Ticket #950: issue950_verb4.log

File issue950_verb4.log, 177.8 KB (added by jdanders, 7 years ago)

Issue captured again with verbosity 4 this time

Line 
1Mon Oct 23 21:48:17 2017 us=191138 Current Parameter Settings:
2Mon Oct 23 21:48:17 2017 us=191573   config = '/etc/openvpn/server.conf'
3Mon Oct 23 21:48:17 2017 us=191681   mode = 1
4Mon Oct 23 21:48:17 2017 us=191780   persist_config = DISABLED
5Mon Oct 23 21:48:17 2017 us=191876   persist_mode = 1
6Mon Oct 23 21:48:17 2017 us=191971   show_ciphers = DISABLED
7Mon Oct 23 21:48:17 2017 us=192066   show_digests = DISABLED
8Mon Oct 23 21:48:17 2017 us=192158   show_engines = DISABLED
9Mon Oct 23 21:48:17 2017 us=192252   genkey = DISABLED
10Mon Oct 23 21:48:17 2017 us=192345   key_pass_file = '[UNDEF]'
11Mon Oct 23 21:48:17 2017 us=192440   show_tls_ciphers = DISABLED
12Mon Oct 23 21:48:17 2017 us=192534   connect_retry_max = 0
13Mon Oct 23 21:48:17 2017 us=192629 Connection profiles [0]:
14Mon Oct 23 21:48:17 2017 us=192724   proto = udp
15Mon Oct 23 21:48:17 2017 us=192818   local = '192.168.1.64'
16Mon Oct 23 21:48:17 2017 us=192910   local_port = '443'
17Mon Oct 23 21:48:17 2017 us=193061   remote = '[UNDEF]'
18Mon Oct 23 21:48:17 2017 us=193166   remote_port = '443'
19Mon Oct 23 21:48:17 2017 us=193259   remote_float = DISABLED
20Mon Oct 23 21:48:17 2017 us=193352   bind_defined = DISABLED
21Mon Oct 23 21:48:17 2017 us=193444   bind_local = ENABLED
22Mon Oct 23 21:48:17 2017 us=193537   bind_ipv6_only = DISABLED
23Mon Oct 23 21:48:17 2017 us=193631   connect_retry_seconds = 5
24Mon Oct 23 21:48:17 2017 us=193725   connect_timeout = 120
25Mon Oct 23 21:48:17 2017 us=193987   socks_proxy_server = '[UNDEF]'
26Mon Oct 23 21:48:17 2017 us=194091   socks_proxy_port = '[UNDEF]'
27Mon Oct 23 21:48:17 2017 us=194188   tun_mtu = 1500
28Mon Oct 23 21:48:17 2017 us=194282   tun_mtu_defined = ENABLED
29Mon Oct 23 21:48:17 2017 us=194376   link_mtu = 1500
30Mon Oct 23 21:48:17 2017 us=194493   link_mtu_defined = DISABLED
31Mon Oct 23 21:48:17 2017 us=194593   tun_mtu_extra = 0
32Mon Oct 23 21:48:17 2017 us=194688   tun_mtu_extra_defined = DISABLED
33Mon Oct 23 21:48:17 2017 us=194784   mtu_discover_type = -1
34Mon Oct 23 21:48:17 2017 us=194877   fragment = 0
35Mon Oct 23 21:48:17 2017 us=194970   mssfix = 1450
36Mon Oct 23 21:48:17 2017 us=195066   explicit_exit_notification = 0
37Mon Oct 23 21:48:17 2017 us=195260 Connection profiles END
38Mon Oct 23 21:48:17 2017 us=195360   remote_random = DISABLED
39Mon Oct 23 21:48:17 2017 us=195456   ipchange = '[UNDEF]'
40Mon Oct 23 21:48:17 2017 us=195550   dev = 'tun'
41Mon Oct 23 21:48:17 2017 us=195643   dev_type = '[UNDEF]'
42Mon Oct 23 21:48:17 2017 us=195737   dev_node = '[UNDEF]'
43Mon Oct 23 21:48:17 2017 us=195829   lladdr = '[UNDEF]'
44Mon Oct 23 21:48:17 2017 us=195922   topology = 1
45Mon Oct 23 21:48:17 2017 us=196016   ifconfig_local = '192.168.8.1'
46Mon Oct 23 21:48:17 2017 us=196113   ifconfig_remote_netmask = '192.168.8.2'
47Mon Oct 23 21:48:17 2017 us=196208   ifconfig_noexec = DISABLED
48Mon Oct 23 21:48:17 2017 us=196302   ifconfig_nowarn = DISABLED
49Mon Oct 23 21:48:17 2017 us=196395   ifconfig_ipv6_local = '[UNDEF]'
50Mon Oct 23 21:48:17 2017 us=196489   ifconfig_ipv6_netbits = 0
51Mon Oct 23 21:48:17 2017 us=196582   ifconfig_ipv6_remote = '[UNDEF]'
52Mon Oct 23 21:48:17 2017 us=196676   shaper = 0
53Mon Oct 23 21:48:17 2017 us=196768   mtu_test = 0
54Mon Oct 23 21:48:17 2017 us=196861   mlock = DISABLED
55Mon Oct 23 21:48:17 2017 us=196954   keepalive_ping = 0
56Mon Oct 23 21:48:17 2017 us=197102   keepalive_timeout = 0
57Mon Oct 23 21:48:17 2017 us=197197   inactivity_timeout = 0
58Mon Oct 23 21:48:17 2017 us=197293   ping_send_timeout = 30
59Mon Oct 23 21:48:17 2017 us=197387   ping_rec_timeout = 0
60Mon Oct 23 21:48:17 2017 us=197483   ping_rec_timeout_action = 2
61Mon Oct 23 21:48:17 2017 us=197576   ping_timer_remote = DISABLED
62Mon Oct 23 21:48:17 2017 us=197670   remap_sigusr1 = 0
63Mon Oct 23 21:48:17 2017 us=197762   persist_tun = ENABLED
64Mon Oct 23 21:48:17 2017 us=197857   persist_local_ip = DISABLED
65Mon Oct 23 21:48:17 2017 us=197949   persist_remote_ip = DISABLED
66Mon Oct 23 21:48:17 2017 us=198043   persist_key = ENABLED
67Mon Oct 23 21:48:17 2017 us=198137   passtos = DISABLED
68Mon Oct 23 21:48:17 2017 us=198233   resolve_retry_seconds = 1000000000
69Mon Oct 23 21:48:17 2017 us=198327   resolve_in_advance = DISABLED
70Mon Oct 23 21:48:17 2017 us=198475   username = '[UNDEF]'
71Mon Oct 23 21:48:17 2017 us=198573   groupname = '[UNDEF]'
72Mon Oct 23 21:48:17 2017 us=198669   chroot_dir = '[UNDEF]'
73Mon Oct 23 21:48:17 2017 us=198763   cd_dir = '[UNDEF]'
74Mon Oct 23 21:48:17 2017 us=198858   writepid = '[UNDEF]'
75Mon Oct 23 21:48:17 2017 us=198952   up_script = '[UNDEF]'
76Mon Oct 23 21:48:17 2017 us=199046   down_script = '[UNDEF]'
77Mon Oct 23 21:48:17 2017 us=199139   down_pre = DISABLED
78Mon Oct 23 21:48:17 2017 us=199235   up_restart = DISABLED
79Mon Oct 23 21:48:17 2017 us=199329   up_delay = DISABLED
80Mon Oct 23 21:48:17 2017 us=199424   daemon = DISABLED
81Mon Oct 23 21:48:17 2017 us=199516   inetd = 0
82Mon Oct 23 21:48:17 2017 us=199610   log = DISABLED
83Mon Oct 23 21:48:17 2017 us=199704   suppress_timestamps = DISABLED
84Mon Oct 23 21:48:17 2017 us=199800   machine_readable_output = DISABLED
85Mon Oct 23 21:48:17 2017 us=199894   nice = 0
86Mon Oct 23 21:48:17 2017 us=199989   verbosity = 4
87Mon Oct 23 21:48:17 2017 us=200083   mute = 0
88Mon Oct 23 21:48:17 2017 us=200178   gremlin = 0
89Mon Oct 23 21:48:17 2017 us=200273   status_file = '/var/log/openvpn-status.log'
90Mon Oct 23 21:48:17 2017 us=200369   status_file_version = 1
91Mon Oct 23 21:48:17 2017 us=200464   status_file_update_freq = 60
92Mon Oct 23 21:48:17 2017 us=200558   occ = ENABLED
93Mon Oct 23 21:48:17 2017 us=200651   rcvbuf = 0
94Mon Oct 23 21:48:17 2017 us=200745   sndbuf = 0
95Mon Oct 23 21:48:17 2017 us=200839   mark = 0
96Mon Oct 23 21:48:17 2017 us=200932   sockflags = 0
97Mon Oct 23 21:48:17 2017 us=201084   fast_io = DISABLED
98Mon Oct 23 21:48:17 2017 us=201181   comp.alg = 4
99Mon Oct 23 21:48:17 2017 us=201276   comp.flags = 4
100Mon Oct 23 21:48:17 2017 us=201371   route_script = '[UNDEF]'
101Mon Oct 23 21:48:17 2017 us=201468   route_default_gateway = '[UNDEF]'
102Mon Oct 23 21:48:17 2017 us=201625   route_default_metric = 0
103Mon Oct 23 21:48:17 2017 us=201723   route_noexec = DISABLED
104Mon Oct 23 21:48:17 2017 us=201819   route_delay = 0
105Mon Oct 23 21:48:17 2017 us=201915   route_delay_window = 30
106Mon Oct 23 21:48:17 2017 us=202010   route_delay_defined = DISABLED
107Mon Oct 23 21:48:17 2017 us=202104   route_nopull = DISABLED
108Mon Oct 23 21:48:17 2017 us=202199   route_gateway_via_dhcp = DISABLED
109Mon Oct 23 21:48:17 2017 us=202294   allow_pull_fqdn = DISABLED
110Mon Oct 23 21:48:17 2017 us=202397   route 192.168.8.0/255.255.255.0/default (not set)/default (not set)
111Mon Oct 23 21:48:17 2017 us=202494   management_addr = '[UNDEF]'
112Mon Oct 23 21:48:17 2017 us=202589   management_port = '[UNDEF]'
113Mon Oct 23 21:48:17 2017 us=202684   management_user_pass = '[UNDEF]'
114Mon Oct 23 21:48:17 2017 us=202779   management_log_history_cache = 250
115Mon Oct 23 21:48:17 2017 us=202875   management_echo_buffer_size = 100
116Mon Oct 23 21:48:17 2017 us=202969   management_write_peer_info_file = '[UNDEF]'
117Mon Oct 23 21:48:17 2017 us=203066   management_client_user = '[UNDEF]'
118Mon Oct 23 21:48:17 2017 us=203160   management_client_group = '[UNDEF]'
119Mon Oct 23 21:48:17 2017 us=203257   management_flags = 0
120Mon Oct 23 21:48:17 2017 us=203351   shared_secret_file = '[UNDEF]'
121Mon Oct 23 21:48:17 2017 us=203446   key_direction = 0
122Mon Oct 23 21:48:17 2017 us=203539   ciphername = 'AES-256-GCM'
123Mon Oct 23 21:48:17 2017 us=203633   ncp_enabled = DISABLED
124Mon Oct 23 21:48:17 2017 us=203729   ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
125Mon Oct 23 21:48:17 2017 us=203824   authname = 'SHA512'
126Mon Oct 23 21:48:17 2017 us=203918   prng_hash = 'SHA1'
127Mon Oct 23 21:48:17 2017 us=204016   prng_nonce_secret_len = 16
128Mon Oct 23 21:48:17 2017 us=204111   keysize = 0
129Mon Oct 23 21:48:17 2017 us=204206   engine = DISABLED
130Mon Oct 23 21:48:17 2017 us=204301   replay = ENABLED
131Mon Oct 23 21:48:17 2017 us=204397   mute_replay_warnings = DISABLED
132Mon Oct 23 21:48:17 2017 us=204493   replay_window = 64
133Mon Oct 23 21:48:17 2017 us=204588   replay_time = 15
134Mon Oct 23 21:48:17 2017 us=204684   packet_id_file = '[UNDEF]'
135Mon Oct 23 21:48:17 2017 us=204780   use_iv = ENABLED
136Mon Oct 23 21:48:17 2017 us=204876   test_crypto = DISABLED
137Mon Oct 23 21:48:17 2017 us=205062   tls_server = ENABLED
138Mon Oct 23 21:48:17 2017 us=205168   tls_client = DISABLED
139Mon Oct 23 21:48:17 2017 us=205294   key_method = 2
140Mon Oct 23 21:48:17 2017 us=205392   ca_file = '/etc/openvpn/easy-rsa/keys/ca.crt'
141Mon Oct 23 21:48:17 2017 us=205488   ca_path = '[UNDEF]'
142Mon Oct 23 21:48:17 2017 us=205584   dh_file = '/etc/openvpn/easy-rsa/keys/dh2048.pem'
143Mon Oct 23 21:48:17 2017 us=205680   cert_file = '/etc/openvpn/easy-rsa/keys/server.crt'
144Mon Oct 23 21:48:17 2017 us=205776   extra_certs_file = '[UNDEF]'
145Mon Oct 23 21:48:17 2017 us=205876   priv_key_file = '/etc/openvpn/easy-rsa/keys/server.key'
146Mon Oct 23 21:48:17 2017 us=205972   pkcs12_file = '[UNDEF]'
147Mon Oct 23 21:48:17 2017 us=206069   cipher_list = 'TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256'
148Mon Oct 23 21:48:17 2017 us=206164   tls_verify = '[UNDEF]'
149Mon Oct 23 21:48:17 2017 us=206258   tls_export_cert = '[UNDEF]'
150Mon Oct 23 21:48:17 2017 us=206352   verify_x509_type = 0
151Mon Oct 23 21:48:17 2017 us=206445   verify_x509_name = '[UNDEF]'
152Mon Oct 23 21:48:17 2017 us=206537   crl_file = '[UNDEF]'
153Mon Oct 23 21:48:17 2017 us=206631   ns_cert_type = 0
154Mon Oct 23 21:48:17 2017 us=206726   remote_cert_ku[i] = 65535
155Mon Oct 23 21:48:17 2017 us=206819   remote_cert_ku[i] = 0
156Mon Oct 23 21:48:17 2017 us=206914   remote_cert_ku[i] = 0
157Mon Oct 23 21:48:17 2017 us=207006   remote_cert_ku[i] = 0
158Mon Oct 23 21:48:17 2017 us=207101   remote_cert_ku[i] = 0
159Mon Oct 23 21:48:17 2017 us=207194   remote_cert_ku[i] = 0
160Mon Oct 23 21:48:17 2017 us=207287   remote_cert_ku[i] = 0
161Mon Oct 23 21:48:17 2017 us=207380   remote_cert_ku[i] = 0
162Mon Oct 23 21:48:17 2017 us=207475   remote_cert_ku[i] = 0
163Mon Oct 23 21:48:17 2017 us=207569   remote_cert_ku[i] = 0
164Mon Oct 23 21:48:17 2017 us=207662   remote_cert_ku[i] = 0
165Mon Oct 23 21:48:17 2017 us=207757   remote_cert_ku[i] = 0
166Mon Oct 23 21:48:17 2017 us=207851   remote_cert_ku[i] = 0
167Mon Oct 23 21:48:17 2017 us=207943   remote_cert_ku[i] = 0
168Mon Oct 23 21:48:17 2017 us=208037   remote_cert_ku[i] = 0
169Mon Oct 23 21:48:17 2017 us=208130   remote_cert_ku[i] = 0
170Mon Oct 23 21:48:17 2017 us=208227   remote_cert_eku = 'TLS Web Client Authentication'
171Mon Oct 23 21:48:17 2017 us=208323   ssl_flags = 192
172Mon Oct 23 21:48:17 2017 us=208416   tls_timeout = 2
173Mon Oct 23 21:48:17 2017 us=208547   renegotiate_bytes = -1
174Mon Oct 23 21:48:17 2017 us=208647   renegotiate_packets = 0
175Mon Oct 23 21:48:17 2017 us=208743   renegotiate_seconds = 3600
176Mon Oct 23 21:48:17 2017 us=208838   handshake_window = 60
177Mon Oct 23 21:48:17 2017 us=208934   transition_window = 3600
178Mon Oct 23 21:48:17 2017 us=209081   single_session = DISABLED
179Mon Oct 23 21:48:17 2017 us=209178   push_peer_info = DISABLED
180Mon Oct 23 21:48:17 2017 us=209274   tls_exit = DISABLED
181Mon Oct 23 21:48:17 2017 us=209368   tls_auth_file = '[UNDEF]'
182Mon Oct 23 21:48:17 2017 us=209462   tls_crypt_file = '/etc/openvpn/tc.key'
183Mon Oct 23 21:48:17 2017 us=209559   pkcs11_protected_authentication = DISABLED
184Mon Oct 23 21:48:17 2017 us=209655   pkcs11_protected_authentication = DISABLED
185Mon Oct 23 21:48:17 2017 us=209752   pkcs11_protected_authentication = DISABLED
186Mon Oct 23 21:48:17 2017 us=209848   pkcs11_protected_authentication = DISABLED
187Mon Oct 23 21:48:17 2017 us=209942   pkcs11_protected_authentication = DISABLED
188Mon Oct 23 21:48:17 2017 us=210036   pkcs11_protected_authentication = DISABLED
189Mon Oct 23 21:48:17 2017 us=210131   pkcs11_protected_authentication = DISABLED
190Mon Oct 23 21:48:17 2017 us=210225   pkcs11_protected_authentication = DISABLED
191Mon Oct 23 21:48:17 2017 us=210320   pkcs11_protected_authentication = DISABLED
192Mon Oct 23 21:48:17 2017 us=210415   pkcs11_protected_authentication = DISABLED
193Mon Oct 23 21:48:17 2017 us=210508   pkcs11_protected_authentication = DISABLED
194Mon Oct 23 21:48:17 2017 us=210603   pkcs11_protected_authentication = DISABLED
195Mon Oct 23 21:48:17 2017 us=210697   pkcs11_protected_authentication = DISABLED
196Mon Oct 23 21:48:17 2017 us=210791   pkcs11_protected_authentication = DISABLED
197Mon Oct 23 21:48:17 2017 us=210934   pkcs11_protected_authentication = DISABLED
198Mon Oct 23 21:48:17 2017 us=211032   pkcs11_protected_authentication = DISABLED
199Mon Oct 23 21:48:17 2017 us=211133   pkcs11_private_mode = 00000000
200Mon Oct 23 21:48:17 2017 us=211228   pkcs11_private_mode = 00000000
201Mon Oct 23 21:48:17 2017 us=211323   pkcs11_private_mode = 00000000
202Mon Oct 23 21:48:17 2017 us=211418   pkcs11_private_mode = 00000000
203Mon Oct 23 21:48:17 2017 us=211516   pkcs11_private_mode = 00000000
204Mon Oct 23 21:48:17 2017 us=211612   pkcs11_private_mode = 00000000
205Mon Oct 23 21:48:17 2017 us=211708   pkcs11_private_mode = 00000000
206Mon Oct 23 21:48:17 2017 us=211803   pkcs11_private_mode = 00000000
207Mon Oct 23 21:48:17 2017 us=211898   pkcs11_private_mode = 00000000
208Mon Oct 23 21:48:17 2017 us=211995   pkcs11_private_mode = 00000000
209Mon Oct 23 21:48:17 2017 us=212090   pkcs11_private_mode = 00000000
210Mon Oct 23 21:48:17 2017 us=212186   pkcs11_private_mode = 00000000
211Mon Oct 23 21:48:17 2017 us=212281   pkcs11_private_mode = 00000000
212Mon Oct 23 21:48:17 2017 us=212375   pkcs11_private_mode = 00000000
213Mon Oct 23 21:48:17 2017 us=212471   pkcs11_private_mode = 00000000
214Mon Oct 23 21:48:17 2017 us=212565   pkcs11_private_mode = 00000000
215Mon Oct 23 21:48:17 2017 us=212658   pkcs11_cert_private = DISABLED
216Mon Oct 23 21:48:17 2017 us=212753   pkcs11_cert_private = DISABLED
217Mon Oct 23 21:48:17 2017 us=212848   pkcs11_cert_private = DISABLED
218Mon Oct 23 21:48:17 2017 us=212942   pkcs11_cert_private = DISABLED
219Mon Oct 23 21:48:17 2017 us=213097   pkcs11_cert_private = DISABLED
220Mon Oct 23 21:48:17 2017 us=213195   pkcs11_cert_private = DISABLED
221Mon Oct 23 21:48:17 2017 us=213291   pkcs11_cert_private = DISABLED
222Mon Oct 23 21:48:17 2017 us=213387   pkcs11_cert_private = DISABLED
223Mon Oct 23 21:48:17 2017 us=213482   pkcs11_cert_private = DISABLED
224Mon Oct 23 21:48:17 2017 us=213623   pkcs11_cert_private = DISABLED
225Mon Oct 23 21:48:17 2017 us=213720   pkcs11_cert_private = DISABLED
226Mon Oct 23 21:48:17 2017 us=213815   pkcs11_cert_private = DISABLED
227Mon Oct 23 21:48:17 2017 us=213909   pkcs11_cert_private = DISABLED
228Mon Oct 23 21:48:17 2017 us=214004   pkcs11_cert_private = DISABLED
229Mon Oct 23 21:48:17 2017 us=214123   pkcs11_cert_private = DISABLED
230Mon Oct 23 21:48:17 2017 us=214222   pkcs11_cert_private = DISABLED
231Mon Oct 23 21:48:17 2017 us=214320   pkcs11_pin_cache_period = -1
232Mon Oct 23 21:48:17 2017 us=214413   pkcs11_id = '[UNDEF]'
233Mon Oct 23 21:48:17 2017 us=214508   pkcs11_id_management = DISABLED
234Mon Oct 23 21:48:17 2017 us=214613   server_network = 192.168.8.0
235Mon Oct 23 21:48:17 2017 us=214716   server_netmask = 255.255.255.0
236Mon Oct 23 21:48:17 2017 us=214818   server_network_ipv6 = ::
237Mon Oct 23 21:48:17 2017 us=214916   server_netbits_ipv6 = 0
238Mon Oct 23 21:48:17 2017 us=215018   server_bridge_ip = 0.0.0.0
239Mon Oct 23 21:48:17 2017 us=215120   server_bridge_netmask = 0.0.0.0
240Mon Oct 23 21:48:17 2017 us=215224   server_bridge_pool_start = 0.0.0.0
241Mon Oct 23 21:48:17 2017 us=215326   server_bridge_pool_end = 0.0.0.0
242Mon Oct 23 21:48:17 2017 us=215421   push_entry = 'redirect-gateway autolocal bypass-dhcp'
243Mon Oct 23 21:48:17 2017 us=215519   push_entry = 'route 192.168.1.0 255.255.255.0'
244Mon Oct 23 21:48:17 2017 us=215616   push_entry = 'dhcp-option DNS 192.168.1.1'
245Mon Oct 23 21:48:17 2017 us=215711   push_entry = 'route 192.168.8.1'
246Mon Oct 23 21:48:17 2017 us=215806   push_entry = 'topology net30'
247Mon Oct 23 21:48:17 2017 us=215900   ifconfig_pool_defined = ENABLED
248Mon Oct 23 21:48:17 2017 us=216002   ifconfig_pool_start = 192.168.8.4
249Mon Oct 23 21:48:17 2017 us=216104   ifconfig_pool_end = 192.168.8.251
250Mon Oct 23 21:48:17 2017 us=216206   ifconfig_pool_netmask = 0.0.0.0
251Mon Oct 23 21:48:17 2017 us=216301   ifconfig_pool_persist_filename = 'ipp.txt'
252Mon Oct 23 21:48:17 2017 us=216399   ifconfig_pool_persist_refresh_freq = 600
253Mon Oct 23 21:48:17 2017 us=216496   ifconfig_ipv6_pool_defined = DISABLED
254Mon Oct 23 21:48:17 2017 us=216598   ifconfig_ipv6_pool_base = ::
255Mon Oct 23 21:48:17 2017 us=216695   ifconfig_ipv6_pool_netbits = 0
256Mon Oct 23 21:48:17 2017 us=216834   n_bcast_buf = 256
257Mon Oct 23 21:48:17 2017 us=216933   tcp_queue_limit = 64
258Mon Oct 23 21:48:17 2017 us=217080   real_hash_size = 256
259Mon Oct 23 21:48:17 2017 us=217178   virtual_hash_size = 256
260Mon Oct 23 21:48:17 2017 us=217273   client_connect_script = '[UNDEF]'
261Mon Oct 23 21:48:17 2017 us=217368   learn_address_script = '[UNDEF]'
262Mon Oct 23 21:48:17 2017 us=217463   client_disconnect_script = '[UNDEF]'
263Mon Oct 23 21:48:17 2017 us=217560   client_config_dir = '[UNDEF]'
264Mon Oct 23 21:48:17 2017 us=217654   ccd_exclusive = DISABLED
265Mon Oct 23 21:48:17 2017 us=217750   tmp_dir = '/tmp'
266Mon Oct 23 21:48:17 2017 us=217847   push_ifconfig_defined = DISABLED
267Mon Oct 23 21:48:17 2017 us=217950   push_ifconfig_local = 0.0.0.0
268Mon Oct 23 21:48:17 2017 us=218054   push_ifconfig_remote_netmask = 0.0.0.0
269Mon Oct 23 21:48:17 2017 us=218147   push_ifconfig_ipv6_defined = DISABLED
270Mon Oct 23 21:48:17 2017 us=218249   push_ifconfig_ipv6_local = ::/0
271Mon Oct 23 21:48:17 2017 us=218350   push_ifconfig_ipv6_remote = ::
272Mon Oct 23 21:48:17 2017 us=218446   enable_c2c = DISABLED
273Mon Oct 23 21:48:17 2017 us=218542   duplicate_cn = DISABLED
274Mon Oct 23 21:48:17 2017 us=218636   cf_max = 0
275Mon Oct 23 21:48:17 2017 us=218732   cf_per = 0
276Mon Oct 23 21:48:17 2017 us=218826   max_clients = 3
277Mon Oct 23 21:48:17 2017 us=218922   max_routes_per_client = 256
278Mon Oct 23 21:48:17 2017 us=219017   auth_user_pass_verify_script = '[UNDEF]'
279Mon Oct 23 21:48:17 2017 us=219115   auth_user_pass_verify_script_via_file = DISABLED
280Mon Oct 23 21:48:17 2017 us=219209   auth_token_generate = DISABLED
281Mon Oct 23 21:48:17 2017 us=219305   auth_token_lifetime = 0
282Mon Oct 23 21:48:17 2017 us=219400   port_share_host = '[UNDEF]'
283Mon Oct 23 21:48:17 2017 us=219495   port_share_port = '[UNDEF]'
284Mon Oct 23 21:48:17 2017 us=219588   client = DISABLED
285Mon Oct 23 21:48:17 2017 us=219682   pull = DISABLED
286Mon Oct 23 21:48:17 2017 us=219776   auth_user_pass_file = '[UNDEF]'
287Mon Oct 23 21:48:17 2017 us=219882 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
288Mon Oct 23 21:48:17 2017 us=220010 library versions: OpenSSL 1.0.1f 6 Jan 2014, LZO 2.06
289Mon Oct 23 21:48:17 2017 us=220623 WARNING: --ping should normally be used with --ping-restart or --ping-exit
290Mon Oct 23 21:48:17 2017 us=220728 WARNING: --keepalive option is missing from server config
291Mon Oct 23 21:48:17 2017 us=297831 Diffie-Hellman initialized with 2048 bit key
292Mon Oct 23 21:48:17 2017 us=299656 Failed to extract curve from certificate (UNDEF), using secp384r1 instead.
