Ticket #731: Logs.txt

File Logs.txt, 63.9 KB (added by JYFygyjygkghkkhhkThe, 7 years ago)

Here are my logs

Line 
116-11-22 17:21:13 Session is ACTIVE
22016-11-22 17:21:13 EVENT: GET_CONFIG
32016-11-22 17:21:13 Sending PUSH_REQUEST to server...
42016-11-22 17:21:14 OPTIONS:
50 [redirect-gateway] [def1] [bypass-dhcp]
61 [dhcp-option] [DNS] [10.30.0.1]
72 [comp-lzo] [no]
83 [route-gateway] [10.30.0.1]
94 [topology] [subnet]
105 [ping] [10]
116 [ping-restart] [60]
127 [ifconfig] [10.30.0.41] [255.255.0.0]
13
142016-11-22 17:21:14 PROTOCOL OPTIONS:
15  cipher: AES-256-CBC
16  digest: SHA1
17  compress: LZO_STUB
18  peer ID: -1
192016-11-22 17:21:14 EVENT: ASSIGN_IP
202016-11-22 17:21:14 TunPersist: saving tun context:
21Session Name: 23.88.114.44
22Layer: OSI_LAYER_3
23Remote Address: 23.88.114.44
24Tunnel Addresses:
25  10.30.0.41/16 -> 10.30.0.1
26Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
27Block IPv6: no
28Add Routes:
29Exclude Routes:
30DNS Servers:
31  10.30.0.1
32Search Domains:
33
342016-11-22 17:21:14 Connected via tun
352016-11-22 17:21:14 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
362016-11-22 17:21:14 LZO-ASYM init swap=0 asym=1
372016-11-22 17:21:14 Comp-stub init swap=0
382016-11-22 17:21:14 SetStatus Connected
392016-11-22 17:24:13 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
402016-11-22 17:24:16 RECONNECT TEST: ReachableViaWiFi
412016-11-22 17:24:16 EVENT: PAUSE
422016-11-22 17:24:17 RESUME TEST: ReachableViaWiFi
432016-11-22 17:24:17 EVENT: RESUME
442016-11-22 17:24:17 EVENT: RECONNECTING
452016-11-22 17:24:17 Contacting 23.88.114.44:2018 via UDP
462016-11-22 17:24:17 EVENT: WAIT
472016-11-22 17:24:17 SetTunnelSocket returned 1
482016-11-22 17:24:17 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
492016-11-22 17:24:17 EVENT: CONNECTING
502016-11-22 17:24:17 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
512016-11-22 17:24:17 Peer Info:
52IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
53IV_VER=3.0.11
54IV_PLAT=ios
55IV_NCP=2
56IV_TCPNL=1
57IV_PROTO=2
58IV_LZO_STUB=1
59IV_COMP_STUB=1
60IV_COMP_STUBv2=1
61
622016-11-22 17:24:17 VERIFY OK: depth=1
63cert. version    : 3
64serial number    : 8C:D8:43:EF:E4:5F:20:03
65issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
66subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
67issued  on        : 2014-04-11 10:15:45
68expires on        : 2024-04-08 10:15:45
69signed using      : RSA with SHA1
70RSA key size      : 4096 bits
71basic constraints : CA=true
72
732016-11-22 17:24:17 VERIFY OK: depth=0
74cert. version    : 3
75serial number    : 01:0F
76issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
77subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
78issued  on        : 2016-03-10 08:48:14
79expires on        : 2026-03-08 08:48:14
80signed using      : RSA with SHA1
81RSA key size      : 4096 bits
82basic constraints : CA=false
83cert. type        : SSL Server
84key usage        : Digital Signature, Key Encipherment
85ext key usage    : TLS Web Server Authentication
86
872016-11-22 17:24:17 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
882016-11-22 17:24:18 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
892016-11-22 17:24:18 Session is ACTIVE
902016-11-22 17:24:18 EVENT: GET_CONFIG
912016-11-22 17:24:18 Sending PUSH_REQUEST to server...
922016-11-22 17:24:19 OPTIONS:
930 [redirect-gateway] [def1] [bypass-dhcp]
941 [dhcp-option] [DNS] [10.30.0.1]
952 [comp-lzo] [no]
963 [route-gateway] [10.30.0.1]
974 [topology] [subnet]
985 [ping] [10]
996 [ping-restart] [60]
1007 [ifconfig] [10.30.0.41] [255.255.0.0]
101
1022016-11-22 17:24:19 PROTOCOL OPTIONS:
103  cipher: AES-256-CBC
104  digest: SHA1
105  compress: LZO_STUB
106  peer ID: -1
1072016-11-22 17:24:19 EVENT: ASSIGN_IP
1082016-11-22 17:24:19 TunPersist: saving tun context:
109Session Name: 23.88.114.44
110Layer: OSI_LAYER_3
111Remote Address: 23.88.114.44
112Tunnel Addresses:
113  10.30.0.41/16 -> 10.30.0.1
114Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
115Block IPv6: no
116Add Routes:
117Exclude Routes:
118DNS Servers:
119  10.30.0.1
120Search Domains:
121
1222016-11-22 17:24:19 Connected via tun
1232016-11-22 17:24:19 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
1242016-11-22 17:24:19 LZO-ASYM init swap=0 asym=1
1252016-11-22 17:24:19 Comp-stub init swap=0
1262016-11-22 17:24:19 SetStatus Connected
1272016-11-22 17:24:20 RECONNECT TEST: ReachableViaWiFi
1282016-11-22 17:24:20 EVENT: PAUSE
1292016-11-22 17:24:21 RESUME TEST: ReachableViaWiFi
1302016-11-22 17:24:21 EVENT: RESUME
1312016-11-22 17:24:21 EVENT: RECONNECTING
1322016-11-22 17:24:21 Contacting 23.88.114.44:2018 via UDP
1332016-11-22 17:24:21 EVENT: WAIT
1342016-11-22 17:24:21 SetTunnelSocket returned 1
1352016-11-22 17:24:21 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
1362016-11-22 17:24:21 EVENT: CONNECTING
1372016-11-22 17:24:21 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
1382016-11-22 17:24:21 Peer Info:
139IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
140IV_VER=3.0.11
141IV_PLAT=ios
142IV_NCP=2
143IV_TCPNL=1
144IV_PROTO=2
145IV_LZO_STUB=1
146IV_COMP_STUB=1
147IV_COMP_STUBv2=1
148
1492016-11-22 17:24:21 VERIFY OK: depth=1
150cert. version    : 3
151serial number    : 8C:D8:43:EF:E4:5F:20:03
152issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
153subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
154issued  on        : 2014-04-11 10:15:45
155expires on        : 2024-04-08 10:15:45
156signed using      : RSA with SHA1
157RSA key size      : 4096 bits
158basic constraints : CA=true
159
1602016-11-22 17:24:21 VERIFY OK: depth=0
161cert. version    : 3
162serial number    : 01:0F
163issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
164subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
165issued  on        : 2016-03-10 08:48:14
166expires on        : 2026-03-08 08:48:14
167signed using      : RSA with SHA1
168RSA key size      : 4096 bits
169basic constraints : CA=false
170cert. type        : SSL Server
171key usage        : Digital Signature, Key Encipherment
172ext key usage    : TLS Web Server Authentication
173
1742016-11-22 17:24:23 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
1752016-11-22 17:24:23 Session is ACTIVE
1762016-11-22 17:24:23 EVENT: GET_CONFIG
1772016-11-22 17:24:23 Sending PUSH_REQUEST to server...
1782016-11-22 17:24:24 OPTIONS:
1790 [redirect-gateway] [def1] [bypass-dhcp]
1801 [dhcp-option] [DNS] [10.30.0.1]
1812 [comp-lzo] [no]
1823 [route-gateway] [10.30.0.1]
1834 [topology] [subnet]
1845 [ping] [10]
1856 [ping-restart] [60]
1867 [ifconfig] [10.30.0.41] [255.255.0.0]
187
1882016-11-22 17:24:24 PROTOCOL OPTIONS:
189  cipher: AES-256-CBC
190  digest: SHA1
191  compress: LZO_STUB
192  peer ID: -1
1932016-11-22 17:24:24 TunPersist: reused tun context
1942016-11-22 17:24:24 Connected via tun
1952016-11-22 17:24:24 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
1962016-11-22 17:24:24 LZO-ASYM init swap=0 asym=1
1972016-11-22 17:24:24 Comp-stub init swap=0
1982016-11-22 17:24:24 SetStatus Connected
1992016-11-22 17:24:24 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
2002016-11-22 17:24:28 RECONNECT TEST: ReachableViaWiFi
2012016-11-22 17:24:28 EVENT: PAUSE
2022016-11-22 17:24:29 RESUME TEST: ReachableViaWiFi
2032016-11-22 17:24:29 EVENT: RESUME
2042016-11-22 17:24:29 EVENT: RECONNECTING
2052016-11-22 17:24:29 Contacting 23.88.114.44:2018 via UDP
2062016-11-22 17:24:29 EVENT: WAIT
2072016-11-22 17:24:29 SetTunnelSocket returned 1
2082016-11-22 17:24:29 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
2092016-11-22 17:24:29 EVENT: CONNECTING
2102016-11-22 17:24:29 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2112016-11-22 17:24:29 Peer Info:
212IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
213IV_VER=3.0.11
214IV_PLAT=ios
215IV_NCP=2
216IV_TCPNL=1
217IV_PROTO=2
218IV_LZO_STUB=1
219IV_COMP_STUB=1
220IV_COMP_STUBv2=1
221
2222016-11-22 17:24:29 VERIFY OK: depth=1
223cert. version    : 3
224serial number    : 8C:D8:43:EF:E4:5F:20:03
225issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
226subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
227issued  on        : 2014-04-11 10:15:45
228expires on        : 2024-04-08 10:15:45
229signed using      : RSA with SHA1
230RSA key size      : 4096 bits
231basic constraints : CA=true
232
2332016-11-22 17:24:29 VERIFY OK: depth=0
234cert. version    : 3
235serial number    : 01:0F
236issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
237subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
238issued  on        : 2016-03-10 08:48:14
239expires on        : 2026-03-08 08:48:14
240signed using      : RSA with SHA1
241RSA key size      : 4096 bits
242basic constraints : CA=false
243cert. type        : SSL Server
244key usage        : Digital Signature, Key Encipherment
245ext key usage    : TLS Web Server Authentication
246
2472016-11-22 17:24:30 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
2482016-11-22 17:24:30 Session is ACTIVE
2492016-11-22 17:24:30 EVENT: GET_CONFIG
2502016-11-22 17:24:30 Sending PUSH_REQUEST to server...
