1 | Mon Oct 23 21:48:17 2017 us=191138 Current Parameter Settings: |
---|
2 | Mon Oct 23 21:48:17 2017 us=191573 config = '/etc/openvpn/server.conf' |
---|
3 | Mon Oct 23 21:48:17 2017 us=191681 mode = 1 |
---|
4 | Mon Oct 23 21:48:17 2017 us=191780 persist_config = DISABLED |
---|
5 | Mon Oct 23 21:48:17 2017 us=191876 persist_mode = 1 |
---|
6 | Mon Oct 23 21:48:17 2017 us=191971 show_ciphers = DISABLED |
---|
7 | Mon Oct 23 21:48:17 2017 us=192066 show_digests = DISABLED |
---|
8 | Mon Oct 23 21:48:17 2017 us=192158 show_engines = DISABLED |
---|
9 | Mon Oct 23 21:48:17 2017 us=192252 genkey = DISABLED |
---|
10 | Mon Oct 23 21:48:17 2017 us=192345 key_pass_file = '[UNDEF]' |
---|
11 | Mon Oct 23 21:48:17 2017 us=192440 show_tls_ciphers = DISABLED |
---|
12 | Mon Oct 23 21:48:17 2017 us=192534 connect_retry_max = 0 |
---|
13 | Mon Oct 23 21:48:17 2017 us=192629 Connection profiles [0]: |
---|
14 | Mon Oct 23 21:48:17 2017 us=192724 proto = udp |
---|
15 | Mon Oct 23 21:48:17 2017 us=192818 local = '192.168.1.64' |
---|
16 | Mon Oct 23 21:48:17 2017 us=192910 local_port = '443' |
---|
17 | Mon Oct 23 21:48:17 2017 us=193061 remote = '[UNDEF]' |
---|
18 | Mon Oct 23 21:48:17 2017 us=193166 remote_port = '443' |
---|
19 | Mon Oct 23 21:48:17 2017 us=193259 remote_float = DISABLED |
---|
20 | Mon Oct 23 21:48:17 2017 us=193352 bind_defined = DISABLED |
---|
21 | Mon Oct 23 21:48:17 2017 us=193444 bind_local = ENABLED |
---|
22 | Mon Oct 23 21:48:17 2017 us=193537 bind_ipv6_only = DISABLED |
---|
23 | Mon Oct 23 21:48:17 2017 us=193631 connect_retry_seconds = 5 |
---|
24 | Mon Oct 23 21:48:17 2017 us=193725 connect_timeout = 120 |
---|
25 | Mon Oct 23 21:48:17 2017 us=193987 socks_proxy_server = '[UNDEF]' |
---|
26 | Mon Oct 23 21:48:17 2017 us=194091 socks_proxy_port = '[UNDEF]' |
---|
27 | Mon Oct 23 21:48:17 2017 us=194188 tun_mtu = 1500 |
---|
28 | Mon Oct 23 21:48:17 2017 us=194282 tun_mtu_defined = ENABLED |
---|
29 | Mon Oct 23 21:48:17 2017 us=194376 link_mtu = 1500 |
---|
30 | Mon Oct 23 21:48:17 2017 us=194493 link_mtu_defined = DISABLED |
---|
31 | Mon Oct 23 21:48:17 2017 us=194593 tun_mtu_extra = 0 |
---|
32 | Mon Oct 23 21:48:17 2017 us=194688 tun_mtu_extra_defined = DISABLED |
---|
33 | Mon Oct 23 21:48:17 2017 us=194784 mtu_discover_type = -1 |
---|
34 | Mon Oct 23 21:48:17 2017 us=194877 fragment = 0 |
---|
35 | Mon Oct 23 21:48:17 2017 us=194970 mssfix = 1450 |
---|
36 | Mon Oct 23 21:48:17 2017 us=195066 explicit_exit_notification = 0 |
---|
37 | Mon Oct 23 21:48:17 2017 us=195260 Connection profiles END |
---|
38 | Mon Oct 23 21:48:17 2017 us=195360 remote_random = DISABLED |
---|
39 | Mon Oct 23 21:48:17 2017 us=195456 ipchange = '[UNDEF]' |
---|
40 | Mon Oct 23 21:48:17 2017 us=195550 dev = 'tun' |
---|
41 | Mon Oct 23 21:48:17 2017 us=195643 dev_type = '[UNDEF]' |
---|
42 | Mon Oct 23 21:48:17 2017 us=195737 dev_node = '[UNDEF]' |
---|
43 | Mon Oct 23 21:48:17 2017 us=195829 lladdr = '[UNDEF]' |
---|
44 | Mon Oct 23 21:48:17 2017 us=195922 topology = 1 |
---|
45 | Mon Oct 23 21:48:17 2017 us=196016 ifconfig_local = '192.168.8.1' |
---|
46 | Mon Oct 23 21:48:17 2017 us=196113 ifconfig_remote_netmask = '192.168.8.2' |
---|
47 | Mon Oct 23 21:48:17 2017 us=196208 ifconfig_noexec = DISABLED |
---|
48 | Mon Oct 23 21:48:17 2017 us=196302 ifconfig_nowarn = DISABLED |
---|
49 | Mon Oct 23 21:48:17 2017 us=196395 ifconfig_ipv6_local = '[UNDEF]' |
---|
50 | Mon Oct 23 21:48:17 2017 us=196489 ifconfig_ipv6_netbits = 0 |
---|
51 | Mon Oct 23 21:48:17 2017 us=196582 ifconfig_ipv6_remote = '[UNDEF]' |
---|
52 | Mon Oct 23 21:48:17 2017 us=196676 shaper = 0 |
---|
53 | Mon Oct 23 21:48:17 2017 us=196768 mtu_test = 0 |
---|
54 | Mon Oct 23 21:48:17 2017 us=196861 mlock = DISABLED |
---|
55 | Mon Oct 23 21:48:17 2017 us=196954 keepalive_ping = 0 |
---|
56 | Mon Oct 23 21:48:17 2017 us=197102 keepalive_timeout = 0 |
---|
57 | Mon Oct 23 21:48:17 2017 us=197197 inactivity_timeout = 0 |
---|
58 | Mon Oct 23 21:48:17 2017 us=197293 ping_send_timeout = 30 |
---|
59 | Mon Oct 23 21:48:17 2017 us=197387 ping_rec_timeout = 0 |
---|
60 | Mon Oct 23 21:48:17 2017 us=197483 ping_rec_timeout_action = 2 |
---|
61 | Mon Oct 23 21:48:17 2017 us=197576 ping_timer_remote = DISABLED |
---|
62 | Mon Oct 23 21:48:17 2017 us=197670 remap_sigusr1 = 0 |
---|
63 | Mon Oct 23 21:48:17 2017 us=197762 persist_tun = ENABLED |
---|
64 | Mon Oct 23 21:48:17 2017 us=197857 persist_local_ip = DISABLED |
---|
65 | Mon Oct 23 21:48:17 2017 us=197949 persist_remote_ip = DISABLED |
---|
66 | Mon Oct 23 21:48:17 2017 us=198043 persist_key = ENABLED |
---|
67 | Mon Oct 23 21:48:17 2017 us=198137 passtos = DISABLED |
---|
68 | Mon Oct 23 21:48:17 2017 us=198233 resolve_retry_seconds = 1000000000 |
---|
69 | Mon Oct 23 21:48:17 2017 us=198327 resolve_in_advance = DISABLED |
---|
70 | Mon Oct 23 21:48:17 2017 us=198475 username = '[UNDEF]' |
---|
71 | Mon Oct 23 21:48:17 2017 us=198573 groupname = '[UNDEF]' |
---|
72 | Mon Oct 23 21:48:17 2017 us=198669 chroot_dir = '[UNDEF]' |
---|
73 | Mon Oct 23 21:48:17 2017 us=198763 cd_dir = '[UNDEF]' |
---|
74 | Mon Oct 23 21:48:17 2017 us=198858 writepid = '[UNDEF]' |
---|
75 | Mon Oct 23 21:48:17 2017 us=198952 up_script = '[UNDEF]' |
---|
76 | Mon Oct 23 21:48:17 2017 us=199046 down_script = '[UNDEF]' |
---|
77 | Mon Oct 23 21:48:17 2017 us=199139 down_pre = DISABLED |
---|
78 | Mon Oct 23 21:48:17 2017 us=199235 up_restart = DISABLED |
---|
79 | Mon Oct 23 21:48:17 2017 us=199329 up_delay = DISABLED |
---|
80 | Mon Oct 23 21:48:17 2017 us=199424 daemon = DISABLED |
---|
81 | Mon Oct 23 21:48:17 2017 us=199516 inetd = 0 |
---|
82 | Mon Oct 23 21:48:17 2017 us=199610 log = DISABLED |
---|
83 | Mon Oct 23 21:48:17 2017 us=199704 suppress_timestamps = DISABLED |
---|
84 | Mon Oct 23 21:48:17 2017 us=199800 machine_readable_output = DISABLED |
---|
85 | Mon Oct 23 21:48:17 2017 us=199894 nice = 0 |
---|
86 | Mon Oct 23 21:48:17 2017 us=199989 verbosity = 4 |
---|
87 | Mon Oct 23 21:48:17 2017 us=200083 mute = 0 |
---|
88 | Mon Oct 23 21:48:17 2017 us=200178 gremlin = 0 |
---|
89 | Mon Oct 23 21:48:17 2017 us=200273 status_file = '/var/log/openvpn-status.log' |
---|
90 | Mon Oct 23 21:48:17 2017 us=200369 status_file_version = 1 |
---|
91 | Mon Oct 23 21:48:17 2017 us=200464 status_file_update_freq = 60 |
---|
92 | Mon Oct 23 21:48:17 2017 us=200558 occ = ENABLED |
---|
93 | Mon Oct 23 21:48:17 2017 us=200651 rcvbuf = 0 |
---|
94 | Mon Oct 23 21:48:17 2017 us=200745 sndbuf = 0 |
---|
95 | Mon Oct 23 21:48:17 2017 us=200839 mark = 0 |
---|
96 | Mon Oct 23 21:48:17 2017 us=200932 sockflags = 0 |
---|
97 | Mon Oct 23 21:48:17 2017 us=201084 fast_io = DISABLED |
---|
98 | Mon Oct 23 21:48:17 2017 us=201181 comp.alg = 4 |
---|
99 | Mon Oct 23 21:48:17 2017 us=201276 comp.flags = 4 |
---|
100 | Mon Oct 23 21:48:17 2017 us=201371 route_script = '[UNDEF]' |
---|
101 | Mon Oct 23 21:48:17 2017 us=201468 route_default_gateway = '[UNDEF]' |
---|
102 | Mon Oct 23 21:48:17 2017 us=201625 route_default_metric = 0 |
---|
103 | Mon Oct 23 21:48:17 2017 us=201723 route_noexec = DISABLED |
---|
104 | Mon Oct 23 21:48:17 2017 us=201819 route_delay = 0 |
---|
105 | Mon Oct 23 21:48:17 2017 us=201915 route_delay_window = 30 |
---|
106 | Mon Oct 23 21:48:17 2017 us=202010 route_delay_defined = DISABLED |
---|
107 | Mon Oct 23 21:48:17 2017 us=202104 route_nopull = DISABLED |
---|
108 | Mon Oct 23 21:48:17 2017 us=202199 route_gateway_via_dhcp = DISABLED |
---|
109 | Mon Oct 23 21:48:17 2017 us=202294 allow_pull_fqdn = DISABLED |
---|
110 | Mon Oct 23 21:48:17 2017 us=202397 route 192.168.8.0/255.255.255.0/default (not set)/default (not set) |
---|
111 | Mon Oct 23 21:48:17 2017 us=202494 management_addr = '[UNDEF]' |
---|
112 | Mon Oct 23 21:48:17 2017 us=202589 management_port = '[UNDEF]' |
---|
113 | Mon Oct 23 21:48:17 2017 us=202684 management_user_pass = '[UNDEF]' |
---|
114 | Mon Oct 23 21:48:17 2017 us=202779 management_log_history_cache = 250 |
---|
115 | Mon Oct 23 21:48:17 2017 us=202875 management_echo_buffer_size = 100 |
---|
116 | Mon Oct 23 21:48:17 2017 us=202969 management_write_peer_info_file = '[UNDEF]' |
---|
117 | Mon Oct 23 21:48:17 2017 us=203066 management_client_user = '[UNDEF]' |
---|
118 | Mon Oct 23 21:48:17 2017 us=203160 management_client_group = '[UNDEF]' |
---|
119 | Mon Oct 23 21:48:17 2017 us=203257 management_flags = 0 |
---|
120 | Mon Oct 23 21:48:17 2017 us=203351 shared_secret_file = '[UNDEF]' |
---|
121 | Mon Oct 23 21:48:17 2017 us=203446 key_direction = 0 |
---|
122 | Mon Oct 23 21:48:17 2017 us=203539 ciphername = 'AES-256-GCM' |
---|
123 | Mon Oct 23 21:48:17 2017 us=203633 ncp_enabled = DISABLED |
---|
124 | Mon Oct 23 21:48:17 2017 us=203729 ncp_ciphers = 'AES-256-GCM:AES-128-GCM' |
---|
125 | Mon Oct 23 21:48:17 2017 us=203824 authname = 'SHA512' |
---|
126 | Mon Oct 23 21:48:17 2017 us=203918 prng_hash = 'SHA1' |
---|
127 | Mon Oct 23 21:48:17 2017 us=204016 prng_nonce_secret_len = 16 |
---|
128 | Mon Oct 23 21:48:17 2017 us=204111 keysize = 0 |
---|
129 | Mon Oct 23 21:48:17 2017 us=204206 engine = DISABLED |
---|
130 | Mon Oct 23 21:48:17 2017 us=204301 replay = ENABLED |
---|
131 | Mon Oct 23 21:48:17 2017 us=204397 mute_replay_warnings = DISABLED |
---|
132 | Mon Oct 23 21:48:17 2017 us=204493 replay_window = 64 |
---|
133 | Mon Oct 23 21:48:17 2017 us=204588 replay_time = 15 |
---|
134 | Mon Oct 23 21:48:17 2017 us=204684 packet_id_file = '[UNDEF]' |
---|
135 | Mon Oct 23 21:48:17 2017 us=204780 use_iv = ENABLED |
---|
136 | Mon Oct 23 21:48:17 2017 us=204876 test_crypto = DISABLED |
---|
137 | Mon Oct 23 21:48:17 2017 us=205062 tls_server = ENABLED |
---|
138 | Mon Oct 23 21:48:17 2017 us=205168 tls_client = DISABLED |
---|
139 | Mon Oct 23 21:48:17 2017 us=205294 key_method = 2 |
---|
140 | Mon Oct 23 21:48:17 2017 us=205392 ca_file = '/etc/openvpn/easy-rsa/keys/ca.crt' |
---|
141 | Mon Oct 23 21:48:17 2017 us=205488 ca_path = '[UNDEF]' |
---|
142 | Mon Oct 23 21:48:17 2017 us=205584 dh_file = '/etc/openvpn/easy-rsa/keys/dh2048.pem' |
---|
143 | Mon Oct 23 21:48:17 2017 us=205680 cert_file = '/etc/openvpn/easy-rsa/keys/server.crt' |
---|
144 | Mon Oct 23 21:48:17 2017 us=205776 extra_certs_file = '[UNDEF]' |
---|
145 | Mon Oct 23 21:48:17 2017 us=205876 priv_key_file = '/etc/openvpn/easy-rsa/keys/server.key' |
---|
146 | Mon Oct 23 21:48:17 2017 us=205972 pkcs12_file = '[UNDEF]' |
---|
147 | Mon Oct 23 21:48:17 2017 us=206069 cipher_list = 'TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256' |
---|
148 | Mon Oct 23 21:48:17 2017 us=206164 tls_verify = '[UNDEF]' |
---|
149 | Mon Oct 23 21:48:17 2017 us=206258 tls_export_cert = '[UNDEF]' |
---|
150 | Mon Oct 23 21:48:17 2017 us=206352 verify_x509_type = 0 |
---|
151 | Mon Oct 23 21:48:17 2017 us=206445 verify_x509_name = '[UNDEF]' |
---|
152 | Mon Oct 23 21:48:17 2017 us=206537 crl_file = '[UNDEF]' |
---|
153 | Mon Oct 23 21:48:17 2017 us=206631 ns_cert_type = 0 |
---|
154 | Mon Oct 23 21:48:17 2017 us=206726 remote_cert_ku[i] = 65535 |
---|
155 | Mon Oct 23 21:48:17 2017 us=206819 remote_cert_ku[i] = 0 |
---|
156 | Mon Oct 23 21:48:17 2017 us=206914 remote_cert_ku[i] = 0 |
---|
157 | Mon Oct 23 21:48:17 2017 us=207006 remote_cert_ku[i] = 0 |
---|
158 | Mon Oct 23 21:48:17 2017 us=207101 remote_cert_ku[i] = 0 |
---|
159 | Mon Oct 23 21:48:17 2017 us=207194 remote_cert_ku[i] = 0 |
---|
160 | Mon Oct 23 21:48:17 2017 us=207287 remote_cert_ku[i] = 0 |
---|
161 | Mon Oct 23 21:48:17 2017 us=207380 remote_cert_ku[i] = 0 |
---|
162 | Mon Oct 23 21:48:17 2017 us=207475 remote_cert_ku[i] = 0 |
---|
163 | Mon Oct 23 21:48:17 2017 us=207569 remote_cert_ku[i] = 0 |
---|
164 | Mon Oct 23 21:48:17 2017 us=207662 remote_cert_ku[i] = 0 |
---|
165 | Mon Oct 23 21:48:17 2017 us=207757 remote_cert_ku[i] = 0 |
---|
166 | Mon Oct 23 21:48:17 2017 us=207851 remote_cert_ku[i] = 0 |
---|
167 | Mon Oct 23 21:48:17 2017 us=207943 remote_cert_ku[i] = 0 |
---|
168 | Mon Oct 23 21:48:17 2017 us=208037 remote_cert_ku[i] = 0 |
---|
169 | Mon Oct 23 21:48:17 2017 us=208130 remote_cert_ku[i] = 0 |
---|
170 | Mon Oct 23 21:48:17 2017 us=208227 remote_cert_eku = 'TLS Web Client Authentication' |
---|
171 | Mon Oct 23 21:48:17 2017 us=208323 ssl_flags = 192 |
---|
172 | Mon Oct 23 21:48:17 2017 us=208416 tls_timeout = 2 |
---|
173 | Mon Oct 23 21:48:17 2017 us=208547 renegotiate_bytes = -1 |
---|
174 | Mon Oct 23 21:48:17 2017 us=208647 renegotiate_packets = 0 |
---|
175 | Mon Oct 23 21:48:17 2017 us=208743 renegotiate_seconds = 3600 |
---|
176 | Mon Oct 23 21:48:17 2017 us=208838 handshake_window = 60 |
---|
177 | Mon Oct 23 21:48:17 2017 us=208934 transition_window = 3600 |
---|
178 | Mon Oct 23 21:48:17 2017 us=209081 single_session = DISABLED |
---|
179 | Mon Oct 23 21:48:17 2017 us=209178 push_peer_info = DISABLED |
---|
180 | Mon Oct 23 21:48:17 2017 us=209274 tls_exit = DISABLED |
---|
181 | Mon Oct 23 21:48:17 2017 us=209368 tls_auth_file = '[UNDEF]' |
---|
182 | Mon Oct 23 21:48:17 2017 us=209462 tls_crypt_file = '/etc/openvpn/tc.key' |
---|
183 | Mon Oct 23 21:48:17 2017 us=209559 pkcs11_protected_authentication = DISABLED |
---|
184 | Mon Oct 23 21:48:17 2017 us=209655 pkcs11_protected_authentication = DISABLED |
---|
185 | Mon Oct 23 21:48:17 2017 us=209752 pkcs11_protected_authentication = DISABLED |
---|
186 | Mon Oct 23 21:48:17 2017 us=209848 pkcs11_protected_authentication = DISABLED |
---|
187 | Mon Oct 23 21:48:17 2017 us=209942 pkcs11_protected_authentication = DISABLED |
---|
188 | Mon Oct 23 21:48:17 2017 us=210036 pkcs11_protected_authentication = DISABLED |
---|
189 | Mon Oct 23 21:48:17 2017 us=210131 pkcs11_protected_authentication = DISABLED |
---|
190 | Mon Oct 23 21:48:17 2017 us=210225 pkcs11_protected_authentication = DISABLED |
---|
191 | Mon Oct 23 21:48:17 2017 us=210320 pkcs11_protected_authentication = DISABLED |
---|
192 | Mon Oct 23 21:48:17 2017 us=210415 pkcs11_protected_authentication = DISABLED |
---|
193 | Mon Oct 23 21:48:17 2017 us=210508 pkcs11_protected_authentication = DISABLED |
---|
194 | Mon Oct 23 21:48:17 2017 us=210603 pkcs11_protected_authentication = DISABLED |
---|
195 | Mon Oct 23 21:48:17 2017 us=210697 pkcs11_protected_authentication = DISABLED |
---|
196 | Mon Oct 23 21:48:17 2017 us=210791 pkcs11_protected_authentication = DISABLED |
---|
197 | Mon Oct 23 21:48:17 2017 us=210934 pkcs11_protected_authentication = DISABLED |
---|
198 | Mon Oct 23 21:48:17 2017 us=211032 pkcs11_protected_authentication = DISABLED |
---|
199 | Mon Oct 23 21:48:17 2017 us=211133 pkcs11_private_mode = 00000000 |
---|
200 | Mon Oct 23 21:48:17 2017 us=211228 pkcs11_private_mode = 00000000 |
---|
201 | Mon Oct 23 21:48:17 2017 us=211323 pkcs11_private_mode = 00000000 |
---|
202 | Mon Oct 23 21:48:17 2017 us=211418 pkcs11_private_mode = 00000000 |
---|
203 | Mon Oct 23 21:48:17 2017 us=211516 pkcs11_private_mode = 00000000 |
---|
204 | Mon Oct 23 21:48:17 2017 us=211612 pkcs11_private_mode = 00000000 |
---|
205 | Mon Oct 23 21:48:17 2017 us=211708 pkcs11_private_mode = 00000000 |
---|
206 | Mon Oct 23 21:48:17 2017 us=211803 pkcs11_private_mode = 00000000 |
---|
207 | Mon Oct 23 21:48:17 2017 us=211898 pkcs11_private_mode = 00000000 |
---|
208 | Mon Oct 23 21:48:17 2017 us=211995 pkcs11_private_mode = 00000000 |
---|
209 | Mon Oct 23 21:48:17 2017 us=212090 pkcs11_private_mode = 00000000 |
---|
210 | Mon Oct 23 21:48:17 2017 us=212186 pkcs11_private_mode = 00000000 |
---|
211 | Mon Oct 23 21:48:17 2017 us=212281 pkcs11_private_mode = 00000000 |
---|
212 | Mon Oct 23 21:48:17 2017 us=212375 pkcs11_private_mode = 00000000 |
---|
213 | Mon Oct 23 21:48:17 2017 us=212471 pkcs11_private_mode = 00000000 |
---|
214 | Mon Oct 23 21:48:17 2017 us=212565 pkcs11_private_mode = 00000000 |
---|
215 | Mon Oct 23 21:48:17 2017 us=212658 pkcs11_cert_private = DISABLED |
---|
216 | Mon Oct 23 21:48:17 2017 us=212753 pkcs11_cert_private = DISABLED |
---|
217 | Mon Oct 23 21:48:17 2017 us=212848 pkcs11_cert_private = DISABLED |
---|
218 | Mon Oct 23 21:48:17 2017 us=212942 pkcs11_cert_private = DISABLED |
---|
219 | Mon Oct 23 21:48:17 2017 us=213097 pkcs11_cert_private = DISABLED |
---|
220 | Mon Oct 23 21:48:17 2017 us=213195 pkcs11_cert_private = DISABLED |
---|
221 | Mon Oct 23 21:48:17 2017 us=213291 pkcs11_cert_private = DISABLED |
---|
222 | Mon Oct 23 21:48:17 2017 us=213387 pkcs11_cert_private = DISABLED |
---|
223 | Mon Oct 23 21:48:17 2017 us=213482 pkcs11_cert_private = DISABLED |
---|
224 | Mon Oct 23 21:48:17 2017 us=213623 pkcs11_cert_private = DISABLED |
---|
225 | Mon Oct 23 21:48:17 2017 us=213720 pkcs11_cert_private = DISABLED |
---|
226 | Mon Oct 23 21:48:17 2017 us=213815 pkcs11_cert_private = DISABLED |
---|
227 | Mon Oct 23 21:48:17 2017 us=213909 pkcs11_cert_private = DISABLED |
---|
228 | Mon Oct 23 21:48:17 2017 us=214004 pkcs11_cert_private = DISABLED |
---|
229 | Mon Oct 23 21:48:17 2017 us=214123 pkcs11_cert_private = DISABLED |
---|
230 | Mon Oct 23 21:48:17 2017 us=214222 pkcs11_cert_private = DISABLED |
---|
231 | Mon Oct 23 21:48:17 2017 us=214320 pkcs11_pin_cache_period = -1 |
---|
232 | Mon Oct 23 21:48:17 2017 us=214413 pkcs11_id = '[UNDEF]' |
---|
233 | Mon Oct 23 21:48:17 2017 us=214508 pkcs11_id_management = DISABLED |
---|
234 | Mon Oct 23 21:48:17 2017 us=214613 server_network = 192.168.8.0 |
---|
235 | Mon Oct 23 21:48:17 2017 us=214716 server_netmask = 255.255.255.0 |
---|
236 | Mon Oct 23 21:48:17 2017 us=214818 server_network_ipv6 = :: |
---|
237 | Mon Oct 23 21:48:17 2017 us=214916 server_netbits_ipv6 = 0 |
---|
238 | Mon Oct 23 21:48:17 2017 us=215018 server_bridge_ip = 0.0.0.0 |
---|
239 | Mon Oct 23 21:48:17 2017 us=215120 server_bridge_netmask = 0.0.0.0 |
---|
240 | Mon Oct 23 21:48:17 2017 us=215224 server_bridge_pool_start = 0.0.0.0 |
---|
241 | Mon Oct 23 21:48:17 2017 us=215326 server_bridge_pool_end = 0.0.0.0 |
---|
242 | Mon Oct 23 21:48:17 2017 us=215421 push_entry = 'redirect-gateway autolocal bypass-dhcp' |
---|
243 | Mon Oct 23 21:48:17 2017 us=215519 push_entry = 'route 192.168.1.0 255.255.255.0' |
---|
244 | Mon Oct 23 21:48:17 2017 us=215616 push_entry = 'dhcp-option DNS 192.168.1.1' |
---|
245 | Mon Oct 23 21:48:17 2017 us=215711 push_entry = 'route 192.168.8.1' |
---|
246 | Mon Oct 23 21:48:17 2017 us=215806 push_entry = 'topology net30' |
---|
247 | Mon Oct 23 21:48:17 2017 us=215900 ifconfig_pool_defined = ENABLED |
---|
248 | Mon Oct 23 21:48:17 2017 us=216002 ifconfig_pool_start = 192.168.8.4 |
---|
249 | Mon Oct 23 21:48:17 2017 us=216104 ifconfig_pool_end = 192.168.8.251 |
---|
250 | Mon Oct 23 21:48:17 2017 us=216206 ifconfig_pool_netmask = 0.0.0.0 |
---|
251 | Mon Oct 23 21:48:17 2017 us=216301 ifconfig_pool_persist_filename = 'ipp.txt' |
---|
252 | Mon Oct 23 21:48:17 2017 us=216399 ifconfig_pool_persist_refresh_freq = 600 |
---|
253 | Mon Oct 23 21:48:17 2017 us=216496 ifconfig_ipv6_pool_defined = DISABLED |
---|
254 | Mon Oct 23 21:48:17 2017 us=216598 ifconfig_ipv6_pool_base = :: |
---|
255 | Mon Oct 23 21:48:17 2017 us=216695 ifconfig_ipv6_pool_netbits = 0 |
---|
256 | Mon Oct 23 21:48:17 2017 us=216834 n_bcast_buf = 256 |
---|
257 | Mon Oct 23 21:48:17 2017 us=216933 tcp_queue_limit = 64 |
---|
258 | Mon Oct 23 21:48:17 2017 us=217080 real_hash_size = 256 |
---|
259 | Mon Oct 23 21:48:17 2017 us=217178 virtual_hash_size = 256 |
---|
260 | Mon Oct 23 21:48:17 2017 us=217273 client_connect_script = '[UNDEF]' |
---|
261 | Mon Oct 23 21:48:17 2017 us=217368 learn_address_script = '[UNDEF]' |
---|
262 | Mon Oct 23 21:48:17 2017 us=217463 client_disconnect_script = '[UNDEF]' |
---|
263 | Mon Oct 23 21:48:17 2017 us=217560 client_config_dir = '[UNDEF]' |
---|
264 | Mon Oct 23 21:48:17 2017 us=217654 ccd_exclusive = DISABLED |
---|
265 | Mon Oct 23 21:48:17 2017 us=217750 tmp_dir = '/tmp' |
---|
266 | Mon Oct 23 21:48:17 2017 us=217847 push_ifconfig_defined = DISABLED |
---|
267 | Mon Oct 23 21:48:17 2017 us=217950 push_ifconfig_local = 0.0.0.0 |
---|
268 | Mon Oct 23 21:48:17 2017 us=218054 push_ifconfig_remote_netmask = 0.0.0.0 |
---|
269 | Mon Oct 23 21:48:17 2017 us=218147 push_ifconfig_ipv6_defined = DISABLED |
---|
270 | Mon Oct 23 21:48:17 2017 us=218249 push_ifconfig_ipv6_local = ::/0 |
---|
271 | Mon Oct 23 21:48:17 2017 us=218350 push_ifconfig_ipv6_remote = :: |
---|
272 | Mon Oct 23 21:48:17 2017 us=218446 enable_c2c = DISABLED |
---|
273 | Mon Oct 23 21:48:17 2017 us=218542 duplicate_cn = DISABLED |
---|
274 | Mon Oct 23 21:48:17 2017 us=218636 cf_max = 0 |
---|
275 | Mon Oct 23 21:48:17 2017 us=218732 cf_per = 0 |
---|
276 | Mon Oct 23 21:48:17 2017 us=218826 max_clients = 3 |
---|
277 | Mon Oct 23 21:48:17 2017 us=218922 max_routes_per_client = 256 |
---|
278 | Mon Oct 23 21:48:17 2017 us=219017 auth_user_pass_verify_script = '[UNDEF]' |
---|
279 | Mon Oct 23 21:48:17 2017 us=219115 auth_user_pass_verify_script_via_file = DISABLED |
---|
280 | Mon Oct 23 21:48:17 2017 us=219209 auth_token_generate = DISABLED |
---|
281 | Mon Oct 23 21:48:17 2017 us=219305 auth_token_lifetime = 0 |
---|
282 | Mon Oct 23 21:48:17 2017 us=219400 port_share_host = '[UNDEF]' |
---|
283 | Mon Oct 23 21:48:17 2017 us=219495 port_share_port = '[UNDEF]' |
---|
284 | Mon Oct 23 21:48:17 2017 us=219588 client = DISABLED |
---|
285 | Mon Oct 23 21:48:17 2017 us=219682 pull = DISABLED |
---|
286 | Mon Oct 23 21:48:17 2017 us=219776 auth_user_pass_file = '[UNDEF]' |
---|
287 | Mon Oct 23 21:48:17 2017 us=219882 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017 |
---|
