wed Apr  8 16:16:36 2020 us=105234 MULTI: multi_create_instance called
134Wed Apr  8 16:16:36 2020 us=105288 188.170.cc.dd:47533 Re-using SSL/TLS context
135Wed Apr  8 16:16:36 2020 us=105298 188.170.cc.dd:47533 LZO compression initializing
136Wed Apr  8 16:16:36 2020 us=105353 188.170.cc.dd:47533 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
137Wed Apr  8 16:16:36 2020 us=105363 188.170.cc.dd:47533 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
138Wed Apr  8 16:16:36 2020 us=105385 188.170.cc.dd:47533 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
139Wed Apr  8 16:16:36 2020 us=105392 188.170.cc.dd:47533 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
140Wed Apr  8 16:16:36 2020 us=105422 188.170.cc.dd:47533 TLS: Initial packet from [AF_INET]188.170.cc.dd:47533, sid=1f52d6e4 1c0b5f26
141Wed Apr  8 16:16:36 2020 us=196129 188.170.cc.dd:47533 VERIFY OK: depth=1, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Tech. department, CN=SOLVO, emailAddress=tech@domain.com
142Wed Apr  8 16:16:36 2020 us=196255 188.170.cc.dd:47533 VERIFY OK: depth=0, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Administration, CN=magma, emailAddress=magma@domain.com
143Wed Apr  8 16:16:36 2020 us=275759 188.170.cc.dd:47533 peer info: IV_VER=2.4.6
144Wed Apr  8 16:16:36 2020 us=275795 188.170.cc.dd:47533 peer info: IV_PLAT=win
145Wed Apr  8 16:16:36 2020 us=275802 188.170.cc.dd:47533 peer info: IV_PROTO=2
146Wed Apr  8 16:16:36 2020 us=275808 188.170.cc.dd:47533 peer info: IV_NCP=2
147Wed Apr  8 16:16:36 2020 us=275815 188.170.cc.dd:47533 peer info: IV_LZ4=1
148Wed Apr  8 16:16:36 2020 us=275821 188.170.cc.dd:47533 peer info: IV_LZ4v2=1
149Wed Apr  8 16:16:36 2020 us=275827 188.170.cc.dd:47533 peer info: IV_LZO=1
150Wed Apr  8 16:16:36 2020 us=275833 188.170.cc.dd:47533 peer info: IV_COMP_STUB=1
151Wed Apr  8 16:16:36 2020 us=275839 188.170.cc.dd:47533 peer info: IV_COMP_STUBv2=1
152Wed Apr  8 16:16:36 2020 us=275845 188.170.cc.dd:47533 peer info: IV_TCPNL=1
153Wed Apr  8 16:16:36 2020 us=275851 188.170.cc.dd:47533 peer info: IV_GUI_VER=OpenVPN_GUI_11
154Wed Apr  8 16:16:36 2020 us=328922 188.170.cc.dd:47533 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
155Wed Apr  8 16:16:36 2020 us=328966 188.170.cc.dd:47533 [magma] Peer Connection Initiated with [AF_INET]188.170.cc.dd:47533
156Wed Apr  8 16:16:36 2020 us=330187 MULTI: new connection by client 'magma' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
157Wed Apr  8 16:16:36 2020 us=330218 MULTI_sva: pool returned IPv4=172.16.87.183, IPv6=(Not enabled)
158Wed Apr  8 16:16:36 2020 us=331210 MULTI: Learn: 172.16.87.183 -> magma/188.170.cc.dd:47533
159Wed Apr  8 16:16:36 2020 us=331221 MULTI: primary virtual IP for magma/188.170.cc.dd:47533: 172.16.87.183
160Wed Apr  8 16:16:36 2020 us=652681 Float requested for peer 115 to 185.97.aa.bb:13057
161Wed Apr  8 16:16:36 2020 us=652710 Key [AF_INET]188.170.cc.dd:47533 [0] not initialized (yet), dropping packet.
162Wed Apr  8 16:16:36 2020 us=652726 peer 115 (magma) floated from 188.170.cc.dd:47533 to [AF_INET]185.97.aa.bb:13057
163Wed Apr  8 16:16:36 2020 us=663696 magma/185.97.aa.bb:13057 Key [AF_INET]185.97.aa.bb:13057 [0] not initialized (yet), dropping packet.
164Wed Apr  8 16:16:39 2020 us=634054 magma/185.97.aa.bb:13057 Key [AF_INET]185.97.aa.bb:13057 [0] not initialized (yet), dropping packet.
