Ticket #1316: t.t

File t.t, 19.3 KB (added by tct, 3 years ago)
Line 
12020-12-07 00:27:55 us=887816 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [41] from [AF_INET]n.n.n.125:4223: P_DATA_V2 kid=0 DATA len=40
22020-12-07 00:27:55 us=887997 v303.tct.secp384r1.c01/n.n.n.125:4223 Key [AF_INET]n.n.n.125:4223 [0] not initialized (yet), dropping packet.
32020-12-07 00:28:05 us=895080 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [41] from [AF_INET]n.n.n.125:4223: P_DATA_V2 kid=0 DATA len=40
42020-12-07 00:28:05 us=895176 v303.tct.secp384r1.c01/n.n.n.125:4223 Key [AF_INET]n.n.n.125:4223 [0] not initialized (yet), dropping packet.
52020-12-07 00:28:25 us=531293 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [42] from [AF_INET]n.n.n.125:4223: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ 3930431733 2269310053 559502510 3924557604 2766448128 351 3447235584 0 ]
62020-12-07 00:28:25 us=531469 v303.tct.secp384r1.c01/n.n.n.125:4223 TLS: new session incoming connection from [AF_INET]n.n.n.125:4223
72020-12-07 00:28:25 us=531625 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [54] to [AF_INET]n.n.n.125:4223: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 3954332935 2000734263 4001776168 3872534960 966543104 351 3447138561 0 602710304 3042492700 0 ]
82020-12-07 00:28:25 us=534944 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 2487538378 60206487 2853831928 3880446899 3482926592 607 3447235585 0 3232195542 1733610421 ]
92020-12-07 00:28:25 us=535185 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [220] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 1369100745 1175408051 2098853297 440236770 3394206976 863 3447235584 1 369295616 2902523904 2835546942 733899158 1274936910 1967859476 3352372150 1672441384 675831051 2956515961 633236736 2932780 3224371359 3433680040 3433742379 32243
102020-12-07 00:28:25 us=544482 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [1172] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 1675680263 3857694567 3182170826 3485313660 885078784 607 3447138561 1 602710304 3042492700 1 369296128 1023541248 956498722 3729442937 908139747 1219912193 1376277196 3212778972 461769540 1331121735 1380188416 3224109056 301924608 16
112020-12-07 00:28:25 us=544822 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [1160] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 1769772334 3253282156 3374327067 1925541535 3842334976 863 3447138560 2 422582022 55903235 202392385 544498548 762537315 1882404916 1915826458 806880777 713443462 4144824585 18221933 1698719855 1835347567 1919365150 386740536 80879263
122020-12-07 00:28:25 us=545044 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [90] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 636584475 2520823344 521093474 2381206037 3526347776 1119 3447138560 3 1949135717 1668297528 879898929 439359494 153781832 2264337665 151066123 1835352168 1869440302 1869768470 50528260 234881024 ]
132020-12-07 00:28:25 us=546636 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 3157533228 433819364 1640086988 503349493 3023081472 1119 3447235585 1 3232195542 1733610421 ]
142020-12-07 00:28:25 us=552358 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 2665000360 3954682086 2837021569 1455068062 1753819136 1375 3447235585 2 3232195542 1733610421 ]
152020-12-07 00:28:25 us=562401 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [1172] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 389895277 4036028200 1932393847 1694699247 2946253312 1631 3447235585 3 3232195542 1733610421 2 369296134 3456827398 ] pid=2181260336 DATA len=1098
162020-12-07 00:28:25 us=562503 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [50] to [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 644938435 3428046684 4206227467 385213493 3305911808 1375 3447138561 2 602710304 3042492700 ]
172020-12-07 00:28:25 us=562844 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [946] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 4029358208 4019662717 1597996696 1568187103 90441472 1887 3447235584 3 822882314 100881668 135005044 1668559117 806028803 1426327308 73953133 1697713968 218497877 67767302 1952674926 1702113561 806815235 1426328332 276063092 185214263
182020-12-07 00:28:25 us=565188 v303.tct.secp384r1.c01/n.n.n.125:4223 VERIFY KU OK
192020-12-07 00:28:25 us=565226 v303.tct.secp384r1.c01/n.n.n.125:4223 Validating certificate extended key usage
202020-12-07 00:28:25 us=565244 v303.tct.secp384r1.c01/n.n.n.125:4223 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
212020-12-07 00:28:25 us=565258 v303.tct.secp384r1.c01/n.n.n.125:4223 VERIFY EKU OK
222020-12-07 00:28:25 us=565274 v303.tct.secp384r1.c01/n.n.n.125:4223 VERIFY OK: depth=0, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=v303.tct.secp384r1.c01, emailAddress=me@home.org
232020-12-07 00:28:25 us=571060 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [105] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 1658246864 1507381387 2091962847 756314142 2464810752 1631 3447138561 3 602710304 3042492700 4 335741696 16848387 50342038 1781840574 103132063 735208475 2207349170 2369422181 1655868607 111406391 1671148518 2010002239 ]