293Mon Oct 23 21:48:17 2017 us=299745 ECDH curve secp384r1 added
294Mon Oct 23 21:48:17 2017 us=300127 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
295Mon Oct 23 21:48:17 2017 us=300212 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
296Mon Oct 23 21:48:17 2017 us=300272 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
297Mon Oct 23 21:48:17 2017 us=300342 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
298Mon Oct 23 21:48:17 2017 us=300413 TLS-Auth MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
299Mon Oct 23 21:48:17 2017 us=300844 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=00:24:27:fe:4c:15
300Mon Oct 23 21:48:17 2017 us=302082 TUN/TAP device tun0 opened
301Mon Oct 23 21:48:17 2017 us=302195 TUN/TAP TX queue length set to 100
302Mon Oct 23 21:48:17 2017 us=302275 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
303Mon Oct 23 21:48:17 2017 us=302361 /sbin/ip link set dev tun0 up mtu 1500
304Mon Oct 23 21:48:17 2017 us=306443 /sbin/ip addr add dev tun0 local 192.168.8.1 peer 192.168.8.2
305Mon Oct 23 21:48:17 2017 us=310226 /sbin/ip route add 192.168.8.0/24 via 192.168.8.2
306Mon Oct 23 21:48:17 2017 us=314924 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
307Mon Oct 23 21:48:17 2017 us=315038 Could not determine IPv4/IPv6 protocol. Using AF_INET
308Mon Oct 23 21:48:17 2017 us=315116 Socket Buffers: R=[212992->212992] S=[212992->212992]
309Mon Oct 23 21:48:17 2017 us=315227 UDPv4 link local (bound): [AF_INET]192.168.1.64:443
310Mon Oct 23 21:48:17 2017 us=315278 UDPv4 link remote: [AF_UNSPEC]
311Mon Oct 23 21:48:17 2017 us=315340 MULTI: multi_init called, r=256 v=256
312Mon Oct 23 21:48:17 2017 us=315450 IFCONFIG POOL: base=192.168.8.4 size=62, ipv6=0
313Mon Oct 23 21:48:17 2017 us=324537 ifconfig_pool_read(), in='phone,192.168.8.4', TODO: IPv6
314Mon Oct 23 21:48:17 2017 us=324623 succeeded -> ifconfig_pool_set()
315Mon Oct 23 21:48:17 2017 us=324675 IFCONFIG POOL LIST
316Mon Oct 23 21:48:17 2017 us=324725 phone,192.168.8.4
317Mon Oct 23 21:48:17 2017 us=324825 Initialization Sequence Completed
318Mon Oct 23 21:48:46 2017 us=113151 MULTI: multi_create_instance called
319Mon Oct 23 21:48:46 2017 us=113509 192.168.1.1:57131 Re-using SSL/TLS context
320Mon Oct 23 21:48:46 2017 us=113641 192.168.1.1:57131 LZ4 compression initializing
321Mon Oct 23 21:48:46 2017 us=114311 192.168.1.1:57131 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
322Mon Oct 23 21:48:46 2017 us=114428 192.168.1.1:57131 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
323Mon Oct 23 21:48:46 2017 us=114669 192.168.1.1:57131 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
324Mon Oct 23 21:48:46 2017 us=114810 192.168.1.1:57131 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
325Mon Oct 23 21:48:46 2017 us=115026 192.168.1.1:57131 TLS: Initial packet from [AF_INET]192.168.1.1:57131, sid=9aaed749 bd0dad3b
326Mon Oct 23 21:48:46 2017 us=422735 192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
327Mon Oct 23 21:48:46 2017 us=424713 192.168.1.1:57131 VERIFY KU OK
328Mon Oct 23 21:48:46 2017 us=424842 192.168.1.1:57131 Validating certificate extended key usage
329Mon Oct 23 21:48:46 2017 us=424944 192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
330Mon Oct 23 21:48:46 2017 us=425087 192.168.1.1:57131 VERIFY EKU OK
331Mon Oct 23 21:48:46 2017 us=425180 192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
332Mon Oct 23 21:48:46 2017 us=528521 192.168.1.1:57131 peer info: IV_VER=2.5_master
333Mon Oct 23 21:48:46 2017 us=528705 192.168.1.1:57131 peer info: IV_PLAT=android
334Mon Oct 23 21:48:46 2017 us=528806 192.168.1.1:57131 peer info: IV_PROTO=2
335Mon Oct 23 21:48:46 2017 us=528903 192.168.1.1:57131 peer info: IV_LZ4=1
336Mon Oct 23 21:48:46 2017 us=529080 192.168.1.1:57131 peer info: IV_LZ4v2=1
337Mon Oct 23 21:48:46 2017 us=529187 192.168.1.1:57131 peer info: IV_LZO=1
338Mon Oct 23 21:48:46 2017 us=529285 192.168.1.1:57131 peer info: IV_COMP_STUB=1
339Mon Oct 23 21:48:46 2017 us=529384 192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
340Mon Oct 23 21:48:46 2017 us=529481 192.168.1.1:57131 peer info: IV_TCPNL=1
341Mon Oct 23 21:48:46 2017 us=529581 192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
342Mon Oct 23 21:48:46 2017 us=530308 192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
343Mon Oct 23 21:48:46 2017 us=530436 192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
344Mon Oct 23 21:48:46 2017 us=534911 192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
345Mon Oct 23 21:48:46 2017 us=535189 192.168.1.1:57131 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:57131
346Mon Oct 23 21:48:46 2017 us=535403 phone/192.168.1.1:57131 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
347Mon Oct 23 21:48:46 2017 us=535741 phone/192.168.1.1:57131 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:57131
348Mon Oct 23 21:48:46 2017 us=535854 phone/192.168.1.1:57131 MULTI: primary virtual IP for phone/192.168.1.1:57131: 192.168.8.6
349Mon Oct 23 21:48:47 2017 us=649582 phone/192.168.1.1:57131 PUSH: Received control message: 'PUSH_REQUEST'
350Mon Oct 23 21:48:47 2017 us=649918 phone/192.168.1.1:57131 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1)
351Mon Oct 23 21:52:39 2017 us=800910 Float requested for peer 0 to 172.56.39.104:23919
352Mon Oct 23 21:52:39 2017 us=801289 peer 0 (phone) floated from 192.168.1.1:57131 to [AF_INET]172.56.39.104:23919
353Mon Oct 23 21:53:25 2017 us=777935 Float requested for peer 0 to 192.168.1.1:57131
354Mon Oct 23 21:53:25 2017 us=778233 peer 0 (phone) floated from 172.56.39.104:23919 to [AF_INET]192.168.1.1:57131
355Mon Oct 23 22:48:47 2017 us=24269 phone/192.168.1.1:57131 TLS: soft reset sec=-1 bytes=2155185/-1 pkts=5515/0
356Mon Oct 23 22:48:47 2017 us=550326 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
357Mon Oct 23 22:48:47 2017 us=552319 phone/192.168.1.1:57131 VERIFY KU OK
358Mon Oct 23 22:48:47 2017 us=552453 phone/192.168.1.1:57131 Validating certificate extended key usage
359Mon Oct 23 22:48:47 2017 us=552559 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
360Mon Oct 23 22:48:47 2017 us=552654 phone/192.168.1.1:57131 VERIFY EKU OK
361Mon Oct 23 22:48:47 2017 us=552746 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
362Mon Oct 23 22:48:47 2017 us=659373 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master
363Mon Oct 23 22:48:47 2017 us=659566 phone/192.168.1.1:57131 peer info: IV_PLAT=android
364Mon Oct 23 22:48:47 2017 us=659674 phone/192.168.1.1:57131 peer info: IV_PROTO=2
365Mon Oct 23 22:48:47 2017 us=659778 phone/192.168.1.1:57131 peer info: IV_LZ4=1
366Mon Oct 23 22:48:47 2017 us=659879 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1
367Mon Oct 23 22:48:47 2017 us=659983 phone/192.168.1.1:57131 peer info: IV_LZO=1
368Mon Oct 23 22:48:47 2017 us=660088 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1
369Mon Oct 23 22:48:47 2017 us=660189 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
370Mon Oct 23 22:48:47 2017 us=660291 phone/192.168.1.1:57131 peer info: IV_TCPNL=1
371Mon Oct 23 22:48:47 2017 us=660395 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
372Mon Oct 23 22:48:47 2017 us=661224 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
373Mon Oct 23 22:48:47 2017 us=661354 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
374Mon Oct 23 22:48:47 2017 us=666466 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
375Mon Oct 23 23:48:47 2017 us=756306 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=594380/-1 pkts=2193/0
376Mon Oct 23 23:48:48 2017 us=694325 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
377Mon Oct 23 23:48:48 2017 us=696307 phone/192.168.1.1:57131 VERIFY KU OK
378Mon Oct 23 23:48:48 2017 us=696434 phone/192.168.1.1:57131 Validating certificate extended key usage
379Mon Oct 23 23:48:48 2017 us=696543 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
380Mon Oct 23 23:48:48 2017 us=696638 phone/192.168.1.1:57131 VERIFY EKU OK
381Mon Oct 23 23:48:48 2017 us=696732 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
382Mon Oct 23 23:48:48 2017 us=801768 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master
383Mon Oct 23 23:48:48 2017 us=801956 phone/192.168.1.1:57131 peer info: IV_PLAT=android
384Mon Oct 23 23:48:48 2017 us=802063 phone/192.168.1.1:57131 peer info: IV_PROTO=2
385Mon Oct 23 23:48:48 2017 us=802166 phone/192.168.1.1:57131 peer info: IV_LZ4=1
386Mon Oct 23 23:48:48 2017 us=802334 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1
387Mon Oct 23 23:48:48 2017 us=802437 phone/192.168.1.1:57131 peer info: IV_LZO=1
388Mon Oct 23 23:48:48 2017 us=802537 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1
389Mon Oct 23 23:48:48 2017 us=802636 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
390Mon Oct 23 23:48:48 2017 us=802735 phone/192.168.1.1:57131 peer info: IV_TCPNL=1
391Mon Oct 23 23:48:48 2017 us=802834 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
392Mon Oct 23 23:48:48 2017 us=803566 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
393Mon Oct 23 23:48:48 2017 us=803698 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
394Mon Oct 23 23:48:48 2017 us=811107 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
395Tue Oct 24 00:48:47 2017 us=281447 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key
396Tue Oct 24 00:48:48 2017 us=474187 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=516743/-1 pkts=2308/0
397Tue Oct 24 00:48:53 2017 us=732577 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
398Tue Oct 24 00:48:53 2017 us=734713 phone/192.168.1.1:57131 VERIFY KU OK
399Tue Oct 24 00:48:53 2017 us=734855 phone/192.168.1.1:57131 Validating certificate extended key usage
400Tue Oct 24 00:48:53 2017 us=734967 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
401Tue Oct 24 00:48:53 2017 us=735063 phone/192.168.1.1:57131 VERIFY EKU OK
402Tue Oct 24 00:48:53 2017 us=735156 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
403Tue Oct 24 00:48:53 2017 us=849423 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master
404Tue Oct 24 00:48:53 2017 us=849615 phone/192.168.1.1:57131 peer info: IV_PLAT=android
405Tue Oct 24 00:48:53 2017 us=849723 phone/192.168.1.1:57131 peer info: IV_PROTO=2
406Tue Oct 24 00:48:53 2017 us=849825 phone/192.168.1.1:57131 peer info: IV_LZ4=1
407Tue Oct 24 00:48:53 2017 us=849927 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1
408Tue Oct 24 00:48:53 2017 us=850028 phone/192.168.1.1:57131 peer info: IV_LZO=1
409Tue Oct 24 00:48:53 2017 us=850130 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1
410Tue Oct 24 00:48:53 2017 us=850234 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
411Tue Oct 24 00:48:53 2017 us=850337 phone/192.168.1.1:57131 peer info: IV_TCPNL=1
412Tue Oct 24 00:48:53 2017 us=850440 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
413Tue Oct 24 00:48:53 2017 us=851181 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
414Tue Oct 24 00:48:53 2017 us=851314 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
415Tue Oct 24 00:48:53 2017 us=856633 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
416Tue Oct 24 01:48:48 2017 us=857869 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key
417Tue Oct 24 01:48:54 2017 us=95878 phone/192.168.1.1:57131 TLS: soft reset sec=-1 bytes=483731/-1 pkts=2147/0
418Tue Oct 24 01:48:54 2017 us=658119 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
419Tue Oct 24 01:48:54 2017 us=660155 phone/192.168.1.1:57131 VERIFY KU OK
420Tue Oct 24 01:48:54 2017 us=660288 phone/192.168.1.1:57131 Validating certificate extended key usage
421Tue Oct 24 01:48:54 2017 us=660396 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
422Tue Oct 24 01:48:54 2017 us=660493 phone/192.168.1.1:57131 VERIFY EKU OK
423Tue Oct 24 01:48:54 2017 us=660587 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
424Tue Oct 24 01:48:54 2017 us=763903 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master
425Tue Oct 24 01:48:54 2017 us=764149 phone/192.168.1.1:57131 peer info: IV_PLAT=android
426Tue Oct 24 01:48:54 2017 us=764256 phone/192.168.1.1:57131 peer info: IV_PROTO=2
427Tue Oct 24 01:48:54 2017 us=764355 phone/192.168.1.1:57131 peer info: IV_LZ4=1
428Tue Oct 24 01:48:54 2017 us=764453 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1
429Tue Oct 24 01:48:54 2017 us=764550 phone/192.168.1.1:57131 peer info: IV_LZO=1
430Tue Oct 24 01:48:54 2017 us=764647 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1
431Tue Oct 24 01:48:54 2017 us=764745 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
432Tue Oct 24 01:48:54 2017 us=764844 phone/192.168.1.1:57131 peer info: IV_TCPNL=1
433Tue Oct 24 01:48:54 2017 us=764942 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
434Tue Oct 24 01:48:54 2017 us=765746 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
435Tue Oct 24 01:48:54 2017 us=765875 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
436Tue Oct 24 01:48:54 2017 us=769773 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
437Tue Oct 24 02:48:54 2017 us=701177 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=624107/-1 pkts=2481/0
438Tue Oct 24 02:48:56 2017 us=205868 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
439Tue Oct 24 02:48:56 2017 us=207874 phone/192.168.1.1:57131 VERIFY KU OK
440Tue Oct 24 02:48:56 2017 us=208017 phone/192.168.1.1:57131 Validating certificate extended key usage
441Tue Oct 24 02:48:56 2017 us=208125 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
442Tue Oct 24 02:48:56 2017 us=208221 phone/192.168.1.1:57131 VERIFY EKU OK
443Tue Oct 24 02:48:56 2017 us=208316 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
444Tue Oct 24 02:48:56 2017 us=310652 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master
445Tue Oct 24 02:48:56 2017 us=310843 phone/192.168.1.1:57131 peer info: IV_PLAT=android
446Tue Oct 24 02:48:56 2017 us=310949 phone/192.168.1.1:57131 peer info: IV_PROTO=2
447Tue Oct 24 02:48:56 2017 us=311052 phone/192.168.1.1:57131 peer info: IV_LZ4=1
448Tue Oct 24 02:48:56 2017 us=311153 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1
449Tue Oct 24 02:48:56 2017 us=311254 phone/192.168.1.1:57131 peer info: IV_LZO=1
450Tue Oct 24 02:48:56 2017 us=311356 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1
451Tue Oct 24 02:48:56 2017 us=311459 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
452Tue Oct 24 02:48:56 2017 us=311560 phone/192.168.1.1:57131 peer info: IV_TCPNL=1
453Tue Oct 24 02:48:56 2017 us=311661 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
454Tue Oct 24 02:48:56 2017 us=312403 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
455Tue Oct 24 02:48:56 2017 us=312533 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
456Tue Oct 24 02:48:56 2017 us=317103 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
457Tue Oct 24 03:48:54 2017 us=350527 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key
458Tue Oct 24 03:48:56 2017 us=514322 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=356379/-1 pkts=1641/0
459Tue Oct 24 03:49:00 2017 us=34337 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
460Tue Oct 24 03:49:00 2017 us=36357 phone/192.168.1.1:57131 VERIFY KU OK
461Tue Oct 24 03:49:00 2017 us=36518 phone/192.168.1.1:57131 Validating certificate extended key usage
462Tue Oct 24 03:49:00 2017 us=36628 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
463Tue Oct 24 03:49:00 2017 us=36726 phone/192.168.1.1:57131 VERIFY EKU OK
464Tue Oct 24 03:49:00 2017 us=36883 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
465Tue Oct 24 03:49:00 2017 us=142833 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master
466Tue Oct 24 03:49:00 2017 us=143031 phone/192.168.1.1:57131 peer info: IV_PLAT=android
467Tue Oct 24 03:49:00 2017 us=143135 phone/192.168.1.1:57131 peer info: IV_PROTO=2
468Tue Oct 24 03:49:00 2017 us=143234 phone/192.168.1.1:57131 peer info: IV_LZ4=1
469Tue Oct 24 03:49:00 2017 us=143331 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1
470Tue Oct 24 03:49:00 2017 us=143429 phone/192.168.1.1:57131 peer info: IV_LZO=1
471Tue Oct 24 03:49:00 2017 us=143528 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1
472Tue Oct 24 03:49:00 2017 us=143628 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
473Tue Oct 24 03:49:00 2017 us=143727 phone/192.168.1.1:57131 peer info: IV_TCPNL=1
474Tue Oct 24 03:49:00 2017 us=143826 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
475Tue Oct 24 03:49:00 2017 us=144563 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
476Tue Oct 24 03:49:00 2017 us=144695 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
477Tue Oct 24 03:49:00 2017 us=149016 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
478Tue Oct 24 04:02:59 2017 us=889660 phone/192.168.1.1:57131 PID_ERR replay-window backtrack occurred [127] [SSL-6] [0000000000000000000000000000000000000000000000000000000000000000] 0:35491 0:35364 t=1508839379[0] r=[-4,64,15,127,1] sl=[29,64,64,528]
479Tue Oct 24 04:02:59 2017 us=889751 phone/192.168.1.1:57131 PID_ERR large diff [127] [SSL-6] [0000000000000000000000000000000000000000000000000000000000000000] 0:35491 0:35364 t=1508839379[0] r=[-4,64,15,127,1] sl=[29,64,64,528]
480Tue Oct 24 04:02:59 2017 us=889775 phone/192.168.1.1:57131 AEAD Decrypt error: bad packet ID (may be a replay): [ #35364 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
481Tue Oct 24 04:43:10 2017 us=460926 Float requested for peer 0 to 192.168.1.1:1024
482Tue Oct 24 04:43:10 2017 us=461309 peer 0 (phone) floated from 192.168.1.1:57131 to [AF_INET]192.168.1.1:1024
483Tue Oct 24 04:43:10 2017 us=462335 Float requested for peer 0 to 192.168.1.1:57131
484Tue Oct 24 04:43:10 2017 us=462494 peer 0 (phone) floated from 192.168.1.1:1024 to [AF_INET]192.168.1.1:57131
485Tue Oct 24 04:48:56 2017 us=197945 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key
486Tue Oct 24 04:49:00 2017 us=326091 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=594131847/-1 pkts=661581/0
487Tue Oct 24 04:49:00 2017 us=921726 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
488Tue Oct 24 04:49:00 2017 us=923710 phone/192.168.1.1:57131 VERIFY KU OK
489Tue Oct 24 04:49:00 2017 us=923847 phone/192.168.1.1:57131 Validating certificate extended key usage
490Tue Oct 24 04:49:00 2017 us=923957 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
491Tue Oct 24 04:49:00 2017 us=924053 phone/192.168.1.1:57131 VERIFY EKU OK
492Tue Oct 24 04:49:00 2017 us=924147 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
493Tue Oct 24 04:49:01 2017 us=146758 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master
494Tue Oct 24 04:49:01 2017 us=146952 phone/192.168.1.1:57131 peer info: IV_PLAT=android
495Tue Oct 24 04:49:01 2017 us=147059 phone/192.168.1.1:57131 peer info: IV_PROTO=2
496Tue Oct 24 04:49:01 2017 us=147159 phone/192.168.1.1:57131 peer info: IV_LZ4=1
497Tue Oct 24 04:49:01 2017 us=147261 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1
498Tue Oct 24 04:49:01 2017 us=147363 phone/192.168.1.1:57131 peer info: IV_LZO=1
499Tue Oct 24 04:49:01 2017 us=147464 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1
500Tue Oct 24 04:49:01 2017 us=147629 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
501Tue Oct 24 04:49:01 2017 us=147733 phone/192.168.1.1:57131 peer info: IV_TCPNL=1
502Tue Oct 24 04:49:01 2017 us=147834 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
503Tue Oct 24 04:49:01 2017 us=148570 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
504Tue Oct 24 04:49:01 2017 us=148698 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
505Tue Oct 24 04:49:01 2017 us=154527 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
506Tue Oct 24 05:49:00 2017 us=945541 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key
507Tue Oct 24 05:49:01 2017 us=993765 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=628698/-1 pkts=2136/0