288 | Mon Oct 23 21:48:17 2017 us=220010 library versions: OpenSSL 1.0.1f 6 Jan 2014, LZO 2.06 |
---|
289 | Mon Oct 23 21:48:17 2017 us=220623 WARNING: --ping should normally be used with --ping-restart or --ping-exit |
---|
290 | Mon Oct 23 21:48:17 2017 us=220728 WARNING: --keepalive option is missing from server config |
---|
291 | Mon Oct 23 21:48:17 2017 us=297831 Diffie-Hellman initialized with 2048 bit key |
---|
292 | Mon Oct 23 21:48:17 2017 us=299656 Failed to extract curve from certificate (UNDEF), using secp384r1 instead. |
---|
293 | Mon Oct 23 21:48:17 2017 us=299745 ECDH curve secp384r1 added |
---|
294 | Mon Oct 23 21:48:17 2017 us=300127 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key |
---|
295 | Mon Oct 23 21:48:17 2017 us=300212 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication |
---|
296 | Mon Oct 23 21:48:17 2017 us=300272 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key |
---|
297 | Mon Oct 23 21:48:17 2017 us=300342 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication |
---|
298 | Mon Oct 23 21:48:17 2017 us=300413 TLS-Auth MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
299 | Mon Oct 23 21:48:17 2017 us=300844 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=00:24:27:fe:4c:15 |
---|
300 | Mon Oct 23 21:48:17 2017 us=302082 TUN/TAP device tun0 opened |
---|
301 | Mon Oct 23 21:48:17 2017 us=302195 TUN/TAP TX queue length set to 100 |
---|
302 | Mon Oct 23 21:48:17 2017 us=302275 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 |
---|
303 | Mon Oct 23 21:48:17 2017 us=302361 /sbin/ip link set dev tun0 up mtu 1500 |
---|
304 | Mon Oct 23 21:48:17 2017 us=306443 /sbin/ip addr add dev tun0 local 192.168.8.1 peer 192.168.8.2 |
---|
305 | Mon Oct 23 21:48:17 2017 us=310226 /sbin/ip route add 192.168.8.0/24 via 192.168.8.2 |
---|
306 | Mon Oct 23 21:48:17 2017 us=314924 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
307 | Mon Oct 23 21:48:17 2017 us=315038 Could not determine IPv4/IPv6 protocol. Using AF_INET |
---|
308 | Mon Oct 23 21:48:17 2017 us=315116 Socket Buffers: R=[212992->212992] S=[212992->212992] |
---|
309 | Mon Oct 23 21:48:17 2017 us=315227 UDPv4 link local (bound): [AF_INET]192.168.1.64:443 |
---|
310 | Mon Oct 23 21:48:17 2017 us=315278 UDPv4 link remote: [AF_UNSPEC] |
---|
311 | Mon Oct 23 21:48:17 2017 us=315340 MULTI: multi_init called, r=256 v=256 |
---|
312 | Mon Oct 23 21:48:17 2017 us=315450 IFCONFIG POOL: base=192.168.8.4 size=62, ipv6=0 |
---|
313 | Mon Oct 23 21:48:17 2017 us=324537 ifconfig_pool_read(), in='phone,192.168.8.4', TODO: IPv6 |
---|
314 | Mon Oct 23 21:48:17 2017 us=324623 succeeded -> ifconfig_pool_set() |
---|
315 | Mon Oct 23 21:48:17 2017 us=324675 IFCONFIG POOL LIST |
---|
316 | Mon Oct 23 21:48:17 2017 us=324725 phone,192.168.8.4 |
---|
317 | Mon Oct 23 21:48:17 2017 us=324825 Initialization Sequence Completed |
---|
318 | Mon Oct 23 21:48:46 2017 us=113151 MULTI: multi_create_instance called |
---|
319 | Mon Oct 23 21:48:46 2017 us=113509 192.168.1.1:57131 Re-using SSL/TLS context |
---|
320 | Mon Oct 23 21:48:46 2017 us=113641 192.168.1.1:57131 LZ4 compression initializing |
---|
321 | Mon Oct 23 21:48:46 2017 us=114311 192.168.1.1:57131 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
322 | Mon Oct 23 21:48:46 2017 us=114428 192.168.1.1:57131 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
323 | Mon Oct 23 21:48:46 2017 us=114669 192.168.1.1:57131 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
324 | Mon Oct 23 21:48:46 2017 us=114810 192.168.1.1:57131 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
325 | Mon Oct 23 21:48:46 2017 us=115026 192.168.1.1:57131 TLS: Initial packet from [AF_INET]192.168.1.1:57131, sid=9aaed749 bd0dad3b |
---|
326 | Mon Oct 23 21:48:46 2017 us=422735 192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
327 | Mon Oct 23 21:48:46 2017 us=424713 192.168.1.1:57131 VERIFY KU OK |
---|
328 | Mon Oct 23 21:48:46 2017 us=424842 192.168.1.1:57131 Validating certificate extended key usage |
---|
329 | Mon Oct 23 21:48:46 2017 us=424944 192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
330 | Mon Oct 23 21:48:46 2017 us=425087 192.168.1.1:57131 VERIFY EKU OK |
---|
331 | Mon Oct 23 21:48:46 2017 us=425180 192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
332 | Mon Oct 23 21:48:46 2017 us=528521 192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
333 | Mon Oct 23 21:48:46 2017 us=528705 192.168.1.1:57131 peer info: IV_PLAT=android |
---|
334 | Mon Oct 23 21:48:46 2017 us=528806 192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
335 | Mon Oct 23 21:48:46 2017 us=528903 192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
336 | Mon Oct 23 21:48:46 2017 us=529080 192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
337 | Mon Oct 23 21:48:46 2017 us=529187 192.168.1.1:57131 peer info: IV_LZO=1 |
---|
338 | Mon Oct 23 21:48:46 2017 us=529285 192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
339 | Mon Oct 23 21:48:46 2017 us=529384 192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
340 | Mon Oct 23 21:48:46 2017 us=529481 192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
341 | Mon Oct 23 21:48:46 2017 us=529581 192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
342 | Mon Oct 23 21:48:46 2017 us=530308 192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
343 | Mon Oct 23 21:48:46 2017 us=530436 192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
344 | Mon Oct 23 21:48:46 2017 us=534911 192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
345 | Mon Oct 23 21:48:46 2017 us=535189 192.168.1.1:57131 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:57131 |
---|
346 | Mon Oct 23 21:48:46 2017 us=535403 phone/192.168.1.1:57131 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
347 | Mon Oct 23 21:48:46 2017 us=535741 phone/192.168.1.1:57131 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:57131 |
---|
348 | Mon Oct 23 21:48:46 2017 us=535854 phone/192.168.1.1:57131 MULTI: primary virtual IP for phone/192.168.1.1:57131: 192.168.8.6 |
---|
349 | Mon Oct 23 21:48:47 2017 us=649582 phone/192.168.1.1:57131 PUSH: Received control message: 'PUSH_REQUEST' |
---|
350 | Mon Oct 23 21:48:47 2017 us=649918 phone/192.168.1.1:57131 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) |
---|
351 | Mon Oct 23 21:52:39 2017 us=800910 Float requested for peer 0 to 172.56.39.104:23919 |
---|
352 | Mon Oct 23 21:52:39 2017 us=801289 peer 0 (phone) floated from 192.168.1.1:57131 to [AF_INET]172.56.39.104:23919 |
---|
353 | Mon Oct 23 21:53:25 2017 us=777935 Float requested for peer 0 to 192.168.1.1:57131 |
---|
354 | Mon Oct 23 21:53:25 2017 us=778233 peer 0 (phone) floated from 172.56.39.104:23919 to [AF_INET]192.168.1.1:57131 |
---|
355 | Mon Oct 23 22:48:47 2017 us=24269 phone/192.168.1.1:57131 TLS: soft reset sec=-1 bytes=2155185/-1 pkts=5515/0 |
---|
356 | Mon Oct 23 22:48:47 2017 us=550326 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
357 | Mon Oct 23 22:48:47 2017 us=552319 phone/192.168.1.1:57131 VERIFY KU OK |
---|
358 | Mon Oct 23 22:48:47 2017 us=552453 phone/192.168.1.1:57131 Validating certificate extended key usage |
---|
359 | Mon Oct 23 22:48:47 2017 us=552559 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
360 | Mon Oct 23 22:48:47 2017 us=552654 phone/192.168.1.1:57131 VERIFY EKU OK |
---|
361 | Mon Oct 23 22:48:47 2017 us=552746 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
362 | Mon Oct 23 22:48:47 2017 us=659373 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
363 | Mon Oct 23 22:48:47 2017 us=659566 phone/192.168.1.1:57131 peer info: IV_PLAT=android |
---|
364 | Mon Oct 23 22:48:47 2017 us=659674 phone/192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
365 | Mon Oct 23 22:48:47 2017 us=659778 phone/192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
366 | Mon Oct 23 22:48:47 2017 us=659879 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
367 | Mon Oct 23 22:48:47 2017 us=659983 phone/192.168.1.1:57131 peer info: IV_LZO=1 |
---|
368 | Mon Oct 23 22:48:47 2017 us=660088 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
369 | Mon Oct 23 22:48:47 2017 us=660189 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
370 | Mon Oct 23 22:48:47 2017 us=660291 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
371 | Mon Oct 23 22:48:47 2017 us=660395 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
372 | Mon Oct 23 22:48:47 2017 us=661224 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
373 | Mon Oct 23 22:48:47 2017 us=661354 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
374 | Mon Oct 23 22:48:47 2017 us=666466 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
375 | Mon Oct 23 23:48:47 2017 us=756306 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=594380/-1 pkts=2193/0 |
---|
376 | Mon Oct 23 23:48:48 2017 us=694325 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
377 | Mon Oct 23 23:48:48 2017 us=696307 phone/192.168.1.1:57131 VERIFY KU OK |
---|
378 | Mon Oct 23 23:48:48 2017 us=696434 phone/192.168.1.1:57131 Validating certificate extended key usage |
---|
379 | Mon Oct 23 23:48:48 2017 us=696543 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
380 | Mon Oct 23 23:48:48 2017 us=696638 phone/192.168.1.1:57131 VERIFY EKU OK |
---|
381 | Mon Oct 23 23:48:48 2017 us=696732 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
382 | Mon Oct 23 23:48:48 2017 us=801768 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
383 | Mon Oct 23 23:48:48 2017 us=801956 phone/192.168.1.1:57131 peer info: IV_PLAT=android |
---|
384 | Mon Oct 23 23:48:48 2017 us=802063 phone/192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
385 | Mon Oct 23 23:48:48 2017 us=802166 phone/192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
386 | Mon Oct 23 23:48:48 2017 us=802334 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
387 | Mon Oct 23 23:48:48 2017 us=802437 phone/192.168.1.1:57131 peer info: IV_LZO=1 |
---|
388 | Mon Oct 23 23:48:48 2017 us=802537 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
389 | Mon Oct 23 23:48:48 2017 us=802636 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
390 | Mon Oct 23 23:48:48 2017 us=802735 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
391 | Mon Oct 23 23:48:48 2017 us=802834 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
392 | Mon Oct 23 23:48:48 2017 us=803566 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
393 | Mon Oct 23 23:48:48 2017 us=803698 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
394 | Mon Oct 23 23:48:48 2017 us=811107 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
395 | Tue Oct 24 00:48:47 2017 us=281447 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key |
---|
396 | Tue Oct 24 00:48:48 2017 us=474187 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=516743/-1 pkts=2308/0 |
---|
397 | Tue Oct 24 00:48:53 2017 us=732577 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
398 | Tue Oct 24 00:48:53 2017 us=734713 phone/192.168.1.1:57131 VERIFY KU OK |
---|
399 | Tue Oct 24 00:48:53 2017 us=734855 phone/192.168.1.1:57131 Validating certificate extended key usage |
---|
400 | Tue Oct 24 00:48:53 2017 us=734967 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
401 | Tue Oct 24 00:48:53 2017 us=735063 phone/192.168.1.1:57131 VERIFY EKU OK |
---|
402 | Tue Oct 24 00:48:53 2017 us=735156 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
403 | Tue Oct 24 00:48:53 2017 us=849423 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
404 | Tue Oct 24 00:48:53 2017 us=849615 phone/192.168.1.1:57131 peer info: IV_PLAT=android |
---|
405 | Tue Oct 24 00:48:53 2017 us=849723 phone/192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
406 | Tue Oct 24 00:48:53 2017 us=849825 phone/192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
407 | Tue Oct 24 00:48:53 2017 us=849927 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
408 | Tue Oct 24 00:48:53 2017 us=850028 phone/192.168.1.1:57131 peer info: IV_LZO=1 |
---|
409 | Tue Oct 24 00:48:53 2017 us=850130 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
410 | Tue Oct 24 00:48:53 2017 us=850234 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
411 | Tue Oct 24 00:48:53 2017 us=850337 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
412 | Tue Oct 24 00:48:53 2017 us=850440 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
413 | Tue Oct 24 00:48:53 2017 us=851181 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
414 | Tue Oct 24 00:48:53 2017 us=851314 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
415 | Tue Oct 24 00:48:53 2017 us=856633 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
416 | Tue Oct 24 01:48:48 2017 us=857869 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key |
---|
417 | Tue Oct 24 01:48:54 2017 us=95878 phone/192.168.1.1:57131 TLS: soft reset sec=-1 bytes=483731/-1 pkts=2147/0 |
---|
418 | Tue Oct 24 01:48:54 2017 us=658119 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
419 | Tue Oct 24 01:48:54 2017 us=660155 phone/192.168.1.1:57131 VERIFY KU OK |
---|
420 | Tue Oct 24 01:48:54 2017 us=660288 phone/192.168.1.1:57131 Validating certificate extended key usage |
---|
421 | Tue Oct 24 01:48:54 2017 us=660396 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
422 | Tue Oct 24 01:48:54 2017 us=660493 phone/192.168.1.1:57131 VERIFY EKU OK |
---|
423 | Tue Oct 24 01:48:54 2017 us=660587 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
424 | Tue Oct 24 01:48:54 2017 us=763903 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
425 | Tue Oct 24 01:48:54 2017 us=764149 phone/192.168.1.1:57131 peer info: IV_PLAT=android |
---|
426 | Tue Oct 24 01:48:54 2017 us=764256 phone/192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
427 | Tue Oct 24 01:48:54 2017 us=764355 phone/192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
428 | Tue Oct 24 01:48:54 2017 us=764453 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
429 | Tue Oct 24 01:48:54 2017 us=764550 phone/192.168.1.1:57131 peer info: IV_LZO=1 |
---|
430 | Tue Oct 24 01:48:54 2017 us=764647 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
431 | Tue Oct 24 01:48:54 2017 us=764745 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
432 | Tue Oct 24 01:48:54 2017 us=764844 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
433 | Tue Oct 24 01:48:54 2017 us=764942 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
434 | Tue Oct 24 01:48:54 2017 us=765746 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
435 | Tue Oct 24 01:48:54 2017 us=765875 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
436 | Tue Oct 24 01:48:54 2017 us=769773 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
437 | Tue Oct 24 02:48:54 2017 us=701177 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=624107/-1 pkts=2481/0 |
---|
438 | Tue Oct 24 02:48:56 2017 us=205868 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
439 | Tue Oct 24 02:48:56 2017 us=207874 phone/192.168.1.1:57131 VERIFY KU OK |
---|
440 | Tue Oct 24 02:48:56 2017 us=208017 phone/192.168.1.1:57131 Validating certificate extended key usage |
---|
441 | Tue Oct 24 02:48:56 2017 us=208125 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
442 | Tue Oct 24 02:48:56 2017 us=208221 phone/192.168.1.1:57131 VERIFY EKU OK |
---|
443 | Tue Oct 24 02:48:56 2017 us=208316 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
444 | Tue Oct 24 02:48:56 2017 us=310652 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
445 | Tue Oct 24 02:48:56 2017 us=310843 phone/192.168.1.1:57131 peer info: IV_PLAT=android |
---|
446 | Tue Oct 24 02:48:56 2017 us=310949 phone/192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
447 | Tue Oct 24 02:48:56 2017 us=311052 phone/192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
448 | Tue Oct 24 02:48:56 2017 us=311153 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
449 | Tue Oct 24 02:48:56 2017 us=311254 phone/192.168.1.1:57131 peer info: IV_LZO=1 |
---|
450 | Tue Oct 24 02:48:56 2017 us=311356 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
451 | Tue Oct 24 02:48:56 2017 us=311459 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
452 | Tue Oct 24 02:48:56 2017 us=311560 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
453 | Tue Oct 24 02:48:56 2017 us=311661 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
454 | Tue Oct 24 02:48:56 2017 us=312403 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
455 | Tue Oct 24 02:48:56 2017 us=312533 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
456 | Tue Oct 24 02:48:56 2017 us=317103 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
457 | Tue Oct 24 03:48:54 2017 us=350527 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key |
---|
458 | Tue Oct 24 03:48:56 2017 us=514322 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=356379/-1 pkts=1641/0 |
---|
459 | Tue Oct 24 03:49:00 2017 us=34337 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
460 | Tue Oct 24 03:49:00 2017 us=36357 phone/192.168.1.1:57131 VERIFY KU OK |
---|
461 | Tue Oct 24 03:49:00 2017 us=36518 phone/192.168.1.1:57131 Validating certificate extended key usage |
---|
462 | Tue Oct 24 03:49:00 2017 us=36628 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
463 | Tue Oct 24 03:49:00 2017 us=36726 phone/192.168.1.1:57131 VERIFY EKU OK |
---|
464 | Tue Oct 24 03:49:00 2017 us=36883 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
465 | Tue Oct 24 03:49:00 2017 us=142833 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
466 | Tue Oct 24 03:49:00 2017 us=143031 phone/192.168.1.1:57131 peer info: IV_PLAT=android |
---|
467 | Tue Oct 24 03:49:00 2017 us=143135 phone/192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
468 | Tue Oct 24 03:49:00 2017 us=143234 phone/192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
469 | Tue Oct 24 03:49:00 2017 us=143331 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
470 | Tue Oct 24 03:49:00 2017 us=143429 phone/192.168.1.1:57131 peer info: IV_LZO=1 |
---|
471 | Tue Oct 24 03:49:00 2017 us=143528 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
472 | Tue Oct 24 03:49:00 2017 us=143628 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
473 | Tue Oct 24 03:49:00 2017 us=143727 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
474 | Tue Oct 24 03:49:00 2017 us=143826 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
475 | Tue Oct 24 03:49:00 2017 us=144563 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
476 | Tue Oct 24 03:49:00 2017 us=144695 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
477 | Tue Oct 24 03:49:00 2017 us=149016 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
478 | Tue Oct 24 04:02:59 2017 us=889660 phone/192.168.1.1:57131 PID_ERR replay-window backtrack occurred [127] [SSL-6] [0000000000000000000000000000000000000000000000000000000000000000] 0:35491 0:35364 t=1508839379[0] r=[-4,64,15,127,1] sl=[29,64,64,528] |
---|
479 | Tue Oct 24 04:02:59 2017 us=889751 phone/192.168.1.1:57131 PID_ERR large diff [127] [SSL-6] [0000000000000000000000000000000000000000000000000000000000000000] 0:35491 0:35364 t=1508839379[0] r=[-4,64,15,127,1] sl=[29,64,64,528] |
---|
480 | Tue Oct 24 04:02:59 2017 us=889775 phone/192.168.1.1:57131 AEAD Decrypt error: bad packet ID (may be a replay): [ #35364 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings |
---|
481 | Tue Oct 24 04:43:10 2017 us=460926 Float requested for peer 0 to 192.168.1.1:1024 |
---|
482 | Tue Oct 24 04:43:10 2017 us=461309 peer 0 (phone) floated from 192.168.1.1:57131 to [AF_INET]192.168.1.1:1024 |
---|
483 | Tue Oct 24 04:43:10 2017 us=462335 Float requested for peer 0 to 192.168.1.1:57131 |
---|
484 | Tue Oct 24 04:43:10 2017 us=462494 peer 0 (phone) floated from 192.168.1.1:1024 to [AF_INET]192.168.1.1:57131 |
---|
485 | Tue Oct 24 04:48:56 2017 us=197945 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key |
---|
486 | Tue Oct 24 04:49:00 2017 us=326091 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=594131847/-1 pkts=661581/0 |
---|
487 | Tue Oct 24 04:49:00 2017 us=921726 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
488 | Tue Oct 24 04:49:00 2017 us=923710 phone/192.168.1.1:57131 VERIFY KU OK |
---|
489 | Tue Oct 24 04:49:00 2017 us=923847 phone/192.168.1.1:57131 Validating certificate extended key usage |
---|
490 | Tue Oct 24 04:49:00 2017 us=923957 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
491 | Tue Oct 24 04:49:00 2017 us=924053 phone/192.168.1.1:57131 VERIFY EKU OK |
---|
492 | Tue Oct 24 04:49:00 2017 us=924147 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
493 | Tue Oct 24 04:49:01 2017 us=146758 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
494 | Tue Oct 24 04:49:01 2017 us=146952 phone/192.168.1.1:57131 peer info: IV_PLAT=android |
---|
495 | Tue Oct 24 04:49:01 2017 us=147059 phone/192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
496 | Tue Oct 24 04:49:01 2017 us=147159 phone/192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
497 | Tue Oct 24 04:49:01 2017 us=147261 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
498 | Tue Oct 24 04:49:01 2017 us=147363 phone/192.168.1.1:57131 peer info: IV_LZO=1 |
---|
499 | Tue Oct 24 04:49:01 2017 us=147464 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
500 | Tue Oct 24 04:49:01 2017 us=147629 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
501 | Tue Oct 24 04:49:01 2017 us=147733 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