2512016-11-22 17:24:31 OPTIONS:
2520 [redirect-gateway] [def1] [bypass-dhcp]
2531 [dhcp-option] [DNS] [10.30.0.1]
2542 [comp-lzo] [no]
2553 [route-gateway] [10.30.0.1]
2564 [topology] [subnet]
2575 [ping] [10]
2586 [ping-restart] [60]
2597 [ifconfig] [10.30.0.41] [255.255.0.0]
260
2612016-11-22 17:24:31 PROTOCOL OPTIONS:
262  cipher: AES-256-CBC
263  digest: SHA1
264  compress: LZO_STUB
265  peer ID: -1
2662016-11-22 17:24:31 EVENT: ASSIGN_IP
2672016-11-22 17:24:31 TunPersist: saving tun context:
268Session Name: 23.88.114.44
269Layer: OSI_LAYER_3
270Remote Address: 23.88.114.44
271Tunnel Addresses:
272  10.30.0.41/16 -> 10.30.0.1
273Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
274Block IPv6: no
275Add Routes:
276Exclude Routes:
277DNS Servers:
278  10.30.0.1
279Search Domains:
280
2812016-11-22 17:24:31 Connected via tun
2822016-11-22 17:24:31 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
2832016-11-22 17:24:31 LZO-ASYM init swap=0 asym=1
2842016-11-22 17:24:31 Comp-stub init swap=0
2852016-11-22 17:24:31 SetStatus Connected
2862016-11-22 17:29:20 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
2872016-11-22 17:29:21 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
2882016-11-22 17:29:24 RECONNECT TEST: ReachableViaWiFi
2892016-11-22 17:29:24 EVENT: PAUSE
2902016-11-22 17:29:25 RESUME TEST: ReachableViaWiFi
2912016-11-22 17:29:25 EVENT: RESUME
2922016-11-22 17:29:25 EVENT: RECONNECTING
2932016-11-22 17:29:25 Contacting 23.88.114.44:2018 via UDP
2942016-11-22 17:29:25 EVENT: WAIT
2952016-11-22 17:29:25 SetTunnelSocket returned 1
2962016-11-22 17:29:25 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
2972016-11-22 17:29:25 EVENT: CONNECTING
2982016-11-22 17:29:25 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2992016-11-22 17:29:25 Peer Info:
300IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
301IV_VER=3.0.11
302IV_PLAT=ios
303IV_NCP=2
304IV_TCPNL=1
305IV_PROTO=2
306IV_LZO_STUB=1
307IV_COMP_STUB=1
308IV_COMP_STUBv2=1
309
3102016-11-22 17:29:25 VERIFY OK: depth=1
311cert. version    : 3
312serial number    : 8C:D8:43:EF:E4:5F:20:03
313issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
314subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
315issued  on        : 2014-04-11 10:15:45
316expires on        : 2024-04-08 10:15:45
317signed using      : RSA with SHA1
318RSA key size      : 4096 bits
319basic constraints : CA=true
320
3212016-11-22 17:29:25 VERIFY OK: depth=0
322cert. version    : 3
323serial number    : 01:0F
324issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
325subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
326issued  on        : 2016-03-10 08:48:14
327expires on        : 2026-03-08 08:48:14
328signed using      : RSA with SHA1
329RSA key size      : 4096 bits
330basic constraints : CA=false
331cert. type        : SSL Server
332key usage        : Digital Signature, Key Encipherment
333ext key usage    : TLS Web Server Authentication
334
3352016-11-22 17:29:26 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
3362016-11-22 17:29:26 Session is ACTIVE
3372016-11-22 17:29:26 EVENT: GET_CONFIG
3382016-11-22 17:29:26 Sending PUSH_REQUEST to server...
3392016-11-22 17:29:27 OPTIONS:
3400 [redirect-gateway] [def1] [bypass-dhcp]
3411 [dhcp-option] [DNS] [10.30.0.1]
3422 [comp-lzo] [no]
3433 [route-gateway] [10.30.0.1]
3444 [topology] [subnet]
3455 [ping] [10]
3466 [ping-restart] [60]
3477 [ifconfig] [10.30.0.41] [255.255.0.0]
348
3492016-11-22 17:29:27 PROTOCOL OPTIONS:
350  cipher: AES-256-CBC
351  digest: SHA1
352  compress: LZO_STUB
353  peer ID: -1
3542016-11-22 17:29:27 EVENT: ASSIGN_IP
3552016-11-22 17:29:27 TunPersist: saving tun context:
356Session Name: 23.88.114.44
357Layer: OSI_LAYER_3
358Remote Address: 23.88.114.44
359Tunnel Addresses:
360  10.30.0.41/16 -> 10.30.0.1
361Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
362Block IPv6: no
363Add Routes:
364Exclude Routes:
365DNS Servers:
366  10.30.0.1
367Search Domains:
368
3692016-11-22 17:29:27 Connected via tun
3702016-11-22 17:29:27 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
3712016-11-22 17:29:27 LZO-ASYM init swap=0 asym=1
3722016-11-22 17:29:27 Comp-stub init swap=0
3732016-11-22 17:29:27 SetStatus Connected
3742016-11-22 17:30:00 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
3752016-11-22 17:30:03 RECONNECT TEST: ReachableViaWiFi
3762016-11-22 17:30:03 EVENT: PAUSE
3772016-11-22 17:30:04 RESUME TEST: ReachableViaWiFi
3782016-11-22 17:30:04 EVENT: RESUME
3792016-11-22 17:30:04 EVENT: RECONNECTING
3802016-11-22 17:30:04 Contacting 23.88.114.44:2018 via UDP
3812016-11-22 17:30:04 EVENT: WAIT
3822016-11-22 17:30:04 SetTunnelSocket returned 1
3832016-11-22 17:30:04 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
3842016-11-22 17:30:04 EVENT: CONNECTING
3852016-11-22 17:30:04 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
3862016-11-22 17:30:04 Peer Info:
387IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
388IV_VER=3.0.11
389IV_PLAT=ios
390IV_NCP=2
391IV_TCPNL=1
392IV_PROTO=2
393IV_LZO_STUB=1
394IV_COMP_STUB=1
395IV_COMP_STUBv2=1
396
3972016-11-22 17:30:04 VERIFY OK: depth=1
398cert. version    : 3
399serial number    : 8C:D8:43:EF:E4:5F:20:03
400issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
401subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
402issued  on        : 2014-04-11 10:15:45
403expires on        : 2024-04-08 10:15:45
404signed using      : RSA with SHA1
405RSA key size      : 4096 bits
406basic constraints : CA=true
407
4082016-11-22 17:30:04 VERIFY OK: depth=0
409cert. version    : 3
410serial number    : 01:0F
411issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
412subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
413issued  on        : 2016-03-10 08:48:14
414expires on        : 2026-03-08 08:48:14
415signed using      : RSA with SHA1
416RSA key size      : 4096 bits
417basic constraints : CA=false
418cert. type        : SSL Server
419key usage        : Digital Signature, Key Encipherment
420ext key usage    : TLS Web Server Authentication
421
4222016-11-22 17:30:05 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
4232016-11-22 17:30:06 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
4242016-11-22 17:30:06 Session is ACTIVE
4252016-11-22 17:30:06 EVENT: GET_CONFIG
4262016-11-22 17:30:06 Sending PUSH_REQUEST to server...
