Ticket #1440: bug_openvpn.log

File bug_openvpn.log, 138.9 KB (added by N-Mi, 2 years ago)

client logs with verb 5

Line 
1
2
3rWRwRwrWrWRwrW2021-11-19 16:32:59 us=103415 Connection reset, restarting [0]
42021-11-19 16:32:59 us=103539 TCP/UDP: Closing socket
52021-11-19 16:32:59 us=103594 SIGUSR1[soft,connection-reset] received, process restarting
62021-11-19 16:32:59 us=103609 Restart pause, 2 second(s)
72021-11-19 16:33:01 us=103694 Re-using SSL/TLS context
82021-11-19 16:33:01 us=103761 LZO compression initializing
92021-11-19 16:33:01 us=103846 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
102021-11-19 16:33:01 us=103859 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
112021-11-19 16:33:01 us=103887 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
122021-11-19 16:33:01 us=103895 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
132021-11-19 16:33:01 us=103908 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
142021-11-19 16:33:01 us=103938 Socket Buffers: R=[131072->131072] S=[16384->16384]
152021-11-19 16:33:01 us=103946 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
162021-11-19 16:33:01 us=194523 TCP connection established with [AF_INET]1.2.3.4:443
172021-11-19 16:33:01 us=194567 TCP_CLIENT link local: (not bound)
182021-11-19 16:33:01 us=194575 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
19WR2021-11-19 16:33:01 us=204702 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=3dc03b69 66d6e443
20W2021-11-19 16:33:01 us=204820 net_route_v4_best_gw query: dst 0.0.0.0
212021-11-19 16:33:01 us=204924 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
22WRWR2021-11-19 16:33:01 us=347432 VERIFY OK: depth=1, CN=XXXXXX VPN
232021-11-19 16:33:01 us=347698 VERIFY KU OK
242021-11-19 16:33:01 us=347746 Validating certificate extended key usage
252021-11-19 16:33:01 us=347760 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
262021-11-19 16:33:01 us=347771 VERIFY EKU OK
272021-11-19 16:33:01 us=347781 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
28WRWRW2021-11-19 16:33:01 us=369138 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
292021-11-19 16:33:01 us=369200 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
302021-11-19 16:33:02 us=431837 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
31WRR2021-11-19 16:33:02 us=495901 AUTH: Received control message: AUTH_FAILED,Response to a challenge without a first valid authentication request
322021-11-19 16:33:02 us=496097 TCP/UDP: Closing socket
332021-11-19 16:33:02 us=496272 SIGUSR1[soft,auth-failure] received, process restarting
342021-11-19 16:33:02 us=496331 Restart pause, 2 second(s)
352021-11-19 16:33:04 us=496478 Re-using SSL/TLS context
362021-11-19 16:33:04 us=496512 LZO compression initializing
372021-11-19 16:33:04 us=496676 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
382021-11-19 16:33:04 us=496705 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
392021-11-19 16:33:04 us=496826 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
402021-11-19 16:33:04 us=496847 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
412021-11-19 16:33:04 us=496869 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
422021-11-19 16:33:04 us=496908 Socket Buffers: R=[131072->131072] S=[16384->16384]
432021-11-19 16:33:04 us=496921 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
442021-11-19 16:33:04 us=508145 TCP connection established with [AF_INET]1.2.3.4:443
452021-11-19 16:33:04 us=508250 TCP_CLIENT link local: (not bound)
462021-11-19 16:33:04 us=508264 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
47WrrR2021-11-19 16:33:04 us=518988 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=607cb9bd 126f5b39
48W2021-11-19 16:33:04 us=519141 net_route_v4_best_gw query: dst 0.0.0.0
492021-11-19 16:33:04 us=519232 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
50WRWR2021-11-19 16:33:04 us=551184 VERIFY OK: depth=1, CN=XXXXXX VPN
512021-11-19 16:33:04 us=551274 VERIFY KU OK
522021-11-19 16:33:04 us=551281 Validating certificate extended key usage
532021-11-19 16:33:04 us=551287 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
542021-11-19 16:33:04 us=551292 VERIFY EKU OK
552021-11-19 16:33:04 us=551296 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
56WRWRW2021-11-19 16:33:04 us=574751 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
572021-11-19 16:33:04 us=574788 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
58rr2021-11-19 16:33:05 us=279862 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
59WRrrr2021-11-19 16:33:11 us=37716 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
60WRR2021-11-19 16:33:11 us=176185 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:3cfcb65c-862b-4935-8a0c-c19af387f810:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
612021-11-19 16:33:11 us=176327 TCP/UDP: Closing socket
622021-11-19 16:33:11 us=176384 SIGUSR1[soft,auth-failure] received, process restarting
632021-11-19 16:33:11 us=176403 Restart pause, 2 second(s)
64🔐 CHALLENGE: Welcome <username>, Please enter OTP code
652021-11-19 16:33:13 us=181883 Re-using SSL/TLS context
662021-11-19 16:33:13 us=181939 LZO compression initializing
672021-11-19 16:33:13 us=182043 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
682021-11-19 16:33:13 us=182062 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
692021-11-19 16:33:13 us=182094 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
702021-11-19 16:33:13 us=182101 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
712021-11-19 16:33:13 us=182112 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
722021-11-19 16:33:13 us=182146 Socket Buffers: R=[131072->131072] S=[16384->16384]
732021-11-19 16:33:13 us=182156 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
742021-11-19 16:33:13 us=193922 TCP connection established with [AF_INET]1.2.3.4:443
752021-11-19 16:33:13 us=193964 TCP_CLIENT link local: (not bound)
762021-11-19 16:33:13 us=193977 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
77WR2021-11-19 16:33:13 us=205419 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=a7442f0d a625b163
78W2021-11-19 16:33:13 us=205672 net_route_v4_best_gw query: dst 0.0.0.0
792021-11-19 16:33:13 us=205831 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
80WRWR2021-11-19 16:33:13 us=237592 VERIFY OK: depth=1, CN=XXXXXX VPN
812021-11-19 16:33:13 us=237920 VERIFY KU OK
822021-11-19 16:33:13 us=237950 Validating certificate extended key usage
832021-11-19 16:33:13 us=238020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
842021-11-19 16:33:13 us=238076 VERIFY EKU OK
852021-11-19 16:33:13 us=238125 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
86WrRWRW2021-11-19 16:33:13 us=260179 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
872021-11-19 16:33:13 us=260295 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
882021-11-19 16:33:14 us=295808 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
89WRR2021-11-19 16:33:14 us=362298 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
902021-11-19 16:33:14 us=362462 TCP/UDP: Closing socket
912021-11-19 16:33:14 us=362525 SIGUSR1[soft,auth-failure] received, process restarting
922021-11-19 16:33:14 us=362545 Restart pause, 2 second(s)
932021-11-19 16:33:16 us=362691 Re-using SSL/TLS context
942021-11-19 16:33:16 us=362718 LZO compression initializing
952021-11-19 16:33:16 us=362798 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
962021-11-19 16:33:16 us=362812 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
972021-11-19 16:33:16 us=362835 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
982021-11-19 16:33:16 us=362841 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
992021-11-19 16:33:16 us=362851 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
1002021-11-19 16:33:16 us=362877 Socket Buffers: R=[131072->131072] S=[16384->16384]
1012021-11-19 16:33:16 us=362884 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
1022021-11-19 16:33:16 us=378839 TCP connection established with [AF_INET]1.2.3.4:443
1032021-11-19 16:33:16 us=378891 TCP_CLIENT link local: (not bound)
1042021-11-19 16:33:16 us=378905 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
105WR2021-11-19 16:33:16 us=389219 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=e4d96e36 53304937
106W2021-11-19 16:33:16 us=389395 net_route_v4_best_gw query: dst 0.0.0.0
1072021-11-19 16:33:16 us=389505 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
108WRWR2021-11-19 16:33:16 us=420268 VERIFY OK: depth=1, CN=XXXXXX VPN
1092021-11-19 16:33:16 us=420450 VERIFY KU OK
1102021-11-19 16:33:16 us=420467 Validating certificate extended key usage
1112021-11-19 16:33:16 us=420478 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
1122021-11-19 16:33:16 us=420488 VERIFY EKU OK
1132021-11-19 16:33:16 us=420497 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
114WRWRW2021-11-19 16:33:16 us=446206 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
1152021-11-19 16:33:16 us=446245 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
1162021-11-19 16:33:17 us=623923 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
117WRrrr2021-11-19 16:33:22 us=211859 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
118WRR2021-11-19 16:33:22 us=233326 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:08346974-1bb0-45d2-a499-5c896ab5708f:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
1192021-11-19 16:33:22 us=233437 TCP/UDP: Closing socket
1202021-11-19 16:33:22 us=233482 SIGUSR1[soft,auth-failure] received, process restarting
1212021-11-19 16:33:22 us=233497 Restart pause, 2 second(s)
122🔐 CHALLENGE: Welcome <username>, Please enter OTP code
1232021-11-19 16:33:24 us=239247 Re-using SSL/TLS context
1242021-11-19 16:33:24 us=239283 LZO compression initializing
1252021-11-19 16:33:24 us=239383 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
1262021-11-19 16:33:24 us=239401 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
1272021-11-19 16:33:24 us=239435 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
1282021-11-19 16:33:24 us=239444 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
1292021-11-19 16:33:24 us=239458 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
1302021-11-19 16:33:24 us=239494 Socket Buffers: R=[131072->131072] S=[16384->16384]
1312021-11-19 16:33:24 us=239501 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
1322021-11-19 16:33:24 us=250616 TCP connection established with [AF_INET]1.2.3.4:443
1332021-11-19 16:33:24 us=250646 TCP_CLIENT link local: (not bound)
1342021-11-19 16:33:24 us=250653 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
135WrR2021-11-19 16:33:24 us=260925 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=af8921ce 63c56876
136W2021-11-19 16:33:24 us=261062 net_route_v4_best_gw query: dst 0.0.0.0
1372021-11-19 16:33:24 us=261176 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
138WRWR2021-11-19 16:33:24 us=293362 VERIFY OK: depth=1, CN=XXXXXX VPN
1392021-11-19 16:33:24 us=293486 VERIFY KU OK
1402021-11-19 16:33:24 us=293501 Validating certificate extended key usage
1412021-11-19 16:33:24 us=293508 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
1422021-11-19 16:33:24 us=293513 VERIFY EKU OK
1432021-11-19 16:33:24 us=293517 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
144WRWRW2021-11-19 16:33:24 us=314560 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
1452021-11-19 16:33:24 us=314610 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
146r2021-11-19 16:33:25 us=623752 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
147WRR2021-11-19 16:33:25 us=686101 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
1482021-11-19 16:33:25 us=686382 TCP/UDP: Closing socket
1492021-11-19 16:33:25 us=686587 SIGUSR1[soft,auth-failure] received, process restarting
1502021-11-19 16:33:25 us=686619 Restart pause, 2 second(s)
1512021-11-19 16:33:27 us=686759 Re-using SSL/TLS context
1522021-11-19 16:33:27 us=686792 LZO compression initializing
1532021-11-19 16:33:27 us=686896 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
1542021-11-19 16:33:27 us=686921 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
1552021-11-19 16:33:27 us=686953 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
1562021-11-19 16:33:27 us=686962 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
1572021-11-19 16:33:27 us=686973 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
1582021-11-19 16:33:27 us=687001 Socket Buffers: R=[131072->131072] S=[16384->16384]
1592021-11-19 16:33:27 us=687008 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
1602021-11-19 16:33:27 us=698031 TCP connection established with [AF_INET]1.2.3.4:443
1612021-11-19 16:33:27 us=698076 TCP_CLIENT link local: (not bound)
1622021-11-19 16:33:27 us=698083 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
163WR2021-11-19 16:33:27 us=708481 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=4c71922c f15db4a6
164W2021-11-19 16:33:27 us=708629 net_route_v4_best_gw query: dst 0.0.0.0
1652021-11-19 16:33:27 us=708749 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
166WRWR2021-11-19 16:33:27 us=741080 VERIFY OK: depth=1, CN=XXXXXX VPN
1672021-11-19 16:33:27 us=741213 VERIFY KU OK
1682021-11-19 16:33:27 us=741226 Validating certificate extended key usage
1692021-11-19 16:33:27 us=741234 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
1702021-11-19 16:33:27 us=741240 VERIFY EKU OK
1712021-11-19 16:33:27 us=741245 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
172WRWRW2021-11-19 16:33:27 us=761197 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
1732021-11-19 16:33:27 us=761233 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
1742021-11-19 16:33:28 us=775796 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
175WRr2021-11-19 16:33:33 us=902886 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
176WRR2021-11-19 16:33:33 us=922974 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:212bf5d4-1270-4112-a910-4d43e16be439:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
1772021-11-19 16:33:33 us=923204 TCP/UDP: Closing socket
1782021-11-19 16:33:33 us=923330 SIGUSR1[soft,auth-failure] received, process restarting
1792021-11-19 16:33:33 us=923374 Restart pause, 2 second(s)
180🔐 CHALLENGE: Welcome <username>, Please enter OTP code
1812021-11-19 16:33:35 us=928772 Re-using SSL/TLS context
1822021-11-19 16:33:35 us=928830 LZO compression initializing
1832021-11-19 16:33:35 us=928949 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
1842021-11-19 16:33:35 us=928974 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
1852021-11-19 16:33:35 us=929016 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
1862021-11-19 16:33:35 us=929028 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
1872021-11-19 16:33:35 us=929046 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
1882021-11-19 16:33:35 us=929087 Socket Buffers: R=[131072->131072] S=[16384->16384]
1892021-11-19 16:33:35 us=929099 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
1902021-11-19 16:33:35 us=940531 TCP connection established with [AF_INET]1.2.3.4:443
1912021-11-19 16:33:35 us=940572 TCP_CLIENT link local: (not bound)
1922021-11-19 16:33:35 us=940579 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
193WR2021-11-19 16:33:35 us=951420 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=974f22b6 b139c925
194W2021-11-19 16:33:35 us=951539 net_route_v4_best_gw query: dst 0.0.0.0
1952021-11-19 16:33:35 us=951651 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
196WRWR2021-11-19 16:33:36 us=9341 VERIFY OK: depth=1, CN=XXXXXX VPN
