1 | |
---|
2 | |
---|
3 | rWRwRwrWrWRwrW2021-11-19 16:32:59 us=103415 Connection reset, restarting [0] |
---|
4 | 2021-11-19 16:32:59 us=103539 TCP/UDP: Closing socket |
---|
5 | 2021-11-19 16:32:59 us=103594 SIGUSR1[soft,connection-reset] received, process restarting |
---|
6 | 2021-11-19 16:32:59 us=103609 Restart pause, 2 second(s) |
---|
7 | 2021-11-19 16:33:01 us=103694 Re-using SSL/TLS context |
---|
8 | 2021-11-19 16:33:01 us=103761 LZO compression initializing |
---|
9 | 2021-11-19 16:33:01 us=103846 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
10 | 2021-11-19 16:33:01 us=103859 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
11 | 2021-11-19 16:33:01 us=103887 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
12 | 2021-11-19 16:33:01 us=103895 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
13 | 2021-11-19 16:33:01 us=103908 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
14 | 2021-11-19 16:33:01 us=103938 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
15 | 2021-11-19 16:33:01 us=103946 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
16 | 2021-11-19 16:33:01 us=194523 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
17 | 2021-11-19 16:33:01 us=194567 TCP_CLIENT link local: (not bound) |
---|
18 | 2021-11-19 16:33:01 us=194575 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
19 | WR2021-11-19 16:33:01 us=204702 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=3dc03b69 66d6e443 |
---|
20 | W2021-11-19 16:33:01 us=204820 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
21 | 2021-11-19 16:33:01 us=204924 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
22 | WRWR2021-11-19 16:33:01 us=347432 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
23 | 2021-11-19 16:33:01 us=347698 VERIFY KU OK |
---|
24 | 2021-11-19 16:33:01 us=347746 Validating certificate extended key usage |
---|
25 | 2021-11-19 16:33:01 us=347760 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
26 | 2021-11-19 16:33:01 us=347771 VERIFY EKU OK |
---|
27 | 2021-11-19 16:33:01 us=347781 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
28 | WRWRW2021-11-19 16:33:01 us=369138 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
29 | 2021-11-19 16:33:01 us=369200 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
30 | 2021-11-19 16:33:02 us=431837 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
31 | WRR2021-11-19 16:33:02 us=495901 AUTH: Received control message: AUTH_FAILED,Response to a challenge without a first valid authentication request |
---|
32 | 2021-11-19 16:33:02 us=496097 TCP/UDP: Closing socket |
---|
33 | 2021-11-19 16:33:02 us=496272 SIGUSR1[soft,auth-failure] received, process restarting |
---|
34 | 2021-11-19 16:33:02 us=496331 Restart pause, 2 second(s) |
---|
35 | 2021-11-19 16:33:04 us=496478 Re-using SSL/TLS context |
---|
36 | 2021-11-19 16:33:04 us=496512 LZO compression initializing |
---|
37 | 2021-11-19 16:33:04 us=496676 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
38 | 2021-11-19 16:33:04 us=496705 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
39 | 2021-11-19 16:33:04 us=496826 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
40 | 2021-11-19 16:33:04 us=496847 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
41 | 2021-11-19 16:33:04 us=496869 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
42 | 2021-11-19 16:33:04 us=496908 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
43 | 2021-11-19 16:33:04 us=496921 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
44 | 2021-11-19 16:33:04 us=508145 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
45 | 2021-11-19 16:33:04 us=508250 TCP_CLIENT link local: (not bound) |
---|
46 | 2021-11-19 16:33:04 us=508264 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
47 | WrrR2021-11-19 16:33:04 us=518988 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=607cb9bd 126f5b39 |
---|
48 | W2021-11-19 16:33:04 us=519141 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
49 | 2021-11-19 16:33:04 us=519232 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
50 | WRWR2021-11-19 16:33:04 us=551184 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
51 | 2021-11-19 16:33:04 us=551274 VERIFY KU OK |
---|
52 | 2021-11-19 16:33:04 us=551281 Validating certificate extended key usage |
---|
53 | 2021-11-19 16:33:04 us=551287 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
54 | 2021-11-19 16:33:04 us=551292 VERIFY EKU OK |
---|
55 | 2021-11-19 16:33:04 us=551296 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
56 | WRWRW2021-11-19 16:33:04 us=574751 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
57 | 2021-11-19 16:33:04 us=574788 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
58 | rr2021-11-19 16:33:05 us=279862 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
59 | WRrrr2021-11-19 16:33:11 us=37716 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
60 | WRR2021-11-19 16:33:11 us=176185 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:3cfcb65c-862b-4935-8a0c-c19af387f810:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
61 | 2021-11-19 16:33:11 us=176327 TCP/UDP: Closing socket |
---|
62 | 2021-11-19 16:33:11 us=176384 SIGUSR1[soft,auth-failure] received, process restarting |
---|
63 | 2021-11-19 16:33:11 us=176403 Restart pause, 2 second(s) |
---|
64 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
65 | 2021-11-19 16:33:13 us=181883 Re-using SSL/TLS context |
---|
66 | 2021-11-19 16:33:13 us=181939 LZO compression initializing |
---|
67 | 2021-11-19 16:33:13 us=182043 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
68 | 2021-11-19 16:33:13 us=182062 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
69 | 2021-11-19 16:33:13 us=182094 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
70 | 2021-11-19 16:33:13 us=182101 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
71 | 2021-11-19 16:33:13 us=182112 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
72 | 2021-11-19 16:33:13 us=182146 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
73 | 2021-11-19 16:33:13 us=182156 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
74 | 2021-11-19 16:33:13 us=193922 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
75 | 2021-11-19 16:33:13 us=193964 TCP_CLIENT link local: (not bound) |
---|
76 | 2021-11-19 16:33:13 us=193977 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
77 | WR2021-11-19 16:33:13 us=205419 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=a7442f0d a625b163 |
---|
78 | W2021-11-19 16:33:13 us=205672 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
79 | 2021-11-19 16:33:13 us=205831 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
80 | WRWR2021-11-19 16:33:13 us=237592 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
81 | 2021-11-19 16:33:13 us=237920 VERIFY KU OK |
---|
82 | 2021-11-19 16:33:13 us=237950 Validating certificate extended key usage |
---|
83 | 2021-11-19 16:33:13 us=238020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
84 | 2021-11-19 16:33:13 us=238076 VERIFY EKU OK |
---|
85 | 2021-11-19 16:33:13 us=238125 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
86 | WrRWRW2021-11-19 16:33:13 us=260179 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
87 | 2021-11-19 16:33:13 us=260295 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
88 | 2021-11-19 16:33:14 us=295808 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
89 | WRR2021-11-19 16:33:14 us=362298 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
90 | 2021-11-19 16:33:14 us=362462 TCP/UDP: Closing socket |
---|
91 | 2021-11-19 16:33:14 us=362525 SIGUSR1[soft,auth-failure] received, process restarting |
---|
92 | 2021-11-19 16:33:14 us=362545 Restart pause, 2 second(s) |
---|
93 | 2021-11-19 16:33:16 us=362691 Re-using SSL/TLS context |
---|
94 | 2021-11-19 16:33:16 us=362718 LZO compression initializing |
---|
95 | 2021-11-19 16:33:16 us=362798 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
96 | 2021-11-19 16:33:16 us=362812 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
97 | 2021-11-19 16:33:16 us=362835 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
98 | 2021-11-19 16:33:16 us=362841 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
99 | 2021-11-19 16:33:16 us=362851 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
100 | 2021-11-19 16:33:16 us=362877 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
101 | 2021-11-19 16:33:16 us=362884 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
102 | 2021-11-19 16:33:16 us=378839 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
103 | 2021-11-19 16:33:16 us=378891 TCP_CLIENT link local: (not bound) |
---|
104 | 2021-11-19 16:33:16 us=378905 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
105 | WR2021-11-19 16:33:16 us=389219 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=e4d96e36 53304937 |
---|
106 | W2021-11-19 16:33:16 us=389395 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
107 | 2021-11-19 16:33:16 us=389505 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
108 | WRWR2021-11-19 16:33:16 us=420268 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
109 | 2021-11-19 16:33:16 us=420450 VERIFY KU OK |
---|
110 | 2021-11-19 16:33:16 us=420467 Validating certificate extended key usage |
---|
111 | 2021-11-19 16:33:16 us=420478 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
112 | 2021-11-19 16:33:16 us=420488 VERIFY EKU OK |
---|
113 | 2021-11-19 16:33:16 us=420497 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
114 | WRWRW2021-11-19 16:33:16 us=446206 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
115 | 2021-11-19 16:33:16 us=446245 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
116 | 2021-11-19 16:33:17 us=623923 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
117 | WRrrr2021-11-19 16:33:22 us=211859 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
118 | WRR2021-11-19 16:33:22 us=233326 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:08346974-1bb0-45d2-a499-5c896ab5708f:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
119 | 2021-11-19 16:33:22 us=233437 TCP/UDP: Closing socket |
---|
120 | 2021-11-19 16:33:22 us=233482 SIGUSR1[soft,auth-failure] received, process restarting |
---|
121 | 2021-11-19 16:33:22 us=233497 Restart pause, 2 second(s) |
---|
122 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
123 | 2021-11-19 16:33:24 us=239247 Re-using SSL/TLS context |
---|
124 | 2021-11-19 16:33:24 us=239283 LZO compression initializing |
---|
125 | 2021-11-19 16:33:24 us=239383 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
126 | 2021-11-19 16:33:24 us=239401 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
127 | 2021-11-19 16:33:24 us=239435 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
128 | 2021-11-19 16:33:24 us=239444 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
129 | 2021-11-19 16:33:24 us=239458 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
130 | 2021-11-19 16:33:24 us=239494 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
131 | 2021-11-19 16:33:24 us=239501 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
132 | 2021-11-19 16:33:24 us=250616 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
133 | 2021-11-19 16:33:24 us=250646 TCP_CLIENT link local: (not bound) |
---|
134 | 2021-11-19 16:33:24 us=250653 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
135 | WrR2021-11-19 16:33:24 us=260925 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=af8921ce 63c56876 |
---|
136 | W2021-11-19 16:33:24 us=261062 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
137 | 2021-11-19 16:33:24 us=261176 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
138 | WRWR2021-11-19 16:33:24 us=293362 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
139 | 2021-11-19 16:33:24 us=293486 VERIFY KU OK |
---|
140 | 2021-11-19 16:33:24 us=293501 Validating certificate extended key usage |
---|
141 | 2021-11-19 16:33:24 us=293508 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
142 | 2021-11-19 16:33:24 us=293513 VERIFY EKU OK |
---|
143 | 2021-11-19 16:33:24 us=293517 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
144 | WRWRW2021-11-19 16:33:24 us=314560 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
145 | 2021-11-19 16:33:24 us=314610 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
146 | r2021-11-19 16:33:25 us=623752 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
147 | WRR2021-11-19 16:33:25 us=686101 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
148 | 2021-11-19 16:33:25 us=686382 TCP/UDP: Closing socket |
---|
149 | 2021-11-19 16:33:25 us=686587 SIGUSR1[soft,auth-failure] received, process restarting |
---|
150 | 2021-11-19 16:33:25 us=686619 Restart pause, 2 second(s) |
---|
151 | 2021-11-19 16:33:27 us=686759 Re-using SSL/TLS context |
---|
152 | 2021-11-19 16:33:27 us=686792 LZO compression initializing |
---|
153 | 2021-11-19 16:33:27 us=686896 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
154 | 2021-11-19 16:33:27 us=686921 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
155 | 2021-11-19 16:33:27 us=686953 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
156 | 2021-11-19 16:33:27 us=686962 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
157 | 2021-11-19 16:33:27 us=686973 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
158 | 2021-11-19 16:33:27 us=687001 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
159 | 2021-11-19 16:33:27 us=687008 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
160 | 2021-11-19 16:33:27 us=698031 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
161 | 2021-11-19 16:33:27 us=698076 TCP_CLIENT link local: (not bound) |
---|
162 | 2021-11-19 16:33:27 us=698083 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
163 | WR2021-11-19 16:33:27 us=708481 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=4c71922c f15db4a6 |
---|
164 | W2021-11-19 16:33:27 us=708629 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
165 | 2021-11-19 16:33:27 us=708749 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
166 | WRWR2021-11-19 16:33:27 us=741080 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
167 | 2021-11-19 16:33:27 us=741213 VERIFY KU OK |
---|
168 | 2021-11-19 16:33:27 us=741226 Validating certificate extended key usage |
---|
169 | 2021-11-19 16:33:27 us=741234 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
170 | 2021-11-19 16:33:27 us=741240 VERIFY EKU OK |
---|
171 | 2021-11-19 16:33:27 us=741245 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
172 | WRWRW2021-11-19 16:33:27 us=761197 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
173 | 2021-11-19 16:33:27 us=761233 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
174 | 2021-11-19 16:33:28 us=775796 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
175 | WRr2021-11-19 16:33:33 us=902886 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
176 | WRR2021-11-19 16:33:33 us=922974 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:212bf5d4-1270-4112-a910-4d43e16be439:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
177 | 2021-11-19 16:33:33 us=923204 TCP/UDP: Closing socket |
---|
178 | 2021-11-19 16:33:33 us=923330 SIGUSR1[soft,auth-failure] received, process restarting |
---|
179 | 2021-11-19 16:33:33 us=923374 Restart pause, 2 second(s) |
---|
180 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
181 | 2021-11-19 16:33:35 us=928772 Re-using SSL/TLS context |
---|
182 | 2021-11-19 16:33:35 us=928830 LZO compression initializing |
---|
183 | 2021-11-19 16:33:35 us=928949 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
184 | 2021-11-19 16:33:35 us=928974 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
185 | 2021-11-19 16:33:35 us=929016 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
186 | 2021-11-19 16:33:35 us=929028 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
187 | 2021-11-19 16:33:35 us=929046 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
188 | 2021-11-19 16:33:35 us=929087 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
189 | 2021-11-19 16:33:35 us=929099 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
190 | 2021-11-19 16:33:35 us=940531 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
191 | 2021-11-19 16:33:35 us=940572 TCP_CLIENT link local: (not bound) |
---|
192 | 2021-11-19 16:33:35 us=940579 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
193 | WR2021-11-19 16:33:35 us=951420 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=974f22b6 b139c925 |
---|
194 | W2021-11-19 16:33:35 us=951539 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
195 | 2021-11-19 16:33:35 us=951651 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
196 | WRWR2021-11-19 16:33:36 us=9341 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
197 | 2021-11-19 16:33:36 us=9513 VERIFY KU OK |
