2020-08-17 17:04:09 Consider setting groups/curves preference with tls-groups instead of forcing a specific curve with ecdh-curve. 2020-08-17 17:04:09 us=36670 Current Parameter Settings: 2020-08-17 17:04:09 us=36689 config = '/etc/openvpn/tuns_55111u_s3_cpf.conf' 2020-08-17 17:04:09 us=36701 mode = 1 2020-08-17 17:04:09 us=36713 persist_config = DISABLED 2020-08-17 17:04:09 us=36725 persist_mode = 1 2020-08-17 17:04:09 us=36736 show_ciphers = DISABLED 2020-08-17 17:04:09 us=36747 show_digests = DISABLED 2020-08-17 17:04:09 us=36758 show_engines = DISABLED 2020-08-17 17:04:09 us=36769 genkey = DISABLED 2020-08-17 17:04:09 us=36780 genkey_filename = '[UNDEF]' 2020-08-17 17:04:09 us=36792 key_pass_file = '[UNDEF]' 2020-08-17 17:04:09 us=36803 show_tls_ciphers = DISABLED 2020-08-17 17:04:09 us=36814 connect_retry_max = 0 2020-08-17 17:04:09 us=36825 Connection profiles [0]: 2020-08-17 17:04:09 us=36837 proto = udp 2020-08-17 17:04:09 us=36849 local = '10.10.201.226' 2020-08-17 17:04:09 us=36860 local_port = '55111' 2020-08-17 17:04:09 us=36872 remote = '[UNDEF]' 2020-08-17 17:04:09 us=36883 remote_port = '55111' 2020-08-17 17:04:09 us=36894 remote_float = DISABLED 2020-08-17 17:04:09 us=36905 bind_defined = DISABLED 2020-08-17 17:04:09 us=36916 bind_local = ENABLED 2020-08-17 17:04:09 us=36927 bind_ipv6_only = DISABLED 2020-08-17 17:04:09 us=36939 connect_retry_seconds = 5 2020-08-17 17:04:09 us=36950 connect_timeout = 120 2020-08-17 17:04:09 us=36961 socks_proxy_server = '[UNDEF]' 2020-08-17 17:04:09 us=36973 socks_proxy_port = '[UNDEF]' 2020-08-17 17:04:09 us=36984 tun_mtu = 1500 2020-08-17 17:04:09 us=36995 tun_mtu_defined = ENABLED 2020-08-17 17:04:09 us=37006 link_mtu = 1500 2020-08-17 17:04:09 us=37018 link_mtu_defined = DISABLED 2020-08-17 17:04:09 us=37029 tun_mtu_extra = 0 2020-08-17 17:04:09 us=37041 tun_mtu_extra_defined = DISABLED 2020-08-17 17:04:09 us=37052 mtu_discover_type = -1 2020-08-17 17:04:09 us=37063 fragment = 1300 2020-08-17 17:04:09 us=37075 mssfix = 1300 2020-08-17 17:04:09 us=37086 explicit_exit_notification = 2 2020-08-17 17:04:09 us=37098 tls_auth_file = '[INLINE]' 2020-08-17 17:04:09 us=37109 key_direction = 0 2020-08-17 17:04:09 us=37120 tls_crypt_file = '[UNDEF]' 2020-08-17 17:04:09 us=37131 tls_crypt_v2_file = '/root/easyrsa3/ec_bpool/tlscv2-s-55111.key' 2020-08-17 17:04:09 us=37143 Connection profiles END 2020-08-17 17:04:09 us=37154 remote_random = DISABLED 2020-08-17 17:04:09 us=37165 ipchange = '[UNDEF]' 2020-08-17 17:04:09 us=37176 dev = 'tuns55111' 2020-08-17 17:04:09 us=37188 dev_type = '[UNDEF]' 2020-08-17 17:04:09 us=37199 dev_node = '[UNDEF]' 2020-08-17 17:04:09 us=37210 lladdr = '[UNDEF]' 2020-08-17 17:04:09 us=37222 topology = 3 2020-08-17 17:04:09 us=37233 ifconfig_local = '10.55.111.1' 2020-08-17 17:04:09 us=37244 ifconfig_remote_netmask = '255.255.255.0' 2020-08-17 17:04:09 us=37256 ifconfig_noexec = DISABLED 2020-08-17 17:04:09 us=37267 ifconfig_nowarn = DISABLED 2020-08-17 17:04:09 us=37278 ifconfig_ipv6_local = '12fc:1918::10:55:111:1' 2020-08-17 17:04:09 us=37289 ifconfig_ipv6_netbits = 112 2020-08-17 17:04:09 us=37301 ifconfig_ipv6_remote = '12fc:1918::10:55:111:2' 2020-08-17 17:04:09 us=37312 shaper = 0 2020-08-17 17:04:09 us=37323 mtu_test = 0 2020-08-17 17:04:09 us=37334 mlock = DISABLED 2020-08-17 17:04:09 us=37346 keepalive_ping = 10 2020-08-17 17:04:09 us=37357 keepalive_timeout = 30 2020-08-17 17:04:09 us=37368 inactivity_timeout = 0 2020-08-17 17:04:09 us=37379 ping_send_timeout = 10 2020-08-17 17:04:09 us=37391 ping_rec_timeout = 60 2020-08-17 17:04:09 us=37402 ping_rec_timeout_action = 2 2020-08-17 17:04:09 us=37413 ping_timer_remote = ENABLED 2020-08-17 17:04:09 us=37425 remap_sigusr1 = 0 2020-08-17 17:04:09 us=37436 persist_tun = ENABLED 2020-08-17 17:04:09 us=37447 persist_local_ip = DISABLED 2020-08-17 17:04:09 us=37458 persist_remote_ip = DISABLED 2020-08-17 17:04:09 us=37469 persist_key = ENABLED 2020-08-17 17:04:09 us=37480 passtos = DISABLED 2020-08-17 17:04:09 us=37529 resolve_retry_seconds = 1000000000 2020-08-17 17:04:09 us=37543 resolve_in_advance = DISABLED 2020-08-17 17:04:09 us=37554 username = '[UNDEF]' 2020-08-17 17:04:09 us=37565 groupname = '[UNDEF]' 2020-08-17 17:04:09 us=37576 chroot_dir = '[UNDEF]' 2020-08-17 17:04:09 us=37588 cd_dir = '/etc/openvpn' 2020-08-17 17:04:09 us=37599 writepid = '/run/mymast_openvpn@tuns_55111u_s3_cpf.pid' 2020-08-17 17:04:09 us=37610 up_script = '[UNDEF]' 2020-08-17 17:04:09 us=37621 down_script = '[UNDEF]' 2020-08-17 17:04:09 us=37632 down_pre = DISABLED 2020-08-17 17:04:09 us=37644 up_restart = DISABLED 2020-08-17 17:04:09 us=37654 up_delay = DISABLED 2020-08-17 17:04:09 us=37666 daemon = ENABLED 2020-08-17 17:04:09 us=37677 inetd = 0 2020-08-17 17:04:09 us=37688 log = ENABLED 2020-08-17 17:04:09 us=37700 suppress_timestamps = DISABLED 2020-08-17 17:04:09 us=37711 machine_readable_output = DISABLED 2020-08-17 17:04:09 us=37722 nice = 0 2020-08-17 17:04:09 us=37733 verbosity = 4 2020-08-17 17:04:09 us=37745 mute = 0 2020-08-17 17:04:09 us=37756 gremlin = 0 2020-08-17 17:04:09 us=37768 status_file = 'tuns_55111u/temp/tuns_55111u_s3_cpf.sts' 2020-08-17 17:04:09 us=37779 status_file_version = 1 2020-08-17 17:04:09 us=37791 status_file_update_freq = 300 2020-08-17 17:04:09 us=37802 occ = ENABLED 2020-08-17 17:04:09 us=37813 rcvbuf = 0 2020-08-17 17:04:09 us=37825 sndbuf = 0 2020-08-17 17:04:09 us=37836 mark = 0 2020-08-17 17:04:09 us=37848 sockflags = 0 2020-08-17 17:04:09 us=37859 fast_io = DISABLED 2020-08-17 17:04:09 us=37870 comp.alg = 1 2020-08-17 17:04:09 us=37882 comp.flags = 0 2020-08-17 17:04:09 us=37893 route_script = '[UNDEF]' 2020-08-17 17:04:09 us=37905 route_default_gateway = '10.55.111.2' 2020-08-17 17:04:09 us=37916 route_default_metric = 0 2020-08-17 17:04:09 us=37927 route_noexec = DISABLED 2020-08-17 17:04:09 us=37938 route_delay = 0 2020-08-17 17:04:09 us=37949 route_delay_window = 30 2020-08-17 17:04:09 us=37961 route_delay_defined = DISABLED 2020-08-17 17:04:09 us=37972 route_nopull = DISABLED 2020-08-17 17:04:09 us=37983 route_gateway_via_dhcp = DISABLED 2020-08-17 17:04:09 us=38017 allow_pull_fqdn = DISABLED 2020-08-17 17:04:09 us=38030 route 10.66.97.86/default (not set)/default (not set)/default (not set) 2020-08-17 17:04:09 us=38041 management_addr = '[UNDEF]' 2020-08-17 17:04:09 us=38053 management_port = '[UNDEF]' 2020-08-17 17:04:09 us=38064 management_user_pass = '[UNDEF]' 2020-08-17 17:04:09 us=38076 management_log_history_cache = 250 2020-08-17 17:04:09 us=38087 management_echo_buffer_size = 100 2020-08-17 17:04:09 us=38099 management_write_peer_info_file = '[UNDEF]' 2020-08-17 17:04:09 us=38110 management_client_user = '[UNDEF]' 2020-08-17 17:04:09 us=38121 management_client_group = '[UNDEF]' 2020-08-17 17:04:09 us=38133 management_flags = 0 2020-08-17 17:04:09 us=38144 shared_secret_file = '[UNDEF]' 2020-08-17 17:04:09 us=38156 key_direction = 0 2020-08-17 17:04:09 us=38167 ciphername = 'AES-256-GCM' 2020-08-17 17:04:09 us=38178 ncp_enabled = ENABLED 2020-08-17 17:04:09 us=38190 ncp_ciphers = 'AES-256-GCM:AES-128-GCM' 2020-08-17 17:04:09 us=38201 authname = 'SHA1' 2020-08-17 17:04:09 us=38212 prng_hash = 'SHA1' 2020-08-17 17:04:09 us=38224 prng_nonce_secret_len = 16 2020-08-17 17:04:09 us=38235 keysize = 0 2020-08-17 17:04:09 us=38247 engine = DISABLED 2020-08-17 17:04:09 us=38258 replay = ENABLED 2020-08-17 17:04:09 us=38269 mute_replay_warnings = DISABLED 2020-08-17 17:04:09 us=38280 replay_window = 64 2020-08-17 17:04:09 us=38292 replay_time = 15 2020-08-17 17:04:09 us=38303 packet_id_file = '[UNDEF]' 2020-08-17 17:04:09 us=38314 test_crypto = DISABLED 2020-08-17 17:04:09 us=38325 tls_server = ENABLED 2020-08-17 17:04:09 us=38336 tls_client = DISABLED 2020-08-17 17:04:09 us=38348 ca_file = '/root/easyrsa3/ec_secp384r1/pki/ca.crt' 2020-08-17 17:04:09 us=38359 ca_path = '[UNDEF]' 2020-08-17 17:04:09 us=38370 dh_file = '[UNDEF]' 2020-08-17 17:04:09 us=38389 cert_file = '/root/easyrsa3/ec_secp384r1/pki/issued/v303.tct.secp384r1.s01.crt' 2020-08-17 17:04:09 us=38401 extra_certs_file = '[UNDEF]' 2020-08-17 17:04:09 us=38413 priv_key_file = '/root/easyrsa3/ec_secp384r1/pki/private/v303.tct.secp384r1.s01.key' 2020-08-17 17:04:09 us=38425 pkcs12_file = '[UNDEF]' 2020-08-17 17:04:09 us=38436 cipher_list = '[UNDEF]' 2020-08-17 17:04:09 us=38447 cipher_list_tls13 = '[UNDEF]' 2020-08-17 17:04:09 us=38458 tls_cert_profile = '[UNDEF]' 2020-08-17 17:04:09 us=38470 tls_verify = '[UNDEF]' 2020-08-17 17:04:09 us=38481 tls_export_cert = '[UNDEF]' 2020-08-17 17:04:09 us=38492 verify_x509_type = 0 2020-08-17 17:04:09 us=38504 verify_x509_name = '[UNDEF]' 2020-08-17 17:04:09 us=38515 crl_file = '[UNDEF]' 2020-08-17 17:04:09 us=38526 ns_cert_type = 0 2020-08-17 17:04:09 us=38537 remote_cert_ku[i] = 65535 2020-08-17 17:04:09 us=38549 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38560 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38571 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38583 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38594 