1972021-11-19 16:33:36 us=9513 VERIFY KU OK
1982021-11-19 16:33:36 us=9525 Validating certificate extended key usage
1992021-11-19 16:33:36 us=9534 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2002021-11-19 16:33:36 us=9540 VERIFY EKU OK
2012021-11-19 16:33:36 us=9547 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
202WRWRW2021-11-19 16:33:36 us=29914 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2032021-11-19 16:33:36 us=29970 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
204r2021-11-19 16:33:37 us=55942 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
205WRR2021-11-19 16:33:37 us=118207 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
2062021-11-19 16:33:37 us=118338 TCP/UDP: Closing socket
2072021-11-19 16:33:37 us=118412 SIGUSR1[soft,auth-failure] received, process restarting
2082021-11-19 16:33:37 us=118437 Restart pause, 2 second(s)
2092021-11-19 16:33:39 us=118540 Re-using SSL/TLS context
2102021-11-19 16:33:39 us=118564 LZO compression initializing
2112021-11-19 16:33:39 us=118636 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2122021-11-19 16:33:39 us=118647 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
2132021-11-19 16:33:39 us=118669 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
2142021-11-19 16:33:39 us=118674 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
2152021-11-19 16:33:39 us=118683 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
2162021-11-19 16:33:39 us=118705 Socket Buffers: R=[131072->131072] S=[16384->16384]
2172021-11-19 16:33:39 us=118711 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
2182021-11-19 16:33:39 us=129711 TCP connection established with [AF_INET]1.2.3.4:443
2192021-11-19 16:33:39 us=129783 TCP_CLIENT link local: (not bound)
2202021-11-19 16:33:39 us=129798 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
221WR2021-11-19 16:33:39 us=140042 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=1c5ab556 a1b438a9
222W2021-11-19 16:33:39 us=140168 net_route_v4_best_gw query: dst 0.0.0.0
2232021-11-19 16:33:39 us=140293 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
224WRWR2021-11-19 16:33:39 us=171038 VERIFY OK: depth=1, CN=XXXXXX VPN
2252021-11-19 16:33:39 us=171142 VERIFY KU OK
2262021-11-19 16:33:39 us=171151 Validating certificate extended key usage
2272021-11-19 16:33:39 us=171157 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2282021-11-19 16:33:39 us=171162 VERIFY EKU OK
2292021-11-19 16:33:39 us=171167 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
230WRWRW2021-11-19 16:33:39 us=193113 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2312021-11-19 16:33:39 us=193149 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
2322021-11-19 16:33:40 us=215808 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
233WRrr2021-11-19 16:33:45 us=467893 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
234WRR2021-11-19 16:33:45 us=489791 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:92b5882c-4c42-493a-8d39-2d2b18522d0a:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
2352021-11-19 16:33:45 us=490015 TCP/UDP: Closing socket
2362021-11-19 16:33:45 us=490129 SIGUSR1[soft,auth-failure] received, process restarting
2372021-11-19 16:33:45 us=490164 Restart pause, 2 second(s)
238🔐 CHALLENGE: Welcome <username>, Please enter OTP code
2392021-11-19 16:33:47 us=495785 Re-using SSL/TLS context
2402021-11-19 16:33:47 us=495828 LZO compression initializing
2412021-11-19 16:33:47 us=495923 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2422021-11-19 16:33:47 us=495943 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
2432021-11-19 16:33:47 us=495975 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
2442021-11-19 16:33:47 us=495986 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
2452021-11-19 16:33:47 us=495999 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
2462021-11-19 16:33:47 us=496029 Socket Buffers: R=[131072->131072] S=[16384->16384]
2472021-11-19 16:33:47 us=496039 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
2482021-11-19 16:33:47 us=507189 TCP connection established with [AF_INET]1.2.3.4:443
2492021-11-19 16:33:47 us=507222 TCP_CLIENT link local: (not bound)
2502021-11-19 16:33:47 us=507231 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
251WR2021-11-19 16:33:47 us=517470 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=89ba2ccb 146433e2
252W2021-11-19 16:33:47 us=517563 net_route_v4_best_gw query: dst 0.0.0.0
2532021-11-19 16:33:47 us=517660 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
254WRWR2021-11-19 16:33:47 us=549115 VERIFY OK: depth=1, CN=XXXXXX VPN
2552021-11-19 16:33:47 us=549260 VERIFY KU OK
2562021-11-19 16:33:47 us=549276 Validating certificate extended key usage
2572021-11-19 16:33:47 us=549282 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2582021-11-19 16:33:47 us=549287 VERIFY EKU OK
2592021-11-19 16:33:47 us=549293 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
260WRWRW2021-11-19 16:33:47 us=571438 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2612021-11-19 16:33:47 us=571493 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
2622021-11-19 16:33:48 us=595770 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
263WRR2021-11-19 16:33:48 us=658194 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
2642021-11-19 16:33:48 us=658311 TCP/UDP: Closing socket
2652021-11-19 16:33:48 us=658358 SIGUSR1[soft,auth-failure] received, process restarting
2662021-11-19 16:33:48 us=658374 Restart pause, 2 second(s)
2672021-11-19 16:33:50 us=658507 Re-using SSL/TLS context
2682021-11-19 16:33:50 us=658529 LZO compression initializing
2692021-11-19 16:33:50 us=658694 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2702021-11-19 16:33:50 us=658722 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
2712021-11-19 16:33:50 us=658751 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
2722021-11-19 16:33:50 us=658757 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
2732021-11-19 16:33:50 us=658768 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
2742021-11-19 16:33:50 us=658796 Socket Buffers: R=[131072->131072] S=[16384->16384]
2752021-11-19 16:33:50 us=658805 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
2762021-11-19 16:33:50 us=724366 TCP connection established with [AF_INET]1.2.3.4:443
2772021-11-19 16:33:50 us=724408 TCP_CLIENT link local: (not bound)
2782021-11-19 16:33:50 us=724419 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
279WR2021-11-19 16:33:50 us=736282 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=338cb001 8a883f1a
280W2021-11-19 16:33:50 us=736391 net_route_v4_best_gw query: dst 0.0.0.0
2812021-11-19 16:33:50 us=736475 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
282WRWR2021-11-19 16:33:50 us=769233 VERIFY OK: depth=1, CN=XXXXXX VPN
2832021-11-19 16:33:50 us=769356 VERIFY KU OK
2842021-11-19 16:33:50 us=769365 Validating certificate extended key usage
2852021-11-19 16:33:50 us=769371 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2862021-11-19 16:33:50 us=769382 VERIFY EKU OK
2872021-11-19 16:33:50 us=769388 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
288WRWRW2021-11-19 16:33:50 us=795061 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2892021-11-19 16:33:50 us=795115 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
2902021-11-19 16:33:51 us=899755 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
291WRr2021-11-19 16:33:56 us=295803 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
292WRR2021-11-19 16:33:56 us=316753 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:559ec402-54a4-41a0-ad4e-26bb10d3c978:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
2932021-11-19 16:33:56 us=316852 TCP/UDP: Closing socket
2942021-11-19 16:33:56 us=316894 SIGUSR1[soft,auth-failure] received, process restarting
2952021-11-19 16:33:56 us=316908 Restart pause, 2 second(s)
296🔐 CHALLENGE: Welcome <username>, Please enter OTP code
2972021-11-19 16:33:58 us=323215 Re-using SSL/TLS context
2982021-11-19 16:33:58 us=323263 LZO compression initializing
2992021-11-19 16:33:58 us=323364 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
3002021-11-19 16:33:58 us=323381 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
3012021-11-19 16:33:58 us=323408 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
3022021-11-19 16:33:58 us=323414 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
3032021-11-19 16:33:58 us=323425 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
3042021-11-19 16:33:58 us=323454 Socket Buffers: R=[131072->131072] S=[16384->16384]
3052021-11-19 16:33:58 us=323460 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
3062021-11-19 16:33:58 us=334355 TCP connection established with [AF_INET]1.2.3.4:443
3072021-11-19 16:33:58 us=334404 TCP_CLIENT link local: (not bound)
3082021-11-19 16:33:58 us=334416 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
309WrR2021-11-19 16:33:58 us=344311 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=8cee1826 9c967a87
310W2021-11-19 16:33:58 us=344443 net_route_v4_best_gw query: dst 0.0.0.0
3112021-11-19 16:33:58 us=344539 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
312WRWR2021-11-19 16:33:58 us=382672 VERIFY OK: depth=1, CN=XXXXXX VPN
3132021-11-19 16:33:58 us=382785 VERIFY KU OK
3142021-11-19 16:33:58 us=382794 Validating certificate extended key usage
3152021-11-19 16:33:58 us=382800 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
3162021-11-19 16:33:58 us=382805 VERIFY EKU OK
3172021-11-19 16:33:58 us=382809 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
318WRWRW2021-11-19 16:33:58 us=407159 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
3192021-11-19 16:33:58 us=407202 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
320r2021-11-19 16:33:59 us=327825 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
321WRR2021-11-19 16:33:59 us=392807 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
3222021-11-19 16:33:59 us=392910 TCP/UDP: Closing socket
3232021-11-19 16:33:59 us=392953 SIGUSR1[soft,auth-failure] received, process restarting
3242021-11-19 16:33:59 us=392967 Restart pause, 2 second(s)
3252021-11-19 16:34:01 us=393089 Re-using SSL/TLS context
3262021-11-19 16:34:01 us=393113 LZO compression initializing
3272021-11-19 16:34:01 us=393200 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
3282021-11-19 16:34:01 us=393212 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
3292021-11-19 16:34:01 us=393235 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
3302021-11-19 16:34:01 us=393240 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
3312021-11-19 16:34:01 us=393250 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
3322021-11-19 16:34:01 us=393275 Socket Buffers: R=[131072->131072] S=[16384->16384]
3332021-11-19 16:34:01 us=393280 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
3342021-11-19 16:34:01 us=509069 TCP connection established with [AF_INET]1.2.3.4:443
3352021-11-19 16:34:01 us=509108 TCP_CLIENT link local: (not bound)
3362021-11-19 16:34:01 us=509116 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
337WrR2021-11-19 16:34:01 us=519273 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=278b8613 3a60e633
338W2021-11-19 16:34:01 us=519395 net_route_v4_best_gw query: dst 0.0.0.0
3392021-11-19 16:34:01 us=519493 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
340WRWR2021-11-19 16:34:01 us=676027 VERIFY OK: depth=1, CN=XXXXXX VPN
3412021-11-19 16:34:01 us=676372 VERIFY KU OK
3422021-11-19 16:34:01 us=676413 Validating certificate extended key usage
3432021-11-19 16:34:01 us=676438 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
3442021-11-19 16:34:01 us=676450 VERIFY EKU OK
3452021-11-19 16:34:01 us=676461 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
346WRWRW2021-11-19 16:34:01 us=697558 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
3472021-11-19 16:34:01 us=697613 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
3482021-11-19 16:34:02 us=755811 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
349WRrrr2021-11-19 16:34:07 us=107874 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
350WRR2021-11-19 16:34:07 us=129295 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:18112505-01d9-47fc-88fe-8950efe9d851:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
3512021-11-19 16:34:07 us=129541 TCP/UDP: Closing socket
3522021-11-19 16:34:07 us=129633 SIGUSR1[soft,auth-failure] received, process restarting
3532021-11-19 16:34:07 us=129650 Restart pause, 2 second(s)
354🔐 CHALLENGE: Welcome <username>, Please enter OTP code
3552021-11-19 16:34:09 us=135965 Re-using SSL/TLS context
3562021-11-19 16:34:09 us=136004 LZO compression initializing
3572021-11-19 16:34:09 us=136185 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
3582021-11-19 16:34:09 us=136218 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
3592021-11-19 16:34:09 us=136345 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
3602021-11-19 16:34:09 us=136367 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
3612021-11-19 16:34:09 us=136407 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
3622021-11-19 16:34:09 us=136448 Socket Buffers: R=[131072->131072] S=[16384->16384]
3632021-11-19 16:34:09 us=136454 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
3642021-11-19 16:34:09 us=147887 TCP connection established with [AF_INET]1.2.3.4:443
3652021-11-19 16:34:09 us=147930 TCP_CLIENT link local: (not bound)
3662021-11-19 16:34:09 us=147942 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
367WrrR2021-11-19 16:34:09 us=158253 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=2ce5c9e0 f1ac42ed
368W2021-11-19 16:34:09 us=158412 net_route_v4_best_gw query: dst 0.0.0.0
3692021-11-19 16:34:09 us=158508 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
370WRWR2021-11-19 16:34:09 us=190851 VERIFY OK: depth=1, CN=XXXXXX VPN
3712021-11-19 16:34:09 us=190968 VERIFY KU OK
3722021-11-19 16:34:09 us=190978 Validating certificate extended key usage
3732021-11-19 16:34:09 us=190985 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
3742021-11-19 16:34:09 us=190991 VERIFY EKU OK
3752021-11-19 16:34:09 us=190999 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
376WRWRW2021-11-19 16:34:09 us=211947 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
3772021-11-19 16:34:09 us=211987 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
378r2021-11-19 16:34:10 us=175916 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
379WRR2021-11-19 16:34:10 us=398458 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
3802021-11-19 16:34:10 us=398616 TCP/UDP: Closing socket
3812021-11-19 16:34:10 us=398683 SIGUSR1[soft,auth-failure] received, process restarting
3822021-11-19 16:34:10 us=398702 Restart pause, 2 second(s)
3832021-11-19 16:34:12 us=398822 Re-using SSL/TLS context
3842021-11-19 16:34:12 us=398848 LZO compression initializing
3852021-11-19 16:34:12 us=398928 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
3862021-11-19 16:34:12 us=398942 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
3872021-11-19 16:34:12 us=398972 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
3882021-11-19 16:34:12 us=398979 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
3892021-11-19 16:34:12 us=398992 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
3902021-11-19 16:34:12 us=399025 Socket Buffers: R=[131072->131072] S=[16384->16384]
3912021-11-19 16:34:12 us=399034 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