4272016-11-22 17:30:06 OPTIONS:
4280 [redirect-gateway] [def1] [bypass-dhcp]
4291 [dhcp-option] [DNS] [10.30.0.1]
4302 [comp-lzo] [no]
4313 [route-gateway] [10.30.0.1]
4324 [topology] [subnet]
4335 [ping] [10]
4346 [ping-restart] [60]
4357 [ifconfig] [10.30.0.41] [255.255.0.0]
436
4372016-11-22 17:30:06 PROTOCOL OPTIONS:
438  cipher: AES-256-CBC
439  digest: SHA1
440  compress: LZO_STUB
441  peer ID: -1
4422016-11-22 17:30:06 EVENT: ASSIGN_IP
4432016-11-22 17:30:06 TunPersist: saving tun context:
444Session Name: 23.88.114.44
445Layer: OSI_LAYER_3
446Remote Address: 23.88.114.44
447Tunnel Addresses:
448  10.30.0.41/16 -> 10.30.0.1
449Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
450Block IPv6: no
451Add Routes:
452Exclude Routes:
453DNS Servers:
454  10.30.0.1
455Search Domains:
456
4572016-11-22 17:30:06 Connected via tun
4582016-11-22 17:30:06 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
4592016-11-22 17:30:06 LZO-ASYM init swap=0 asym=1
4602016-11-22 17:30:06 Comp-stub init swap=0
4612016-11-22 17:30:06 SetStatus Connected
4622016-11-22 17:30:08 RECONNECT TEST: ReachableViaWiFi
4632016-11-22 17:30:08 EVENT: PAUSE
4642016-11-22 17:30:09 RESUME TEST: ReachableViaWiFi
4652016-11-22 17:30:09 EVENT: RESUME
4662016-11-22 17:30:09 EVENT: RECONNECTING
4672016-11-22 17:30:09 Contacting 23.88.114.44:2018 via UDP
4682016-11-22 17:30:09 EVENT: WAIT
4692016-11-22 17:30:09 SetTunnelSocket returned 1
4702016-11-22 17:30:09 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
4712016-11-22 17:30:09 EVENT: CONNECTING
4722016-11-22 17:30:09 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
4732016-11-22 17:30:09 Peer Info:
474IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
475IV_VER=3.0.11
476IV_PLAT=ios
477IV_NCP=2
478IV_TCPNL=1
479IV_PROTO=2
480IV_LZO_STUB=1
481IV_COMP_STUB=1
482IV_COMP_STUBv2=1
483
4842016-11-22 17:30:09 VERIFY OK: depth=1
485cert. version    : 3
486serial number    : 8C:D8:43:EF:E4:5F:20:03
487issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
488subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
489issued  on        : 2014-04-11 10:15:45
490expires on        : 2024-04-08 10:15:45
491signed using      : RSA with SHA1
492RSA key size      : 4096 bits
493basic constraints : CA=true
494
4952016-11-22 17:30:09 VERIFY OK: depth=0
496cert. version    : 3
497serial number    : 01:0F
498issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
499subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
500issued  on        : 2016-03-10 08:48:14
501expires on        : 2026-03-08 08:48:14
502signed using      : RSA with SHA1
503RSA key size      : 4096 bits
504basic constraints : CA=false
505cert. type        : SSL Server
506key usage        : Digital Signature, Key Encipherment
507ext key usage    : TLS Web Server Authentication
508
5092016-11-22 17:30:10 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
5102016-11-22 17:30:10 Session is ACTIVE
5112016-11-22 17:30:10 EVENT: GET_CONFIG
5122016-11-22 17:30:10 Sending PUSH_REQUEST to server...
5132016-11-22 17:30:11 OPTIONS:
5140 [redirect-gateway] [def1] [bypass-dhcp]
5151 [dhcp-option] [DNS] [10.30.0.1]
5162 [comp-lzo] [no]
5173 [route-gateway] [10.30.0.1]
5184 [topology] [subnet]
5195 [ping] [10]
5206 [ping-restart] [60]
5217 [ifconfig] [10.30.0.41] [255.255.0.0]
522
5232016-11-22 17:30:11 PROTOCOL OPTIONS:
524  cipher: AES-256-CBC
525  digest: SHA1
526  compress: LZO_STUB
527  peer ID: -1
5282016-11-22 17:30:11 TunPersist: reused tun context
5292016-11-22 17:30:11 Connected via tun
5302016-11-22 17:30:11 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
5312016-11-22 17:30:11 LZO-ASYM init swap=0 asym=1
5322016-11-22 17:30:11 Comp-stub init swap=0
5332016-11-22 17:30:11 SetStatus Connected
5342016-11-22 17:30:12 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
5352016-11-22 17:30:15 RECONNECT TEST: ReachableViaWiFi
5362016-11-22 17:30:15 EVENT: PAUSE
5372016-11-22 17:30:16 RESUME TEST: ReachableViaWiFi
5382016-11-22 17:30:16 EVENT: RESUME
5392016-11-22 17:30:16 EVENT: RECONNECTING
5402016-11-22 17:30:16 Contacting 23.88.114.44:2018 via UDP
5412016-11-22 17:30:16 EVENT: WAIT
5422016-11-22 17:30:16 SetTunnelSocket returned 1
5432016-11-22 17:30:16 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
5442016-11-22 17:30:16 EVENT: CONNECTING
5452016-11-22 17:30:16 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
5462016-11-22 17:30:16 Peer Info:
547IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
548IV_VER=3.0.11
549IV_PLAT=ios
550IV_NCP=2
551IV_TCPNL=1
552IV_PROTO=2
553IV_LZO_STUB=1
554IV_COMP_STUB=1
555IV_COMP_STUBv2=1
556
5572016-11-22 17:30:16 VERIFY OK: depth=1
558cert. version    : 3
559serial number    : 8C:D8:43:EF:E4:5F:20:03
560issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
561subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
562issued  on        : 2014-04-11 10:15:45
563expires on        : 2024-04-08 10:15:45
564signed using      : RSA with SHA1
565RSA key size      : 4096 bits
566basic constraints : CA=true
567
5682016-11-22 17:30:16 VERIFY OK: depth=0
569cert. version    : 3
570serial number    : 01:0F
571issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
572subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
573issued  on        : 2016-03-10 08:48:14
574expires on        : 2026-03-08 08:48:14
575signed using      : RSA with SHA1
576RSA key size      : 4096 bits
577basic constraints : CA=false
578cert. type        : SSL Server
579key usage        : Digital Signature, Key Encipherment
580ext key usage    : TLS Web Server Authentication
581
5822016-11-22 17:30:17 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
5832016-11-22 17:30:17 Session is ACTIVE
5842016-11-22 17:30:17 EVENT: GET_CONFIG
5852016-11-22 17:30:17 Sending PUSH_REQUEST to server...
5862016-11-22 17:30:18 OPTIONS:
5870 [redirect-gateway] [def1] [bypass-dhcp]
5881 [dhcp-option] [DNS] [10.30.0.1]
5892 [comp-lzo] [no]
5903 [route-gateway] [10.30.0.1]
5914 [topology] [subnet]
5925 [ping] [10]
5936 [ping-restart] [60]
5947 [ifconfig] [10.30.0.41] [255.255.0.0]
595
5962016-11-22 17:30:18 PROTOCOL OPTIONS:
597  cipher: AES-256-CBC
598  digest: SHA1
599  compress: LZO_STUB
600  peer ID: -1
6012016-11-22 17:30:18 EVENT: ASSIGN_IP
6022016-11-22 17:30:18 TunPersist: saving tun context:
603Session Name: 23.88.114.44
604Layer: OSI_LAYER_3
605Remote Address: 23.88.114.44
606Tunnel Addresses:
607  10.30.0.41/16 -> 10.30.0.1
608Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
609Block IPv6: no
610Add Routes:
611Exclude Routes:
612DNS Servers:
613  10.30.0.1
614Search Domains:
615
6162016-11-22 17:30:18 Connected via tun
6172016-11-22 17:30:18 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
6182016-11-22 17:30:18 LZO-ASYM init swap=0 asym=1
6192016-11-22 17:30:18 Comp-stub init swap=0
6202016-11-22 17:30:18 SetStatus Connected
6212016-11-22 17:37:06 TUN reset routes
6222016-11-22 17:37:07 EVENT: DISCONNECTED
6232016-11-22 17:37:07 Raw stats on disconnect:
624  BYTES_IN : 1786098858
625  BYTES_OUT : 53767003
626  PACKETS_IN : 1267703
627  PACKETS_OUT : 450702
628  TUN_BYTES_IN : 33317054
629  TUN_BYTES_OUT : 1723966271
630  TUN_PACKETS_IN : 449600
631  TUN_PACKETS_OUT : 1266656
632  KEEPALIVE_TIMEOUT : 1
633  N_PAUSE : 38
634  N_RECONNECT : 39
6352016-11-22 17:37:07 Performance stats on disconnect:
636  CPU usage (microseconds): 167008093
637  Tunnel compression ratio (uplink): 1.6138
638  Tunnel compression ratio (downlink): 1.03604
639  Network bytes per CPU second: 11016626
640  Tunnel bytes per CPU second: 10522144
6412016-11-22 17:37:07 ----- OpenVPN Stop -----
6422016-11-22 22:18:47 ----- OpenVPN Start -----
643OpenVPN core 3.0.11 ios arm64 64-bit built on Apr 15 2016 14:13:50
6442016-11-22 22:18:47 Frame=512/2048/512 mssfix-ctrl=1250
6452016-11-22 22:18:47 UNUSED OPTIONS
6464 [resolv-retry] [infinite]
6475 [nobind]
6486 [persist-key]
6497 [persist-tun]
65011 [verb] [3]
65112 [explicit-exit-notify] [5]
652
6532016-11-22 22:18:47 EVENT: RESOLVE
6542016-11-22 22:18:47 Contacting 23.88.114.44:2018 via UDP
6552016-11-22 22:18:47 EVENT: WAIT
6562016-11-22 22:18:47 SetTunnelSocket returned 1
6572016-11-22 22:18:47 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
6582016-11-22 22:18:47 EVENT: CONNECTING
6592016-11-22 22:18:47 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
6602016-11-22 22:18:47 Peer Info:
661IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
662IV_VER=3.0.11
663IV_PLAT=ios
664IV_NCP=2
665IV_TCPNL=1
666IV_PROTO=2
667IV_LZO_STUB=1
668IV_COMP_STUB=1
669IV_COMP_STUBv2=1
670
6712016-11-22 22:18:48 VERIFY OK: depth=1
672cert. version    : 3
673serial number    : 8C:D8:43:EF:E4:5F:20:03
674issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
675subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
676issued  on        : 2014-04-11 10:15:45
677expires on        : 2024-04-08 10:15:45
678signed using      : RSA with SHA1
679RSA key size      : 4096 bits
680basic constraints : CA=true
681
6822016-11-22 22:18:48 VERIFY OK: depth=0
683cert. version    : 3
684serial number    : 01:0F
685issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
686subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
687issued  on        : 2016-03-10 08:48:14
688expires on        : 2026-03-08 08:48:14
689signed using      : RSA with SHA1
690RSA key size      : 4096 bits
691basic constraints : CA=false
692cert. type        : SSL Server
693key usage        : Digital Signature, Key Encipherment
694ext key usage    : TLS Web Server Authentication
695
6962016-11-22 22:18:48 NET WiFi:ReachableViaWiFi/-R t-----d
6972016-11-22 22:18:48 NET Internet:ReachableViaWiFi/-R t------
6982016-11-22 22:18:49 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
6992016-11-22 22:18:49 Session is ACTIVE
7002016-11-22 22:18:49 EVENT: GET_CONFIG
7012016-11-22 22:18:49 Sending PUSH_REQUEST to server...