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38605 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38617 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38628 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38639 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38651 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38662 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38673 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38685 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38696 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38707 remote_cert_ku[i] = 0 2020-08-17 17:04:09 us=38719 remote_cert_eku = 'TLS Web Client Authentication' 2020-08-17 17:04:09 us=38730 ssl_flags = 192 2020-08-17 17:04:09 us=38741 tls_timeout = 2 2020-08-17 17:04:09 us=38753 renegotiate_bytes = -1 2020-08-17 17:04:09 us=38764 renegotiate_packets = 0 2020-08-17 17:04:09 us=38776 renegotiate_seconds = 600 2020-08-17 17:04:09 us=38787 handshake_window = 60 2020-08-17 17:04:09 us=38798 transition_window = 3600 2020-08-17 17:04:09 us=38816 single_session = DISABLED 2020-08-17 17:04:09 us=38829 push_peer_info = DISABLED 2020-08-17 17:04:09 us=38840 tls_exit = DISABLED 2020-08-17 17:04:09 us=38851 tls_crypt_v2_metadata = '[UNDEF]' 2020-08-17 17:04:09 us=38864 server_network = 10.55.111.0 2020-08-17 17:04:09 us=38876 server_netmask = 255.255.255.0 2020-08-17 17:04:09 us=38891 server_network_ipv6 = 12fc:1918::10:55:111:0 2020-08-17 17:04:09 us=38903 server_netbits_ipv6 = 112 2020-08-17 17:04:09 us=38915 server_bridge_ip = 0.0.0.0 2020-08-17 17:04:09 us=38927 server_bridge_netmask = 0.0.0.0 2020-08-17 17:04:09 us=38939 server_bridge_pool_start = 0.0.0.0 2020-08-17 17:04:09 us=38951 server_bridge_pool_end = 0.0.0.0 2020-08-17 17:04:09 us=38963 push_entry = 'topology subnet' 2020-08-17 17:04:09 us=38974 push_entry = 'explicit-exit-notify 3' 2020-08-17 17:04:09 us=38985 push_entry = 'comp-lzo no' 2020-08-17 17:04:09 us=38997 push_entry = 'tun-ipv6' 2020-08-17 17:04:09 us=39008 push_entry = 'route-gateway 10.55.111.1' 2020-08-17 17:04:09 us=39019 push_entry = 'topology subnet' 2020-08-17 17:04:09 us=39031 push_entry = 'ping 10' 2020-08-17 17:04:09 us=39042 push_entry = 'ping-restart 30' 2020-08-17 17:04:09 us=39053 ifconfig_pool_defined = ENABLED 2020-08-17 17:04:09 us=39065 ifconfig_pool_start = 10.55.111.2 2020-08-17 17:04:09 us=39078 ifconfig_pool_end = 10.55.111.253 2020-08-17 17:04:09 us=39090 ifconfig_pool_netmask = 255.255.255.0 2020-08-17 17:04:09 us=39102 ifconfig_pool_persist_filename = '[UNDEF]' 2020-08-17 17:04:09 us=39114 ifconfig_pool_persist_refresh_freq = 600 2020-08-17 17:04:09 us=39125 ifconfig_ipv6_pool_defined = ENABLED 2020-08-17 17:04:09 us=39138 ifconfig_ipv6_pool_base = 12fc:1918::10:55:111:2 2020-08-17 17:04:09 us=39150 ifconfig_ipv6_pool_netbits = 112 2020-08-17 17:04:09 us=39162 n_bcast_buf = 256 2020-08-17 17:04:09 us=39173 tcp_queue_limit = 64 2020-08-17 17:04:09 us=39191 real_hash_size = 256 2020-08-17 17:04:09 us=39203 virtual_hash_size = 256 2020-08-17 17:04:09 us=39215 client_connect_script = '[UNDEF]' 2020-08-17 17:04:09 us=39545 learn_address_script = '[UNDEF]' 2020-08-17 17:04:09 us=39565 client_disconnect_script = '[UNDEF]' 2020-08-17 17:04:09 us=39577 client_config_dir = 'tuns_55111u/CCD_subnet' 2020-08-17 17:04:09 us=39589 ccd_exclusive = ENABLED 2020-08-17 17:04:09 us=39600 tmp_dir = 'tuns_55111u/temp' 2020-08-17 17:04:09 us=39611 push_ifconfig_defined = DISABLED 2020-08-17 17:04:09 us=39623 push_ifconfig_local = 0.0.0.0 2020-08-17 17:04:09 us=39635 push_ifconfig_remote_netmask = 0.0.0.0 2020-08-17 17:04:09 us=39647 push_ifconfig_ipv6_defined = DISABLED 2020-08-17 17:04:09 us=39659 push_ifconfig_ipv6_local = ::/0 2020-08-17 17:04:09 us=39671 push_ifconfig_ipv6_remote = :: 2020-08-17 17:04:09 us=39682 enable_c2c = ENABLED 2020-08-17 17:04:09 us=39694 duplicate_cn = DISABLED 2020-08-17 17:04:09 us=39705 cf_max = 0 2020-08-17 17:04:09 us=39717 cf_per = 0 2020-08-17 17:04:09 us=39728 max_clients = 1024 2020-08-17 17:04:09 us=39739 max_routes_per_client = 256 2020-08-17 17:04:09 us=39751 auth_user_pass_verify_script = '[UNDEF]' 2020-08-17 17:04:09 us=39762 auth_user_pass_verify_script_via_file = DISABLED 2020-08-17 17:04:09 us=39773 auth_token_generate = DISABLED 2020-08-17 17:04:09 us=39785 auth_token_lifetime = 0 2020-08-17 17:04:09 us=39796 auth_token_secret_file = '[UNDEF]' 2020-08-17 17:04:09 us=39807 port_share_host = '[UNDEF]' 2020-08-17 17:04:09 us=39818 port_share_port = '[UNDEF]' 2020-08-17 17:04:09 us=39829 