Ticket #990: explicit-exit-notify-log.txt

File explicit-exit-notify-log.txt, 7.0 KB (added by deepsweet, 6 years ago)

explicit-exit-notify

Line 
12018-01-21 22:12:58 OS Event: WAKEUP
22018-01-21 22:13:01 RESUME TEST: Internet:ReachableViaWiFi/-R t------
32018-01-21 22:13:01 STANDARD RESUME
42018-01-21 22:13:01 EVENT: RESUME
52018-01-21 22:13:01 EVENT: RECONNECTING
62018-01-21 22:13:01 Contacting [1.2.3.4]:443/UDP via UDP
72018-01-21 22:13:01 EVENT: WAIT
82018-01-21 22:13:01 Connecting to [some.vpn.server]:443 (1.2.3.4) via UDPv4
92018-01-21 22:13:01 EVENT: CONNECTING
102018-01-21 22:13:01 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client
112018-01-21 22:13:01 Creds: Username/Password
122018-01-21 22:13:01 Peer Info:
13IV_GUI_VER=net.openvpn.connect.ios 1.2.6-4
14IV_VER=3.1.2
15IV_PLAT=ios
16IV_IPv6=0
17IV_AUTO_SESS=1
18
192018-01-21 22:13:01 VERIFY OK : depth=0
20cert. version     : 3
21serial number     : 00
22issuer name       : CN=some.vpn.server
23subject name      : CN=some.vpn.server
24issued  on        : 2015-10-06 12:15:26
25expires on        : 2025-10-03 12:15:26
26signed using      : RSA with SHA-256
27RSA key size      : 2048 bits
28basic constraints : CA=true
29key usage         : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign
30ext key usage     : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing
31
322018-01-21 22:13:01 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
332018-01-21 22:13:01 Session is ACTIVE
342018-01-21 22:13:01 EVENT: GET_CONFIG
352018-01-21 22:13:01 Sending PUSH_REQUEST to server...
362018-01-21 22:13:01 OS Event: SLEEP
372018-01-21 22:13:01 EVENT: PAUSE
382018-01-21 22:13:02 OS Event: WAKEUP
392018-01-21 22:13:05 RESUME TEST: Internet:ReachableViaWiFi/-R t------
402018-01-21 22:13:05 STANDARD RESUME
412018-01-21 22:13:05 EVENT: RESUME
422018-01-21 22:13:05 EVENT: RECONNECTING
432018-01-21 22:13:05 Contacting [185.117.88.9]:443/UDP via UDP
442018-01-21 22:13:05 EVENT: WAIT
452018-01-21 22:13:05 Connecting to [some.vpn.server]:443 (185.117.88.9) via UDPv4
462018-01-21 22:13:05 EVENT: CONNECTING
472018-01-21 22:13:05 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client
482018-01-21 22:13:05 Creds: Username/Password
492018-01-21 22:13:05 Peer Info:
50IV_GUI_VER=net.openvpn.connect.ios 1.2.6-4
51IV_VER=3.1.2
52IV_PLAT=ios
53IV_IPv6=0
54IV_AUTO_SESS=1
55
562018-01-21 22:13:05 VERIFY OK : depth=0
57cert. version     : 3
58serial number     : 00
59issuer name       : CN=some.vpn.server
60subject name      : CN=some.vpn.server
61issued  on        : 2015-10-06 12:15:26
62expires on        : 2025-10-03 12:15:26
63signed using      : RSA with SHA-256
64RSA key size      : 2048 bits
65basic constraints : CA=true
66key usage         : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign
67ext key usage     : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing
68
692018-01-21 22:13:05 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
702018-01-21 22:13:05 Session is ACTIVE
712018-01-21 22:13:05 EVENT: GET_CONFIG
722018-01-21 22:13:05 Sending PUSH_REQUEST to server...
732018-01-21 22:13:05 OS Event: SLEEP
742018-01-21 22:13:05 EVENT: PAUSE
752018-01-21 22:13:06 OS Event: WAKEUP
762018-01-21 22:13:09 RESUME TEST: Internet:ReachableViaWiFi/-R t------
772018-01-21 22:13:09 STANDARD RESUME
782018-01-21 22:13:09 EVENT: RESUME
792018-01-21 22:13:09 EVENT: RECONNECTING
802018-01-21 22:13:09 Contacting [1.2.3.4]:443/UDP via UDP