7022016-11-22 22:18:49 OPTIONS:
7030 [redirect-gateway] [def1] [bypass-dhcp]
7041 [dhcp-option] [DNS] [10.30.0.1]
7052 [comp-lzo] [no]
7063 [route-gateway] [10.30.0.1]
7074 [topology] [subnet]
7085 [ping] [10]
7096 [ping-restart] [60]
7107 [ifconfig] [10.30.0.41] [255.255.0.0]
711
7122016-11-22 22:18:49 PROTOCOL OPTIONS:
713  cipher: AES-256-CBC
714  digest: SHA1
715  compress: LZO_STUB
716  peer ID: -1
7172016-11-22 22:18:49 EVENT: ASSIGN_IP
7182016-11-22 22:18:49 TunPersist: saving tun context:
719Session Name: 23.88.114.44
720Layer: OSI_LAYER_3
721Remote Address: 23.88.114.44
722Tunnel Addresses:
723  10.30.0.41/16 -> 10.30.0.1
724Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
725Block IPv6: no
726Add Routes:
727Exclude Routes:
728DNS Servers:
729  10.30.0.1
730Search Domains:
731
7322016-11-22 22:18:49 Connected via tun
7332016-11-22 22:18:49 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
7342016-11-22 22:18:49 LZO-ASYM init swap=0 asym=1
7352016-11-22 22:18:49 Comp-stub init swap=0
7362016-11-22 22:18:50 SetStatus Connected
7372016-11-22 22:50:44 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
7382016-11-22 22:50:44 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
7392016-11-22 22:50:47 RECONNECT TEST: ReachableViaWiFi
7402016-11-22 22:50:47 EVENT: PAUSE
7412016-11-22 22:50:48 RESUME TEST: ReachableViaWiFi
7422016-11-22 22:50:48 EVENT: RESUME
7432016-11-22 22:50:48 EVENT: RECONNECTING
7442016-11-22 22:50:48 Contacting 23.88.114.44:2018 via UDP
7452016-11-22 22:50:48 EVENT: WAIT
7462016-11-22 22:50:48 SetTunnelSocket returned 1
7472016-11-22 22:50:48 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
7482016-11-22 22:50:48 EVENT: CONNECTING
7492016-11-22 22:50:48 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
7502016-11-22 22:50:48 Peer Info:
751IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
752IV_VER=3.0.11
753IV_PLAT=ios
754IV_NCP=2
755IV_TCPNL=1
756IV_PROTO=2
757IV_LZO_STUB=1
758IV_COMP_STUB=1
759IV_COMP_STUBv2=1
760
7612016-11-22 22:50:49 VERIFY OK: depth=1
762cert. version    : 3
763serial number    : 8C:D8:43:EF:E4:5F:20:03
764issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
765subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
766issued  on        : 2014-04-11 10:15:45
767expires on        : 2024-04-08 10:15:45
768signed using      : RSA with SHA1
769RSA key size      : 4096 bits
770basic constraints : CA=true
771
7722016-11-22 22:50:49 VERIFY OK: depth=0
773cert. version    : 3
774serial number    : 01:0F
775issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
776subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
777issued  on        : 2016-03-10 08:48:14
778expires on        : 2026-03-08 08:48:14
779signed using      : RSA with SHA1
780RSA key size      : 4096 bits
781basic constraints : CA=false
782cert. type        : SSL Server
783key usage        : Digital Signature, Key Encipherment
784ext key usage    : TLS Web Server Authentication
785
7862016-11-22 22:50:50 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
7872016-11-22 22:50:50 Session is ACTIVE
7882016-11-22 22:50:50 EVENT: GET_CONFIG
7892016-11-22 22:50:50 Sending PUSH_REQUEST to server...
7902016-11-22 22:50:51 OPTIONS:
7910 [redirect-gateway] [def1] [bypass-dhcp]
7921 [dhcp-option] [DNS] [10.30.0.1]
7932 [comp-lzo] [no]
7943 [route-gateway] [10.30.0.1]
7954 [topology] [subnet]
7965 [ping] [10]
7976 [ping-restart] [60]
7987 [ifconfig] [10.30.0.41] [255.255.0.0]
799
8002016-11-22 22:50:51 PROTOCOL OPTIONS:
801  cipher: AES-256-CBC
802  digest: SHA1
803  compress: LZO_STUB
804  peer ID: -1
8052016-11-22 22:50:51 EVENT: ASSIGN_IP
8062016-11-22 22:50:51 TunPersist: saving tun context:
807Session Name: 23.88.114.44
808Layer: OSI_LAYER_3
809Remote Address: 23.88.114.44
810Tunnel Addresses:
811  10.30.0.41/16 -> 10.30.0.1
812Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
813Block IPv6: no
814Add Routes:
815Exclude Routes:
816DNS Servers:
817  10.30.0.1
818Search Domains:
819
8202016-11-22 22:50:51 Connected via tun
8212016-11-22 22:50:51 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
8222016-11-22 22:50:51 LZO-ASYM init swap=0 asym=1
8232016-11-22 22:50:51 Comp-stub init swap=0
8242016-11-22 22:50:51 SetStatus Connected
8252016-11-22 22:51:19 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
8262016-11-22 22:51:22 RECONNECT TEST: ReachableViaWiFi
8272016-11-22 22:51:22 EVENT: PAUSE
8282016-11-22 22:51:23 RESUME TEST: ReachableViaWiFi
8292016-11-22 22:51:23 EVENT: RESUME
8302016-11-22 22:51:23 EVENT: RECONNECTING
8312016-11-22 22:51:23 Contacting 23.88.114.44:2018 via UDP
8322016-11-22 22:51:23 EVENT: WAIT
8332016-11-22 22:51:23 SetTunnelSocket returned 1
8342016-11-22 22:51:23 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
8352016-11-22 22:51:23 EVENT: CONNECTING
8362016-11-22 22:51:23 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
8372016-11-22 22:51:23 Peer Info:
838IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
839IV_VER=3.0.11
840IV_PLAT=ios
841IV_NCP=2
842IV_TCPNL=1
843IV_PROTO=2
844IV_LZO_STUB=1
845IV_COMP_STUB=1
846IV_COMP_STUBv2=1
847
8482016-11-22 22:51:23 VERIFY OK: depth=1
849cert. version    : 3
850serial number    : 8C:D8:43:EF:E4:5F:20:03
851issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
852subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
853issued  on        : 2014-04-11 10:15:45
854expires on        : 2024-04-08 10:15:45
855signed using      : RSA with SHA1
856RSA key size      : 4096 bits
857basic constraints : CA=true
858
8592016-11-22 22:51:23 VERIFY OK: depth=0
860cert. version    : 3
861serial number    : 01:0F
862issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
863subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
864issued  on        : 2016-03-10 08:48:14
865expires on        : 2026-03-08 08:48:14
866signed using      : RSA with SHA1
867RSA key size      : 4096 bits
868basic constraints : CA=false
869cert. type        : SSL Server
870key usage        : Digital Signature, Key Encipherment
871ext key usage    : TLS Web Server Authentication
872
8732016-11-22 22:51:24 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
8742016-11-22 22:51:24 Session is ACTIVE
8752016-11-22 22:51:24 EVENT: GET_CONFIG
8762016-11-22 22:51:24 Sending PUSH_REQUEST to server...