242020-12-07 00:28:25 us=572911 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [648] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 4244589480 340229823 4194962705 3931632076 345752576 2143 3447235585 4 3232195542 1733610421 4 386073346 1300445027 3207654659 2050466311 3534881708 2264194784 386553625 3110819448 1891817179 1392283284 963751726 1993573377 2557342238
252020-12-07 00:28:25 us=572984 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_VER=2.5.0
262020-12-07 00:28:25 us=573016 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_PLAT=linux
272020-12-07 00:28:25 us=573038 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_PROTO=6
282020-12-07 00:28:25 us=573068 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_NCP=2
292020-12-07 00:28:25 us=573106 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
302020-12-07 00:28:25 us=573129 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_LZ4=1
312020-12-07 00:28:25 us=573150 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_LZ4v2=1
322020-12-07 00:28:25 us=573170 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_LZO=1
332020-12-07 00:28:25 us=573191 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_COMP_STUB=1
342020-12-07 00:28:25 us=573211 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_COMP_STUBv2=1
352020-12-07 00:28:25 us=573231 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_TCPNL=1
362020-12-07 00:28:25 us=573252 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_HWADDR=24:b6:fd:31:bc:ca
372020-12-07 00:28:25 us=573488 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_SSL=OpenSSL_1.1.1f__31_Mar_2020
382020-12-07 00:28:25 us=573590 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: UV_INFO=v3.rsa.ossl11.cli01.mint
392020-12-07 00:28:25 us=573614 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: UV_PING=10
402020-12-07 00:28:25 us=573635 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: UV_PINGR=60
412020-12-07 00:28:25 us=573749 v303.tct.secp384r1.c01/n.n.n.125:4223 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
422020-12-07 00:28:25 us=573877 v303.tct.secp384r1.c01/n.n.n.125:4223 TLS: tls_multi_process: untrusted session promoted to semi-trusted
432020-12-07 00:28:25 us=573943 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [316] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 1621741937 569152880 3271580189 1815475692 2821293056 1887 3447138561 4 602710304 3042492700 5 386073345 26634804 3133015589 2891519868 1218602016 1029793047 2558514779 95792110 2420894680 3921812572 1753152717 568039423 2651794979 73
442020-12-07 00:28:25 us=575945 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 3127911178 3789059234 2577504323 2175253377 2231922944 2399 3447235585 5 3232195542 1733610421 ]
452020-12-07 00:28:25 us=576024 v303.tct.secp384r1.c01/n.n.n.125:4223 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 384 bit EC, curve: secp384r1
462020-12-07 00:28:26 us=688239 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [84] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 2306979958 4126325341 2634625823 3945407144 448306944 2655 3447235584 5 386073344 629356387 3207654659 2064457422 4288348200 626799686 2203328355 3185576826 1935309547 2961492161 ]
472020-12-07 00:28:26 us=689943 v303.tct.secp384r1.c01/n.n.n.125:4223 PUSH: Received control message: 'PUSH_REQUEST'
482020-12-07 00:28:26 us=690854 v303.tct.secp384r1.c01/n.n.n.125:4223 SENT CONTROL [v303.tct.secp384r1.c01]: 'PUSH_REPLY,block-ipv6,topology subnet,explicit-exit-notify 3,comp-lzo no,compress,route-gateway 10.55.111.225,topology subnet,route 10.7.39.137,ping 0,ping-restart 0,ping 10,ping-restart 30,ifconfig 10.55.111.254 255.255.255.224,peer-id 0,cipher AES-256-GCM' (status=1)
492020-12-07 00:28:26 us=690947 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [50] to [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 2110386968 738815189 2105598207 2557932440 1144688384 2143 3447138561 5 602710304 3042492700 ]
502020-12-07 00:28:26 us=691741 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [329] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 1174018089 2034183201 3505990841 1925799487 2936978176 2399 3447138560 6 386073345 446065204 3133015589 2911012798 1059421375 1402051335 2858502198 3329303470 2032374078 2552587341 3209234558 716110228 3749122575 2609036708 1348434378
512020-12-07 00:28:26 us=720066 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 4168337037 1528960011 1106492906 3976992063 420816384 2911 3447235585 6 3232195542 1733610421 ]
522020-12-07 00:28:37 us=264604 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [41] from [AF_INET]n.n.n.125:4223: P_DATA_V2 kid=0 DATA len=40
532020-12-07 00:28:37 us=264671 v303.tct.secp384r1.c01/n.n.n.125:4223 Key [AF_INET]n.n.n.125:4223 [0] not initialized (yet), dropping packet.