502 | Tue Oct 24 04:49:01 2017 us=147834 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
503 | Tue Oct 24 04:49:01 2017 us=148570 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
504 | Tue Oct 24 04:49:01 2017 us=148698 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
505 | Tue Oct 24 04:49:01 2017 us=154527 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
506 | Tue Oct 24 05:49:00 2017 us=945541 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key |
---|
507 | Tue Oct 24 05:49:01 2017 us=993765 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=628698/-1 pkts=2136/0 |
---|
508 | Tue Oct 24 05:49:08 2017 us=307602 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
509 | Tue Oct 24 05:49:08 2017 us=310304 phone/192.168.1.1:57131 VERIFY KU OK |
---|
510 | Tue Oct 24 05:49:08 2017 us=310466 phone/192.168.1.1:57131 Validating certificate extended key usage |
---|
511 | Tue Oct 24 05:49:08 2017 us=310577 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
512 | Tue Oct 24 05:49:08 2017 us=310672 phone/192.168.1.1:57131 VERIFY EKU OK |
---|
513 | Tue Oct 24 05:49:08 2017 us=310766 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
514 | Tue Oct 24 05:49:08 2017 us=447972 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
515 | Tue Oct 24 05:49:08 2017 us=448169 phone/192.168.1.1:57131 peer info: IV_PLAT=android |
---|
516 | Tue Oct 24 05:49:08 2017 us=448275 phone/192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
517 | Tue Oct 24 05:49:08 2017 us=448378 phone/192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
518 | Tue Oct 24 05:49:08 2017 us=448478 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
519 | Tue Oct 24 05:49:08 2017 us=448577 phone/192.168.1.1:57131 peer info: IV_LZO=1 |
---|
520 | Tue Oct 24 05:49:08 2017 us=448678 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
521 | Tue Oct 24 05:49:08 2017 us=448779 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
522 | Tue Oct 24 05:49:08 2017 us=448881 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
523 | Tue Oct 24 05:49:08 2017 us=449058 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
524 | Tue Oct 24 05:49:08 2017 us=449926 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
525 | Tue Oct 24 05:49:08 2017 us=450088 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
526 | Tue Oct 24 05:49:08 2017 us=460305 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
527 | Tue Oct 24 06:49:01 2017 us=272937 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key |
---|
528 | Tue Oct 24 06:49:08 2017 us=680505 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
529 | Tue Oct 24 06:49:08 2017 us=682608 phone/192.168.1.1:57131 VERIFY KU OK |
---|
530 | Tue Oct 24 06:49:08 2017 us=682758 phone/192.168.1.1:57131 Validating certificate extended key usage |
---|
531 | Tue Oct 24 06:49:08 2017 us=682867 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
532 | Tue Oct 24 06:49:08 2017 us=682965 phone/192.168.1.1:57131 VERIFY EKU OK |
---|
533 | Tue Oct 24 06:49:08 2017 us=683060 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
534 | Tue Oct 24 06:49:08 2017 us=790405 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master |
---|
535 | Tue Oct 24 06:49:08 2017 us=790585 phone/192.168.1.1:57131 peer info: IV_PLAT=android |
---|
536 | Tue Oct 24 06:49:08 2017 us=790693 phone/192.168.1.1:57131 peer info: IV_PROTO=2 |
---|
537 | Tue Oct 24 06:49:08 2017 us=790795 phone/192.168.1.1:57131 peer info: IV_LZ4=1 |
---|
538 | Tue Oct 24 06:49:08 2017 us=790897 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 |
---|
539 | Tue Oct 24 06:49:08 2017 us=791080 phone/192.168.1.1:57131 peer info: IV_LZO=1 |
---|
540 | Tue Oct 24 06:49:08 2017 us=791182 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 |
---|
541 | Tue Oct 24 06:49:08 2017 us=791281 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 |
---|
542 | Tue Oct 24 06:49:08 2017 us=791379 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 |
---|
543 | Tue Oct 24 06:49:08 2017 us=791519 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
544 | Tue Oct 24 06:49:08 2017 us=792247 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
545 | Tue Oct 24 06:49:08 2017 us=792377 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
546 | Tue Oct 24 06:49:08 2017 us=803333 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
547 | Tue Oct 24 07:07:12 2017 us=679519 Float requested for peer 0 to 172.56.39.254:46919 |
---|
548 | Tue Oct 24 07:07:12 2017 us=680246 peer 0 (phone) floated from 192.168.1.1:57131 to [AF_INET]172.56.39.254:46919 |
---|
549 | Tue Oct 24 07:07:15 2017 us=941365 Float requested for peer 0 to 192.168.1.1:57131 |
---|
550 | Tue Oct 24 07:07:15 2017 us=941624 peer 0 (phone) floated from 172.56.39.254:46919 to [AF_INET]192.168.1.1:57131 |
---|
551 | Tue Oct 24 07:07:49 2017 us=4224 MULTI: multi_create_instance called |
---|
552 | Tue Oct 24 07:07:49 2017 us=12804 192.168.1.1:56035 Re-using SSL/TLS context |
---|
553 | Tue Oct 24 07:07:49 2017 us=12907 192.168.1.1:56035 LZ4 compression initializing |
---|
554 | Tue Oct 24 07:07:49 2017 us=13146 192.168.1.1:56035 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
555 | Tue Oct 24 07:07:49 2017 us=13182 192.168.1.1:56035 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
556 | Tue Oct 24 07:07:49 2017 us=13268 192.168.1.1:56035 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
557 | Tue Oct 24 07:07:49 2017 us=13305 192.168.1.1:56035 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
558 | Tue Oct 24 07:07:49 2017 us=13380 192.168.1.1:56035 TLS: Initial packet from [AF_INET]192.168.1.1:56035, sid=8bef5a22 9492a94c |
---|
559 | Tue Oct 24 07:07:49 2017 us=329720 192.168.1.1:56035 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
560 | Tue Oct 24 07:07:49 2017 us=330259 192.168.1.1:56035 VERIFY KU OK |
---|
561 | Tue Oct 24 07:07:49 2017 us=330304 192.168.1.1:56035 Validating certificate extended key usage |
---|
562 | Tue Oct 24 07:07:49 2017 us=330331 192.168.1.1:56035 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
563 | Tue Oct 24 07:07:49 2017 us=330355 192.168.1.1:56035 VERIFY EKU OK |
---|
564 | Tue Oct 24 07:07:49 2017 us=330378 192.168.1.1:56035 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
565 | Tue Oct 24 07:07:49 2017 us=359096 192.168.1.1:56035 peer info: IV_VER=2.5_master |
---|
566 | Tue Oct 24 07:07:49 2017 us=359177 192.168.1.1:56035 peer info: IV_PLAT=android |
---|
567 | Tue Oct 24 07:07:49 2017 us=359202 192.168.1.1:56035 peer info: IV_PROTO=2 |
---|
568 | Tue Oct 24 07:07:49 2017 us=359226 192.168.1.1:56035 peer info: IV_LZ4=1 |
---|
569 | Tue Oct 24 07:07:49 2017 us=359250 192.168.1.1:56035 peer info: IV_LZ4v2=1 |
---|
570 | Tue Oct 24 07:07:49 2017 us=359273 192.168.1.1:56035 peer info: IV_LZO=1 |
---|
571 | Tue Oct 24 07:07:49 2017 us=359297 192.168.1.1:56035 peer info: IV_COMP_STUB=1 |
---|
572 | Tue Oct 24 07:07:49 2017 us=359320 192.168.1.1:56035 peer info: IV_COMP_STUBv2=1 |
---|
573 | Tue Oct 24 07:07:49 2017 us=359344 192.168.1.1:56035 peer info: IV_TCPNL=1 |
---|
574 | Tue Oct 24 07:07:49 2017 us=359368 192.168.1.1:56035 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
575 | Tue Oct 24 07:07:49 2017 us=359545 192.168.1.1:56035 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
576 | Tue Oct 24 07:07:49 2017 us=359576 192.168.1.1:56035 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
577 | Tue Oct 24 07:07:49 2017 us=362662 192.168.1.1:56035 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
578 | Tue Oct 24 07:07:49 2017 us=362982 192.168.1.1:56035 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:56035 |
---|
579 | Tue Oct 24 07:07:49 2017 us=372749 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
580 | Tue Oct 24 07:07:49 2017 us=372917 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
581 | Tue Oct 24 07:07:49 2017 us=373376 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:56035 |
---|
582 | Tue Oct 24 07:07:49 2017 us=373479 MULTI: primary virtual IP for phone/192.168.1.1:56035: 192.168.8.6 |
---|
583 | Tue Oct 24 07:07:50 2017 us=384442 phone/192.168.1.1:56035 PUSH: Received control message: 'PUSH_REQUEST' |
---|
584 | Tue Oct 24 07:07:50 2017 us=384658 phone/192.168.1.1:56035 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) |
---|
585 | Tue Oct 24 07:47:19 2017 us=674031 phone/192.168.1.1:56035 PID_ERR replay-window backtrack occurred [120] [SSL-0] [0000000000000000000000000000000000000000000000000000000000000000] 0:712213 0:712093 t=1508852839[0] r=[-3,64,15,120,1] sl=[43,64,64,528] |
---|
586 | Tue Oct 24 07:47:19 2017 us=675952 phone/192.168.1.1:56035 PID_ERR large diff [120] [SSL-0] [0000000000000000000000000000000000000000000000000000000000000000] 0:712213 0:712093 t=1508852839[0] r=[-3,64,15,120,1] sl=[43,64,64,528] |
---|
587 | Tue Oct 24 07:47:19 2017 us=675982 phone/192.168.1.1:56035 AEAD Decrypt error: bad packet ID (may be a replay): [ #712093 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings |
---|
588 | Tue Oct 24 08:07:49 2017 us=808265 phone/192.168.1.1:56035 TLS: soft reset sec=0 bytes=1481829476/-1 pkts=1795127/0 |
---|
589 | Tue Oct 24 08:07:50 2017 us=582853 phone/192.168.1.1:56035 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
590 | Tue Oct 24 08:07:50 2017 us=584847 phone/192.168.1.1:56035 VERIFY KU OK |
---|
591 | Tue Oct 24 08:07:50 2017 us=585057 phone/192.168.1.1:56035 Validating certificate extended key usage |
---|
592 | Tue Oct 24 08:07:50 2017 us=585177 phone/192.168.1.1:56035 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
593 | Tue Oct 24 08:07:50 2017 us=585273 phone/192.168.1.1:56035 VERIFY EKU OK |
---|
594 | Tue Oct 24 08:07:50 2017 us=585367 phone/192.168.1.1:56035 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
595 | Tue Oct 24 08:07:50 2017 us=689286 phone/192.168.1.1:56035 peer info: IV_VER=2.5_master |
---|
596 | Tue Oct 24 08:07:50 2017 us=689482 phone/192.168.1.1:56035 peer info: IV_PLAT=android |
---|
597 | Tue Oct 24 08:07:50 2017 us=689590 phone/192.168.1.1:56035 peer info: IV_PROTO=2 |
---|
598 | Tue Oct 24 08:07:50 2017 us=689694 phone/192.168.1.1:56035 peer info: IV_LZ4=1 |
---|
599 | Tue Oct 24 08:07:50 2017 us=689797 phone/192.168.1.1:56035 peer info: IV_LZ4v2=1 |
---|
600 | Tue Oct 24 08:07:50 2017 us=689901 phone/192.168.1.1:56035 peer info: IV_LZO=1 |
---|
601 | Tue Oct 24 08:07:50 2017 us=690006 phone/192.168.1.1:56035 peer info: IV_COMP_STUB=1 |
---|
602 | Tue Oct 24 08:07:50 2017 us=690109 phone/192.168.1.1:56035 peer info: IV_COMP_STUBv2=1 |
---|
603 | Tue Oct 24 08:07:50 2017 us=690212 phone/192.168.1.1:56035 peer info: IV_TCPNL=1 |
---|
604 | Tue Oct 24 08:07:50 2017 us=690317 phone/192.168.1.1:56035 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
605 | Tue Oct 24 08:07:50 2017 us=697560 phone/192.168.1.1:56035 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
606 | Tue Oct 24 08:07:50 2017 us=697738 phone/192.168.1.1:56035 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
607 | Tue Oct 24 08:07:50 2017 us=703032 phone/192.168.1.1:56035 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
608 | Tue Oct 24 08:55:58 2017 us=74359 Float requested for peer 1 to 172.56.39.156:21857 |
---|
609 | Tue Oct 24 08:55:58 2017 us=74719 peer 1 (phone) floated from 192.168.1.1:56035 to [AF_INET]172.56.39.156:21857 |
---|
610 | Tue Oct 24 09:02:57 2017 us=216606 phone/172.56.39.156:21857 PID_ERR replay [0] [SSL-1] [0001111>>>>>>>>>>>>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:13269 0:13269 t=1508857377[0] r=[-1,64,15,0,1] sl=[43,64,64,528] |
---|
611 | Tue Oct 24 09:02:57 2017 us=216814 phone/172.56.39.156:21857 AEAD Decrypt error: bad packet ID (may be a replay): [ #13269 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings |
---|
612 | Tue Oct 24 09:04:05 2017 us=675153 Float requested for peer 1 to 65.44.211.33:56035 |
---|
613 | Tue Oct 24 09:04:05 2017 us=675421 peer 1 (phone) floated from 172.56.39.156:21857 to [AF_INET]65.44.211.33:56035 |
---|
614 | Tue Oct 24 09:07:49 2017 us=160672 phone/65.44.211.33:56035 TLS: tls_process: killed expiring key |
---|
615 | Tue Oct 24 09:07:50 2017 us=206082 phone/65.44.211.33:56035 TLS: soft reset sec=0 bytes=15345712/-1 pkts=29728/0 |
---|
616 | Tue Oct 24 09:07:50 2017 us=818669 phone/65.44.211.33:56035 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
617 | Tue Oct 24 09:07:50 2017 us=820737 phone/65.44.211.33:56035 VERIFY KU OK |
---|
618 | Tue Oct 24 09:07:50 2017 us=820873 phone/65.44.211.33:56035 Validating certificate extended key usage |
---|
619 | Tue Oct 24 09:07:50 2017 us=821079 phone/65.44.211.33:56035 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
620 | Tue Oct 24 09:07:50 2017 us=821190 phone/65.44.211.33:56035 VERIFY EKU OK |
---|
621 | Tue Oct 24 09:07:50 2017 us=821286 phone/65.44.211.33:56035 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
622 | Tue Oct 24 09:07:50 2017 us=968409 phone/65.44.211.33:56035 peer info: IV_VER=2.5_master |
---|
623 | Tue Oct 24 09:07:50 2017 us=968605 phone/65.44.211.33:56035 peer info: IV_PLAT=android |
---|
624 | Tue Oct 24 09:07:50 2017 us=968714 phone/65.44.211.33:56035 peer info: IV_PROTO=2 |
---|
625 | Tue Oct 24 09:07:50 2017 us=968858 phone/65.44.211.33:56035 peer info: IV_LZ4=1 |
---|
626 | Tue Oct 24 09:07:50 2017 us=968963 phone/65.44.211.33:56035 peer info: IV_LZ4v2=1 |
---|
627 | Tue Oct 24 09:07:50 2017 us=969150 phone/65.44.211.33:56035 peer info: IV_LZO=1 |
---|
628 | Tue Oct 24 09:07:50 2017 us=969254 phone/65.44.211.33:56035 peer info: IV_COMP_STUB=1 |
---|
629 | Tue Oct 24 09:07:50 2017 us=969358 phone/65.44.211.33:56035 peer info: IV_COMP_STUBv2=1 |
---|
630 | Tue Oct 24 09:07:50 2017 us=969460 phone/65.44.211.33:56035 peer info: IV_TCPNL=1 |
---|
631 | Tue Oct 24 09:07:50 2017 us=969564 phone/65.44.211.33:56035 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
632 | Tue Oct 24 09:07:50 2017 us=970305 phone/65.44.211.33:56035 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
633 | Tue Oct 24 09:07:50 2017 us=970438 phone/65.44.211.33:56035 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
634 | Tue Oct 24 09:07:50 2017 us=990680 phone/65.44.211.33:56035 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
635 | Tue Oct 24 09:10:01 2017 us=760064 Float requested for peer 1 to 208.54.5.144:42557 |
---|
636 | Tue Oct 24 09:10:01 2017 us=760346 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]208.54.5.144:42557 |
---|
637 | Tue Oct 24 09:10:31 2017 us=637980 Float requested for peer 1 to 65.44.211.33:56035 |
---|
638 | Tue Oct 24 09:10:31 2017 us=638257 peer 1 (phone) floated from 208.54.5.144:42557 to [AF_INET]65.44.211.33:56035 |
---|
639 | Tue Oct 24 09:12:42 2017 us=866963 Float requested for peer 1 to 172.56.38.172:24111 |
---|
640 | Tue Oct 24 09:12:42 2017 us=867239 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 |
---|
641 | Tue Oct 24 09:13:51 2017 us=800919 Float requested for peer 1 to 65.44.211.33:56035 |
---|
642 | Tue Oct 24 09:13:51 2017 us=801247 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 |
---|
643 | Tue Oct 24 09:14:18 2017 us=971436 Float requested for peer 1 to 172.56.38.172:24111 |
---|
644 | Tue Oct 24 09:14:18 2017 us=971711 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 |
---|
645 | Tue Oct 24 09:14:23 2017 us=38579 Float requested for peer 1 to 65.44.211.33:56035 |
---|
646 | Tue Oct 24 09:14:23 2017 us=38853 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 |
---|
647 | Tue Oct 24 09:14:35 2017 us=277075 Float requested for peer 1 to 172.56.38.172:24111 |
---|
648 | Tue Oct 24 09:14:35 2017 us=277349 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 |
---|
649 | Tue Oct 24 09:14:39 2017 us=195893 Float requested for peer 1 to 65.44.211.33:56035 |
---|
650 | Tue Oct 24 09:14:39 2017 us=196171 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 |
---|
651 | Tue Oct 24 09:15:53 2017 us=747351 Float requested for peer 1 to 172.56.38.172:24111 |
---|
652 | Tue Oct 24 09:15:53 2017 us=747636 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 |
---|
653 | Tue Oct 24 09:16:37 2017 us=533340 Float requested for peer 1 to 65.44.211.33:56035 |
---|
654 | Tue Oct 24 09:16:37 2017 us=533645 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 |
---|
655 | Tue Oct 24 09:16:37 2017 us=571974 Float requested for peer 1 to 172.56.38.172:24111 |
---|
656 | Tue Oct 24 09:16:37 2017 us=572272 PID_ERR replay-window backtrack occurred [2] [SSL-2] [00_EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:2629 0:2627 t=1508858197[0] r=[0,64,15,2,1] sl=[59,64,64,528] |
---|
657 | Tue Oct 24 09:16:37 2017 us=572428 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 |
---|
658 | Tue Oct 24 09:16:37 2017 us=602145 Float requested for peer 1 to 65.44.211.33:56035 |
---|
659 | Tue Oct 24 09:16:37 2017 us=602411 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 |
---|
660 | Tue Oct 24 09:28:41 2017 us=430041 Float requested for peer 1 to 172.56.39.178:49779 |
---|
661 | Tue Oct 24 09:28:41 2017 us=430318 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.39.178:49779 |
---|
662 | Tue Oct 24 09:28:58 2017 us=644047 Float requested for peer 1 to 65.44.211.33:56035 |
---|
663 | Tue Oct 24 09:28:58 2017 us=644346 peer 1 (phone) floated from 172.56.39.178:49779 to [AF_INET]65.44.211.33:56035 |
---|
664 | Tue Oct 24 09:32:16 2017 us=207560 Float requested for peer 1 to 172.56.39.168:60221 |
---|
665 | Tue Oct 24 09:32:16 2017 us=207836 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.39.168:60221 |
---|
666 | Tue Oct 24 09:32:22 2017 us=432603 Float requested for peer 1 to 65.44.211.33:56035 |
---|
667 | Tue Oct 24 09:32:22 2017 us=432869 peer 1 (phone) floated from 172.56.39.168:60221 to [AF_INET]65.44.211.33:56035 |
---|
668 | Tue Oct 24 09:33:46 2017 us=784797 MULTI: multi_create_instance called |
---|
669 | Tue Oct 24 09:33:46 2017 us=785278 65.44.211.33:45403 Re-using SSL/TLS context |
---|
670 | Tue Oct 24 09:33:46 2017 us=785406 65.44.211.33:45403 LZ4 compression initializing |
---|
671 | Tue Oct 24 09:33:46 2017 us=785871 65.44.211.33:45403 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
672 | Tue Oct 24 09:33:46 2017 us=785987 65.44.211.33:45403 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
673 | Tue Oct 24 09:33:46 2017 us=786228 65.44.211.33:45403 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
674 | Tue Oct 24 09:33:46 2017 us=786330 65.44.211.33:45403 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
675 | Tue Oct 24 09:33:46 2017 us=786534 65.44.211.33:45403 TLS: Initial packet from [AF_INET]65.44.211.33:45403, sid=73970236 c34e76ee |
---|
676 | Tue Oct 24 09:33:51 2017 us=966745 65.44.211.33:45403 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
677 | Tue Oct 24 09:33:51 2017 us=968721 65.44.211.33:45403 VERIFY KU OK |
---|
678 | Tue Oct 24 09:33:51 2017 us=968848 65.44.211.33:45403 Validating certificate extended key usage |
---|
679 | Tue Oct 24 09:33:51 2017 us=968956 65.44.211.33:45403 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
680 | Tue Oct 24 09:33:51 2017 us=969112 65.44.211.33:45403 VERIFY EKU OK |
---|
681 | Tue Oct 24 09:33:51 2017 us=969206 65.44.211.33:45403 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
682 | Tue Oct 24 09:33:52 2017 us=106179 65.44.211.33:45403 peer info: IV_VER=2.5_master |
---|
683 | Tue Oct 24 09:33:52 2017 us=106438 65.44.211.33:45403 peer info: IV_PLAT=android |
---|
684 | Tue Oct 24 09:33:52 2017 us=106549 65.44.211.33:45403 peer info: IV_PROTO=2 |
---|
685 | Tue Oct 24 09:33:52 2017 us=106652 65.44.211.33:45403 peer info: IV_LZ4=1 |
---|
686 | Tue Oct 24 09:33:52 2017 us=106754 65.44.211.33:45403 peer info: IV_LZ4v2=1 |
---|
687 | Tue Oct 24 09:33:52 2017 us=106852 65.44.211.33:45403 peer info: IV_LZO=1 |
---|
688 | Tue Oct 24 09:33:52 2017 us=106989 65.44.211.33:45403 peer info: IV_COMP_STUB=1 |
---|
689 | Tue Oct 24 09:33:52 2017 us=107094 65.44.211.33:45403 peer info: IV_COMP_STUBv2=1 |
---|
690 | Tue Oct 24 09:33:52 2017 us=107194 65.44.211.33:45403 peer info: IV_TCPNL=1 |
---|
691 | Tue Oct 24 09:33:52 2017 us=107296 65.44.211.33:45403 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
692 | Tue Oct 24 09:33:52 2017 us=108042 65.44.211.33:45403 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
693 | Tue Oct 24 09:33:52 2017 us=108170 65.44.211.33:45403 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
694 | Tue Oct 24 09:33:52 2017 us=130019 65.44.211.33:45403 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
695 | Tue Oct 24 09:33:52 2017 us=130297 65.44.211.33:45403 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:45403 |
---|
696 | Tue Oct 24 09:33:52 2017 us=131408 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
697 | Tue Oct 24 09:33:52 2017 us=131530 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
698 | Tue Oct 24 09:33:52 2017 us=131870 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:45403 |
---|
699 | Tue Oct 24 09:33:52 2017 us=131985 MULTI: primary virtual IP for phone/65.44.211.33:45403: 192.168.8.6 |
---|
700 | Tue Oct 24 09:33:54 2017 us=64036 phone/65.44.211.33:45403 PUSH: Received control message: 'PUSH_REQUEST' |
---|
701 | Tue Oct 24 09:33:54 2017 us=64365 phone/65.44.211.33:45403 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) |
---|
702 | Tue Oct 24 09:33:57 2017 us=284720 MULTI: multi_create_instance called |
---|
703 | Tue Oct 24 09:33:57 2017 us=285168 65.44.211.33:45427 Re-using SSL/TLS context |
---|