8772016-11-22 22:51:25 OPTIONS:
8780 [redirect-gateway] [def1] [bypass-dhcp]
8791 [dhcp-option] [DNS] [10.30.0.1]
8802 [comp-lzo] [no]
8813 [route-gateway] [10.30.0.1]
8824 [topology] [subnet]
8835 [ping] [10]
8846 [ping-restart] [60]
8857 [ifconfig] [10.30.0.41] [255.255.0.0]
886
8872016-11-22 22:51:25 PROTOCOL OPTIONS:
888  cipher: AES-256-CBC
889  digest: SHA1
890  compress: LZO_STUB
891  peer ID: -1
8922016-11-22 22:51:25 EVENT: ASSIGN_IP
8932016-11-22 22:51:25 TunPersist: saving tun context:
894Session Name: 23.88.114.44
895Layer: OSI_LAYER_3
896Remote Address: 23.88.114.44
897Tunnel Addresses:
898  10.30.0.41/16 -> 10.30.0.1
899Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
900Block IPv6: no
901Add Routes:
902Exclude Routes:
903DNS Servers:
904  10.30.0.1
905Search Domains:
906
9072016-11-22 22:51:25 Connected via tun
9082016-11-22 22:51:25 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
9092016-11-22 22:51:25 LZO-ASYM init swap=0 asym=1
9102016-11-22 22:51:25 Comp-stub init swap=0
9112016-11-22 22:51:25 SetStatus Connected
9122016-11-22 22:51:27 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
9132016-11-22 22:51:30 RECONNECT TEST: ReachableViaWiFi
9142016-11-22 22:51:30 EVENT: PAUSE
9152016-11-22 22:51:31 RESUME TEST: ReachableViaWiFi
9162016-11-22 22:51:31 EVENT: RESUME
9172016-11-22 22:51:31 EVENT: RECONNECTING
9182016-11-22 22:51:31 Contacting 23.88.114.44:2018 via UDP
9192016-11-22 22:51:31 EVENT: WAIT
9202016-11-22 22:51:31 SetTunnelSocket returned 1
9212016-11-22 22:51:31 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
9222016-11-22 22:51:31 EVENT: CONNECTING
9232016-11-22 22:51:31 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
9242016-11-22 22:51:31 Peer Info:
925IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
926IV_VER=3.0.11
927IV_PLAT=ios
928IV_NCP=2
929IV_TCPNL=1
930IV_PROTO=2
931IV_LZO_STUB=1
932IV_COMP_STUB=1
933IV_COMP_STUBv2=1
934
9352016-11-22 22:51:31 VERIFY OK: depth=1
936cert. version    : 3
937serial number    : 8C:D8:43:EF:E4:5F:20:03
938issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
939subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
940issued  on        : 2014-04-11 10:15:45
941expires on        : 2024-04-08 10:15:45
942signed using      : RSA with SHA1
943RSA key size      : 4096 bits
944basic constraints : CA=true
945
9462016-11-22 22:51:31 VERIFY OK: depth=0
947cert. version    : 3
948serial number    : 01:0F
949issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
950subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
951issued  on        : 2016-03-10 08:48:14
952expires on        : 2026-03-08 08:48:14
953signed using      : RSA with SHA1
954RSA key size      : 4096 bits
955basic constraints : CA=false
956cert. type        : SSL Server
957key usage        : Digital Signature, Key Encipherment
958ext key usage    : TLS Web Server Authentication
959
9602016-11-22 22:51:32 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
9612016-11-22 22:51:32 Session is ACTIVE
9622016-11-22 22:51:32 EVENT: GET_CONFIG
9632016-11-22 22:51:32 Sending PUSH_REQUEST to server...
9642016-11-22 22:51:33 OPTIONS:
9650 [redirect-gateway] [def1] [bypass-dhcp]
9661 [dhcp-option] [DNS] [10.30.0.1]
9672 [comp-lzo] [no]
9683 [route-gateway] [10.30.0.1]
9694 [topology] [subnet]
9705 [ping] [10]
9716 [ping-restart] [60]
9727 [ifconfig] [10.30.0.41] [255.255.0.0]
973
9742016-11-22 22:51:33 PROTOCOL OPTIONS:
975  cipher: AES-256-CBC
976  digest: SHA1
977  compress: LZO_STUB
978  peer ID: -1
9792016-11-22 22:51:33 EVENT: ASSIGN_IP
9802016-11-22 22:51:33 TunPersist: saving tun context:
981Session Name: 23.88.114.44
982Layer: OSI_LAYER_3
983Remote Address: 23.88.114.44
984Tunnel Addresses:
985  10.30.0.41/16 -> 10.30.0.1
986Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
987Block IPv6: no
988Add Routes:
989Exclude Routes:
990DNS Servers:
991  10.30.0.1
992Search Domains:
993
9942016-11-22 22:51:33 Connected via tun
9952016-11-22 22:51:33 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
9962016-11-22 22:51:33 LZO-ASYM init swap=0 asym=1
9972016-11-22 22:51:33 Comp-stub init swap=0
9982016-11-22 22:51:33 SetStatus Connected
9992016-11-22 22:51:37 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
10002016-11-22 22:51:40 RECONNECT TEST: ReachableViaWiFi
10012016-11-22 22:51:40 EVENT: PAUSE
10022016-11-22 22:51:41 RESUME TEST: ReachableViaWiFi
10032016-11-22 22:51:41 EVENT: RESUME
10042016-11-22 22:51:41 EVENT: RECONNECTING
10052016-11-22 22:51:41 Contacting 23.88.114.44:2018 via UDP
10062016-11-22 22:51:41 EVENT: WAIT
10072016-11-22 22:51:41 SetTunnelSocket returned 1
10082016-11-22 22:51:41 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
10092016-11-22 22:51:41 EVENT: CONNECTING
10102016-11-22 22:51:41 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
10112016-11-22 22:51:41 Peer Info:
1012IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1013IV_VER=3.0.11
1014IV_PLAT=ios
1015IV_NCP=2
1016IV_TCPNL=1
1017IV_PROTO=2
1018IV_LZO_STUB=1
1019IV_COMP_STUB=1
1020IV_COMP_STUBv2=1
1021
10222016-11-22 22:51:41 VERIFY OK: depth=1
1023cert. version    : 3
1024serial number    : 8C:D8:43:EF:E4:5F:20:03
1025issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1026subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1027issued  on        : 2014-04-11 10:15:45
1028expires on        : 2024-04-08 10:15:45
1029signed using      : RSA with SHA1
1030RSA key size      : 4096 bits
1031basic constraints : CA=true
1032
10332016-11-22 22:51:41 VERIFY OK: depth=0
1034cert. version    : 3
1035serial number    : 01:0F
1036issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1037subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1038issued  on        : 2016-03-10 08:48:14
1039expires on        : 2026-03-08 08:48:14
1040signed using      : RSA with SHA1
1041RSA key size      : 4096 bits
1042basic constraints : CA=false
1043cert. type        : SSL Server
1044key usage        : Digital Signature, Key Encipherment
1045ext key usage    : TLS Web Server Authentication
1046
10472016-11-22 22:51:45 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
10482016-11-22 22:51:45 Session is ACTIVE
10492016-11-22 22:51:45 EVENT: GET_CONFIG
10502016-11-22 22:51:45 Sending PUSH_REQUEST to server...
10512016-11-22 22:51:46 OPTIONS:
10520 [redirect-gateway] [def1] [bypass-dhcp]
10531 [dhcp-option] [DNS] [10.30.0.1]
10542 [comp-lzo] [no]
10553 [route-gateway] [10.30.0.1]
10564 [topology] [subnet]
10575 [ping] [10]
10586 [ping-restart] [60]
10597 [ifconfig] [10.30.0.41] [255.255.0.0]
1060
10612016-11-22 22:51:46 PROTOCOL OPTIONS:
1062  cipher: AES-256-CBC
1063  digest: SHA1
1064  compress: LZO_STUB
1065  peer ID: -1
10662016-11-22 22:51:46 EVENT: ASSIGN_IP
10672016-11-22 22:51:46 TunPersist: saving tun context:
1068Session Name: 23.88.114.44
1069Layer: OSI_LAYER_3
1070Remote Address: 23.88.114.44
1071Tunnel Addresses:
1072  10.30.0.41/16 -> 10.30.0.1
1073Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
1074Block IPv6: no
1075Add Routes:
1076Exclude Routes:
1077DNS Servers:
1078  10.30.0.1
1079Search Domains:
1080
10812016-11-22 22:51:46 Connected via tun
10822016-11-22 22:51:46 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
10832016-11-22 22:51:46 LZO-ASYM init swap=0 asym=1
10842016-11-22 22:51:46 Comp-stub init swap=0
10852016-11-22 22:51:46 SetStatus Connected
10862016-11-22 22:53:06 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
10872016-11-22 22:53:06 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
10882016-11-22 22:53:09 RECONNECT TEST: ReachableViaWiFi
10892016-11-22 22:53:09 EVENT: PAUSE
10902016-11-22 22:53:10 RESUME TEST: ReachableViaWiFi
10912016-11-22 22:53:10 EVENT: RESUME
10922016-11-22 22:53:10 EVENT: RECONNECTING
10932016-11-22 22:53:10 Contacting 23.88.114.44:2018 via UDP
10942016-11-22 22:53:10 EVENT: WAIT
10952016-11-22 22:53:10 SetTunnelSocket returned 1
10962016-11-22 22:53:10 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
10972016-11-22 22:53:11 EVENT: CONNECTING
10982016-11-22 22:53:11 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
10992016-11-22 22:53:11 Peer Info:
1100IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1101IV_VER=3.0.11
1102IV_PLAT=ios
1103IV_NCP=2
1104IV_TCPNL=1
1105IV_PROTO=2
1106IV_LZO_STUB=1
1107IV_COMP_STUB=1
1108IV_COMP_STUBv2=1
1109
11102016-11-22 22:53:11 VERIFY OK: depth=1
1111cert. version    : 3
1112serial number    : 8C:D8:43:EF:E4:5F:20:03
1113issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1114subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1115issued  on        : 2014-04-11 10:15:45
1116expires on        : 2024-04-08 10:15:45
1117signed using      : RSA with SHA1
1118RSA key size      : 4096 bits
1119basic constraints : CA=true
1120
11212016-11-22 22:53:11 VERIFY OK: depth=0
1122cert. version    : 3
1123serial number    : 01:0F
1124issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1125subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1126issued  on        : 2016-03-10 08:48:14
1127expires on        : 2026-03-08 08:48:14
1128signed using      : RSA with SHA1
1129RSA key size      : 4096 bits
1130basic constraints : CA=false
1131cert. type        : SSL Server
1132key usage        : Digital Signature, Key Encipherment
1133ext key usage    : TLS Web Server Authentication
1134
11352016-11-22 22:53:12 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
11362016-11-22 22:53:12 Session is ACTIVE
11372016-11-22 22:53:12 EVENT: GET_CONFIG
11382016-11-22 22:53:12 Sending PUSH_REQUEST to server...