3922021-11-19 16:34:12 us=410367 TCP connection established with [AF_INET]1.2.3.4:443
3932021-11-19 16:34:12 us=410414 TCP_CLIENT link local: (not bound)
3942021-11-19 16:34:12 us=410427 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
395WR2021-11-19 16:34:12 us=421467 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=dc193930 c1552ccc
396W2021-11-19 16:34:12 us=421629 net_route_v4_best_gw query: dst 0.0.0.0
3972021-11-19 16:34:12 us=421954 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
398WRWR2021-11-19 16:34:12 us=454826 VERIFY OK: depth=1, CN=XXXXXX VPN
3992021-11-19 16:34:12 us=455090 VERIFY KU OK
4002021-11-19 16:34:12 us=455121 Validating certificate extended key usage
4012021-11-19 16:34:12 us=455133 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
4022021-11-19 16:34:12 us=455142 VERIFY EKU OK
4032021-11-19 16:34:12 us=455153 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
404WRWRW2021-11-19 16:34:12 us=478968 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
4052021-11-19 16:34:12 us=479018 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
4062021-11-19 16:34:13 us=639797 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
407WRrr2021-11-19 16:34:18 us=275854 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
408WRR2021-11-19 16:34:18 us=296966 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:23a98c99-a57f-4a0c-8a27-e7304c904092:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
4092021-11-19 16:34:18 us=297117 TCP/UDP: Closing socket
4102021-11-19 16:34:18 us=297188 SIGUSR1[soft,auth-failure] received, process restarting
4112021-11-19 16:34:18 us=297212 Restart pause, 2 second(s)
412🔐 CHALLENGE: Welcome <username>, Please enter OTP code
4132021-11-19 16:34:20 us=302526 Re-using SSL/TLS context
4142021-11-19 16:34:20 us=302581 LZO compression initializing
4152021-11-19 16:34:20 us=302682 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
4162021-11-19 16:34:20 us=302706 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
4172021-11-19 16:34:20 us=302746 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
4182021-11-19 16:34:20 us=302757 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
4192021-11-19 16:34:20 us=302774 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
4202021-11-19 16:34:20 us=302809 Socket Buffers: R=[131072->131072] S=[16384->16384]
4212021-11-19 16:34:20 us=302821 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
4222021-11-19 16:34:20 us=396113 TCP connection established with [AF_INET]1.2.3.4:443
4232021-11-19 16:34:20 us=396173 TCP_CLIENT link local: (not bound)
4242021-11-19 16:34:20 us=396246 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
425WrR2021-11-19 16:34:20 us=407004 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=33811a65 f0d08152
426W2021-11-19 16:34:20 us=407179 net_route_v4_best_gw query: dst 0.0.0.0
4272021-11-19 16:34:20 us=407326 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
428WRWR2021-11-19 16:34:20 us=439086 VERIFY OK: depth=1, CN=XXXXXX VPN
4292021-11-19 16:34:20 us=439320 VERIFY KU OK
4302021-11-19 16:34:20 us=439336 Validating certificate extended key usage
4312021-11-19 16:34:20 us=439347 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
4322021-11-19 16:34:20 us=439359 VERIFY EKU OK
4332021-11-19 16:34:20 us=439371 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
434WRWRW2021-11-19 16:34:20 us=461233 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
4352021-11-19 16:34:20 us=461298 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
4362021-11-19 16:34:21 us=491962 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
437WRR2021-11-19 16:34:21 us=669303 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
4382021-11-19 16:34:21 us=669417 TCP/UDP: Closing socket
4392021-11-19 16:34:21 us=669464 SIGUSR1[soft,auth-failure] received, process restarting
4402021-11-19 16:34:21 us=669479 Restart pause, 2 second(s)
4412021-11-19 16:34:23 us=669663 Re-using SSL/TLS context
4422021-11-19 16:34:23 us=669713 LZO compression initializing
4432021-11-19 16:34:23 us=669866 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
4442021-11-19 16:34:23 us=669898 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
4452021-11-19 16:34:23 us=669944 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
4462021-11-19 16:34:23 us=669956 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
4472021-11-19 16:34:23 us=669977 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
4482021-11-19 16:34:23 us=670022 Socket Buffers: R=[131072->131072] S=[16384->16384]
4492021-11-19 16:34:23 us=670035 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
4502021-11-19 16:34:23 us=726624 TCP connection established with [AF_INET]1.2.3.4:443
4512021-11-19 16:34:23 us=726692 TCP_CLIENT link local: (not bound)
4522021-11-19 16:34:23 us=726706 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
453WR2021-11-19 16:34:23 us=736962 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=d4470c86 283dd7d9
454W2021-11-19 16:34:23 us=737106 net_route_v4_best_gw query: dst 0.0.0.0
4552021-11-19 16:34:23 us=737220 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
456WRWR2021-11-19 16:34:23 us=891788 VERIFY OK: depth=1, CN=XXXXXX VPN
4572021-11-19 16:34:23 us=892051 VERIFY KU OK
4582021-11-19 16:34:23 us=892092 Validating certificate extended key usage
4592021-11-19 16:34:23 us=892108 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
4602021-11-19 16:34:23 us=892123 VERIFY EKU OK
4612021-11-19 16:34:23 us=892135 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
462WRWRW2021-11-19 16:34:23 us=918529 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
4632021-11-19 16:34:23 us=918602 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
4642021-11-19 16:34:24 us=975755 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
465WRrrrrrr2021-11-19 16:34:29 us=592208 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
466WRR2021-11-19 16:34:29 us=612985 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:12bb6cc5-fb73-4f9f-a8c3-a314d07939ee:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
4672021-11-19 16:34:29 us=613146 TCP/UDP: Closing socket
4682021-11-19 16:34:29 us=613232 SIGUSR1[soft,auth-failure] received, process restarting
4692021-11-19 16:34:29 us=613258 Restart pause, 2 second(s)
470🔐 CHALLENGE: Welcome <username>, Please enter OTP code
4712021-11-19 16:34:31 us=617968 Re-using SSL/TLS context
4722021-11-19 16:34:31 us=617997 LZO compression initializing
4732021-11-19 16:34:31 us=618069 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
4742021-11-19 16:34:31 us=618082 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
4752021-11-19 16:34:31 us=618108 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
4762021-11-19 16:34:31 us=618113 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
4772021-11-19 16:34:31 us=618123 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
4782021-11-19 16:34:31 us=618143 Socket Buffers: R=[131072->131072] S=[16384->16384]
4792021-11-19 16:34:31 us=618148 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
4802021-11-19 16:34:31 us=705739 TCP connection established with [AF_INET]1.2.3.4:443
4812021-11-19 16:34:31 us=705791 TCP_CLIENT link local: (not bound)
4822021-11-19 16:34:31 us=705807 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
483WrrrrrrrrrrR2021-11-19 16:34:31 us=716015 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=8002a0aa cb7a51cd
484W2021-11-19 16:34:31 us=716207 net_route_v4_best_gw query: dst 0.0.0.0
4852021-11-19 16:34:31 us=716363 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
486WRWR2021-11-19 16:34:31 us=861273 VERIFY OK: depth=1, CN=XXXXXX VPN
4872021-11-19 16:34:31 us=861456 VERIFY KU OK
4882021-11-19 16:34:31 us=861470 Validating certificate extended key usage
4892021-11-19 16:34:31 us=861482 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
4902021-11-19 16:34:31 us=861493 VERIFY EKU OK
4912021-11-19 16:34:31 us=861504 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
492WRWRW2021-11-19 16:34:31 us=928843 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
4932021-11-19 16:34:31 us=928891 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
494r2021-11-19 16:34:32 us=542370 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
495WrrrrRR2021-11-19 16:34:32 us=611581 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
4962021-11-19 16:34:32 us=611921 TCP/UDP: Closing socket
4972021-11-19 16:34:32 us=612085 SIGUSR1[soft,auth-failure] received, process restarting
4982021-11-19 16:34:32 us=612158 Restart pause, 2 second(s)
4992021-11-19 16:34:34 us=612339 Re-using SSL/TLS context
5002021-11-19 16:34:34 us=612373 LZO compression initializing
5012021-11-19 16:34:34 us=612456 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
5022021-11-19 16:34:34 us=612474 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
5032021-11-19 16:34:34 us=612524 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
5042021-11-19 16:34:34 us=612535 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
5052021-11-19 16:34:34 us=612552 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
5062021-11-19 16:34:34 us=612584 Socket Buffers: R=[131072->131072] S=[16384->16384]
5072021-11-19 16:34:34 us=612595 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
5082021-11-19 16:34:34 us=623979 TCP connection established with [AF_INET]1.2.3.4:443
5092021-11-19 16:34:34 us=624033 TCP_CLIENT link local: (not bound)
5102021-11-19 16:34:34 us=624048 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
511WR2021-11-19 16:34:34 us=634469 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=81fd427f 6f2a3a1f
512W2021-11-19 16:34:34 us=634649 net_route_v4_best_gw query: dst 0.0.0.0
5132021-11-19 16:34:34 us=634840 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
514WRWR2021-11-19 16:34:34 us=665654 VERIFY OK: depth=1, CN=XXXXXX VPN
5152021-11-19 16:34:34 us=665756 VERIFY KU OK
5162021-11-19 16:34:34 us=665764 Validating certificate extended key usage
5172021-11-19 16:34:34 us=665769 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
5182021-11-19 16:34:34 us=665774 VERIFY EKU OK
5192021-11-19 16:34:34 us=665780 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
520WRWRW2021-11-19 16:34:34 us=685995 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
5212021-11-19 16:34:34 us=686039 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
5222021-11-19 16:34:35 us=831778 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
523WR2021-11-19 16:34:41 us=31783 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
524WRR2021-11-19 16:34:41 us=87474 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:72027218-142c-4713-a94a-d7f5e268bab8:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
5252021-11-19 16:34:41 us=87591 TCP/UDP: Closing socket
5262021-11-19 16:34:41 us=87651 SIGUSR1[soft,auth-failure] received, process restarting
5272021-11-19 16:34:41 us=87668 Restart pause, 2 second(s)
528🔐 CHALLENGE: Welcome <username>, Please enter OTP code
5292021-11-19 16:34:43 us=94059 Re-using SSL/TLS context
5302021-11-19 16:34:43 us=94092 LZO compression initializing
5312021-11-19 16:34:43 us=94187 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
5322021-11-19 16:34:43 us=94206 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
5332021-11-19 16:34:43 us=94232 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
5342021-11-19 16:34:43 us=94239 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
5352021-11-19 16:34:43 us=94255 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
5362021-11-19 16:34:43 us=94282 Socket Buffers: R=[131072->131072] S=[16384->16384]
5372021-11-19 16:34:43 us=94289 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
5382021-11-19 16:34:43 us=108443 TCP connection established with [AF_INET]1.2.3.4:443
5392021-11-19 16:34:43 us=108488 TCP_CLIENT link local: (not bound)
5402021-11-19 16:34:43 us=108498 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
541WR2021-11-19 16:34:43 us=118469 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=df10998e e00bc292
542W2021-11-19 16:34:43 us=118747 net_route_v4_best_gw query: dst 0.0.0.0
5432021-11-19 16:34:43 us=118885 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
544WRWR2021-11-19 16:34:43 us=150546 VERIFY OK: depth=1, CN=XXXXXX VPN
5452021-11-19 16:34:43 us=150731 VERIFY KU OK
5462021-11-19 16:34:43 us=150745 Validating certificate extended key usage
5472021-11-19 16:34:43 us=150756 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
5482021-11-19 16:34:43 us=150766 VERIFY EKU OK
5492021-11-19 16:34:43 us=150774 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
550WRWRW2021-11-19 16:34:43 us=171395 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
5512021-11-19 16:34:43 us=171463 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
5522021-11-19 16:34:44 us=419762 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
553WRR2021-11-19 16:34:44 us=485917 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
5542021-11-19 16:34:44 us=486050 TCP/UDP: Closing socket
5552021-11-19 16:34:44 us=486109 SIGUSR1[soft,auth-failure] received, process restarting
5562021-11-19 16:34:44 us=486129 Restart pause, 2 second(s)
5572021-11-19 16:34:46 us=486247 Re-using SSL/TLS context
5582021-11-19 16:34:46 us=486273 LZO compression initializing
5592021-11-19 16:34:46 us=486337 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
5602021-11-19 16:34:46 us=486348 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
5612021-11-19 16:34:46 us=486372 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
5622021-11-19 16:34:46 us=486377 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
5632021-11-19 16:34:46 us=486387 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
5642021-11-19 16:34:46 us=486412 Socket Buffers: R=[131072->131072] S=[16384->16384]
5652021-11-19 16:34:46 us=486417 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
5662021-11-19 16:34:46 us=497496 TCP connection established with [AF_INET]1.2.3.4:443
5672021-11-19 16:34:46 us=497528 TCP_CLIENT link local: (not bound)
5682021-11-19 16:34:46 us=497536 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
569WR2021-11-19 16:34:46 us=508039 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=19525399 5e5776bc
570W2021-11-19 16:34:46 us=508178 net_route_v4_best_gw query: dst 0.0.0.0
5712021-11-19 16:34:46 us=508296 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
572WRWR2021-11-19 16:34:46 us=541621 VERIFY OK: depth=1, CN=XXXXXX VPN
5732021-11-19 16:34:46 us=541759 VERIFY KU OK
5742021-11-19 16:34:46 us=541771 Validating certificate extended key usage
5752021-11-19 16:34:46 us=541779 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
5762021-11-19 16:34:46 us=541787 VERIFY EKU OK
5772021-11-19 16:34:46 us=541793 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
578WRWRW2021-11-19 16:34:46 us=562648 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
5792021-11-19 16:34:46 us=562687 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
5802021-11-19 16:34:47 us=665083 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
581WRr2021-11-19 16:34:53 us=87884 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
582WRR2021-11-19 16:34:53 us=108379 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:c74f2f2b-620e-4f18-8997-39ee6b9d9fdd:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
5832021-11-19 16:34:53 us=108510 TCP/UDP: Closing socket
5842021-11-19 16:34:53 us=108564 SIGUSR1[soft,auth-failure] received, process restarting
5852021-11-19 16:34:53 us=108579 Restart pause, 2 second(s)