---|
198 | 2021-11-19 16:33:36 us=9525 Validating certificate extended key usage |
---|
199 | 2021-11-19 16:33:36 us=9534 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
200 | 2021-11-19 16:33:36 us=9540 VERIFY EKU OK |
---|
201 | 2021-11-19 16:33:36 us=9547 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
202 | WRWRW2021-11-19 16:33:36 us=29914 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
203 | 2021-11-19 16:33:36 us=29970 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
204 | r2021-11-19 16:33:37 us=55942 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
205 | WRR2021-11-19 16:33:37 us=118207 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
206 | 2021-11-19 16:33:37 us=118338 TCP/UDP: Closing socket |
---|
207 | 2021-11-19 16:33:37 us=118412 SIGUSR1[soft,auth-failure] received, process restarting |
---|
208 | 2021-11-19 16:33:37 us=118437 Restart pause, 2 second(s) |
---|
209 | 2021-11-19 16:33:39 us=118540 Re-using SSL/TLS context |
---|
210 | 2021-11-19 16:33:39 us=118564 LZO compression initializing |
---|
211 | 2021-11-19 16:33:39 us=118636 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
212 | 2021-11-19 16:33:39 us=118647 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
213 | 2021-11-19 16:33:39 us=118669 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
214 | 2021-11-19 16:33:39 us=118674 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
215 | 2021-11-19 16:33:39 us=118683 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
216 | 2021-11-19 16:33:39 us=118705 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
217 | 2021-11-19 16:33:39 us=118711 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
218 | 2021-11-19 16:33:39 us=129711 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
219 | 2021-11-19 16:33:39 us=129783 TCP_CLIENT link local: (not bound) |
---|
220 | 2021-11-19 16:33:39 us=129798 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
221 | WR2021-11-19 16:33:39 us=140042 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=1c5ab556 a1b438a9 |
---|
222 | W2021-11-19 16:33:39 us=140168 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
223 | 2021-11-19 16:33:39 us=140293 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
224 | WRWR2021-11-19 16:33:39 us=171038 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
225 | 2021-11-19 16:33:39 us=171142 VERIFY KU OK |
---|
226 | 2021-11-19 16:33:39 us=171151 Validating certificate extended key usage |
---|
227 | 2021-11-19 16:33:39 us=171157 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
228 | 2021-11-19 16:33:39 us=171162 VERIFY EKU OK |
---|
229 | 2021-11-19 16:33:39 us=171167 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
230 | WRWRW2021-11-19 16:33:39 us=193113 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
231 | 2021-11-19 16:33:39 us=193149 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
232 | 2021-11-19 16:33:40 us=215808 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
233 | WRrr2021-11-19 16:33:45 us=467893 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
234 | WRR2021-11-19 16:33:45 us=489791 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:92b5882c-4c42-493a-8d39-2d2b18522d0a:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
235 | 2021-11-19 16:33:45 us=490015 TCP/UDP: Closing socket |
---|
236 | 2021-11-19 16:33:45 us=490129 SIGUSR1[soft,auth-failure] received, process restarting |
---|
237 | 2021-11-19 16:33:45 us=490164 Restart pause, 2 second(s) |
---|
238 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
239 | 2021-11-19 16:33:47 us=495785 Re-using SSL/TLS context |
---|
240 | 2021-11-19 16:33:47 us=495828 LZO compression initializing |
---|
241 | 2021-11-19 16:33:47 us=495923 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
242 | 2021-11-19 16:33:47 us=495943 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
243 | 2021-11-19 16:33:47 us=495975 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
244 | 2021-11-19 16:33:47 us=495986 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
245 | 2021-11-19 16:33:47 us=495999 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
246 | 2021-11-19 16:33:47 us=496029 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
247 | 2021-11-19 16:33:47 us=496039 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
248 | 2021-11-19 16:33:47 us=507189 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
249 | 2021-11-19 16:33:47 us=507222 TCP_CLIENT link local: (not bound) |
---|
250 | 2021-11-19 16:33:47 us=507231 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
251 | WR2021-11-19 16:33:47 us=517470 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=89ba2ccb 146433e2 |
---|
252 | W2021-11-19 16:33:47 us=517563 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
253 | 2021-11-19 16:33:47 us=517660 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
254 | WRWR2021-11-19 16:33:47 us=549115 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
255 | 2021-11-19 16:33:47 us=549260 VERIFY KU OK |
---|
256 | 2021-11-19 16:33:47 us=549276 Validating certificate extended key usage |
---|
257 | 2021-11-19 16:33:47 us=549282 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
258 | 2021-11-19 16:33:47 us=549287 VERIFY EKU OK |
---|
259 | 2021-11-19 16:33:47 us=549293 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
260 | WRWRW2021-11-19 16:33:47 us=571438 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
261 | 2021-11-19 16:33:47 us=571493 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
262 | 2021-11-19 16:33:48 us=595770 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
263 | WRR2021-11-19 16:33:48 us=658194 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
264 | 2021-11-19 16:33:48 us=658311 TCP/UDP: Closing socket |
---|
265 | 2021-11-19 16:33:48 us=658358 SIGUSR1[soft,auth-failure] received, process restarting |
---|
266 | 2021-11-19 16:33:48 us=658374 Restart pause, 2 second(s) |
---|
267 | 2021-11-19 16:33:50 us=658507 Re-using SSL/TLS context |
---|
268 | 2021-11-19 16:33:50 us=658529 LZO compression initializing |
---|
269 | 2021-11-19 16:33:50 us=658694 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
270 | 2021-11-19 16:33:50 us=658722 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
271 | 2021-11-19 16:33:50 us=658751 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
272 | 2021-11-19 16:33:50 us=658757 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
273 | 2021-11-19 16:33:50 us=658768 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
274 | 2021-11-19 16:33:50 us=658796 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
275 | 2021-11-19 16:33:50 us=658805 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
276 | 2021-11-19 16:33:50 us=724366 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
277 | 2021-11-19 16:33:50 us=724408 TCP_CLIENT link local: (not bound) |
---|
278 | 2021-11-19 16:33:50 us=724419 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
279 | WR2021-11-19 16:33:50 us=736282 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=338cb001 8a883f1a |
---|
280 | W2021-11-19 16:33:50 us=736391 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
281 | 2021-11-19 16:33:50 us=736475 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
282 | WRWR2021-11-19 16:33:50 us=769233 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
283 | 2021-11-19 16:33:50 us=769356 VERIFY KU OK |
---|
284 | 2021-11-19 16:33:50 us=769365 Validating certificate extended key usage |
---|
285 | 2021-11-19 16:33:50 us=769371 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
286 | 2021-11-19 16:33:50 us=769382 VERIFY EKU OK |
---|
287 | 2021-11-19 16:33:50 us=769388 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
288 | WRWRW2021-11-19 16:33:50 us=795061 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
289 | 2021-11-19 16:33:50 us=795115 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
290 | 2021-11-19 16:33:51 us=899755 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
291 | WRr2021-11-19 16:33:56 us=295803 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
292 | WRR2021-11-19 16:33:56 us=316753 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:559ec402-54a4-41a0-ad4e-26bb10d3c978:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
293 | 2021-11-19 16:33:56 us=316852 TCP/UDP: Closing socket |
---|
294 | 2021-11-19 16:33:56 us=316894 SIGUSR1[soft,auth-failure] received, process restarting |
---|
295 | 2021-11-19 16:33:56 us=316908 Restart pause, 2 second(s) |
---|
296 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
297 | 2021-11-19 16:33:58 us=323215 Re-using SSL/TLS context |
---|
298 | 2021-11-19 16:33:58 us=323263 LZO compression initializing |
---|
299 | 2021-11-19 16:33:58 us=323364 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
300 | 2021-11-19 16:33:58 us=323381 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
301 | 2021-11-19 16:33:58 us=323408 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
302 | 2021-11-19 16:33:58 us=323414 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
303 | 2021-11-19 16:33:58 us=323425 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
304 | 2021-11-19 16:33:58 us=323454 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
305 | 2021-11-19 16:33:58 us=323460 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
306 | 2021-11-19 16:33:58 us=334355 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
307 | 2021-11-19 16:33:58 us=334404 TCP_CLIENT link local: (not bound) |
---|
308 | 2021-11-19 16:33:58 us=334416 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
309 | WrR2021-11-19 16:33:58 us=344311 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=8cee1826 9c967a87 |
---|
310 | W2021-11-19 16:33:58 us=344443 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
311 | 2021-11-19 16:33:58 us=344539 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
312 | WRWR2021-11-19 16:33:58 us=382672 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
313 | 2021-11-19 16:33:58 us=382785 VERIFY KU OK |
---|
314 | 2021-11-19 16:33:58 us=382794 Validating certificate extended key usage |
---|
315 | 2021-11-19 16:33:58 us=382800 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
316 | 2021-11-19 16:33:58 us=382805 VERIFY EKU OK |
---|
317 | 2021-11-19 16:33:58 us=382809 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
318 | WRWRW2021-11-19 16:33:58 us=407159 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
319 | 2021-11-19 16:33:58 us=407202 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
320 | r2021-11-19 16:33:59 us=327825 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
321 | WRR2021-11-19 16:33:59 us=392807 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
322 | 2021-11-19 16:33:59 us=392910 TCP/UDP: Closing socket |
---|
323 | 2021-11-19 16:33:59 us=392953 SIGUSR1[soft,auth-failure] received, process restarting |
---|
324 | 2021-11-19 16:33:59 us=392967 Restart pause, 2 second(s) |
---|
325 | 2021-11-19 16:34:01 us=393089 Re-using SSL/TLS context |
---|
326 | 2021-11-19 16:34:01 us=393113 LZO compression initializing |
---|
327 | 2021-11-19 16:34:01 us=393200 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
328 | 2021-11-19 16:34:01 us=393212 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
329 | 2021-11-19 16:34:01 us=393235 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
330 | 2021-11-19 16:34:01 us=393240 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
331 | 2021-11-19 16:34:01 us=393250 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
332 | 2021-11-19 16:34:01 us=393275 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
333 | 2021-11-19 16:34:01 us=393280 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
334 | 2021-11-19 16:34:01 us=509069 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
335 | 2021-11-19 16:34:01 us=509108 TCP_CLIENT link local: (not bound) |
---|
336 | 2021-11-19 16:34:01 us=509116 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
337 | WrR2021-11-19 16:34:01 us=519273 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=278b8613 3a60e633 |
---|
338 | W2021-11-19 16:34:01 us=519395 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
339 | 2021-11-19 16:34:01 us=519493 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
340 | WRWR2021-11-19 16:34:01 us=676027 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
341 | 2021-11-19 16:34:01 us=676372 VERIFY KU OK |
---|
342 | 2021-11-19 16:34:01 us=676413 Validating certificate extended key usage |
---|
343 | 2021-11-19 16:34:01 us=676438 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
344 | 2021-11-19 16:34:01 us=676450 VERIFY EKU OK |
---|
345 | 2021-11-19 16:34:01 us=676461 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
346 | WRWRW2021-11-19 16:34:01 us=697558 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
347 | 2021-11-19 16:34:01 us=697613 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
348 | 2021-11-19 16:34:02 us=755811 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
349 | WRrrr2021-11-19 16:34:07 us=107874 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
350 | WRR2021-11-19 16:34:07 us=129295 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:18112505-01d9-47fc-88fe-8950efe9d851:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
351 | 2021-11-19 16:34:07 us=129541 TCP/UDP: Closing socket |
---|
352 | 2021-11-19 16:34:07 us=129633 SIGUSR1[soft,auth-failure] received, process restarting |
---|
353 | 2021-11-19 16:34:07 us=129650 Restart pause, 2 second(s) |
---|
354 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
355 | 2021-11-19 16:34:09 us=135965 Re-using SSL/TLS context |
---|
356 | 2021-11-19 16:34:09 us=136004 LZO compression initializing |
---|
357 | 2021-11-19 16:34:09 us=136185 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
358 | 2021-11-19 16:34:09 us=136218 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
359 | 2021-11-19 16:34:09 us=136345 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
360 | 2021-11-19 16:34:09 us=136367 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
361 | 2021-11-19 16:34:09 us=136407 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
362 | 2021-11-19 16:34:09 us=136448 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
363 | 2021-11-19 16:34:09 us=136454 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
364 | 2021-11-19 16:34:09 us=147887 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
365 | 2021-11-19 16:34:09 us=147930 TCP_CLIENT link local: (not bound) |
---|
366 | 2021-11-19 16:34:09 us=147942 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
367 | WrrR2021-11-19 16:34:09 us=158253 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=2ce5c9e0 f1ac42ed |
---|
368 | W2021-11-19 16:34:09 us=158412 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
369 | 2021-11-19 16:34:09 us=158508 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
370 | WRWR2021-11-19 16:34:09 us=190851 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
371 | 2021-11-19 16:34:09 us=190968 VERIFY KU OK |
---|
372 | 2021-11-19 16:34:09 us=190978 Validating certificate extended key usage |
---|
373 | 2021-11-19 16:34:09 us=190985 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
374 | 2021-11-19 16:34:09 us=190991 VERIFY EKU OK |
---|
375 | 2021-11-19 16:34:09 us=190999 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
376 | WRWRW2021-11-19 16:34:09 us=211947 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
377 | 2021-11-19 16:34:09 us=211987 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
378 | r2021-11-19 16:34:10 us=175916 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
379 | WRR2021-11-19 16:34:10 us=398458 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
380 | 2021-11-19 16:34:10 us=398616 TCP/UDP: Closing socket |
---|
381 | 2021-11-19 16:34:10 us=398683 SIGUSR1[soft,auth-failure] received, process restarting |
---|
382 | 2021-11-19 16:34:10 us=398702 Restart pause, 2 second(s) |
---|
383 | 2021-11-19 16:34:12 us=398822 Re-using SSL/TLS context |
---|
384 | 2021-11-19 16:34:12 us=398848 LZO compression initializing |
---|
385 | 2021-11-19 16:34:12 us=398928 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
386 | 2021-11-19 16:34:12 us=398942 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
387 | 2021-11-19 16:34:12 us=398972 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
388 | 2021-11-19 16:34:12 us=398979 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
389 | 2021-11-19 16:34:12 us=398992 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
390 | 2021-11-19 16:34:12 us=399025 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
391 | 2021-11-19 16:34:12 us=399034 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
392 | 2021-11-19 16:34:12 us=410367 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