165Wed Apr  8 16:16:42 2020 us=642556 magma/185.97.aa.bb:13057 Key [AF_INET]185.97.aa.bb:13057 [0] not initialized (yet), dropping packet.
166Wed Apr  8 16:16:46 2020 us=637200 magma/185.97.aa.bb:13057 Key [AF_INET]185.97.aa.bb:13057 [0] not initialized (yet), dropping packet.
167Wed Apr  8 16:16:47 2020 us=635850 magma/185.97.aa.bb:13057 Key [AF_INET]185.97.aa.bb:13057 [0] not initialized (yet), dropping packet.
168Wed Apr  8 16:16:49 2020 us=635807 magma/185.97.aa.bb:13057 Key [AF_INET]185.97.aa.bb:13057 [0] not initialized (yet), dropping packet.
169Wed Apr  8 16:16:52 2020 us=152449 magma/185.97.aa.bb:13057 Key [AF_INET]185.97.aa.bb:13057 [0] not initialized (yet), dropping packet.
170Wed Apr  8 16:16:52 2020 us=252289 magma/185.97.aa.bb:13057 Key [AF_INET]185.97.aa.bb:13057 [0] not initialized (yet), dropping packet.
171Wed Apr  8 16:16:52 2020 us=448745 magma/185.97.aa.bb:13057 Key [AF_INET]185.97.aa.bb:13057 [0] not initialized (yet), dropping packet.
172Wed Apr  8 16:16:53 2020 us=944310 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
173Wed Apr  8 16:16:55 2020 us=447887 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
174Wed Apr  8 16:16:56 2020 us=637747 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
175Wed Apr  8 16:16:58 2020 us=663222 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
176Wed Apr  8 16:16:59 2020 us=218158 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
177Wed Apr  8 16:17:00 2020 us=643551 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
178Wed Apr  8 16:17:07 2020 us=633920 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
179Wed Apr  8 16:17:08 2020 us=636624 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
180Wed Apr  8 16:17:13 2020 us=903292 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
181Wed Apr  8 16:17:13 2020 us=904579 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
182Wed Apr  8 16:17:13 2020 us=905258 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
183Wed Apr  8 16:17:14 2020 us=636633 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
184Wed Apr  8 16:17:15 2020 us=636575 magma/185.97.aa.bb:13057 TLS Error: local/remote TLS keys are out of sync: [AF_INET]185.97.aa.bb:13057 [1]
185
186Wed Apr  8 16:17:18 2020 us=764742 MULTI: multi_create_instance called
187Wed Apr  8 16:17:18 2020 us=764808 188.170.cc.dd:13199 Re-using SSL/TLS context
188Wed Apr  8 16:17:18 2020 us=764824 188.170.cc.dd:13199 LZO compression initializing
189Wed Apr  8 16:17:18 2020 us=764904 188.170.cc.dd:13199 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
190Wed Apr  8 16:17:18 2020 us=764920 188.170.cc.dd:13199 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
191Wed Apr  8 16:17:18 2020 us=764957 188.170.cc.dd:13199 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
192Wed Apr  8 16:17:18 2020 us=764969 188.170.cc.dd:13199 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
193Wed Apr  8 16:17:18 2020 us=765011 188.170.cc.dd:13199 TLS: Initial packet from [AF_INET]188.170.cc.dd:13199, sid=b7b2653b 14d65add
194Wed Apr  8 16:17:18 2020 us=866380 188.170.cc.dd:13199 VERIFY OK: depth=1, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Tech. department, CN=SOLVO, emailAddress=tech@domain.com
195Wed Apr  8 16:17:18 2020 us=866490 188.170.cc.dd:13199 VERIFY OK: depth=0, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Administration, CN=magma, emailAddress=magma@domain.com