586🔐 CHALLENGE: Welcome <username>, Please enter OTP code
5872021-11-19 16:34:55 us=114194 Re-using SSL/TLS context
5882021-11-19 16:34:55 us=114231 LZO compression initializing
5892021-11-19 16:34:55 us=114322 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
5902021-11-19 16:34:55 us=114338 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
5912021-11-19 16:34:55 us=114365 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
5922021-11-19 16:34:55 us=114370 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
5932021-11-19 16:34:55 us=114381 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
5942021-11-19 16:34:55 us=114404 Socket Buffers: R=[131072->131072] S=[16384->16384]
5952021-11-19 16:34:55 us=114410 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
5962021-11-19 16:34:55 us=125502 TCP connection established with [AF_INET]1.2.3.4:443
5972021-11-19 16:34:55 us=125533 TCP_CLIENT link local: (not bound)
5982021-11-19 16:34:55 us=125539 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
599WR2021-11-19 16:34:55 us=135916 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=6d698455 9f61f95d
600W2021-11-19 16:34:55 us=136027 net_route_v4_best_gw query: dst 0.0.0.0
6012021-11-19 16:34:55 us=136120 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
602WRWR2021-11-19 16:34:55 us=166645 VERIFY OK: depth=1, CN=XXXXXX VPN
6032021-11-19 16:34:55 us=166848 VERIFY KU OK
6042021-11-19 16:34:55 us=166863 Validating certificate extended key usage
6052021-11-19 16:34:55 us=166874 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
6062021-11-19 16:34:55 us=166883 VERIFY EKU OK
6072021-11-19 16:34:55 us=166894 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
608WRWRW2021-11-19 16:34:55 us=186852 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
6092021-11-19 16:34:55 us=186898 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
6102021-11-19 16:34:56 us=332768 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
611WRR2021-11-19 16:34:56 us=420841 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
6122021-11-19 16:34:56 us=421021 TCP/UDP: Closing socket
6132021-11-19 16:34:56 us=421111 SIGUSR1[soft,auth-failure] received, process restarting
6142021-11-19 16:34:56 us=421129 Restart pause, 2 second(s)
6152021-11-19 16:34:58 us=421338 Re-using SSL/TLS context
6162021-11-19 16:34:58 us=421368 LZO compression initializing
6172021-11-19 16:34:58 us=421463 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
6182021-11-19 16:34:58 us=421479 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
6192021-11-19 16:34:58 us=421507 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
6202021-11-19 16:34:58 us=421512 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
6212021-11-19 16:34:58 us=421522 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
6222021-11-19 16:34:58 us=421549 Socket Buffers: R=[131072->131072] S=[16384->16384]
6232021-11-19 16:34:58 us=421555 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
6242021-11-19 16:34:58 us=432715 TCP connection established with [AF_INET]1.2.3.4:443
6252021-11-19 16:34:58 us=432750 TCP_CLIENT link local: (not bound)
6262021-11-19 16:34:58 us=432758 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
627WR2021-11-19 16:34:58 us=444797 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=5a3242d6 455c9d38
628W2021-11-19 16:34:58 us=444915 net_route_v4_best_gw query: dst 0.0.0.0
6292021-11-19 16:34:58 us=445064 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
630WRWR2021-11-19 16:34:58 us=477042 VERIFY OK: depth=1, CN=XXXXXX VPN
6312021-11-19 16:34:58 us=477195 VERIFY KU OK
6322021-11-19 16:34:58 us=477207 Validating certificate extended key usage
6332021-11-19 16:34:58 us=477218 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
6342021-11-19 16:34:58 us=477224 VERIFY EKU OK
6352021-11-19 16:34:58 us=477233 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
636WRWRW2021-11-19 16:34:58 us=498803 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
6372021-11-19 16:34:58 us=498851 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
6382021-11-19 16:34:59 us=740161 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
639WR2021-11-19 16:35:05 us=11860 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
640WRR2021-11-19 16:35:05 us=31505 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:ab3ee2fc-f553-4dd3-811c-508a8c92c80c:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
6412021-11-19 16:35:05 us=31627 TCP/UDP: Closing socket
6422021-11-19 16:35:05 us=31691 SIGUSR1[soft,auth-failure] received, process restarting
6432021-11-19 16:35:05 us=31711 Restart pause, 2 second(s)
644🔐 CHALLENGE: Welcome <username>, Please enter OTP code
6452021-11-19 16:35:07 us=36465 Re-using SSL/TLS context
6462021-11-19 16:35:07 us=36492 LZO compression initializing
6472021-11-19 16:35:07 us=36561 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
6482021-11-19 16:35:07 us=36573 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
6492021-11-19 16:35:07 us=36598 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
6502021-11-19 16:35:07 us=36604 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
6512021-11-19 16:35:07 us=36613 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
6522021-11-19 16:35:07 us=36633 Socket Buffers: R=[131072->131072] S=[16384->16384]
6532021-11-19 16:35:07 us=36639 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
6542021-11-19 16:35:07 us=48395 TCP connection established with [AF_INET]1.2.3.4:443
6552021-11-19 16:35:07 us=48424 TCP_CLIENT link local: (not bound)
6562021-11-19 16:35:07 us=48431 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
657WR2021-11-19 16:35:07 us=60450 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=7d0ba77d 656c0270
658W2021-11-19 16:35:07 us=60697 net_route_v4_best_gw query: dst 0.0.0.0
6592021-11-19 16:35:07 us=60815 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
660WRWR2021-11-19 16:35:07 us=92194 VERIFY OK: depth=1, CN=XXXXXX VPN
6612021-11-19 16:35:07 us=92385 VERIFY KU OK
6622021-11-19 16:35:07 us=92402 Validating certificate extended key usage
6632021-11-19 16:35:07 us=92412 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
6642021-11-19 16:35:07 us=92421 VERIFY EKU OK
6652021-11-19 16:35:07 us=92428 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
666WRWRW2021-11-19 16:35:07 us=114294 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
6672021-11-19 16:35:07 us=114347 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
6682021-11-19 16:35:08 us=167833 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
669WRR2021-11-19 16:35:08 us=230762 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
6702021-11-19 16:35:08 us=230901 TCP/UDP: Closing socket
6712021-11-19 16:35:08 us=230958 SIGUSR1[soft,auth-failure] received, process restarting
6722021-11-19 16:35:08 us=230976 Restart pause, 2 second(s)
6732021-11-19 16:35:10 us=231115 Re-using SSL/TLS context
6742021-11-19 16:35:10 us=231158 LZO compression initializing
6752021-11-19 16:35:10 us=231263 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
6762021-11-19 16:35:10 us=231286 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
6772021-11-19 16:35:10 us=231334 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
6782021-11-19 16:35:10 us=231349 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
6792021-11-19 16:35:10 us=231367 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
6802021-11-19 16:35:10 us=231413 Socket Buffers: R=[131072->131072] S=[16384->16384]
6812021-11-19 16:35:10 us=231424 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
6822021-11-19 16:35:10 us=282530 TCP connection established with [AF_INET]1.2.3.4:443
6832021-11-19 16:35:10 us=282576 TCP_CLIENT link local: (not bound)
6842021-11-19 16:35:10 us=282589 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
685WR2021-11-19 16:35:10 us=293607 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=7e559510 9d36f5b6
686W2021-11-19 16:35:10 us=293767 net_route_v4_best_gw query: dst 0.0.0.0
6872021-11-19 16:35:10 us=293917 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
688WRWR2021-11-19 16:35:10 us=599581 VERIFY OK: depth=1, CN=XXXXXX VPN
6892021-11-19 16:35:10 us=599718 VERIFY KU OK
6902021-11-19 16:35:10 us=599730 Validating certificate extended key usage
6912021-11-19 16:35:10 us=599738 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
6922021-11-19 16:35:10 us=599745 VERIFY EKU OK
6932021-11-19 16:35:10 us=599752 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
694WRWRW2021-11-19 16:35:10 us=727881 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
6952021-11-19 16:35:10 us=727923 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
6962021-11-19 16:35:11 us=907861 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
697WR2021-11-19 16:35:16 us=206758 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
698WRR2021-11-19 16:35:16 us=227833 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:43fc1d71-dc4e-4d07-8c8e-120b1cbe6944:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
6992021-11-19 16:35:16 us=227966 TCP/UDP: Closing socket
7002021-11-19 16:35:16 us=228038 SIGUSR1[soft,auth-failure] received, process restarting
7012021-11-19 16:35:16 us=228057 Restart pause, 2 second(s)
702🔐 CHALLENGE: Welcome <username>, Please enter OTP code
7032021-11-19 16:35:18 us=232930 Re-using SSL/TLS context
7042021-11-19 16:35:18 us=232981 LZO compression initializing
7052021-11-19 16:35:18 us=233086 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
7062021-11-19 16:35:18 us=233108 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
7072021-11-19 16:35:18 us=233139 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
7082021-11-19 16:35:18 us=233146 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
7092021-11-19 16:35:18 us=233157 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
7102021-11-19 16:35:18 us=233185 Socket Buffers: R=[131072->131072] S=[16384->16384]
7112021-11-19 16:35:18 us=233193 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
7122021-11-19 16:35:18 us=246934 TCP connection established with [AF_INET]1.2.3.4:443
7132021-11-19 16:35:18 us=246963 TCP_CLIENT link local: (not bound)
7142021-11-19 16:35:18 us=246973 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
715WR2021-11-19 16:35:18 us=257303 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=c267d0df 16035d5d
716W2021-11-19 16:35:18 us=257406 net_route_v4_best_gw query: dst 0.0.0.0
7172021-11-19 16:35:18 us=257520 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
718WRWR2021-11-19 16:35:18 us=290522 VERIFY OK: depth=1, CN=XXXXXX VPN
7192021-11-19 16:35:18 us=290637 VERIFY KU OK
7202021-11-19 16:35:18 us=290644 Validating certificate extended key usage
7212021-11-19 16:35:18 us=290650 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
7222021-11-19 16:35:18 us=290654 VERIFY EKU OK
7232021-11-19 16:35:18 us=290659 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
724WRWRW2021-11-19 16:35:18 us=310133 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
7252021-11-19 16:35:18 us=310185 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
7262021-11-19 16:35:19 us=359758 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
727WRR2021-11-19 16:35:19 us=422006 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
7282021-11-19 16:35:19 us=422202 TCP/UDP: Closing socket
7292021-11-19 16:35:19 us=422282 SIGUSR1[soft,auth-failure] received, process restarting
7302021-11-19 16:35:19 us=422302 Restart pause, 2 second(s)
7312021-11-19 16:35:21 us=422496 Re-using SSL/TLS context
7322021-11-19 16:35:21 us=422536 LZO compression initializing
7332021-11-19 16:35:21 us=422633 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
7342021-11-19 16:35:21 us=422655 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
7352021-11-19 16:35:21 us=422703 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
7362021-11-19 16:35:21 us=422715 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
7372021-11-19 16:35:21 us=422735 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
7382021-11-19 16:35:21 us=422778 Socket Buffers: R=[131072->131072] S=[16384->16384]
7392021-11-19 16:35:21 us=422785 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
7402021-11-19 16:35:21 us=446366 TCP connection established with [AF_INET]1.2.3.4:443
7412021-11-19 16:35:21 us=446399 TCP_CLIENT link local: (not bound)
7422021-11-19 16:35:21 us=446407 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
743WR2021-11-19 16:35:21 us=458434 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=b43a1644 1d6fe1a1
744W2021-11-19 16:35:21 us=458733 net_route_v4_best_gw query: dst 0.0.0.0
7452021-11-19 16:35:21 us=458901 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
746WRWR2021-11-19 16:35:21 us=489590 VERIFY OK: depth=1, CN=XXXXXX VPN
7472021-11-19 16:35:21 us=489726 VERIFY KU OK
7482021-11-19 16:35:21 us=489737 Validating certificate extended key usage
7492021-11-19 16:35:21 us=489745 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
7502021-11-19 16:35:21 us=489755 VERIFY EKU OK
7512021-11-19 16:35:21 us=489762 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
752WRWRW2021-11-19 16:35:21 us=510551 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
7532021-11-19 16:35:21 us=510589 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
7542021-11-19 16:35:22 us=715812 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
755WR2021-11-19 16:35:27 us=951775 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
756WRR2021-11-19 16:35:27 us=974740 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:125b169c-ebb5-4bd9-9d2a-8af63d36bac7:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
7572021-11-19 16:35:27 us=974943 TCP/UDP: Closing socket
7582021-11-19 16:35:27 us=975033 SIGUSR1[soft,auth-failure] received, process restarting
7592021-11-19 16:35:27 us=975060 Restart pause, 2 second(s)
760🔐 CHALLENGE: Welcome <username>, Please enter OTP code
7612021-11-19 16:35:29 us=980697 Re-using SSL/TLS context
7622021-11-19 16:35:29 us=980780 LZO compression initializing
7632021-11-19 16:35:29 us=980962 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
7642021-11-19 16:35:29 us=981019 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
7652021-11-19 16:35:29 us=981094 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
7662021-11-19 16:35:29 us=981111 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
7672021-11-19 16:35:29 us=981138 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
7682021-11-19 16:35:29 us=981199 Socket Buffers: R=[131072->131072] S=[16384->16384]
7692021-11-19 16:35:29 us=981218 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
7702021-11-19 16:35:31 us=19644 TCP connection established with [AF_INET]1.2.3.4:443
7712021-11-19 16:35:31 us=19686 TCP_CLIENT link local: (not bound)
7722021-11-19 16:35:31 us=19698 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
773WR2021-11-19 16:35:31 us=30045 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=0acfbde0 e145fa42
774W2021-11-19 16:35:31 us=30342 net_route_v4_best_gw query: dst 0.0.0.0
7752021-11-19 16:35:31 us=30527 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
776WRWR2021-11-19 16:35:31 us=62538 VERIFY OK: depth=1, CN=XXXXXX VPN
7772021-11-19 16:35:31 us=62666 VERIFY KU OK
7782021-11-19 16:35:31 us=62676 Validating certificate extended key usage
7792021-11-19 16:35:31 us=62684 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
7802021-11-19 16:35:31 us=62690 VERIFY EKU OK
7812021-11-19 16:35:31 us=62696 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