11392016-11-22 22:53:13 OPTIONS:
11400 [redirect-gateway] [def1] [bypass-dhcp]
11411 [dhcp-option] [DNS] [10.30.0.1]
11422 [comp-lzo] [no]
11433 [route-gateway] [10.30.0.1]
11444 [topology] [subnet]
11455 [ping] [10]
11466 [ping-restart] [60]
11477 [ifconfig] [10.30.0.41] [255.255.0.0]
1148
11492016-11-22 22:53:13 PROTOCOL OPTIONS:
1150  cipher: AES-256-CBC
1151  digest: SHA1
1152  compress: LZO_STUB
1153  peer ID: -1
11542016-11-22 22:53:13 EVENT: ASSIGN_IP
11552016-11-22 22:53:13 TunPersist: saving tun context:
1156Session Name: 23.88.114.44
1157Layer: OSI_LAYER_3
1158Remote Address: 23.88.114.44
1159Tunnel Addresses:
1160  10.30.0.41/16 -> 10.30.0.1
1161Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
1162Block IPv6: no
1163Add Routes:
1164Exclude Routes:
1165DNS Servers:
1166  10.30.0.1
1167Search Domains:
1168
11692016-11-22 22:53:13 Connected via tun
11702016-11-22 22:53:13 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
11712016-11-22 22:53:13 LZO-ASYM init swap=0 asym=1
11722016-11-22 22:53:13 Comp-stub init swap=0
11732016-11-22 22:53:13 SetStatus Connected
11742016-11-22 22:58:03 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
11752016-11-22 22:58:06 RECONNECT TEST: ReachableViaWiFi
11762016-11-22 22:58:06 EVENT: PAUSE
11772016-11-22 22:58:07 RESUME TEST: ReachableViaWiFi
11782016-11-22 22:58:07 EVENT: RESUME
11792016-11-22 22:58:07 EVENT: RECONNECTING
11802016-11-22 22:58:07 Contacting 23.88.114.44:2018 via UDP
11812016-11-22 22:58:07 EVENT: WAIT
11822016-11-22 22:58:07 SetTunnelSocket returned 1
11832016-11-22 22:58:07 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
11842016-11-22 22:58:08 EVENT: CONNECTING
11852016-11-22 22:58:08 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
11862016-11-22 22:58:08 Peer Info:
1187IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1188IV_VER=3.0.11
1189IV_PLAT=ios
1190IV_NCP=2
1191IV_TCPNL=1
1192IV_PROTO=2
1193IV_LZO_STUB=1
1194IV_COMP_STUB=1
1195IV_COMP_STUBv2=1
1196
11972016-11-22 22:58:08 VERIFY OK: depth=1
1198cert. version    : 3
1199serial number    : 8C:D8:43:EF:E4:5F:20:03
1200issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1201subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1202issued  on        : 2014-04-11 10:15:45
1203expires on        : 2024-04-08 10:15:45
1204signed using      : RSA with SHA1
1205RSA key size      : 4096 bits
1206basic constraints : CA=true
1207
12082016-11-22 22:58:08 VERIFY OK: depth=0
1209cert. version    : 3
1210serial number    : 01:0F
1211issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1212subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1213issued  on        : 2016-03-10 08:48:14
1214expires on        : 2026-03-08 08:48:14
1215signed using      : RSA with SHA1
1216RSA key size      : 4096 bits
1217basic constraints : CA=false
1218cert. type        : SSL Server
1219key usage        : Digital Signature, Key Encipherment
1220ext key usage    : TLS Web Server Authentication
1221
12222016-11-22 22:58:09 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
12232016-11-22 22:58:09 Session is ACTIVE
12242016-11-22 22:58:09 EVENT: GET_CONFIG
12252016-11-22 22:58:09 Sending PUSH_REQUEST to server...
12262016-11-22 22:58:10 OPTIONS:
12270 [redirect-gateway] [def1] [bypass-dhcp]
12281 [dhcp-option] [DNS] [10.30.0.1]
12292 [comp-lzo] [no]
12303 [route-gateway] [10.30.0.1]
12314 [topology] [subnet]
12325 [ping] [10]
12336 [ping-restart] [60]
12347 [ifconfig] [10.30.0.41] [255.255.0.0]
1235
12362016-11-22 22:58:10 PROTOCOL OPTIONS:
1237  cipher: AES-256-CBC
1238  digest: SHA1
1239  compress: LZO_STUB
1240  peer ID: -1
12412016-11-22 22:58:10 EVENT: ASSIGN_IP
12422016-11-22 22:58:10 TunPersist: saving tun context:
1243Session Name: 23.88.114.44
1244Layer: OSI_LAYER_3
1245Remote Address: 23.88.114.44
1246Tunnel Addresses:
1247  10.30.0.41/16 -> 10.30.0.1
1248Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
1249Block IPv6: no
1250Add Routes:
1251Exclude Routes:
1252DNS Servers:
1253  10.30.0.1
1254Search Domains:
1255
12562016-11-22 22:58:10 Connected via tun
12572016-11-22 22:58:10 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
12582016-11-22 22:58:10 LZO-ASYM init swap=0 asym=1
12592016-11-22 22:58:10 Comp-stub init swap=0
12602016-11-22 22:58:10 SetStatus Connected
12612016-11-22 22:58:13 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
12622016-11-22 22:58:16 RECONNECT TEST: ReachableViaWiFi
12632016-11-22 22:58:16 EVENT: PAUSE
12642016-11-22 22:58:17 RESUME TEST: ReachableViaWiFi
12652016-11-22 22:58:17 EVENT: RESUME
12662016-11-22 22:58:17 EVENT: RECONNECTING
12672016-11-22 22:58:17 Contacting 23.88.114.44:2018 via UDP
12682016-11-22 22:58:17 EVENT: WAIT
12692016-11-22 22:58:17 SetTunnelSocket returned 1
12702016-11-22 22:58:17 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
12712016-11-22 22:58:17 EVENT: CONNECTING
12722016-11-22 22:58:17 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
12732016-11-22 22:58:17 Peer Info:
1274IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1275IV_VER=3.0.11
1276IV_PLAT=ios
1277IV_NCP=2
1278IV_TCPNL=1
1279IV_PROTO=2
1280IV_LZO_STUB=1
1281IV_COMP_STUB=1
1282IV_COMP_STUBv2=1
1283
12842016-11-22 22:58:17 VERIFY OK: depth=1
1285cert. version    : 3
1286serial number    : 8C:D8:43:EF:E4:5F:20:03
1287issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1288subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1289issued  on        : 2014-04-11 10:15:45
1290expires on        : 2024-04-08 10:15:45
1291signed using      : RSA with SHA1
1292RSA key size      : 4096 bits
1293basic constraints : CA=true
1294
12952016-11-22 22:58:17 VERIFY OK: depth=0
1296cert. version    : 3
1297serial number    : 01:0F
1298issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1299subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1300issued  on        : 2016-03-10 08:48:14
1301expires on        : 2026-03-08 08:48:14
1302signed using      : RSA with SHA1
1303RSA key size      : 4096 bits
1304basic constraints : CA=false
1305cert. type        : SSL Server
1306key usage        : Digital Signature, Key Encipherment
1307ext key usage    : TLS Web Server Authentication
1308
13092016-11-22 22:58:20 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
13102016-11-22 22:58:23 RECONNECT TEST: ReachableViaWiFi
13112016-11-22 22:58:23 EVENT: PAUSE
13122016-11-22 22:58:24 RESUME TEST: ReachableViaWiFi
13132016-11-22 22:58:24 EVENT: RESUME
13142016-11-22 22:58:24 EVENT: RECONNECTING
13152016-11-22 22:58:24 Contacting 23.88.114.44:2018 via UDP
13162016-11-22 22:58:24 EVENT: WAIT
13172016-11-22 22:58:24 SetTunnelSocket returned 1
13182016-11-22 22:58:24 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
13192016-11-22 22:58:24 EVENT: CONNECTING
13202016-11-22 22:58:24 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
13212016-11-22 22:58:24 Peer Info:
1322IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1323IV_VER=3.0.11
1324IV_PLAT=ios
1325IV_NCP=2
1326IV_TCPNL=1
1327IV_PROTO=2
1328IV_LZO_STUB=1
1329IV_COMP_STUB=1
1330IV_COMP_STUBv2=1
1331
13322016-11-22 22:58:24 VERIFY OK: depth=1
1333cert. version    : 3
1334serial number    : 8C:D8:43:EF:E4:5F:20:03
1335issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1336subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1337issued  on        : 2014-04-11 10:15:45
1338expires on        : 2024-04-08 10:15:45
1339signed using      : RSA with SHA1
1340RSA key size      : 4096 bits
1341basic constraints : CA=true
1342
13432016-11-22 22:58:24 VERIFY OK: depth=0
1344cert. version    : 3
1345serial number    : 01:0F
1346issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1347subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1348issued  on        : 2016-03-10 08:48:14
1349expires on        : 2026-03-08 08:48:14
1350signed using      : RSA with SHA1
1351RSA key size      : 4096 bits
1352basic constraints : CA=false
1353cert. type        : SSL Server
1354key usage        : Digital Signature, Key Encipherment
1355ext key usage    : TLS Web Server Authentication
1356
13572016-11-22 22:58:25 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
13582016-11-22 22:58:25 Session is ACTIVE
13592016-11-22 22:58:25 EVENT: GET_CONFIG
13602016-11-22 22:58:25 Sending PUSH_REQUEST to server...