508Tue Oct 24 05:49:08 2017 us=307602 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
509Tue Oct 24 05:49:08 2017 us=310304 phone/192.168.1.1:57131 VERIFY KU OK
510Tue Oct 24 05:49:08 2017 us=310466 phone/192.168.1.1:57131 Validating certificate extended key usage
511Tue Oct 24 05:49:08 2017 us=310577 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
512Tue Oct 24 05:49:08 2017 us=310672 phone/192.168.1.1:57131 VERIFY EKU OK
513Tue Oct 24 05:49:08 2017 us=310766 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
514Tue Oct 24 05:49:08 2017 us=447972 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master
515Tue Oct 24 05:49:08 2017 us=448169 phone/192.168.1.1:57131 peer info: IV_PLAT=android
516Tue Oct 24 05:49:08 2017 us=448275 phone/192.168.1.1:57131 peer info: IV_PROTO=2
517Tue Oct 24 05:49:08 2017 us=448378 phone/192.168.1.1:57131 peer info: IV_LZ4=1
518Tue Oct 24 05:49:08 2017 us=448478 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1
519Tue Oct 24 05:49:08 2017 us=448577 phone/192.168.1.1:57131 peer info: IV_LZO=1
520Tue Oct 24 05:49:08 2017 us=448678 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1
521Tue Oct 24 05:49:08 2017 us=448779 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
522Tue Oct 24 05:49:08 2017 us=448881 phone/192.168.1.1:57131 peer info: IV_TCPNL=1
523Tue Oct 24 05:49:08 2017 us=449058 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
524Tue Oct 24 05:49:08 2017 us=449926 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
525Tue Oct 24 05:49:08 2017 us=450088 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
526Tue Oct 24 05:49:08 2017 us=460305 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
527Tue Oct 24 06:49:01 2017 us=272937 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key
528Tue Oct 24 06:49:08 2017 us=680505 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
529Tue Oct 24 06:49:08 2017 us=682608 phone/192.168.1.1:57131 VERIFY KU OK
530Tue Oct 24 06:49:08 2017 us=682758 phone/192.168.1.1:57131 Validating certificate extended key usage
531Tue Oct 24 06:49:08 2017 us=682867 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
532Tue Oct 24 06:49:08 2017 us=682965 phone/192.168.1.1:57131 VERIFY EKU OK
533Tue Oct 24 06:49:08 2017 us=683060 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
534Tue Oct 24 06:49:08 2017 us=790405 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master
535Tue Oct 24 06:49:08 2017 us=790585 phone/192.168.1.1:57131 peer info: IV_PLAT=android
536Tue Oct 24 06:49:08 2017 us=790693 phone/192.168.1.1:57131 peer info: IV_PROTO=2
537Tue Oct 24 06:49:08 2017 us=790795 phone/192.168.1.1:57131 peer info: IV_LZ4=1
538Tue Oct 24 06:49:08 2017 us=790897 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1
539Tue Oct 24 06:49:08 2017 us=791080 phone/192.168.1.1:57131 peer info: IV_LZO=1
540Tue Oct 24 06:49:08 2017 us=791182 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1
541Tue Oct 24 06:49:08 2017 us=791281 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1
542Tue Oct 24 06:49:08 2017 us=791379 phone/192.168.1.1:57131 peer info: IV_TCPNL=1
543Tue Oct 24 06:49:08 2017 us=791519 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
544Tue Oct 24 06:49:08 2017 us=792247 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
545Tue Oct 24 06:49:08 2017 us=792377 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
546Tue Oct 24 06:49:08 2017 us=803333 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
547Tue Oct 24 07:07:12 2017 us=679519 Float requested for peer 0 to 172.56.39.254:46919
548Tue Oct 24 07:07:12 2017 us=680246 peer 0 (phone) floated from 192.168.1.1:57131 to [AF_INET]172.56.39.254:46919
549Tue Oct 24 07:07:15 2017 us=941365 Float requested for peer 0 to 192.168.1.1:57131
550Tue Oct 24 07:07:15 2017 us=941624 peer 0 (phone) floated from 172.56.39.254:46919 to [AF_INET]192.168.1.1:57131
551Tue Oct 24 07:07:49 2017 us=4224 MULTI: multi_create_instance called
552Tue Oct 24 07:07:49 2017 us=12804 192.168.1.1:56035 Re-using SSL/TLS context
553Tue Oct 24 07:07:49 2017 us=12907 192.168.1.1:56035 LZ4 compression initializing
554Tue Oct 24 07:07:49 2017 us=13146 192.168.1.1:56035 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
555Tue Oct 24 07:07:49 2017 us=13182 192.168.1.1:56035 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
556Tue Oct 24 07:07:49 2017 us=13268 192.168.1.1:56035 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
557Tue Oct 24 07:07:49 2017 us=13305 192.168.1.1:56035 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
558Tue Oct 24 07:07:49 2017 us=13380 192.168.1.1:56035 TLS: Initial packet from [AF_INET]192.168.1.1:56035, sid=8bef5a22 9492a94c
559Tue Oct 24 07:07:49 2017 us=329720 192.168.1.1:56035 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
560Tue Oct 24 07:07:49 2017 us=330259 192.168.1.1:56035 VERIFY KU OK
561Tue Oct 24 07:07:49 2017 us=330304 192.168.1.1:56035 Validating certificate extended key usage
562Tue Oct 24 07:07:49 2017 us=330331 192.168.1.1:56035 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
563Tue Oct 24 07:07:49 2017 us=330355 192.168.1.1:56035 VERIFY EKU OK
564Tue Oct 24 07:07:49 2017 us=330378 192.168.1.1:56035 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
565Tue Oct 24 07:07:49 2017 us=359096 192.168.1.1:56035 peer info: IV_VER=2.5_master
566Tue Oct 24 07:07:49 2017 us=359177 192.168.1.1:56035 peer info: IV_PLAT=android
567Tue Oct 24 07:07:49 2017 us=359202 192.168.1.1:56035 peer info: IV_PROTO=2
568Tue Oct 24 07:07:49 2017 us=359226 192.168.1.1:56035 peer info: IV_LZ4=1
569Tue Oct 24 07:07:49 2017 us=359250 192.168.1.1:56035 peer info: IV_LZ4v2=1
570Tue Oct 24 07:07:49 2017 us=359273 192.168.1.1:56035 peer info: IV_LZO=1
571Tue Oct 24 07:07:49 2017 us=359297 192.168.1.1:56035 peer info: IV_COMP_STUB=1
572Tue Oct 24 07:07:49 2017 us=359320 192.168.1.1:56035 peer info: IV_COMP_STUBv2=1
573Tue Oct 24 07:07:49 2017 us=359344 192.168.1.1:56035 peer info: IV_TCPNL=1
574Tue Oct 24 07:07:49 2017 us=359368 192.168.1.1:56035 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
575Tue Oct 24 07:07:49 2017 us=359545 192.168.1.1:56035 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
576Tue Oct 24 07:07:49 2017 us=359576 192.168.1.1:56035 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
577Tue Oct 24 07:07:49 2017 us=362662 192.168.1.1:56035 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
578Tue Oct 24 07:07:49 2017 us=362982 192.168.1.1:56035 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:56035
579Tue Oct 24 07:07:49 2017 us=372749 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
580Tue Oct 24 07:07:49 2017 us=372917 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
581Tue Oct 24 07:07:49 2017 us=373376 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:56035
582Tue Oct 24 07:07:49 2017 us=373479 MULTI: primary virtual IP for phone/192.168.1.1:56035: 192.168.8.6
583Tue Oct 24 07:07:50 2017 us=384442 phone/192.168.1.1:56035 PUSH: Received control message: 'PUSH_REQUEST'
584Tue Oct 24 07:07:50 2017 us=384658 phone/192.168.1.1:56035 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1)
585Tue Oct 24 07:47:19 2017 us=674031 phone/192.168.1.1:56035 PID_ERR replay-window backtrack occurred [120] [SSL-0] [0000000000000000000000000000000000000000000000000000000000000000] 0:712213 0:712093 t=1508852839[0] r=[-3,64,15,120,1] sl=[43,64,64,528]
586Tue Oct 24 07:47:19 2017 us=675952 phone/192.168.1.1:56035 PID_ERR large diff [120] [SSL-0] [0000000000000000000000000000000000000000000000000000000000000000] 0:712213 0:712093 t=1508852839[0] r=[-3,64,15,120,1] sl=[43,64,64,528]
587Tue Oct 24 07:47:19 2017 us=675982 phone/192.168.1.1:56035 AEAD Decrypt error: bad packet ID (may be a replay): [ #712093 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
588Tue Oct 24 08:07:49 2017 us=808265 phone/192.168.1.1:56035 TLS: soft reset sec=0 bytes=1481829476/-1 pkts=1795127/0
589Tue Oct 24 08:07:50 2017 us=582853 phone/192.168.1.1:56035 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
590Tue Oct 24 08:07:50 2017 us=584847 phone/192.168.1.1:56035 VERIFY KU OK
591Tue Oct 24 08:07:50 2017 us=585057 phone/192.168.1.1:56035 Validating certificate extended key usage
592Tue Oct 24 08:07:50 2017 us=585177 phone/192.168.1.1:56035 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
593Tue Oct 24 08:07:50 2017 us=585273 phone/192.168.1.1:56035 VERIFY EKU OK
594Tue Oct 24 08:07:50 2017 us=585367 phone/192.168.1.1:56035 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
595Tue Oct 24 08:07:50 2017 us=689286 phone/192.168.1.1:56035 peer info: IV_VER=2.5_master
596Tue Oct 24 08:07:50 2017 us=689482 phone/192.168.1.1:56035 peer info: IV_PLAT=android
597Tue Oct 24 08:07:50 2017 us=689590 phone/192.168.1.1:56035 peer info: IV_PROTO=2
598Tue Oct 24 08:07:50 2017 us=689694 phone/192.168.1.1:56035 peer info: IV_LZ4=1
599Tue Oct 24 08:07:50 2017 us=689797 phone/192.168.1.1:56035 peer info: IV_LZ4v2=1
600Tue Oct 24 08:07:50 2017 us=689901 phone/192.168.1.1:56035 peer info: IV_LZO=1
601Tue Oct 24 08:07:50 2017 us=690006 phone/192.168.1.1:56035 peer info: IV_COMP_STUB=1
602Tue Oct 24 08:07:50 2017 us=690109 phone/192.168.1.1:56035 peer info: IV_COMP_STUBv2=1
603Tue Oct 24 08:07:50 2017 us=690212 phone/192.168.1.1:56035 peer info: IV_TCPNL=1
604Tue Oct 24 08:07:50 2017 us=690317 phone/192.168.1.1:56035 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
605Tue Oct 24 08:07:50 2017 us=697560 phone/192.168.1.1:56035 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
606Tue Oct 24 08:07:50 2017 us=697738 phone/192.168.1.1:56035 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
607Tue Oct 24 08:07:50 2017 us=703032 phone/192.168.1.1:56035 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
608Tue Oct 24 08:55:58 2017 us=74359 Float requested for peer 1 to 172.56.39.156:21857
609Tue Oct 24 08:55:58 2017 us=74719 peer 1 (phone) floated from 192.168.1.1:56035 to [AF_INET]172.56.39.156:21857
610Tue Oct 24 09:02:57 2017 us=216606 phone/172.56.39.156:21857 PID_ERR replay [0] [SSL-1] [0001111>>>>>>>>>>>>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:13269 0:13269 t=1508857377[0] r=[-1,64,15,0,1] sl=[43,64,64,528]
611Tue Oct 24 09:02:57 2017 us=216814 phone/172.56.39.156:21857 AEAD Decrypt error: bad packet ID (may be a replay): [ #13269 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
612Tue Oct 24 09:04:05 2017 us=675153 Float requested for peer 1 to 65.44.211.33:56035
613Tue Oct 24 09:04:05 2017 us=675421 peer 1 (phone) floated from 172.56.39.156:21857 to [AF_INET]65.44.211.33:56035
614Tue Oct 24 09:07:49 2017 us=160672 phone/65.44.211.33:56035 TLS: tls_process: killed expiring key
615Tue Oct 24 09:07:50 2017 us=206082 phone/65.44.211.33:56035 TLS: soft reset sec=0 bytes=15345712/-1 pkts=29728/0
616Tue Oct 24 09:07:50 2017 us=818669 phone/65.44.211.33:56035 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
617Tue Oct 24 09:07:50 2017 us=820737 phone/65.44.211.33:56035 VERIFY KU OK
618Tue Oct 24 09:07:50 2017 us=820873 phone/65.44.211.33:56035 Validating certificate extended key usage
619Tue Oct 24 09:07:50 2017 us=821079 phone/65.44.211.33:56035 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
620Tue Oct 24 09:07:50 2017 us=821190 phone/65.44.211.33:56035 VERIFY EKU OK
621Tue Oct 24 09:07:50 2017 us=821286 phone/65.44.211.33:56035 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
622Tue Oct 24 09:07:50 2017 us=968409 phone/65.44.211.33:56035 peer info: IV_VER=2.5_master
623Tue Oct 24 09:07:50 2017 us=968605 phone/65.44.211.33:56035 peer info: IV_PLAT=android
624Tue Oct 24 09:07:50 2017 us=968714 phone/65.44.211.33:56035 peer info: IV_PROTO=2
625Tue Oct 24 09:07:50 2017 us=968858 phone/65.44.211.33:56035 peer info: IV_LZ4=1
626Tue Oct 24 09:07:50 2017 us=968963 phone/65.44.211.33:56035 peer info: IV_LZ4v2=1
627Tue Oct 24 09:07:50 2017 us=969150 phone/65.44.211.33:56035 peer info: IV_LZO=1
628Tue Oct 24 09:07:50 2017 us=969254 phone/65.44.211.33:56035 peer info: IV_COMP_STUB=1
629Tue Oct 24 09:07:50 2017 us=969358 phone/65.44.211.33:56035 peer info: IV_COMP_STUBv2=1
630Tue Oct 24 09:07:50 2017 us=969460 phone/65.44.211.33:56035 peer info: IV_TCPNL=1
631Tue Oct 24 09:07:50 2017 us=969564 phone/65.44.211.33:56035 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
632Tue Oct 24 09:07:50 2017 us=970305 phone/65.44.211.33:56035 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
633Tue Oct 24 09:07:50 2017 us=970438 phone/65.44.211.33:56035 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
634Tue Oct 24 09:07:50 2017 us=990680 phone/65.44.211.33:56035 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
635Tue Oct 24 09:10:01 2017 us=760064 Float requested for peer 1 to 208.54.5.144:42557
636Tue Oct 24 09:10:01 2017 us=760346 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]208.54.5.144:42557
637Tue Oct 24 09:10:31 2017 us=637980 Float requested for peer 1 to 65.44.211.33:56035
638Tue Oct 24 09:10:31 2017 us=638257 peer 1 (phone) floated from 208.54.5.144:42557 to [AF_INET]65.44.211.33:56035
639Tue Oct 24 09:12:42 2017 us=866963 Float requested for peer 1 to 172.56.38.172:24111
640Tue Oct 24 09:12:42 2017 us=867239 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111
641Tue Oct 24 09:13:51 2017 us=800919 Float requested for peer 1 to 65.44.211.33:56035
642Tue Oct 24 09:13:51 2017 us=801247 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035
643Tue Oct 24 09:14:18 2017 us=971436 Float requested for peer 1 to 172.56.38.172:24111
644Tue Oct 24 09:14:18 2017 us=971711 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111
645Tue Oct 24 09:14:23 2017 us=38579 Float requested for peer 1 to 65.44.211.33:56035
646Tue Oct 24 09:14:23 2017 us=38853 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035
647Tue Oct 24 09:14:35 2017 us=277075 Float requested for peer 1 to 172.56.38.172:24111
648Tue Oct 24 09:14:35 2017 us=277349 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111
649Tue Oct 24 09:14:39 2017 us=195893 Float requested for peer 1 to 65.44.211.33:56035
650Tue Oct 24 09:14:39 2017 us=196171 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035
651Tue Oct 24 09:15:53 2017 us=747351 Float requested for peer 1 to 172.56.38.172:24111
652Tue Oct 24 09:15:53 2017 us=747636 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111
653Tue Oct 24 09:16:37 2017 us=533340 Float requested for peer 1 to 65.44.211.33:56035
654Tue Oct 24 09:16:37 2017 us=533645 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035
655Tue Oct 24 09:16:37 2017 us=571974 Float requested for peer 1 to 172.56.38.172:24111
656Tue Oct 24 09:16:37 2017 us=572272 PID_ERR replay-window backtrack occurred [2] [SSL-2] [00_EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:2629 0:2627 t=1508858197[0] r=[0,64,15,2,1] sl=[59,64,64,528]
657Tue Oct 24 09:16:37 2017 us=572428 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111
658Tue Oct 24 09:16:37 2017 us=602145 Float requested for peer 1 to 65.44.211.33:56035
659Tue Oct 24 09:16:37 2017 us=602411 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035
660Tue Oct 24 09:28:41 2017 us=430041 Float requested for peer 1 to 172.56.39.178:49779
661Tue Oct 24 09:28:41 2017 us=430318 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.39.178:49779
662Tue Oct 24 09:28:58 2017 us=644047 Float requested for peer 1 to 65.44.211.33:56035
663Tue Oct 24 09:28:58 2017 us=644346 peer 1 (phone) floated from 172.56.39.178:49779 to [AF_INET]65.44.211.33:56035
664Tue Oct 24 09:32:16 2017 us=207560 Float requested for peer 1 to 172.56.39.168:60221
665Tue Oct 24 09:32:16 2017 us=207836 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.39.168:60221
666Tue Oct 24 09:32:22 2017 us=432603 Float requested for peer 1 to 65.44.211.33:56035
667Tue Oct 24 09:32:22 2017 us=432869 peer 1 (phone) floated from 172.56.39.168:60221 to [AF_INET]65.44.211.33:56035
668Tue Oct 24 09:33:46 2017 us=784797 MULTI: multi_create_instance called
669Tue Oct 24 09:33:46 2017 us=785278 65.44.211.33:45403 Re-using SSL/TLS context
670Tue Oct 24 09:33:46 2017 us=785406 65.44.211.33:45403 LZ4 compression initializing
671Tue Oct 24 09:33:46 2017 us=785871 65.44.211.33:45403 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
672Tue Oct 24 09:33:46 2017 us=785987 65.44.211.33:45403 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
673Tue Oct 24 09:33:46 2017 us=786228 65.44.211.33:45403 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
674Tue Oct 24 09:33:46 2017 us=786330 65.44.211.33:45403 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
675Tue Oct 24 09:33:46 2017 us=786534 65.44.211.33:45403 TLS: Initial packet from [AF_INET]65.44.211.33:45403, sid=73970236 c34e76ee
676Tue Oct 24 09:33:51 2017 us=966745 65.44.211.33:45403 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
677Tue Oct 24 09:33:51 2017 us=968721 65.44.211.33:45403 VERIFY KU OK
678Tue Oct 24 09:33:51 2017 us=968848 65.44.211.33:45403 Validating certificate extended key usage
679Tue Oct 24 09:33:51 2017 us=968956 65.44.211.33:45403 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
680Tue Oct 24 09:33:51 2017 us=969112 65.44.211.33:45403 VERIFY EKU OK
681Tue Oct 24 09:33:51 2017 us=969206 65.44.211.33:45403 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
682Tue Oct 24 09:33:52 2017 us=106179 65.44.211.33:45403 peer info: IV_VER=2.5_master
683Tue Oct 24 09:33:52 2017 us=106438 65.44.211.33:45403 peer info: IV_PLAT=android
684Tue Oct 24 09:33:52 2017 us=106549 65.44.211.33:45403 peer info: IV_PROTO=2
685Tue Oct 24 09:33:52 2017 us=106652 65.44.211.33:45403 peer info: IV_LZ4=1
686Tue Oct 24 09:33:52 2017 us=106754 65.44.211.33:45403 peer info: IV_LZ4v2=1
687Tue Oct 24 09:33:52 2017 us=106852 65.44.211.33:45403 peer info: IV_LZO=1
688Tue Oct 24 09:33:52 2017 us=106989 65.44.211.33:45403 peer info: IV_COMP_STUB=1
689Tue Oct 24 09:33:52 2017 us=107094 65.44.211.33:45403 peer info: IV_COMP_STUBv2=1
690Tue Oct 24 09:33:52 2017 us=107194 65.44.211.33:45403 peer info: IV_TCPNL=1
691Tue Oct 24 09:33:52 2017 us=107296 65.44.211.33:45403 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
692Tue Oct 24 09:33:52 2017 us=108042 65.44.211.33:45403 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
693Tue Oct 24 09:33:52 2017 us=108170 65.44.211.33:45403 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
694Tue Oct 24 09:33:52 2017 us=130019 65.44.211.33:45403 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
695Tue Oct 24 09:33:52 2017 us=130297 65.44.211.33:45403 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:45403
696Tue Oct 24 09:33:52 2017 us=131408 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
697Tue Oct 24 09:33:52 2017 us=131530 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
698Tue Oct 24 09:33:52 2017 us=131870 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:45403
699Tue Oct 24 09:33:52 2017 us=131985 MULTI: primary virtual IP for phone/65.44.211.33:45403: 192.168.8.6
700Tue Oct 24 09:33:54 2017 us=64036 phone/65.44.211.33:45403 PUSH: Received control message: 'PUSH_REQUEST'
701Tue Oct 24 09:33:54 2017 us=64365 phone/65.44.211.33:45403 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1)
702Tue Oct 24 09:33:57 2017 us=284720 MULTI: multi_create_instance called
703Tue Oct 24 09:33:57 2017 us=285168 65.44.211.33:45427 Re-using SSL/TLS context
704Tue Oct 24 09:33:57 2017 us=285291 65.44.211.33:45427 LZ4 compression initializing
705Tue Oct 24 09:33:57 2017 us=285763 65.44.211.33:45427 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
706Tue Oct 24 09:33:57 2017 us=285878 65.44.211.33:45427 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
707Tue Oct 24 09:33:57 2017 us=286105 65.44.211.33:45427 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
708Tue Oct 24 09:33:57 2017 us=286330 65.44.211.33:45427 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
709Tue Oct 24 09:33:57 2017 us=286550 65.44.211.33:45427 TLS: Initial packet from [AF_INET]65.44.211.33:45427, sid=6520964b 74918729