782WRWRW2021-11-19 16:35:31 us=193313 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
7832021-11-19 16:35:31 us=193357 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
7842021-11-19 16:35:32 us=346067 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
785WRR2021-11-19 16:35:32 us=413501 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
7862021-11-19 16:35:32 us=413634 TCP/UDP: Closing socket
7872021-11-19 16:35:32 us=413694 SIGUSR1[soft,auth-failure] received, process restarting
7882021-11-19 16:35:32 us=413713 Restart pause, 2 second(s)
7892021-11-19 16:35:34 us=413874 Re-using SSL/TLS context
7902021-11-19 16:35:34 us=413924 LZO compression initializing
7912021-11-19 16:35:34 us=414028 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
7922021-11-19 16:35:34 us=414060 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
7932021-11-19 16:35:34 us=414116 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
7942021-11-19 16:35:34 us=414132 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
7952021-11-19 16:35:34 us=414156 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
7962021-11-19 16:35:34 us=414200 Socket Buffers: R=[131072->131072] S=[16384->16384]
7972021-11-19 16:35:34 us=414218 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
7982021-11-19 16:35:34 us=425563 TCP connection established with [AF_INET]1.2.3.4:443
7992021-11-19 16:35:34 us=425619 TCP_CLIENT link local: (not bound)
8002021-11-19 16:35:34 us=425636 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
801WR2021-11-19 16:35:34 us=435647 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=7a9bfa0e 3155fa56
802W2021-11-19 16:35:34 us=435824 net_route_v4_best_gw query: dst 0.0.0.0
8032021-11-19 16:35:34 us=435942 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
804WRWR2021-11-19 16:35:34 us=467658 VERIFY OK: depth=1, CN=XXXXXX VPN
8052021-11-19 16:35:34 us=467814 VERIFY KU OK
8062021-11-19 16:35:34 us=467825 Validating certificate extended key usage
8072021-11-19 16:35:34 us=467834 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
8082021-11-19 16:35:34 us=467841 VERIFY EKU OK
8092021-11-19 16:35:34 us=467847 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
810WRWRW2021-11-19 16:35:34 us=489169 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
8112021-11-19 16:35:34 us=489211 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
8122021-11-19 16:35:35 us=743863 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
813WR2021-11-19 16:35:41 us=27758 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
814WRR2021-11-19 16:35:41 us=120499 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:f3f679d4-fb86-412a-9501-c9c608b1ff17:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
8152021-11-19 16:35:41 us=120662 TCP/UDP: Closing socket
8162021-11-19 16:35:41 us=120724 SIGUSR1[soft,auth-failure] received, process restarting
8172021-11-19 16:35:41 us=120742 Restart pause, 2 second(s)
818🔐 CHALLENGE: Welcome <username>, Please enter OTP code
8192021-11-19 16:35:43 us=128272 Re-using SSL/TLS context
8202021-11-19 16:35:43 us=128313 LZO compression initializing
8212021-11-19 16:35:43 us=128391 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
8222021-11-19 16:35:43 us=128408 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
8232021-11-19 16:35:43 us=128433 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
8242021-11-19 16:35:43 us=128438 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
8252021-11-19 16:35:43 us=128447 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
8262021-11-19 16:35:43 us=128477 Socket Buffers: R=[131072->131072] S=[16384->16384]
8272021-11-19 16:35:43 us=128492 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
8282021-11-19 16:35:43 us=139734 TCP connection established with [AF_INET]1.2.3.4:443
8292021-11-19 16:35:43 us=139776 TCP_CLIENT link local: (not bound)
8302021-11-19 16:35:43 us=139783 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
831WR2021-11-19 16:35:43 us=150185 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=f368f69c 81d59033
832W2021-11-19 16:35:43 us=150302 net_route_v4_best_gw query: dst 0.0.0.0
8332021-11-19 16:35:43 us=150407 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
834WRWR2021-11-19 16:35:43 us=180878 VERIFY OK: depth=1, CN=XXXXXX VPN
8352021-11-19 16:35:43 us=181026 VERIFY KU OK
8362021-11-19 16:35:43 us=181050 Validating certificate extended key usage
8372021-11-19 16:35:43 us=181058 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
8382021-11-19 16:35:43 us=181062 VERIFY EKU OK
8392021-11-19 16:35:43 us=181066 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
840WRWRW2021-11-19 16:35:43 us=200947 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
8412021-11-19 16:35:43 us=201086 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
8422021-11-19 16:35:44 us=383794 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
843WRR2021-11-19 16:35:44 us=445967 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
8442021-11-19 16:35:44 us=446159 TCP/UDP: Closing socket
8452021-11-19 16:35:44 us=446230 SIGUSR1[soft,auth-failure] received, process restarting
8462021-11-19 16:35:44 us=446254 Restart pause, 2 second(s)
8472021-11-19 16:35:46 us=446394 Re-using SSL/TLS context
8482021-11-19 16:35:46 us=446430 LZO compression initializing
8492021-11-19 16:35:46 us=446522 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
8502021-11-19 16:35:46 us=446543 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
8512021-11-19 16:35:46 us=446586 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
8522021-11-19 16:35:46 us=446599 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
8532021-11-19 16:35:46 us=446619 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
8542021-11-19 16:35:46 us=446663 Socket Buffers: R=[131072->131072] S=[16384->16384]
8552021-11-19 16:35:46 us=446679 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
8562021-11-19 16:35:46 us=457749 TCP connection established with [AF_INET]1.2.3.4:443
8572021-11-19 16:35:46 us=457795 TCP_CLIENT link local: (not bound)
8582021-11-19 16:35:46 us=457809 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
859WrR2021-11-19 16:35:46 us=478663 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=f0af2609 2524514a
860W2021-11-19 16:35:46 us=478927 net_route_v4_best_gw query: dst 0.0.0.0
8612021-11-19 16:35:46 us=479105 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
862WRWR2021-11-19 16:35:46 us=511372 VERIFY OK: depth=1, CN=XXXXXX VPN
8632021-11-19 16:35:46 us=511545 VERIFY KU OK
8642021-11-19 16:35:46 us=511561 Validating certificate extended key usage
8652021-11-19 16:35:46 us=511573 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
8662021-11-19 16:35:46 us=511583 VERIFY EKU OK
8672021-11-19 16:35:46 us=511592 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
868WRWRW2021-11-19 16:35:46 us=552974 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
8692021-11-19 16:35:46 us=553031 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
8702021-11-19 16:35:47 us=742942 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
871WR2021-11-19 16:35:52 us=959824 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
872WRR2021-11-19 16:35:52 us=980779 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:37361d7a-1e5e-46ce-936c-77314e0b9bbc:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
8732021-11-19 16:35:52 us=980880 TCP/UDP: Closing socket
8742021-11-19 16:35:52 us=980928 SIGUSR1[soft,auth-failure] received, process restarting
8752021-11-19 16:35:52 us=980943 Restart pause, 2 second(s)
876🔐 CHALLENGE: Welcome <username>, Please enter OTP code
8772021-11-19 16:35:54 us=985785 Re-using SSL/TLS context
8782021-11-19 16:35:54 us=985822 LZO compression initializing
8792021-11-19 16:35:54 us=985920 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
8802021-11-19 16:35:54 us=985933 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
8812021-11-19 16:35:54 us=985960 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
8822021-11-19 16:35:54 us=985968 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
8832021-11-19 16:35:54 us=985980 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
8842021-11-19 16:35:54 us=986008 Socket Buffers: R=[131072->131072] S=[16384->16384]
8852021-11-19 16:35:54 us=986017 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
8862021-11-19 16:35:55 us=1225 TCP connection established with [AF_INET]1.2.3.4:443
8872021-11-19 16:35:55 us=1283 TCP_CLIENT link local: (not bound)
8882021-11-19 16:35:55 us=1296 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
889WR2021-11-19 16:35:55 us=12814 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=4ca19802 31fc1d30
890W2021-11-19 16:35:55 us=12955 net_route_v4_best_gw query: dst 0.0.0.0
8912021-11-19 16:35:55 us=13090 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
892WRWR2021-11-19 16:35:55 us=47146 VERIFY OK: depth=1, CN=XXXXXX VPN
8932021-11-19 16:35:55 us=47283 VERIFY KU OK
8942021-11-19 16:35:55 us=47294 Validating certificate extended key usage
8952021-11-19 16:35:55 us=47302 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
8962021-11-19 16:35:55 us=47310 VERIFY EKU OK
8972021-11-19 16:35:55 us=47316 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
898WRWRW2021-11-19 16:35:55 us=68440 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
8992021-11-19 16:35:55 us=68473 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
9002021-11-19 16:35:56 us=327900 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
901WRR2021-11-19 16:35:56 us=410177 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
9022021-11-19 16:35:56 us=410402 TCP/UDP: Closing socket
9032021-11-19 16:35:56 us=410559 SIGUSR1[soft,auth-failure] received, process restarting
9042021-11-19 16:35:56 us=410610 Restart pause, 2 second(s)
9052021-11-19 16:35:58 us=410742 Re-using SSL/TLS context
9062021-11-19 16:35:58 us=410769 LZO compression initializing
9072021-11-19 16:35:58 us=410838 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
9082021-11-19 16:35:58 us=410849 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
9092021-11-19 16:35:58 us=410880 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
9102021-11-19 16:35:58 us=410886 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
9112021-11-19 16:35:58 us=410896 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
9122021-11-19 16:35:58 us=410920 Socket Buffers: R=[131072->131072] S=[16384->16384]
9132021-11-19 16:35:58 us=410926 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
9142021-11-19 16:35:58 us=421958 TCP connection established with [AF_INET]1.2.3.4:443
9152021-11-19 16:35:58 us=421987 TCP_CLIENT link local: (not bound)
9162021-11-19 16:35:58 us=421997 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
917WR2021-11-19 16:35:58 us=432281 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=b1583cbf 090c85ea
918W2021-11-19 16:35:58 us=432386 net_route_v4_best_gw query: dst 0.0.0.0
9192021-11-19 16:35:58 us=432484 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
920WRWR2021-11-19 16:35:58 us=466885 VERIFY OK: depth=1, CN=XXXXXX VPN
9212021-11-19 16:35:58 us=466985 VERIFY KU OK
9222021-11-19 16:35:58 us=466993 Validating certificate extended key usage
9232021-11-19 16:35:58 us=466999 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
9242021-11-19 16:35:58 us=467004 VERIFY EKU OK
9252021-11-19 16:35:58 us=467009 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
926WRWRW2021-11-19 16:35:58 us=489768 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
9272021-11-19 16:35:58 us=489803 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
9282021-11-19 16:35:59 us=703786 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
929WR2021-11-19 16:36:04 us=947793 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
930WRR2021-11-19 16:36:04 us=968440 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:4c900bb2-77ea-4670-ae17-ca37cf4ef226:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
9312021-11-19 16:36:04 us=968539 TCP/UDP: Closing socket
9322021-11-19 16:36:04 us=968587 SIGUSR1[soft,auth-failure] received, process restarting
9332021-11-19 16:36:04 us=968602 Restart pause, 2 second(s)
934🔐 CHALLENGE: Welcome <username>, Please enter OTP code
9352021-11-19 16:36:06 us=973835 Re-using SSL/TLS context
9362021-11-19 16:36:06 us=973883 LZO compression initializing
9372021-11-19 16:36:06 us=974010 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
9382021-11-19 16:36:06 us=974032 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
9392021-11-19 16:36:06 us=974060 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
9402021-11-19 16:36:06 us=974069 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
9412021-11-19 16:36:06 us=974089 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
9422021-11-19 16:36:06 us=974136 Socket Buffers: R=[131072->131072] S=[16384->16384]
9432021-11-19 16:36:06 us=974145 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
9442021-11-19 16:36:06 us=985070 TCP connection established with [AF_INET]1.2.3.4:443
9452021-11-19 16:36:06 us=985108 TCP_CLIENT link local: (not bound)
9462021-11-19 16:36:06 us=985117 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
947WR2021-11-19 16:36:06 us=995142 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=6b87c8de 380f5709
948W2021-11-19 16:36:06 us=995247 net_route_v4_best_gw query: dst 0.0.0.0
9492021-11-19 16:36:06 us=995351 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
950WRWR2021-11-19 16:36:07 us=26461 VERIFY OK: depth=1, CN=XXXXXX VPN
9512021-11-19 16:36:07 us=26580 VERIFY KU OK
9522021-11-19 16:36:07 us=26596 Validating certificate extended key usage
9532021-11-19 16:36:07 us=26604 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
9542021-11-19 16:36:07 us=26610 VERIFY EKU OK
9552021-11-19 16:36:07 us=26615 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
956WRWRW2021-11-19 16:36:07 us=46377 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
9572021-11-19 16:36:07 us=46427 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
9582021-11-19 16:36:08 us=259767 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
959WRR2021-11-19 16:36:08 us=322620 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
9602021-11-19 16:36:08 us=322773 TCP/UDP: Closing socket
9612021-11-19 16:36:08 us=322866 SIGUSR1[soft,auth-failure] received, process restarting
9622021-11-19 16:36:08 us=322892 Restart pause, 2 second(s)
9632021-11-19 16:36:10 us=323027 Re-using SSL/TLS context
9642021-11-19 16:36:10 us=323057 LZO compression initializing
9652021-11-19 16:36:10 us=323126 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
9662021-11-19 16:36:10 us=323138 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
9672021-11-19 16:36:10 us=323161 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
9682021-11-19 16:36:10 us=323168 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
9692021-11-19 16:36:10 us=323179 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
9702021-11-19 16:36:10 us=323216 Socket Buffers: R=[131072->131072] S=[16384->16384]
9712021-11-19 16:36:10 us=323223 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
9722021-11-19 16:36:10 us=449701 TCP connection established with [AF_INET]1.2.3.4:443
9732021-11-19 16:36:10 us=449759 TCP_CLIENT link local: (not bound)
9742021-11-19 16:36:10 us=449775 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
975WR2021-11-19 16:36:10 us=459834 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=33c2191d 3942f0f0
976W2021-11-19 16:36:10 us=459946 net_route_v4_best_gw query: dst 0.0.0.0