704 | Tue Oct 24 09:33:57 2017 us=285291 65.44.211.33:45427 LZ4 compression initializing |
---|
705 | Tue Oct 24 09:33:57 2017 us=285763 65.44.211.33:45427 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
706 | Tue Oct 24 09:33:57 2017 us=285878 65.44.211.33:45427 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
707 | Tue Oct 24 09:33:57 2017 us=286105 65.44.211.33:45427 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
708 | Tue Oct 24 09:33:57 2017 us=286330 65.44.211.33:45427 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
709 | Tue Oct 24 09:33:57 2017 us=286550 65.44.211.33:45427 TLS: Initial packet from [AF_INET]65.44.211.33:45427, sid=6520964b 74918729 |
---|
710 | Tue Oct 24 09:33:57 2017 us=746348 65.44.211.33:45427 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
711 | Tue Oct 24 09:33:57 2017 us=748492 65.44.211.33:45427 VERIFY KU OK |
---|
712 | Tue Oct 24 09:33:57 2017 us=748650 65.44.211.33:45427 Validating certificate extended key usage |
---|
713 | Tue Oct 24 09:33:57 2017 us=748761 65.44.211.33:45427 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
714 | Tue Oct 24 09:33:57 2017 us=748853 65.44.211.33:45427 VERIFY EKU OK |
---|
715 | Tue Oct 24 09:33:57 2017 us=748944 65.44.211.33:45427 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
716 | Tue Oct 24 09:33:57 2017 us=899953 65.44.211.33:45427 peer info: IV_VER=2.5_master |
---|
717 | Tue Oct 24 09:33:57 2017 us=900139 65.44.211.33:45427 peer info: IV_PLAT=android |
---|
718 | Tue Oct 24 09:33:57 2017 us=900342 65.44.211.33:45427 peer info: IV_PROTO=2 |
---|
719 | Tue Oct 24 09:33:57 2017 us=900447 65.44.211.33:45427 peer info: IV_LZ4=1 |
---|
720 | Tue Oct 24 09:33:57 2017 us=900548 65.44.211.33:45427 peer info: IV_LZ4v2=1 |
---|
721 | Tue Oct 24 09:33:57 2017 us=900649 65.44.211.33:45427 peer info: IV_LZO=1 |
---|
722 | Tue Oct 24 09:33:57 2017 us=900748 65.44.211.33:45427 peer info: IV_COMP_STUB=1 |
---|
723 | Tue Oct 24 09:33:57 2017 us=900847 65.44.211.33:45427 peer info: IV_COMP_STUBv2=1 |
---|
724 | Tue Oct 24 09:33:57 2017 us=900946 65.44.211.33:45427 peer info: IV_TCPNL=1 |
---|
725 | Tue Oct 24 09:33:57 2017 us=901206 65.44.211.33:45427 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
726 | Tue Oct 24 09:33:57 2017 us=901937 65.44.211.33:45427 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
727 | Tue Oct 24 09:33:57 2017 us=902076 65.44.211.33:45427 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
728 | Tue Oct 24 09:33:57 2017 us=922595 65.44.211.33:45427 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
729 | Tue Oct 24 09:33:57 2017 us=922875 65.44.211.33:45427 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:45427 |
---|
730 | Tue Oct 24 09:33:57 2017 us=923717 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
731 | Tue Oct 24 09:33:57 2017 us=923857 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
732 | Tue Oct 24 09:33:57 2017 us=924197 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:45427 |
---|
733 | Tue Oct 24 09:33:57 2017 us=924308 MULTI: primary virtual IP for phone/65.44.211.33:45427: 192.168.8.6 |
---|
734 | Tue Oct 24 09:33:58 2017 us=110994 phone/65.44.211.33:45427 PUSH: Received control message: 'PUSH_REQUEST' |
---|
735 | Tue Oct 24 09:33:58 2017 us=111335 phone/65.44.211.33:45427 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) |
---|
736 | Tue Oct 24 10:29:40 2017 us=242309 Float requested for peer 1 to 172.56.38.195:61021 |
---|
737 | Tue Oct 24 10:29:40 2017 us=242574 peer 1 (phone) floated from 65.44.211.33:45427 to [AF_INET]172.56.38.195:61021 |
---|
738 | Tue Oct 24 10:29:50 2017 us=132582 Float requested for peer 1 to 65.44.211.33:45427 |
---|
739 | Tue Oct 24 10:29:50 2017 us=132848 peer 1 (phone) floated from 172.56.38.195:61021 to [AF_INET]65.44.211.33:45427 |
---|
740 | Tue Oct 24 10:30:08 2017 us=558063 MULTI: multi_create_instance called |
---|
741 | Tue Oct 24 10:30:08 2017 us=558414 65.44.211.33:33806 Re-using SSL/TLS context |
---|
742 | Tue Oct 24 10:30:08 2017 us=558533 65.44.211.33:33806 LZ4 compression initializing |
---|
743 | Tue Oct 24 10:30:08 2017 us=559004 65.44.211.33:33806 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
744 | Tue Oct 24 10:30:08 2017 us=559129 65.44.211.33:33806 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
745 | Tue Oct 24 10:30:08 2017 us=559361 65.44.211.33:33806 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
746 | Tue Oct 24 10:30:08 2017 us=559463 65.44.211.33:33806 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
747 | Tue Oct 24 10:30:08 2017 us=559657 65.44.211.33:33806 TLS: Initial packet from [AF_INET]65.44.211.33:33806, sid=f98a9d2a 6c37f4a5 |
---|
748 | Tue Oct 24 10:30:09 2017 us=14321 65.44.211.33:33806 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
749 | Tue Oct 24 10:30:09 2017 us=16303 65.44.211.33:33806 VERIFY KU OK |
---|
750 | Tue Oct 24 10:30:09 2017 us=16434 65.44.211.33:33806 Validating certificate extended key usage |
---|
751 | Tue Oct 24 10:30:09 2017 us=16545 65.44.211.33:33806 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
752 | Tue Oct 24 10:30:09 2017 us=16641 65.44.211.33:33806 VERIFY EKU OK |
---|
753 | Tue Oct 24 10:30:09 2017 us=16738 65.44.211.33:33806 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
754 | Tue Oct 24 10:30:09 2017 us=139692 65.44.211.33:33806 peer info: IV_VER=2.5_master |
---|
755 | Tue Oct 24 10:30:09 2017 us=139879 65.44.211.33:33806 peer info: IV_PLAT=android |
---|
756 | Tue Oct 24 10:30:09 2017 us=139983 65.44.211.33:33806 peer info: IV_PROTO=2 |
---|
757 | Tue Oct 24 10:30:09 2017 us=140083 65.44.211.33:33806 peer info: IV_LZ4=1 |
---|
758 | Tue Oct 24 10:30:09 2017 us=140181 65.44.211.33:33806 peer info: IV_LZ4v2=1 |
---|
759 | Tue Oct 24 10:30:09 2017 us=140281 65.44.211.33:33806 peer info: IV_LZO=1 |
---|
760 | Tue Oct 24 10:30:09 2017 us=140381 65.44.211.33:33806 peer info: IV_COMP_STUB=1 |
---|
761 | Tue Oct 24 10:30:09 2017 us=140482 65.44.211.33:33806 peer info: IV_COMP_STUBv2=1 |
---|
762 | Tue Oct 24 10:30:09 2017 us=140581 65.44.211.33:33806 peer info: IV_TCPNL=1 |
---|
763 | Tue Oct 24 10:30:09 2017 us=140683 65.44.211.33:33806 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
764 | Tue Oct 24 10:30:09 2017 us=141519 65.44.211.33:33806 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
765 | Tue Oct 24 10:30:09 2017 us=141660 65.44.211.33:33806 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
766 | Tue Oct 24 10:30:09 2017 us=162659 65.44.211.33:33806 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
767 | Tue Oct 24 10:30:09 2017 us=162897 65.44.211.33:33806 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:33806 |
---|
768 | Tue Oct 24 10:30:09 2017 us=163699 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
769 | Tue Oct 24 10:30:09 2017 us=163831 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
770 | Tue Oct 24 10:30:09 2017 us=164172 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:33806 |
---|
771 | Tue Oct 24 10:30:09 2017 us=164287 MULTI: primary virtual IP for phone/65.44.211.33:33806: 192.168.8.6 |
---|
772 | Tue Oct 24 10:30:09 2017 us=901770 phone/65.44.211.33:33806 PUSH: Received control message: 'PUSH_REQUEST' |
---|
773 | Tue Oct 24 10:30:09 2017 us=902106 phone/65.44.211.33:33806 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) |
---|
774 | Tue Oct 24 11:30:09 2017 us=15737 phone/65.44.211.33:33806 TLS: soft reset sec=0 bytes=285774809/-1 pkts=1075209/0 |
---|
775 | Tue Oct 24 11:30:09 2017 us=408273 phone/65.44.211.33:33806 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
776 | Tue Oct 24 11:30:09 2017 us=410364 phone/65.44.211.33:33806 VERIFY KU OK |
---|
777 | Tue Oct 24 11:30:09 2017 us=410514 phone/65.44.211.33:33806 Validating certificate extended key usage |
---|
778 | Tue Oct 24 11:30:09 2017 us=410625 phone/65.44.211.33:33806 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
779 | Tue Oct 24 11:30:09 2017 us=410721 phone/65.44.211.33:33806 VERIFY EKU OK |
---|
780 | Tue Oct 24 11:30:09 2017 us=410816 phone/65.44.211.33:33806 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
781 | Tue Oct 24 11:30:09 2017 us=530708 phone/65.44.211.33:33806 peer info: IV_VER=2.5_master |
---|
782 | Tue Oct 24 11:30:09 2017 us=530884 phone/65.44.211.33:33806 peer info: IV_PLAT=android |
---|
783 | Tue Oct 24 11:30:09 2017 us=530977 phone/65.44.211.33:33806 peer info: IV_PROTO=2 |
---|
784 | Tue Oct 24 11:30:09 2017 us=531064 phone/65.44.211.33:33806 peer info: IV_LZ4=1 |
---|
785 | Tue Oct 24 11:30:09 2017 us=531152 phone/65.44.211.33:33806 peer info: IV_LZ4v2=1 |
---|
786 | Tue Oct 24 11:30:09 2017 us=531239 phone/65.44.211.33:33806 peer info: IV_LZO=1 |
---|
787 | Tue Oct 24 11:30:09 2017 us=531328 phone/65.44.211.33:33806 peer info: IV_COMP_STUB=1 |
---|
788 | Tue Oct 24 11:30:09 2017 us=531417 phone/65.44.211.33:33806 peer info: IV_COMP_STUBv2=1 |
---|
789 | Tue Oct 24 11:30:09 2017 us=531508 phone/65.44.211.33:33806 peer info: IV_TCPNL=1 |
---|
790 | Tue Oct 24 11:30:09 2017 us=531597 phone/65.44.211.33:33806 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
791 | Tue Oct 24 11:30:09 2017 us=532233 phone/65.44.211.33:33806 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
792 | Tue Oct 24 11:30:09 2017 us=532405 phone/65.44.211.33:33806 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
793 | Tue Oct 24 11:30:09 2017 us=556398 phone/65.44.211.33:33806 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
794 | Tue Oct 24 11:32:19 2017 us=426593 Float requested for peer 0 to 208.54.5.183:55012 |
---|
795 | Tue Oct 24 11:32:19 2017 us=426879 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]208.54.5.183:55012 |
---|
796 | Tue Oct 24 11:34:27 2017 us=377106 Float requested for peer 0 to 65.44.211.33:33806 |
---|
797 | Tue Oct 24 11:34:27 2017 us=377389 peer 0 (phone) floated from 208.54.5.183:55012 to [AF_INET]65.44.211.33:33806 |
---|
798 | Tue Oct 24 11:36:59 2017 us=937480 Float requested for peer 0 to 172.56.38.51:22536 |
---|
799 | Tue Oct 24 11:36:59 2017 us=937771 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 |
---|
800 | Tue Oct 24 11:37:02 2017 us=474284 Float requested for peer 0 to 65.44.211.33:33806 |
---|
801 | Tue Oct 24 11:37:02 2017 us=474550 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806 |
---|
802 | Tue Oct 24 11:37:02 2017 us=573705 Float requested for peer 0 to 172.56.38.51:22536 |
---|
803 | Tue Oct 24 11:37:02 2017 us=574007 PID_ERR replay-window backtrack occurred [9] [SSL-1] [00000_____000000000000000000000000001111111111111111111111111222] 0:1276 0:1267 t=1508866622[0] r=[-3,64,15,9,1] sl=[4,64,64,528] |
---|
804 | Tue Oct 24 11:37:02 2017 us=574162 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 |
---|
805 | Tue Oct 24 11:37:02 2017 us=650379 Float requested for peer 0 to 65.44.211.33:33806 |
---|
806 | Tue Oct 24 11:37:02 2017 us=650640 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806 |
---|
807 | Tue Oct 24 11:37:15 2017 us=455595 Float requested for peer 0 to 172.56.38.51:22536 |
---|
808 | Tue Oct 24 11:37:15 2017 us=455916 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 |
---|
809 | Tue Oct 24 11:37:51 2017 us=237746 Float requested for peer 0 to 65.44.211.33:33806 |
---|
810 | Tue Oct 24 11:37:51 2017 us=238023 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806 |
---|
811 | Tue Oct 24 11:38:37 2017 us=754034 Float requested for peer 0 to 172.56.38.51:22536 |
---|
812 | Tue Oct 24 11:38:37 2017 us=754312 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 |
---|
813 | Tue Oct 24 11:43:55 2017 us=760068 Float requested for peer 0 to 65.44.211.33:33806 |
---|
814 | Tue Oct 24 11:43:55 2017 us=760354 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806 |
---|
815 | Tue Oct 24 11:44:07 2017 us=814520 Float requested for peer 0 to 172.56.38.51:22536 |
---|
816 | Tue Oct 24 11:44:07 2017 us=814800 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 |
---|
817 | Tue Oct 24 11:44:14 2017 us=449807 MULTI: multi_create_instance called |
---|
818 | Tue Oct 24 11:44:14 2017 us=450146 172.56.38.51:19368 Re-using SSL/TLS context |
---|
819 | Tue Oct 24 11:44:14 2017 us=450261 172.56.38.51:19368 LZ4 compression initializing |
---|
820 | Tue Oct 24 11:44:14 2017 us=450772 172.56.38.51:19368 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
821 | Tue Oct 24 11:44:14 2017 us=450900 172.56.38.51:19368 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
822 | Tue Oct 24 11:44:14 2017 us=451128 172.56.38.51:19368 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
823 | Tue Oct 24 11:44:14 2017 us=451230 172.56.38.51:19368 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
824 | Tue Oct 24 11:44:14 2017 us=451438 172.56.38.51:19368 TLS: Initial packet from [AF_INET]172.56.38.51:19368, sid=640defb6 5c386d3f |
---|
825 | Tue Oct 24 11:44:15 2017 us=50360 172.56.38.51:19368 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
826 | Tue Oct 24 11:44:15 2017 us=52326 172.56.38.51:19368 VERIFY KU OK |
---|
827 | Tue Oct 24 11:44:15 2017 us=52459 172.56.38.51:19368 Validating certificate extended key usage |
---|
828 | Tue Oct 24 11:44:15 2017 us=52630 172.56.38.51:19368 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
829 | Tue Oct 24 11:44:15 2017 us=52727 172.56.38.51:19368 VERIFY EKU OK |
---|
830 | Tue Oct 24 11:44:15 2017 us=52816 172.56.38.51:19368 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
831 | Tue Oct 24 11:44:15 2017 us=606936 172.56.38.51:19368 peer info: IV_VER=2.5_master |
---|
832 | Tue Oct 24 11:44:15 2017 us=607123 172.56.38.51:19368 peer info: IV_PLAT=android |
---|
833 | Tue Oct 24 11:44:15 2017 us=607224 172.56.38.51:19368 peer info: IV_PROTO=2 |
---|
834 | Tue Oct 24 11:44:15 2017 us=607324 172.56.38.51:19368 peer info: IV_LZ4=1 |
---|
835 | Tue Oct 24 11:44:15 2017 us=607424 172.56.38.51:19368 peer info: IV_LZ4v2=1 |
---|
836 | Tue Oct 24 11:44:15 2017 us=607521 172.56.38.51:19368 peer info: IV_LZO=1 |
---|
837 | Tue Oct 24 11:44:15 2017 us=607619 172.56.38.51:19368 peer info: IV_COMP_STUB=1 |
---|
838 | Tue Oct 24 11:44:15 2017 us=607716 172.56.38.51:19368 peer info: IV_COMP_STUBv2=1 |
---|
839 | Tue Oct 24 11:44:15 2017 us=607816 172.56.38.51:19368 peer info: IV_TCPNL=1 |
---|
840 | Tue Oct 24 11:44:15 2017 us=607917 172.56.38.51:19368 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
841 | Tue Oct 24 11:44:15 2017 us=608664 172.56.38.51:19368 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
842 | Tue Oct 24 11:44:15 2017 us=608796 172.56.38.51:19368 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
843 | Tue Oct 24 11:44:15 2017 us=704166 172.56.38.51:19368 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
844 | Tue Oct 24 11:44:15 2017 us=704441 172.56.38.51:19368 [phone] Peer Connection Initiated with [AF_INET]172.56.38.51:19368 |
---|
845 | Tue Oct 24 11:44:15 2017 us=705680 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
846 | Tue Oct 24 11:44:15 2017 us=705805 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
847 | Tue Oct 24 11:44:15 2017 us=706153 MULTI: Learn: 192.168.8.6 -> phone/172.56.38.51:19368 |
---|
848 | Tue Oct 24 11:44:15 2017 us=706266 MULTI: primary virtual IP for phone/172.56.38.51:19368: 192.168.8.6 |
---|
849 | Tue Oct 24 11:44:16 2017 us=204601 phone/172.56.38.51:19368 PUSH: Received control message: 'PUSH_REQUEST' |
---|
850 | Tue Oct 24 11:44:16 2017 us=204938 phone/172.56.38.51:19368 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) |
---|
851 | Tue Oct 24 11:44:50 2017 us=893350 Float requested for peer 1 to 65.44.211.33:55524 |
---|
852 | Tue Oct 24 11:44:50 2017 us=893632 peer 1 (phone) floated from 172.56.38.51:19368 to [AF_INET]65.44.211.33:55524 |
---|
853 | Tue Oct 24 11:58:58 2017 us=567761 Float requested for peer 1 to 172.56.39.195:19644 |
---|
854 | Tue Oct 24 11:58:58 2017 us=568040 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.195:19644 |
---|
855 | Tue Oct 24 12:00:02 2017 us=817418 Float requested for peer 1 to 65.44.211.33:55524 |
---|
856 | Tue Oct 24 12:00:02 2017 us=817695 peer 1 (phone) floated from 172.56.39.195:19644 to [AF_INET]65.44.211.33:55524 |
---|
857 | Tue Oct 24 12:01:09 2017 us=620549 Float requested for peer 1 to 172.56.39.195:19644 |
---|
858 | Tue Oct 24 12:01:09 2017 us=620827 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.195:19644 |
---|
859 | Tue Oct 24 12:13:18 2017 us=453234 Float requested for peer 1 to 65.44.211.33:55524 |
---|
860 | Tue Oct 24 12:13:18 2017 us=453512 peer 1 (phone) floated from 172.56.39.195:19644 to [AF_INET]65.44.211.33:55524 |
---|
861 | Tue Oct 24 12:14:57 2017 us=701158 Float requested for peer 1 to 172.56.39.195:19644 |
---|
862 | Tue Oct 24 12:14:57 2017 us=701458 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.195:19644 |
---|
863 | Tue Oct 24 12:44:15 2017 us=788702 phone/172.56.39.195:19644 TLS: soft reset sec=0 bytes=2332419/-1 pkts=8057/0 |
---|
864 | Tue Oct 24 12:44:18 2017 us=618358 phone/172.56.39.195:19644 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
865 | Tue Oct 24 12:44:18 2017 us=620489 phone/172.56.39.195:19644 VERIFY KU OK |
---|
866 | Tue Oct 24 12:44:18 2017 us=620620 phone/172.56.39.195:19644 Validating certificate extended key usage |
---|
867 | Tue Oct 24 12:44:18 2017 us=620726 phone/172.56.39.195:19644 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
868 | Tue Oct 24 12:44:18 2017 us=620819 phone/172.56.39.195:19644 VERIFY EKU OK |
---|
869 | Tue Oct 24 12:44:18 2017 us=620911 phone/172.56.39.195:19644 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
870 | Tue Oct 24 12:44:18 2017 us=826618 phone/172.56.39.195:19644 peer info: IV_VER=2.5_master |
---|
871 | Tue Oct 24 12:44:18 2017 us=826800 phone/172.56.39.195:19644 peer info: IV_PLAT=android |
---|
872 | Tue Oct 24 12:44:18 2017 us=826902 phone/172.56.39.195:19644 peer info: IV_PROTO=2 |
---|
873 | Tue Oct 24 12:44:18 2017 us=827000 phone/172.56.39.195:19644 peer info: IV_LZ4=1 |
---|
874 | Tue Oct 24 12:44:18 2017 us=827098 phone/172.56.39.195:19644 peer info: IV_LZ4v2=1 |
---|
875 | Tue Oct 24 12:44:18 2017 us=827197 phone/172.56.39.195:19644 peer info: IV_LZO=1 |
---|
876 | Tue Oct 24 12:44:18 2017 us=827295 phone/172.56.39.195:19644 peer info: IV_COMP_STUB=1 |
---|
877 | Tue Oct 24 12:44:18 2017 us=827394 phone/172.56.39.195:19644 peer info: IV_COMP_STUBv2=1 |
---|
878 | Tue Oct 24 12:44:18 2017 us=827494 phone/172.56.39.195:19644 peer info: IV_TCPNL=1 |
---|
879 | Tue Oct 24 12:44:18 2017 us=827593 phone/172.56.39.195:19644 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
880 | Tue Oct 24 12:44:18 2017 us=828336 phone/172.56.39.195:19644 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
881 | Tue Oct 24 12:44:18 2017 us=828464 phone/172.56.39.195:19644 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
882 | Tue Oct 24 12:44:18 2017 us=909230 phone/172.56.39.195:19644 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
883 | Tue Oct 24 13:44:15 2017 us=689072 phone/172.56.39.195:19644 TLS: tls_process: killed expiring key |
---|
884 | Tue Oct 24 13:44:18 2017 us=73187 phone/172.56.39.195:19644 TLS: soft reset sec=0 bytes=7711876/-1 pkts=12250/0 |
---|
885 | Tue Oct 24 13:44:18 2017 us=836171 phone/172.56.39.195:19644 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
886 | Tue Oct 24 13:44:18 2017 us=838245 phone/172.56.39.195:19644 VERIFY KU OK |
---|
887 | Tue Oct 24 13:44:18 2017 us=838389 phone/172.56.39.195:19644 Validating certificate extended key usage |
---|
888 | Tue Oct 24 13:44:18 2017 us=838499 phone/172.56.39.195:19644 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
889 | Tue Oct 24 13:44:18 2017 us=838595 phone/172.56.39.195:19644 VERIFY EKU OK |
---|
890 | Tue Oct 24 13:44:18 2017 us=838690 phone/172.56.39.195:19644 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
891 | Tue Oct 24 13:44:19 2017 us=33730 phone/172.56.39.195:19644 peer info: IV_VER=2.5_master |
---|
892 | Tue Oct 24 13:44:19 2017 us=33923 phone/172.56.39.195:19644 peer info: IV_PLAT=android |
---|
893 | Tue Oct 24 13:44:19 2017 us=34030 phone/172.56.39.195:19644 peer info: IV_PROTO=2 |
---|
894 | Tue Oct 24 13:44:19 2017 us=34132 phone/172.56.39.195:19644 peer info: IV_LZ4=1 |
---|
895 | Tue Oct 24 13:44:19 2017 us=34233 phone/172.56.39.195:19644 peer info: IV_LZ4v2=1 |
---|
896 | Tue Oct 24 13:44:19 2017 us=34334 phone/172.56.39.195:19644 peer info: IV_LZO=1 |
---|
897 | Tue Oct 24 13:44:19 2017 us=34433 phone/172.56.39.195:19644 peer info: IV_COMP_STUB=1 |
---|
898 | Tue Oct 24 13:44:19 2017 us=34536 phone/172.56.39.195:19644 peer info: IV_COMP_STUBv2=1 |
---|
899 | Tue Oct 24 13:44:19 2017 us=34638 phone/172.56.39.195:19644 peer info: IV_TCPNL=1 |
---|
900 | Tue Oct 24 13:44:19 2017 us=34741 phone/172.56.39.195:19644 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
901 | Tue Oct 24 13:44:19 2017 us=35477 phone/172.56.39.195:19644 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
902 | Tue Oct 24 13:44:19 2017 us=35607 phone/172.56.39.195:19644 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
903 | Tue Oct 24 13:44:19 2017 us=145718 phone/172.56.39.195:19644 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
904 | Tue Oct 24 14:35:34 2017 us=818681 Float requested for peer 1 to 65.44.211.33:55524 |
---|
905 | Tue Oct 24 14:35:34 2017 us=827026 peer 1 (phone) floated from 172.56.39.195:19644 to [AF_INET]65.44.211.33:55524 |
---|
906 | Tue Oct 24 14:37:37 2017 us=556810 Float requested for peer 1 to 172.56.38.134:46002 |
---|
907 | Tue Oct 24 14:37:37 2017 us=557161 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.38.134:46002 |