196Wed Apr  8 16:17:18 2020 us=905957 188.170.cc.dd:13199 peer info: IV_VER=2.4.6
197Wed Apr  8 16:17:18 2020 us=905974 188.170.cc.dd:13199 peer info: IV_PLAT=win
198Wed Apr  8 16:17:18 2020 us=905982 188.170.cc.dd:13199 peer info: IV_PROTO=2
199Wed Apr  8 16:17:18 2020 us=905988 188.170.cc.dd:13199 peer info: IV_NCP=2
200Wed Apr  8 16:17:18 2020 us=905994 188.170.cc.dd:13199 peer info: IV_LZ4=1
201Wed Apr  8 16:17:18 2020 us=906001 188.170.cc.dd:13199 peer info: IV_LZ4v2=1
202Wed Apr  8 16:17:18 2020 us=906007 188.170.cc.dd:13199 peer info: IV_LZO=1
203Wed Apr  8 16:17:18 2020 us=906013 188.170.cc.dd:13199 peer info: IV_COMP_STUB=1
204Wed Apr  8 16:17:18 2020 us=906019 188.170.cc.dd:13199 peer info: IV_COMP_STUBv2=1
205Wed Apr  8 16:17:18 2020 us=906025 188.170.cc.dd:13199 peer info: IV_TCPNL=1
206Wed Apr  8 16:17:18 2020 us=906031 188.170.cc.dd:13199 peer info: IV_GUI_VER=OpenVPN_GUI_11
207Wed Apr  8 16:17:18 2020 us=945502 188.170.cc.dd:13199 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
208Wed Apr  8 16:17:18 2020 us=945529 188.170.cc.dd:13199 [magma] Peer Connection Initiated with [AF_INET]188.170.cc.dd:13199
209Wed Apr  8 16:17:18 2020 us=946783 MULTI: new connection by client 'magma' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
210Wed Apr  8 16:17:18 2020 us=946824 MULTI_sva: pool returned IPv4=172.16.87.183, IPv6=(Not enabled)
211Wed Apr  8 16:17:18 2020 us=948377 MULTI: Learn: 172.16.87.183 -> magma/188.170.cc.dd:13199
212Wed Apr  8 16:17:18 2020 us=948390 MULTI: primary virtual IP for magma/188.170.cc.dd:13199: 172.16.87.183
213Wed Apr  8 16:17:20 2020 us=13696 magma/188.170.cc.dd:13199 PUSH: Received control message: 'PUSH_REQUEST'
214Wed Apr  8 16:17:20 2020 us=13739 magma/188.170.cc.dd:13199 SENT CONTROL [magma]: 'PUSH_REPLY,topology subnet,route-gateway 172.16.87.1,route 172.16.80.0 255.255.240.0 vpn_gateway,dhcp-option DNS 172.16.80.4,dhcp-option DNS 172.16.80.5,dhcp-option WINS 172.16.80.23,register-dns,ping 10,ping-restart 60,ifconfig 172.16.87.183 255.255.255.0,peer-id 111,cipher AES-256-GCM' (status=1)
215Wed Apr  8 16:17:20 2020 us=13749 magma/188.170.cc.dd:13199 Data Channel: using negotiated cipher 'AES-256-GCM'
216Wed Apr  8 16:17:20 2020 us=13763 magma/188.170.cc.dd:13199 Data Channel MTU parms [ L:1550 D:1450 EF:50 EB:406 ET:0 EL:3 ]
217Wed Apr  8 16:17:20 2020 us=13821 magma/188.170.cc.dd:13199 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
218Wed Apr  8 16:17:20 2020 us=13829 magma/188.170.cc.dd:13199 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
219Wed Apr  8 16:17:20 2020 us=414732 magma/188.170.cc.dd:13199 MULTI: bad source address from client [::], packet dropped
220
221Wed Apr  8 16:17:22 2020 us=745536 MULTI: multi_create_instance called
222Wed Apr  8 16:17:22 2020 us=745596 185.97.aa.bb:15364 Re-using SSL/TLS context
223Wed Apr  8 16:17:22 2020 us=745608 185.97.aa.bb:15364 LZO compression initializing
224Wed Apr  8 16:17:22 2020 us=745667 185.97.aa.bb:15364 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
225Wed Apr  8 16:17:22 2020 us=745682 185.97.aa.bb:15364 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
226Wed Apr  8 16:17:22 2020 us=745705 185.97.aa.bb:15364 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
227Wed Apr  8 16:17:22 2020 us=745712 185.97.aa.bb:15364 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1542,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher BF-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