393 | 2021-11-19 16:34:12 us=410414 TCP_CLIENT link local: (not bound) |
---|
394 | 2021-11-19 16:34:12 us=410427 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
395 | WR2021-11-19 16:34:12 us=421467 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=dc193930 c1552ccc |
---|
396 | W2021-11-19 16:34:12 us=421629 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
397 | 2021-11-19 16:34:12 us=421954 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
398 | WRWR2021-11-19 16:34:12 us=454826 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
399 | 2021-11-19 16:34:12 us=455090 VERIFY KU OK |
---|
400 | 2021-11-19 16:34:12 us=455121 Validating certificate extended key usage |
---|
401 | 2021-11-19 16:34:12 us=455133 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
402 | 2021-11-19 16:34:12 us=455142 VERIFY EKU OK |
---|
403 | 2021-11-19 16:34:12 us=455153 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
404 | WRWRW2021-11-19 16:34:12 us=478968 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
405 | 2021-11-19 16:34:12 us=479018 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
406 | 2021-11-19 16:34:13 us=639797 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
407 | WRrr2021-11-19 16:34:18 us=275854 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
408 | WRR2021-11-19 16:34:18 us=296966 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:23a98c99-a57f-4a0c-8a27-e7304c904092:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
409 | 2021-11-19 16:34:18 us=297117 TCP/UDP: Closing socket |
---|
410 | 2021-11-19 16:34:18 us=297188 SIGUSR1[soft,auth-failure] received, process restarting |
---|
411 | 2021-11-19 16:34:18 us=297212 Restart pause, 2 second(s) |
---|
412 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
413 | 2021-11-19 16:34:20 us=302526 Re-using SSL/TLS context |
---|
414 | 2021-11-19 16:34:20 us=302581 LZO compression initializing |
---|
415 | 2021-11-19 16:34:20 us=302682 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
416 | 2021-11-19 16:34:20 us=302706 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
417 | 2021-11-19 16:34:20 us=302746 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
418 | 2021-11-19 16:34:20 us=302757 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
419 | 2021-11-19 16:34:20 us=302774 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
420 | 2021-11-19 16:34:20 us=302809 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
421 | 2021-11-19 16:34:20 us=302821 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
422 | 2021-11-19 16:34:20 us=396113 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
423 | 2021-11-19 16:34:20 us=396173 TCP_CLIENT link local: (not bound) |
---|
424 | 2021-11-19 16:34:20 us=396246 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
425 | WrR2021-11-19 16:34:20 us=407004 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=33811a65 f0d08152 |
---|
426 | W2021-11-19 16:34:20 us=407179 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
427 | 2021-11-19 16:34:20 us=407326 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
428 | WRWR2021-11-19 16:34:20 us=439086 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
429 | 2021-11-19 16:34:20 us=439320 VERIFY KU OK |
---|
430 | 2021-11-19 16:34:20 us=439336 Validating certificate extended key usage |
---|
431 | 2021-11-19 16:34:20 us=439347 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
432 | 2021-11-19 16:34:20 us=439359 VERIFY EKU OK |
---|
433 | 2021-11-19 16:34:20 us=439371 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
434 | WRWRW2021-11-19 16:34:20 us=461233 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
435 | 2021-11-19 16:34:20 us=461298 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
436 | 2021-11-19 16:34:21 us=491962 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
437 | WRR2021-11-19 16:34:21 us=669303 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
438 | 2021-11-19 16:34:21 us=669417 TCP/UDP: Closing socket |
---|
439 | 2021-11-19 16:34:21 us=669464 SIGUSR1[soft,auth-failure] received, process restarting |
---|
440 | 2021-11-19 16:34:21 us=669479 Restart pause, 2 second(s) |
---|
441 | 2021-11-19 16:34:23 us=669663 Re-using SSL/TLS context |
---|
442 | 2021-11-19 16:34:23 us=669713 LZO compression initializing |
---|
443 | 2021-11-19 16:34:23 us=669866 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
444 | 2021-11-19 16:34:23 us=669898 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
445 | 2021-11-19 16:34:23 us=669944 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
446 | 2021-11-19 16:34:23 us=669956 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
447 | 2021-11-19 16:34:23 us=669977 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
448 | 2021-11-19 16:34:23 us=670022 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
449 | 2021-11-19 16:34:23 us=670035 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
450 | 2021-11-19 16:34:23 us=726624 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
451 | 2021-11-19 16:34:23 us=726692 TCP_CLIENT link local: (not bound) |
---|
452 | 2021-11-19 16:34:23 us=726706 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
453 | WR2021-11-19 16:34:23 us=736962 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=d4470c86 283dd7d9 |
---|
454 | W2021-11-19 16:34:23 us=737106 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
455 | 2021-11-19 16:34:23 us=737220 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
456 | WRWR2021-11-19 16:34:23 us=891788 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
457 | 2021-11-19 16:34:23 us=892051 VERIFY KU OK |
---|
458 | 2021-11-19 16:34:23 us=892092 Validating certificate extended key usage |
---|
459 | 2021-11-19 16:34:23 us=892108 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
460 | 2021-11-19 16:34:23 us=892123 VERIFY EKU OK |
---|
461 | 2021-11-19 16:34:23 us=892135 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
462 | WRWRW2021-11-19 16:34:23 us=918529 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
463 | 2021-11-19 16:34:23 us=918602 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
464 | 2021-11-19 16:34:24 us=975755 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
465 | WRrrrrrr2021-11-19 16:34:29 us=592208 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
466 | WRR2021-11-19 16:34:29 us=612985 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:12bb6cc5-fb73-4f9f-a8c3-a314d07939ee:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
467 | 2021-11-19 16:34:29 us=613146 TCP/UDP: Closing socket |
---|
468 | 2021-11-19 16:34:29 us=613232 SIGUSR1[soft,auth-failure] received, process restarting |
---|
469 | 2021-11-19 16:34:29 us=613258 Restart pause, 2 second(s) |
---|
470 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
471 | 2021-11-19 16:34:31 us=617968 Re-using SSL/TLS context |
---|
472 | 2021-11-19 16:34:31 us=617997 LZO compression initializing |
---|
473 | 2021-11-19 16:34:31 us=618069 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
474 | 2021-11-19 16:34:31 us=618082 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
475 | 2021-11-19 16:34:31 us=618108 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
476 | 2021-11-19 16:34:31 us=618113 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
477 | 2021-11-19 16:34:31 us=618123 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
478 | 2021-11-19 16:34:31 us=618143 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
479 | 2021-11-19 16:34:31 us=618148 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
480 | 2021-11-19 16:34:31 us=705739 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
481 | 2021-11-19 16:34:31 us=705791 TCP_CLIENT link local: (not bound) |
---|
482 | 2021-11-19 16:34:31 us=705807 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
483 | WrrrrrrrrrrR2021-11-19 16:34:31 us=716015 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=8002a0aa cb7a51cd |
---|
484 | W2021-11-19 16:34:31 us=716207 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
485 | 2021-11-19 16:34:31 us=716363 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
486 | WRWR2021-11-19 16:34:31 us=861273 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
487 | 2021-11-19 16:34:31 us=861456 VERIFY KU OK |
---|
488 | 2021-11-19 16:34:31 us=861470 Validating certificate extended key usage |
---|
489 | 2021-11-19 16:34:31 us=861482 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
490 | 2021-11-19 16:34:31 us=861493 VERIFY EKU OK |
---|
491 | 2021-11-19 16:34:31 us=861504 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
492 | WRWRW2021-11-19 16:34:31 us=928843 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
493 | 2021-11-19 16:34:31 us=928891 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
494 | r2021-11-19 16:34:32 us=542370 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
495 | WrrrrRR2021-11-19 16:34:32 us=611581 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
496 | 2021-11-19 16:34:32 us=611921 TCP/UDP: Closing socket |
---|
497 | 2021-11-19 16:34:32 us=612085 SIGUSR1[soft,auth-failure] received, process restarting |
---|
498 | 2021-11-19 16:34:32 us=612158 Restart pause, 2 second(s) |
---|
499 | 2021-11-19 16:34:34 us=612339 Re-using SSL/TLS context |
---|
500 | 2021-11-19 16:34:34 us=612373 LZO compression initializing |
---|
501 | 2021-11-19 16:34:34 us=612456 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
502 | 2021-11-19 16:34:34 us=612474 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
503 | 2021-11-19 16:34:34 us=612524 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
504 | 2021-11-19 16:34:34 us=612535 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
505 | 2021-11-19 16:34:34 us=612552 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
506 | 2021-11-19 16:34:34 us=612584 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
507 | 2021-11-19 16:34:34 us=612595 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
508 | 2021-11-19 16:34:34 us=623979 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
509 | 2021-11-19 16:34:34 us=624033 TCP_CLIENT link local: (not bound) |
---|
510 | 2021-11-19 16:34:34 us=624048 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
511 | WR2021-11-19 16:34:34 us=634469 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=81fd427f 6f2a3a1f |
---|
512 | W2021-11-19 16:34:34 us=634649 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
513 | 2021-11-19 16:34:34 us=634840 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
514 | WRWR2021-11-19 16:34:34 us=665654 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
515 | 2021-11-19 16:34:34 us=665756 VERIFY KU OK |
---|
516 | 2021-11-19 16:34:34 us=665764 Validating certificate extended key usage |
---|
517 | 2021-11-19 16:34:34 us=665769 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
518 | 2021-11-19 16:34:34 us=665774 VERIFY EKU OK |
---|
519 | 2021-11-19 16:34:34 us=665780 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
520 | WRWRW2021-11-19 16:34:34 us=685995 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
521 | 2021-11-19 16:34:34 us=686039 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
522 | 2021-11-19 16:34:35 us=831778 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
523 | WR2021-11-19 16:34:41 us=31783 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
524 | WRR2021-11-19 16:34:41 us=87474 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:72027218-142c-4713-a94a-d7f5e268bab8:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
525 | 2021-11-19 16:34:41 us=87591 TCP/UDP: Closing socket |
---|
526 | 2021-11-19 16:34:41 us=87651 SIGUSR1[soft,auth-failure] received, process restarting |
---|
527 | 2021-11-19 16:34:41 us=87668 Restart pause, 2 second(s) |
---|
528 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
529 | 2021-11-19 16:34:43 us=94059 Re-using SSL/TLS context |
---|
530 | 2021-11-19 16:34:43 us=94092 LZO compression initializing |
---|
531 | 2021-11-19 16:34:43 us=94187 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
532 | 2021-11-19 16:34:43 us=94206 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
533 | 2021-11-19 16:34:43 us=94232 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
534 | 2021-11-19 16:34:43 us=94239 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
535 | 2021-11-19 16:34:43 us=94255 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
536 | 2021-11-19 16:34:43 us=94282 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
537 | 2021-11-19 16:34:43 us=94289 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
538 | 2021-11-19 16:34:43 us=108443 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
539 | 2021-11-19 16:34:43 us=108488 TCP_CLIENT link local: (not bound) |
---|
540 | 2021-11-19 16:34:43 us=108498 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
541 | WR2021-11-19 16:34:43 us=118469 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=df10998e e00bc292 |
---|
542 | W2021-11-19 16:34:43 us=118747 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
543 | 2021-11-19 16:34:43 us=118885 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
544 | WRWR2021-11-19 16:34:43 us=150546 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
545 | 2021-11-19 16:34:43 us=150731 VERIFY KU OK |
---|
546 | 2021-11-19 16:34:43 us=150745 Validating certificate extended key usage |
---|
547 | 2021-11-19 16:34:43 us=150756 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
548 | 2021-11-19 16:34:43 us=150766 VERIFY EKU OK |
---|
549 | 2021-11-19 16:34:43 us=150774 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
550 | WRWRW2021-11-19 16:34:43 us=171395 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
551 | 2021-11-19 16:34:43 us=171463 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
552 | 2021-11-19 16:34:44 us=419762 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
553 | WRR2021-11-19 16:34:44 us=485917 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
554 | 2021-11-19 16:34:44 us=486050 TCP/UDP: Closing socket |
---|
555 | 2021-11-19 16:34:44 us=486109 SIGUSR1[soft,auth-failure] received, process restarting |
---|
556 | 2021-11-19 16:34:44 us=486129 Restart pause, 2 second(s) |
---|
557 | 2021-11-19 16:34:46 us=486247 Re-using SSL/TLS context |
---|
558 | 2021-11-19 16:34:46 us=486273 LZO compression initializing |
---|
559 | 2021-11-19 16:34:46 us=486337 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
560 | 2021-11-19 16:34:46 us=486348 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
561 | 2021-11-19 16:34:46 us=486372 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
562 | 2021-11-19 16:34:46 us=486377 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
563 | 2021-11-19 16:34:46 us=486387 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
564 | 2021-11-19 16:34:46 us=486412 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
565 | 2021-11-19 16:34:46 us=486417 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
566 | 2021-11-19 16:34:46 us=497496 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
567 | 2021-11-19 16:34:46 us=497528 TCP_CLIENT link local: (not bound) |
---|
568 | 2021-11-19 16:34:46 us=497536 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
569 | WR2021-11-19 16:34:46 us=508039 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=19525399 5e5776bc |
---|
570 | W2021-11-19 16:34:46 us=508178 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
571 | 2021-11-19 16:34:46 us=508296 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
572 | WRWR2021-11-19 16:34:46 us=541621 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
573 | 2021-11-19 16:34:46 us=541759 VERIFY KU OK |
---|
574 | 2021-11-19 16:34:46 us=541771 Validating certificate extended key usage |
---|
575 | 2021-11-19 16:34:46 us=541779 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
576 | 2021-11-19 16:34:46 us=541787 VERIFY EKU OK |
---|
577 | 2021-11-19 16:34:46 us=541793 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
578 | WRWRW2021-11-19 16:34:46 us=562648 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
579 | 2021-11-19 16:34:46 us=562687 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
580 | 2021-11-19 16:34:47 us=665083 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
581 | WRr2021-11-19 16:34:53 us=87884 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
582 | WRR2021-11-19 16:34:53 us=108379 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:c74f2f2b-620e-4f18-8997-39ee6b9d9fdd:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
583 | 2021-11-19 16:34:53 us=108510 TCP/UDP: Closing socket |
---|
584 | 2021-11-19 16:34:53 us=108564 SIGUSR1[soft,auth-failure] received, process restarting |
---|
585 | 2021-11-19 16:34:53 us=108579 Restart pause, 2 second(s) |