9772021-11-19 16:36:10 us=460044 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
978WRWR2021-11-19 16:36:10 us=618065 VERIFY OK: depth=1, CN=XXXXXX VPN
9792021-11-19 16:36:10 us=618176 VERIFY KU OK
9802021-11-19 16:36:10 us=618182 Validating certificate extended key usage
9812021-11-19 16:36:10 us=618188 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
9822021-11-19 16:36:10 us=618193 VERIFY EKU OK
9832021-11-19 16:36:10 us=618197 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
984WRWRW2021-11-19 16:36:10 us=686086 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
9852021-11-19 16:36:10 us=686158 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
9862021-11-19 16:36:11 us=843775 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
987WR2021-11-19 16:36:17 us=55899 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
988WRR2021-11-19 16:36:17 us=77657 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:8a252466-b01c-4bfe-8b37-56139c8a23e0:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
9892021-11-19 16:36:17 us=77794 TCP/UDP: Closing socket
9902021-11-19 16:36:17 us=77857 SIGUSR1[soft,auth-failure] received, process restarting
9912021-11-19 16:36:17 us=77871 Restart pause, 2 second(s)
992🔐 CHALLENGE: Welcome <username>, Please enter OTP code
9932021-11-19 16:36:19 us=82415 Re-using SSL/TLS context
9942021-11-19 16:36:19 us=82446 LZO compression initializing
9952021-11-19 16:36:19 us=82537 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
9962021-11-19 16:36:19 us=82553 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
9972021-11-19 16:36:19 us=82584 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
9982021-11-19 16:36:19 us=82592 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
9992021-11-19 16:36:19 us=82607 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
10002021-11-19 16:36:19 us=82639 Socket Buffers: R=[131072->131072] S=[16384->16384]
10012021-11-19 16:36:19 us=82774 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
10022021-11-19 16:36:19 us=94130 TCP connection established with [AF_INET]1.2.3.4:443
10032021-11-19 16:36:19 us=94178 TCP_CLIENT link local: (not bound)
10042021-11-19 16:36:19 us=94187 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1005WR2021-11-19 16:36:19 us=107585 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=177cef95 8dcc1d0c
1006W2021-11-19 16:36:19 us=107823 net_route_v4_best_gw query: dst 0.0.0.0
10072021-11-19 16:36:19 us=107999 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1008WRWR2021-11-19 16:36:19 us=140203 VERIFY OK: depth=1, CN=XXXXXX VPN
10092021-11-19 16:36:19 us=140310 VERIFY KU OK
10102021-11-19 16:36:19 us=140319 Validating certificate extended key usage
10112021-11-19 16:36:19 us=140325 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
10122021-11-19 16:36:19 us=140332 VERIFY EKU OK
10132021-11-19 16:36:19 us=140337 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1014WRWRW2021-11-19 16:36:19 us=160617 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
10152021-11-19 16:36:19 us=160652 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
10162021-11-19 16:36:20 us=371761 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1017WRR2021-11-19 16:36:20 us=590128 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
10182021-11-19 16:36:20 us=590275 TCP/UDP: Closing socket
10192021-11-19 16:36:20 us=590352 SIGUSR1[soft,auth-failure] received, process restarting
10202021-11-19 16:36:20 us=590368 Restart pause, 2 second(s)
10212021-11-19 16:36:22 us=590491 Re-using SSL/TLS context
10222021-11-19 16:36:22 us=590523 LZO compression initializing
10232021-11-19 16:36:22 us=590607 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
10242021-11-19 16:36:22 us=590625 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
10252021-11-19 16:36:22 us=590665 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
10262021-11-19 16:36:22 us=590675 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
10272021-11-19 16:36:22 us=590691 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
10282021-11-19 16:36:22 us=590732 Socket Buffers: R=[131072->131072] S=[16384->16384]
10292021-11-19 16:36:22 us=590743 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
10302021-11-19 16:36:22 us=601704 TCP connection established with [AF_INET]1.2.3.4:443
10312021-11-19 16:36:22 us=601769 TCP_CLIENT link local: (not bound)
10322021-11-19 16:36:22 us=601790 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1033WR2021-11-19 16:36:22 us=611850 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=b33787ac 6095ebaa
1034W2021-11-19 16:36:22 us=612016 net_route_v4_best_gw query: dst 0.0.0.0
10352021-11-19 16:36:22 us=612256 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1036WRWR2021-11-19 16:36:22 us=643853 VERIFY OK: depth=1, CN=XXXXXX VPN
10372021-11-19 16:36:22 us=644140 VERIFY KU OK
10382021-11-19 16:36:22 us=644167 Validating certificate extended key usage
10392021-11-19 16:36:22 us=644178 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
10402021-11-19 16:36:22 us=644188 VERIFY EKU OK
10412021-11-19 16:36:22 us=644196 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1042WRWRW2021-11-19 16:36:22 us=665553 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
10432021-11-19 16:36:22 us=665607 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
10442021-11-19 16:36:23 us=771872 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1045WR2021-11-19 16:36:28 us=908550 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1046WRR2021-11-19 16:36:28 us=929425 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:75eff7c3-78ce-4180-bd3c-3e653de3c1f7:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
10472021-11-19 16:36:28 us=929529 TCP/UDP: Closing socket
10482021-11-19 16:36:28 us=929598 SIGUSR1[soft,auth-failure] received, process restarting
10492021-11-19 16:36:28 us=929613 Restart pause, 2 second(s)
1050🔐 CHALLENGE: Welcome <username>, Please enter OTP code
10512021-11-19 16:36:30 us=936614 Re-using SSL/TLS context
10522021-11-19 16:36:30 us=936659 LZO compression initializing
10532021-11-19 16:36:30 us=936848 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
10542021-11-19 16:36:30 us=936880 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
10552021-11-19 16:36:30 us=936981 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
10562021-11-19 16:36:30 us=936998 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
10572021-11-19 16:36:30 us=937012 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
10582021-11-19 16:36:30 us=937050 Socket Buffers: R=[131072->131072] S=[16384->16384]
10592021-11-19 16:36:30 us=937057 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
10602021-11-19 16:36:30 us=949660 TCP connection established with [AF_INET]1.2.3.4:443
10612021-11-19 16:36:30 us=949695 TCP_CLIENT link local: (not bound)
10622021-11-19 16:36:30 us=949702 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1063WR2021-11-19 16:36:30 us=960963 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=163797b0 0b174f3c
1064W2021-11-19 16:36:30 us=961113 net_route_v4_best_gw query: dst 0.0.0.0
10652021-11-19 16:36:30 us=961236 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1066WRWR2021-11-19 16:36:31 us=119046 VERIFY OK: depth=1, CN=XXXXXX VPN
10672021-11-19 16:36:31 us=119246 VERIFY KU OK
10682021-11-19 16:36:31 us=119262 Validating certificate extended key usage
10692021-11-19 16:36:31 us=119273 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
10702021-11-19 16:36:31 us=119283 VERIFY EKU OK
10712021-11-19 16:36:31 us=119292 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1072WRWRW2021-11-19 16:36:31 us=175268 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
10732021-11-19 16:36:31 us=175305 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
10742021-11-19 16:36:32 us=371752 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1075WRR2021-11-19 16:36:32 us=435262 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
10762021-11-19 16:36:32 us=435392 TCP/UDP: Closing socket
10772021-11-19 16:36:32 us=435454 SIGUSR1[soft,auth-failure] received, process restarting
10782021-11-19 16:36:32 us=435471 Restart pause, 2 second(s)
10792021-11-19 16:36:34 us=435594 Re-using SSL/TLS context
10802021-11-19 16:36:34 us=435620 LZO compression initializing
10812021-11-19 16:36:34 us=435685 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
10822021-11-19 16:36:34 us=435698 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
10832021-11-19 16:36:34 us=435720 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
10842021-11-19 16:36:34 us=435724 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
10852021-11-19 16:36:34 us=435733 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
10862021-11-19 16:36:34 us=435755 Socket Buffers: R=[131072->131072] S=[16384->16384]
10872021-11-19 16:36:34 us=435760 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
10882021-11-19 16:36:34 us=447522 TCP connection established with [AF_INET]1.2.3.4:443
10892021-11-19 16:36:34 us=447553 TCP_CLIENT link local: (not bound)
10902021-11-19 16:36:34 us=447559 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1091WR2021-11-19 16:36:34 us=457514 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=551522e8 32408b3d
1092W2021-11-19 16:36:34 us=457608 net_route_v4_best_gw query: dst 0.0.0.0
10932021-11-19 16:36:34 us=457688 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1094WRWR2021-11-19 16:36:34 us=490811 VERIFY OK: depth=1, CN=XXXXXX VPN
10952021-11-19 16:36:34 us=490949 VERIFY KU OK
10962021-11-19 16:36:34 us=490963 Validating certificate extended key usage
10972021-11-19 16:36:34 us=490970 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
10982021-11-19 16:36:34 us=490976 VERIFY EKU OK
10992021-11-19 16:36:34 us=490985 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1100WRWRW2021-11-19 16:36:34 us=513757 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
11012021-11-19 16:36:34 us=513790 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
11022021-11-19 16:36:35 us=554027 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1103WR2021-11-19 16:36:40 us=623763 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1104WRR2021-11-19 16:36:40 us=716491 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:fe9764de-6705-4c89-a282-ab7595ab210e:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
11052021-11-19 16:36:40 us=716728 TCP/UDP: Closing socket
11062021-11-19 16:36:40 us=716840 SIGUSR1[soft,auth-failure] received, process restarting
11072021-11-19 16:36:40 us=716869 Restart pause, 2 second(s)
1108🔐 CHALLENGE: Welcome <username>, Please enter OTP code
11092021-11-19 16:36:42 us=721967 Re-using SSL/TLS context
11102021-11-19 16:36:42 us=722002 LZO compression initializing
11112021-11-19 16:36:42 us=722088 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
11122021-11-19 16:36:42 us=722104 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
11132021-11-19 16:36:42 us=722130 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
11142021-11-19 16:36:42 us=722136 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
11152021-11-19 16:36:42 us=722147 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
11162021-11-19 16:36:42 us=722171 Socket Buffers: R=[131072->131072] S=[16384->16384]
11172021-11-19 16:36:42 us=722177 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
11182021-11-19 16:36:42 us=733861 TCP connection established with [AF_INET]1.2.3.4:443
11192021-11-19 16:36:42 us=733900 TCP_CLIENT link local: (not bound)
11202021-11-19 16:36:42 us=733908 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1121WR2021-11-19 16:36:42 us=744222 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=cdb7d533 546e00b7
1122W2021-11-19 16:36:42 us=744328 net_route_v4_best_gw query: dst 0.0.0.0
11232021-11-19 16:36:42 us=744419 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1124WRWR2021-11-19 16:36:42 us=782831 VERIFY OK: depth=1, CN=XXXXXX VPN
11252021-11-19 16:36:42 us=783037 VERIFY KU OK
11262021-11-19 16:36:42 us=783053 Validating certificate extended key usage
11272021-11-19 16:36:42 us=783066 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
11282021-11-19 16:36:42 us=783076 VERIFY EKU OK
11292021-11-19 16:36:42 us=783085 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1130WRWRW2021-11-19 16:36:42 us=805481 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
11312021-11-19 16:36:42 us=805534 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
11322021-11-19 16:36:43 us=867785 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1133WRR2021-11-19 16:36:43 us=934238 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
11342021-11-19 16:36:43 us=934384 TCP/UDP: Closing socket
11352021-11-19 16:36:43 us=934430 SIGUSR1[soft,auth-failure] received, process restarting
11362021-11-19 16:36:43 us=934447 Restart pause, 2 second(s)
11372021-11-19 16:36:45 us=934553 Re-using SSL/TLS context
11382021-11-19 16:36:45 us=934575 LZO compression initializing
11392021-11-19 16:36:45 us=934644 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
11402021-11-19 16:36:45 us=934657 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
11412021-11-19 16:36:45 us=934684 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
11422021-11-19 16:36:45 us=934691 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
11432021-11-19 16:36:45 us=934703 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
11442021-11-19 16:36:45 us=934729 Socket Buffers: R=[131072->131072] S=[16384->16384]
11452021-11-19 16:36:45 us=934737 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
11462021-11-19 16:36:45 us=946196 TCP connection established with [AF_INET]1.2.3.4:443
11472021-11-19 16:36:45 us=946230 TCP_CLIENT link local: (not bound)
11482021-11-19 16:36:45 us=946236 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1149WR2021-11-19 16:36:45 us=956500 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=863401ac 9b0f55e1
1150W2021-11-19 16:36:45 us=956639 net_route_v4_best_gw query: dst 0.0.0.0
11512021-11-19 16:36:45 us=956749 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1152WRWR2021-11-19 16:36:45 us=988835 VERIFY OK: depth=1, CN=XXXXXX VPN
11532021-11-19 16:36:45 us=988956 VERIFY KU OK
11542021-11-19 16:36:45 us=988966 Validating certificate extended key usage
11552021-11-19 16:36:45 us=988973 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
11562021-11-19 16:36:45 us=988980 VERIFY EKU OK
11572021-11-19 16:36:45 us=988985 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1158WRWRW2021-11-19 16:36:46 us=8558 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
11592021-11-19 16:36:46 us=8599 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
11602021-11-19 16:36:47 us=35796 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1161WR2021-11-19 16:36:52 us=92908 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1162WRR2021-11-19 16:36:52 us=225345 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:b7466f68-0de4-4fd6-b50a-3b51f8011d5a:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
11632021-11-19 16:36:52 us=225557 TCP/UDP: Closing socket
11642021-11-19 16:36:52 us=225645 SIGUSR1[soft,auth-failure] received, process restarting
11652021-11-19 16:36:52 us=225667 Restart pause, 2 second(s)
1166🔐 CHALLENGE: Welcome <username>, Please enter OTP code
11672021-11-19 16:36:54 us=231171 Re-using SSL/TLS context
11682021-11-19 16:36:54 us=231205 LZO compression initializing
11692021-11-19 16:36:54 us=231287 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
11702021-11-19 16:36:54 us=231304 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