228Wed Apr  8 16:17:22 2020 us=745742 185.97.aa.bb:15364 TLS: Initial packet from [AF_INET]185.97.aa.bb:15364, sid=99bf8ac4 c2efd12a
229Wed Apr  8 16:17:28 2020 us=70046 185.97.aa.bb:15364 VERIFY OK: depth=1, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=Tech. department, CN=SOLVO, emailAddress=tech@domain.com
230Wed Apr  8 16:17:28 2020 us=70189 185.97.aa.bb:15364 VERIFY OK: depth=0, C=RU, ST=Russian Federation, L=St.Petersburg, O=SOLVO ltd., OU=RADIO, CN=akuznetcov, emailAddress=akuznetcov@domain.com
231Wed Apr  8 16:17:28 2020 us=108630 185.97.aa.bb:15364 peer info: IV_VER=2.4.8
232Wed Apr  8 16:17:28 2020 us=108660 185.97.aa.bb:15364 peer info: IV_PLAT=win
233Wed Apr  8 16:17:28 2020 us=108668 185.97.aa.bb:15364 peer info: IV_PROTO=2
234Wed Apr  8 16:17:28 2020 us=108675 185.97.aa.bb:15364 peer info: IV_NCP=2
235Wed Apr  8 16:17:28 2020 us=108682 185.97.aa.bb:15364 peer info: IV_LZ4=1
236Wed Apr  8 16:17:28 2020 us=108689 185.97.aa.bb:15364 peer info: IV_LZ4v2=1
237Wed Apr  8 16:17:28 2020 us=108695 185.97.aa.bb:15364 peer info: IV_LZO=1
238Wed Apr  8 16:17:28 2020 us=108702 185.97.aa.bb:15364 peer info: IV_COMP_STUB=1
239Wed Apr  8 16:17:28 2020 us=108709 185.97.aa.bb:15364 peer info: IV_COMP_STUBv2=1
240Wed Apr  8 16:17:28 2020 us=108716 185.97.aa.bb:15364 peer info: IV_TCPNL=1
241Wed Apr  8 16:17:28 2020 us=108722 185.97.aa.bb:15364 peer info: IV_GUI_VER=OpenVPN_GUI_11
242Wed Apr  8 16:17:28 2020 us=112551 185.97.aa.bb:15364 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
243Wed Apr  8 16:17:28 2020 us=112581 185.97.aa.bb:15364 [akuznetcov] Peer Connection Initiated with [AF_INET]185.97.aa.bb:15364
244Wed Apr  8 16:17:28 2020 us=112630 akuznetcov/185.97.aa.bb:15364 MULTI_sva: pool returned IPv4=172.16.87.216, IPv6=(Not enabled)
245Wed Apr  8 16:17:28 2020 us=114033 akuznetcov/185.97.aa.bb:15364 OPTIONS IMPORT: reading client specific options from: /tmp/openvpn_cc_680441982a2d3d8317b7075c092d33cc.tmp
246Wed Apr  8 16:17:28 2020 us=114097 akuznetcov/185.97.aa.bb:15364 MULTI: Learn: 172.16.87.216 -> akuznetcov/185.97.aa.bb:15364
247Wed Apr  8 16:17:28 2020 us=114107 akuznetcov/185.97.aa.bb:15364 MULTI: primary virtual IP for akuznetcov/185.97.aa.bb:15364: 172.16.87.216
248Wed Apr  8 16:17:28 2020 us=904175 akuznetcov/185.97.aa.bb:15364 PUSH: Received control message: 'PUSH_REQUEST'
249Wed Apr  8 16:17:28 2020 us=904226 akuznetcov/185.97.aa.bb:15364 SENT CONTROL [akuznetcov]: 'PUSH_REPLY,topology subnet,route-gateway 172.16.87.1,route 172.16.80.0 255.255.240.0 vpn_gateway,dhcp-option DNS 172.16.80.4,dhcp-option DNS 172.16.80.5,dhcp-option WINS 172.16.80.23,register-dns,ping 10,ping-restart 60,ifconfig 172.16.87.216 255.255.255.0,peer-id 115,cipher AES-256-GCM' (status=1)
250Wed Apr  8 16:17:28 2020 us=904236 akuznetcov/185.97.aa.bb:15364 Data Channel: using negotiated cipher 'AES-256-GCM'
251Wed Apr  8 16:17:28 2020 us=904251 akuznetcov/185.97.aa.bb:15364 Data Channel MTU parms [ L:1550 D:1450 EF:50 EB:406 ET:0 EL:3 ]
252Wed Apr  8 16:17:28 2020 us=904309 akuznetcov/185.97.aa.bb:15364 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
253Wed Apr  8 16:17:28 2020 us=904317 akuznetcov/185.97.aa.bb:15364 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
254
255Wed Apr  8 16:22:15 2020 us=1320 magma/188.170.cc.dd:13199 [magma] Inactivity timeout (--ping-restart), restarting
256Wed Apr  8 16:22:15 2020 us=1352 magma/188.170.cc.dd:13199 SIGUSR1[soft,ping-restart] received, client-instance restarting