710Tue Oct 24 09:33:57 2017 us=746348 65.44.211.33:45427 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
711Tue Oct 24 09:33:57 2017 us=748492 65.44.211.33:45427 VERIFY KU OK
712Tue Oct 24 09:33:57 2017 us=748650 65.44.211.33:45427 Validating certificate extended key usage
713Tue Oct 24 09:33:57 2017 us=748761 65.44.211.33:45427 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
714Tue Oct 24 09:33:57 2017 us=748853 65.44.211.33:45427 VERIFY EKU OK
715Tue Oct 24 09:33:57 2017 us=748944 65.44.211.33:45427 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
716Tue Oct 24 09:33:57 2017 us=899953 65.44.211.33:45427 peer info: IV_VER=2.5_master
717Tue Oct 24 09:33:57 2017 us=900139 65.44.211.33:45427 peer info: IV_PLAT=android
718Tue Oct 24 09:33:57 2017 us=900342 65.44.211.33:45427 peer info: IV_PROTO=2
719Tue Oct 24 09:33:57 2017 us=900447 65.44.211.33:45427 peer info: IV_LZ4=1
720Tue Oct 24 09:33:57 2017 us=900548 65.44.211.33:45427 peer info: IV_LZ4v2=1
721Tue Oct 24 09:33:57 2017 us=900649 65.44.211.33:45427 peer info: IV_LZO=1
722Tue Oct 24 09:33:57 2017 us=900748 65.44.211.33:45427 peer info: IV_COMP_STUB=1
723Tue Oct 24 09:33:57 2017 us=900847 65.44.211.33:45427 peer info: IV_COMP_STUBv2=1
724Tue Oct 24 09:33:57 2017 us=900946 65.44.211.33:45427 peer info: IV_TCPNL=1
725Tue Oct 24 09:33:57 2017 us=901206 65.44.211.33:45427 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
726Tue Oct 24 09:33:57 2017 us=901937 65.44.211.33:45427 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
727Tue Oct 24 09:33:57 2017 us=902076 65.44.211.33:45427 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
728Tue Oct 24 09:33:57 2017 us=922595 65.44.211.33:45427 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
729Tue Oct 24 09:33:57 2017 us=922875 65.44.211.33:45427 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:45427
730Tue Oct 24 09:33:57 2017 us=923717 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
731Tue Oct 24 09:33:57 2017 us=923857 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
732Tue Oct 24 09:33:57 2017 us=924197 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:45427
733Tue Oct 24 09:33:57 2017 us=924308 MULTI: primary virtual IP for phone/65.44.211.33:45427: 192.168.8.6
734Tue Oct 24 09:33:58 2017 us=110994 phone/65.44.211.33:45427 PUSH: Received control message: 'PUSH_REQUEST'
735Tue Oct 24 09:33:58 2017 us=111335 phone/65.44.211.33:45427 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1)
736Tue Oct 24 10:29:40 2017 us=242309 Float requested for peer 1 to 172.56.38.195:61021
737Tue Oct 24 10:29:40 2017 us=242574 peer 1 (phone) floated from 65.44.211.33:45427 to [AF_INET]172.56.38.195:61021
738Tue Oct 24 10:29:50 2017 us=132582 Float requested for peer 1 to 65.44.211.33:45427
739Tue Oct 24 10:29:50 2017 us=132848 peer 1 (phone) floated from 172.56.38.195:61021 to [AF_INET]65.44.211.33:45427
740Tue Oct 24 10:30:08 2017 us=558063 MULTI: multi_create_instance called
741Tue Oct 24 10:30:08 2017 us=558414 65.44.211.33:33806 Re-using SSL/TLS context
742Tue Oct 24 10:30:08 2017 us=558533 65.44.211.33:33806 LZ4 compression initializing
743Tue Oct 24 10:30:08 2017 us=559004 65.44.211.33:33806 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
744Tue Oct 24 10:30:08 2017 us=559129 65.44.211.33:33806 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
745Tue Oct 24 10:30:08 2017 us=559361 65.44.211.33:33806 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
746Tue Oct 24 10:30:08 2017 us=559463 65.44.211.33:33806 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
747Tue Oct 24 10:30:08 2017 us=559657 65.44.211.33:33806 TLS: Initial packet from [AF_INET]65.44.211.33:33806, sid=f98a9d2a 6c37f4a5
748Tue Oct 24 10:30:09 2017 us=14321 65.44.211.33:33806 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
749Tue Oct 24 10:30:09 2017 us=16303 65.44.211.33:33806 VERIFY KU OK
750Tue Oct 24 10:30:09 2017 us=16434 65.44.211.33:33806 Validating certificate extended key usage
751Tue Oct 24 10:30:09 2017 us=16545 65.44.211.33:33806 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
752Tue Oct 24 10:30:09 2017 us=16641 65.44.211.33:33806 VERIFY EKU OK
753Tue Oct 24 10:30:09 2017 us=16738 65.44.211.33:33806 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
754Tue Oct 24 10:30:09 2017 us=139692 65.44.211.33:33806 peer info: IV_VER=2.5_master
755Tue Oct 24 10:30:09 2017 us=139879 65.44.211.33:33806 peer info: IV_PLAT=android
756Tue Oct 24 10:30:09 2017 us=139983 65.44.211.33:33806 peer info: IV_PROTO=2
757Tue Oct 24 10:30:09 2017 us=140083 65.44.211.33:33806 peer info: IV_LZ4=1
758Tue Oct 24 10:30:09 2017 us=140181 65.44.211.33:33806 peer info: IV_LZ4v2=1
759Tue Oct 24 10:30:09 2017 us=140281 65.44.211.33:33806 peer info: IV_LZO=1
760Tue Oct 24 10:30:09 2017 us=140381 65.44.211.33:33806 peer info: IV_COMP_STUB=1
761Tue Oct 24 10:30:09 2017 us=140482 65.44.211.33:33806 peer info: IV_COMP_STUBv2=1
762Tue Oct 24 10:30:09 2017 us=140581 65.44.211.33:33806 peer info: IV_TCPNL=1
763Tue Oct 24 10:30:09 2017 us=140683 65.44.211.33:33806 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
764Tue Oct 24 10:30:09 2017 us=141519 65.44.211.33:33806 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
765Tue Oct 24 10:30:09 2017 us=141660 65.44.211.33:33806 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
766Tue Oct 24 10:30:09 2017 us=162659 65.44.211.33:33806 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
767Tue Oct 24 10:30:09 2017 us=162897 65.44.211.33:33806 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:33806
768Tue Oct 24 10:30:09 2017 us=163699 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
769Tue Oct 24 10:30:09 2017 us=163831 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
770Tue Oct 24 10:30:09 2017 us=164172 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:33806
771Tue Oct 24 10:30:09 2017 us=164287 MULTI: primary virtual IP for phone/65.44.211.33:33806: 192.168.8.6
772Tue Oct 24 10:30:09 2017 us=901770 phone/65.44.211.33:33806 PUSH: Received control message: 'PUSH_REQUEST'
773Tue Oct 24 10:30:09 2017 us=902106 phone/65.44.211.33:33806 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1)
774Tue Oct 24 11:30:09 2017 us=15737 phone/65.44.211.33:33806 TLS: soft reset sec=0 bytes=285774809/-1 pkts=1075209/0
775Tue Oct 24 11:30:09 2017 us=408273 phone/65.44.211.33:33806 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
776Tue Oct 24 11:30:09 2017 us=410364 phone/65.44.211.33:33806 VERIFY KU OK
777Tue Oct 24 11:30:09 2017 us=410514 phone/65.44.211.33:33806 Validating certificate extended key usage
778Tue Oct 24 11:30:09 2017 us=410625 phone/65.44.211.33:33806 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
779Tue Oct 24 11:30:09 2017 us=410721 phone/65.44.211.33:33806 VERIFY EKU OK
780Tue Oct 24 11:30:09 2017 us=410816 phone/65.44.211.33:33806 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
781Tue Oct 24 11:30:09 2017 us=530708 phone/65.44.211.33:33806 peer info: IV_VER=2.5_master
782Tue Oct 24 11:30:09 2017 us=530884 phone/65.44.211.33:33806 peer info: IV_PLAT=android
783Tue Oct 24 11:30:09 2017 us=530977 phone/65.44.211.33:33806 peer info: IV_PROTO=2
784Tue Oct 24 11:30:09 2017 us=531064 phone/65.44.211.33:33806 peer info: IV_LZ4=1
785Tue Oct 24 11:30:09 2017 us=531152 phone/65.44.211.33:33806 peer info: IV_LZ4v2=1
786Tue Oct 24 11:30:09 2017 us=531239 phone/65.44.211.33:33806 peer info: IV_LZO=1
787Tue Oct 24 11:30:09 2017 us=531328 phone/65.44.211.33:33806 peer info: IV_COMP_STUB=1
788Tue Oct 24 11:30:09 2017 us=531417 phone/65.44.211.33:33806 peer info: IV_COMP_STUBv2=1
789Tue Oct 24 11:30:09 2017 us=531508 phone/65.44.211.33:33806 peer info: IV_TCPNL=1
790Tue Oct 24 11:30:09 2017 us=531597 phone/65.44.211.33:33806 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
791Tue Oct 24 11:30:09 2017 us=532233 phone/65.44.211.33:33806 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
792Tue Oct 24 11:30:09 2017 us=532405 phone/65.44.211.33:33806 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
793Tue Oct 24 11:30:09 2017 us=556398 phone/65.44.211.33:33806 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
794Tue Oct 24 11:32:19 2017 us=426593 Float requested for peer 0 to 208.54.5.183:55012
795Tue Oct 24 11:32:19 2017 us=426879 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]208.54.5.183:55012
796Tue Oct 24 11:34:27 2017 us=377106 Float requested for peer 0 to 65.44.211.33:33806
797Tue Oct 24 11:34:27 2017 us=377389 peer 0 (phone) floated from 208.54.5.183:55012 to [AF_INET]65.44.211.33:33806
798Tue Oct 24 11:36:59 2017 us=937480 Float requested for peer 0 to 172.56.38.51:22536
799Tue Oct 24 11:36:59 2017 us=937771 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536
800Tue Oct 24 11:37:02 2017 us=474284 Float requested for peer 0 to 65.44.211.33:33806
801Tue Oct 24 11:37:02 2017 us=474550 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806
802Tue Oct 24 11:37:02 2017 us=573705 Float requested for peer 0 to 172.56.38.51:22536
803Tue Oct 24 11:37:02 2017 us=574007 PID_ERR replay-window backtrack occurred [9] [SSL-1] [00000_____000000000000000000000000001111111111111111111111111222] 0:1276 0:1267 t=1508866622[0] r=[-3,64,15,9,1] sl=[4,64,64,528]
804Tue Oct 24 11:37:02 2017 us=574162 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536
805Tue Oct 24 11:37:02 2017 us=650379 Float requested for peer 0 to 65.44.211.33:33806
806Tue Oct 24 11:37:02 2017 us=650640 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806
807Tue Oct 24 11:37:15 2017 us=455595 Float requested for peer 0 to 172.56.38.51:22536
808Tue Oct 24 11:37:15 2017 us=455916 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536
809Tue Oct 24 11:37:51 2017 us=237746 Float requested for peer 0 to 65.44.211.33:33806
810Tue Oct 24 11:37:51 2017 us=238023 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806
811Tue Oct 24 11:38:37 2017 us=754034 Float requested for peer 0 to 172.56.38.51:22536
812Tue Oct 24 11:38:37 2017 us=754312 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536
813Tue Oct 24 11:43:55 2017 us=760068 Float requested for peer 0 to 65.44.211.33:33806
814Tue Oct 24 11:43:55 2017 us=760354 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806
815Tue Oct 24 11:44:07 2017 us=814520 Float requested for peer 0 to 172.56.38.51:22536
816Tue Oct 24 11:44:07 2017 us=814800 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536
817Tue Oct 24 11:44:14 2017 us=449807 MULTI: multi_create_instance called
818Tue Oct 24 11:44:14 2017 us=450146 172.56.38.51:19368 Re-using SSL/TLS context
819Tue Oct 24 11:44:14 2017 us=450261 172.56.38.51:19368 LZ4 compression initializing
820Tue Oct 24 11:44:14 2017 us=450772 172.56.38.51:19368 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
821Tue Oct 24 11:44:14 2017 us=450900 172.56.38.51:19368 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
822Tue Oct 24 11:44:14 2017 us=451128 172.56.38.51:19368 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
823Tue Oct 24 11:44:14 2017 us=451230 172.56.38.51:19368 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
824Tue Oct 24 11:44:14 2017 us=451438 172.56.38.51:19368 TLS: Initial packet from [AF_INET]172.56.38.51:19368, sid=640defb6 5c386d3f
825Tue Oct 24 11:44:15 2017 us=50360 172.56.38.51:19368 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
826Tue Oct 24 11:44:15 2017 us=52326 172.56.38.51:19368 VERIFY KU OK
827Tue Oct 24 11:44:15 2017 us=52459 172.56.38.51:19368 Validating certificate extended key usage
828Tue Oct 24 11:44:15 2017 us=52630 172.56.38.51:19368 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
829Tue Oct 24 11:44:15 2017 us=52727 172.56.38.51:19368 VERIFY EKU OK
830Tue Oct 24 11:44:15 2017 us=52816 172.56.38.51:19368 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
831Tue Oct 24 11:44:15 2017 us=606936 172.56.38.51:19368 peer info: IV_VER=2.5_master
832Tue Oct 24 11:44:15 2017 us=607123 172.56.38.51:19368 peer info: IV_PLAT=android
833Tue Oct 24 11:44:15 2017 us=607224 172.56.38.51:19368 peer info: IV_PROTO=2
834Tue Oct 24 11:44:15 2017 us=607324 172.56.38.51:19368 peer info: IV_LZ4=1
835Tue Oct 24 11:44:15 2017 us=607424 172.56.38.51:19368 peer info: IV_LZ4v2=1
836Tue Oct 24 11:44:15 2017 us=607521 172.56.38.51:19368 peer info: IV_LZO=1
837Tue Oct 24 11:44:15 2017 us=607619 172.56.38.51:19368 peer info: IV_COMP_STUB=1
838Tue Oct 24 11:44:15 2017 us=607716 172.56.38.51:19368 peer info: IV_COMP_STUBv2=1
839Tue Oct 24 11:44:15 2017 us=607816 172.56.38.51:19368 peer info: IV_TCPNL=1
840Tue Oct 24 11:44:15 2017 us=607917 172.56.38.51:19368 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
841Tue Oct 24 11:44:15 2017 us=608664 172.56.38.51:19368 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
842Tue Oct 24 11:44:15 2017 us=608796 172.56.38.51:19368 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
843Tue Oct 24 11:44:15 2017 us=704166 172.56.38.51:19368 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
844Tue Oct 24 11:44:15 2017 us=704441 172.56.38.51:19368 [phone] Peer Connection Initiated with [AF_INET]172.56.38.51:19368
845Tue Oct 24 11:44:15 2017 us=705680 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
846Tue Oct 24 11:44:15 2017 us=705805 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
847Tue Oct 24 11:44:15 2017 us=706153 MULTI: Learn: 192.168.8.6 -> phone/172.56.38.51:19368
848Tue Oct 24 11:44:15 2017 us=706266 MULTI: primary virtual IP for phone/172.56.38.51:19368: 192.168.8.6
849Tue Oct 24 11:44:16 2017 us=204601 phone/172.56.38.51:19368 PUSH: Received control message: 'PUSH_REQUEST'
850Tue Oct 24 11:44:16 2017 us=204938 phone/172.56.38.51:19368 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1)
851Tue Oct 24 11:44:50 2017 us=893350 Float requested for peer 1 to 65.44.211.33:55524
852Tue Oct 24 11:44:50 2017 us=893632 peer 1 (phone) floated from 172.56.38.51:19368 to [AF_INET]65.44.211.33:55524
853Tue Oct 24 11:58:58 2017 us=567761 Float requested for peer 1 to 172.56.39.195:19644
854Tue Oct 24 11:58:58 2017 us=568040 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.195:19644
855Tue Oct 24 12:00:02 2017 us=817418 Float requested for peer 1 to 65.44.211.33:55524
856Tue Oct 24 12:00:02 2017 us=817695 peer 1 (phone) floated from 172.56.39.195:19644 to [AF_INET]65.44.211.33:55524
857Tue Oct 24 12:01:09 2017 us=620549 Float requested for peer 1 to 172.56.39.195:19644
858Tue Oct 24 12:01:09 2017 us=620827 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.195:19644
859Tue Oct 24 12:13:18 2017 us=453234 Float requested for peer 1 to 65.44.211.33:55524
860Tue Oct 24 12:13:18 2017 us=453512 peer 1 (phone) floated from 172.56.39.195:19644 to [AF_INET]65.44.211.33:55524
861Tue Oct 24 12:14:57 2017 us=701158 Float requested for peer 1 to 172.56.39.195:19644
862Tue Oct 24 12:14:57 2017 us=701458 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.195:19644
863Tue Oct 24 12:44:15 2017 us=788702 phone/172.56.39.195:19644 TLS: soft reset sec=0 bytes=2332419/-1 pkts=8057/0
864Tue Oct 24 12:44:18 2017 us=618358 phone/172.56.39.195:19644 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
865Tue Oct 24 12:44:18 2017 us=620489 phone/172.56.39.195:19644 VERIFY KU OK
866Tue Oct 24 12:44:18 2017 us=620620 phone/172.56.39.195:19644 Validating certificate extended key usage
867Tue Oct 24 12:44:18 2017 us=620726 phone/172.56.39.195:19644 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
868Tue Oct 24 12:44:18 2017 us=620819 phone/172.56.39.195:19644 VERIFY EKU OK
869Tue Oct 24 12:44:18 2017 us=620911 phone/172.56.39.195:19644 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
870Tue Oct 24 12:44:18 2017 us=826618 phone/172.56.39.195:19644 peer info: IV_VER=2.5_master
871Tue Oct 24 12:44:18 2017 us=826800 phone/172.56.39.195:19644 peer info: IV_PLAT=android
872Tue Oct 24 12:44:18 2017 us=826902 phone/172.56.39.195:19644 peer info: IV_PROTO=2
873Tue Oct 24 12:44:18 2017 us=827000 phone/172.56.39.195:19644 peer info: IV_LZ4=1
874Tue Oct 24 12:44:18 2017 us=827098 phone/172.56.39.195:19644 peer info: IV_LZ4v2=1
875Tue Oct 24 12:44:18 2017 us=827197 phone/172.56.39.195:19644 peer info: IV_LZO=1
876Tue Oct 24 12:44:18 2017 us=827295 phone/172.56.39.195:19644 peer info: IV_COMP_STUB=1
877Tue Oct 24 12:44:18 2017 us=827394 phone/172.56.39.195:19644 peer info: IV_COMP_STUBv2=1
878Tue Oct 24 12:44:18 2017 us=827494 phone/172.56.39.195:19644 peer info: IV_TCPNL=1
879Tue Oct 24 12:44:18 2017 us=827593 phone/172.56.39.195:19644 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
880Tue Oct 24 12:44:18 2017 us=828336 phone/172.56.39.195:19644 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
881Tue Oct 24 12:44:18 2017 us=828464 phone/172.56.39.195:19644 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
882Tue Oct 24 12:44:18 2017 us=909230 phone/172.56.39.195:19644 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
883Tue Oct 24 13:44:15 2017 us=689072 phone/172.56.39.195:19644 TLS: tls_process: killed expiring key
884Tue Oct 24 13:44:18 2017 us=73187 phone/172.56.39.195:19644 TLS: soft reset sec=0 bytes=7711876/-1 pkts=12250/0
885Tue Oct 24 13:44:18 2017 us=836171 phone/172.56.39.195:19644 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
886Tue Oct 24 13:44:18 2017 us=838245 phone/172.56.39.195:19644 VERIFY KU OK
887Tue Oct 24 13:44:18 2017 us=838389 phone/172.56.39.195:19644 Validating certificate extended key usage
888Tue Oct 24 13:44:18 2017 us=838499 phone/172.56.39.195:19644 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
889Tue Oct 24 13:44:18 2017 us=838595 phone/172.56.39.195:19644 VERIFY EKU OK
890Tue Oct 24 13:44:18 2017 us=838690 phone/172.56.39.195:19644 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
891Tue Oct 24 13:44:19 2017 us=33730 phone/172.56.39.195:19644 peer info: IV_VER=2.5_master
892Tue Oct 24 13:44:19 2017 us=33923 phone/172.56.39.195:19644 peer info: IV_PLAT=android
893Tue Oct 24 13:44:19 2017 us=34030 phone/172.56.39.195:19644 peer info: IV_PROTO=2
894Tue Oct 24 13:44:19 2017 us=34132 phone/172.56.39.195:19644 peer info: IV_LZ4=1
895Tue Oct 24 13:44:19 2017 us=34233 phone/172.56.39.195:19644 peer info: IV_LZ4v2=1
896Tue Oct 24 13:44:19 2017 us=34334 phone/172.56.39.195:19644 peer info: IV_LZO=1
897Tue Oct 24 13:44:19 2017 us=34433 phone/172.56.39.195:19644 peer info: IV_COMP_STUB=1
898Tue Oct 24 13:44:19 2017 us=34536 phone/172.56.39.195:19644 peer info: IV_COMP_STUBv2=1
899Tue Oct 24 13:44:19 2017 us=34638 phone/172.56.39.195:19644 peer info: IV_TCPNL=1
900Tue Oct 24 13:44:19 2017 us=34741 phone/172.56.39.195:19644 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
901Tue Oct 24 13:44:19 2017 us=35477 phone/172.56.39.195:19644 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
902Tue Oct 24 13:44:19 2017 us=35607 phone/172.56.39.195:19644 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
903Tue Oct 24 13:44:19 2017 us=145718 phone/172.56.39.195:19644 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
904Tue Oct 24 14:35:34 2017 us=818681 Float requested for peer 1 to 65.44.211.33:55524
905Tue Oct 24 14:35:34 2017 us=827026 peer 1 (phone) floated from 172.56.39.195:19644 to [AF_INET]65.44.211.33:55524
906Tue Oct 24 14:37:37 2017 us=556810 Float requested for peer 1 to 172.56.38.134:46002
907Tue Oct 24 14:37:37 2017 us=557161 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.38.134:46002
908Tue Oct 24 14:39:20 2017 us=977779 Float requested for peer 1 to 65.44.211.33:55524
909Tue Oct 24 14:39:20 2017 us=978033 peer 1 (phone) floated from 172.56.38.134:46002 to [AF_INET]65.44.211.33:55524
910Tue Oct 24 14:39:21 2017 us=61913 Float requested for peer 1 to 172.56.38.134:46002
911Tue Oct 24 14:39:21 2017 us=62211 PID_ERR replay-window backtrack occurred [4] [SSL-2] [0111_>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:2555 0:2551 t=1508877561[0] r=[-1,64,15,4,1] sl=[5,64,64,528]
912Tue Oct 24 14:39:21 2017 us=62423 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.38.134:46002