vlan_tagging = DISABLED 2020-08-17 17:04:09 us=39840 vlan_accept = all 2020-08-17 17:04:09 us=39852 vlan_pvid = 1 2020-08-17 17:04:09 us=39863 client = DISABLED 2020-08-17 17:04:09 us=39874 pull = DISABLED 2020-08-17 17:04:09 us=39886 auth_user_pass_file = '[UNDEF]' 2020-08-17 17:04:09 us=39899 OpenVPN 2.6_git [git:master/2da29362cc93aa1b] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Aug 17 2020 2020-08-17 17:04:09 us=39932 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 2020-08-17 17:04:09 us=42286 ECDH curve secp384r1 added 2020-08-17 17:04:09 us=42393 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 2020-08-17 17:04:09 us=42412 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 2020-08-17 17:04:09 us=42466 tls-crypt-v2 server key: Cipher 'AES-256-CTR' initialized with 256 bit key 2020-08-17 17:04:09 us=42486 tls-crypt-v2 server key: Using 256 bit message hash 'SHA256' for HMAC authentication 2020-08-17 17:04:09 us=42506 TLS-Auth MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ] 2020-08-17 17:04:09 us=43062 ROUTE_GATEWAY 10.10.201.1/255.255.255.0 IFACE=enp0s3 HWADDR=00:15:5d:c9:6e:01 2020-08-17 17:04:09 us=45091 TUN/TAP device tuns55111 opened 2020-08-17 17:04:09 us=45133 do_ifconfig, ipv4=1, ipv6=1 2020-08-17 17:04:09 us=45150 /usr/bin/ip link set dev tuns55111 up mtu 1500 2020-08-17 17:04:09 us=54489 /usr/bin/ip link set dev tuns55111 up 2020-08-17 17:04:09 us=56306 /usr/bin/ip addr add dev tuns55111 10.55.111.1/24 2020-08-17 17:04:09 us=66760 /usr/bin/ip link set dev tuns55111 up mtu 1500 2020-08-17 17:04:09 us=69711 /usr/bin/ip link set dev tuns55111 up 2020-08-17 17:04:09 us=71329 /usr/bin/ip -6 addr add 12fc:1918::10:55:111:1/112 dev tuns55111 2020-08-17 17:04:09 us=79220 /usr/bin/ip route add 10.66.97.86/32 via 10.55.111.2 2020-08-17 17:04:09 us=81401 Data Channel MTU parms [ L:1622 D:1300 EF:122 EB:406 ET:0 EL:3 ] 2020-08-17 17:04:09 us=81455 Could not determine IPv4/IPv6 protocol. Using AF_INET 2020-08-17 17:04:09 us=81497 Socket Buffers: R=[212992->212992] S=[212992->212992] 2020-08-17 17:04:09 us=81530 UDPv4 link local (bound): [AF_INET]10.10.201.226:55111 2020-08-17 17:04:09 us=81544 UDPv4 link remote: [AF_UNSPEC] 2020-08-17 17:04:09 us=81568 MULTI: multi_init called, r=256 v=256 2020-08-17 17:04:09 us=81607 IFCONFIG POOL IPv4: base=10.55.111.2 size=252 2020-08-17 17:04:09 us=81637 IFCONFIG POOL IPv6: base=12fc:1918::10:55:111:2 size=65534 netbits=112 2020-08-17 17:04:09 us=81650 NOTE: IPv4 pool size is 252, IPv6 pool size is 65534. IPv4 pool size limits the number of clients that can be served from the pool 2020-08-17 17:04:09 us=81695 Initialization Sequence Completed 2020-08-17 17:04:25 us=309469 MULTI: multi_create_instance called 2020-08-17 17:04:25 us=309589 79.71.aaa.bbb:4024 Re-using SSL/TLS context 2020-08-17 17:04:25 us=309718 79.71.aaa.bbb:4024 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 2020-08-17 17:04:25 us=309742 79.71.aaa.bbb:4024 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 2020-08-17 17:04:25 us=309819 79.71.aaa.bbb:4024 tls-crypt-v2 server key: Cipher 'AES-256-CTR' initialized with 256 bit key 2020-08-17 17:04:25 us=309842 79.71.aaa.bbb:4024 tls-crypt-v2 server key: Using 256 bit message hash 'SHA256' for HMAC authentication 2020-08-17 17:04:25 us=310166 79.71.aaa.bbb:4024 Control Channel MTU parms [ L:1626 D:1184 EF:66 EB:0 ET:0 EL:3 ] 2020-08-17 17:04:25 us=310254 79.71.aaa.bbb:4024 Data Channel MTU parms [ L:1626 D:1300 EF:126 EB:407 ET:0 EL:3 ] 2020-08-17 17:04:25 us=310269 79.71.aaa.bbb:4024 Fragmentation MTU parms [ L:1626 D:1300 EF:125 EB:407 ET:1 EL:3 ] 2020-08-17 17:04:25 us=310309 79.71.aaa.bbb:4024 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1554,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server' 2020-08-17 17:04:25 us=310324 79.71.aaa.bbb:4024 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1554,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client' 2020-08-17 17:04:25 us=310359 79.71.aaa.bbb:4024 TLS: Initial packet from [AF_INET]79.71.aaa.bbb:4024, sid=37bc5fac 193c26da 2020-08-17 17:04:25 us=335137 79.71.aaa.bbb:4024 VERIFY OK: depth=1, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=CA tct-secp384r1, emailAddress=me@home.org 2020-08-17 17:04:25 us=337143 79.71.aaa.bbb:4024 VERIFY KU OK 2020-08-17 17:04:25 us=337187 79.71.aaa.bbb:4024 Validating certificate extended key usage 2020-08-17 17:04:25 us=337208 79.71.aaa.bbb:4024 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication 2020-08-17 17:04:25 us=337224 