542020-12-07 00:28:48 us=17912 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [41] from [AF_INET]n.n.n.125:4223: P_DATA_V2 kid=0 DATA len=40
552020-12-07 00:28:48 us=18001 v303.tct.secp384r1.c01/n.n.n.125:4223 Key [AF_INET]n.n.n.125:4223 [0] not initialized (yet), dropping packet.
562020-12-07 00:29:07 us=276395 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [42] from [AF_INET]n.n.n.125:4223: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ 3679664726 67786347 641010211 2846052247 1766679296 351 3447246336 0 ]
572020-12-07 00:29:07 us=276440 v303.tct.secp384r1.c01/n.n.n.125:4223 TLS: new session incoming connection from [AF_INET]n.n.n.125:4223
582020-12-07 00:29:07 us=276505 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [54] to [AF_INET]n.n.n.125:4223: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 2619080017 2865764207 145422948 3344119160 3076936960 351 3447149313 0 4102576296 119284346 0 ]
592020-12-07 00:29:07 us=277792 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 4200918625 2733148395 3832579068 3811139845 2738308096 607 3447246337 0 239903579 1767549856 ]
602020-12-07 00:29:07 us=278509 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [220] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 159463870 291698705 1133158896 346664216 3740162816 863 3447246336 1 369295616 2902523904 2835547077 327210197 4056481107 1503734625 1349006727 1280628721 129955304 3630082494 3929703424 2932780 3224371359 3433680040 3433742379 322430
612020-12-07 00:29:07 us=286704 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [1172] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 560365794 4116313640 1533403455 2425119114 307921664 607 3447149313 1 4102576296 119284346 1 369296128 1023541248 956498933 335287631 2227681826 2860949661 306050444 2114342454 439102276 1331121735 1380188416 3224109056 301924608 1677
622020-12-07 00:29:07 us=286995 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [1160] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 3439487056 1323733869 1672928418 3386856071 ] pid=3447149312 DATA len=1122
632020-12-07 00:29:07 us=287079 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [89] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 1531708163 3566892658 2420039208 2317666202 433588224 1119 3447149312 3 762537315 1882404916 1915826458 806880777 713443462 4144824585 18221933 1698719855 1835347567 1919358467 50332686 ]
642020-12-07 00:29:07 us=291957 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 3388357790 3988199848 3932653732 3113272177 9115648 1119 3447246337 1 ]
652020-12-07 00:29:07 us=297112 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 3987887254 1218621152 2431500422 822302829 1868635904 1375 3447246337 2 239903579 1767549856 ]
662020-12-07 00:29:07 us=306739 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [1172] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 235306834 1594858739 3241946010 1463145342 1763827200 1631 3447246337 3 239903579 1767549856 2 369296134 3456827398 3388999367 223280 2181260336 2181229472 50462978 33620528 168167466 2252918333 67306288 2173513995 805897731 142632705
672020-12-07 00:29:07 us=306874 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [50] to [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 4022337898 3029148773 3059666277 2995328969 980150016 1375 3447149313 2 4102576296 119284346 ]
682020-12-07 00:29:07 us=307274 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [946] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 748392008 4161450391 3068411756 834198674 3252109056 1887 3447246336 3 822882314 100881668 135005044 1668559117 806028803 1426327308 73953133 1697713968 218497877 67767302 1952674926 1702113561 806815235 1426328332 276063092 185214263
692020-12-07 00:29:07 us=310397 v303.tct.secp384r1.c01/n.n.n.125:4223 VERIFY KU OK
702020-12-07 00:29:07 us=310493 v303.tct.secp384r1.c01/n.n.n.125:4223 Validating certificate extended key usage
712020-12-07 00:29:07 us=310527 v303.tct.secp384r1.c01/n.n.n.125:4223 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
722020-12-07 00:29:07 us=310550 v303.tct.secp384r1.c01/n.n.n.125:4223 VERIFY EKU OK
732020-12-07 00:29:07 us=310573 v303.tct.secp384r1.c01/n.n.n.125:4223 VERIFY OK: depth=0, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=v303.tct.secp384r1.c01, emailAddress=me@home.org
742020-12-07 00:29:07 us=315285 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [105] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 3371322787 2405794399 3080261334 2299923663 4057869824 1631 3447149313 3 4102576296 119284346 4 335741696 16848387 50341937 1632614233 2577078869 1200270991 3780120459 2816472489 3767736748 4140459659 3659400852 642313815 ]