---|
908 | Tue Oct 24 14:39:20 2017 us=977779 Float requested for peer 1 to 65.44.211.33:55524 |
---|
909 | Tue Oct 24 14:39:20 2017 us=978033 peer 1 (phone) floated from 172.56.38.134:46002 to [AF_INET]65.44.211.33:55524 |
---|
910 | Tue Oct 24 14:39:21 2017 us=61913 Float requested for peer 1 to 172.56.38.134:46002 |
---|
911 | Tue Oct 24 14:39:21 2017 us=62211 PID_ERR replay-window backtrack occurred [4] [SSL-2] [0111_>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:2555 0:2551 t=1508877561[0] r=[-1,64,15,4,1] sl=[5,64,64,528] |
---|
912 | Tue Oct 24 14:39:21 2017 us=62423 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.38.134:46002 |
---|
913 | Tue Oct 24 14:39:21 2017 us=64943 Float requested for peer 1 to 65.44.211.33:55524 |
---|
914 | Tue Oct 24 14:39:21 2017 us=65280 peer 1 (phone) floated from 172.56.38.134:46002 to [AF_INET]65.44.211.33:55524 |
---|
915 | Tue Oct 24 14:41:14 2017 us=210115 Float requested for peer 1 to 172.56.39.236:31926 |
---|
916 | Tue Oct 24 14:41:14 2017 us=210401 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.236:31926 |
---|
917 | Tue Oct 24 14:41:19 2017 us=477374 Float requested for peer 1 to 65.44.211.33:55524 |
---|
918 | Tue Oct 24 14:41:19 2017 us=477642 peer 1 (phone) floated from 172.56.39.236:31926 to [AF_INET]65.44.211.33:55524 |
---|
919 | Tue Oct 24 14:41:44 2017 us=316351 MULTI: multi_create_instance called |
---|
920 | Tue Oct 24 14:41:44 2017 us=316732 65.44.211.33:47404 Re-using SSL/TLS context |
---|
921 | Tue Oct 24 14:41:44 2017 us=316852 65.44.211.33:47404 LZ4 compression initializing |
---|
922 | Tue Oct 24 14:41:44 2017 us=317426 65.44.211.33:47404 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
923 | Tue Oct 24 14:41:44 2017 us=317559 65.44.211.33:47404 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
924 | Tue Oct 24 14:41:44 2017 us=317831 65.44.211.33:47404 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
925 | Tue Oct 24 14:41:44 2017 us=317934 65.44.211.33:47404 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
926 | Tue Oct 24 14:41:44 2017 us=318140 65.44.211.33:47404 TLS: Initial packet from [AF_INET]65.44.211.33:47404, sid=0651792f ee2b1b06 |
---|
927 | Tue Oct 24 14:42:44 2017 us=529076 65.44.211.33:47404 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) |
---|
928 | Tue Oct 24 14:42:44 2017 us=529285 65.44.211.33:47404 TLS Error: TLS handshake failed |
---|
929 | Tue Oct 24 14:42:44 2017 us=529723 65.44.211.33:47404 SIGUSR1[soft,tls-error] received, client-instance restarting |
---|
930 | Tue Oct 24 14:43:00 2017 us=814821 MULTI: multi_create_instance called |
---|
931 | Tue Oct 24 14:43:00 2017 us=815161 65.44.211.33:33659 Re-using SSL/TLS context |
---|
932 | Tue Oct 24 14:43:00 2017 us=815279 65.44.211.33:33659 LZ4 compression initializing |
---|
933 | Tue Oct 24 14:43:00 2017 us=815729 65.44.211.33:33659 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
934 | Tue Oct 24 14:43:00 2017 us=815845 65.44.211.33:33659 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
935 | Tue Oct 24 14:43:00 2017 us=816076 65.44.211.33:33659 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
936 | Tue Oct 24 14:43:00 2017 us=816176 65.44.211.33:33659 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
937 | Tue Oct 24 14:43:00 2017 us=816382 65.44.211.33:33659 TLS: Initial packet from [AF_INET]65.44.211.33:33659, sid=7708bafe 09804a30 |
---|
938 | Tue Oct 24 14:43:01 2017 us=65802 MULTI: multi_create_instance called |
---|
939 | Tue Oct 24 14:43:01 2017 us=66190 65.44.211.33:33702 Re-using SSL/TLS context |
---|
940 | Tue Oct 24 14:43:01 2017 us=66306 65.44.211.33:33702 LZ4 compression initializing |
---|
941 | Tue Oct 24 14:43:01 2017 us=66872 65.44.211.33:33702 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
942 | Tue Oct 24 14:43:01 2017 us=66983 65.44.211.33:33702 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
943 | Tue Oct 24 14:43:01 2017 us=67208 65.44.211.33:33702 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
944 | Tue Oct 24 14:43:01 2017 us=67343 65.44.211.33:33702 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
945 | Tue Oct 24 14:43:01 2017 us=67536 65.44.211.33:33702 TLS: Initial packet from [AF_INET]65.44.211.33:33702, sid=1f8ddb2e 97a761b9 |
---|
946 | Tue Oct 24 14:43:01 2017 us=257049 65.44.211.33:33659 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
947 | Tue Oct 24 14:43:01 2017 us=258753 65.44.211.33:33659 VERIFY KU OK |
---|
948 | Tue Oct 24 14:43:01 2017 us=258866 65.44.211.33:33659 Validating certificate extended key usage |
---|
949 | Tue Oct 24 14:43:01 2017 us=258960 65.44.211.33:33659 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
950 | Tue Oct 24 14:43:01 2017 us=259038 65.44.211.33:33659 VERIFY EKU OK |
---|
951 | Tue Oct 24 14:43:01 2017 us=259116 65.44.211.33:33659 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
952 | Tue Oct 24 14:43:01 2017 us=339687 65.44.211.33:33659 peer info: IV_VER=2.5_master |
---|
953 | Tue Oct 24 14:43:01 2017 us=339788 65.44.211.33:33659 peer info: IV_PLAT=android |
---|
954 | Tue Oct 24 14:43:01 2017 us=339840 65.44.211.33:33659 peer info: IV_PROTO=2 |
---|
955 | Tue Oct 24 14:43:01 2017 us=339890 65.44.211.33:33659 peer info: IV_LZ4=1 |
---|
956 | Tue Oct 24 14:43:01 2017 us=339939 65.44.211.33:33659 peer info: IV_LZ4v2=1 |
---|
957 | Tue Oct 24 14:43:01 2017 us=339988 65.44.211.33:33659 peer info: IV_LZO=1 |
---|
958 | Tue Oct 24 14:43:01 2017 us=340037 65.44.211.33:33659 peer info: IV_COMP_STUB=1 |
---|
959 | Tue Oct 24 14:43:01 2017 us=340087 65.44.211.33:33659 peer info: IV_COMP_STUBv2=1 |
---|
960 | Tue Oct 24 14:43:01 2017 us=340137 65.44.211.33:33659 peer info: IV_TCPNL=1 |
---|
961 | Tue Oct 24 14:43:01 2017 us=340187 65.44.211.33:33659 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
962 | Tue Oct 24 14:43:01 2017 us=340603 65.44.211.33:33659 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
963 | Tue Oct 24 14:43:01 2017 us=340669 65.44.211.33:33659 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
964 | Tue Oct 24 14:43:01 2017 us=359825 65.44.211.33:33659 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
965 | Tue Oct 24 14:43:01 2017 us=359996 65.44.211.33:33659 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:33659 |
---|
966 | Tue Oct 24 14:43:01 2017 us=366014 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
967 | Tue Oct 24 14:43:01 2017 us=366104 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
968 | Tue Oct 24 14:43:01 2017 us=366290 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:33659 |
---|
969 | Tue Oct 24 14:43:01 2017 us=366347 MULTI: primary virtual IP for phone/65.44.211.33:33659: 192.168.8.6 |
---|
970 | Tue Oct 24 14:43:01 2017 us=408329 65.44.211.33:33702 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
971 | Tue Oct 24 14:43:01 2017 us=410347 65.44.211.33:33702 VERIFY KU OK |
---|
972 | Tue Oct 24 14:43:01 2017 us=410493 65.44.211.33:33702 Validating certificate extended key usage |
---|
973 | Tue Oct 24 14:43:01 2017 us=410600 65.44.211.33:33702 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
974 | Tue Oct 24 14:43:01 2017 us=410694 65.44.211.33:33702 VERIFY EKU OK |
---|
975 | Tue Oct 24 14:43:01 2017 us=410785 65.44.211.33:33702 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
976 | Tue Oct 24 14:43:01 2017 us=531194 65.44.211.33:33702 peer info: IV_VER=2.5_master |
---|
977 | Tue Oct 24 14:43:01 2017 us=531385 65.44.211.33:33702 peer info: IV_PLAT=android |
---|
978 | Tue Oct 24 14:43:01 2017 us=531487 65.44.211.33:33702 peer info: IV_PROTO=2 |
---|
979 | Tue Oct 24 14:43:01 2017 us=531585 65.44.211.33:33702 peer info: IV_LZ4=1 |
---|
980 | Tue Oct 24 14:43:01 2017 us=531684 65.44.211.33:33702 peer info: IV_LZ4v2=1 |
---|
981 | Tue Oct 24 14:43:01 2017 us=531783 65.44.211.33:33702 peer info: IV_LZO=1 |
---|
982 | Tue Oct 24 14:43:01 2017 us=531882 65.44.211.33:33702 peer info: IV_COMP_STUB=1 |
---|
983 | Tue Oct 24 14:43:01 2017 us=531980 65.44.211.33:33702 peer info: IV_COMP_STUBv2=1 |
---|
984 | Tue Oct 24 14:43:01 2017 us=532077 65.44.211.33:33702 peer info: IV_TCPNL=1 |
---|
985 | Tue Oct 24 14:43:01 2017 us=532177 65.44.211.33:33702 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
986 | Tue Oct 24 14:43:01 2017 us=532911 65.44.211.33:33702 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
987 | Tue Oct 24 14:43:01 2017 us=533110 65.44.211.33:33702 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
988 | Tue Oct 24 14:43:01 2017 us=556427 65.44.211.33:33702 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
989 | Tue Oct 24 14:43:01 2017 us=556699 65.44.211.33:33702 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:33702 |
---|
990 | Tue Oct 24 14:43:01 2017 us=557610 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
991 | Tue Oct 24 14:43:01 2017 us=557747 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
992 | Tue Oct 24 14:43:01 2017 us=558129 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:33702 |
---|
993 | Tue Oct 24 14:43:01 2017 us=558247 MULTI: primary virtual IP for phone/65.44.211.33:33702: 192.168.8.6 |
---|
994 | Tue Oct 24 14:43:05 2017 us=933299 phone/65.44.211.33:33702 PUSH: Received control message: 'PUSH_REQUEST' |
---|
995 | Tue Oct 24 14:43:05 2017 us=933645 phone/65.44.211.33:33702 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 2' (status=1) |
---|
996 | Tue Oct 24 14:43:23 2017 us=105070 Float requested for peer 2 to 172.56.39.236:41384 |
---|
997 | Tue Oct 24 14:43:23 2017 us=105354 peer 2 (phone) floated from 65.44.211.33:33702 to [AF_INET]172.56.39.236:41384 |
---|
998 | Tue Oct 24 14:44:29 2017 us=191314 Float requested for peer 2 to 65.44.211.33:33702 |
---|
999 | Tue Oct 24 14:44:29 2017 us=191591 peer 2 (phone) floated from 172.56.39.236:41384 to [AF_INET]65.44.211.33:33702 |
---|
1000 | Tue Oct 24 14:44:31 2017 us=507521 MULTI: multi_create_instance called |
---|
1001 | Tue Oct 24 14:44:31 2017 us=507852 65.44.211.33:48084 Re-using SSL/TLS context |
---|
1002 | Tue Oct 24 14:44:31 2017 us=507967 65.44.211.33:48084 LZ4 compression initializing |
---|
1003 | Tue Oct 24 14:44:31 2017 us=508443 65.44.211.33:48084 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1004 | Tue Oct 24 14:44:31 2017 us=508561 65.44.211.33:48084 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1005 | Tue Oct 24 14:44:31 2017 us=508786 65.44.211.33:48084 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1006 | Tue Oct 24 14:44:31 2017 us=508887 65.44.211.33:48084 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1007 | Tue Oct 24 14:44:31 2017 us=509168 65.44.211.33:48084 TLS: Initial packet from [AF_INET]65.44.211.33:48084, sid=22b2b112 21151183 |
---|
1008 | Tue Oct 24 14:44:31 2017 us=974263 65.44.211.33:48084 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1009 | Tue Oct 24 14:44:31 2017 us=976224 65.44.211.33:48084 VERIFY KU OK |
---|
1010 | Tue Oct 24 14:44:31 2017 us=976358 65.44.211.33:48084 Validating certificate extended key usage |
---|
1011 | Tue Oct 24 14:44:31 2017 us=976525 65.44.211.33:48084 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1012 | Tue Oct 24 14:44:31 2017 us=976623 65.44.211.33:48084 VERIFY EKU OK |
---|
1013 | Tue Oct 24 14:44:31 2017 us=976713 65.44.211.33:48084 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1014 | Tue Oct 24 14:44:32 2017 us=113277 65.44.211.33:48084 peer info: IV_VER=2.5_master |
---|
1015 | Tue Oct 24 14:44:32 2017 us=113460 65.44.211.33:48084 peer info: IV_PLAT=android |
---|
1016 | Tue Oct 24 14:44:32 2017 us=113564 65.44.211.33:48084 peer info: IV_PROTO=2 |
---|
1017 | Tue Oct 24 14:44:32 2017 us=113664 65.44.211.33:48084 peer info: IV_LZ4=1 |
---|
1018 | Tue Oct 24 14:44:32 2017 us=113764 65.44.211.33:48084 peer info: IV_LZ4v2=1 |
---|
1019 | Tue Oct 24 14:44:32 2017 us=113863 65.44.211.33:48084 peer info: IV_LZO=1 |
---|
1020 | Tue Oct 24 14:44:32 2017 us=113960 65.44.211.33:48084 peer info: IV_COMP_STUB=1 |
---|
1021 | Tue Oct 24 14:44:32 2017 us=114058 65.44.211.33:48084 peer info: IV_COMP_STUBv2=1 |
---|
1022 | Tue Oct 24 14:44:32 2017 us=114156 65.44.211.33:48084 peer info: IV_TCPNL=1 |
---|
1023 | Tue Oct 24 14:44:32 2017 us=114256 65.44.211.33:48084 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1024 | Tue Oct 24 14:44:32 2017 us=115101 65.44.211.33:48084 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1025 | Tue Oct 24 14:44:32 2017 us=115234 65.44.211.33:48084 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1026 | Tue Oct 24 14:44:32 2017 us=139815 65.44.211.33:48084 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1027 | Tue Oct 24 14:44:32 2017 us=140090 65.44.211.33:48084 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:48084 |
---|
1028 | Tue Oct 24 14:44:32 2017 us=140895 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1029 | Tue Oct 24 14:44:32 2017 us=141110 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1030 | Tue Oct 24 14:44:32 2017 us=141459 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:48084 |
---|
1031 | Tue Oct 24 14:44:32 2017 us=141571 MULTI: primary virtual IP for phone/65.44.211.33:48084: 192.168.8.6 |
---|
1032 | Tue Oct 24 14:44:33 2017 us=168381 phone/65.44.211.33:48084 PUSH: Received control message: 'PUSH_REQUEST' |
---|
1033 | Tue Oct 24 14:44:33 2017 us=168715 phone/65.44.211.33:48084 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) |
---|
1034 | Tue Oct 24 14:44:52 2017 us=786370 MULTI: multi_create_instance called |
---|
1035 | Tue Oct 24 14:44:52 2017 us=786722 65.44.211.33:38254 Re-using SSL/TLS context |
---|
1036 | Tue Oct 24 14:44:52 2017 us=786840 65.44.211.33:38254 LZ4 compression initializing |
---|
1037 | Tue Oct 24 14:44:52 2017 us=787315 65.44.211.33:38254 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1038 | Tue Oct 24 14:44:52 2017 us=787429 65.44.211.33:38254 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1039 | Tue Oct 24 14:44:52 2017 us=787739 65.44.211.33:38254 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1040 | Tue Oct 24 14:44:52 2017 us=787842 65.44.211.33:38254 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1041 | Tue Oct 24 14:44:52 2017 us=788052 65.44.211.33:38254 TLS: Initial packet from [AF_INET]65.44.211.33:38254, sid=36e35b65 b9907496 |
---|
1042 | Tue Oct 24 14:44:55 2017 us=591871 65.44.211.33:38254 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1043 | Tue Oct 24 14:44:55 2017 us=593888 65.44.211.33:38254 VERIFY KU OK |
---|
1044 | Tue Oct 24 14:44:55 2017 us=594025 65.44.211.33:38254 Validating certificate extended key usage |
---|
1045 | Tue Oct 24 14:44:55 2017 us=594133 65.44.211.33:38254 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1046 | Tue Oct 24 14:44:55 2017 us=594291 65.44.211.33:38254 VERIFY EKU OK |
---|
1047 | Tue Oct 24 14:44:55 2017 us=594388 65.44.211.33:38254 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1048 | Tue Oct 24 14:44:55 2017 us=717610 65.44.211.33:38254 peer info: IV_VER=2.5_master |
---|
1049 | Tue Oct 24 14:44:55 2017 us=717833 65.44.211.33:38254 peer info: IV_PLAT=android |
---|
1050 | Tue Oct 24 14:44:55 2017 us=717938 65.44.211.33:38254 peer info: IV_PROTO=2 |
---|
1051 | Tue Oct 24 14:44:55 2017 us=718037 65.44.211.33:38254 peer info: IV_LZ4=1 |
---|
1052 | Tue Oct 24 14:44:55 2017 us=718137 65.44.211.33:38254 peer info: IV_LZ4v2=1 |
---|
1053 | Tue Oct 24 14:44:55 2017 us=718235 65.44.211.33:38254 peer info: IV_LZO=1 |
---|
1054 | Tue Oct 24 14:44:55 2017 us=718333 65.44.211.33:38254 peer info: IV_COMP_STUB=1 |
---|
1055 | Tue Oct 24 14:44:55 2017 us=718432 65.44.211.33:38254 peer info: IV_COMP_STUBv2=1 |
---|
1056 | Tue Oct 24 14:44:55 2017 us=718529 65.44.211.33:38254 peer info: IV_TCPNL=1 |
---|
1057 | Tue Oct 24 14:44:55 2017 us=718629 65.44.211.33:38254 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1058 | Tue Oct 24 14:44:55 2017 us=719357 65.44.211.33:38254 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1059 | Tue Oct 24 14:44:55 2017 us=719485 65.44.211.33:38254 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1060 | Tue Oct 24 14:44:55 2017 us=740134 65.44.211.33:38254 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1061 | Tue Oct 24 14:44:55 2017 us=740411 65.44.211.33:38254 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:38254 |
---|
1062 | Tue Oct 24 14:44:55 2017 us=741228 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1063 | Tue Oct 24 14:44:55 2017 us=741357 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1064 | Tue Oct 24 14:44:55 2017 us=741690 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:38254 |
---|
1065 | Tue Oct 24 14:44:55 2017 us=741804 MULTI: primary virtual IP for phone/65.44.211.33:38254: 192.168.8.6 |
---|
1066 | Tue Oct 24 14:44:57 2017 us=187951 phone/65.44.211.33:38254 PUSH: Received control message: 'PUSH_REQUEST' |
---|
1067 | Tue Oct 24 14:44:57 2017 us=188286 phone/65.44.211.33:38254 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) |
---|
1068 | Tue Oct 24 14:46:55 2017 us=138090 Float requested for peer 1 to 172.56.39.203:61300 |
---|
1069 | Tue Oct 24 14:46:55 2017 us=138366 peer 1 (phone) floated from 65.44.211.33:38254 to [AF_INET]172.56.39.203:61300 |
---|
1070 | Tue Oct 24 14:46:58 2017 us=285748 Float requested for peer 1 to 65.44.211.33:38254 |
---|
1071 | Tue Oct 24 14:46:58 2017 us=286011 peer 1 (phone) floated from 172.56.39.203:61300 to [AF_INET]65.44.211.33:38254 |
---|
1072 | Tue Oct 24 14:47:38 2017 us=552551 MULTI: multi_create_instance called |
---|
1073 | Tue Oct 24 14:47:38 2017 us=552895 65.44.211.33:34846 Re-using SSL/TLS context |
---|
1074 | Tue Oct 24 14:47:38 2017 us=553097 65.44.211.33:34846 LZ4 compression initializing |
---|
1075 | Tue Oct 24 14:47:38 2017 us=553645 65.44.211.33:34846 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1076 | Tue Oct 24 14:47:38 2017 us=553774 65.44.211.33:34846 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1077 | Tue Oct 24 14:47:38 2017 us=554003 65.44.211.33:34846 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1078 | Tue Oct 24 14:47:38 2017 us=554103 65.44.211.33:34846 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1079 | Tue Oct 24 14:47:38 2017 us=554316 65.44.211.33:34846 TLS: Initial packet from [AF_INET]65.44.211.33:34846, sid=6b8cc27a 266a2e0e |
---|
1080 | Tue Oct 24 14:47:40 2017 us=442097 65.44.211.33:34846 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1081 | Tue Oct 24 14:47:40 2017 us=444300 65.44.211.33:34846 VERIFY KU OK |
---|
1082 | Tue Oct 24 14:47:40 2017 us=444454 65.44.211.33:34846 Validating certificate extended key usage |
---|
1083 | Tue Oct 24 14:47:40 2017 us=444561 65.44.211.33:34846 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1084 | Tue Oct 24 14:47:40 2017 us=444653 65.44.211.33:34846 VERIFY EKU OK |
---|
1085 | Tue Oct 24 14:47:40 2017 us=444746 65.44.211.33:34846 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1086 | Tue Oct 24 14:47:42 2017 us=362803 65.44.211.33:34846 peer info: IV_VER=2.5_master |
---|
1087 | Tue Oct 24 14:47:42 2017 us=362993 65.44.211.33:34846 peer info: IV_PLAT=android |
---|
1088 | Tue Oct 24 14:47:42 2017 us=363096 65.44.211.33:34846 peer info: IV_PROTO=2 |
---|
1089 | Tue Oct 24 14:47:42 2017 us=363195 65.44.211.33:34846 peer info: IV_LZ4=1 |
---|
1090 | Tue Oct 24 14:47:42 2017 us=363294 65.44.211.33:34846 peer info: IV_LZ4v2=1 |
---|
1091 | Tue Oct 24 14:47:42 2017 us=363392 65.44.211.33:34846 peer info: IV_LZO=1 |
---|
1092 | Tue Oct 24 14:47:42 2017 us=363490 65.44.211.33:34846 peer info: IV_COMP_STUB=1 |
---|
1093 | Tue Oct 24 14:47:42 2017 us=363589 65.44.211.33:34846 peer info: IV_COMP_STUBv2=1 |
---|
1094 | Tue Oct 24 14:47:42 2017 us=363688 65.44.211.33:34846 peer info: IV_TCPNL=1 |
---|
1095 | Tue Oct 24 14:47:42 2017 us=363789 65.44.211.33:34846 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1096 | Tue Oct 24 14:47:42 2017 us=364525 65.44.211.33:34846 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1097 | Tue Oct 24 14:47:42 2017 us=364654 65.44.211.33:34846 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1098 | Tue Oct 24 14:47:42 2017 us=486959 65.44.211.33:34846 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1099 | Tue Oct 24 14:47:42 2017 us=487234 65.44.211.33:34846 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:34846 |
---|
1100 | Tue Oct 24 14:47:42 2017 us=488048 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1101 | Tue Oct 24 14:47:42 2017 us=488176 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1102 | Tue Oct 24 14:47:42 2017 us=488512 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:34846 |
---|
1103 | Tue Oct 24 14:47:42 2017 us=488624 MULTI: primary virtual IP for phone/65.44.211.33:34846: 192.168.8.6 |
---|
1104 | Tue Oct 24 14:47:43 2017 us=956446 phone/65.44.211.33:34846 PUSH: Received control message: 'PUSH_REQUEST' |
---|
1105 | Tue Oct 24 14:47:43 2017 us=956773 phone/65.44.211.33:34846 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) |
---|
1106 | Tue Oct 24 14:48:38 2017 us=797788 Float requested for peer 0 to 172.56.39.203:44874 |
---|
1107 | Tue Oct 24 14:48:38 2017 us=798073 peer 0 (phone) floated from 65.44.211.33:34846 to [AF_INET]172.56.39.203:44874 |
---|
1108 | Tue Oct 24 14:48:45 2017 us=798295 Float requested for peer 0 to 65.44.211.33:34846 |
---|
1109 | Tue Oct 24 14:48:45 2017 us=798578 peer 0 (phone) floated from 172.56.39.203:44874 to [AF_INET]65.44.211.33:34846 |
---|
1110 | Tue Oct 24 14:49:05 2017 us=963277 MULTI: multi_create_instance called |