812018-01-21 22:13:09 EVENT: WAIT
822018-01-21 22:13:09 Connecting to [some.vpn.server]:443 (1.2.3.4) via UDPv4
832018-01-21 22:13:09 EVENT: CONNECTING
842018-01-21 22:13:09 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client
852018-01-21 22:13:09 Creds: Username/Password
862018-01-21 22:13:09 Peer Info:
87IV_GUI_VER=net.openvpn.connect.ios 1.2.6-4
88IV_VER=3.1.2
89IV_PLAT=ios
90IV_IPv6=0
91IV_AUTO_SESS=1
92
932018-01-21 22:13:09 VERIFY OK : depth=0
94cert. version     : 3
95serial number     : 00
96issuer name       : CN=some.vpn.server
97subject name      : CN=some.vpn.server
98issued  on        : 2015-10-06 12:15:26
99expires on        : 2025-10-03 12:15:26
100signed using      : RSA with SHA-256
101RSA key size      : 2048 bits
102basic constraints : CA=true
103key usage         : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign
104ext key usage     : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing
105
1062018-01-21 22:13:09 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
1072018-01-21 22:13:09 Session is ACTIVE
1082018-01-21 22:13:09 EVENT: GET_CONFIG
1092018-01-21 22:13:09 Sending PUSH_REQUEST to server...
1102018-01-21 22:13:09 OS Event: SLEEP
1112018-01-21 22:13:09 EVENT: PAUSE
1122018-01-21 22:13:10 OS Event: WAKEUP
1132018-01-21 22:13:13 RESUME TEST: Internet:ReachableViaWiFi/-R t------
1142018-01-21 22:13:13 STANDARD RESUME
1152018-01-21 22:13:13 EVENT: RESUME
1162018-01-21 22:13:13 EVENT: RECONNECTING
1172018-01-21 22:13:13 Contacting [185.117.88.9]:443/UDP via UDP
1182018-01-21 22:13:13 EVENT: WAIT
1192018-01-21 22:13:13 Connecting to [some.vpn.server]:443 (185.117.88.9) via UDPv4
1202018-01-21 22:13:13 EVENT: CONNECTING
1212018-01-21 22:13:13 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client
1222018-01-21 22:13:13 Creds: Username/Password
1232018-01-21 22:13:13 Peer Info:
124IV_GUI_VER=net.openvpn.connect.ios 1.2.6-4
125IV_VER=3.1.2
126IV_PLAT=ios
127IV_IPv6=0
128IV_AUTO_SESS=1
129
1302018-01-21 22:13:13 VERIFY OK : depth=0
131cert. version     : 3
132serial number     : 00
133issuer name       : CN=some.vpn.server
134subject name      : CN=some.vpn.server
135issued  on        : 2015-10-06 12:15:26
136expires on        : 2025-10-03 12:15:26
137signed using      : RSA with SHA-256
138RSA key size      : 2048 bits
139basic constraints : CA=true
140key usage         : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign
141ext key usage     : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing
142
1432018-01-21 22:13:13 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
1442018-01-21 22:13:13 Session is ACTIVE
1452018-01-21 22:13:13 EVENT: GET_CONFIG
1462018-01-21 22:13:13 Sending PUSH_REQUEST to server...
1472018-01-21 22:13:13 AUTH_FAILED
1482018-01-21 22:13:13 EVENT: AUTH_FAILED [ERR]
1492018-01-21 22:13:13 EVENT: DISCONNECTED
1502018-01-21 22:13:13 OS Event: SLEEP
1512018-01-21 22:13:13 Raw stats on disconnect:
152  BYTES_IN : 143427
153  BYTES_OUT : 39337
154  PACKETS_IN : 324
155  PACKETS_OUT : 258
156  TUN_BYTES_IN : 8738
157  TUN_BYTES_OUT : 78468
158  TUN_PACKETS_IN : 69
159  TUN_PACKETS_OUT : 148
160  AUTH_FAILED : 1
161  N_PAUSE : 24
162  N_RECONNECT : 24
1632018-01-21 22:13:13 Performance stats on disconnect:
164  CPU usage (microseconds): 2359563
165  Tunnel compression ratio (uplink): 4.50183
166  Tunnel compression ratio (downlink): 1.82784
167  Network bytes per CPU second: 77456
168  Tunnel bytes per CPU second: 36958