79.71.aaa.bbb:4024 VERIFY EKU OK 2020-08-17 17:04:25 us=337238 79.71.aaa.bbb:4024 VERIFY OK: depth=0, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=tct.ccc.c01, emailAddress=me@home.org 2020-08-17 17:04:25 us=344330 79.71.aaa.bbb:4024 peer info: IV_VER=2.6_git 2020-08-17 17:04:25 us=344401 79.71.aaa.bbb:4024 peer info: IV_PLAT=linux 2020-08-17 17:04:25 us=344423 79.71.aaa.bbb:4024 peer info: IV_PROTO=6 2020-08-17 17:04:25 us=344442 79.71.aaa.bbb:4024 peer info: IV_NCP=2 2020-08-17 17:04:25 us=344461 79.71.aaa.bbb:4024 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM 2020-08-17 17:04:25 us=344480 79.71.aaa.bbb:4024 peer info: IV_LZ4=1 2020-08-17 17:04:25 us=344499 79.71.aaa.bbb:4024 peer info: IV_LZ4v2=1 2020-08-17 17:04:25 us=344518 79.71.aaa.bbb:4024 peer info: IV_LZO=1 2020-08-17 17:04:25 us=344537 79.71.aaa.bbb:4024 peer info: IV_COMP_STUB=1 2020-08-17 17:04:25 us=344556 79.71.aaa.bbb:4024 peer info: IV_COMP_STUBv2=1 2020-08-17 17:04:25 us=344574 79.71.aaa.bbb:4024 peer info: IV_TCPNL=1 2020-08-17 17:04:25 us=344594 79.71.aaa.bbb:4024 peer info: IV_HWADDR=24:b6:fd:31:bc:ca 2020-08-17 17:04:25 us=344613 79.71.aaa.bbb:4024 peer info: IV_SSL=OpenSSL_1.1.1__11_Sep_2018 2020-08-17 17:04:25 us=344632 79.71.aaa.bbb:4024 peer info: UV_INFO=v3.rsa.ossl11.cli01.mint 2020-08-17 17:04:25 us=344651 79.71.aaa.bbb:4024 peer info: UV_PING=10 2020-08-17 17:04:25 us=344670 79.71.aaa.bbb:4024 peer info: UV_PINGR=60 2020-08-17 17:04:25 us=346517 79.71.aaa.bbb:4024 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 384 bit EC, curve: secp384r1 2020-08-17 17:04:25 us=346603 79.71.aaa.bbb:4024 [tct.ccc.c01] Peer Connection Initiated with [AF_INET]79.71.aaa.bbb:4024 2020-08-17 17:04:25 us=346653 tct.ccc.c01/79.71.aaa.bbb:4024 MULTI_sva: pool returned IPv4=10.55.111.2, IPv6=12fc:1918::10:55:111:2 2020-08-17 17:04:25 us=346749 tct.ccc.c01/79.71.aaa.bbb:4024 OPTIONS IMPORT: reading client specific options from: tuns_55111u/CCD_subnet/tct.ccc.c01 2020-08-17 17:04:25 us=346833 tct.ccc.c01/79.71.aaa.bbb:4024 MULTI_sva: WARNING: if --ifconfig-push is used for IPv4, automatic IPv6 assignment from --ifconfig-ipv6-pool does not work. Use --ifconfig-ipv6-push for IPv6 then. 2020-08-17 17:04:25 us=346909 tct.ccc.c01/79.71.aaa.bbb:4024 MULTI: Learn: 10.55.111.101 -> tct.ccc.c01/79.71.aaa.bbb:4024 2020-08-17 17:04:25 us=346931 tct.ccc.c01/79.71.aaa.bbb:4024 MULTI: primary virtual IP for tct.ccc.c01/79.71.aaa.bbb:4024: 10.55.111.101 2020-08-17 17:04:25 us=346954 tct.ccc.c01/79.71.aaa.bbb:4024 MULTI: Learn: 12fc:1918::10:55:111:2 -> tct.ccc.c01/79.71.aaa.bbb:4024 2020-08-17 17:04:25 us=346976 tct.ccc.c01/79.71.aaa.bbb:4024 MULTI: primary virtual IPv6 for tct.ccc.c01/79.71.aaa.bbb:4024: 12fc:1918::10:55:111:2 2020-08-17 17:04:25 us=346997 tct.ccc.c01/79.71.aaa.bbb:4024 MULTI: internal route 10.66.97.86 -> tct.ccc.c01/79.71.aaa.bbb:4024 2020-08-17 17:04:25 us=347020 tct.ccc.c01/79.71.aaa.bbb:4024 MULTI: Learn: 10.66.97.86 -> tct.ccc.c01/79.71.aaa.bbb:4024 2020-08-17 17:04:25 us=347162 tct.ccc.c01/79.71.aaa.bbb:4024 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2020-08-17 17:04:25 us=347193 tct.ccc.c01/79.71.aaa.bbb:4024 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key 2020-08-17 17:04:25 us=347255 tct.ccc.c01/79.71.aaa.bbb:4024 SENT CONTROL [tct.ccc.c01]: 'PUSH_REPLY,topology subnet,explicit-exit-notify 3,comp-lzo no,tun-ipv6,route-gateway 10.55.111.1,topology subnet,ping 10,ping-restart 30,route 10.7.39.137,ifconfig-ipv6 12fc:1918::10:55:111:2/112 12fc:1918::10:55:111:1,ifconfig 10.55.111.101 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1) 2020-08-17 17:05:34 us=431217 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: new session incoming connection from [AF_INET]79.71.aaa.bbb:4024 2020-08-17 17:05:34 us=466607 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=1, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=CA tct-secp384r1, emailAddress=me@home.org 2020-08-17 17:05:34 us=469715 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY KU OK 2020-08-17 17:05:34 us=469774 tct.ccc.c01/79.71.aaa.bbb:4024 Validating certificate extended key usage 2020-08-17 17:05:34 us=469804 tct.ccc.c01/79.71.aaa.bbb:4024 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication 2020-08-17 17:05:34 us=469829 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY EKU OK 2020-08-17 17:05:34 us=469854 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=0, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=tct.ccc.c01, emailAddress=me@home.org 2020-08-17 17:05:34 