---|
1111 | Tue Oct 24 14:49:05 2017 us=963637 172.56.39.203:33162 Re-using SSL/TLS context |
---|
1112 | Tue Oct 24 14:49:05 2017 us=969517 172.56.39.203:33162 LZ4 compression initializing |
---|
1113 | Tue Oct 24 14:49:05 2017 us=970068 172.56.39.203:33162 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1114 | Tue Oct 24 14:49:05 2017 us=970207 172.56.39.203:33162 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1115 | Tue Oct 24 14:49:05 2017 us=970438 172.56.39.203:33162 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1116 | Tue Oct 24 14:49:05 2017 us=970581 172.56.39.203:33162 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1117 | Tue Oct 24 14:49:05 2017 us=970858 172.56.39.203:33162 TLS: Initial packet from [AF_INET]172.56.39.203:33162, sid=9d56c01e 9be983fa |
---|
1118 | Tue Oct 24 14:49:06 2017 us=663780 172.56.39.203:33162 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1119 | Tue Oct 24 14:49:06 2017 us=665802 172.56.39.203:33162 VERIFY KU OK |
---|
1120 | Tue Oct 24 14:49:06 2017 us=665938 172.56.39.203:33162 Validating certificate extended key usage |
---|
1121 | Tue Oct 24 14:49:06 2017 us=666044 172.56.39.203:33162 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1122 | Tue Oct 24 14:49:06 2017 us=666136 172.56.39.203:33162 VERIFY EKU OK |
---|
1123 | Tue Oct 24 14:49:06 2017 us=666227 172.56.39.203:33162 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1124 | Tue Oct 24 14:49:06 2017 us=873968 172.56.39.203:33162 peer info: IV_VER=2.5_master |
---|
1125 | Tue Oct 24 14:49:06 2017 us=874155 172.56.39.203:33162 peer info: IV_PLAT=android |
---|
1126 | Tue Oct 24 14:49:06 2017 us=874259 172.56.39.203:33162 peer info: IV_PROTO=2 |
---|
1127 | Tue Oct 24 14:49:06 2017 us=874357 172.56.39.203:33162 peer info: IV_LZ4=1 |
---|
1128 | Tue Oct 24 14:49:06 2017 us=874456 172.56.39.203:33162 peer info: IV_LZ4v2=1 |
---|
1129 | Tue Oct 24 14:49:06 2017 us=874553 172.56.39.203:33162 peer info: IV_LZO=1 |
---|
1130 | Tue Oct 24 14:49:06 2017 us=874651 172.56.39.203:33162 peer info: IV_COMP_STUB=1 |
---|
1131 | Tue Oct 24 14:49:06 2017 us=874749 172.56.39.203:33162 peer info: IV_COMP_STUBv2=1 |
---|
1132 | Tue Oct 24 14:49:06 2017 us=874846 172.56.39.203:33162 peer info: IV_TCPNL=1 |
---|
1133 | Tue Oct 24 14:49:06 2017 us=874945 172.56.39.203:33162 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1134 | Tue Oct 24 14:49:06 2017 us=875679 172.56.39.203:33162 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1135 | Tue Oct 24 14:49:06 2017 us=875808 172.56.39.203:33162 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1136 | Tue Oct 24 14:49:06 2017 us=961949 172.56.39.203:33162 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1137 | Tue Oct 24 14:49:06 2017 us=962216 172.56.39.203:33162 [phone] Peer Connection Initiated with [AF_INET]172.56.39.203:33162 |
---|
1138 | Tue Oct 24 14:49:06 2017 us=963031 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1139 | Tue Oct 24 14:49:06 2017 us=963153 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1140 | Tue Oct 24 14:49:06 2017 us=963492 MULTI: Learn: 192.168.8.6 -> phone/172.56.39.203:33162 |
---|
1141 | Tue Oct 24 14:49:06 2017 us=963605 MULTI: primary virtual IP for phone/172.56.39.203:33162: 192.168.8.6 |
---|
1142 | Tue Oct 24 14:49:08 2017 us=182132 phone/172.56.39.203:33162 PUSH: Received control message: 'PUSH_REQUEST' |
---|
1143 | Tue Oct 24 14:49:08 2017 us=182473 phone/172.56.39.203:33162 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) |
---|
1144 | Tue Oct 24 14:54:28 2017 us=479962 Float requested for peer 1 to 65.44.211.33:41166 |
---|
1145 | Tue Oct 24 14:54:28 2017 us=487011 peer 1 (phone) floated from 172.56.39.203:33162 to [AF_INET]65.44.211.33:41166 |
---|
1146 | Tue Oct 24 14:54:56 2017 us=483291 MULTI: multi_create_instance called |
---|
1147 | Tue Oct 24 14:54:56 2017 us=483627 65.44.211.33:58877 Re-using SSL/TLS context |
---|
1148 | Tue Oct 24 14:54:56 2017 us=483746 65.44.211.33:58877 LZ4 compression initializing |
---|
1149 | Tue Oct 24 14:54:56 2017 us=484216 65.44.211.33:58877 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1150 | Tue Oct 24 14:54:56 2017 us=484334 65.44.211.33:58877 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1151 | Tue Oct 24 14:54:56 2017 us=484564 65.44.211.33:58877 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1152 | Tue Oct 24 14:54:56 2017 us=484726 65.44.211.33:58877 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1153 | Tue Oct 24 14:54:56 2017 us=484931 65.44.211.33:58877 TLS: Initial packet from [AF_INET]65.44.211.33:58877, sid=163fbc45 138f3378 |
---|
1154 | Tue Oct 24 14:55:01 2017 us=964373 65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1155 | Tue Oct 24 14:55:01 2017 us=966430 65.44.211.33:58877 VERIFY KU OK |
---|
1156 | Tue Oct 24 14:55:01 2017 us=966586 65.44.211.33:58877 Validating certificate extended key usage |
---|
1157 | Tue Oct 24 14:55:01 2017 us=966693 65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1158 | Tue Oct 24 14:55:01 2017 us=966785 65.44.211.33:58877 VERIFY EKU OK |
---|
1159 | Tue Oct 24 14:55:01 2017 us=966877 65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1160 | Tue Oct 24 14:55:02 2017 us=93071 65.44.211.33:58877 peer info: IV_VER=2.5_master |
---|
1161 | Tue Oct 24 14:55:02 2017 us=93254 65.44.211.33:58877 peer info: IV_PLAT=android |
---|
1162 | Tue Oct 24 14:55:02 2017 us=93362 65.44.211.33:58877 peer info: IV_PROTO=2 |
---|
1163 | Tue Oct 24 14:55:02 2017 us=93462 65.44.211.33:58877 peer info: IV_LZ4=1 |
---|
1164 | Tue Oct 24 14:55:02 2017 us=93565 65.44.211.33:58877 peer info: IV_LZ4v2=1 |
---|
1165 | Tue Oct 24 14:55:02 2017 us=93663 65.44.211.33:58877 peer info: IV_LZO=1 |
---|
1166 | Tue Oct 24 14:55:02 2017 us=93761 65.44.211.33:58877 peer info: IV_COMP_STUB=1 |
---|
1167 | Tue Oct 24 14:55:02 2017 us=93860 65.44.211.33:58877 peer info: IV_COMP_STUBv2=1 |
---|
1168 | Tue Oct 24 14:55:02 2017 us=93959 65.44.211.33:58877 peer info: IV_TCPNL=1 |
---|
1169 | Tue Oct 24 14:55:02 2017 us=94060 65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1170 | Tue Oct 24 14:55:02 2017 us=94800 65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1171 | Tue Oct 24 14:55:02 2017 us=94932 65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1172 | Tue Oct 24 14:55:02 2017 us=118358 65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1173 | Tue Oct 24 14:55:02 2017 us=118735 65.44.211.33:58877 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:58877 |
---|
1174 | Tue Oct 24 14:55:02 2017 us=119642 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1175 | Tue Oct 24 14:55:02 2017 us=119776 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1176 | Tue Oct 24 14:55:02 2017 us=120112 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:58877 |
---|
1177 | Tue Oct 24 14:55:02 2017 us=120225 MULTI: primary virtual IP for phone/65.44.211.33:58877: 192.168.8.6 |
---|
1178 | Tue Oct 24 14:55:04 2017 us=219601 phone/65.44.211.33:58877 PUSH: Received control message: 'PUSH_REQUEST' |
---|
1179 | Tue Oct 24 14:55:04 2017 us=219972 phone/65.44.211.33:58877 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) |
---|
1180 | Tue Oct 24 15:06:24 2017 us=148015 Float requested for peer 0 to 208.54.5.202:32151 |
---|
1181 | Tue Oct 24 15:06:24 2017 us=155013 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]208.54.5.202:32151 |
---|
1182 | Tue Oct 24 15:18:55 2017 us=904942 Float requested for peer 0 to 65.44.211.33:58877 |
---|
1183 | Tue Oct 24 15:18:55 2017 us=905306 peer 0 (phone) floated from 208.54.5.202:32151 to [AF_INET]65.44.211.33:58877 |
---|
1184 | Tue Oct 24 15:22:51 2017 us=780007 Float requested for peer 0 to 208.54.5.174:55565 |
---|
1185 | Tue Oct 24 15:22:51 2017 us=780279 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]208.54.5.174:55565 |
---|
1186 | Tue Oct 24 15:22:55 2017 us=64706 Float requested for peer 0 to 65.44.211.33:58877 |
---|
1187 | Tue Oct 24 15:22:55 2017 us=64961 peer 0 (phone) floated from 208.54.5.174:55565 to [AF_INET]65.44.211.33:58877 |
---|
1188 | Tue Oct 24 15:26:01 2017 us=786095 Float requested for peer 0 to 172.56.39.8:34313 |
---|
1189 | Tue Oct 24 15:26:01 2017 us=786435 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.39.8:34313 |
---|
1190 | Tue Oct 24 15:35:00 2017 us=241152 Float requested for peer 0 to 65.44.211.33:58877 |
---|
1191 | Tue Oct 24 15:35:00 2017 us=241432 peer 0 (phone) floated from 172.56.39.8:34313 to [AF_INET]65.44.211.33:58877 |
---|
1192 | Tue Oct 24 15:55:02 2017 us=681224 phone/65.44.211.33:58877 TLS: soft reset sec=0 bytes=1422647/-1 pkts=6572/0 |
---|
1193 | Tue Oct 24 15:55:08 2017 us=686310 phone/65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1194 | Tue Oct 24 15:55:08 2017 us=688320 phone/65.44.211.33:58877 VERIFY KU OK |
---|
1195 | Tue Oct 24 15:55:08 2017 us=688449 phone/65.44.211.33:58877 Validating certificate extended key usage |
---|
1196 | Tue Oct 24 15:55:08 2017 us=688558 phone/65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1197 | Tue Oct 24 15:55:08 2017 us=688654 phone/65.44.211.33:58877 VERIFY EKU OK |
---|
1198 | Tue Oct 24 15:55:08 2017 us=688748 phone/65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1199 | Tue Oct 24 15:55:08 2017 us=809059 phone/65.44.211.33:58877 peer info: IV_VER=2.5_master |
---|
1200 | Tue Oct 24 15:55:08 2017 us=809257 phone/65.44.211.33:58877 peer info: IV_PLAT=android |
---|
1201 | Tue Oct 24 15:55:08 2017 us=809366 phone/65.44.211.33:58877 peer info: IV_PROTO=2 |
---|
1202 | Tue Oct 24 15:55:08 2017 us=809471 phone/65.44.211.33:58877 peer info: IV_LZ4=1 |
---|
1203 | Tue Oct 24 15:55:08 2017 us=809575 phone/65.44.211.33:58877 peer info: IV_LZ4v2=1 |
---|
1204 | Tue Oct 24 15:55:08 2017 us=809678 phone/65.44.211.33:58877 peer info: IV_LZO=1 |
---|
1205 | Tue Oct 24 15:55:08 2017 us=809783 phone/65.44.211.33:58877 peer info: IV_COMP_STUB=1 |
---|
1206 | Tue Oct 24 15:55:08 2017 us=809887 phone/65.44.211.33:58877 peer info: IV_COMP_STUBv2=1 |
---|
1207 | Tue Oct 24 15:55:08 2017 us=809992 phone/65.44.211.33:58877 peer info: IV_TCPNL=1 |
---|
1208 | Tue Oct 24 15:55:08 2017 us=810097 phone/65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1209 | Tue Oct 24 15:55:08 2017 us=810843 phone/65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1210 | Tue Oct 24 15:55:08 2017 us=810975 phone/65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1211 | Tue Oct 24 15:55:08 2017 us=834525 phone/65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1212 | Tue Oct 24 16:47:49 2017 us=180056 Float requested for peer 0 to 172.56.38.49:20375 |
---|
1213 | Tue Oct 24 16:47:49 2017 us=180332 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.49:20375 |
---|
1214 | Tue Oct 24 16:49:02 2017 us=927621 Float requested for peer 0 to 65.44.211.33:58877 |
---|
1215 | Tue Oct 24 16:49:02 2017 us=927944 peer 0 (phone) floated from 172.56.38.49:20375 to [AF_INET]65.44.211.33:58877 |
---|
1216 | Tue Oct 24 16:49:02 2017 us=934468 Float requested for peer 0 to 172.56.38.49:20375 |
---|
1217 | Tue Oct 24 16:49:02 2017 us=934766 PID_ERR replay-window backtrack occurred [4] [SSL-1] [00___EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:1963 0:1959 t=1508885342[0] r=[0,64,15,4,1] sl=[21,64,64,528] |
---|
1218 | Tue Oct 24 16:49:02 2017 us=934919 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.49:20375 |
---|
1219 | Tue Oct 24 16:49:02 2017 us=951117 Float requested for peer 0 to 65.44.211.33:58877 |
---|
1220 | Tue Oct 24 16:49:02 2017 us=951359 peer 0 (phone) floated from 172.56.38.49:20375 to [AF_INET]65.44.211.33:58877 |
---|
1221 | Tue Oct 24 16:55:02 2017 us=441643 phone/65.44.211.33:58877 TLS: tls_process: killed expiring key |
---|
1222 | Tue Oct 24 16:55:08 2017 us=580015 phone/65.44.211.33:58877 TLS: soft reset sec=0 bytes=762747/-1 pkts=4162/0 |
---|
1223 | Tue Oct 24 16:55:13 2017 us=437703 phone/65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1224 | Tue Oct 24 16:55:13 2017 us=439711 phone/65.44.211.33:58877 VERIFY KU OK |
---|
1225 | Tue Oct 24 16:55:13 2017 us=439844 phone/65.44.211.33:58877 Validating certificate extended key usage |
---|
1226 | Tue Oct 24 16:55:13 2017 us=439954 phone/65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1227 | Tue Oct 24 16:55:13 2017 us=440115 phone/65.44.211.33:58877 VERIFY EKU OK |
---|
1228 | Tue Oct 24 16:55:13 2017 us=440210 phone/65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1229 | Tue Oct 24 16:55:13 2017 us=589706 phone/65.44.211.33:58877 peer info: IV_VER=2.5_master |
---|
1230 | Tue Oct 24 16:55:13 2017 us=589909 phone/65.44.211.33:58877 peer info: IV_PLAT=android |
---|
1231 | Tue Oct 24 16:55:13 2017 us=590015 phone/65.44.211.33:58877 peer info: IV_PROTO=2 |
---|
1232 | Tue Oct 24 16:55:13 2017 us=590140 phone/65.44.211.33:58877 peer info: IV_LZ4=1 |
---|
1233 | Tue Oct 24 16:55:13 2017 us=590241 phone/65.44.211.33:58877 peer info: IV_LZ4v2=1 |
---|
1234 | Tue Oct 24 16:55:13 2017 us=590399 phone/65.44.211.33:58877 peer info: IV_LZO=1 |
---|
1235 | Tue Oct 24 16:55:13 2017 us=590502 phone/65.44.211.33:58877 peer info: IV_COMP_STUB=1 |
---|
1236 | Tue Oct 24 16:55:13 2017 us=590603 phone/65.44.211.33:58877 peer info: IV_COMP_STUBv2=1 |
---|
1237 | Tue Oct 24 16:55:13 2017 us=590702 phone/65.44.211.33:58877 peer info: IV_TCPNL=1 |
---|
1238 | Tue Oct 24 16:55:13 2017 us=590801 phone/65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1239 | Tue Oct 24 16:55:13 2017 us=591537 phone/65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1240 | Tue Oct 24 16:55:13 2017 us=591672 phone/65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1241 | Tue Oct 24 16:55:13 2017 us=613621 phone/65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1242 | Tue Oct 24 17:32:44 2017 us=343409 Float requested for peer 0 to 172.56.39.159:51149 |
---|
1243 | Tue Oct 24 17:32:44 2017 us=356338 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.39.159:51149 |
---|
1244 | Tue Oct 24 17:33:00 2017 us=561088 Float requested for peer 0 to 65.44.211.33:58877 |
---|
1245 | Tue Oct 24 17:33:00 2017 us=561404 peer 0 (phone) floated from 172.56.39.159:51149 to [AF_INET]65.44.211.33:58877 |
---|
1246 | Tue Oct 24 17:46:45 2017 us=406925 Float requested for peer 0 to 172.56.38.99:60579 |
---|
1247 | Tue Oct 24 17:46:45 2017 us=407209 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.99:60579 |
---|
1248 | Tue Oct 24 17:46:55 2017 us=254422 Float requested for peer 0 to 65.44.211.33:58877 |
---|
1249 | Tue Oct 24 17:46:55 2017 us=254686 peer 0 (phone) floated from 172.56.38.99:60579 to [AF_INET]65.44.211.33:58877 |
---|
1250 | Tue Oct 24 17:46:55 2017 us=420670 Float requested for peer 0 to 172.56.38.99:60579 |
---|
1251 | Tue Oct 24 17:46:55 2017 us=421069 PID_ERR replay-window backtrack occurred [1] [SSL-2] [0_00001111111_11111111112222222222222222223333333333333333333333] 0:1719 0:1718 t=1508888815[0] r=[0,64,15,1,1] sl=[9,64,64,528] |
---|
1252 | Tue Oct 24 17:46:55 2017 us=421231 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.99:60579 |
---|
1253 | Tue Oct 24 17:46:55 2017 us=483945 Float requested for peer 0 to 65.44.211.33:58877 |
---|
1254 | Tue Oct 24 17:46:55 2017 us=484205 peer 0 (phone) floated from 172.56.38.99:60579 to [AF_INET]65.44.211.33:58877 |
---|
1255 | Tue Oct 24 17:47:15 2017 us=708959 MULTI: multi_create_instance called |
---|
1256 | Tue Oct 24 17:47:15 2017 us=712667 65.44.211.33:49471 Re-using SSL/TLS context |
---|
1257 | Tue Oct 24 17:47:15 2017 us=712812 65.44.211.33:49471 LZ4 compression initializing |
---|
1258 | Tue Oct 24 17:47:15 2017 us=714659 65.44.211.33:49471 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1259 | Tue Oct 24 17:47:15 2017 us=714806 65.44.211.33:49471 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1260 | Tue Oct 24 17:47:15 2017 us=715085 65.44.211.33:49471 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1261 | Tue Oct 24 17:47:15 2017 us=715187 65.44.211.33:49471 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1262 | Tue Oct 24 17:47:15 2017 us=715402 65.44.211.33:49471 TLS: Initial packet from [AF_INET]65.44.211.33:49471, sid=a87e7f1b 04eb5237 |
---|
1263 | Tue Oct 24 17:47:30 2017 us=518072 65.44.211.33:49471 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1264 | Tue Oct 24 17:47:30 2017 us=520157 65.44.211.33:49471 VERIFY KU OK |
---|
1265 | Tue Oct 24 17:47:30 2017 us=520289 65.44.211.33:49471 Validating certificate extended key usage |
---|
1266 | Tue Oct 24 17:47:30 2017 us=520394 65.44.211.33:49471 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1267 | Tue Oct 24 17:47:30 2017 us=520487 65.44.211.33:49471 VERIFY EKU OK |
---|
1268 | Tue Oct 24 17:47:30 2017 us=520578 65.44.211.33:49471 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1269 | Tue Oct 24 17:47:30 2017 us=674106 65.44.211.33:49471 peer info: IV_VER=2.5_master |
---|
1270 | Tue Oct 24 17:47:30 2017 us=674295 65.44.211.33:49471 peer info: IV_PLAT=android |
---|
1271 | Tue Oct 24 17:47:30 2017 us=674397 65.44.211.33:49471 peer info: IV_PROTO=2 |
---|
1272 | Tue Oct 24 17:47:30 2017 us=674495 65.44.211.33:49471 peer info: IV_LZ4=1 |
---|
1273 | Tue Oct 24 17:47:30 2017 us=674593 65.44.211.33:49471 peer info: IV_LZ4v2=1 |
---|
1274 | Tue Oct 24 17:47:30 2017 us=674689 65.44.211.33:49471 peer info: IV_LZO=1 |
---|
1275 | Tue Oct 24 17:47:30 2017 us=674786 65.44.211.33:49471 peer info: IV_COMP_STUB=1 |
---|
1276 | Tue Oct 24 17:47:30 2017 us=674886 65.44.211.33:49471 peer info: IV_COMP_STUBv2=1 |
---|
1277 | Tue Oct 24 17:47:30 2017 us=674985 65.44.211.33:49471 peer info: IV_TCPNL=1 |
---|
1278 | Tue Oct 24 17:47:30 2017 us=675085 65.44.211.33:49471 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1279 | Tue Oct 24 17:47:30 2017 us=683639 65.44.211.33:49471 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1280 | Tue Oct 24 17:47:30 2017 us=683810 65.44.211.33:49471 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1281 | Tue Oct 24 17:47:30 2017 us=751876 65.44.211.33:49471 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1282 | Tue Oct 24 17:47:30 2017 us=752148 65.44.211.33:49471 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:49471 |
---|
1283 | Tue Oct 24 17:47:30 2017 us=760625 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1284 | Tue Oct 24 17:47:30 2017 us=760802 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1285 | Tue Oct 24 17:47:30 2017 us=761253 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:49471 |
---|
1286 | Tue Oct 24 17:47:30 2017 us=761376 MULTI: primary virtual IP for phone/65.44.211.33:49471: 192.168.8.6 |
---|
1287 | Tue Oct 24 17:47:31 2017 us=788963 phone/65.44.211.33:49471 PUSH: Received control message: 'PUSH_REQUEST' |
---|
1288 | Tue Oct 24 17:47:31 2017 us=789356 phone/65.44.211.33:49471 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) |
---|
1289 | Tue Oct 24 17:56:37 2017 us=867285 MULTI: multi_create_instance called |
---|
1290 | Tue Oct 24 17:56:37 2017 us=867645 65.44.211.33:58877 Re-using SSL/TLS context |
---|
1291 | Tue Oct 24 17:56:37 2017 us=867761 65.44.211.33:58877 LZ4 compression initializing |
---|
1292 | Tue Oct 24 17:56:37 2017 us=868226 65.44.211.33:58877 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1293 | Tue Oct 24 17:56:37 2017 us=868342 65.44.211.33:58877 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1294 | Tue Oct 24 17:56:37 2017 us=868568 65.44.211.33:58877 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1295 | Tue Oct 24 17:56:37 2017 us=868667 65.44.211.33:58877 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1296 | Tue Oct 24 17:56:37 2017 us=868865 65.44.211.33:58877 TLS: Initial packet from [AF_INET]65.44.211.33:58877, sid=a7fbd933 c531d7d6 |
---|
1297 | Tue Oct 24 17:56:38 2017 us=220594 65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1298 | Tue Oct 24 17:56:38 2017 us=222567 65.44.211.33:58877 VERIFY KU OK |
---|
1299 | Tue Oct 24 17:56:38 2017 us=222774 65.44.211.33:58877 Validating certificate extended key usage |
---|
1300 | Tue Oct 24 17:56:38 2017 us=222883 65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1301 | Tue Oct 24 17:56:38 2017 us=222976 65.44.211.33:58877 VERIFY EKU OK |
---|
1302 | Tue Oct 24 17:56:38 2017 us=223066 65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1303 | Tue Oct 24 17:56:38 2017 us=343532 65.44.211.33:58877 peer info: IV_VER=2.5_master |
---|
1304 | Tue Oct 24 17:56:38 2017 us=343716 65.44.211.33:58877 peer info: IV_PLAT=android |
---|
1305 | Tue Oct 24 17:56:38 2017 us=343818 65.44.211.33:58877 peer info: IV_PROTO=2 |
---|
1306 | Tue Oct 24 17:56:38 2017 us=343918 65.44.211.33:58877 peer info: IV_LZ4=1 |
---|
1307 | Tue Oct 24 17:56:38 2017 us=344016 65.44.211.33:58877 peer info: IV_LZ4v2=1 |
---|
1308 | Tue Oct 24 17:56:38 2017 us=344114 65.44.211.33:58877 peer info: IV_LZO=1 |
---|
1309 | Tue Oct 24 17:56:38 2017 us=344213 65.44.211.33:58877 peer info: IV_COMP_STUB=1 |
---|
1310 | Tue Oct 24 17:56:38 2017 us=344311 65.44.211.33:58877 peer info: IV_COMP_STUBv2=1 |
---|
1311 | Tue Oct 24 17:56:38 2017 us=344409 65.44.211.33:58877 peer info: IV_TCPNL=1 |
---|
1312 | Tue Oct 24 17:56:38 2017 us=344509 65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1313 | Tue Oct 24 17:56:38 2017 us=345331 65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1314 | Tue Oct 24 17:56:38 2017 us=345472 65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1315 | Tue Oct 24 17:56:38 2017 us=367414 65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1316 | Tue Oct 24 17:56:38 2017 us=367690 65.44.211.33:58877 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:58877 |