913Tue Oct 24 14:39:21 2017 us=64943 Float requested for peer 1 to 65.44.211.33:55524
914Tue Oct 24 14:39:21 2017 us=65280 peer 1 (phone) floated from 172.56.38.134:46002 to [AF_INET]65.44.211.33:55524
915Tue Oct 24 14:41:14 2017 us=210115 Float requested for peer 1 to 172.56.39.236:31926
916Tue Oct 24 14:41:14 2017 us=210401 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.236:31926
917Tue Oct 24 14:41:19 2017 us=477374 Float requested for peer 1 to 65.44.211.33:55524
918Tue Oct 24 14:41:19 2017 us=477642 peer 1 (phone) floated from 172.56.39.236:31926 to [AF_INET]65.44.211.33:55524
919Tue Oct 24 14:41:44 2017 us=316351 MULTI: multi_create_instance called
920Tue Oct 24 14:41:44 2017 us=316732 65.44.211.33:47404 Re-using SSL/TLS context
921Tue Oct 24 14:41:44 2017 us=316852 65.44.211.33:47404 LZ4 compression initializing
922Tue Oct 24 14:41:44 2017 us=317426 65.44.211.33:47404 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
923Tue Oct 24 14:41:44 2017 us=317559 65.44.211.33:47404 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
924Tue Oct 24 14:41:44 2017 us=317831 65.44.211.33:47404 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
925Tue Oct 24 14:41:44 2017 us=317934 65.44.211.33:47404 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
926Tue Oct 24 14:41:44 2017 us=318140 65.44.211.33:47404 TLS: Initial packet from [AF_INET]65.44.211.33:47404, sid=0651792f ee2b1b06
927Tue Oct 24 14:42:44 2017 us=529076 65.44.211.33:47404 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
928Tue Oct 24 14:42:44 2017 us=529285 65.44.211.33:47404 TLS Error: TLS handshake failed
929Tue Oct 24 14:42:44 2017 us=529723 65.44.211.33:47404 SIGUSR1[soft,tls-error] received, client-instance restarting
930Tue Oct 24 14:43:00 2017 us=814821 MULTI: multi_create_instance called
931Tue Oct 24 14:43:00 2017 us=815161 65.44.211.33:33659 Re-using SSL/TLS context
932Tue Oct 24 14:43:00 2017 us=815279 65.44.211.33:33659 LZ4 compression initializing
933Tue Oct 24 14:43:00 2017 us=815729 65.44.211.33:33659 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
934Tue Oct 24 14:43:00 2017 us=815845 65.44.211.33:33659 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
935Tue Oct 24 14:43:00 2017 us=816076 65.44.211.33:33659 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
936Tue Oct 24 14:43:00 2017 us=816176 65.44.211.33:33659 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
937Tue Oct 24 14:43:00 2017 us=816382 65.44.211.33:33659 TLS: Initial packet from [AF_INET]65.44.211.33:33659, sid=7708bafe 09804a30
938Tue Oct 24 14:43:01 2017 us=65802 MULTI: multi_create_instance called
939Tue Oct 24 14:43:01 2017 us=66190 65.44.211.33:33702 Re-using SSL/TLS context
940Tue Oct 24 14:43:01 2017 us=66306 65.44.211.33:33702 LZ4 compression initializing
941Tue Oct 24 14:43:01 2017 us=66872 65.44.211.33:33702 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
942Tue Oct 24 14:43:01 2017 us=66983 65.44.211.33:33702 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
943Tue Oct 24 14:43:01 2017 us=67208 65.44.211.33:33702 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
944Tue Oct 24 14:43:01 2017 us=67343 65.44.211.33:33702 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
945Tue Oct 24 14:43:01 2017 us=67536 65.44.211.33:33702 TLS: Initial packet from [AF_INET]65.44.211.33:33702, sid=1f8ddb2e 97a761b9
946Tue Oct 24 14:43:01 2017 us=257049 65.44.211.33:33659 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
947Tue Oct 24 14:43:01 2017 us=258753 65.44.211.33:33659 VERIFY KU OK
948Tue Oct 24 14:43:01 2017 us=258866 65.44.211.33:33659 Validating certificate extended key usage
949Tue Oct 24 14:43:01 2017 us=258960 65.44.211.33:33659 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
950Tue Oct 24 14:43:01 2017 us=259038 65.44.211.33:33659 VERIFY EKU OK
951Tue Oct 24 14:43:01 2017 us=259116 65.44.211.33:33659 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
952Tue Oct 24 14:43:01 2017 us=339687 65.44.211.33:33659 peer info: IV_VER=2.5_master
953Tue Oct 24 14:43:01 2017 us=339788 65.44.211.33:33659 peer info: IV_PLAT=android
954Tue Oct 24 14:43:01 2017 us=339840 65.44.211.33:33659 peer info: IV_PROTO=2
955Tue Oct 24 14:43:01 2017 us=339890 65.44.211.33:33659 peer info: IV_LZ4=1
956Tue Oct 24 14:43:01 2017 us=339939 65.44.211.33:33659 peer info: IV_LZ4v2=1
957Tue Oct 24 14:43:01 2017 us=339988 65.44.211.33:33659 peer info: IV_LZO=1
958Tue Oct 24 14:43:01 2017 us=340037 65.44.211.33:33659 peer info: IV_COMP_STUB=1
959Tue Oct 24 14:43:01 2017 us=340087 65.44.211.33:33659 peer info: IV_COMP_STUBv2=1
960Tue Oct 24 14:43:01 2017 us=340137 65.44.211.33:33659 peer info: IV_TCPNL=1
961Tue Oct 24 14:43:01 2017 us=340187 65.44.211.33:33659 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
962Tue Oct 24 14:43:01 2017 us=340603 65.44.211.33:33659 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
963Tue Oct 24 14:43:01 2017 us=340669 65.44.211.33:33659 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
964Tue Oct 24 14:43:01 2017 us=359825 65.44.211.33:33659 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
965Tue Oct 24 14:43:01 2017 us=359996 65.44.211.33:33659 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:33659
966Tue Oct 24 14:43:01 2017 us=366014 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
967Tue Oct 24 14:43:01 2017 us=366104 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
968Tue Oct 24 14:43:01 2017 us=366290 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:33659
969Tue Oct 24 14:43:01 2017 us=366347 MULTI: primary virtual IP for phone/65.44.211.33:33659: 192.168.8.6
970Tue Oct 24 14:43:01 2017 us=408329 65.44.211.33:33702 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
971Tue Oct 24 14:43:01 2017 us=410347 65.44.211.33:33702 VERIFY KU OK
972Tue Oct 24 14:43:01 2017 us=410493 65.44.211.33:33702 Validating certificate extended key usage
973Tue Oct 24 14:43:01 2017 us=410600 65.44.211.33:33702 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
974Tue Oct 24 14:43:01 2017 us=410694 65.44.211.33:33702 VERIFY EKU OK
975Tue Oct 24 14:43:01 2017 us=410785 65.44.211.33:33702 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
976Tue Oct 24 14:43:01 2017 us=531194 65.44.211.33:33702 peer info: IV_VER=2.5_master
977Tue Oct 24 14:43:01 2017 us=531385 65.44.211.33:33702 peer info: IV_PLAT=android
978Tue Oct 24 14:43:01 2017 us=531487 65.44.211.33:33702 peer info: IV_PROTO=2
979Tue Oct 24 14:43:01 2017 us=531585 65.44.211.33:33702 peer info: IV_LZ4=1
980Tue Oct 24 14:43:01 2017 us=531684 65.44.211.33:33702 peer info: IV_LZ4v2=1
981Tue Oct 24 14:43:01 2017 us=531783 65.44.211.33:33702 peer info: IV_LZO=1
982Tue Oct 24 14:43:01 2017 us=531882 65.44.211.33:33702 peer info: IV_COMP_STUB=1
983Tue Oct 24 14:43:01 2017 us=531980 65.44.211.33:33702 peer info: IV_COMP_STUBv2=1
984Tue Oct 24 14:43:01 2017 us=532077 65.44.211.33:33702 peer info: IV_TCPNL=1
985Tue Oct 24 14:43:01 2017 us=532177 65.44.211.33:33702 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
986Tue Oct 24 14:43:01 2017 us=532911 65.44.211.33:33702 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
987Tue Oct 24 14:43:01 2017 us=533110 65.44.211.33:33702 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
988Tue Oct 24 14:43:01 2017 us=556427 65.44.211.33:33702 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
989Tue Oct 24 14:43:01 2017 us=556699 65.44.211.33:33702 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:33702
990Tue Oct 24 14:43:01 2017 us=557610 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
991Tue Oct 24 14:43:01 2017 us=557747 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
992Tue Oct 24 14:43:01 2017 us=558129 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:33702
993Tue Oct 24 14:43:01 2017 us=558247 MULTI: primary virtual IP for phone/65.44.211.33:33702: 192.168.8.6
994Tue Oct 24 14:43:05 2017 us=933299 phone/65.44.211.33:33702 PUSH: Received control message: 'PUSH_REQUEST'
995Tue Oct 24 14:43:05 2017 us=933645 phone/65.44.211.33:33702 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 2' (status=1)
996Tue Oct 24 14:43:23 2017 us=105070 Float requested for peer 2 to 172.56.39.236:41384
997Tue Oct 24 14:43:23 2017 us=105354 peer 2 (phone) floated from 65.44.211.33:33702 to [AF_INET]172.56.39.236:41384
998Tue Oct 24 14:44:29 2017 us=191314 Float requested for peer 2 to 65.44.211.33:33702
999Tue Oct 24 14:44:29 2017 us=191591 peer 2 (phone) floated from 172.56.39.236:41384 to [AF_INET]65.44.211.33:33702
1000Tue Oct 24 14:44:31 2017 us=507521 MULTI: multi_create_instance called
1001Tue Oct 24 14:44:31 2017 us=507852 65.44.211.33:48084 Re-using SSL/TLS context
1002Tue Oct 24 14:44:31 2017 us=507967 65.44.211.33:48084 LZ4 compression initializing
1003Tue Oct 24 14:44:31 2017 us=508443 65.44.211.33:48084 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1004Tue Oct 24 14:44:31 2017 us=508561 65.44.211.33:48084 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1005Tue Oct 24 14:44:31 2017 us=508786 65.44.211.33:48084 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1006Tue Oct 24 14:44:31 2017 us=508887 65.44.211.33:48084 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1007Tue Oct 24 14:44:31 2017 us=509168 65.44.211.33:48084 TLS: Initial packet from [AF_INET]65.44.211.33:48084, sid=22b2b112 21151183
1008Tue Oct 24 14:44:31 2017 us=974263 65.44.211.33:48084 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1009Tue Oct 24 14:44:31 2017 us=976224 65.44.211.33:48084 VERIFY KU OK
1010Tue Oct 24 14:44:31 2017 us=976358 65.44.211.33:48084 Validating certificate extended key usage
1011Tue Oct 24 14:44:31 2017 us=976525 65.44.211.33:48084 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1012Tue Oct 24 14:44:31 2017 us=976623 65.44.211.33:48084 VERIFY EKU OK
1013Tue Oct 24 14:44:31 2017 us=976713 65.44.211.33:48084 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1014Tue Oct 24 14:44:32 2017 us=113277 65.44.211.33:48084 peer info: IV_VER=2.5_master
1015Tue Oct 24 14:44:32 2017 us=113460 65.44.211.33:48084 peer info: IV_PLAT=android
1016Tue Oct 24 14:44:32 2017 us=113564 65.44.211.33:48084 peer info: IV_PROTO=2
1017Tue Oct 24 14:44:32 2017 us=113664 65.44.211.33:48084 peer info: IV_LZ4=1
1018Tue Oct 24 14:44:32 2017 us=113764 65.44.211.33:48084 peer info: IV_LZ4v2=1
1019Tue Oct 24 14:44:32 2017 us=113863 65.44.211.33:48084 peer info: IV_LZO=1
1020Tue Oct 24 14:44:32 2017 us=113960 65.44.211.33:48084 peer info: IV_COMP_STUB=1
1021Tue Oct 24 14:44:32 2017 us=114058 65.44.211.33:48084 peer info: IV_COMP_STUBv2=1
1022Tue Oct 24 14:44:32 2017 us=114156 65.44.211.33:48084 peer info: IV_TCPNL=1
1023Tue Oct 24 14:44:32 2017 us=114256 65.44.211.33:48084 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1024Tue Oct 24 14:44:32 2017 us=115101 65.44.211.33:48084 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1025Tue Oct 24 14:44:32 2017 us=115234 65.44.211.33:48084 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1026Tue Oct 24 14:44:32 2017 us=139815 65.44.211.33:48084 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1027Tue Oct 24 14:44:32 2017 us=140090 65.44.211.33:48084 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:48084
1028Tue Oct 24 14:44:32 2017 us=140895 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1029Tue Oct 24 14:44:32 2017 us=141110 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1030Tue Oct 24 14:44:32 2017 us=141459 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:48084
1031Tue Oct 24 14:44:32 2017 us=141571 MULTI: primary virtual IP for phone/65.44.211.33:48084: 192.168.8.6
1032Tue Oct 24 14:44:33 2017 us=168381 phone/65.44.211.33:48084 PUSH: Received control message: 'PUSH_REQUEST'
1033Tue Oct 24 14:44:33 2017 us=168715 phone/65.44.211.33:48084 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1)
1034Tue Oct 24 14:44:52 2017 us=786370 MULTI: multi_create_instance called
1035Tue Oct 24 14:44:52 2017 us=786722 65.44.211.33:38254 Re-using SSL/TLS context
1036Tue Oct 24 14:44:52 2017 us=786840 65.44.211.33:38254 LZ4 compression initializing
1037Tue Oct 24 14:44:52 2017 us=787315 65.44.211.33:38254 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1038Tue Oct 24 14:44:52 2017 us=787429 65.44.211.33:38254 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1039Tue Oct 24 14:44:52 2017 us=787739 65.44.211.33:38254 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1040Tue Oct 24 14:44:52 2017 us=787842 65.44.211.33:38254 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1041Tue Oct 24 14:44:52 2017 us=788052 65.44.211.33:38254 TLS: Initial packet from [AF_INET]65.44.211.33:38254, sid=36e35b65 b9907496
1042Tue Oct 24 14:44:55 2017 us=591871 65.44.211.33:38254 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1043Tue Oct 24 14:44:55 2017 us=593888 65.44.211.33:38254 VERIFY KU OK
1044Tue Oct 24 14:44:55 2017 us=594025 65.44.211.33:38254 Validating certificate extended key usage
1045Tue Oct 24 14:44:55 2017 us=594133 65.44.211.33:38254 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1046Tue Oct 24 14:44:55 2017 us=594291 65.44.211.33:38254 VERIFY EKU OK
1047Tue Oct 24 14:44:55 2017 us=594388 65.44.211.33:38254 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1048Tue Oct 24 14:44:55 2017 us=717610 65.44.211.33:38254 peer info: IV_VER=2.5_master
1049Tue Oct 24 14:44:55 2017 us=717833 65.44.211.33:38254 peer info: IV_PLAT=android
1050Tue Oct 24 14:44:55 2017 us=717938 65.44.211.33:38254 peer info: IV_PROTO=2
1051Tue Oct 24 14:44:55 2017 us=718037 65.44.211.33:38254 peer info: IV_LZ4=1
1052Tue Oct 24 14:44:55 2017 us=718137 65.44.211.33:38254 peer info: IV_LZ4v2=1
1053Tue Oct 24 14:44:55 2017 us=718235 65.44.211.33:38254 peer info: IV_LZO=1
1054Tue Oct 24 14:44:55 2017 us=718333 65.44.211.33:38254 peer info: IV_COMP_STUB=1
1055Tue Oct 24 14:44:55 2017 us=718432 65.44.211.33:38254 peer info: IV_COMP_STUBv2=1
1056Tue Oct 24 14:44:55 2017 us=718529 65.44.211.33:38254 peer info: IV_TCPNL=1
1057Tue Oct 24 14:44:55 2017 us=718629 65.44.211.33:38254 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1058Tue Oct 24 14:44:55 2017 us=719357 65.44.211.33:38254 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1059Tue Oct 24 14:44:55 2017 us=719485 65.44.211.33:38254 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1060Tue Oct 24 14:44:55 2017 us=740134 65.44.211.33:38254 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1061Tue Oct 24 14:44:55 2017 us=740411 65.44.211.33:38254 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:38254
1062Tue Oct 24 14:44:55 2017 us=741228 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1063Tue Oct 24 14:44:55 2017 us=741357 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1064Tue Oct 24 14:44:55 2017 us=741690 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:38254
1065Tue Oct 24 14:44:55 2017 us=741804 MULTI: primary virtual IP for phone/65.44.211.33:38254: 192.168.8.6
1066Tue Oct 24 14:44:57 2017 us=187951 phone/65.44.211.33:38254 PUSH: Received control message: 'PUSH_REQUEST'
1067Tue Oct 24 14:44:57 2017 us=188286 phone/65.44.211.33:38254 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1)
1068Tue Oct 24 14:46:55 2017 us=138090 Float requested for peer 1 to 172.56.39.203:61300
1069Tue Oct 24 14:46:55 2017 us=138366 peer 1 (phone) floated from 65.44.211.33:38254 to [AF_INET]172.56.39.203:61300
1070Tue Oct 24 14:46:58 2017 us=285748 Float requested for peer 1 to 65.44.211.33:38254
1071Tue Oct 24 14:46:58 2017 us=286011 peer 1 (phone) floated from 172.56.39.203:61300 to [AF_INET]65.44.211.33:38254
1072Tue Oct 24 14:47:38 2017 us=552551 MULTI: multi_create_instance called
1073Tue Oct 24 14:47:38 2017 us=552895 65.44.211.33:34846 Re-using SSL/TLS context
1074Tue Oct 24 14:47:38 2017 us=553097 65.44.211.33:34846 LZ4 compression initializing
1075Tue Oct 24 14:47:38 2017 us=553645 65.44.211.33:34846 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1076Tue Oct 24 14:47:38 2017 us=553774 65.44.211.33:34846 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1077Tue Oct 24 14:47:38 2017 us=554003 65.44.211.33:34846 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1078Tue Oct 24 14:47:38 2017 us=554103 65.44.211.33:34846 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1079Tue Oct 24 14:47:38 2017 us=554316 65.44.211.33:34846 TLS: Initial packet from [AF_INET]65.44.211.33:34846, sid=6b8cc27a 266a2e0e
1080Tue Oct 24 14:47:40 2017 us=442097 65.44.211.33:34846 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1081Tue Oct 24 14:47:40 2017 us=444300 65.44.211.33:34846 VERIFY KU OK
1082Tue Oct 24 14:47:40 2017 us=444454 65.44.211.33:34846 Validating certificate extended key usage
1083Tue Oct 24 14:47:40 2017 us=444561 65.44.211.33:34846 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1084Tue Oct 24 14:47:40 2017 us=444653 65.44.211.33:34846 VERIFY EKU OK
1085Tue Oct 24 14:47:40 2017 us=444746 65.44.211.33:34846 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1086Tue Oct 24 14:47:42 2017 us=362803 65.44.211.33:34846 peer info: IV_VER=2.5_master
1087Tue Oct 24 14:47:42 2017 us=362993 65.44.211.33:34846 peer info: IV_PLAT=android
1088Tue Oct 24 14:47:42 2017 us=363096 65.44.211.33:34846 peer info: IV_PROTO=2
1089Tue Oct 24 14:47:42 2017 us=363195 65.44.211.33:34846 peer info: IV_LZ4=1
1090Tue Oct 24 14:47:42 2017 us=363294 65.44.211.33:34846 peer info: IV_LZ4v2=1
1091Tue Oct 24 14:47:42 2017 us=363392 65.44.211.33:34846 peer info: IV_LZO=1
1092Tue Oct 24 14:47:42 2017 us=363490 65.44.211.33:34846 peer info: IV_COMP_STUB=1
1093Tue Oct 24 14:47:42 2017 us=363589 65.44.211.33:34846 peer info: IV_COMP_STUBv2=1
1094Tue Oct 24 14:47:42 2017 us=363688 65.44.211.33:34846 peer info: IV_TCPNL=1
1095Tue Oct 24 14:47:42 2017 us=363789 65.44.211.33:34846 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1096Tue Oct 24 14:47:42 2017 us=364525 65.44.211.33:34846 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1097Tue Oct 24 14:47:42 2017 us=364654 65.44.211.33:34846 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1098Tue Oct 24 14:47:42 2017 us=486959 65.44.211.33:34846 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1099Tue Oct 24 14:47:42 2017 us=487234 65.44.211.33:34846 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:34846
1100Tue Oct 24 14:47:42 2017 us=488048 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1101Tue Oct 24 14:47:42 2017 us=488176 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1102Tue Oct 24 14:47:42 2017 us=488512 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:34846
1103Tue Oct 24 14:47:42 2017 us=488624 MULTI: primary virtual IP for phone/65.44.211.33:34846: 192.168.8.6
1104Tue Oct 24 14:47:43 2017 us=956446 phone/65.44.211.33:34846 PUSH: Received control message: 'PUSH_REQUEST'
1105Tue Oct 24 14:47:43 2017 us=956773 phone/65.44.211.33:34846 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1)
1106Tue Oct 24 14:48:38 2017 us=797788 Float requested for peer 0 to 172.56.39.203:44874
1107Tue Oct 24 14:48:38 2017 us=798073 peer 0 (phone) floated from 65.44.211.33:34846 to [AF_INET]172.56.39.203:44874
1108Tue Oct 24 14:48:45 2017 us=798295 Float requested for peer 0 to 65.44.211.33:34846
1109Tue Oct 24 14:48:45 2017 us=798578 peer 0 (phone) floated from 172.56.39.203:44874 to [AF_INET]65.44.211.33:34846
1110Tue Oct 24 14:49:05 2017 us=963277 MULTI: multi_create_instance called
1111Tue Oct 24 14:49:05 2017 us=963637 172.56.39.203:33162 Re-using SSL/TLS context
1112Tue Oct 24 14:49:05 2017 us=969517 172.56.39.203:33162 LZ4 compression initializing
1113Tue Oct 24 14:49:05 2017 us=970068 172.56.39.203:33162 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1114Tue Oct 24 14:49:05 2017 us=970207 172.56.39.203:33162 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1115Tue Oct 24 14:49:05 2017 us=970438 172.56.39.203:33162 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1116Tue Oct 24 14:49:05 2017 us=970581 172.56.39.203:33162 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1117Tue Oct 24 14:49:05 2017 us=970858 172.56.39.203:33162 TLS: Initial packet from [AF_INET]172.56.39.203:33162, sid=9d56c01e 9be983fa