---|
586 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
587 | 2021-11-19 16:34:55 us=114194 Re-using SSL/TLS context |
---|
588 | 2021-11-19 16:34:55 us=114231 LZO compression initializing |
---|
589 | 2021-11-19 16:34:55 us=114322 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
590 | 2021-11-19 16:34:55 us=114338 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
591 | 2021-11-19 16:34:55 us=114365 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
592 | 2021-11-19 16:34:55 us=114370 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
593 | 2021-11-19 16:34:55 us=114381 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
594 | 2021-11-19 16:34:55 us=114404 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
595 | 2021-11-19 16:34:55 us=114410 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
596 | 2021-11-19 16:34:55 us=125502 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
597 | 2021-11-19 16:34:55 us=125533 TCP_CLIENT link local: (not bound) |
---|
598 | 2021-11-19 16:34:55 us=125539 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
599 | WR2021-11-19 16:34:55 us=135916 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=6d698455 9f61f95d |
---|
600 | W2021-11-19 16:34:55 us=136027 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
601 | 2021-11-19 16:34:55 us=136120 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
602 | WRWR2021-11-19 16:34:55 us=166645 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
603 | 2021-11-19 16:34:55 us=166848 VERIFY KU OK |
---|
604 | 2021-11-19 16:34:55 us=166863 Validating certificate extended key usage |
---|
605 | 2021-11-19 16:34:55 us=166874 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
606 | 2021-11-19 16:34:55 us=166883 VERIFY EKU OK |
---|
607 | 2021-11-19 16:34:55 us=166894 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
608 | WRWRW2021-11-19 16:34:55 us=186852 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
609 | 2021-11-19 16:34:55 us=186898 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
610 | 2021-11-19 16:34:56 us=332768 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
611 | WRR2021-11-19 16:34:56 us=420841 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
612 | 2021-11-19 16:34:56 us=421021 TCP/UDP: Closing socket |
---|
613 | 2021-11-19 16:34:56 us=421111 SIGUSR1[soft,auth-failure] received, process restarting |
---|
614 | 2021-11-19 16:34:56 us=421129 Restart pause, 2 second(s) |
---|
615 | 2021-11-19 16:34:58 us=421338 Re-using SSL/TLS context |
---|
616 | 2021-11-19 16:34:58 us=421368 LZO compression initializing |
---|
617 | 2021-11-19 16:34:58 us=421463 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
618 | 2021-11-19 16:34:58 us=421479 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
619 | 2021-11-19 16:34:58 us=421507 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
620 | 2021-11-19 16:34:58 us=421512 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
621 | 2021-11-19 16:34:58 us=421522 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
622 | 2021-11-19 16:34:58 us=421549 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
623 | 2021-11-19 16:34:58 us=421555 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
624 | 2021-11-19 16:34:58 us=432715 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
625 | 2021-11-19 16:34:58 us=432750 TCP_CLIENT link local: (not bound) |
---|
626 | 2021-11-19 16:34:58 us=432758 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
627 | WR2021-11-19 16:34:58 us=444797 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=5a3242d6 455c9d38 |
---|
628 | W2021-11-19 16:34:58 us=444915 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
629 | 2021-11-19 16:34:58 us=445064 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
630 | WRWR2021-11-19 16:34:58 us=477042 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
631 | 2021-11-19 16:34:58 us=477195 VERIFY KU OK |
---|
632 | 2021-11-19 16:34:58 us=477207 Validating certificate extended key usage |
---|
633 | 2021-11-19 16:34:58 us=477218 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
634 | 2021-11-19 16:34:58 us=477224 VERIFY EKU OK |
---|
635 | 2021-11-19 16:34:58 us=477233 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
636 | WRWRW2021-11-19 16:34:58 us=498803 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
637 | 2021-11-19 16:34:58 us=498851 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
638 | 2021-11-19 16:34:59 us=740161 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
639 | WR2021-11-19 16:35:05 us=11860 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
640 | WRR2021-11-19 16:35:05 us=31505 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:ab3ee2fc-f553-4dd3-811c-508a8c92c80c:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
641 | 2021-11-19 16:35:05 us=31627 TCP/UDP: Closing socket |
---|
642 | 2021-11-19 16:35:05 us=31691 SIGUSR1[soft,auth-failure] received, process restarting |
---|
643 | 2021-11-19 16:35:05 us=31711 Restart pause, 2 second(s) |
---|
644 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
645 | 2021-11-19 16:35:07 us=36465 Re-using SSL/TLS context |
---|
646 | 2021-11-19 16:35:07 us=36492 LZO compression initializing |
---|
647 | 2021-11-19 16:35:07 us=36561 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
648 | 2021-11-19 16:35:07 us=36573 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
649 | 2021-11-19 16:35:07 us=36598 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
650 | 2021-11-19 16:35:07 us=36604 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
651 | 2021-11-19 16:35:07 us=36613 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
652 | 2021-11-19 16:35:07 us=36633 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
653 | 2021-11-19 16:35:07 us=36639 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
654 | 2021-11-19 16:35:07 us=48395 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
655 | 2021-11-19 16:35:07 us=48424 TCP_CLIENT link local: (not bound) |
---|
656 | 2021-11-19 16:35:07 us=48431 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
657 | WR2021-11-19 16:35:07 us=60450 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=7d0ba77d 656c0270 |
---|
658 | W2021-11-19 16:35:07 us=60697 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
659 | 2021-11-19 16:35:07 us=60815 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
660 | WRWR2021-11-19 16:35:07 us=92194 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
661 | 2021-11-19 16:35:07 us=92385 VERIFY KU OK |
---|
662 | 2021-11-19 16:35:07 us=92402 Validating certificate extended key usage |
---|
663 | 2021-11-19 16:35:07 us=92412 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
664 | 2021-11-19 16:35:07 us=92421 VERIFY EKU OK |
---|
665 | 2021-11-19 16:35:07 us=92428 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
666 | WRWRW2021-11-19 16:35:07 us=114294 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
667 | 2021-11-19 16:35:07 us=114347 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
668 | 2021-11-19 16:35:08 us=167833 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
669 | WRR2021-11-19 16:35:08 us=230762 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
670 | 2021-11-19 16:35:08 us=230901 TCP/UDP: Closing socket |
---|
671 | 2021-11-19 16:35:08 us=230958 SIGUSR1[soft,auth-failure] received, process restarting |
---|
672 | 2021-11-19 16:35:08 us=230976 Restart pause, 2 second(s) |
---|
673 | 2021-11-19 16:35:10 us=231115 Re-using SSL/TLS context |
---|
674 | 2021-11-19 16:35:10 us=231158 LZO compression initializing |
---|
675 | 2021-11-19 16:35:10 us=231263 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
676 | 2021-11-19 16:35:10 us=231286 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
677 | 2021-11-19 16:35:10 us=231334 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
678 | 2021-11-19 16:35:10 us=231349 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
679 | 2021-11-19 16:35:10 us=231367 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
680 | 2021-11-19 16:35:10 us=231413 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
681 | 2021-11-19 16:35:10 us=231424 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
682 | 2021-11-19 16:35:10 us=282530 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
683 | 2021-11-19 16:35:10 us=282576 TCP_CLIENT link local: (not bound) |
---|
684 | 2021-11-19 16:35:10 us=282589 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
685 | WR2021-11-19 16:35:10 us=293607 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=7e559510 9d36f5b6 |
---|
686 | W2021-11-19 16:35:10 us=293767 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
687 | 2021-11-19 16:35:10 us=293917 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
688 | WRWR2021-11-19 16:35:10 us=599581 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
689 | 2021-11-19 16:35:10 us=599718 VERIFY KU OK |
---|
690 | 2021-11-19 16:35:10 us=599730 Validating certificate extended key usage |
---|
691 | 2021-11-19 16:35:10 us=599738 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
692 | 2021-11-19 16:35:10 us=599745 VERIFY EKU OK |
---|
693 | 2021-11-19 16:35:10 us=599752 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
694 | WRWRW2021-11-19 16:35:10 us=727881 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
695 | 2021-11-19 16:35:10 us=727923 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
696 | 2021-11-19 16:35:11 us=907861 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
697 | WR2021-11-19 16:35:16 us=206758 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
698 | WRR2021-11-19 16:35:16 us=227833 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:43fc1d71-dc4e-4d07-8c8e-120b1cbe6944:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
699 | 2021-11-19 16:35:16 us=227966 TCP/UDP: Closing socket |
---|
700 | 2021-11-19 16:35:16 us=228038 SIGUSR1[soft,auth-failure] received, process restarting |
---|
701 | 2021-11-19 16:35:16 us=228057 Restart pause, 2 second(s) |
---|
702 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
703 | 2021-11-19 16:35:18 us=232930 Re-using SSL/TLS context |
---|
704 | 2021-11-19 16:35:18 us=232981 LZO compression initializing |
---|
705 | 2021-11-19 16:35:18 us=233086 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
706 | 2021-11-19 16:35:18 us=233108 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
707 | 2021-11-19 16:35:18 us=233139 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
708 | 2021-11-19 16:35:18 us=233146 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
709 | 2021-11-19 16:35:18 us=233157 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
710 | 2021-11-19 16:35:18 us=233185 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
711 | 2021-11-19 16:35:18 us=233193 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
712 | 2021-11-19 16:35:18 us=246934 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
713 | 2021-11-19 16:35:18 us=246963 TCP_CLIENT link local: (not bound) |
---|
714 | 2021-11-19 16:35:18 us=246973 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
715 | WR2021-11-19 16:35:18 us=257303 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=c267d0df 16035d5d |
---|
716 | W2021-11-19 16:35:18 us=257406 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
717 | 2021-11-19 16:35:18 us=257520 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
718 | WRWR2021-11-19 16:35:18 us=290522 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
719 | 2021-11-19 16:35:18 us=290637 VERIFY KU OK |
---|
720 | 2021-11-19 16:35:18 us=290644 Validating certificate extended key usage |
---|
721 | 2021-11-19 16:35:18 us=290650 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
722 | 2021-11-19 16:35:18 us=290654 VERIFY EKU OK |
---|
723 | 2021-11-19 16:35:18 us=290659 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
724 | WRWRW2021-11-19 16:35:18 us=310133 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
725 | 2021-11-19 16:35:18 us=310185 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
726 | 2021-11-19 16:35:19 us=359758 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
727 | WRR2021-11-19 16:35:19 us=422006 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
728 | 2021-11-19 16:35:19 us=422202 TCP/UDP: Closing socket |
---|
729 | 2021-11-19 16:35:19 us=422282 SIGUSR1[soft,auth-failure] received, process restarting |
---|
730 | 2021-11-19 16:35:19 us=422302 Restart pause, 2 second(s) |
---|
731 | 2021-11-19 16:35:21 us=422496 Re-using SSL/TLS context |
---|
732 | 2021-11-19 16:35:21 us=422536 LZO compression initializing |
---|
733 | 2021-11-19 16:35:21 us=422633 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
734 | 2021-11-19 16:35:21 us=422655 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
735 | 2021-11-19 16:35:21 us=422703 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
736 | 2021-11-19 16:35:21 us=422715 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
737 | 2021-11-19 16:35:21 us=422735 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
738 | 2021-11-19 16:35:21 us=422778 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
739 | 2021-11-19 16:35:21 us=422785 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
740 | 2021-11-19 16:35:21 us=446366 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
741 | 2021-11-19 16:35:21 us=446399 TCP_CLIENT link local: (not bound) |
---|
742 | 2021-11-19 16:35:21 us=446407 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
743 | WR2021-11-19 16:35:21 us=458434 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=b43a1644 1d6fe1a1 |
---|
744 | W2021-11-19 16:35:21 us=458733 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
745 | 2021-11-19 16:35:21 us=458901 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
746 | WRWR2021-11-19 16:35:21 us=489590 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
747 | 2021-11-19 16:35:21 us=489726 VERIFY KU OK |
---|
748 | 2021-11-19 16:35:21 us=489737 Validating certificate extended key usage |
---|
749 | 2021-11-19 16:35:21 us=489745 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
750 | 2021-11-19 16:35:21 us=489755 VERIFY EKU OK |
---|
751 | 2021-11-19 16:35:21 us=489762 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
752 | WRWRW2021-11-19 16:35:21 us=510551 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
753 | 2021-11-19 16:35:21 us=510589 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
754 | 2021-11-19 16:35:22 us=715812 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
755 | WR2021-11-19 16:35:27 us=951775 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
756 | WRR2021-11-19 16:35:27 us=974740 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:125b169c-ebb5-4bd9-9d2a-8af63d36bac7:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
757 | 2021-11-19 16:35:27 us=974943 TCP/UDP: Closing socket |
---|
758 | 2021-11-19 16:35:27 us=975033 SIGUSR1[soft,auth-failure] received, process restarting |
---|
759 | 2021-11-19 16:35:27 us=975060 Restart pause, 2 second(s) |
---|
760 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
761 | 2021-11-19 16:35:29 us=980697 Re-using SSL/TLS context |
---|
762 | 2021-11-19 16:35:29 us=980780 LZO compression initializing |
---|
763 | 2021-11-19 16:35:29 us=980962 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
764 | 2021-11-19 16:35:29 us=981019 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
765 | 2021-11-19 16:35:29 us=981094 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
766 | 2021-11-19 16:35:29 us=981111 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
767 | 2021-11-19 16:35:29 us=981138 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
768 | 2021-11-19 16:35:29 us=981199 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
769 | 2021-11-19 16:35:29 us=981218 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
770 | 2021-11-19 16:35:31 us=19644 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
771 | 2021-11-19 16:35:31 us=19686 TCP_CLIENT link local: (not bound) |
---|
772 | 2021-11-19 16:35:31 us=19698 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
773 | WR2021-11-19 16:35:31 us=30045 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=0acfbde0 e145fa42 |
---|
774 | W2021-11-19 16:35:31 us=30342 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
775 | 2021-11-19 16:35:31 us=30527 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
776 | WRWR2021-11-19 16:35:31 us=62538 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
777 | 2021-11-19 16:35:31 us=62666 VERIFY KU OK |
---|
778 | 2021-11-19 16:35:31 us=62676 Validating certificate extended key usage |
---|
779 | 2021-11-19 16:35:31 us=62684 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
780 | 2021-11-19 16:35:31 us=62690 VERIFY EKU OK |
---|