13612016-11-22 22:58:26 OPTIONS:
13620 [redirect-gateway] [def1] [bypass-dhcp]
13631 [dhcp-option] [DNS] [10.30.0.1]
13642 [comp-lzo] [no]
13653 [route-gateway] [10.30.0.1]
13664 [topology] [subnet]
13675 [ping] [10]
13686 [ping-restart] [60]
13697 [ifconfig] [10.30.0.41] [255.255.0.0]
1370
13712016-11-22 22:58:26 PROTOCOL OPTIONS:
1372  cipher: AES-256-CBC
1373  digest: SHA1
1374  compress: LZO_STUB
1375  peer ID: -1
13762016-11-22 22:58:26 EVENT: ASSIGN_IP
13772016-11-22 22:58:26 TunPersist: saving tun context:
1378Session Name: 23.88.114.44
1379Layer: OSI_LAYER_3
1380Remote Address: 23.88.114.44
1381Tunnel Addresses:
1382  10.30.0.41/16 -> 10.30.0.1
1383Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
1384Block IPv6: no
1385Add Routes:
1386Exclude Routes:
1387DNS Servers:
1388  10.30.0.1
1389Search Domains:
1390
13912016-11-22 22:58:26 Connected via tun
13922016-11-22 22:58:26 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
13932016-11-22 22:58:26 LZO-ASYM init swap=0 asym=1
13942016-11-22 22:58:26 Comp-stub init swap=0
13952016-11-22 22:58:26 SetStatus Connected
13962016-11-22 23:58:24 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
13972016-11-22 23:58:24 Peer Info:
1398IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1399IV_VER=3.0.11
1400IV_PLAT=ios
1401IV_NCP=2
1402IV_TCPNL=1
1403IV_PROTO=2
1404IV_LZO_STUB=1
1405IV_COMP_STUB=1
1406IV_COMP_STUBv2=1
1407
14082016-11-22 23:58:24 VERIFY OK: depth=1
1409cert. version    : 3
1410serial number    : 8C:D8:43:EF:E4:5F:20:03
1411issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1412subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1413issued  on        : 2014-04-11 10:15:45
1414expires on        : 2024-04-08 10:15:45
1415signed using      : RSA with SHA1
1416RSA key size      : 4096 bits
1417basic constraints : CA=true
1418
14192016-11-22 23:58:24 VERIFY OK: depth=0
1420cert. version    : 3
1421serial number    : 01:0F
1422issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1423subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1424issued  on        : 2016-03-10 08:48:14
1425expires on        : 2026-03-08 08:48:14
1426signed using      : RSA with SHA1
1427RSA key size      : 4096 bits
1428basic constraints : CA=false
1429cert. type        : SSL Server
1430key usage        : Digital Signature, Key Encipherment
1431ext key usage    : TLS Web Server Authentication
1432
14332016-11-22 23:58:25 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
14342016-11-22 23:58:25 LZO-ASYM init swap=0 asym=1
14352016-11-22 23:58:25 Comp-stub init swap=0
14362016-11-23 00:14:26 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
14372016-11-23 00:14:29 RECONNECT TEST: ReachableViaWiFi
14382016-11-23 00:14:29 EVENT: PAUSE
14392016-11-23 00:14:30 RESUME TEST: ReachableViaWiFi
14402016-11-23 00:14:30 EVENT: RESUME
14412016-11-23 00:14:30 EVENT: RECONNECTING
14422016-11-23 00:14:30 Contacting 23.88.114.44:2018 via UDP
14432016-11-23 00:14:30 EVENT: WAIT
14442016-11-23 00:14:30 SetTunnelSocket returned 1
14452016-11-23 00:14:30 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
14462016-11-23 00:14:30 EVENT: CONNECTING
14472016-11-23 00:14:30 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
14482016-11-23 00:14:30 Peer Info:
1449IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1450IV_VER=3.0.11
1451IV_PLAT=ios
1452IV_NCP=2
1453IV_TCPNL=1
1454IV_PROTO=2
1455IV_LZO_STUB=1
1456IV_COMP_STUB=1
1457IV_COMP_STUBv2=1
1458
14592016-11-23 00:14:30 VERIFY OK: depth=1
1460cert. version    : 3
1461serial number    : 8C:D8:43:EF:E4:5F:20:03
1462issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1463subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1464issued  on        : 2014-04-11 10:15:45
1465expires on        : 2024-04-08 10:15:45
1466signed using      : RSA with SHA1
1467RSA key size      : 4096 bits
1468basic constraints : CA=true
1469
14702016-11-23 00:14:30 VERIFY OK: depth=0
1471cert. version    : 3
1472serial number    : 01:0F
1473issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1474subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1475issued  on        : 2016-03-10 08:48:14
1476expires on        : 2026-03-08 08:48:14
1477signed using      : RSA with SHA1
1478RSA key size      : 4096 bits
1479basic constraints : CA=false
1480cert. type        : SSL Server
1481key usage        : Digital Signature, Key Encipherment
1482ext key usage    : TLS Web Server Authentication
1483
14842016-11-23 00:14:32 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
14852016-11-23 00:14:32 Session is ACTIVE
14862016-11-23 00:14:32 EVENT: GET_CONFIG
14872016-11-23 00:14:32 Sending PUSH_REQUEST to server...
14882016-11-23 00:14:33 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
14892016-11-23 00:14:33 OPTIONS:
14900 [redirect-gateway] [def1] [bypass-dhcp]
14911 [dhcp-option] [DNS] [10.30.0.1]
14922 [comp-lzo] [no]
14933 [route-gateway] [10.30.0.1]
14944 [topology] [subnet]
14955 [ping] [10]
14966 [ping-restart] [60]
14977 [ifconfig] [10.30.0.41] [255.255.0.0]
1498
14992016-11-23 00:14:33 PROTOCOL OPTIONS:
1500  cipher: AES-256-CBC
1501  digest: SHA1
1502  compress: LZO_STUB
1503  peer ID: -1
15042016-11-23 00:14:33 EVENT: ASSIGN_IP
15052016-11-23 00:14:33 TunPersist: saving tun context:
1506Session Name: 23.88.114.44
1507Layer: OSI_LAYER_3
1508Remote Address: 23.88.114.44
1509Tunnel Addresses:
1510  10.30.0.41/16 -> 10.30.0.1
1511Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
1512Block IPv6: no
1513Add Routes:
1514Exclude Routes:
1515DNS Servers:
1516  10.30.0.1
1517Search Domains:
1518
15192016-11-23 00:14:33 Connected via tun
15202016-11-23 00:14:33 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
15212016-11-23 00:14:33 LZO-ASYM init swap=0 asym=1
15222016-11-23 00:14:33 Comp-stub init swap=0
15232016-11-23 00:14:33 SetStatus Connected
15242016-11-23 00:14:36 RECONNECT TEST: ReachableViaWiFi
15252016-11-23 00:14:36 EVENT: PAUSE
15262016-11-23 00:14:37 RESUME TEST: ReachableViaWiFi
15272016-11-23 00:14:37 EVENT: RESUME
15282016-11-23 00:14:37 EVENT: RECONNECTING
15292016-11-23 00:14:37 Contacting 23.88.114.44:2018 via UDP
15302016-11-23 00:14:37 EVENT: WAIT
15312016-11-23 00:14:37 SetTunnelSocket returned 1
15322016-11-23 00:14:37 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
15332016-11-23 00:14:37 EVENT: CONNECTING
15342016-11-23 00:14:37 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
15352016-11-23 00:14:37 Peer Info:
1536IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1537IV_VER=3.0.11
1538IV_PLAT=ios
1539IV_NCP=2
1540IV_TCPNL=1
1541IV_PROTO=2
1542IV_LZO_STUB=1
1543IV_COMP_STUB=1
1544IV_COMP_STUBv2=1
1545
15462016-11-23 00:14:37 VERIFY OK: depth=1
1547cert. version    : 3
1548serial number    : 8C:D8:43:EF:E4:5F:20:03
1549issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1550subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1551issued  on        : 2014-04-11 10:15:45
1552expires on        : 2024-04-08 10:15:45
1553signed using      : RSA with SHA1
1554RSA key size      : 4096 bits
1555basic constraints : CA=true
1556
15572016-11-23 00:14:37 VERIFY OK: depth=0
1558cert. version    : 3
1559serial number    : 01:0F
1560issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1561subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1562issued  on        : 2016-03-10 08:48:14
1563expires on        : 2026-03-08 08:48:14
1564signed using      : RSA with SHA1
1565RSA key size      : 4096 bits
1566basic constraints : CA=false
1567cert. type        : SSL Server
1568key usage        : Digital Signature, Key Encipherment
1569ext key usage    : TLS Web Server Authentication
1570
15712016-11-23 00:14:38 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
15722016-11-23 00:14:38 Session is ACTIVE
15732016-11-23 00:14:38 EVENT: GET_CONFIG
15742016-11-23 00:14:38 Sending PUSH_REQUEST to server...