752020-12-07 00:29:07 us=317263 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [648] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 1118147039 2024437182 2529245700 1729617228 3364781568 2143 3447246337 4 239903579 1767549856 4 386073346 1293345400 2918514899 1305087503 874909729 3644016617 2784320633 496127482 2140476826 3981560580 15287931 2517124133 3936446471
762020-12-07 00:29:07 us=317367 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_VER=2.5.0
772020-12-07 00:29:07 us=317406 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_PLAT=linux
782020-12-07 00:29:07 us=317438 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_PROTO=6
792020-12-07 00:29:07 us=317468 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_NCP=2
802020-12-07 00:29:07 us=317489 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
812020-12-07 00:29:07 us=317512 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_LZ4=1
822020-12-07 00:29:07 us=317536 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_LZ4v2=1
832020-12-07 00:29:07 us=317550 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_LZO=1
842020-12-07 00:29:07 us=317584 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_COMP_STUB=1
852020-12-07 00:29:07 us=317598 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_COMP_STUBv2=1
862020-12-07 00:29:07 us=317611 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_TCPNL=1
872020-12-07 00:29:07 us=317635 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_HWADDR=24:b6:fd:31:bc:ca
882020-12-07 00:29:07 us=317654 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: IV_SSL=OpenSSL_1.1.1f__31_Mar_2020
892020-12-07 00:29:07 us=317667 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: UV_INFO=v3.rsa.ossl11.cli01.mint
902020-12-07 00:29:07 us=317680 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: UV_PING=10
912020-12-07 00:29:07 us=317692 v303.tct.secp384r1.c01/n.n.n.125:4223 peer info: UV_PINGR=60
922020-12-07 00:29:07 us=317772 v303.tct.secp384r1.c01/n.n.n.125:4223 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
932020-12-07 00:29:07 us=317879 v303.tct.secp384r1.c01/n.n.n.125:4223 TLS: tls_multi_process: untrusted session promoted to semi-trusted
942020-12-07 00:29:07 us=317927 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [316] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 3179623007 ] pid=1017463840 DATA len=290
952020-12-07 00:29:07 us=319473 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 1684696652 498412340 1334291097 1207044742 3162754816 2399 3447246337 5 239903579 1767549856 ]
962020-12-07 00:29:07 us=319544 v303.tct.secp384r1.c01/n.n.n.125:4223 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 384 bit EC, curve: secp384r1
972020-12-07 00:29:08 us=478093 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [84] from [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 2679553141 4254619423 243023446 3063196334 2041056000 2655 3447246336 5 386073344 622256760 2918514899 1323822165 4140447329 1052781844 139445045 1316220711 3035608272 3468466000 ]
982020-12-07 00:29:08 us=478378 v303.tct.secp384r1.c01/n.n.n.125:4223 PUSH: Received control message: 'PUSH_REQUEST'
992020-12-07 00:29:08 us=478643 v303.tct.secp384r1.c01/n.n.n.125:4223 SENT CONTROL [v303.tct.secp384r1.c01]: 'PUSH_REPLY,block-ipv6,topology subnet,explicit-exit-notify 3,comp-lzo no,compress,route-gateway 10.55.111.225,topology subnet,route 10.7.39.137,ping 0,ping-restart 0,ping 10,ping-restart 30,ifconfig 10.55.111.254 255.255.255.224,peer-id 0,cipher AES-256-GCM' (status=1)
1002020-12-07 00:29:08 us=478752 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [50] to [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 1015912736 3140213035 457901430 2651824796 47433984 2143 3447149313 5 4102576296 119284346 ]
1012020-12-07 00:29:08 us=480674 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 WRITE [329] to [AF_INET]n.n.n.125:4223: P_CONTROL_V1 kid=0 [ 237783995 2134135792 2071504120 3833948962 1424756480 2399 3447149312 6 386073345 439443791 3076102555 485045127 3694547930 671070691 2419380284 3329139574 2974336736 1543718468 2745865731 2361935443 6754200 208765026 3171259391 40786
1022020-12-07 00:29:08 us=498780 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [50] from [AF_INET]n.n.n.125:4223: P_ACK_V1 kid=0 [ 553595693 3870137307 2114796897 1973368639 4067896064 2911 3447246337 6 239903579 1767549856 ]
1032020-12-07 00:29:19 us=57433 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [41] from [AF_INET]n.n.n.125:4223: P_DATA_V2 kid=0 DATA len=40
1042020-12-07 00:29:19 us=57567 v303.tct.secp384r1.c01/n.n.n.125:4223 Key [AF_INET]n.n.n.125:4223 [0] not initialized (yet), dropping packet.
1052020-12-07 00:29:29 us=335444 v303.tct.secp384r1.c01/n.n.n.125:4223 UDPv4 READ [41] from [AF_INET]n.n.n.125:4223: P_DATA_V2 kid=0 DATA len=40
1062020-12-07 00:29:29 us=335536 v303.tct.secp384r1.c01/n.n.n.125:4223 Key [AF_INET]n.n.n.125:4223 [0] not initialized (yet), dropping packet.
107