781 | 2021-11-19 16:35:31 us=62696 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
782 | WRWRW2021-11-19 16:35:31 us=193313 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
783 | 2021-11-19 16:35:31 us=193357 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
784 | 2021-11-19 16:35:32 us=346067 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
785 | WRR2021-11-19 16:35:32 us=413501 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
786 | 2021-11-19 16:35:32 us=413634 TCP/UDP: Closing socket |
---|
787 | 2021-11-19 16:35:32 us=413694 SIGUSR1[soft,auth-failure] received, process restarting |
---|
788 | 2021-11-19 16:35:32 us=413713 Restart pause, 2 second(s) |
---|
789 | 2021-11-19 16:35:34 us=413874 Re-using SSL/TLS context |
---|
790 | 2021-11-19 16:35:34 us=413924 LZO compression initializing |
---|
791 | 2021-11-19 16:35:34 us=414028 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
792 | 2021-11-19 16:35:34 us=414060 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
793 | 2021-11-19 16:35:34 us=414116 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
794 | 2021-11-19 16:35:34 us=414132 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
795 | 2021-11-19 16:35:34 us=414156 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
796 | 2021-11-19 16:35:34 us=414200 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
797 | 2021-11-19 16:35:34 us=414218 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
798 | 2021-11-19 16:35:34 us=425563 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
799 | 2021-11-19 16:35:34 us=425619 TCP_CLIENT link local: (not bound) |
---|
800 | 2021-11-19 16:35:34 us=425636 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
801 | WR2021-11-19 16:35:34 us=435647 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=7a9bfa0e 3155fa56 |
---|
802 | W2021-11-19 16:35:34 us=435824 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
803 | 2021-11-19 16:35:34 us=435942 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
804 | WRWR2021-11-19 16:35:34 us=467658 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
805 | 2021-11-19 16:35:34 us=467814 VERIFY KU OK |
---|
806 | 2021-11-19 16:35:34 us=467825 Validating certificate extended key usage |
---|
807 | 2021-11-19 16:35:34 us=467834 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
808 | 2021-11-19 16:35:34 us=467841 VERIFY EKU OK |
---|
809 | 2021-11-19 16:35:34 us=467847 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
810 | WRWRW2021-11-19 16:35:34 us=489169 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
811 | 2021-11-19 16:35:34 us=489211 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
812 | 2021-11-19 16:35:35 us=743863 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
813 | WR2021-11-19 16:35:41 us=27758 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
814 | WRR2021-11-19 16:35:41 us=120499 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:f3f679d4-fb86-412a-9501-c9c608b1ff17:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
815 | 2021-11-19 16:35:41 us=120662 TCP/UDP: Closing socket |
---|
816 | 2021-11-19 16:35:41 us=120724 SIGUSR1[soft,auth-failure] received, process restarting |
---|
817 | 2021-11-19 16:35:41 us=120742 Restart pause, 2 second(s) |
---|
818 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
819 | 2021-11-19 16:35:43 us=128272 Re-using SSL/TLS context |
---|
820 | 2021-11-19 16:35:43 us=128313 LZO compression initializing |
---|
821 | 2021-11-19 16:35:43 us=128391 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
822 | 2021-11-19 16:35:43 us=128408 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
823 | 2021-11-19 16:35:43 us=128433 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
824 | 2021-11-19 16:35:43 us=128438 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
825 | 2021-11-19 16:35:43 us=128447 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
826 | 2021-11-19 16:35:43 us=128477 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
827 | 2021-11-19 16:35:43 us=128492 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
828 | 2021-11-19 16:35:43 us=139734 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
829 | 2021-11-19 16:35:43 us=139776 TCP_CLIENT link local: (not bound) |
---|
830 | 2021-11-19 16:35:43 us=139783 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
831 | WR2021-11-19 16:35:43 us=150185 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=f368f69c 81d59033 |
---|
832 | W2021-11-19 16:35:43 us=150302 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
833 | 2021-11-19 16:35:43 us=150407 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
834 | WRWR2021-11-19 16:35:43 us=180878 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
835 | 2021-11-19 16:35:43 us=181026 VERIFY KU OK |
---|
836 | 2021-11-19 16:35:43 us=181050 Validating certificate extended key usage |
---|
837 | 2021-11-19 16:35:43 us=181058 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
838 | 2021-11-19 16:35:43 us=181062 VERIFY EKU OK |
---|
839 | 2021-11-19 16:35:43 us=181066 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
840 | WRWRW2021-11-19 16:35:43 us=200947 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
841 | 2021-11-19 16:35:43 us=201086 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
842 | 2021-11-19 16:35:44 us=383794 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
843 | WRR2021-11-19 16:35:44 us=445967 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
844 | 2021-11-19 16:35:44 us=446159 TCP/UDP: Closing socket |
---|
845 | 2021-11-19 16:35:44 us=446230 SIGUSR1[soft,auth-failure] received, process restarting |
---|
846 | 2021-11-19 16:35:44 us=446254 Restart pause, 2 second(s) |
---|
847 | 2021-11-19 16:35:46 us=446394 Re-using SSL/TLS context |
---|
848 | 2021-11-19 16:35:46 us=446430 LZO compression initializing |
---|
849 | 2021-11-19 16:35:46 us=446522 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
850 | 2021-11-19 16:35:46 us=446543 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
851 | 2021-11-19 16:35:46 us=446586 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
852 | 2021-11-19 16:35:46 us=446599 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
853 | 2021-11-19 16:35:46 us=446619 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
854 | 2021-11-19 16:35:46 us=446663 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
855 | 2021-11-19 16:35:46 us=446679 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
856 | 2021-11-19 16:35:46 us=457749 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
857 | 2021-11-19 16:35:46 us=457795 TCP_CLIENT link local: (not bound) |
---|
858 | 2021-11-19 16:35:46 us=457809 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
859 | WrR2021-11-19 16:35:46 us=478663 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=f0af2609 2524514a |
---|
860 | W2021-11-19 16:35:46 us=478927 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
861 | 2021-11-19 16:35:46 us=479105 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
862 | WRWR2021-11-19 16:35:46 us=511372 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
863 | 2021-11-19 16:35:46 us=511545 VERIFY KU OK |
---|
864 | 2021-11-19 16:35:46 us=511561 Validating certificate extended key usage |
---|
865 | 2021-11-19 16:35:46 us=511573 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
866 | 2021-11-19 16:35:46 us=511583 VERIFY EKU OK |
---|
867 | 2021-11-19 16:35:46 us=511592 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
868 | WRWRW2021-11-19 16:35:46 us=552974 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
869 | 2021-11-19 16:35:46 us=553031 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
870 | 2021-11-19 16:35:47 us=742942 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
871 | WR2021-11-19 16:35:52 us=959824 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
872 | WRR2021-11-19 16:35:52 us=980779 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:37361d7a-1e5e-46ce-936c-77314e0b9bbc:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
873 | 2021-11-19 16:35:52 us=980880 TCP/UDP: Closing socket |
---|
874 | 2021-11-19 16:35:52 us=980928 SIGUSR1[soft,auth-failure] received, process restarting |
---|
875 | 2021-11-19 16:35:52 us=980943 Restart pause, 2 second(s) |
---|
876 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
877 | 2021-11-19 16:35:54 us=985785 Re-using SSL/TLS context |
---|
878 | 2021-11-19 16:35:54 us=985822 LZO compression initializing |
---|
879 | 2021-11-19 16:35:54 us=985920 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
880 | 2021-11-19 16:35:54 us=985933 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
881 | 2021-11-19 16:35:54 us=985960 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
882 | 2021-11-19 16:35:54 us=985968 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
883 | 2021-11-19 16:35:54 us=985980 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
884 | 2021-11-19 16:35:54 us=986008 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
885 | 2021-11-19 16:35:54 us=986017 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
886 | 2021-11-19 16:35:55 us=1225 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
887 | 2021-11-19 16:35:55 us=1283 TCP_CLIENT link local: (not bound) |
---|
888 | 2021-11-19 16:35:55 us=1296 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
889 | WR2021-11-19 16:35:55 us=12814 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=4ca19802 31fc1d30 |
---|
890 | W2021-11-19 16:35:55 us=12955 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
891 | 2021-11-19 16:35:55 us=13090 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
892 | WRWR2021-11-19 16:35:55 us=47146 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
893 | 2021-11-19 16:35:55 us=47283 VERIFY KU OK |
---|
894 | 2021-11-19 16:35:55 us=47294 Validating certificate extended key usage |
---|
895 | 2021-11-19 16:35:55 us=47302 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
896 | 2021-11-19 16:35:55 us=47310 VERIFY EKU OK |
---|
897 | 2021-11-19 16:35:55 us=47316 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
898 | WRWRW2021-11-19 16:35:55 us=68440 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
899 | 2021-11-19 16:35:55 us=68473 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
900 | 2021-11-19 16:35:56 us=327900 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
901 | WRR2021-11-19 16:35:56 us=410177 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
902 | 2021-11-19 16:35:56 us=410402 TCP/UDP: Closing socket |
---|
903 | 2021-11-19 16:35:56 us=410559 SIGUSR1[soft,auth-failure] received, process restarting |
---|
904 | 2021-11-19 16:35:56 us=410610 Restart pause, 2 second(s) |
---|
905 | 2021-11-19 16:35:58 us=410742 Re-using SSL/TLS context |
---|
906 | 2021-11-19 16:35:58 us=410769 LZO compression initializing |
---|
907 | 2021-11-19 16:35:58 us=410838 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
908 | 2021-11-19 16:35:58 us=410849 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
909 | 2021-11-19 16:35:58 us=410880 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
910 | 2021-11-19 16:35:58 us=410886 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
911 | 2021-11-19 16:35:58 us=410896 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
912 | 2021-11-19 16:35:58 us=410920 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
913 | 2021-11-19 16:35:58 us=410926 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
914 | 2021-11-19 16:35:58 us=421958 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
915 | 2021-11-19 16:35:58 us=421987 TCP_CLIENT link local: (not bound) |
---|
916 | 2021-11-19 16:35:58 us=421997 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
917 | WR2021-11-19 16:35:58 us=432281 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=b1583cbf 090c85ea |
---|
918 | W2021-11-19 16:35:58 us=432386 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
919 | 2021-11-19 16:35:58 us=432484 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
920 | WRWR2021-11-19 16:35:58 us=466885 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
921 | 2021-11-19 16:35:58 us=466985 VERIFY KU OK |
---|
922 | 2021-11-19 16:35:58 us=466993 Validating certificate extended key usage |
---|
923 | 2021-11-19 16:35:58 us=466999 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
924 | 2021-11-19 16:35:58 us=467004 VERIFY EKU OK |
---|
925 | 2021-11-19 16:35:58 us=467009 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
926 | WRWRW2021-11-19 16:35:58 us=489768 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
927 | 2021-11-19 16:35:58 us=489803 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
928 | 2021-11-19 16:35:59 us=703786 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
929 | WR2021-11-19 16:36:04 us=947793 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
930 | WRR2021-11-19 16:36:04 us=968440 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:4c900bb2-77ea-4670-ae17-ca37cf4ef226:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
931 | 2021-11-19 16:36:04 us=968539 TCP/UDP: Closing socket |
---|
932 | 2021-11-19 16:36:04 us=968587 SIGUSR1[soft,auth-failure] received, process restarting |
---|
933 | 2021-11-19 16:36:04 us=968602 Restart pause, 2 second(s) |
---|
934 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
935 | 2021-11-19 16:36:06 us=973835 Re-using SSL/TLS context |
---|
936 | 2021-11-19 16:36:06 us=973883 LZO compression initializing |
---|
937 | 2021-11-19 16:36:06 us=974010 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
938 | 2021-11-19 16:36:06 us=974032 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
939 | 2021-11-19 16:36:06 us=974060 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
940 | 2021-11-19 16:36:06 us=974069 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
941 | 2021-11-19 16:36:06 us=974089 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
942 | 2021-11-19 16:36:06 us=974136 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
943 | 2021-11-19 16:36:06 us=974145 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
944 | 2021-11-19 16:36:06 us=985070 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
945 | 2021-11-19 16:36:06 us=985108 TCP_CLIENT link local: (not bound) |
---|
946 | 2021-11-19 16:36:06 us=985117 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
947 | WR2021-11-19 16:36:06 us=995142 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=6b87c8de 380f5709 |
---|
948 | W2021-11-19 16:36:06 us=995247 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
949 | 2021-11-19 16:36:06 us=995351 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
950 | WRWR2021-11-19 16:36:07 us=26461 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
951 | 2021-11-19 16:36:07 us=26580 VERIFY KU OK |
---|
952 | 2021-11-19 16:36:07 us=26596 Validating certificate extended key usage |
---|
953 | 2021-11-19 16:36:07 us=26604 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
954 | 2021-11-19 16:36:07 us=26610 VERIFY EKU OK |
---|
955 | 2021-11-19 16:36:07 us=26615 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
956 | WRWRW2021-11-19 16:36:07 us=46377 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
957 | 2021-11-19 16:36:07 us=46427 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
958 | 2021-11-19 16:36:08 us=259767 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
959 | WRR2021-11-19 16:36:08 us=322620 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
960 | 2021-11-19 16:36:08 us=322773 TCP/UDP: Closing socket |
---|
961 | 2021-11-19 16:36:08 us=322866 SIGUSR1[soft,auth-failure] received, process restarting |
---|
962 | 2021-11-19 16:36:08 us=322892 Restart pause, 2 second(s) |
---|
963 | 2021-11-19 16:36:10 us=323027 Re-using SSL/TLS context |
---|
964 | 2021-11-19 16:36:10 us=323057 LZO compression initializing |
---|
965 | 2021-11-19 16:36:10 us=323126 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
966 | 2021-11-19 16:36:10 us=323138 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
967 | 2021-11-19 16:36:10 us=323161 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
968 | 2021-11-19 16:36:10 us=323168 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
969 | 2021-11-19 16:36:10 us=323179 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
970 | 2021-11-19 16:36:10 us=323216 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
971 | 2021-11-19 16:36:10 us=323223 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
972 | 2021-11-19 16:36:10 us=449701 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
973 | 2021-11-19 16:36:10 us=449759 TCP_CLIENT link local: (not bound) |
---|
974 | 2021-11-19 16:36:10 us=449775 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
975 | WR2021-11-19 16:36:10 us=459834 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=33c2191d 3942f0f0 |