15752016-11-23 00:14:39 OPTIONS:
15760 [redirect-gateway] [def1] [bypass-dhcp]
15771 [dhcp-option] [DNS] [10.30.0.1]
15782 [comp-lzo] [no]
15793 [route-gateway] [10.30.0.1]
15804 [topology] [subnet]
15815 [ping] [10]
15826 [ping-restart] [60]
15837 [ifconfig] [10.30.0.41] [255.255.0.0]
1584
15852016-11-23 00:14:39 PROTOCOL OPTIONS:
1586  cipher: AES-256-CBC
1587  digest: SHA1
1588  compress: LZO_STUB
1589  peer ID: -1
15902016-11-23 00:14:39 TunPersist: reused tun context
15912016-11-23 00:14:39 Connected via tun
15922016-11-23 00:14:39 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
15932016-11-23 00:14:39 LZO-ASYM init swap=0 asym=1
15942016-11-23 00:14:39 Comp-stub init swap=0
15952016-11-23 00:14:39 SetStatus Connected
15962016-11-23 00:31:13 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
15972016-11-23 00:31:16 RECONNECT TEST: ReachableViaWiFi
15982016-11-23 00:31:16 EVENT: PAUSE
15992016-11-23 00:31:17 RESUME TEST: ReachableViaWiFi
16002016-11-23 00:31:17 EVENT: RESUME
16012016-11-23 00:31:17 EVENT: RECONNECTING
16022016-11-23 00:31:17 Contacting 23.88.114.44:2018 via UDP
16032016-11-23 00:31:17 EVENT: WAIT
16042016-11-23 00:31:17 SetTunnelSocket returned 1
16052016-11-23 00:31:17 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
16062016-11-23 00:31:17 EVENT: CONNECTING
16072016-11-23 00:31:17 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
16082016-11-23 00:31:17 Peer Info:
1609IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1610IV_VER=3.0.11
1611IV_PLAT=ios
1612IV_NCP=2
1613IV_TCPNL=1
1614IV_PROTO=2
1615IV_LZO_STUB=1
1616IV_COMP_STUB=1
1617IV_COMP_STUBv2=1
1618
16192016-11-23 00:31:17 VERIFY OK: depth=1
1620cert. version    : 3
1621serial number    : 8C:D8:43:EF:E4:5F:20:03
1622issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1623subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1624issued  on        : 2014-04-11 10:15:45
1625expires on        : 2024-04-08 10:15:45
1626signed using      : RSA with SHA1
1627RSA key size      : 4096 bits
1628basic constraints : CA=true
1629
16302016-11-23 00:31:17 VERIFY OK: depth=0
1631cert. version    : 3
1632serial number    : 01:0F
1633issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1634subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1635issued  on        : 2016-03-10 08:48:14
1636expires on        : 2026-03-08 08:48:14
1637signed using      : RSA with SHA1
1638RSA key size      : 4096 bits
1639basic constraints : CA=false
1640cert. type        : SSL Server
1641key usage        : Digital Signature, Key Encipherment
1642ext key usage    : TLS Web Server Authentication
1643
16442016-11-23 00:31:18 OS Event: NET AVAILABLE (RESUME): ReachableViaWiFi
16452016-11-23 00:31:19 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
16462016-11-23 00:31:19 Session is ACTIVE
16472016-11-23 00:31:19 EVENT: GET_CONFIG
16482016-11-23 00:31:19 Sending PUSH_REQUEST to server...
16492016-11-23 00:31:20 OPTIONS:
16500 [redirect-gateway] [def1] [bypass-dhcp]
16511 [dhcp-option] [DNS] [10.30.0.1]
16522 [comp-lzo] [no]
16533 [route-gateway] [10.30.0.1]
16544 [topology] [subnet]
16555 [ping] [10]
16566 [ping-restart] [60]
16577 [ifconfig] [10.30.0.41] [255.255.0.0]
1658
16592016-11-23 00:31:20 PROTOCOL OPTIONS:
1660  cipher: AES-256-CBC
1661  digest: SHA1
1662  compress: LZO_STUB
1663  peer ID: -1
16642016-11-23 00:31:20 EVENT: ASSIGN_IP
16652016-11-23 00:31:20 TunPersist: saving tun context:
1666Session Name: 23.88.114.44
1667Layer: OSI_LAYER_3
1668Remote Address: 23.88.114.44
1669Tunnel Addresses:
1670  10.30.0.41/16 -> 10.30.0.1
1671Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
1672Block IPv6: no
1673Add Routes:
1674Exclude Routes:
1675DNS Servers:
1676  10.30.0.1
1677Search Domains:
1678
16792016-11-23 00:31:20 Connected via tun
16802016-11-23 00:31:20 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
16812016-11-23 00:31:20 LZO-ASYM init swap=0 asym=1
16822016-11-23 00:31:20 Comp-stub init swap=0
16832016-11-23 00:31:20 SetStatus Connected
16842016-11-23 00:31:21 RECONNECT TEST: ReachableViaWiFi
16852016-11-23 00:31:21 EVENT: PAUSE
16862016-11-23 00:31:22 RESUME TEST: ReachableViaWiFi
16872016-11-23 00:31:22 EVENT: RESUME
16882016-11-23 00:31:22 EVENT: RECONNECTING
16892016-11-23 00:31:22 Contacting 23.88.114.44:2018 via UDP
16902016-11-23 00:31:22 EVENT: WAIT
16912016-11-23 00:31:22 SetTunnelSocket returned 1
16922016-11-23 00:31:22 Connecting to [23.88.114.44]:2018 (23.88.114.44) via UDPv4
16932016-11-23 00:31:22 EVENT: CONNECTING
16942016-11-23 00:31:22 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
16952016-11-23 00:31:22 Peer Info:
1696IV_GUI_VER=net.openvpn.connect.ios 1.0.7-199
1697IV_VER=3.0.11
1698IV_PLAT=ios
1699IV_NCP=2
1700IV_TCPNL=1
1701IV_PROTO=2
1702IV_LZO_STUB=1
1703IV_COMP_STUB=1
1704IV_COMP_STUBv2=1
1705
17062016-11-23 00:31:22 VERIFY OK: depth=1
1707cert. version    : 3
1708serial number    : 8C:D8:43:EF:E4:5F:20:03
1709issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1710subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1711issued  on        : 2014-04-11 10:15:45
1712expires on        : 2024-04-08 10:15:45
1713signed using      : RSA with SHA1
1714RSA key size      : 4096 bits
1715basic constraints : CA=true
1716
17172016-11-23 00:31:22 VERIFY OK: depth=0
1718cert. version    : 3
1719serial number    : 01:0F
1720issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
1721subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
1722issued  on        : 2016-03-10 08:48:14
1723expires on        : 2026-03-08 08:48:14
1724signed using      : RSA with SHA1
1725RSA key size      : 4096 bits
1726basic constraints : CA=false
1727cert. type        : SSL Server
1728key usage        : Digital Signature, Key Encipherment
1729ext key usage    : TLS Web Server Authentication
1730
17312016-11-23 00:31:24 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
17322016-11-23 00:31:24 Session is ACTIVE
17332016-11-23 00:31:24 EVENT: GET_CONFIG
17342016-11-23 00:31:24 Sending PUSH_REQUEST to server...
17352016-11-23 00:31:24 OPTIONS:
17360 [redirect-gateway] [def1] [bypass-dhcp]
17371 [dhcp-option] [DNS] [10.30.0.1]
17382 [comp-lzo] [no]
17393 [route-gateway] [10.30.0.1]
17404 [topology] [subnet]
17415 [ping] [10]
17426 [ping-restart] [60]
17437 [ifconfig] [10.30.0.41] [255.255.0.0]
1744
17452016-11-23 00:31:24 PROTOCOL OPTIONS:
1746  cipher: AES-256-CBC
1747  digest: SHA1
1748  compress: LZO_STUB
1749  peer ID: -1
17502016-11-23 00:31:24 TunPersist: reused tun context
17512016-11-23 00:31:24 Connected via tun
17522016-11-23 00:31:24 EVENT: CONNECTED @23.88.114.44:2018 (23.88.114.44) via /UDPv4 on tun/10.30.0.41/
17532016-11-23 00:31:24 LZO-ASYM init swap=0 asym=1
17542016-11-23 00:31:24 Comp-stub init swap=0
17552016-11-23 00:31:24 SetStatus Connected
1756
1757
1758Sent from my iPad