1118Tue Oct 24 14:49:06 2017 us=663780 172.56.39.203:33162 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1119Tue Oct 24 14:49:06 2017 us=665802 172.56.39.203:33162 VERIFY KU OK
1120Tue Oct 24 14:49:06 2017 us=665938 172.56.39.203:33162 Validating certificate extended key usage
1121Tue Oct 24 14:49:06 2017 us=666044 172.56.39.203:33162 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1122Tue Oct 24 14:49:06 2017 us=666136 172.56.39.203:33162 VERIFY EKU OK
1123Tue Oct 24 14:49:06 2017 us=666227 172.56.39.203:33162 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1124Tue Oct 24 14:49:06 2017 us=873968 172.56.39.203:33162 peer info: IV_VER=2.5_master
1125Tue Oct 24 14:49:06 2017 us=874155 172.56.39.203:33162 peer info: IV_PLAT=android
1126Tue Oct 24 14:49:06 2017 us=874259 172.56.39.203:33162 peer info: IV_PROTO=2
1127Tue Oct 24 14:49:06 2017 us=874357 172.56.39.203:33162 peer info: IV_LZ4=1
1128Tue Oct 24 14:49:06 2017 us=874456 172.56.39.203:33162 peer info: IV_LZ4v2=1
1129Tue Oct 24 14:49:06 2017 us=874553 172.56.39.203:33162 peer info: IV_LZO=1
1130Tue Oct 24 14:49:06 2017 us=874651 172.56.39.203:33162 peer info: IV_COMP_STUB=1
1131Tue Oct 24 14:49:06 2017 us=874749 172.56.39.203:33162 peer info: IV_COMP_STUBv2=1
1132Tue Oct 24 14:49:06 2017 us=874846 172.56.39.203:33162 peer info: IV_TCPNL=1
1133Tue Oct 24 14:49:06 2017 us=874945 172.56.39.203:33162 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1134Tue Oct 24 14:49:06 2017 us=875679 172.56.39.203:33162 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1135Tue Oct 24 14:49:06 2017 us=875808 172.56.39.203:33162 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1136Tue Oct 24 14:49:06 2017 us=961949 172.56.39.203:33162 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1137Tue Oct 24 14:49:06 2017 us=962216 172.56.39.203:33162 [phone] Peer Connection Initiated with [AF_INET]172.56.39.203:33162
1138Tue Oct 24 14:49:06 2017 us=963031 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1139Tue Oct 24 14:49:06 2017 us=963153 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1140Tue Oct 24 14:49:06 2017 us=963492 MULTI: Learn: 192.168.8.6 -> phone/172.56.39.203:33162
1141Tue Oct 24 14:49:06 2017 us=963605 MULTI: primary virtual IP for phone/172.56.39.203:33162: 192.168.8.6
1142Tue Oct 24 14:49:08 2017 us=182132 phone/172.56.39.203:33162 PUSH: Received control message: 'PUSH_REQUEST'
1143Tue Oct 24 14:49:08 2017 us=182473 phone/172.56.39.203:33162 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1)
1144Tue Oct 24 14:54:28 2017 us=479962 Float requested for peer 1 to 65.44.211.33:41166
1145Tue Oct 24 14:54:28 2017 us=487011 peer 1 (phone) floated from 172.56.39.203:33162 to [AF_INET]65.44.211.33:41166
1146Tue Oct 24 14:54:56 2017 us=483291 MULTI: multi_create_instance called
1147Tue Oct 24 14:54:56 2017 us=483627 65.44.211.33:58877 Re-using SSL/TLS context
1148Tue Oct 24 14:54:56 2017 us=483746 65.44.211.33:58877 LZ4 compression initializing
1149Tue Oct 24 14:54:56 2017 us=484216 65.44.211.33:58877 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1150Tue Oct 24 14:54:56 2017 us=484334 65.44.211.33:58877 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1151Tue Oct 24 14:54:56 2017 us=484564 65.44.211.33:58877 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1152Tue Oct 24 14:54:56 2017 us=484726 65.44.211.33:58877 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1153Tue Oct 24 14:54:56 2017 us=484931 65.44.211.33:58877 TLS: Initial packet from [AF_INET]65.44.211.33:58877, sid=163fbc45 138f3378
1154Tue Oct 24 14:55:01 2017 us=964373 65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1155Tue Oct 24 14:55:01 2017 us=966430 65.44.211.33:58877 VERIFY KU OK
1156Tue Oct 24 14:55:01 2017 us=966586 65.44.211.33:58877 Validating certificate extended key usage
1157Tue Oct 24 14:55:01 2017 us=966693 65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1158Tue Oct 24 14:55:01 2017 us=966785 65.44.211.33:58877 VERIFY EKU OK
1159Tue Oct 24 14:55:01 2017 us=966877 65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1160Tue Oct 24 14:55:02 2017 us=93071 65.44.211.33:58877 peer info: IV_VER=2.5_master
1161Tue Oct 24 14:55:02 2017 us=93254 65.44.211.33:58877 peer info: IV_PLAT=android
1162Tue Oct 24 14:55:02 2017 us=93362 65.44.211.33:58877 peer info: IV_PROTO=2
1163Tue Oct 24 14:55:02 2017 us=93462 65.44.211.33:58877 peer info: IV_LZ4=1
1164Tue Oct 24 14:55:02 2017 us=93565 65.44.211.33:58877 peer info: IV_LZ4v2=1
1165Tue Oct 24 14:55:02 2017 us=93663 65.44.211.33:58877 peer info: IV_LZO=1
1166Tue Oct 24 14:55:02 2017 us=93761 65.44.211.33:58877 peer info: IV_COMP_STUB=1
1167Tue Oct 24 14:55:02 2017 us=93860 65.44.211.33:58877 peer info: IV_COMP_STUBv2=1
1168Tue Oct 24 14:55:02 2017 us=93959 65.44.211.33:58877 peer info: IV_TCPNL=1
1169Tue Oct 24 14:55:02 2017 us=94060 65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1170Tue Oct 24 14:55:02 2017 us=94800 65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1171Tue Oct 24 14:55:02 2017 us=94932 65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1172Tue Oct 24 14:55:02 2017 us=118358 65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1173Tue Oct 24 14:55:02 2017 us=118735 65.44.211.33:58877 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:58877
1174Tue Oct 24 14:55:02 2017 us=119642 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1175Tue Oct 24 14:55:02 2017 us=119776 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1176Tue Oct 24 14:55:02 2017 us=120112 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:58877
1177Tue Oct 24 14:55:02 2017 us=120225 MULTI: primary virtual IP for phone/65.44.211.33:58877: 192.168.8.6
1178Tue Oct 24 14:55:04 2017 us=219601 phone/65.44.211.33:58877 PUSH: Received control message: 'PUSH_REQUEST'
1179Tue Oct 24 14:55:04 2017 us=219972 phone/65.44.211.33:58877 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1)
1180Tue Oct 24 15:06:24 2017 us=148015 Float requested for peer 0 to 208.54.5.202:32151
1181Tue Oct 24 15:06:24 2017 us=155013 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]208.54.5.202:32151
1182Tue Oct 24 15:18:55 2017 us=904942 Float requested for peer 0 to 65.44.211.33:58877
1183Tue Oct 24 15:18:55 2017 us=905306 peer 0 (phone) floated from 208.54.5.202:32151 to [AF_INET]65.44.211.33:58877
1184Tue Oct 24 15:22:51 2017 us=780007 Float requested for peer 0 to 208.54.5.174:55565
1185Tue Oct 24 15:22:51 2017 us=780279 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]208.54.5.174:55565
1186Tue Oct 24 15:22:55 2017 us=64706 Float requested for peer 0 to 65.44.211.33:58877
1187Tue Oct 24 15:22:55 2017 us=64961 peer 0 (phone) floated from 208.54.5.174:55565 to [AF_INET]65.44.211.33:58877
1188Tue Oct 24 15:26:01 2017 us=786095 Float requested for peer 0 to 172.56.39.8:34313
1189Tue Oct 24 15:26:01 2017 us=786435 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.39.8:34313
1190Tue Oct 24 15:35:00 2017 us=241152 Float requested for peer 0 to 65.44.211.33:58877
1191Tue Oct 24 15:35:00 2017 us=241432 peer 0 (phone) floated from 172.56.39.8:34313 to [AF_INET]65.44.211.33:58877
1192Tue Oct 24 15:55:02 2017 us=681224 phone/65.44.211.33:58877 TLS: soft reset sec=0 bytes=1422647/-1 pkts=6572/0
1193Tue Oct 24 15:55:08 2017 us=686310 phone/65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1194Tue Oct 24 15:55:08 2017 us=688320 phone/65.44.211.33:58877 VERIFY KU OK
1195Tue Oct 24 15:55:08 2017 us=688449 phone/65.44.211.33:58877 Validating certificate extended key usage
1196Tue Oct 24 15:55:08 2017 us=688558 phone/65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1197Tue Oct 24 15:55:08 2017 us=688654 phone/65.44.211.33:58877 VERIFY EKU OK
1198Tue Oct 24 15:55:08 2017 us=688748 phone/65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1199Tue Oct 24 15:55:08 2017 us=809059 phone/65.44.211.33:58877 peer info: IV_VER=2.5_master
1200Tue Oct 24 15:55:08 2017 us=809257 phone/65.44.211.33:58877 peer info: IV_PLAT=android
1201Tue Oct 24 15:55:08 2017 us=809366 phone/65.44.211.33:58877 peer info: IV_PROTO=2
1202Tue Oct 24 15:55:08 2017 us=809471 phone/65.44.211.33:58877 peer info: IV_LZ4=1
1203Tue Oct 24 15:55:08 2017 us=809575 phone/65.44.211.33:58877 peer info: IV_LZ4v2=1
1204Tue Oct 24 15:55:08 2017 us=809678 phone/65.44.211.33:58877 peer info: IV_LZO=1
1205Tue Oct 24 15:55:08 2017 us=809783 phone/65.44.211.33:58877 peer info: IV_COMP_STUB=1
1206Tue Oct 24 15:55:08 2017 us=809887 phone/65.44.211.33:58877 peer info: IV_COMP_STUBv2=1
1207Tue Oct 24 15:55:08 2017 us=809992 phone/65.44.211.33:58877 peer info: IV_TCPNL=1
1208Tue Oct 24 15:55:08 2017 us=810097 phone/65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1209Tue Oct 24 15:55:08 2017 us=810843 phone/65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1210Tue Oct 24 15:55:08 2017 us=810975 phone/65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1211Tue Oct 24 15:55:08 2017 us=834525 phone/65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1212Tue Oct 24 16:47:49 2017 us=180056 Float requested for peer 0 to 172.56.38.49:20375
1213Tue Oct 24 16:47:49 2017 us=180332 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.49:20375
1214Tue Oct 24 16:49:02 2017 us=927621 Float requested for peer 0 to 65.44.211.33:58877
1215Tue Oct 24 16:49:02 2017 us=927944 peer 0 (phone) floated from 172.56.38.49:20375 to [AF_INET]65.44.211.33:58877
1216Tue Oct 24 16:49:02 2017 us=934468 Float requested for peer 0 to 172.56.38.49:20375
1217Tue Oct 24 16:49:02 2017 us=934766 PID_ERR replay-window backtrack occurred [4] [SSL-1] [00___EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:1963 0:1959 t=1508885342[0] r=[0,64,15,4,1] sl=[21,64,64,528]
1218Tue Oct 24 16:49:02 2017 us=934919 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.49:20375
1219Tue Oct 24 16:49:02 2017 us=951117 Float requested for peer 0 to 65.44.211.33:58877
1220Tue Oct 24 16:49:02 2017 us=951359 peer 0 (phone) floated from 172.56.38.49:20375 to [AF_INET]65.44.211.33:58877
1221Tue Oct 24 16:55:02 2017 us=441643 phone/65.44.211.33:58877 TLS: tls_process: killed expiring key
1222Tue Oct 24 16:55:08 2017 us=580015 phone/65.44.211.33:58877 TLS: soft reset sec=0 bytes=762747/-1 pkts=4162/0
1223Tue Oct 24 16:55:13 2017 us=437703 phone/65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1224Tue Oct 24 16:55:13 2017 us=439711 phone/65.44.211.33:58877 VERIFY KU OK
1225Tue Oct 24 16:55:13 2017 us=439844 phone/65.44.211.33:58877 Validating certificate extended key usage
1226Tue Oct 24 16:55:13 2017 us=439954 phone/65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1227Tue Oct 24 16:55:13 2017 us=440115 phone/65.44.211.33:58877 VERIFY EKU OK
1228Tue Oct 24 16:55:13 2017 us=440210 phone/65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1229Tue Oct 24 16:55:13 2017 us=589706 phone/65.44.211.33:58877 peer info: IV_VER=2.5_master
1230Tue Oct 24 16:55:13 2017 us=589909 phone/65.44.211.33:58877 peer info: IV_PLAT=android
1231Tue Oct 24 16:55:13 2017 us=590015 phone/65.44.211.33:58877 peer info: IV_PROTO=2
1232Tue Oct 24 16:55:13 2017 us=590140 phone/65.44.211.33:58877 peer info: IV_LZ4=1
1233Tue Oct 24 16:55:13 2017 us=590241 phone/65.44.211.33:58877 peer info: IV_LZ4v2=1
1234Tue Oct 24 16:55:13 2017 us=590399 phone/65.44.211.33:58877 peer info: IV_LZO=1
1235Tue Oct 24 16:55:13 2017 us=590502 phone/65.44.211.33:58877 peer info: IV_COMP_STUB=1
1236Tue Oct 24 16:55:13 2017 us=590603 phone/65.44.211.33:58877 peer info: IV_COMP_STUBv2=1
1237Tue Oct 24 16:55:13 2017 us=590702 phone/65.44.211.33:58877 peer info: IV_TCPNL=1
1238Tue Oct 24 16:55:13 2017 us=590801 phone/65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1239Tue Oct 24 16:55:13 2017 us=591537 phone/65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1240Tue Oct 24 16:55:13 2017 us=591672 phone/65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1241Tue Oct 24 16:55:13 2017 us=613621 phone/65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1242Tue Oct 24 17:32:44 2017 us=343409 Float requested for peer 0 to 172.56.39.159:51149
1243Tue Oct 24 17:32:44 2017 us=356338 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.39.159:51149
1244Tue Oct 24 17:33:00 2017 us=561088 Float requested for peer 0 to 65.44.211.33:58877
1245Tue Oct 24 17:33:00 2017 us=561404 peer 0 (phone) floated from 172.56.39.159:51149 to [AF_INET]65.44.211.33:58877
1246Tue Oct 24 17:46:45 2017 us=406925 Float requested for peer 0 to 172.56.38.99:60579
1247Tue Oct 24 17:46:45 2017 us=407209 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.99:60579
1248Tue Oct 24 17:46:55 2017 us=254422 Float requested for peer 0 to 65.44.211.33:58877
1249Tue Oct 24 17:46:55 2017 us=254686 peer 0 (phone) floated from 172.56.38.99:60579 to [AF_INET]65.44.211.33:58877
1250Tue Oct 24 17:46:55 2017 us=420670 Float requested for peer 0 to 172.56.38.99:60579
1251Tue Oct 24 17:46:55 2017 us=421069 PID_ERR replay-window backtrack occurred [1] [SSL-2] [0_00001111111_11111111112222222222222222223333333333333333333333] 0:1719 0:1718 t=1508888815[0] r=[0,64,15,1,1] sl=[9,64,64,528]
1252Tue Oct 24 17:46:55 2017 us=421231 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.99:60579
1253Tue Oct 24 17:46:55 2017 us=483945 Float requested for peer 0 to 65.44.211.33:58877
1254Tue Oct 24 17:46:55 2017 us=484205 peer 0 (phone) floated from 172.56.38.99:60579 to [AF_INET]65.44.211.33:58877
1255Tue Oct 24 17:47:15 2017 us=708959 MULTI: multi_create_instance called
1256Tue Oct 24 17:47:15 2017 us=712667 65.44.211.33:49471 Re-using SSL/TLS context
1257Tue Oct 24 17:47:15 2017 us=712812 65.44.211.33:49471 LZ4 compression initializing
1258Tue Oct 24 17:47:15 2017 us=714659 65.44.211.33:49471 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1259Tue Oct 24 17:47:15 2017 us=714806 65.44.211.33:49471 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1260Tue Oct 24 17:47:15 2017 us=715085 65.44.211.33:49471 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1261Tue Oct 24 17:47:15 2017 us=715187 65.44.211.33:49471 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1262Tue Oct 24 17:47:15 2017 us=715402 65.44.211.33:49471 TLS: Initial packet from [AF_INET]65.44.211.33:49471, sid=a87e7f1b 04eb5237
1263Tue Oct 24 17:47:30 2017 us=518072 65.44.211.33:49471 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1264Tue Oct 24 17:47:30 2017 us=520157 65.44.211.33:49471 VERIFY KU OK
1265Tue Oct 24 17:47:30 2017 us=520289 65.44.211.33:49471 Validating certificate extended key usage
1266Tue Oct 24 17:47:30 2017 us=520394 65.44.211.33:49471 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1267Tue Oct 24 17:47:30 2017 us=520487 65.44.211.33:49471 VERIFY EKU OK
1268Tue Oct 24 17:47:30 2017 us=520578 65.44.211.33:49471 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1269Tue Oct 24 17:47:30 2017 us=674106 65.44.211.33:49471 peer info: IV_VER=2.5_master
1270Tue Oct 24 17:47:30 2017 us=674295 65.44.211.33:49471 peer info: IV_PLAT=android
1271Tue Oct 24 17:47:30 2017 us=674397 65.44.211.33:49471 peer info: IV_PROTO=2
1272Tue Oct 24 17:47:30 2017 us=674495 65.44.211.33:49471 peer info: IV_LZ4=1
1273Tue Oct 24 17:47:30 2017 us=674593 65.44.211.33:49471 peer info: IV_LZ4v2=1
1274Tue Oct 24 17:47:30 2017 us=674689 65.44.211.33:49471 peer info: IV_LZO=1
1275Tue Oct 24 17:47:30 2017 us=674786 65.44.211.33:49471 peer info: IV_COMP_STUB=1
1276Tue Oct 24 17:47:30 2017 us=674886 65.44.211.33:49471 peer info: IV_COMP_STUBv2=1
1277Tue Oct 24 17:47:30 2017 us=674985 65.44.211.33:49471 peer info: IV_TCPNL=1
1278Tue Oct 24 17:47:30 2017 us=675085 65.44.211.33:49471 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1279Tue Oct 24 17:47:30 2017 us=683639 65.44.211.33:49471 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1280Tue Oct 24 17:47:30 2017 us=683810 65.44.211.33:49471 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1281Tue Oct 24 17:47:30 2017 us=751876 65.44.211.33:49471 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1282Tue Oct 24 17:47:30 2017 us=752148 65.44.211.33:49471 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:49471
1283Tue Oct 24 17:47:30 2017 us=760625 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1284Tue Oct 24 17:47:30 2017 us=760802 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1285Tue Oct 24 17:47:30 2017 us=761253 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:49471
1286Tue Oct 24 17:47:30 2017 us=761376 MULTI: primary virtual IP for phone/65.44.211.33:49471: 192.168.8.6
1287Tue Oct 24 17:47:31 2017 us=788963 phone/65.44.211.33:49471 PUSH: Received control message: 'PUSH_REQUEST'
1288Tue Oct 24 17:47:31 2017 us=789356 phone/65.44.211.33:49471 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1)
1289Tue Oct 24 17:56:37 2017 us=867285 MULTI: multi_create_instance called
1290Tue Oct 24 17:56:37 2017 us=867645 65.44.211.33:58877 Re-using SSL/TLS context
1291Tue Oct 24 17:56:37 2017 us=867761 65.44.211.33:58877 LZ4 compression initializing
1292Tue Oct 24 17:56:37 2017 us=868226 65.44.211.33:58877 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1293Tue Oct 24 17:56:37 2017 us=868342 65.44.211.33:58877 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1294Tue Oct 24 17:56:37 2017 us=868568 65.44.211.33:58877 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1295Tue Oct 24 17:56:37 2017 us=868667 65.44.211.33:58877 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1296Tue Oct 24 17:56:37 2017 us=868865 65.44.211.33:58877 TLS: Initial packet from [AF_INET]65.44.211.33:58877, sid=a7fbd933 c531d7d6
1297Tue Oct 24 17:56:38 2017 us=220594 65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1298Tue Oct 24 17:56:38 2017 us=222567 65.44.211.33:58877 VERIFY KU OK
1299Tue Oct 24 17:56:38 2017 us=222774 65.44.211.33:58877 Validating certificate extended key usage
1300Tue Oct 24 17:56:38 2017 us=222883 65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1301Tue Oct 24 17:56:38 2017 us=222976 65.44.211.33:58877 VERIFY EKU OK
1302Tue Oct 24 17:56:38 2017 us=223066 65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1303Tue Oct 24 17:56:38 2017 us=343532 65.44.211.33:58877 peer info: IV_VER=2.5_master
1304Tue Oct 24 17:56:38 2017 us=343716 65.44.211.33:58877 peer info: IV_PLAT=android
1305Tue Oct 24 17:56:38 2017 us=343818 65.44.211.33:58877 peer info: IV_PROTO=2
1306Tue Oct 24 17:56:38 2017 us=343918 65.44.211.33:58877 peer info: IV_LZ4=1
1307Tue Oct 24 17:56:38 2017 us=344016 65.44.211.33:58877 peer info: IV_LZ4v2=1
1308Tue Oct 24 17:56:38 2017 us=344114 65.44.211.33:58877 peer info: IV_LZO=1
1309Tue Oct 24 17:56:38 2017 us=344213 65.44.211.33:58877 peer info: IV_COMP_STUB=1
1310Tue Oct 24 17:56:38 2017 us=344311 65.44.211.33:58877 peer info: IV_COMP_STUBv2=1
1311Tue Oct 24 17:56:38 2017 us=344409 65.44.211.33:58877 peer info: IV_TCPNL=1
1312Tue Oct 24 17:56:38 2017 us=344509 65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1313Tue Oct 24 17:56:38 2017 us=345331 65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1314Tue Oct 24 17:56:38 2017 us=345472 65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1315Tue Oct 24 17:56:38 2017 us=367414 65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1316Tue Oct 24 17:56:38 2017 us=367690 65.44.211.33:58877 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:58877
1317Tue Oct 24 17:56:38 2017 us=368493 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1318Tue Oct 24 17:56:38 2017 us=368615 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1319Tue Oct 24 17:56:38 2017 us=368951 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:58877
1320Tue Oct 24 17:56:38 2017 us=369160 MULTI: primary virtual IP for phone/65.44.211.33:58877: 192.168.8.6
1321Tue Oct 24 17:57:17 2017 us=329367 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2]
1322Tue Oct 24 17:57:52 2017 us=526506 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2]