us=478861 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_VER=2.6_git 2020-08-17 17:05:34 us=478937 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PLAT=linux 2020-08-17 17:05:34 us=478968 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PROTO=6 2020-08-17 17:05:34 us=478996 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_NCP=2 2020-08-17 17:05:34 us=479023 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM 2020-08-17 17:05:34 us=479051 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4=1 2020-08-17 17:05:34 us=479078 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4v2=1 2020-08-17 17:05:34 us=479105 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZO=1 2020-08-17 17:05:34 us=479159 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUB=1 2020-08-17 17:05:34 us=479188 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUBv2=1 2020-08-17 17:05:34 us=479216 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_TCPNL=1 2020-08-17 17:05:34 us=479242 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_HWADDR=24:b6:fd:31:bc:ca 2020-08-17 17:05:34 us=479307 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_SSL=OpenSSL_1.1.1__11_Sep_2018 2020-08-17 17:05:34 us=479334 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_INFO=v3.rsa.ossl11.cli01.mint 2020-08-17 17:05:34 us=479360 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PING=10 2020-08-17 17:05:34 us=479394 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PINGR=60 2020-08-17 17:05:34 us=479461 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 2020-08-17 17:05:34 us=479547 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: tls_multi_process: untrusted session promoted to semi-trusted 2020-08-17 17:05:34 us=481281 tct.ccc.c01/79.71.aaa.bbb:4024 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 384 bit EC, curve: secp384r1 2020-08-17 17:05:35 us=495145 tct.ccc.c01/79.71.aaa.bbb:4024 PUSH: Received control message: 'PUSH_REQUEST' 2020-08-17 17:05:35 us=495424 tct.ccc.c01/79.71.aaa.bbb:4024 SENT CONTROL [tct.ccc.c01]: 'PUSH_REPLY,topology subnet,explicit-exit-notify 3,comp-lzo no,tun-ipv6,route-gateway 10.55.111.1,topology subnet,ping 10,ping-restart 30,route 10.7.39.137,ifconfig-ipv6 12fc:1918::10:55:111:2/112 12fc:1918::10:55:111:1,ifconfig 10.55.111.101 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1) 2020-08-17 17:05:45 us=743298 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:05:55 us=599933 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:10 us=35875 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: new session incoming connection from [AF_INET]79.71.aaa.bbb:4024 2020-08-17 17:06:10 us=55208 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=1, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=CA tct-secp384r1, emailAddress=me@home.org 2020-08-17 17:06:10 us=57527 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY KU OK 2020-08-17 17:06:10 us=57568 tct.ccc.c01/79.71.aaa.bbb:4024 Validating certificate extended key usage 2020-08-17 17:06:10 us=57587 tct.ccc.c01/79.71.aaa.bbb:4024 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication 2020-08-17 17:06:10 us=57605 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY EKU OK 2020-08-17 17:06:10 us=57622 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=0, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=tct.ccc.c01, emailAddress=me@home.org 2020-08-17 17:06:10 us=64753 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_VER=2.6_git 2020-08-17 17:06:10 us=64812 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PLAT=linux 2020-08-17 17:06:10 us=64831 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PROTO=6 2020-08-17 17:06:10 us=64850 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_NCP=2 2020-08-17 17:06:10 us=64868 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM 2020-08-17 17:06:10 us=64894 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4=1 2020-08-17 17:06:10 us=64913 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4v2=1 2020-08-17 17:06:10 us=64933 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZO=1 2020-08-17 17:06:10 us=64952 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUB=1 2020-08-17 17:06:10 us=64970 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUBv2=1 2020-08-17 17:06:10 us=64988 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_TCPNL=1 2020-08-17 17:06:10 us=65027 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_HWADDR=24:b6:fd:31:bc:ca 2020-08-17 17:06:10 us=65046 