---|
976 | W2021-11-19 16:36:10 us=459946 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
977 | 2021-11-19 16:36:10 us=460044 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
978 | WRWR2021-11-19 16:36:10 us=618065 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
979 | 2021-11-19 16:36:10 us=618176 VERIFY KU OK |
---|
980 | 2021-11-19 16:36:10 us=618182 Validating certificate extended key usage |
---|
981 | 2021-11-19 16:36:10 us=618188 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
982 | 2021-11-19 16:36:10 us=618193 VERIFY EKU OK |
---|
983 | 2021-11-19 16:36:10 us=618197 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
984 | WRWRW2021-11-19 16:36:10 us=686086 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
985 | 2021-11-19 16:36:10 us=686158 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
986 | 2021-11-19 16:36:11 us=843775 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
987 | WR2021-11-19 16:36:17 us=55899 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
988 | WRR2021-11-19 16:36:17 us=77657 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:8a252466-b01c-4bfe-8b37-56139c8a23e0:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
989 | 2021-11-19 16:36:17 us=77794 TCP/UDP: Closing socket |
---|
990 | 2021-11-19 16:36:17 us=77857 SIGUSR1[soft,auth-failure] received, process restarting |
---|
991 | 2021-11-19 16:36:17 us=77871 Restart pause, 2 second(s) |
---|
992 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
993 | 2021-11-19 16:36:19 us=82415 Re-using SSL/TLS context |
---|
994 | 2021-11-19 16:36:19 us=82446 LZO compression initializing |
---|
995 | 2021-11-19 16:36:19 us=82537 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
996 | 2021-11-19 16:36:19 us=82553 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
997 | 2021-11-19 16:36:19 us=82584 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
998 | 2021-11-19 16:36:19 us=82592 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
999 | 2021-11-19 16:36:19 us=82607 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1000 | 2021-11-19 16:36:19 us=82639 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1001 | 2021-11-19 16:36:19 us=82774 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1002 | 2021-11-19 16:36:19 us=94130 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1003 | 2021-11-19 16:36:19 us=94178 TCP_CLIENT link local: (not bound) |
---|
1004 | 2021-11-19 16:36:19 us=94187 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1005 | WR2021-11-19 16:36:19 us=107585 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=177cef95 8dcc1d0c |
---|
1006 | W2021-11-19 16:36:19 us=107823 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1007 | 2021-11-19 16:36:19 us=107999 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1008 | WRWR2021-11-19 16:36:19 us=140203 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1009 | 2021-11-19 16:36:19 us=140310 VERIFY KU OK |
---|
1010 | 2021-11-19 16:36:19 us=140319 Validating certificate extended key usage |
---|
1011 | 2021-11-19 16:36:19 us=140325 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1012 | 2021-11-19 16:36:19 us=140332 VERIFY EKU OK |
---|
1013 | 2021-11-19 16:36:19 us=140337 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1014 | WRWRW2021-11-19 16:36:19 us=160617 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1015 | 2021-11-19 16:36:19 us=160652 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1016 | 2021-11-19 16:36:20 us=371761 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1017 | WRR2021-11-19 16:36:20 us=590128 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
1018 | 2021-11-19 16:36:20 us=590275 TCP/UDP: Closing socket |
---|
1019 | 2021-11-19 16:36:20 us=590352 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1020 | 2021-11-19 16:36:20 us=590368 Restart pause, 2 second(s) |
---|
1021 | 2021-11-19 16:36:22 us=590491 Re-using SSL/TLS context |
---|
1022 | 2021-11-19 16:36:22 us=590523 LZO compression initializing |
---|
1023 | 2021-11-19 16:36:22 us=590607 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1024 | 2021-11-19 16:36:22 us=590625 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1025 | 2021-11-19 16:36:22 us=590665 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1026 | 2021-11-19 16:36:22 us=590675 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1027 | 2021-11-19 16:36:22 us=590691 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1028 | 2021-11-19 16:36:22 us=590732 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1029 | 2021-11-19 16:36:22 us=590743 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1030 | 2021-11-19 16:36:22 us=601704 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1031 | 2021-11-19 16:36:22 us=601769 TCP_CLIENT link local: (not bound) |
---|
1032 | 2021-11-19 16:36:22 us=601790 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1033 | WR2021-11-19 16:36:22 us=611850 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=b33787ac 6095ebaa |
---|
1034 | W2021-11-19 16:36:22 us=612016 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1035 | 2021-11-19 16:36:22 us=612256 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1036 | WRWR2021-11-19 16:36:22 us=643853 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1037 | 2021-11-19 16:36:22 us=644140 VERIFY KU OK |
---|
1038 | 2021-11-19 16:36:22 us=644167 Validating certificate extended key usage |
---|
1039 | 2021-11-19 16:36:22 us=644178 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1040 | 2021-11-19 16:36:22 us=644188 VERIFY EKU OK |
---|
1041 | 2021-11-19 16:36:22 us=644196 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1042 | WRWRW2021-11-19 16:36:22 us=665553 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1043 | 2021-11-19 16:36:22 us=665607 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1044 | 2021-11-19 16:36:23 us=771872 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1045 | WR2021-11-19 16:36:28 us=908550 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1046 | WRR2021-11-19 16:36:28 us=929425 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:75eff7c3-78ce-4180-bd3c-3e653de3c1f7:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
1047 | 2021-11-19 16:36:28 us=929529 TCP/UDP: Closing socket |
---|
1048 | 2021-11-19 16:36:28 us=929598 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1049 | 2021-11-19 16:36:28 us=929613 Restart pause, 2 second(s) |
---|
1050 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
1051 | 2021-11-19 16:36:30 us=936614 Re-using SSL/TLS context |
---|
1052 | 2021-11-19 16:36:30 us=936659 LZO compression initializing |
---|
1053 | 2021-11-19 16:36:30 us=936848 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1054 | 2021-11-19 16:36:30 us=936880 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1055 | 2021-11-19 16:36:30 us=936981 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1056 | 2021-11-19 16:36:30 us=936998 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1057 | 2021-11-19 16:36:30 us=937012 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1058 | 2021-11-19 16:36:30 us=937050 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1059 | 2021-11-19 16:36:30 us=937057 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1060 | 2021-11-19 16:36:30 us=949660 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1061 | 2021-11-19 16:36:30 us=949695 TCP_CLIENT link local: (not bound) |
---|
1062 | 2021-11-19 16:36:30 us=949702 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1063 | WR2021-11-19 16:36:30 us=960963 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=163797b0 0b174f3c |
---|
1064 | W2021-11-19 16:36:30 us=961113 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1065 | 2021-11-19 16:36:30 us=961236 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1066 | WRWR2021-11-19 16:36:31 us=119046 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1067 | 2021-11-19 16:36:31 us=119246 VERIFY KU OK |
---|
1068 | 2021-11-19 16:36:31 us=119262 Validating certificate extended key usage |
---|
1069 | 2021-11-19 16:36:31 us=119273 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1070 | 2021-11-19 16:36:31 us=119283 VERIFY EKU OK |
---|
1071 | 2021-11-19 16:36:31 us=119292 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1072 | WRWRW2021-11-19 16:36:31 us=175268 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1073 | 2021-11-19 16:36:31 us=175305 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1074 | 2021-11-19 16:36:32 us=371752 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1075 | WRR2021-11-19 16:36:32 us=435262 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
1076 | 2021-11-19 16:36:32 us=435392 TCP/UDP: Closing socket |
---|
1077 | 2021-11-19 16:36:32 us=435454 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1078 | 2021-11-19 16:36:32 us=435471 Restart pause, 2 second(s) |
---|
1079 | 2021-11-19 16:36:34 us=435594 Re-using SSL/TLS context |
---|
1080 | 2021-11-19 16:36:34 us=435620 LZO compression initializing |
---|
1081 | 2021-11-19 16:36:34 us=435685 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1082 | 2021-11-19 16:36:34 us=435698 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1083 | 2021-11-19 16:36:34 us=435720 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1084 | 2021-11-19 16:36:34 us=435724 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1085 | 2021-11-19 16:36:34 us=435733 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1086 | 2021-11-19 16:36:34 us=435755 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1087 | 2021-11-19 16:36:34 us=435760 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1088 | 2021-11-19 16:36:34 us=447522 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1089 | 2021-11-19 16:36:34 us=447553 TCP_CLIENT link local: (not bound) |
---|
1090 | 2021-11-19 16:36:34 us=447559 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1091 | WR2021-11-19 16:36:34 us=457514 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=551522e8 32408b3d |
---|
1092 | W2021-11-19 16:36:34 us=457608 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1093 | 2021-11-19 16:36:34 us=457688 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1094 | WRWR2021-11-19 16:36:34 us=490811 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1095 | 2021-11-19 16:36:34 us=490949 VERIFY KU OK |
---|
1096 | 2021-11-19 16:36:34 us=490963 Validating certificate extended key usage |
---|
1097 | 2021-11-19 16:36:34 us=490970 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1098 | 2021-11-19 16:36:34 us=490976 VERIFY EKU OK |
---|
1099 | 2021-11-19 16:36:34 us=490985 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1100 | WRWRW2021-11-19 16:36:34 us=513757 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1101 | 2021-11-19 16:36:34 us=513790 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1102 | 2021-11-19 16:36:35 us=554027 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1103 | WR2021-11-19 16:36:40 us=623763 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1104 | WRR2021-11-19 16:36:40 us=716491 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:fe9764de-6705-4c89-a282-ab7595ab210e:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
1105 | 2021-11-19 16:36:40 us=716728 TCP/UDP: Closing socket |
---|
1106 | 2021-11-19 16:36:40 us=716840 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1107 | 2021-11-19 16:36:40 us=716869 Restart pause, 2 second(s) |
---|
1108 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
1109 | 2021-11-19 16:36:42 us=721967 Re-using SSL/TLS context |
---|
1110 | 2021-11-19 16:36:42 us=722002 LZO compression initializing |
---|
1111 | 2021-11-19 16:36:42 us=722088 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1112 | 2021-11-19 16:36:42 us=722104 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1113 | 2021-11-19 16:36:42 us=722130 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1114 | 2021-11-19 16:36:42 us=722136 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1115 | 2021-11-19 16:36:42 us=722147 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1116 | 2021-11-19 16:36:42 us=722171 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1117 | 2021-11-19 16:36:42 us=722177 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1118 | 2021-11-19 16:36:42 us=733861 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1119 | 2021-11-19 16:36:42 us=733900 TCP_CLIENT link local: (not bound) |
---|
1120 | 2021-11-19 16:36:42 us=733908 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1121 | WR2021-11-19 16:36:42 us=744222 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=cdb7d533 546e00b7 |
---|
1122 | W2021-11-19 16:36:42 us=744328 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1123 | 2021-11-19 16:36:42 us=744419 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1124 | WRWR2021-11-19 16:36:42 us=782831 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1125 | 2021-11-19 16:36:42 us=783037 VERIFY KU OK |
---|
1126 | 2021-11-19 16:36:42 us=783053 Validating certificate extended key usage |
---|
1127 | 2021-11-19 16:36:42 us=783066 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1128 | 2021-11-19 16:36:42 us=783076 VERIFY EKU OK |
---|
1129 | 2021-11-19 16:36:42 us=783085 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1130 | WRWRW2021-11-19 16:36:42 us=805481 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1131 | 2021-11-19 16:36:42 us=805534 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1132 | 2021-11-19 16:36:43 us=867785 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1133 | WRR2021-11-19 16:36:43 us=934238 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
1134 | 2021-11-19 16:36:43 us=934384 TCP/UDP: Closing socket |
---|
1135 | 2021-11-19 16:36:43 us=934430 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1136 | 2021-11-19 16:36:43 us=934447 Restart pause, 2 second(s) |
---|
1137 | 2021-11-19 16:36:45 us=934553 Re-using SSL/TLS context |
---|
1138 | 2021-11-19 16:36:45 us=934575 LZO compression initializing |
---|
1139 | 2021-11-19 16:36:45 us=934644 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1140 | 2021-11-19 16:36:45 us=934657 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1141 | 2021-11-19 16:36:45 us=934684 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1142 | 2021-11-19 16:36:45 us=934691 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1143 | 2021-11-19 16:36:45 us=934703 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1144 | 2021-11-19 16:36:45 us=934729 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1145 | 2021-11-19 16:36:45 us=934737 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1146 | 2021-11-19 16:36:45 us=946196 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1147 | 2021-11-19 16:36:45 us=946230 TCP_CLIENT link local: (not bound) |
---|
1148 | 2021-11-19 16:36:45 us=946236 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1149 | WR2021-11-19 16:36:45 us=956500 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=863401ac 9b0f55e1 |
---|
1150 | W2021-11-19 16:36:45 us=956639 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1151 | 2021-11-19 16:36:45 us=956749 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1152 | WRWR2021-11-19 16:36:45 us=988835 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1153 | 2021-11-19 16:36:45 us=988956 VERIFY KU OK |
---|
1154 | 2021-11-19 16:36:45 us=988966 Validating certificate extended key usage |
---|
1155 | 2021-11-19 16:36:45 us=988973 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1156 | 2021-11-19 16:36:45 us=988980 VERIFY EKU OK |
---|
1157 | 2021-11-19 16:36:45 us=988985 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1158 | WRWRW2021-11-19 16:36:46 us=8558 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1159 | 2021-11-19 16:36:46 us=8599 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1160 | 2021-11-19 16:36:47 us=35796 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1161 | WR2021-11-19 16:36:52 us=92908 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1162 | WRR2021-11-19 16:36:52 us=225345 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:b7466f68-0de4-4fd6-b50a-3b51f8011d5a:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
1163 | 2021-11-19 16:36:52 us=225557 TCP/UDP: Closing socket |
---|
1164 | 2021-11-19 16:36:52 us=225645 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1165 | 2021-11-19 16:36:52 us=225667 Restart pause, 2 second(s) |
---|
1166 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
1167 | 2021-11-19 16:36:54 us=231171 Re-using SSL/TLS context |
---|
1168 | 2021-11-19 16:36:54 us=231205 LZO compression initializing |
---|