1323Tue Oct 24 17:58:28 2017 us=178226 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2]
1324Tue Oct 24 17:59:03 2017 us=507707 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2]
1325Tue Oct 24 17:59:39 2017 us=128017 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2]
1326Tue Oct 24 18:00:14 2017 us=449372 Float requested for peer 0 to 172.56.39.235:47193
1327Tue Oct 24 18:00:14 2017 us=449536 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2]
1328Tue Oct 24 18:00:14 2017 us=449730 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.39.235:47193
1329Tue Oct 24 18:00:50 2017 us=188366 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2]
1330Tue Oct 24 18:01:25 2017 us=526653 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2]
1331Tue Oct 24 18:02:01 2017 us=208679 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2]
1332Tue Oct 24 18:02:37 2017 us=141864 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2]
1333Tue Oct 24 18:03:12 2017 us=32279 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2]
1334Tue Oct 24 18:03:23 2017 us=682107 MULTI: multi_create_instance called
1335Tue Oct 24 18:03:23 2017 us=682457 172.56.39.235:41284 Re-using SSL/TLS context
1336Tue Oct 24 18:03:23 2017 us=682665 172.56.39.235:41284 LZ4 compression initializing
1337Tue Oct 24 18:03:23 2017 us=683148 172.56.39.235:41284 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1338Tue Oct 24 18:03:23 2017 us=683379 172.56.39.235:41284 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1339Tue Oct 24 18:03:23 2017 us=683617 172.56.39.235:41284 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1340Tue Oct 24 18:03:23 2017 us=683720 172.56.39.235:41284 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1341Tue Oct 24 18:03:23 2017 us=683935 172.56.39.235:41284 TLS: Initial packet from [AF_INET]172.56.39.235:41284, sid=dac765d9 bbed58f0
1342Tue Oct 24 18:03:24 2017 us=335291 172.56.39.235:41284 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1343Tue Oct 24 18:03:24 2017 us=337713 172.56.39.235:41284 VERIFY KU OK
1344Tue Oct 24 18:03:24 2017 us=337869 172.56.39.235:41284 Validating certificate extended key usage
1345Tue Oct 24 18:03:24 2017 us=337982 172.56.39.235:41284 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1346Tue Oct 24 18:03:24 2017 us=338082 172.56.39.235:41284 VERIFY EKU OK
1347Tue Oct 24 18:03:24 2017 us=338180 172.56.39.235:41284 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1348Tue Oct 24 18:03:24 2017 us=589165 172.56.39.235:41284 peer info: IV_VER=2.5_master
1349Tue Oct 24 18:03:24 2017 us=589270 172.56.39.235:41284 peer info: IV_PLAT=android
1350Tue Oct 24 18:03:24 2017 us=589312 172.56.39.235:41284 peer info: IV_PROTO=2
1351Tue Oct 24 18:03:24 2017 us=589352 172.56.39.235:41284 peer info: IV_LZ4=1
1352Tue Oct 24 18:03:24 2017 us=589392 172.56.39.235:41284 peer info: IV_LZ4v2=1
1353Tue Oct 24 18:03:24 2017 us=589433 172.56.39.235:41284 peer info: IV_LZO=1
1354Tue Oct 24 18:03:24 2017 us=589474 172.56.39.235:41284 peer info: IV_COMP_STUB=1
1355Tue Oct 24 18:03:24 2017 us=589516 172.56.39.235:41284 peer info: IV_COMP_STUBv2=1
1356Tue Oct 24 18:03:24 2017 us=589557 172.56.39.235:41284 peer info: IV_TCPNL=1
1357Tue Oct 24 18:03:24 2017 us=589599 172.56.39.235:41284 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1358Tue Oct 24 18:03:24 2017 us=589907 172.56.39.235:41284 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1359Tue Oct 24 18:03:24 2017 us=589962 172.56.39.235:41284 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1360Tue Oct 24 18:03:24 2017 us=671105 172.56.39.235:41284 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1361Tue Oct 24 18:03:24 2017 us=671258 172.56.39.235:41284 [phone] Peer Connection Initiated with [AF_INET]172.56.39.235:41284
1362Tue Oct 24 18:03:24 2017 us=671662 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1363Tue Oct 24 18:03:24 2017 us=671721 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1364Tue Oct 24 18:03:24 2017 us=671885 MULTI: Learn: 192.168.8.6 -> phone/172.56.39.235:41284
1365Tue Oct 24 18:03:24 2017 us=671941 MULTI: primary virtual IP for phone/172.56.39.235:41284: 192.168.8.6
1366Tue Oct 24 18:03:25 2017 us=800632 phone/172.56.39.235:41284 PUSH: Received control message: 'PUSH_REQUEST'
1367Tue Oct 24 18:03:25 2017 us=801077 phone/172.56.39.235:41284 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1)
1368Tue Oct 24 18:04:28 2017 us=312624 Float requested for peer 1 to 174.52.84.126:40916
1369Tue Oct 24 18:04:28 2017 us=312940 peer 1 (phone) floated from 172.56.39.235:41284 to [AF_INET]174.52.84.126:40916
1370Tue Oct 24 18:04:46 2017 us=681292 Float requested for peer 1 to 172.56.39.235:41284
1371Tue Oct 24 18:04:46 2017 us=681557 peer 1 (phone) floated from 174.52.84.126:40916 to [AF_INET]172.56.39.235:41284
1372Tue Oct 24 18:05:01 2017 us=25688 MULTI: multi_create_instance called
1373Tue Oct 24 18:05:01 2017 us=26032 172.56.39.235:45483 Re-using SSL/TLS context
1374Tue Oct 24 18:05:01 2017 us=26149 172.56.39.235:45483 LZ4 compression initializing
1375Tue Oct 24 18:05:01 2017 us=26617 172.56.39.235:45483 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1376Tue Oct 24 18:05:01 2017 us=26736 172.56.39.235:45483 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1377Tue Oct 24 18:05:01 2017 us=26968 172.56.39.235:45483 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1378Tue Oct 24 18:05:01 2017 us=27070 172.56.39.235:45483 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1379Tue Oct 24 18:05:01 2017 us=27283 172.56.39.235:45483 TLS: Initial packet from [AF_INET]172.56.39.235:45483, sid=08552430 7f7e56ac
1380Tue Oct 24 18:05:01 2017 us=895778 172.56.39.235:45483 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1381Tue Oct 24 18:05:01 2017 us=897205 172.56.39.235:45483 VERIFY KU OK
1382Tue Oct 24 18:05:01 2017 us=897310 172.56.39.235:45483 Validating certificate extended key usage
1383Tue Oct 24 18:05:01 2017 us=897386 172.56.39.235:45483 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1384Tue Oct 24 18:05:01 2017 us=897453 172.56.39.235:45483 VERIFY EKU OK
1385Tue Oct 24 18:05:01 2017 us=897519 172.56.39.235:45483 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1386Tue Oct 24 18:05:02 2017 us=33884 172.56.39.235:45483 peer info: IV_VER=2.5_master
1387Tue Oct 24 18:05:02 2017 us=34080 172.56.39.235:45483 peer info: IV_PLAT=android
1388Tue Oct 24 18:05:02 2017 us=34190 172.56.39.235:45483 peer info: IV_PROTO=2
1389Tue Oct 24 18:05:02 2017 us=34294 172.56.39.235:45483 peer info: IV_LZ4=1
1390Tue Oct 24 18:05:02 2017 us=34399 172.56.39.235:45483 peer info: IV_LZ4v2=1
1391Tue Oct 24 18:05:02 2017 us=34503 172.56.39.235:45483 peer info: IV_LZO=1
1392Tue Oct 24 18:05:02 2017 us=34606 172.56.39.235:45483 peer info: IV_COMP_STUB=1
1393Tue Oct 24 18:05:02 2017 us=34709 172.56.39.235:45483 peer info: IV_COMP_STUBv2=1
1394Tue Oct 24 18:05:02 2017 us=34812 172.56.39.235:45483 peer info: IV_TCPNL=1
1395Tue Oct 24 18:05:02 2017 us=34918 172.56.39.235:45483 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1396Tue Oct 24 18:05:02 2017 us=35660 172.56.39.235:45483 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1397Tue Oct 24 18:05:02 2017 us=35797 172.56.39.235:45483 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1398Tue Oct 24 18:05:02 2017 us=124443 172.56.39.235:45483 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1399Tue Oct 24 18:05:02 2017 us=124811 172.56.39.235:45483 [phone] Peer Connection Initiated with [AF_INET]172.56.39.235:45483
1400Tue Oct 24 18:05:02 2017 us=125796 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1401Tue Oct 24 18:05:02 2017 us=126050 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1402Tue Oct 24 18:05:02 2017 us=126399 MULTI: Learn: 192.168.8.6 -> phone/172.56.39.235:45483
1403Tue Oct 24 18:05:02 2017 us=126516 MULTI: primary virtual IP for phone/172.56.39.235:45483: 192.168.8.6
1404Tue Oct 24 18:05:03 2017 us=253866 phone/172.56.39.235:45483 PUSH: Received control message: 'PUSH_REQUEST'
1405Tue Oct 24 18:05:03 2017 us=254200 phone/172.56.39.235:45483 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1)
1406Tue Oct 24 18:08:33 2017 us=884238 Float requested for peer 0 to 192.168.1.1:37755
1407Tue Oct 24 18:08:33 2017 us=884531 peer 0 (phone) floated from 172.56.39.235:45483 to [AF_INET]192.168.1.1:37755
1408Tue Oct 24 18:08:33 2017 us=935647 Float requested for peer 0 to 172.56.39.235:45483
1409Tue Oct 24 18:08:33 2017 us=935965 PID_ERR replay-window backtrack occurred [2] [SSL-0] [00_EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:499 0:497 t=1508890113[0] r=[0,64,15,2,1] sl=[13,64,64,528]
1410Tue Oct 24 18:08:33 2017 us=936120 peer 0 (phone) floated from 192.168.1.1:37755 to [AF_INET]172.56.39.235:45483
1411Tue Oct 24 18:08:33 2017 us=972945 Float requested for peer 0 to 192.168.1.1:37755
1412Tue Oct 24 18:08:33 2017 us=973276 peer 0 (phone) floated from 172.56.39.235:45483 to [AF_INET]192.168.1.1:37755
1413Tue Oct 24 19:05:02 2017 us=926497 phone/192.168.1.1:37755 TLS: soft reset sec=0 bytes=913523/-1 pkts=3290/0
1414Tue Oct 24 19:05:08 2017 us=734214 phone/192.168.1.1:37755 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1415Tue Oct 24 19:05:08 2017 us=736222 phone/192.168.1.1:37755 VERIFY KU OK
1416Tue Oct 24 19:05:08 2017 us=736355 phone/192.168.1.1:37755 Validating certificate extended key usage
1417Tue Oct 24 19:05:08 2017 us=736464 phone/192.168.1.1:37755 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1418Tue Oct 24 19:05:08 2017 us=736561 phone/192.168.1.1:37755 VERIFY EKU OK
1419Tue Oct 24 19:05:08 2017 us=736658 phone/192.168.1.1:37755 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1420Tue Oct 24 19:05:08 2017 us=838652 phone/192.168.1.1:37755 peer info: IV_VER=2.5_master
1421Tue Oct 24 19:05:08 2017 us=838843 phone/192.168.1.1:37755 peer info: IV_PLAT=android
1422Tue Oct 24 19:05:08 2017 us=838957 phone/192.168.1.1:37755 peer info: IV_PROTO=2
1423Tue Oct 24 19:05:08 2017 us=839063 phone/192.168.1.1:37755 peer info: IV_LZ4=1
1424Tue Oct 24 19:05:08 2017 us=839167 phone/192.168.1.1:37755 peer info: IV_LZ4v2=1
1425Tue Oct 24 19:05:08 2017 us=839270 phone/192.168.1.1:37755 peer info: IV_LZO=1
1426Tue Oct 24 19:05:08 2017 us=839375 phone/192.168.1.1:37755 peer info: IV_COMP_STUB=1
1427Tue Oct 24 19:05:08 2017 us=839478 phone/192.168.1.1:37755 peer info: IV_COMP_STUBv2=1
1428Tue Oct 24 19:05:08 2017 us=839581 phone/192.168.1.1:37755 peer info: IV_TCPNL=1
1429Tue Oct 24 19:05:08 2017 us=839685 phone/192.168.1.1:37755 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1430Tue Oct 24 19:05:08 2017 us=840414 phone/192.168.1.1:37755 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1431Tue Oct 24 19:05:08 2017 us=840549 phone/192.168.1.1:37755 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1432Tue Oct 24 19:05:08 2017 us=845156 phone/192.168.1.1:37755 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1433Tue Oct 24 19:08:59 2017 us=605888 MULTI: multi_create_instance called
1434Tue Oct 24 19:08:59 2017 us=606247 192.168.1.1:40916 Re-using SSL/TLS context
1435Tue Oct 24 19:08:59 2017 us=606364 192.168.1.1:40916 LZ4 compression initializing
1436Tue Oct 24 19:08:59 2017 us=606826 192.168.1.1:40916 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1437Tue Oct 24 19:08:59 2017 us=606948 192.168.1.1:40916 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1438Tue Oct 24 19:08:59 2017 us=607188 192.168.1.1:40916 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1439Tue Oct 24 19:08:59 2017 us=607292 192.168.1.1:40916 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1440Tue Oct 24 19:08:59 2017 us=607579 192.168.1.1:40916 TLS: Initial packet from [AF_INET]192.168.1.1:40916, sid=bb5fce43 1702bb9a
1441Tue Oct 24 19:08:59 2017 us=940475 192.168.1.1:40916 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1442Tue Oct 24 19:08:59 2017 us=942490 192.168.1.1:40916 VERIFY KU OK
1443Tue Oct 24 19:08:59 2017 us=942628 192.168.1.1:40916 Validating certificate extended key usage
1444Tue Oct 24 19:08:59 2017 us=942734 192.168.1.1:40916 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1445Tue Oct 24 19:08:59 2017 us=942828 192.168.1.1:40916 VERIFY EKU OK
1446Tue Oct 24 19:08:59 2017 us=942920 192.168.1.1:40916 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1447Tue Oct 24 19:09:00 2017 us=47298 192.168.1.1:40916 peer info: IV_VER=2.5_master
1448Tue Oct 24 19:09:00 2017 us=47487 192.168.1.1:40916 peer info: IV_PLAT=android
1449Tue Oct 24 19:09:00 2017 us=47590 192.168.1.1:40916 peer info: IV_PROTO=2
1450Tue Oct 24 19:09:00 2017 us=47688 192.168.1.1:40916 peer info: IV_LZ4=1
1451Tue Oct 24 19:09:00 2017 us=47786 192.168.1.1:40916 peer info: IV_LZ4v2=1
1452Tue Oct 24 19:09:00 2017 us=47882 192.168.1.1:40916 peer info: IV_LZO=1
1453Tue Oct 24 19:09:00 2017 us=47981 192.168.1.1:40916 peer info: IV_COMP_STUB=1
1454Tue Oct 24 19:09:00 2017 us=48079 192.168.1.1:40916 peer info: IV_COMP_STUBv2=1
1455Tue Oct 24 19:09:00 2017 us=48177 192.168.1.1:40916 peer info: IV_TCPNL=1
1456Tue Oct 24 19:09:00 2017 us=48277 192.168.1.1:40916 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1457Tue Oct 24 19:09:00 2017 us=49087 192.168.1.1:40916 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1458Tue Oct 24 19:09:00 2017 us=49232 192.168.1.1:40916 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1459Tue Oct 24 19:09:00 2017 us=53766 192.168.1.1:40916 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1460Tue Oct 24 19:09:00 2017 us=53973 192.168.1.1:40916 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:40916
1461Tue Oct 24 19:09:00 2017 us=54939 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1462Tue Oct 24 19:09:00 2017 us=55051 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1463Tue Oct 24 19:09:00 2017 us=55339 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:40916
1464Tue Oct 24 19:09:00 2017 us=55439 MULTI: primary virtual IP for phone/192.168.1.1:40916: 192.168.8.6
1465Tue Oct 24 19:09:40 2017 us=55819 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1466Tue Oct 24 19:10:30 2017 us=667500 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1467Tue Oct 24 19:11:06 2017 us=289440 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1468Tue Oct 24 19:12:04 2017 us=52131 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1469Tue Oct 24 19:12:54 2017 us=57206 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1470Tue Oct 24 19:13:29 2017 us=196842 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1471Tue Oct 24 19:14:04 2017 us=942777 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1472Tue Oct 24 19:14:39 2017 us=553898 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1473Tue Oct 24 19:15:14 2017 us=180489 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1474Tue Oct 24 19:16:03 2017 us=701802 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1475Tue Oct 24 19:17:03 2017 us=870894 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1476Tue Oct 24 19:17:38 2017 us=910962 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1477Tue Oct 24 19:18:21 2017 us=268289 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1478Tue Oct 24 19:19:01 2017 us=601220 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1479Tue Oct 24 19:19:38 2017 us=161849 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1480Tue Oct 24 19:20:13 2017 us=839672 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1481Tue Oct 24 19:20:50 2017 us=162182 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1482Tue Oct 24 19:21:25 2017 us=871030 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1483Tue Oct 24 19:22:00 2017 us=696655 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1484Tue Oct 24 19:22:35 2017 us=683491 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1485Tue Oct 24 19:23:11 2017 us=16531 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1486Tue Oct 24 19:24:37 2017 us=681289 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1487Tue Oct 24 19:25:37 2017 us=281703 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1488Tue Oct 24 19:26:13 2017 us=331207 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1489Tue Oct 24 19:26:48 2017 us=834953 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1490Tue Oct 24 19:27:23 2017 us=741529 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1491Tue Oct 24 19:28:08 2017 us=113950 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1492Tue Oct 24 19:28:44 2017 us=57980 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1493Tue Oct 24 19:29:18 2017 us=398147 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1494Tue Oct 24 19:29:53 2017 us=404251 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1495Tue Oct 24 19:30:28 2017 us=307336 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1496Tue Oct 24 19:31:04 2017 us=147868 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1497Tue Oct 24 19:31:39 2017 us=841369 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1498Tue Oct 24 19:32:14 2017 us=422171 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1499Tue Oct 24 19:32:49 2017 us=451085 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1500Tue Oct 24 19:33:24 2017 us=984363 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1501Tue Oct 24 19:33:59 2017 us=900342 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1502Tue Oct 24 19:34:35 2017 us=262151 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1503Tue Oct 24 19:35:11 2017 us=415026 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1504Tue Oct 24 19:35:59 2017 us=591967 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1505Tue Oct 24 19:36:34 2017 us=664801 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1506Tue Oct 24 19:37:12 2017 us=385316 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1507Tue Oct 24 19:37:48 2017 us=690993 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1508Tue Oct 24 19:38:47 2017 us=81065 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1509Tue Oct 24 19:39:26 2017 us=427716 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1510Tue Oct 24 19:40:02 2017 us=40050 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1511Tue Oct 24 19:40:37 2017 us=382579 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1512Tue Oct 24 19:41:37 2017 us=900026 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1513Tue Oct 24 19:42:38 2017 us=433168 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1514Tue Oct 24 19:43:38 2017 us=305468 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1515Tue Oct 24 19:44:37 2017 us=626170 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1516Tue Oct 24 19:45:12 2017 us=208107 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1517Tue Oct 24 19:45:54 2017 us=434331 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1518Tue Oct 24 19:46:30 2017 us=328444 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1519Tue Oct 24 19:47:31 2017 us=196110 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1520Tue Oct 24 19:48:06 2017 us=762390 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1521Tue Oct 24 19:49:01 2017 us=533856 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1522Tue Oct 24 19:50:25 2017 us=798723 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1523Tue Oct 24 19:51:00 2017 us=266778 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1524Tue Oct 24 19:51:49 2017 us=13403 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1525Tue Oct 24 19:52:23 2017 us=245900 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1526Tue Oct 24 19:53:02 2017 us=361988 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1527Tue Oct 24 19:53:37 2017 us=930457 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1528Tue Oct 24 19:54:21 2017 us=118790 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1529Tue Oct 24 19:55:03 2017 us=449525 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1530Tue Oct 24 19:56:03 2017 us=93290 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1531Tue Oct 24 19:56:37 2017 us=361914 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1532Tue Oct 24 19:57:35 2017 us=165028 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1533Tue Oct 24 19:58:30 2017 us=264780 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1534Tue Oct 24 19:59:05 2017 us=522177 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1535Tue Oct 24 20:00:05 2017 us=386113 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1536Tue Oct 24 20:00:41 2017 us=94358 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1537Tue Oct 24 20:01:15 2017 us=749637 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1538Tue Oct 24 20:01:50 2017 us=945080 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1539Tue Oct 24 20:02:25 2017 us=764109 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1540Tue Oct 24 20:03:01 2017 us=82871 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1541Tue Oct 24 20:03:36 2017 us=738926 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1542Tue Oct 24 20:04:11 2017 us=825486 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1543Tue Oct 24 20:04:46 2017 us=934210 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed
1544Tue Oct 24 20:06:23 2017 us=192096 MULTI: multi_create_instance called
1545Tue Oct 24 20:06:23 2017 us=192444 192.168.1.1:37755 Re-using SSL/TLS context
1546Tue Oct 24 20:06:23 2017 us=192568 192.168.1.1:37755 LZ4 compression initializing
1547Tue Oct 24 20:06:23 2017 us=193167 192.168.1.1:37755 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1548Tue Oct 24 20:06:23 2017 us=193339 192.168.1.1:37755 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1549Tue Oct 24 20:06:23 2017 us=193583 192.168.1.1:37755 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1550Tue Oct 24 20:06:23 2017 us=193693 192.168.1.1:37755 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1551Tue Oct 24 20:06:23 2017 us=193993 192.168.1.1:37755 TLS: Initial packet from [AF_INET]192.168.1.1:37755, sid=153d4e02 8016bd8f
1552Tue Oct 24 20:06:23 2017 us=632340 192.168.1.1:37755 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1553Tue Oct 24 20:06:23 2017 us=633794 192.168.1.1:37755 VERIFY KU OK
1554Tue Oct 24 20:06:23 2017 us=633905 192.168.1.1:37755 Validating certificate extended key usage
1555Tue Oct 24 20:06:23 2017 us=633973 192.168.1.1:37755 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1556Tue Oct 24 20:06:23 2017 us=634032 192.168.1.1:37755 VERIFY EKU OK
1557Tue Oct 24 20:06:23 2017 us=634091 192.168.1.1:37755 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1558Tue Oct 24 20:06:23 2017 us=693470 192.168.1.1:37755 peer info: IV_VER=2.5_master
1559Tue Oct 24 20:06:23 2017 us=693572 192.168.1.1:37755 peer info: IV_PLAT=android
1560Tue Oct 24 20:06:23 2017 us=693607 192.168.1.1:37755 peer info: IV_PROTO=2
1561Tue Oct 24 20:06:23 2017 us=693642 192.168.1.1:37755 peer info: IV_LZ4=1
1562Tue Oct 24 20:06:23 2017 us=693676 192.168.1.1:37755 peer info: IV_LZ4v2=1
1563Tue Oct 24 20:06:23 2017 us=693711 192.168.1.1:37755 peer info: IV_LZO=1
1564Tue Oct 24 20:06:23 2017 us=693745 192.168.1.1:37755 peer info: IV_COMP_STUB=1
1565Tue Oct 24 20:06:23 2017 us=693778 192.168.1.1:37755 peer info: IV_COMP_STUBv2=1
1566Tue Oct 24 20:06:23 2017 us=693812 192.168.1.1:37755 peer info: IV_TCPNL=1
1567Tue Oct 24 20:06:23 2017 us=693846 192.168.1.1:37755 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1568Tue Oct 24 20:06:23 2017 us=694111 192.168.1.1:37755 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1569Tue Oct 24 20:06:23 2017 us=694161 192.168.1.1:37755 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1570Tue Oct 24 20:06:23 2017 us=697659 192.168.1.1:37755 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1571Tue Oct 24 20:06:23 2017 us=697816 192.168.1.1:37755 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:37755
1572Tue Oct 24 20:06:23 2017 us=698193 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1573Tue Oct 24 20:06:23 2017 us=698242 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1574Tue Oct 24 20:06:23 2017 us=698373 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:37755
1575Tue Oct 24 20:06:23 2017 us=698417 MULTI: primary virtual IP for phone/192.168.1.1:37755: 192.168.8.6
1576Tue Oct 24 20:06:24 2017 us=132340 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1577Tue Oct 24 20:06:58 2017 us=757653 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1578Tue Oct 24 20:07:00 2017 us=346728 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1579Tue Oct 24 20:07:07 2017 us=899901 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1580Tue Oct 24 20:07:07 2017 us=900183 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1581Tue Oct 24 20:07:07 2017 us=900344 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1582Tue Oct 24 20:07:09 2017 us=726446 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1583Tue Oct 24 20:07:09 2017 us=757800 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1584Tue Oct 24 20:07:14 2017 us=220281 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1585Tue Oct 24 20:07:14 2017 us=737199 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1586Tue Oct 24 20:07:14 2017 us=760467 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1587Tue Oct 24 20:07:19 2017 us=753896 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1588Tue Oct 24 20:07:19 2017 us=764635 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1589Tue Oct 24 20:07:54 2017 us=468329 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1590Tue Oct 24 20:07:56 2017 us=616110 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1591Tue Oct 24 20:07:58 2017 us=355367 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1592Tue Oct 24 20:08:01 2017 us=421843 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1593Tue Oct 24 20:08:08 2017 us=85346 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1594Tue Oct 24 20:08:20 2017 us=98108 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1595Tue Oct 24 20:08:20 2017 us=124704 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1596Tue Oct 24 20:08:20 2017 us=290596 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1597Tue Oct 24 20:08:20 2017 us=485488 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1598Tue Oct 24 20:08:20 2017 us=493642 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1599Tue Oct 24 20:08:25 2017 us=101136 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1600Tue Oct 24 20:08:25 2017 us=129669 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1601Tue Oct 24 20:08:25 2017 us=295884 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1602Tue Oct 24 20:08:25 2017 us=487804 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1603Tue Oct 24 20:08:25 2017 us=498469 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1604Tue Oct 24 20:08:30 2017 us=111595 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1605Tue Oct 24 20:08:30 2017 us=111837 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1606Tue Oct 24 20:08:30 2017 us=111980 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1607Tue Oct 24 20:08:30 2017 us=147860 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1608Tue Oct 24 20:08:30 2017 us=148073 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1609Tue Oct 24 20:08:30 2017 us=299933 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1610Tue Oct 24 20:08:30 2017 us=494252 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1611Tue Oct 24 20:08:30 2017 us=494450 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1612Tue Oct 24 20:08:30 2017 us=500641 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1613Tue Oct 24 20:08:35 2017 us=582486 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1614Tue Oct 24 20:08:35 2017 us=582987 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1615Tue Oct 24 20:08:35 2017 us=583058 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1616Tue Oct 24 20:08:35 2017 us=583122 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1617Tue Oct 24 20:08:35 2017 us=583180 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1618Tue Oct 24 20:08:35 2017 us=583252 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1619Tue Oct 24 20:08:35 2017 us=583360 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1620Tue Oct 24 20:08:35 2017 us=583428 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1621Tue Oct 24 20:08:35 2017 us=583494 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1622Tue Oct 24 20:08:40 2017 us=125228 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1623Tue Oct 24 20:08:40 2017 us=125486 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1624Tue Oct 24 20:08:40 2017 us=125626 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1625Tue Oct 24 20:08:40 2017 us=145806 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1626Tue Oct 24 20:08:40 2017 us=306001 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1627Tue Oct 24 20:08:40 2017 us=502432 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1628Tue Oct 24 20:08:40 2017 us=502626 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1629Tue Oct 24 20:08:45 2017 us=126495 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1630Tue Oct 24 20:08:45 2017 us=126703 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1631Tue Oct 24 20:08:45 2017 us=126822 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1632Tue Oct 24 20:08:45 2017 us=153798 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1633Tue Oct 24 20:08:45 2017 us=309521 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1634Tue Oct 24 20:08:45 2017 us=505607 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1635Tue Oct 24 20:08:45 2017 us=505829 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1636Tue Oct 24 20:08:50 2017 us=141444 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1637Tue Oct 24 20:08:50 2017 us=312710 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1638Tue Oct 24 20:08:50 2017 us=322982 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1639Tue Oct 24 20:08:50 2017 us=469974 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1640Tue Oct 24 20:08:50 2017 us=503407 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1641Tue Oct 24 20:08:55 2017 us=134357 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1642Tue Oct 24 20:08:55 2017 us=315842 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1643Tue Oct 24 20:08:55 2017 us=325832 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1644Tue Oct 24 20:08:55 2017 us=514521 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1645Tue Oct 24 20:09:00 2017 us=332044 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1646Tue Oct 24 20:09:00 2017 us=333313 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1647Tue Oct 24 20:09:05 2017 us=351318 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1648Tue Oct 24 20:09:05 2017 us=351455 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1649Tue Oct 24 20:09:10 2017 us=360743 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1650Tue Oct 24 20:09:10 2017 us=360963 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1651Tue Oct 24 20:09:15 2017 us=359721 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1652Tue Oct 24 20:09:15 2017 us=360445 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1653Tue Oct 24 20:09:17 2017 us=297138 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1654Tue Oct 24 20:09:17 2017 us=360134 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1655Tue Oct 24 20:09:20 2017 us=368843 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1656Tue Oct 24 20:09:22 2017 us=297377 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1657Tue Oct 24 20:09:22 2017 us=363904 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1658Tue Oct 24 20:09:25 2017 us=372225 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1659Tue Oct 24 20:09:27 2017 us=306654 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1660Tue Oct 24 20:09:27 2017 us=370099 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1661Tue Oct 24 20:09:32 2017 us=309841 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1662Tue Oct 24 20:09:32 2017 us=372436 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1663Tue Oct 24 20:09:37 2017 us=435310 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1664Tue Oct 24 20:09:42 2017 us=444614 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1665Tue Oct 24 20:09:47 2017 us=449965 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1666Tue Oct 24 20:09:52 2017 us=456942 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1667Tue Oct 24 20:10:02 2017 us=297102 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1668Tue Oct 24 20:10:07 2017 us=85391 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1669Tue Oct 24 20:10:09 2017 us=653241 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1670Tue Oct 24 20:10:14 2017 us=666941 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1]
1671Tue Oct 24 20:10:14 2017 us=857248 MULTI: multi_create_instance called
1672Tue Oct 24 20:10:14 2017 us=857518 192.168.1.1:40916 Re-using SSL/TLS context
1673Tue Oct 24 20:10:14 2017 us=857613 192.168.1.1:40916 LZ4 compression initializing
1674Tue Oct 24 20:10:14 2017 us=857990 192.168.1.1:40916 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1675Tue Oct 24 20:10:14 2017 us=858089 192.168.1.1:40916 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1676Tue Oct 24 20:10:14 2017 us=858277 192.168.1.1:40916 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1677Tue Oct 24 20:10:14 2017 us=858414 192.168.1.1:40916 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1678Tue Oct 24 20:10:14 2017 us=858581 192.168.1.1:40916 TLS: Initial packet from [AF_INET]192.168.1.1:40916, sid=632f2c7a a9b05198
1679Tue Oct 24 20:10:15 2017 us=206144 192.168.1.1:40916 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1680Tue Oct 24 20:10:15 2017 us=207346 192.168.1.1:40916 VERIFY KU OK
1681Tue Oct 24 20:10:15 2017 us=207423 192.168.1.1:40916 Validating certificate extended key usage
1682Tue Oct 24 20:10:15 2017 us=207485 192.168.1.1:40916 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1683Tue Oct 24 20:10:15 2017 us=207541 192.168.1.1:40916 VERIFY EKU OK
1684Tue Oct 24 20:10:15 2017 us=207596 192.168.1.1:40916 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1685Tue Oct 24 20:10:15 2017 us=263151 192.168.1.1:40916 peer info: IV_VER=2.5_master
1686Tue Oct 24 20:10:15 2017 us=263253 192.168.1.1:40916 peer info: IV_PLAT=android
1687Tue Oct 24 20:10:15 2017 us=263297 192.168.1.1:40916 peer info: IV_PROTO=2
1688Tue Oct 24 20:10:15 2017 us=263338 192.168.1.1:40916 peer info: IV_LZ4=1
1689Tue Oct 24 20:10:15 2017 us=263380 192.168.1.1:40916 peer info: IV_LZ4v2=1
1690Tue Oct 24 20:10:15 2017 us=263422 192.168.1.1:40916 peer info: IV_LZO=1
1691Tue Oct 24 20:10:15 2017 us=263464 192.168.1.1:40916 peer info: IV_COMP_STUB=1
1692Tue Oct 24 20:10:15 2017 us=263506 192.168.1.1:40916 peer info: IV_COMP_STUBv2=1
1693Tue Oct 24 20:10:15 2017 us=263548 192.168.1.1:40916 peer info: IV_TCPNL=1
1694Tue Oct 24 20:10:15 2017 us=263591 192.168.1.1:40916 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1695Tue Oct 24 20:10:15 2017 us=263912 192.168.1.1:40916 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1696Tue Oct 24 20:10:15 2017 us=263966 192.168.1.1:40916 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1697Tue Oct 24 20:10:15 2017 us=266953 192.168.1.1:40916 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1698Tue Oct 24 20:10:15 2017 us=267044 192.168.1.1:40916 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:40916
1699Tue Oct 24 20:10:15 2017 us=267384 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1700Tue Oct 24 20:10:15 2017 us=267436 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1701Tue Oct 24 20:10:15 2017 us=267582 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:40916
1702Tue Oct 24 20:10:15 2017 us=267631 MULTI: primary virtual IP for phone/192.168.1.1:40916: 192.168.8.6
1703Tue Oct 24 20:18:23 2017 us=898496 MULTI: multi_create_instance called
1704Tue Oct 24 20:18:23 2017 us=898641 192.168.1.1:37798 Re-using SSL/TLS context
1705Tue Oct 24 20:18:23 2017 us=898679 192.168.1.1:37798 LZ4 compression initializing
1706Tue Oct 24 20:18:23 2017 us=898853 192.168.1.1:37798 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ]
1707Tue Oct 24 20:18:23 2017 us=898887 192.168.1.1:37798 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
1708Tue Oct 24 20:18:23 2017 us=898962 192.168.1.1:37798 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
1709Tue Oct 24 20:18:23 2017 us=898992 192.168.1.1:37798 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
1710Tue Oct 24 20:18:23 2017 us=899061 192.168.1.1:37798 TLS: Initial packet from [AF_INET]192.168.1.1:37798, sid=e0e7233b 63e2d0ce
1711Tue Oct 24 20:18:24 2017 us=147078 192.168.1.1:37798 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home
1712Tue Oct 24 20:18:24 2017 us=148050 192.168.1.1:37798 VERIFY KU OK
1713Tue Oct 24 20:18:24 2017 us=148108 192.168.1.1:37798 Validating certificate extended key usage
1714Tue Oct 24 20:18:24 2017 us=148157 192.168.1.1:37798 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
1715Tue Oct 24 20:18:24 2017 us=148200 192.168.1.1:37798 VERIFY EKU OK
1716Tue Oct 24 20:18:24 2017 us=148242 192.168.1.1:37798 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home
1717Tue Oct 24 20:18:24 2017 us=193150 192.168.1.1:37798 peer info: IV_VER=2.5_master
1718Tue Oct 24 20:18:24 2017 us=193252 192.168.1.1:37798 peer info: IV_PLAT=android
1719Tue Oct 24 20:18:24 2017 us=193292 192.168.1.1:37798 peer info: IV_PROTO=2
1720Tue Oct 24 20:18:24 2017 us=193329 192.168.1.1:37798 peer info: IV_LZ4=1
1721Tue Oct 24 20:18:24 2017 us=193367 192.168.1.1:37798 peer info: IV_LZ4v2=1
1722Tue Oct 24 20:18:24 2017 us=193405 192.168.1.1:37798 peer info: IV_LZO=1
1723Tue Oct 24 20:18:24 2017 us=193443 192.168.1.1:37798 peer info: IV_COMP_STUB=1
1724Tue Oct 24 20:18:24 2017 us=193480 192.168.1.1:37798 peer info: IV_COMP_STUBv2=1
1725Tue Oct 24 20:18:24 2017 us=193518 192.168.1.1:37798 peer info: IV_TCPNL=1
1726Tue Oct 24 20:18:24 2017 us=193557 192.168.1.1:37798 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73
1727Tue Oct 24 20:18:24 2017 us=193863 192.168.1.1:37798 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1728Tue Oct 24 20:18:24 2017 us=193920 192.168.1.1:37798 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
1729Tue Oct 24 20:18:24 2017 us=196837 192.168.1.1:37798 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
1730Tue Oct 24 20:18:24 2017 us=196932 192.168.1.1:37798 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:37798
1731Tue Oct 24 20:18:24 2017 us=197292 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped.  Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
1732Tue Oct 24 20:18:24 2017 us=197341 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled)
1733Tue Oct 24 20:18:24 2017 us=197461 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:37798
1734Tue Oct 24 20:18:24 2017 us=197501 MULTI: primary virtual IP for phone/192.168.1.1:37798: 192.168.8.6
1735Tue Oct 24 20:18:25 2017 us=386543 phone/192.168.1.1:37798 PUSH: Received control message: 'PUSH_REQUEST'
1736Tue Oct 24 20:18:25 2017 us=386794 phone/192.168.1.1:37798 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1)
1737Tue Oct 24 20:20:09 2017 us=376465 event_wait : Interrupted system call (code=4)
1738Tue Oct 24 20:20:09 2017 us=381659 TCP/UDP: Closing socket
1739Tue Oct 24 20:20:09 2017 us=381954 /sbin/ip route del 192.168.8.0/24
1740Tue Oct 24 20:20:09 2017 us=386647 Closing TUN/TAP interface
1741Tue Oct 24 20:20:09 2017 us=386850 /sbin/ip addr del dev tun0 local 192.168.8.1 peer 192.168.8.2
1742Tue Oct 24 20:20:09 2017 us=429176 SIGINT[hard,] received, process exiting