11712021-11-19 16:36:54 us=231338 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
11722021-11-19 16:36:54 us=231353 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
11732021-11-19 16:36:54 us=231374 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
11742021-11-19 16:36:54 us=231416 Socket Buffers: R=[131072->131072] S=[16384->16384]
11752021-11-19 16:36:54 us=231423 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
11762021-11-19 16:36:54 us=243090 TCP connection established with [AF_INET]1.2.3.4:443
11772021-11-19 16:36:54 us=243132 TCP_CLIENT link local: (not bound)
11782021-11-19 16:36:54 us=243146 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1179WR2021-11-19 16:36:54 us=253172 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=b73e4240 aaa07fa1
1180W2021-11-19 16:36:54 us=253287 net_route_v4_best_gw query: dst 0.0.0.0
11812021-11-19 16:36:54 us=253389 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1182WRWR2021-11-19 16:36:54 us=286683 VERIFY OK: depth=1, CN=XXXXXX VPN
11832021-11-19 16:36:54 us=286869 VERIFY KU OK
11842021-11-19 16:36:54 us=286882 Validating certificate extended key usage
11852021-11-19 16:36:54 us=286892 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
11862021-11-19 16:36:54 us=286901 VERIFY EKU OK
11872021-11-19 16:36:54 us=286910 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1188WRWRW2021-11-19 16:36:54 us=308202 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
11892021-11-19 16:36:54 us=308252 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
11902021-11-19 16:36:55 us=331861 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1191WRR2021-11-19 16:36:55 us=398906 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
11922021-11-19 16:36:55 us=399054 TCP/UDP: Closing socket
11932021-11-19 16:36:55 us=399111 SIGUSR1[soft,auth-failure] received, process restarting
11942021-11-19 16:36:55 us=399128 Restart pause, 2 second(s)
11952021-11-19 16:36:57 us=399328 Re-using SSL/TLS context
11962021-11-19 16:36:57 us=399360 LZO compression initializing
11972021-11-19 16:36:57 us=399451 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
11982021-11-19 16:36:57 us=399477 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
11992021-11-19 16:36:57 us=399524 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
12002021-11-19 16:36:57 us=399539 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
12012021-11-19 16:36:57 us=399562 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
12022021-11-19 16:36:57 us=399598 Socket Buffers: R=[131072->131072] S=[16384->16384]
12032021-11-19 16:36:57 us=399612 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
12042021-11-19 16:36:57 us=411596 TCP connection established with [AF_INET]1.2.3.4:443
12052021-11-19 16:36:57 us=411627 TCP_CLIENT link local: (not bound)
12062021-11-19 16:36:57 us=411635 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1207WrR2021-11-19 16:36:57 us=422426 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=4c38739e 9d6b0f66
1208W2021-11-19 16:36:57 us=422532 net_route_v4_best_gw query: dst 0.0.0.0
12092021-11-19 16:36:57 us=422631 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1210WRWR2021-11-19 16:36:57 us=454946 VERIFY OK: depth=1, CN=XXXXXX VPN
12112021-11-19 16:36:57 us=455119 VERIFY KU OK
12122021-11-19 16:36:57 us=455130 Validating certificate extended key usage
12132021-11-19 16:36:57 us=455137 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
12142021-11-19 16:36:57 us=455143 VERIFY EKU OK
12152021-11-19 16:36:57 us=455150 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1216WRWRW2021-11-19 16:36:57 us=476940 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
12172021-11-19 16:36:57 us=476983 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
12182021-11-19 16:36:58 us=531836 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1219WR2021-11-19 16:37:03 us=619803 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1220WRR2021-11-19 16:37:03 us=639934 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:b8c51ba6-991e-463a-9e39-41288c4f66c0:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
12212021-11-19 16:37:03 us=640078 TCP/UDP: Closing socket
12222021-11-19 16:37:03 us=640150 SIGUSR1[soft,auth-failure] received, process restarting
12232021-11-19 16:37:03 us=640164 Restart pause, 2 second(s)
1224🔐 CHALLENGE: Welcome <username>, Please enter OTP code
12252021-11-19 16:37:05 us=644655 Re-using SSL/TLS context
12262021-11-19 16:37:05 us=644689 LZO compression initializing
12272021-11-19 16:37:05 us=644777 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
12282021-11-19 16:37:05 us=644794 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
12292021-11-19 16:37:05 us=644823 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
12302021-11-19 16:37:05 us=644830 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
12312021-11-19 16:37:05 us=644842 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
12322021-11-19 16:37:05 us=644871 Socket Buffers: R=[131072->131072] S=[16384->16384]
12332021-11-19 16:37:05 us=644877 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
12342021-11-19 16:37:05 us=655871 TCP connection established with [AF_INET]1.2.3.4:443
12352021-11-19 16:37:05 us=655902 TCP_CLIENT link local: (not bound)
12362021-11-19 16:37:05 us=655911 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1237WR2021-11-19 16:37:05 us=665975 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=83f395d1 f5e4ceac
1238W2021-11-19 16:37:05 us=666089 net_route_v4_best_gw query: dst 0.0.0.0
12392021-11-19 16:37:05 us=666213 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1240WRWR2021-11-19 16:37:05 us=698386 VERIFY OK: depth=1, CN=XXXXXX VPN
12412021-11-19 16:37:05 us=698501 VERIFY KU OK
12422021-11-19 16:37:05 us=698509 Validating certificate extended key usage
12432021-11-19 16:37:05 us=698516 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
12442021-11-19 16:37:05 us=698521 VERIFY EKU OK
12452021-11-19 16:37:05 us=698525 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1246WRWRW2021-11-19 16:37:05 us=719076 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
12472021-11-19 16:37:05 us=719121 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
12482021-11-19 16:37:06 us=867775 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1249WRR2021-11-19 16:37:06 us=944676 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
12502021-11-19 16:37:06 us=944892 TCP/UDP: Closing socket
12512021-11-19 16:37:06 us=944968 SIGUSR1[soft,auth-failure] received, process restarting
12522021-11-19 16:37:06 us=944984 Restart pause, 2 second(s)
12532021-11-19 16:37:08 us=945108 Re-using SSL/TLS context
12542021-11-19 16:37:08 us=945133 LZO compression initializing
12552021-11-19 16:37:08 us=945196 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
12562021-11-19 16:37:08 us=945208 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
12572021-11-19 16:37:08 us=945232 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
12582021-11-19 16:37:08 us=945238 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
12592021-11-19 16:37:08 us=945248 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
12602021-11-19 16:37:08 us=945270 Socket Buffers: R=[131072->131072] S=[16384->16384]
12612021-11-19 16:37:08 us=945276 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
12622021-11-19 16:37:08 us=956539 TCP connection established with [AF_INET]1.2.3.4:443
12632021-11-19 16:37:08 us=956583 TCP_CLIENT link local: (not bound)
12642021-11-19 16:37:08 us=956591 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1265WR2021-11-19 16:37:08 us=967131 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=46c4d5aa e2fc304f
1266W2021-11-19 16:37:08 us=967290 net_route_v4_best_gw query: dst 0.0.0.0
12672021-11-19 16:37:08 us=967448 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1268WRWR2021-11-19 16:37:08 us=999178 VERIFY OK: depth=1, CN=XXXXXX VPN
12692021-11-19 16:37:08 us=999281 VERIFY KU OK
12702021-11-19 16:37:08 us=999291 Validating certificate extended key usage
12712021-11-19 16:37:08 us=999298 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
12722021-11-19 16:37:08 us=999304 VERIFY EKU OK
12732021-11-19 16:37:08 us=999309 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1274WRWRW2021-11-19 16:37:09 us=20193 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
12752021-11-19 16:37:09 us=20242 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
12762021-11-19 16:37:10 us=151745 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1277WR2021-11-19 16:37:15 us=313914 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1278WRR2021-11-19 16:37:15 us=334516 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:cb51b4a4-4ce4-451f-933c-eab1c4e7e16f:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
12792021-11-19 16:37:15 us=334652 TCP/UDP: Closing socket
12802021-11-19 16:37:15 us=334740 SIGUSR1[soft,auth-failure] received, process restarting
12812021-11-19 16:37:15 us=334760 Restart pause, 2 second(s)
1282🔐 CHALLENGE: Welcome <username>, Please enter OTP code
12832021-11-19 16:37:17 us=340040 Re-using SSL/TLS context
12842021-11-19 16:37:17 us=340083 LZO compression initializing
12852021-11-19 16:37:17 us=340178 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
12862021-11-19 16:37:17 us=340198 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
12872021-11-19 16:37:17 us=340228 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
12882021-11-19 16:37:17 us=340237 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
12892021-11-19 16:37:17 us=340252 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
12902021-11-19 16:37:17 us=340289 Socket Buffers: R=[131072->131072] S=[16384->16384]
12912021-11-19 16:37:17 us=340300 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
12922021-11-19 16:37:17 us=351347 TCP connection established with [AF_INET]1.2.3.4:443
12932021-11-19 16:37:17 us=351386 TCP_CLIENT link local: (not bound)
12942021-11-19 16:37:17 us=351400 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1295WR2021-11-19 16:37:17 us=361565 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=5e6deda4 5aa2d62c
1296W2021-11-19 16:37:17 us=361690 net_route_v4_best_gw query: dst 0.0.0.0
12972021-11-19 16:37:17 us=361817 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1298WRWR2021-11-19 16:37:17 us=392549 VERIFY OK: depth=1, CN=XXXXXX VPN
12992021-11-19 16:37:17 us=392707 VERIFY KU OK
13002021-11-19 16:37:17 us=392723 Validating certificate extended key usage
13012021-11-19 16:37:17 us=392730 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
13022021-11-19 16:37:17 us=392737 VERIFY EKU OK
13032021-11-19 16:37:17 us=392743 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1304WRWRW2021-11-19 16:37:17 us=413936 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
13052021-11-19 16:37:17 us=413989 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
13062021-11-19 16:37:18 us=671944 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1307WRR2021-11-19 16:37:18 us=738245 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
13082021-11-19 16:37:18 us=738427 TCP/UDP: Closing socket
13092021-11-19 16:37:18 us=738528 SIGUSR1[soft,auth-failure] received, process restarting
13102021-11-19 16:37:18 us=738554 Restart pause, 2 second(s)
13112021-11-19 16:37:20 us=738670 Re-using SSL/TLS context
13122021-11-19 16:37:20 us=738700 LZO compression initializing
13132021-11-19 16:37:20 us=738783 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
13142021-11-19 16:37:20 us=738805 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
13152021-11-19 16:37:20 us=738850 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
13162021-11-19 16:37:20 us=738864 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
13172021-11-19 16:37:20 us=738886 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
13182021-11-19 16:37:20 us=738925 Socket Buffers: R=[131072->131072] S=[16384->16384]
13192021-11-19 16:37:20 us=738941 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
13202021-11-19 16:37:20 us=750285 TCP connection established with [AF_INET]1.2.3.4:443
13212021-11-19 16:37:20 us=750363 TCP_CLIENT link local: (not bound)
13222021-11-19 16:37:20 us=750377 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1323WR2021-11-19 16:37:20 us=761152 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=589e4b56 300754c9
1324W2021-11-19 16:37:20 us=761299 net_route_v4_best_gw query: dst 0.0.0.0
13252021-11-19 16:37:20 us=761418 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1326WRWR2021-11-19 16:37:20 us=794959 VERIFY OK: depth=1, CN=XXXXXX VPN
13272021-11-19 16:37:20 us=795091 VERIFY KU OK
13282021-11-19 16:37:20 us=795103 Validating certificate extended key usage
13292021-11-19 16:37:20 us=795111 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
13302021-11-19 16:37:20 us=795118 VERIFY EKU OK
13312021-11-19 16:37:20 us=795124 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1332WRWRW2021-11-19 16:37:20 us=815956 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
13332021-11-19 16:37:20 us=816018 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
13342021-11-19 16:37:21 us=995812 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1335WR2021-11-19 16:37:27 us=203766 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1336WRR2021-11-19 16:37:27 us=226762 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:5b034554-2b6c-4df8-b176-b4dffdf43745:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
13372021-11-19 16:37:27 us=227013 TCP/UDP: Closing socket
13382021-11-19 16:37:27 us=227121 SIGUSR1[soft,auth-failure] received, process restarting
13392021-11-19 16:37:27 us=227147 Restart pause, 2 second(s)
1340🔐 CHALLENGE: Welcome <username>, Please enter OTP code
13412021-11-19 16:37:29 us=234317 Re-using SSL/TLS context
13422021-11-19 16:37:29 us=234351 LZO compression initializing
13432021-11-19 16:37:29 us=234439 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
13442021-11-19 16:37:29 us=234454 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
13452021-11-19 16:37:29 us=234485 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
13462021-11-19 16:37:29 us=234494 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
13472021-11-19 16:37:29 us=234507 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
13482021-11-19 16:37:29 us=234537 Socket Buffers: R=[131072->131072] S=[16384->16384]
13492021-11-19 16:37:29 us=234544 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
13502021-11-19 16:37:29 us=245683 TCP connection established with [AF_INET]1.2.3.4:443
13512021-11-19 16:37:29 us=245732 TCP_CLIENT link local: (not bound)
13522021-11-19 16:37:29 us=245741 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1353WR2021-11-19 16:37:29 us=257667 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=9cef160a b8a53c93
1354W2021-11-19 16:37:29 us=257779 net_route_v4_best_gw query: dst 0.0.0.0
13552021-11-19 16:37:29 us=257927 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1356WRWR2021-11-19 16:37:29 us=291651 VERIFY OK: depth=1, CN=XXXXXX VPN
13572021-11-19 16:37:29 us=291786 VERIFY KU OK
13582021-11-19 16:37:29 us=291816 Validating certificate extended key usage
13592021-11-19 16:37:29 us=291822 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
13602021-11-19 16:37:29 us=291828 VERIFY EKU OK
13612021-11-19 16:37:29 us=291833 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1362WRWRW2021-11-19 16:37:29 us=317544 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