1169 | 2021-11-19 16:36:54 us=231287 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1170 | 2021-11-19 16:36:54 us=231304 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1171 | 2021-11-19 16:36:54 us=231338 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1172 | 2021-11-19 16:36:54 us=231353 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1173 | 2021-11-19 16:36:54 us=231374 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1174 | 2021-11-19 16:36:54 us=231416 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1175 | 2021-11-19 16:36:54 us=231423 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1176 | 2021-11-19 16:36:54 us=243090 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1177 | 2021-11-19 16:36:54 us=243132 TCP_CLIENT link local: (not bound) |
---|
1178 | 2021-11-19 16:36:54 us=243146 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1179 | WR2021-11-19 16:36:54 us=253172 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=b73e4240 aaa07fa1 |
---|
1180 | W2021-11-19 16:36:54 us=253287 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1181 | 2021-11-19 16:36:54 us=253389 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1182 | WRWR2021-11-19 16:36:54 us=286683 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1183 | 2021-11-19 16:36:54 us=286869 VERIFY KU OK |
---|
1184 | 2021-11-19 16:36:54 us=286882 Validating certificate extended key usage |
---|
1185 | 2021-11-19 16:36:54 us=286892 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1186 | 2021-11-19 16:36:54 us=286901 VERIFY EKU OK |
---|
1187 | 2021-11-19 16:36:54 us=286910 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1188 | WRWRW2021-11-19 16:36:54 us=308202 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1189 | 2021-11-19 16:36:54 us=308252 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1190 | 2021-11-19 16:36:55 us=331861 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1191 | WRR2021-11-19 16:36:55 us=398906 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
1192 | 2021-11-19 16:36:55 us=399054 TCP/UDP: Closing socket |
---|
1193 | 2021-11-19 16:36:55 us=399111 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1194 | 2021-11-19 16:36:55 us=399128 Restart pause, 2 second(s) |
---|
1195 | 2021-11-19 16:36:57 us=399328 Re-using SSL/TLS context |
---|
1196 | 2021-11-19 16:36:57 us=399360 LZO compression initializing |
---|
1197 | 2021-11-19 16:36:57 us=399451 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1198 | 2021-11-19 16:36:57 us=399477 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1199 | 2021-11-19 16:36:57 us=399524 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1200 | 2021-11-19 16:36:57 us=399539 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1201 | 2021-11-19 16:36:57 us=399562 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1202 | 2021-11-19 16:36:57 us=399598 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1203 | 2021-11-19 16:36:57 us=399612 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1204 | 2021-11-19 16:36:57 us=411596 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1205 | 2021-11-19 16:36:57 us=411627 TCP_CLIENT link local: (not bound) |
---|
1206 | 2021-11-19 16:36:57 us=411635 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1207 | WrR2021-11-19 16:36:57 us=422426 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=4c38739e 9d6b0f66 |
---|
1208 | W2021-11-19 16:36:57 us=422532 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1209 | 2021-11-19 16:36:57 us=422631 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1210 | WRWR2021-11-19 16:36:57 us=454946 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1211 | 2021-11-19 16:36:57 us=455119 VERIFY KU OK |
---|
1212 | 2021-11-19 16:36:57 us=455130 Validating certificate extended key usage |
---|
1213 | 2021-11-19 16:36:57 us=455137 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1214 | 2021-11-19 16:36:57 us=455143 VERIFY EKU OK |
---|
1215 | 2021-11-19 16:36:57 us=455150 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1216 | WRWRW2021-11-19 16:36:57 us=476940 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1217 | 2021-11-19 16:36:57 us=476983 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1218 | 2021-11-19 16:36:58 us=531836 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1219 | WR2021-11-19 16:37:03 us=619803 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1220 | WRR2021-11-19 16:37:03 us=639934 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:b8c51ba6-991e-463a-9e39-41288c4f66c0:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
1221 | 2021-11-19 16:37:03 us=640078 TCP/UDP: Closing socket |
---|
1222 | 2021-11-19 16:37:03 us=640150 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1223 | 2021-11-19 16:37:03 us=640164 Restart pause, 2 second(s) |
---|
1224 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
1225 | 2021-11-19 16:37:05 us=644655 Re-using SSL/TLS context |
---|
1226 | 2021-11-19 16:37:05 us=644689 LZO compression initializing |
---|
1227 | 2021-11-19 16:37:05 us=644777 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1228 | 2021-11-19 16:37:05 us=644794 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1229 | 2021-11-19 16:37:05 us=644823 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1230 | 2021-11-19 16:37:05 us=644830 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1231 | 2021-11-19 16:37:05 us=644842 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1232 | 2021-11-19 16:37:05 us=644871 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1233 | 2021-11-19 16:37:05 us=644877 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1234 | 2021-11-19 16:37:05 us=655871 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1235 | 2021-11-19 16:37:05 us=655902 TCP_CLIENT link local: (not bound) |
---|
1236 | 2021-11-19 16:37:05 us=655911 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1237 | WR2021-11-19 16:37:05 us=665975 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=83f395d1 f5e4ceac |
---|
1238 | W2021-11-19 16:37:05 us=666089 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1239 | 2021-11-19 16:37:05 us=666213 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1240 | WRWR2021-11-19 16:37:05 us=698386 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1241 | 2021-11-19 16:37:05 us=698501 VERIFY KU OK |
---|
1242 | 2021-11-19 16:37:05 us=698509 Validating certificate extended key usage |
---|
1243 | 2021-11-19 16:37:05 us=698516 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1244 | 2021-11-19 16:37:05 us=698521 VERIFY EKU OK |
---|
1245 | 2021-11-19 16:37:05 us=698525 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1246 | WRWRW2021-11-19 16:37:05 us=719076 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1247 | 2021-11-19 16:37:05 us=719121 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1248 | 2021-11-19 16:37:06 us=867775 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1249 | WRR2021-11-19 16:37:06 us=944676 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
1250 | 2021-11-19 16:37:06 us=944892 TCP/UDP: Closing socket |
---|
1251 | 2021-11-19 16:37:06 us=944968 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1252 | 2021-11-19 16:37:06 us=944984 Restart pause, 2 second(s) |
---|
1253 | 2021-11-19 16:37:08 us=945108 Re-using SSL/TLS context |
---|
1254 | 2021-11-19 16:37:08 us=945133 LZO compression initializing |
---|
1255 | 2021-11-19 16:37:08 us=945196 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1256 | 2021-11-19 16:37:08 us=945208 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1257 | 2021-11-19 16:37:08 us=945232 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1258 | 2021-11-19 16:37:08 us=945238 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1259 | 2021-11-19 16:37:08 us=945248 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1260 | 2021-11-19 16:37:08 us=945270 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1261 | 2021-11-19 16:37:08 us=945276 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1262 | 2021-11-19 16:37:08 us=956539 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1263 | 2021-11-19 16:37:08 us=956583 TCP_CLIENT link local: (not bound) |
---|
1264 | 2021-11-19 16:37:08 us=956591 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1265 | WR2021-11-19 16:37:08 us=967131 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=46c4d5aa e2fc304f |
---|
1266 | W2021-11-19 16:37:08 us=967290 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1267 | 2021-11-19 16:37:08 us=967448 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1268 | WRWR2021-11-19 16:37:08 us=999178 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1269 | 2021-11-19 16:37:08 us=999281 VERIFY KU OK |
---|
1270 | 2021-11-19 16:37:08 us=999291 Validating certificate extended key usage |
---|
1271 | 2021-11-19 16:37:08 us=999298 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1272 | 2021-11-19 16:37:08 us=999304 VERIFY EKU OK |
---|
1273 | 2021-11-19 16:37:08 us=999309 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1274 | WRWRW2021-11-19 16:37:09 us=20193 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1275 | 2021-11-19 16:37:09 us=20242 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1276 | 2021-11-19 16:37:10 us=151745 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1277 | WR2021-11-19 16:37:15 us=313914 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1278 | WRR2021-11-19 16:37:15 us=334516 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:cb51b4a4-4ce4-451f-933c-eab1c4e7e16f:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
1279 | 2021-11-19 16:37:15 us=334652 TCP/UDP: Closing socket |
---|
1280 | 2021-11-19 16:37:15 us=334740 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1281 | 2021-11-19 16:37:15 us=334760 Restart pause, 2 second(s) |
---|
1282 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
1283 | 2021-11-19 16:37:17 us=340040 Re-using SSL/TLS context |
---|
1284 | 2021-11-19 16:37:17 us=340083 LZO compression initializing |
---|
1285 | 2021-11-19 16:37:17 us=340178 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1286 | 2021-11-19 16:37:17 us=340198 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1287 | 2021-11-19 16:37:17 us=340228 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1288 | 2021-11-19 16:37:17 us=340237 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1289 | 2021-11-19 16:37:17 us=340252 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1290 | 2021-11-19 16:37:17 us=340289 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1291 | 2021-11-19 16:37:17 us=340300 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1292 | 2021-11-19 16:37:17 us=351347 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1293 | 2021-11-19 16:37:17 us=351386 TCP_CLIENT link local: (not bound) |
---|
1294 | 2021-11-19 16:37:17 us=351400 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1295 | WR2021-11-19 16:37:17 us=361565 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=5e6deda4 5aa2d62c |
---|
1296 | W2021-11-19 16:37:17 us=361690 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1297 | 2021-11-19 16:37:17 us=361817 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1298 | WRWR2021-11-19 16:37:17 us=392549 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1299 | 2021-11-19 16:37:17 us=392707 VERIFY KU OK |
---|
1300 | 2021-11-19 16:37:17 us=392723 Validating certificate extended key usage |
---|
1301 | 2021-11-19 16:37:17 us=392730 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1302 | 2021-11-19 16:37:17 us=392737 VERIFY EKU OK |
---|
1303 | 2021-11-19 16:37:17 us=392743 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1304 | WRWRW2021-11-19 16:37:17 us=413936 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1305 | 2021-11-19 16:37:17 us=413989 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1306 | 2021-11-19 16:37:18 us=671944 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1307 | WRR2021-11-19 16:37:18 us=738245 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
1308 | 2021-11-19 16:37:18 us=738427 TCP/UDP: Closing socket |
---|
1309 | 2021-11-19 16:37:18 us=738528 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1310 | 2021-11-19 16:37:18 us=738554 Restart pause, 2 second(s) |
---|
1311 | 2021-11-19 16:37:20 us=738670 Re-using SSL/TLS context |
---|
1312 | 2021-11-19 16:37:20 us=738700 LZO compression initializing |
---|
1313 | 2021-11-19 16:37:20 us=738783 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1314 | 2021-11-19 16:37:20 us=738805 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1315 | 2021-11-19 16:37:20 us=738850 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1316 | 2021-11-19 16:37:20 us=738864 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1317 | 2021-11-19 16:37:20 us=738886 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1318 | 2021-11-19 16:37:20 us=738925 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1319 | 2021-11-19 16:37:20 us=738941 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1320 | 2021-11-19 16:37:20 us=750285 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1321 | 2021-11-19 16:37:20 us=750363 TCP_CLIENT link local: (not bound) |
---|
1322 | 2021-11-19 16:37:20 us=750377 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1323 | WR2021-11-19 16:37:20 us=761152 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=589e4b56 300754c9 |
---|
1324 | W2021-11-19 16:37:20 us=761299 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1325 | 2021-11-19 16:37:20 us=761418 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1326 | WRWR2021-11-19 16:37:20 us=794959 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1327 | 2021-11-19 16:37:20 us=795091 VERIFY KU OK |
---|
1328 | 2021-11-19 16:37:20 us=795103 Validating certificate extended key usage |
---|
1329 | 2021-11-19 16:37:20 us=795111 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1330 | 2021-11-19 16:37:20 us=795118 VERIFY EKU OK |
---|
1331 | 2021-11-19 16:37:20 us=795124 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1332 | WRWRW2021-11-19 16:37:20 us=815956 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1333 | 2021-11-19 16:37:20 us=816018 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1334 | 2021-11-19 16:37:21 us=995812 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1335 | WR2021-11-19 16:37:27 us=203766 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1336 | WRR2021-11-19 16:37:27 us=226762 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:5b034554-2b6c-4df8-b176-b4dffdf43745:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
1337 | 2021-11-19 16:37:27 us=227013 TCP/UDP: Closing socket |
---|
1338 | 2021-11-19 16:37:27 us=227121 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1339 | 2021-11-19 16:37:27 us=227147 Restart pause, 2 second(s) |
---|
1340 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
1341 | 2021-11-19 16:37:29 us=234317 Re-using SSL/TLS context |
---|
1342 | 2021-11-19 16:37:29 us=234351 LZO compression initializing |
---|
1343 | 2021-11-19 16:37:29 us=234439 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1344 | 2021-11-19 16:37:29 us=234454 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1345 | 2021-11-19 16:37:29 us=234485 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1346 | 2021-11-19 16:37:29 us=234494 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1347 | 2021-11-19 16:37:29 us=234507 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1348 | 2021-11-19 16:37:29 us=234537 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1349 | 2021-11-19 16:37:29 us=234544 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1350 | 2021-11-19 16:37:29 us=245683 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1351 | 2021-11-19 16:37:29 us=245732 TCP_CLIENT link local: (not bound) |
---|
1352 | 2021-11-19 16:37:29 us=245741 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1353 | WR2021-11-19 16:37:29 us=257667 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=9cef160a b8a53c93 |
---|
1354 | W2021-11-19 16:37:29 us=257779 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1355 | 2021-11-19 16:37:29 us=257927 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1356 | WRWR2021-11-19 16:37:29 us=291651 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1357 | 2021-11-19 16:37:29 us=291786 VERIFY KU OK |
---|
1358 | 2021-11-19 16:37:29 us=291816 Validating certificate extended key usage |
---|
1359 | 2021-11-19 16:37:29 us=291822 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1360 | 2021-11-19 16:37:29 us=291828 VERIFY EKU OK |
---|
1361 | 2021-11-19 16:37:29 us=291833 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1362 | WRWRW2021-11-19 16:37:29 us=317544 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1363 | 2021-11-19 16:37:29 us=317602 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1364 | 2021-11-19 16:37:30 us=343941 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1365 | WRR2021-11-19 16:37:30 us=526592 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