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_SSL=OpenSSL_1.1.1__11_Sep_2018 2020-08-17 17:06:10 us=65065 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_INFO=v3.rsa.ossl11.cli01.mint 2020-08-17 17:06:10 us=65082 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PING=10 2020-08-17 17:06:10 us=65100 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PINGR=60 2020-08-17 17:06:10 us=65191 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 2020-08-17 17:06:10 us=65305 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: tls_multi_process: untrusted session promoted to semi-trusted 2020-08-17 17:06:10 us=67368 tct.ccc.c01/79.71.aaa.bbb:4024 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 384 bit EC, curve: secp384r1 2020-08-17 17:06:11 us=133399 tct.ccc.c01/79.71.aaa.bbb:4024 PUSH: Received control message: 'PUSH_REQUEST' 2020-08-17 17:06:11 us=133628 tct.ccc.c01/79.71.aaa.bbb:4024 SENT CONTROL [tct.ccc.c01]: 'PUSH_REPLY,topology subnet,explicit-exit-notify 3,comp-lzo no,tun-ipv6,route-gateway 10.55.111.1,topology subnet,ping 10,ping-restart 30,route 10.7.39.137,ifconfig-ipv6 12fc:1918::10:55:111:2/112 12fc:1918::10:55:111:1,ifconfig 10.55.111.101 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1) 2020-08-17 17:06:21 us=361366 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:21 us=402710 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:21 us=402927 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:21 us=420258 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:21 us=632208 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:22 us=56728 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:22 us=923622 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:24 us=619117 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:28 us=40316 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:34 us=954004 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:46 us=391691 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: new session incoming connection from [AF_INET]79.71.aaa.bbb:4024 2020-08-17 17:06:46 us=429277 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=1, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=CA tct-secp384r1, emailAddress=me@home.org 2020-08-17 17:06:46 us=432482 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY KU OK 2020-08-17 17:06:46 us=432536 tct.ccc.c01/79.71.aaa.bbb:4024 Validating certificate extended key usage 2020-08-17 17:06:46 us=432566 tct.ccc.c01/79.71.aaa.bbb:4024 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication 2020-08-17 17:06:46 us=432591 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY EKU OK 2020-08-17 17:06:46 us=432616 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=0, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=tct.ccc.c01, emailAddress=me@home.org 2020-08-17 17:06:46 us=441120 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_VER=2.6_git 2020-08-17 17:06:46 us=441171 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PLAT=linux 2020-08-17 17:06:46 us=441185 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PROTO=6 2020-08-17 17:06:46 us=441196 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_NCP=2 2020-08-17 17:06:46 us=441208 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM 2020-08-17 17:06:46 us=441219 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4=1 2020-08-17 17:06:46 us=441230 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4v2=1 2020-08-17 17:06:46 us=441241 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZO=1 2020-08-17 17:06:46 us=441252 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUB=1 2020-08-17 17:06:46 us=441263 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUBv2=1 2020-08-17 17:06:46 us=441274 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_TCPNL=1 2020-08-17 17:06:46 us=441285 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_HWADDR=24:b6:fd:31:bc:ca 2020-08-17 17:06:46 us=441296 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_SSL=OpenSSL_1.1.1__11_Sep_2018 2020-08-17 17:06:46 us=441307 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_INFO=v3.rsa.ossl11.cli01.mint 2020-08-17 17:06:46 us=441318 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PING=10 2020-08-17 17:06:46 us=441329 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PINGR=60 2020-08-17 17:06:46 us=441392 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 2020-08-17 17:06:46 us=441465 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: tls_multi_process: untrusted