13632021-11-19 16:37:29 us=317602 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
13642021-11-19 16:37:30 us=343941 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1365WRR2021-11-19 16:37:30 us=526592 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
13662021-11-19 16:37:30 us=526762 TCP/UDP: Closing socket
13672021-11-19 16:37:30 us=526828 SIGUSR1[soft,auth-failure] received, process restarting
13682021-11-19 16:37:30 us=526842 Restart pause, 2 second(s)
13692021-11-19 16:37:32 us=527004 Re-using SSL/TLS context
13702021-11-19 16:37:32 us=527028 LZO compression initializing
13712021-11-19 16:37:32 us=527087 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
13722021-11-19 16:37:32 us=527097 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
13732021-11-19 16:37:32 us=527119 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
13742021-11-19 16:37:32 us=527127 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
13752021-11-19 16:37:32 us=527138 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
13762021-11-19 16:37:32 us=527180 Socket Buffers: R=[131072->131072] S=[16384->16384]
13772021-11-19 16:37:32 us=527196 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
13782021-11-19 16:37:32 us=538316 TCP connection established with [AF_INET]1.2.3.4:443
13792021-11-19 16:37:32 us=538355 TCP_CLIENT link local: (not bound)
13802021-11-19 16:37:32 us=538363 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1381WR2021-11-19 16:37:32 us=549358 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=ffe54c5a 1e749fb5
1382W2021-11-19 16:37:32 us=549549 net_route_v4_best_gw query: dst 0.0.0.0
13832021-11-19 16:37:32 us=549733 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1384WRWR2021-11-19 16:37:32 us=582320 VERIFY OK: depth=1, CN=XXXXXX VPN
13852021-11-19 16:37:32 us=582459 VERIFY KU OK
13862021-11-19 16:37:32 us=582471 Validating certificate extended key usage
13872021-11-19 16:37:32 us=582478 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
13882021-11-19 16:37:32 us=582484 VERIFY EKU OK
13892021-11-19 16:37:32 us=582490 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1390WRWRW2021-11-19 16:37:32 us=603096 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
13912021-11-19 16:37:32 us=603155 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
13922021-11-19 16:37:33 us=735949 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1393WR2021-11-19 16:37:38 us=904124 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1394WRR2021-11-19 16:37:38 us=925081 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:f2713f1a-c319-49b1-8712-48d7443fa246:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
13952021-11-19 16:37:38 us=925229 TCP/UDP: Closing socket
13962021-11-19 16:37:38 us=925311 SIGUSR1[soft,auth-failure] received, process restarting
13972021-11-19 16:37:38 us=925332 Restart pause, 2 second(s)
1398🔐 CHALLENGE: Welcome <username>, Please enter OTP code
13992021-11-19 16:37:40 us=930550 Re-using SSL/TLS context
14002021-11-19 16:37:40 us=930607 LZO compression initializing
14012021-11-19 16:37:40 us=930969 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
14022021-11-19 16:37:40 us=931061 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
14032021-11-19 16:37:40 us=931132 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
14042021-11-19 16:37:40 us=931144 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
14052021-11-19 16:37:40 us=931170 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
14062021-11-19 16:37:40 us=931213 Socket Buffers: R=[131072->131072] S=[16384->16384]
14072021-11-19 16:37:40 us=931226 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
14082021-11-19 16:37:41 us=52822 TCP connection established with [AF_INET]1.2.3.4:443
14092021-11-19 16:37:41 us=52859 TCP_CLIENT link local: (not bound)
14102021-11-19 16:37:41 us=52869 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1411WR2021-11-19 16:37:41 us=63538 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=5715f68f ceddba57
1412W2021-11-19 16:37:41 us=63703 net_route_v4_best_gw query: dst 0.0.0.0
14132021-11-19 16:37:41 us=63830 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1414WRWR2021-11-19 16:37:41 us=220250 VERIFY OK: depth=1, CN=XXXXXX VPN
14152021-11-19 16:37:41 us=220345 VERIFY KU OK
14162021-11-19 16:37:41 us=220352 Validating certificate extended key usage
14172021-11-19 16:37:41 us=220357 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
14182021-11-19 16:37:41 us=220366 VERIFY EKU OK
14192021-11-19 16:37:41 us=220373 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1420WRWRW2021-11-19 16:37:41 us=358502 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
14212021-11-19 16:37:41 us=358590 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
14222021-11-19 16:37:42 us=595754 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1423WRR2021-11-19 16:37:42 us=867527 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
14242021-11-19 16:37:42 us=867712 TCP/UDP: Closing socket
14252021-11-19 16:37:42 us=867795 SIGUSR1[soft,auth-failure] received, process restarting
14262021-11-19 16:37:42 us=867816 Restart pause, 2 second(s)
14272021-11-19 16:37:44 us=867978 Re-using SSL/TLS context
14282021-11-19 16:37:44 us=868009 LZO compression initializing
14292021-11-19 16:37:44 us=868077 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
14302021-11-19 16:37:44 us=868092 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
14312021-11-19 16:37:44 us=868118 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
14322021-11-19 16:37:44 us=868125 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
14332021-11-19 16:37:44 us=868139 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
14342021-11-19 16:37:44 us=868173 Socket Buffers: R=[131072->131072] S=[16384->16384]
14352021-11-19 16:37:44 us=868184 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
14362021-11-19 16:37:44 us=879408 TCP connection established with [AF_INET]1.2.3.4:443
14372021-11-19 16:37:44 us=879450 TCP_CLIENT link local: (not bound)
14382021-11-19 16:37:44 us=879461 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1439WrR2021-11-19 16:37:44 us=889322 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=3ce90b1a 80b4421b
1440W2021-11-19 16:37:44 us=889475 net_route_v4_best_gw query: dst 0.0.0.0
14412021-11-19 16:37:44 us=889620 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1442WRWR2021-11-19 16:37:44 us=922382 VERIFY OK: depth=1, CN=XXXXXX VPN
14432021-11-19 16:37:44 us=922481 VERIFY KU OK
14442021-11-19 16:37:44 us=922490 Validating certificate extended key usage
14452021-11-19 16:37:44 us=922495 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
14462021-11-19 16:37:44 us=922499 VERIFY EKU OK
14472021-11-19 16:37:44 us=922503 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1448WRWRW2021-11-19 16:37:44 us=943463 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
14492021-11-19 16:37:44 us=943529 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
14502021-11-19 16:37:46 us=183785 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1451WR2021-11-19 16:37:51 us=462997 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1452WRR2021-11-19 16:37:51 us=507924 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:40402dc0-b9d2-476d-833d-c1f4e9859a81:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
14532021-11-19 16:37:51 us=508028 TCP/UDP: Closing socket
14542021-11-19 16:37:51 us=508079 SIGUSR1[soft,auth-failure] received, process restarting
14552021-11-19 16:37:51 us=508094 Restart pause, 2 second(s)
1456🔐 CHALLENGE: Welcome <username>, Please enter OTP code
14572021-11-19 16:37:53 us=512812 Re-using SSL/TLS context
14582021-11-19 16:37:53 us=512865 LZO compression initializing
14592021-11-19 16:37:53 us=512980 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
14602021-11-19 16:37:53 us=513007 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
14612021-11-19 16:37:53 us=513049 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
14622021-11-19 16:37:53 us=513061 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
14632021-11-19 16:37:53 us=513079 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
14642021-11-19 16:37:53 us=513115 Socket Buffers: R=[131072->131072] S=[16384->16384]
14652021-11-19 16:37:53 us=513125 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
14662021-11-19 16:37:53 us=524076 TCP connection established with [AF_INET]1.2.3.4:443
14672021-11-19 16:37:53 us=524130 TCP_CLIENT link local: (not bound)
14682021-11-19 16:37:53 us=524167 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1469WR2021-11-19 16:37:53 us=535770 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=2d87ce79 029ce19a
1470W2021-11-19 16:37:53 us=535950 net_route_v4_best_gw query: dst 0.0.0.0
14712021-11-19 16:37:53 us=536158 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1472WRWR2021-11-19 16:37:53 us=567141 VERIFY OK: depth=1, CN=XXXXXX VPN
14732021-11-19 16:37:53 us=567282 VERIFY KU OK
14742021-11-19 16:37:53 us=567295 Validating certificate extended key usage
14752021-11-19 16:37:53 us=567303 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
14762021-11-19 16:37:53 us=567310 VERIFY EKU OK
14772021-11-19 16:37:53 us=567316 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1478WRWRW2021-11-19 16:37:53 us=588228 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
14792021-11-19 16:37:53 us=588283 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
14802021-11-19 16:37:54 us=855778 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1481WRR2021-11-19 16:37:54 us=921929 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code
14822021-11-19 16:37:54 us=922072 TCP/UDP: Closing socket
14832021-11-19 16:37:54 us=922141 SIGUSR1[soft,auth-failure] received, process restarting
14842021-11-19 16:37:54 us=922164 Restart pause, 2 second(s)
14852021-11-19 16:37:56 us=922309 Re-using SSL/TLS context
14862021-11-19 16:37:56 us=922357 LZO compression initializing
14872021-11-19 16:37:56 us=922458 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
14882021-11-19 16:37:56 us=922489 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
14892021-11-19 16:37:56 us=922551 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
14902021-11-19 16:37:56 us=922567 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
14912021-11-19 16:37:56 us=922589 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
14922021-11-19 16:37:56 us=922636 Socket Buffers: R=[131072->131072] S=[16384->16384]
14932021-11-19 16:37:56 us=922802 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
14942021-11-19 16:37:56 us=933900 TCP connection established with [AF_INET]1.2.3.4:443
14952021-11-19 16:37:56 us=933934 TCP_CLIENT link local: (not bound)
14962021-11-19 16:37:56 us=933941 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1497WR2021-11-19 16:37:56 us=944773 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=267747d2 c746a282
1498W2021-11-19 16:37:56 us=944939 net_route_v4_best_gw query: dst 0.0.0.0
14992021-11-19 16:37:56 us=945028 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1500WRWR2021-11-19 16:37:56 us=977962 VERIFY OK: depth=1, CN=XXXXXX VPN
15012021-11-19 16:37:56 us=978069 VERIFY KU OK
15022021-11-19 16:37:56 us=978078 Validating certificate extended key usage
15032021-11-19 16:37:56 us=978084 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
15042021-11-19 16:37:56 us=978089 VERIFY EKU OK
15052021-11-19 16:37:56 us=978094 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1506WRWRW2021-11-19 16:37:56 us=998853 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
15072021-11-19 16:37:56 us=998901 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
15082021-11-19 16:37:58 us=171795 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1509WR2021-11-19 16:38:03 us=375947 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1)
1510WRR2021-11-19 16:38:03 us=397169 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:4b4124b0-e5ca-4c56-a9ea-5b6a49a489c2:bnBpY2hvbg==:Welcome <username>, Please enter OTP code
15112021-11-19 16:38:03 us=397366 TCP/UDP: Closing socket
15122021-11-19 16:38:03 us=397462 SIGUSR1[soft,auth-failure] received, process restarting
15132021-11-19 16:38:03 us=397494 Restart pause, 2 second(s)
1514🔐 CHALLENGE: Welcome <username>, Please enter OTP code 480848
15152021-11-19 16:38:35 us=129895 Re-using SSL/TLS context
15162021-11-19 16:38:35 us=129949 LZO compression initializing
15172021-11-19 16:38:35 us=130143 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
15182021-11-19 16:38:35 us=130190 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
15192021-11-19 16:38:35 us=130243 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
15202021-11-19 16:38:35 us=130257 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
15212021-11-19 16:38:35 us=130276 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443
15222021-11-19 16:38:35 us=130318 Socket Buffers: R=[131072->131072] S=[16384->16384]
15232021-11-19 16:38:35 us=130330 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock]
15242021-11-19 16:38:35 us=141785 TCP connection established with [AF_INET]1.2.3.4:443
15252021-11-19 16:38:35 us=141818 TCP_CLIENT link local: (not bound)
15262021-11-19 16:38:35 us=141826 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443
1527WrR2021-11-19 16:38:35 us=152854 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=9e1a0550 103cdbf0
1528W2021-11-19 16:38:35 us=153043 net_route_v4_best_gw query: dst 0.0.0.0
15292021-11-19 16:38:35 us=153166 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0
1530WRWR2021-11-19 16:38:35 us=185797 VERIFY OK: depth=1, CN=XXXXXX VPN
15312021-11-19 16:38:35 us=185978 VERIFY KU OK
15322021-11-19 16:38:35 us=186001 Validating certificate extended key usage
15332021-11-19 16:38:35 us=186016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
15342021-11-19 16:38:35 us=186023 VERIFY EKU OK
15352021-11-19 16:38:35 us=186029 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01
1536WRWRW2021-11-19 16:38:35 us=213118 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
15372021-11-19 16:38:35 us=213153 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443
1538R2021-11-19 16:38:35 us=223230 PUSH: Received control message: 'PUSH_REPLY,route XXXXXXXXXXXXXXXXXXXXXXXXXXX,dhcp-option DNS XXXXXX,dhcp-option DNS XXXXX,route-gateway XXXXXXXXXx,ping 10,ping-restart 60,ifconfig XXXXXXXXXXXX 255.255.255.0,peer-id 0,cipher AES-256-CBC'
15392021-11-19 16:38:35 us=223476 OPTIONS IMPORT: timers and/or timeouts modified
15402021-11-19 16:38:35 us=223486 OPTIONS IMPORT: --ifconfig/up options modified
15412021-11-19 16:38:35 us=223518 OPTIONS IMPORT: route options modified
15422021-11-19 16:38:35 us=223524 OPTIONS IMPORT: route-related options modified
15432021-11-19 16:38:35 us=223530 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
15442021-11-19 16:38:35 us=223535 OPTIONS IMPORT: peer-id set
15452021-11-19 16:38:35 us=223541 OPTIONS IMPORT: adjusting link_mtu to 1659
15462021-11-19 16:38:35 us=223548 OPTIONS IMPORT: data channel crypto options modified
15472021-11-19 16:38:35 us=223623 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
15482021-11-19 16:38:35 us=223633 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
15492021-11-19 16:38:35 us=223640 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
15502021-11-19 16:38:35 us=223662 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
15512021-11-19 16:38:35 us=223683 Preserving previous TUN/TAP instance: tap1
15522021-11-19 16:38:35 us=223872 Initialization Sequence Completed
1553WRwrWRwrWRwrWrWrW