---|
1317 | Tue Oct 24 17:56:38 2017 us=368493 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1318 | Tue Oct 24 17:56:38 2017 us=368615 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1319 | Tue Oct 24 17:56:38 2017 us=368951 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:58877 |
---|
1320 | Tue Oct 24 17:56:38 2017 us=369160 MULTI: primary virtual IP for phone/65.44.211.33:58877: 192.168.8.6 |
---|
1321 | Tue Oct 24 17:57:17 2017 us=329367 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] |
---|
1322 | Tue Oct 24 17:57:52 2017 us=526506 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] |
---|
1323 | Tue Oct 24 17:58:28 2017 us=178226 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] |
---|
1324 | Tue Oct 24 17:59:03 2017 us=507707 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] |
---|
1325 | Tue Oct 24 17:59:39 2017 us=128017 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] |
---|
1326 | Tue Oct 24 18:00:14 2017 us=449372 Float requested for peer 0 to 172.56.39.235:47193 |
---|
1327 | Tue Oct 24 18:00:14 2017 us=449536 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] |
---|
1328 | Tue Oct 24 18:00:14 2017 us=449730 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.39.235:47193 |
---|
1329 | Tue Oct 24 18:00:50 2017 us=188366 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] |
---|
1330 | Tue Oct 24 18:01:25 2017 us=526653 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] |
---|
1331 | Tue Oct 24 18:02:01 2017 us=208679 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] |
---|
1332 | Tue Oct 24 18:02:37 2017 us=141864 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] |
---|
1333 | Tue Oct 24 18:03:12 2017 us=32279 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] |
---|
1334 | Tue Oct 24 18:03:23 2017 us=682107 MULTI: multi_create_instance called |
---|
1335 | Tue Oct 24 18:03:23 2017 us=682457 172.56.39.235:41284 Re-using SSL/TLS context |
---|
1336 | Tue Oct 24 18:03:23 2017 us=682665 172.56.39.235:41284 LZ4 compression initializing |
---|
1337 | Tue Oct 24 18:03:23 2017 us=683148 172.56.39.235:41284 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1338 | Tue Oct 24 18:03:23 2017 us=683379 172.56.39.235:41284 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1339 | Tue Oct 24 18:03:23 2017 us=683617 172.56.39.235:41284 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1340 | Tue Oct 24 18:03:23 2017 us=683720 172.56.39.235:41284 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1341 | Tue Oct 24 18:03:23 2017 us=683935 172.56.39.235:41284 TLS: Initial packet from [AF_INET]172.56.39.235:41284, sid=dac765d9 bbed58f0 |
---|
1342 | Tue Oct 24 18:03:24 2017 us=335291 172.56.39.235:41284 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1343 | Tue Oct 24 18:03:24 2017 us=337713 172.56.39.235:41284 VERIFY KU OK |
---|
1344 | Tue Oct 24 18:03:24 2017 us=337869 172.56.39.235:41284 Validating certificate extended key usage |
---|
1345 | Tue Oct 24 18:03:24 2017 us=337982 172.56.39.235:41284 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1346 | Tue Oct 24 18:03:24 2017 us=338082 172.56.39.235:41284 VERIFY EKU OK |
---|
1347 | Tue Oct 24 18:03:24 2017 us=338180 172.56.39.235:41284 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1348 | Tue Oct 24 18:03:24 2017 us=589165 172.56.39.235:41284 peer info: IV_VER=2.5_master |
---|
1349 | Tue Oct 24 18:03:24 2017 us=589270 172.56.39.235:41284 peer info: IV_PLAT=android |
---|
1350 | Tue Oct 24 18:03:24 2017 us=589312 172.56.39.235:41284 peer info: IV_PROTO=2 |
---|
1351 | Tue Oct 24 18:03:24 2017 us=589352 172.56.39.235:41284 peer info: IV_LZ4=1 |
---|
1352 | Tue Oct 24 18:03:24 2017 us=589392 172.56.39.235:41284 peer info: IV_LZ4v2=1 |
---|
1353 | Tue Oct 24 18:03:24 2017 us=589433 172.56.39.235:41284 peer info: IV_LZO=1 |
---|
1354 | Tue Oct 24 18:03:24 2017 us=589474 172.56.39.235:41284 peer info: IV_COMP_STUB=1 |
---|
1355 | Tue Oct 24 18:03:24 2017 us=589516 172.56.39.235:41284 peer info: IV_COMP_STUBv2=1 |
---|
1356 | Tue Oct 24 18:03:24 2017 us=589557 172.56.39.235:41284 peer info: IV_TCPNL=1 |
---|
1357 | Tue Oct 24 18:03:24 2017 us=589599 172.56.39.235:41284 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1358 | Tue Oct 24 18:03:24 2017 us=589907 172.56.39.235:41284 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1359 | Tue Oct 24 18:03:24 2017 us=589962 172.56.39.235:41284 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1360 | Tue Oct 24 18:03:24 2017 us=671105 172.56.39.235:41284 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1361 | Tue Oct 24 18:03:24 2017 us=671258 172.56.39.235:41284 [phone] Peer Connection Initiated with [AF_INET]172.56.39.235:41284 |
---|
1362 | Tue Oct 24 18:03:24 2017 us=671662 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1363 | Tue Oct 24 18:03:24 2017 us=671721 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1364 | Tue Oct 24 18:03:24 2017 us=671885 MULTI: Learn: 192.168.8.6 -> phone/172.56.39.235:41284 |
---|
1365 | Tue Oct 24 18:03:24 2017 us=671941 MULTI: primary virtual IP for phone/172.56.39.235:41284: 192.168.8.6 |
---|
1366 | Tue Oct 24 18:03:25 2017 us=800632 phone/172.56.39.235:41284 PUSH: Received control message: 'PUSH_REQUEST' |
---|
1367 | Tue Oct 24 18:03:25 2017 us=801077 phone/172.56.39.235:41284 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) |
---|
1368 | Tue Oct 24 18:04:28 2017 us=312624 Float requested for peer 1 to 174.52.84.126:40916 |
---|
1369 | Tue Oct 24 18:04:28 2017 us=312940 peer 1 (phone) floated from 172.56.39.235:41284 to [AF_INET]174.52.84.126:40916 |
---|
1370 | Tue Oct 24 18:04:46 2017 us=681292 Float requested for peer 1 to 172.56.39.235:41284 |
---|
1371 | Tue Oct 24 18:04:46 2017 us=681557 peer 1 (phone) floated from 174.52.84.126:40916 to [AF_INET]172.56.39.235:41284 |
---|
1372 | Tue Oct 24 18:05:01 2017 us=25688 MULTI: multi_create_instance called |
---|
1373 | Tue Oct 24 18:05:01 2017 us=26032 172.56.39.235:45483 Re-using SSL/TLS context |
---|
1374 | Tue Oct 24 18:05:01 2017 us=26149 172.56.39.235:45483 LZ4 compression initializing |
---|
1375 | Tue Oct 24 18:05:01 2017 us=26617 172.56.39.235:45483 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1376 | Tue Oct 24 18:05:01 2017 us=26736 172.56.39.235:45483 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1377 | Tue Oct 24 18:05:01 2017 us=26968 172.56.39.235:45483 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1378 | Tue Oct 24 18:05:01 2017 us=27070 172.56.39.235:45483 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1379 | Tue Oct 24 18:05:01 2017 us=27283 172.56.39.235:45483 TLS: Initial packet from [AF_INET]172.56.39.235:45483, sid=08552430 7f7e56ac |
---|
1380 | Tue Oct 24 18:05:01 2017 us=895778 172.56.39.235:45483 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1381 | Tue Oct 24 18:05:01 2017 us=897205 172.56.39.235:45483 VERIFY KU OK |
---|
1382 | Tue Oct 24 18:05:01 2017 us=897310 172.56.39.235:45483 Validating certificate extended key usage |
---|
1383 | Tue Oct 24 18:05:01 2017 us=897386 172.56.39.235:45483 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1384 | Tue Oct 24 18:05:01 2017 us=897453 172.56.39.235:45483 VERIFY EKU OK |
---|
1385 | Tue Oct 24 18:05:01 2017 us=897519 172.56.39.235:45483 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1386 | Tue Oct 24 18:05:02 2017 us=33884 172.56.39.235:45483 peer info: IV_VER=2.5_master |
---|
1387 | Tue Oct 24 18:05:02 2017 us=34080 172.56.39.235:45483 peer info: IV_PLAT=android |
---|
1388 | Tue Oct 24 18:05:02 2017 us=34190 172.56.39.235:45483 peer info: IV_PROTO=2 |
---|
1389 | Tue Oct 24 18:05:02 2017 us=34294 172.56.39.235:45483 peer info: IV_LZ4=1 |
---|
1390 | Tue Oct 24 18:05:02 2017 us=34399 172.56.39.235:45483 peer info: IV_LZ4v2=1 |
---|
1391 | Tue Oct 24 18:05:02 2017 us=34503 172.56.39.235:45483 peer info: IV_LZO=1 |
---|
1392 | Tue Oct 24 18:05:02 2017 us=34606 172.56.39.235:45483 peer info: IV_COMP_STUB=1 |
---|
1393 | Tue Oct 24 18:05:02 2017 us=34709 172.56.39.235:45483 peer info: IV_COMP_STUBv2=1 |
---|
1394 | Tue Oct 24 18:05:02 2017 us=34812 172.56.39.235:45483 peer info: IV_TCPNL=1 |
---|
1395 | Tue Oct 24 18:05:02 2017 us=34918 172.56.39.235:45483 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1396 | Tue Oct 24 18:05:02 2017 us=35660 172.56.39.235:45483 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1397 | Tue Oct 24 18:05:02 2017 us=35797 172.56.39.235:45483 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1398 | Tue Oct 24 18:05:02 2017 us=124443 172.56.39.235:45483 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1399 | Tue Oct 24 18:05:02 2017 us=124811 172.56.39.235:45483 [phone] Peer Connection Initiated with [AF_INET]172.56.39.235:45483 |
---|
1400 | Tue Oct 24 18:05:02 2017 us=125796 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1401 | Tue Oct 24 18:05:02 2017 us=126050 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1402 | Tue Oct 24 18:05:02 2017 us=126399 MULTI: Learn: 192.168.8.6 -> phone/172.56.39.235:45483 |
---|
1403 | Tue Oct 24 18:05:02 2017 us=126516 MULTI: primary virtual IP for phone/172.56.39.235:45483: 192.168.8.6 |
---|
1404 | Tue Oct 24 18:05:03 2017 us=253866 phone/172.56.39.235:45483 PUSH: Received control message: 'PUSH_REQUEST' |
---|
1405 | Tue Oct 24 18:05:03 2017 us=254200 phone/172.56.39.235:45483 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) |
---|
1406 | Tue Oct 24 18:08:33 2017 us=884238 Float requested for peer 0 to 192.168.1.1:37755 |
---|
1407 | Tue Oct 24 18:08:33 2017 us=884531 peer 0 (phone) floated from 172.56.39.235:45483 to [AF_INET]192.168.1.1:37755 |
---|
1408 | Tue Oct 24 18:08:33 2017 us=935647 Float requested for peer 0 to 172.56.39.235:45483 |
---|
1409 | Tue Oct 24 18:08:33 2017 us=935965 PID_ERR replay-window backtrack occurred [2] [SSL-0] [00_EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:499 0:497 t=1508890113[0] r=[0,64,15,2,1] sl=[13,64,64,528] |
---|
1410 | Tue Oct 24 18:08:33 2017 us=936120 peer 0 (phone) floated from 192.168.1.1:37755 to [AF_INET]172.56.39.235:45483 |
---|
1411 | Tue Oct 24 18:08:33 2017 us=972945 Float requested for peer 0 to 192.168.1.1:37755 |
---|
1412 | Tue Oct 24 18:08:33 2017 us=973276 peer 0 (phone) floated from 172.56.39.235:45483 to [AF_INET]192.168.1.1:37755 |
---|
1413 | Tue Oct 24 19:05:02 2017 us=926497 phone/192.168.1.1:37755 TLS: soft reset sec=0 bytes=913523/-1 pkts=3290/0 |
---|
1414 | Tue Oct 24 19:05:08 2017 us=734214 phone/192.168.1.1:37755 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1415 | Tue Oct 24 19:05:08 2017 us=736222 phone/192.168.1.1:37755 VERIFY KU OK |
---|
1416 | Tue Oct 24 19:05:08 2017 us=736355 phone/192.168.1.1:37755 Validating certificate extended key usage |
---|
1417 | Tue Oct 24 19:05:08 2017 us=736464 phone/192.168.1.1:37755 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1418 | Tue Oct 24 19:05:08 2017 us=736561 phone/192.168.1.1:37755 VERIFY EKU OK |
---|
1419 | Tue Oct 24 19:05:08 2017 us=736658 phone/192.168.1.1:37755 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1420 | Tue Oct 24 19:05:08 2017 us=838652 phone/192.168.1.1:37755 peer info: IV_VER=2.5_master |
---|
1421 | Tue Oct 24 19:05:08 2017 us=838843 phone/192.168.1.1:37755 peer info: IV_PLAT=android |
---|
1422 | Tue Oct 24 19:05:08 2017 us=838957 phone/192.168.1.1:37755 peer info: IV_PROTO=2 |
---|
1423 | Tue Oct 24 19:05:08 2017 us=839063 phone/192.168.1.1:37755 peer info: IV_LZ4=1 |
---|
1424 | Tue Oct 24 19:05:08 2017 us=839167 phone/192.168.1.1:37755 peer info: IV_LZ4v2=1 |
---|
1425 | Tue Oct 24 19:05:08 2017 us=839270 phone/192.168.1.1:37755 peer info: IV_LZO=1 |
---|
1426 | Tue Oct 24 19:05:08 2017 us=839375 phone/192.168.1.1:37755 peer info: IV_COMP_STUB=1 |
---|
1427 | Tue Oct 24 19:05:08 2017 us=839478 phone/192.168.1.1:37755 peer info: IV_COMP_STUBv2=1 |
---|
1428 | Tue Oct 24 19:05:08 2017 us=839581 phone/192.168.1.1:37755 peer info: IV_TCPNL=1 |
---|
1429 | Tue Oct 24 19:05:08 2017 us=839685 phone/192.168.1.1:37755 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1430 | Tue Oct 24 19:05:08 2017 us=840414 phone/192.168.1.1:37755 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1431 | Tue Oct 24 19:05:08 2017 us=840549 phone/192.168.1.1:37755 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1432 | Tue Oct 24 19:05:08 2017 us=845156 phone/192.168.1.1:37755 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1433 | Tue Oct 24 19:08:59 2017 us=605888 MULTI: multi_create_instance called |
---|
1434 | Tue Oct 24 19:08:59 2017 us=606247 192.168.1.1:40916 Re-using SSL/TLS context |
---|
1435 | Tue Oct 24 19:08:59 2017 us=606364 192.168.1.1:40916 LZ4 compression initializing |
---|
1436 | Tue Oct 24 19:08:59 2017 us=606826 192.168.1.1:40916 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1437 | Tue Oct 24 19:08:59 2017 us=606948 192.168.1.1:40916 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1438 | Tue Oct 24 19:08:59 2017 us=607188 192.168.1.1:40916 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1439 | Tue Oct 24 19:08:59 2017 us=607292 192.168.1.1:40916 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1440 | Tue Oct 24 19:08:59 2017 us=607579 192.168.1.1:40916 TLS: Initial packet from [AF_INET]192.168.1.1:40916, sid=bb5fce43 1702bb9a |
---|
1441 | Tue Oct 24 19:08:59 2017 us=940475 192.168.1.1:40916 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1442 | Tue Oct 24 19:08:59 2017 us=942490 192.168.1.1:40916 VERIFY KU OK |
---|
1443 | Tue Oct 24 19:08:59 2017 us=942628 192.168.1.1:40916 Validating certificate extended key usage |
---|
1444 | Tue Oct 24 19:08:59 2017 us=942734 192.168.1.1:40916 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1445 | Tue Oct 24 19:08:59 2017 us=942828 192.168.1.1:40916 VERIFY EKU OK |
---|
1446 | Tue Oct 24 19:08:59 2017 us=942920 192.168.1.1:40916 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1447 | Tue Oct 24 19:09:00 2017 us=47298 192.168.1.1:40916 peer info: IV_VER=2.5_master |
---|
1448 | Tue Oct 24 19:09:00 2017 us=47487 192.168.1.1:40916 peer info: IV_PLAT=android |
---|
1449 | Tue Oct 24 19:09:00 2017 us=47590 192.168.1.1:40916 peer info: IV_PROTO=2 |
---|
1450 | Tue Oct 24 19:09:00 2017 us=47688 192.168.1.1:40916 peer info: IV_LZ4=1 |
---|
1451 | Tue Oct 24 19:09:00 2017 us=47786 192.168.1.1:40916 peer info: IV_LZ4v2=1 |
---|
1452 | Tue Oct 24 19:09:00 2017 us=47882 192.168.1.1:40916 peer info: IV_LZO=1 |
---|
1453 | Tue Oct 24 19:09:00 2017 us=47981 192.168.1.1:40916 peer info: IV_COMP_STUB=1 |
---|
1454 | Tue Oct 24 19:09:00 2017 us=48079 192.168.1.1:40916 peer info: IV_COMP_STUBv2=1 |
---|
1455 | Tue Oct 24 19:09:00 2017 us=48177 192.168.1.1:40916 peer info: IV_TCPNL=1 |
---|
1456 | Tue Oct 24 19:09:00 2017 us=48277 192.168.1.1:40916 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1457 | Tue Oct 24 19:09:00 2017 us=49087 192.168.1.1:40916 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1458 | Tue Oct 24 19:09:00 2017 us=49232 192.168.1.1:40916 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1459 | Tue Oct 24 19:09:00 2017 us=53766 192.168.1.1:40916 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1460 | Tue Oct 24 19:09:00 2017 us=53973 192.168.1.1:40916 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:40916 |
---|
1461 | Tue Oct 24 19:09:00 2017 us=54939 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1462 | Tue Oct 24 19:09:00 2017 us=55051 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1463 | Tue Oct 24 19:09:00 2017 us=55339 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:40916 |
---|
1464 | Tue Oct 24 19:09:00 2017 us=55439 MULTI: primary virtual IP for phone/192.168.1.1:40916: 192.168.8.6 |
---|
1465 | Tue Oct 24 19:09:40 2017 us=55819 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1466 | Tue Oct 24 19:10:30 2017 us=667500 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1467 | Tue Oct 24 19:11:06 2017 us=289440 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1468 | Tue Oct 24 19:12:04 2017 us=52131 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1469 | Tue Oct 24 19:12:54 2017 us=57206 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1470 | Tue Oct 24 19:13:29 2017 us=196842 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1471 | Tue Oct 24 19:14:04 2017 us=942777 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1472 | Tue Oct 24 19:14:39 2017 us=553898 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1473 | Tue Oct 24 19:15:14 2017 us=180489 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1474 | Tue Oct 24 19:16:03 2017 us=701802 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1475 | Tue Oct 24 19:17:03 2017 us=870894 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1476 | Tue Oct 24 19:17:38 2017 us=910962 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1477 | Tue Oct 24 19:18:21 2017 us=268289 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1478 | Tue Oct 24 19:19:01 2017 us=601220 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1479 | Tue Oct 24 19:19:38 2017 us=161849 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1480 | Tue Oct 24 19:20:13 2017 us=839672 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1481 | Tue Oct 24 19:20:50 2017 us=162182 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1482 | Tue Oct 24 19:21:25 2017 us=871030 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1483 | Tue Oct 24 19:22:00 2017 us=696655 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1484 | Tue Oct 24 19:22:35 2017 us=683491 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1485 | Tue Oct 24 19:23:11 2017 us=16531 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1486 | Tue Oct 24 19:24:37 2017 us=681289 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1487 | Tue Oct 24 19:25:37 2017 us=281703 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1488 | Tue Oct 24 19:26:13 2017 us=331207 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1489 | Tue Oct 24 19:26:48 2017 us=834953 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1490 | Tue Oct 24 19:27:23 2017 us=741529 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1491 | Tue Oct 24 19:28:08 2017 us=113950 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1492 | Tue Oct 24 19:28:44 2017 us=57980 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1493 | Tue Oct 24 19:29:18 2017 us=398147 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1494 | Tue Oct 24 19:29:53 2017 us=404251 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1495 | Tue Oct 24 19:30:28 2017 us=307336 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1496 | Tue Oct 24 19:31:04 2017 us=147868 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1497 | Tue Oct 24 19:31:39 2017 us=841369 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1498 | Tue Oct 24 19:32:14 2017 us=422171 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1499 | Tue Oct 24 19:32:49 2017 us=451085 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1500 | Tue Oct 24 19:33:24 2017 us=984363 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1501 | Tue Oct 24 19:33:59 2017 us=900342 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1502 | Tue Oct 24 19:34:35 2017 us=262151 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1503 | Tue Oct 24 19:35:11 2017 us=415026 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1504 | Tue Oct 24 19:35:59 2017 us=591967 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1505 | Tue Oct 24 19:36:34 2017 us=664801 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1506 | Tue Oct 24 19:37:12 2017 us=385316 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1507 | Tue Oct 24 19:37:48 2017 us=690993 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1508 | Tue Oct 24 19:38:47 2017 us=81065 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1509 | Tue Oct 24 19:39:26 2017 us=427716 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1510 | Tue Oct 24 19:40:02 2017 us=40050 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1511 | Tue Oct 24 19:40:37 2017 us=382579 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1512 | Tue Oct 24 19:41:37 2017 us=900026 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1513 | Tue Oct 24 19:42:38 2017 us=433168 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1514 | Tue Oct 24 19:43:38 2017 us=305468 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1515 | Tue Oct 24 19:44:37 2017 us=626170 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1516 | Tue Oct 24 19:45:12 2017 us=208107 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1517 | Tue Oct 24 19:45:54 2017 us=434331 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1518 | Tue Oct 24 19:46:30 2017 us=328444 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1519 | Tue Oct 24 19:47:31 2017 us=196110 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1520 | Tue Oct 24 19:48:06 2017 us=762390 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1521 | Tue Oct 24 19:49:01 2017 us=533856 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1522 | Tue Oct 24 19:50:25 2017 us=798723 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1523 | Tue Oct 24 19:51:00 2017 us=266778 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1524 | Tue Oct 24 19:51:49 2017 us=13403 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1525 | Tue Oct 24 19:52:23 2017 us=245900 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1526 | Tue Oct 24 19:53:02 2017 us=361988 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1527 | Tue Oct 24 19:53:37 2017 us=930457 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1528 | Tue Oct 24 19:54:21 2017 us=118790 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1529 | Tue Oct 24 19:55:03 2017 us=449525 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1530 | Tue Oct 24 19:56:03 2017 us=93290 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1531 | Tue Oct 24 19:56:37 2017 us=361914 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1532 | Tue Oct 24 19:57:35 2017 us=165028 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1533 | Tue Oct 24 19:58:30 2017 us=264780 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1534 | Tue Oct 24 19:59:05 2017 us=522177 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1535 | Tue Oct 24 20:00:05 2017 us=386113 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1536 | Tue Oct 24 20:00:41 2017 us=94358 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1537 | Tue Oct 24 20:01:15 2017 us=749637 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1538 | Tue Oct 24 20:01:50 2017 us=945080 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1539 | Tue Oct 24 20:02:25 2017 us=764109 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1540 | Tue Oct 24 20:03:01 2017 us=82871 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1541 | Tue Oct 24 20:03:36 2017 us=738926 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1542 | Tue Oct 24 20:04:11 2017 us=825486 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1543 | Tue Oct 24 20:04:46 2017 us=934210 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed |
---|
1544 | Tue Oct 24 20:06:23 2017 us=192096 MULTI: multi_create_instance called |
---|
1545 | Tue Oct 24 20:06:23 2017 us=192444 192.168.1.1:37755 Re-using SSL/TLS context |
---|
1546 | Tue Oct 24 20:06:23 2017 us=192568 192.168.1.1:37755 LZ4 compression initializing |
---|
1547 | Tue Oct 24 20:06:23 2017 us=193167 192.168.1.1:37755 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1548 | Tue Oct 24 20:06:23 2017 us=193339 192.168.1.1:37755 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1549 | Tue Oct 24 20:06:23 2017 us=193583 192.168.1.1:37755 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1550 | Tue Oct 24 20:06:23 2017 us=193693 192.168.1.1:37755 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1551 | Tue Oct 24 20:06:23 2017 us=193993 192.168.1.1:37755 TLS: Initial packet from [AF_INET]192.168.1.1:37755, sid=153d4e02 8016bd8f |
---|
1552 | Tue Oct 24 20:06:23 2017 us=632340 192.168.1.1:37755 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1553 | Tue Oct 24 20:06:23 2017 us=633794 192.168.1.1:37755 VERIFY KU OK |
---|
1554 | Tue Oct 24 20:06:23 2017 us=633905 192.168.1.1:37755 Validating certificate extended key usage |
---|
1555 | Tue Oct 24 20:06:23 2017 us=633973 192.168.1.1:37755 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1556 | Tue Oct 24 20:06:23 2017 us=634032 192.168.1.1:37755 VERIFY EKU OK |
---|
1557 | Tue Oct 24 20:06:23 2017 us=634091 192.168.1.1:37755 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1558 | Tue Oct 24 20:06:23 2017 us=693470 192.168.1.1:37755 peer info: IV_VER=2.5_master |
---|
1559 | Tue Oct 24 20:06:23 2017 us=693572 192.168.1.1:37755 peer info: IV_PLAT=android |
---|
1560 | Tue Oct 24 20:06:23 2017 us=693607 192.168.1.1:37755 peer info: IV_PROTO=2 |
---|
1561 | Tue Oct 24 20:06:23 2017 us=693642 192.168.1.1:37755 peer info: IV_LZ4=1 |
---|
1562 | Tue Oct 24 20:06:23 2017 us=693676 192.168.1.1:37755 peer info: IV_LZ4v2=1 |
---|
1563 | Tue Oct 24 20:06:23 2017 us=693711 192.168.1.1:37755 peer info: IV_LZO=1 |
---|
1564 | Tue Oct 24 20:06:23 2017 us=693745 192.168.1.1:37755 peer info: IV_COMP_STUB=1 |
---|
1565 | Tue Oct 24 20:06:23 2017 us=693778 192.168.1.1:37755 peer info: IV_COMP_STUBv2=1 |
---|
1566 | Tue Oct 24 20:06:23 2017 us=693812 192.168.1.1:37755 peer info: IV_TCPNL=1 |
---|
1567 | Tue Oct 24 20:06:23 2017 us=693846 192.168.1.1:37755 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1568 | Tue Oct 24 20:06:23 2017 us=694111 192.168.1.1:37755 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1569 | Tue Oct 24 20:06:23 2017 us=694161 192.168.1.1:37755 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1570 | Tue Oct 24 20:06:23 2017 us=697659 192.168.1.1:37755 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1571 | Tue Oct 24 20:06:23 2017 us=697816 192.168.1.1:37755 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:37755 |
---|
1572 | Tue Oct 24 20:06:23 2017 us=698193 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1573 | Tue Oct 24 20:06:23 2017 us=698242 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1574 | Tue Oct 24 20:06:23 2017 us=698373 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:37755 |
---|
1575 | Tue Oct 24 20:06:23 2017 us=698417 MULTI: primary virtual IP for phone/192.168.1.1:37755: 192.168.8.6 |
---|
1576 | Tue Oct 24 20:06:24 2017 us=132340 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1577 | Tue Oct 24 20:06:58 2017 us=757653 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1578 | Tue Oct 24 20:07:00 2017 us=346728 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1579 | Tue Oct 24 20:07:07 2017 us=899901 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1580 | Tue Oct 24 20:07:07 2017 us=900183 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1581 | Tue Oct 24 20:07:07 2017 us=900344 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1582 | Tue Oct 24 20:07:09 2017 us=726446 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1583 | Tue Oct 24 20:07:09 2017 us=757800 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1584 | Tue Oct 24 20:07:14 2017 us=220281 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1585 | Tue Oct 24 20:07:14 2017 us=737199 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1586 | Tue Oct 24 20:07:14 2017 us=760467 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1587 | Tue Oct 24 20:07:19 2017 us=753896 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1588 | Tue Oct 24 20:07:19 2017 us=764635 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1589 | Tue Oct 24 20:07:54 2017 us=468329 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1590 | Tue Oct 24 20:07:56 2017 us=616110 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1591 | Tue Oct 24 20:07:58 2017 us=355367 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1592 | Tue Oct 24 20:08:01 2017 us=421843 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1593 | Tue Oct 24 20:08:08 2017 us=85346 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1594 | Tue Oct 24 20:08:20 2017 us=98108 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1595 | Tue Oct 24 20:08:20 2017 us=124704 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1596 | Tue Oct 24 20:08:20 2017 us=290596 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1597 | Tue Oct 24 20:08:20 2017 us=485488 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1598 | Tue Oct 24 20:08:20 2017 us=493642 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1599 | Tue Oct 24 20:08:25 2017 us=101136 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1600 | Tue Oct 24 20:08:25 2017 us=129669 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1601 | Tue Oct 24 20:08:25 2017 us=295884 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1602 | Tue Oct 24 20:08:25 2017 us=487804 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1603 | Tue Oct 24 20:08:25 2017 us=498469 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1604 | Tue Oct 24 20:08:30 2017 us=111595 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1605 | Tue Oct 24 20:08:30 2017 us=111837 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1606 | Tue Oct 24 20:08:30 2017 us=111980 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1607 | Tue Oct 24 20:08:30 2017 us=147860 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1608 | Tue Oct 24 20:08:30 2017 us=148073 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1609 | Tue Oct 24 20:08:30 2017 us=299933 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1610 | Tue Oct 24 20:08:30 2017 us=494252 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1611 | Tue Oct 24 20:08:30 2017 us=494450 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1612 | Tue Oct 24 20:08:30 2017 us=500641 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1613 | Tue Oct 24 20:08:35 2017 us=582486 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1614 | Tue Oct 24 20:08:35 2017 us=582987 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1615 | Tue Oct 24 20:08:35 2017 us=583058 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1616 | Tue Oct 24 20:08:35 2017 us=583122 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1617 | Tue Oct 24 20:08:35 2017 us=583180 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1618 | Tue Oct 24 20:08:35 2017 us=583252 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1619 | Tue Oct 24 20:08:35 2017 us=583360 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1620 | Tue Oct 24 20:08:35 2017 us=583428 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1621 | Tue Oct 24 20:08:35 2017 us=583494 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1622 | Tue Oct 24 20:08:40 2017 us=125228 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1623 | Tue Oct 24 20:08:40 2017 us=125486 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1624 | Tue Oct 24 20:08:40 2017 us=125626 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1625 | Tue Oct 24 20:08:40 2017 us=145806 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1626 | Tue Oct 24 20:08:40 2017 us=306001 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1627 | Tue Oct 24 20:08:40 2017 us=502432 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1628 | Tue Oct 24 20:08:40 2017 us=502626 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1629 | Tue Oct 24 20:08:45 2017 us=126495 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1630 | Tue Oct 24 20:08:45 2017 us=126703 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1631 | Tue Oct 24 20:08:45 2017 us=126822 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1632 | Tue Oct 24 20:08:45 2017 us=153798 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1633 | Tue Oct 24 20:08:45 2017 us=309521 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1634 | Tue Oct 24 20:08:45 2017 us=505607 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1635 | Tue Oct 24 20:08:45 2017 us=505829 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1636 | Tue Oct 24 20:08:50 2017 us=141444 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1637 | Tue Oct 24 20:08:50 2017 us=312710 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1638 | Tue Oct 24 20:08:50 2017 us=322982 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1639 | Tue Oct 24 20:08:50 2017 us=469974 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1640 | Tue Oct 24 20:08:50 2017 us=503407 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1641 | Tue Oct 24 20:08:55 2017 us=134357 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1642 | Tue Oct 24 20:08:55 2017 us=315842 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1643 | Tue Oct 24 20:08:55 2017 us=325832 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1644 | Tue Oct 24 20:08:55 2017 us=514521 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1645 | Tue Oct 24 20:09:00 2017 us=332044 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1646 | Tue Oct 24 20:09:00 2017 us=333313 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1647 | Tue Oct 24 20:09:05 2017 us=351318 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1648 | Tue Oct 24 20:09:05 2017 us=351455 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1649 | Tue Oct 24 20:09:10 2017 us=360743 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1650 | Tue Oct 24 20:09:10 2017 us=360963 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1651 | Tue Oct 24 20:09:15 2017 us=359721 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1652 | Tue Oct 24 20:09:15 2017 us=360445 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1653 | Tue Oct 24 20:09:17 2017 us=297138 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1654 | Tue Oct 24 20:09:17 2017 us=360134 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1655 | Tue Oct 24 20:09:20 2017 us=368843 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1656 | Tue Oct 24 20:09:22 2017 us=297377 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1657 | Tue Oct 24 20:09:22 2017 us=363904 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1658 | Tue Oct 24 20:09:25 2017 us=372225 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1659 | Tue Oct 24 20:09:27 2017 us=306654 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1660 | Tue Oct 24 20:09:27 2017 us=370099 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1661 | Tue Oct 24 20:09:32 2017 us=309841 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1662 | Tue Oct 24 20:09:32 2017 us=372436 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1663 | Tue Oct 24 20:09:37 2017 us=435310 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1664 | Tue Oct 24 20:09:42 2017 us=444614 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1665 | Tue Oct 24 20:09:47 2017 us=449965 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1666 | Tue Oct 24 20:09:52 2017 us=456942 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1667 | Tue Oct 24 20:10:02 2017 us=297102 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1668 | Tue Oct 24 20:10:07 2017 us=85391 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1669 | Tue Oct 24 20:10:09 2017 us=653241 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1670 | Tue Oct 24 20:10:14 2017 us=666941 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] |
---|
1671 | Tue Oct 24 20:10:14 2017 us=857248 MULTI: multi_create_instance called |
---|
1672 | Tue Oct 24 20:10:14 2017 us=857518 192.168.1.1:40916 Re-using SSL/TLS context |
---|
1673 | Tue Oct 24 20:10:14 2017 us=857613 192.168.1.1:40916 LZ4 compression initializing |
---|
1674 | Tue Oct 24 20:10:14 2017 us=857990 192.168.1.1:40916 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1675 | Tue Oct 24 20:10:14 2017 us=858089 192.168.1.1:40916 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1676 | Tue Oct 24 20:10:14 2017 us=858277 192.168.1.1:40916 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1677 | Tue Oct 24 20:10:14 2017 us=858414 192.168.1.1:40916 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1678 | Tue Oct 24 20:10:14 2017 us=858581 192.168.1.1:40916 TLS: Initial packet from [AF_INET]192.168.1.1:40916, sid=632f2c7a a9b05198 |
---|
1679 | Tue Oct 24 20:10:15 2017 us=206144 192.168.1.1:40916 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1680 | Tue Oct 24 20:10:15 2017 us=207346 192.168.1.1:40916 VERIFY KU OK |
---|
1681 | Tue Oct 24 20:10:15 2017 us=207423 192.168.1.1:40916 Validating certificate extended key usage |
---|
1682 | Tue Oct 24 20:10:15 2017 us=207485 192.168.1.1:40916 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1683 | Tue Oct 24 20:10:15 2017 us=207541 192.168.1.1:40916 VERIFY EKU OK |
---|
1684 | Tue Oct 24 20:10:15 2017 us=207596 192.168.1.1:40916 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1685 | Tue Oct 24 20:10:15 2017 us=263151 192.168.1.1:40916 peer info: IV_VER=2.5_master |
---|
1686 | Tue Oct 24 20:10:15 2017 us=263253 192.168.1.1:40916 peer info: IV_PLAT=android |
---|
1687 | Tue Oct 24 20:10:15 2017 us=263297 192.168.1.1:40916 peer info: IV_PROTO=2 |
---|
1688 | Tue Oct 24 20:10:15 2017 us=263338 192.168.1.1:40916 peer info: IV_LZ4=1 |
---|
1689 | Tue Oct 24 20:10:15 2017 us=263380 192.168.1.1:40916 peer info: IV_LZ4v2=1 |
---|
1690 | Tue Oct 24 20:10:15 2017 us=263422 192.168.1.1:40916 peer info: IV_LZO=1 |
---|
1691 | Tue Oct 24 20:10:15 2017 us=263464 192.168.1.1:40916 peer info: IV_COMP_STUB=1 |
---|
1692 | Tue Oct 24 20:10:15 2017 us=263506 192.168.1.1:40916 peer info: IV_COMP_STUBv2=1 |
---|
1693 | Tue Oct 24 20:10:15 2017 us=263548 192.168.1.1:40916 peer info: IV_TCPNL=1 |
---|
1694 | Tue Oct 24 20:10:15 2017 us=263591 192.168.1.1:40916 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1695 | Tue Oct 24 20:10:15 2017 us=263912 192.168.1.1:40916 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1696 | Tue Oct 24 20:10:15 2017 us=263966 192.168.1.1:40916 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1697 | Tue Oct 24 20:10:15 2017 us=266953 192.168.1.1:40916 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1698 | Tue Oct 24 20:10:15 2017 us=267044 192.168.1.1:40916 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:40916 |
---|
1699 | Tue Oct 24 20:10:15 2017 us=267384 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1700 | Tue Oct 24 20:10:15 2017 us=267436 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1701 | Tue Oct 24 20:10:15 2017 us=267582 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:40916 |
---|
1702 | Tue Oct 24 20:10:15 2017 us=267631 MULTI: primary virtual IP for phone/192.168.1.1:40916: 192.168.8.6 |
---|
1703 | Tue Oct 24 20:18:23 2017 us=898496 MULTI: multi_create_instance called |
---|
1704 | Tue Oct 24 20:18:23 2017 us=898641 192.168.1.1:37798 Re-using SSL/TLS context |
---|
1705 | Tue Oct 24 20:18:23 2017 us=898679 192.168.1.1:37798 LZ4 compression initializing |
---|
1706 | Tue Oct 24 20:18:23 2017 us=898853 192.168.1.1:37798 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] |
---|
1707 | Tue Oct 24 20:18:23 2017 us=898887 192.168.1.1:37798 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] |
---|
1708 | Tue Oct 24 20:18:23 2017 us=898962 192.168.1.1:37798 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' |
---|
1709 | Tue Oct 24 20:18:23 2017 us=898992 192.168.1.1:37798 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' |
---|
1710 | Tue Oct 24 20:18:23 2017 us=899061 192.168.1.1:37798 TLS: Initial packet from [AF_INET]192.168.1.1:37798, sid=e0e7233b 63e2d0ce |
---|
1711 | Tue Oct 24 20:18:24 2017 us=147078 192.168.1.1:37798 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home |
---|
1712 | Tue Oct 24 20:18:24 2017 us=148050 192.168.1.1:37798 VERIFY KU OK |
---|
1713 | Tue Oct 24 20:18:24 2017 us=148108 192.168.1.1:37798 Validating certificate extended key usage |
---|
1714 | Tue Oct 24 20:18:24 2017 us=148157 192.168.1.1:37798 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication |
---|
1715 | Tue Oct 24 20:18:24 2017 us=148200 192.168.1.1:37798 VERIFY EKU OK |
---|
1716 | Tue Oct 24 20:18:24 2017 us=148242 192.168.1.1:37798 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home |
---|
1717 | Tue Oct 24 20:18:24 2017 us=193150 192.168.1.1:37798 peer info: IV_VER=2.5_master |
---|
1718 | Tue Oct 24 20:18:24 2017 us=193252 192.168.1.1:37798 peer info: IV_PLAT=android |
---|
1719 | Tue Oct 24 20:18:24 2017 us=193292 192.168.1.1:37798 peer info: IV_PROTO=2 |
---|
1720 | Tue Oct 24 20:18:24 2017 us=193329 192.168.1.1:37798 peer info: IV_LZ4=1 |
---|
1721 | Tue Oct 24 20:18:24 2017 us=193367 192.168.1.1:37798 peer info: IV_LZ4v2=1 |
---|
1722 | Tue Oct 24 20:18:24 2017 us=193405 192.168.1.1:37798 peer info: IV_LZO=1 |
---|
1723 | Tue Oct 24 20:18:24 2017 us=193443 192.168.1.1:37798 peer info: IV_COMP_STUB=1 |
---|
1724 | Tue Oct 24 20:18:24 2017 us=193480 192.168.1.1:37798 peer info: IV_COMP_STUBv2=1 |
---|
1725 | Tue Oct 24 20:18:24 2017 us=193518 192.168.1.1:37798 peer info: IV_TCPNL=1 |
---|
1726 | Tue Oct 24 20:18:24 2017 us=193557 192.168.1.1:37798 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 |
---|
1727 | Tue Oct 24 20:18:24 2017 us=193863 192.168.1.1:37798 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1728 | Tue Oct 24 20:18:24 2017 us=193920 192.168.1.1:37798 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key |
---|
1729 | Tue Oct 24 20:18:24 2017 us=196837 192.168.1.1:37798 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA |
---|
1730 | Tue Oct 24 20:18:24 2017 us=196932 192.168.1.1:37798 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:37798 |
---|
1731 | Tue Oct 24 20:18:24 2017 us=197292 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. |
---|
1732 | Tue Oct 24 20:18:24 2017 us=197341 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) |
---|
1733 | Tue Oct 24 20:18:24 2017 us=197461 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:37798 |
---|
1734 | Tue Oct 24 20:18:24 2017 us=197501 MULTI: primary virtual IP for phone/192.168.1.1:37798: 192.168.8.6 |
---|
1735 | Tue Oct 24 20:18:25 2017 us=386543 phone/192.168.1.1:37798 PUSH: Received control message: 'PUSH_REQUEST' |
---|
1736 | Tue Oct 24 20:18:25 2017 us=386794 phone/192.168.1.1:37798 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) |
---|
1737 | Tue Oct 24 20:20:09 2017 us=376465 event_wait : Interrupted system call (code=4) |
---|
1738 | Tue Oct 24 20:20:09 2017 us=381659 TCP/UDP: Closing socket |
---|
1739 | Tue Oct 24 20:20:09 2017 us=381954 /sbin/ip route del 192.168.8.0/24 |
---|
1740 | Tue Oct 24 20:20:09 2017 us=386647 Closing TUN/TAP interface |
---|
1741 | Tue Oct 24 20:20:09 2017 us=386850 /sbin/ip addr del dev tun0 local 192.168.8.1 peer 192.168.8.2 |
---|
1742 | Tue Oct 24 20:20:09 2017 us=429176 SIGINT[hard,] received, process exiting |
---|