1366 | 2021-11-19 16:37:30 us=526762 TCP/UDP: Closing socket |
---|
1367 | 2021-11-19 16:37:30 us=526828 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1368 | 2021-11-19 16:37:30 us=526842 Restart pause, 2 second(s) |
---|
1369 | 2021-11-19 16:37:32 us=527004 Re-using SSL/TLS context |
---|
1370 | 2021-11-19 16:37:32 us=527028 LZO compression initializing |
---|
1371 | 2021-11-19 16:37:32 us=527087 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1372 | 2021-11-19 16:37:32 us=527097 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1373 | 2021-11-19 16:37:32 us=527119 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1374 | 2021-11-19 16:37:32 us=527127 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1375 | 2021-11-19 16:37:32 us=527138 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1376 | 2021-11-19 16:37:32 us=527180 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1377 | 2021-11-19 16:37:32 us=527196 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1378 | 2021-11-19 16:37:32 us=538316 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1379 | 2021-11-19 16:37:32 us=538355 TCP_CLIENT link local: (not bound) |
---|
1380 | 2021-11-19 16:37:32 us=538363 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1381 | WR2021-11-19 16:37:32 us=549358 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=ffe54c5a 1e749fb5 |
---|
1382 | W2021-11-19 16:37:32 us=549549 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1383 | 2021-11-19 16:37:32 us=549733 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1384 | WRWR2021-11-19 16:37:32 us=582320 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1385 | 2021-11-19 16:37:32 us=582459 VERIFY KU OK |
---|
1386 | 2021-11-19 16:37:32 us=582471 Validating certificate extended key usage |
---|
1387 | 2021-11-19 16:37:32 us=582478 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1388 | 2021-11-19 16:37:32 us=582484 VERIFY EKU OK |
---|
1389 | 2021-11-19 16:37:32 us=582490 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1390 | WRWRW2021-11-19 16:37:32 us=603096 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1391 | 2021-11-19 16:37:32 us=603155 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1392 | 2021-11-19 16:37:33 us=735949 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1393 | WR2021-11-19 16:37:38 us=904124 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1394 | WRR2021-11-19 16:37:38 us=925081 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:f2713f1a-c319-49b1-8712-48d7443fa246:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
1395 | 2021-11-19 16:37:38 us=925229 TCP/UDP: Closing socket |
---|
1396 | 2021-11-19 16:37:38 us=925311 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1397 | 2021-11-19 16:37:38 us=925332 Restart pause, 2 second(s) |
---|
1398 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
1399 | 2021-11-19 16:37:40 us=930550 Re-using SSL/TLS context |
---|
1400 | 2021-11-19 16:37:40 us=930607 LZO compression initializing |
---|
1401 | 2021-11-19 16:37:40 us=930969 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1402 | 2021-11-19 16:37:40 us=931061 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1403 | 2021-11-19 16:37:40 us=931132 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1404 | 2021-11-19 16:37:40 us=931144 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1405 | 2021-11-19 16:37:40 us=931170 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1406 | 2021-11-19 16:37:40 us=931213 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1407 | 2021-11-19 16:37:40 us=931226 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1408 | 2021-11-19 16:37:41 us=52822 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1409 | 2021-11-19 16:37:41 us=52859 TCP_CLIENT link local: (not bound) |
---|
1410 | 2021-11-19 16:37:41 us=52869 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1411 | WR2021-11-19 16:37:41 us=63538 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=5715f68f ceddba57 |
---|
1412 | W2021-11-19 16:37:41 us=63703 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1413 | 2021-11-19 16:37:41 us=63830 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1414 | WRWR2021-11-19 16:37:41 us=220250 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1415 | 2021-11-19 16:37:41 us=220345 VERIFY KU OK |
---|
1416 | 2021-11-19 16:37:41 us=220352 Validating certificate extended key usage |
---|
1417 | 2021-11-19 16:37:41 us=220357 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1418 | 2021-11-19 16:37:41 us=220366 VERIFY EKU OK |
---|
1419 | 2021-11-19 16:37:41 us=220373 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1420 | WRWRW2021-11-19 16:37:41 us=358502 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1421 | 2021-11-19 16:37:41 us=358590 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1422 | 2021-11-19 16:37:42 us=595754 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1423 | WRR2021-11-19 16:37:42 us=867527 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
1424 | 2021-11-19 16:37:42 us=867712 TCP/UDP: Closing socket |
---|
1425 | 2021-11-19 16:37:42 us=867795 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1426 | 2021-11-19 16:37:42 us=867816 Restart pause, 2 second(s) |
---|
1427 | 2021-11-19 16:37:44 us=867978 Re-using SSL/TLS context |
---|
1428 | 2021-11-19 16:37:44 us=868009 LZO compression initializing |
---|
1429 | 2021-11-19 16:37:44 us=868077 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1430 | 2021-11-19 16:37:44 us=868092 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1431 | 2021-11-19 16:37:44 us=868118 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1432 | 2021-11-19 16:37:44 us=868125 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1433 | 2021-11-19 16:37:44 us=868139 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1434 | 2021-11-19 16:37:44 us=868173 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1435 | 2021-11-19 16:37:44 us=868184 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1436 | 2021-11-19 16:37:44 us=879408 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1437 | 2021-11-19 16:37:44 us=879450 TCP_CLIENT link local: (not bound) |
---|
1438 | 2021-11-19 16:37:44 us=879461 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1439 | WrR2021-11-19 16:37:44 us=889322 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=3ce90b1a 80b4421b |
---|
1440 | W2021-11-19 16:37:44 us=889475 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1441 | 2021-11-19 16:37:44 us=889620 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1442 | WRWR2021-11-19 16:37:44 us=922382 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1443 | 2021-11-19 16:37:44 us=922481 VERIFY KU OK |
---|
1444 | 2021-11-19 16:37:44 us=922490 Validating certificate extended key usage |
---|
1445 | 2021-11-19 16:37:44 us=922495 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1446 | 2021-11-19 16:37:44 us=922499 VERIFY EKU OK |
---|
1447 | 2021-11-19 16:37:44 us=922503 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1448 | WRWRW2021-11-19 16:37:44 us=943463 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1449 | 2021-11-19 16:37:44 us=943529 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1450 | 2021-11-19 16:37:46 us=183785 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1451 | WR2021-11-19 16:37:51 us=462997 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1452 | WRR2021-11-19 16:37:51 us=507924 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:40402dc0-b9d2-476d-833d-c1f4e9859a81:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
1453 | 2021-11-19 16:37:51 us=508028 TCP/UDP: Closing socket |
---|
1454 | 2021-11-19 16:37:51 us=508079 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1455 | 2021-11-19 16:37:51 us=508094 Restart pause, 2 second(s) |
---|
1456 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code |
---|
1457 | 2021-11-19 16:37:53 us=512812 Re-using SSL/TLS context |
---|
1458 | 2021-11-19 16:37:53 us=512865 LZO compression initializing |
---|
1459 | 2021-11-19 16:37:53 us=512980 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1460 | 2021-11-19 16:37:53 us=513007 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1461 | 2021-11-19 16:37:53 us=513049 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1462 | 2021-11-19 16:37:53 us=513061 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1463 | 2021-11-19 16:37:53 us=513079 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1464 | 2021-11-19 16:37:53 us=513115 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1465 | 2021-11-19 16:37:53 us=513125 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1466 | 2021-11-19 16:37:53 us=524076 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1467 | 2021-11-19 16:37:53 us=524130 TCP_CLIENT link local: (not bound) |
---|
1468 | 2021-11-19 16:37:53 us=524167 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1469 | WR2021-11-19 16:37:53 us=535770 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=2d87ce79 029ce19a |
---|
1470 | W2021-11-19 16:37:53 us=535950 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1471 | 2021-11-19 16:37:53 us=536158 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1472 | WRWR2021-11-19 16:37:53 us=567141 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1473 | 2021-11-19 16:37:53 us=567282 VERIFY KU OK |
---|
1474 | 2021-11-19 16:37:53 us=567295 Validating certificate extended key usage |
---|
1475 | 2021-11-19 16:37:53 us=567303 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1476 | 2021-11-19 16:37:53 us=567310 VERIFY EKU OK |
---|
1477 | 2021-11-19 16:37:53 us=567316 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1478 | WRWRW2021-11-19 16:37:53 us=588228 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1479 | 2021-11-19 16:37:53 us=588283 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1480 | 2021-11-19 16:37:54 us=855778 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1481 | WRR2021-11-19 16:37:54 us=921929 AUTH: Received control message: AUTH_FAILED,Wrong TOTP code |
---|
1482 | 2021-11-19 16:37:54 us=922072 TCP/UDP: Closing socket |
---|
1483 | 2021-11-19 16:37:54 us=922141 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1484 | 2021-11-19 16:37:54 us=922164 Restart pause, 2 second(s) |
---|
1485 | 2021-11-19 16:37:56 us=922309 Re-using SSL/TLS context |
---|
1486 | 2021-11-19 16:37:56 us=922357 LZO compression initializing |
---|
1487 | 2021-11-19 16:37:56 us=922458 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1488 | 2021-11-19 16:37:56 us=922489 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1489 | 2021-11-19 16:37:56 us=922551 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1490 | 2021-11-19 16:37:56 us=922567 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1491 | 2021-11-19 16:37:56 us=922589 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1492 | 2021-11-19 16:37:56 us=922636 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1493 | 2021-11-19 16:37:56 us=922802 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1494 | 2021-11-19 16:37:56 us=933900 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1495 | 2021-11-19 16:37:56 us=933934 TCP_CLIENT link local: (not bound) |
---|
1496 | 2021-11-19 16:37:56 us=933941 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1497 | WR2021-11-19 16:37:56 us=944773 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=267747d2 c746a282 |
---|
1498 | W2021-11-19 16:37:56 us=944939 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1499 | 2021-11-19 16:37:56 us=945028 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1500 | WRWR2021-11-19 16:37:56 us=977962 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1501 | 2021-11-19 16:37:56 us=978069 VERIFY KU OK |
---|
1502 | 2021-11-19 16:37:56 us=978078 Validating certificate extended key usage |
---|
1503 | 2021-11-19 16:37:56 us=978084 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1504 | 2021-11-19 16:37:56 us=978089 VERIFY EKU OK |
---|
1505 | 2021-11-19 16:37:56 us=978094 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1506 | WRWRW2021-11-19 16:37:56 us=998853 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1507 | 2021-11-19 16:37:56 us=998901 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1508 | 2021-11-19 16:37:58 us=171795 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1509 | WR2021-11-19 16:38:03 us=375947 SENT CONTROL [XXXXXX-vpn-pa3-01]: 'PUSH_REQUEST' (status=1) |
---|
1510 | WRR2021-11-19 16:38:03 us=397169 AUTH: Received control message: AUTH_FAILED,CRV1:R,E:4b4124b0-e5ca-4c56-a9ea-5b6a49a489c2:bnBpY2hvbg==:Welcome <username>, Please enter OTP code |
---|
1511 | 2021-11-19 16:38:03 us=397366 TCP/UDP: Closing socket |
---|
1512 | 2021-11-19 16:38:03 us=397462 SIGUSR1[soft,auth-failure] received, process restarting |
---|
1513 | 2021-11-19 16:38:03 us=397494 Restart pause, 2 second(s) |
---|
1514 | 🔐 CHALLENGE: Welcome <username>, Please enter OTP code 480848 |
---|
1515 | 2021-11-19 16:38:35 us=129895 Re-using SSL/TLS context |
---|
1516 | 2021-11-19 16:38:35 us=129949 LZO compression initializing |
---|
1517 | 2021-11-19 16:38:35 us=130143 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ] |
---|
1518 | 2021-11-19 16:38:35 us=130190 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ] |
---|
1519 | 2021-11-19 16:38:35 us=130243 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client' |
---|
1520 | 2021-11-19 16:38:35 us=130257 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server' |
---|
1521 | 2021-11-19 16:38:35 us=130276 TCP/UDP: Preserving recently used remote address: [AF_INET]1.2.3.4:443 |
---|
1522 | 2021-11-19 16:38:35 us=130318 Socket Buffers: R=[131072->131072] S=[16384->16384] |
---|
1523 | 2021-11-19 16:38:35 us=130330 Attempting to establish TCP connection with [AF_INET]1.2.3.4:443 [nonblock] |
---|
1524 | 2021-11-19 16:38:35 us=141785 TCP connection established with [AF_INET]1.2.3.4:443 |
---|
1525 | 2021-11-19 16:38:35 us=141818 TCP_CLIENT link local: (not bound) |
---|
1526 | 2021-11-19 16:38:35 us=141826 TCP_CLIENT link remote: [AF_INET]1.2.3.4:443 |
---|
1527 | WrR2021-11-19 16:38:35 us=152854 TLS: Initial packet from [AF_INET]1.2.3.4:443, sid=9e1a0550 103cdbf0 |
---|
1528 | W2021-11-19 16:38:35 us=153043 net_route_v4_best_gw query: dst 0.0.0.0 |
---|
1529 | 2021-11-19 16:38:35 us=153166 net_route_v4_best_gw result: via 10.0.0.2 dev wlp3s0 |
---|
1530 | WRWR2021-11-19 16:38:35 us=185797 VERIFY OK: depth=1, CN=XXXXXX VPN |
---|
1531 | 2021-11-19 16:38:35 us=185978 VERIFY KU OK |
---|
1532 | 2021-11-19 16:38:35 us=186001 Validating certificate extended key usage |
---|
1533 | 2021-11-19 16:38:35 us=186016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication |
---|
1534 | 2021-11-19 16:38:35 us=186023 VERIFY EKU OK |
---|
1535 | 2021-11-19 16:38:35 us=186029 VERIFY OK: depth=0, CN=XXXXXX-vpn-pa3-01 |
---|
1536 | WRWRW2021-11-19 16:38:35 us=213118 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 |
---|
1537 | 2021-11-19 16:38:35 us=213153 [XXXXXX-vpn-pa3-01] Peer Connection Initiated with [AF_INET]1.2.3.4:443 |
---|
1538 | R2021-11-19 16:38:35 us=223230 PUSH: Received control message: 'PUSH_REPLY,route XXXXXXXXXXXXXXXXXXXXXXXXXXX,dhcp-option DNS XXXXXX,dhcp-option DNS XXXXX,route-gateway XXXXXXXXXx,ping 10,ping-restart 60,ifconfig XXXXXXXXXXXX 255.255.255.0,peer-id 0,cipher AES-256-CBC' |
---|
1539 | 2021-11-19 16:38:35 us=223476 OPTIONS IMPORT: timers and/or timeouts modified |
---|
1540 | 2021-11-19 16:38:35 us=223486 OPTIONS IMPORT: --ifconfig/up options modified |
---|
1541 | 2021-11-19 16:38:35 us=223518 OPTIONS IMPORT: route options modified |
---|
1542 | 2021-11-19 16:38:35 us=223524 OPTIONS IMPORT: route-related options modified |
---|
1543 | 2021-11-19 16:38:35 us=223530 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified |
---|
1544 | 2021-11-19 16:38:35 us=223535 OPTIONS IMPORT: peer-id set |
---|
1545 | 2021-11-19 16:38:35 us=223541 OPTIONS IMPORT: adjusting link_mtu to 1659 |
---|
1546 | 2021-11-19 16:38:35 us=223548 OPTIONS IMPORT: data channel crypto options modified |
---|
1547 | 2021-11-19 16:38:35 us=223623 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key |
---|
1548 | 2021-11-19 16:38:35 us=223633 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication |
---|
1549 | 2021-11-19 16:38:35 us=223640 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key |
---|
1550 | 2021-11-19 16:38:35 us=223662 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication |
---|
1551 | 2021-11-19 16:38:35 us=223683 Preserving previous TUN/TAP instance: tap1 |
---|
1552 | 2021-11-19 16:38:35 us=223872 Initialization Sequence Completed |
---|
1553 | WRwrWRwrWRwrWrWrW |
---|