session promoted to semi-trusted 2020-08-17 17:06:46 us=442933 tct.ccc.c01/79.71.aaa.bbb:4024 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 384 bit EC, curve: secp384r1 2020-08-17 17:06:47 us=630418 tct.ccc.c01/79.71.aaa.bbb:4024 PUSH: Received control message: 'PUSH_REQUEST' 2020-08-17 17:06:47 us=630596 tct.ccc.c01/79.71.aaa.bbb:4024 SENT CONTROL [tct.ccc.c01]: 'PUSH_REPLY,topology subnet,explicit-exit-notify 3,comp-lzo no,tun-ipv6,route-gateway 10.55.111.1,topology subnet,ping 10,ping-restart 30,route 10.7.39.137,ifconfig-ipv6 12fc:1918::10:55:111:2/112 12fc:1918::10:55:111:1,ifconfig 10.55.111.101 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1) 2020-08-17 17:06:48 us=522438 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:06:58 us=974487 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:07:08 us=392922 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:07:15 us=913968 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:07:22 us=4478 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: new session incoming connection from [AF_INET]79.71.aaa.bbb:4024 2020-08-17 17:07:22 us=32150 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=1, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=CA tct-secp384r1, emailAddress=me@home.org 2020-08-17 17:07:22 us=33817 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY KU OK 2020-08-17 17:07:22 us=33866 tct.ccc.c01/79.71.aaa.bbb:4024 Validating certificate extended key usage 2020-08-17 17:07:22 us=33881 tct.ccc.c01/79.71.aaa.bbb:4024 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication 2020-08-17 17:07:22 us=33892 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY EKU OK 2020-08-17 17:07:22 us=33904 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=0, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=tct.ccc.c01, emailAddress=me@home.org 2020-08-17 17:07:22 us=38622 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_VER=2.6_git 2020-08-17 17:07:22 us=38697 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PLAT=linux 2020-08-17 17:07:22 us=38711 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PROTO=6 2020-08-17 17:07:22 us=38724 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_NCP=2 2020-08-17 17:07:22 us=38736 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM 2020-08-17 17:07:22 us=38748 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4=1 2020-08-17 17:07:22 us=38760 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4v2=1 2020-08-17 17:07:22 us=38772 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZO=1 2020-08-17 17:07:22 us=38784 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUB=1 2020-08-17 17:07:22 us=38796 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUBv2=1 2020-08-17 17:07:22 us=38808 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_TCPNL=1 2020-08-17 17:07:22 us=38820 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_HWADDR=24:b6:fd:31:bc:ca 2020-08-17 17:07:22 us=38832 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_SSL=OpenSSL_1.1.1__11_Sep_2018 2020-08-17 17:07:22 us=38844 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_INFO=v3.rsa.ossl11.cli01.mint 2020-08-17 17:07:22 us=38856 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PING=10 2020-08-17 17:07:22 us=38868 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PINGR=60 2020-08-17 17:07:22 us=38942 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 2020-08-17 17:07:22 us=39035 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: tls_multi_process: untrusted session promoted to semi-trusted 2020-08-17 17:07:22 us=40706 tct.ccc.c01/79.71.aaa.bbb:4024 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 384 bit EC, curve: secp384r1 2020-08-17 17:07:23 us=229600 tct.ccc.c01/79.71.aaa.bbb:4024 PUSH: Received control message: 'PUSH_REQUEST' 2020-08-17 17:07:23 us=229837 tct.ccc.c01/79.71.aaa.bbb:4024 SENT CONTROL [tct.ccc.c01]: 'PUSH_REPLY,topology subnet,explicit-exit-notify 3,comp-lzo no,tun-ipv6,route-gateway 10.55.111.1,topology subnet,ping 10,ping-restart 30,route 10.7.39.137,ifconfig-ipv6 12fc:1918::10:55:111:2/112 12fc:1918::10:55:111:1,ifconfig 10.55.111.101 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1) 2020-08-17 17:07:33 us=755731 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:07:43 us=259450 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:07:58 us=597439 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: new session incoming connection from [AF_INET]79.71.aaa.bbb:4024 2020-08-17 17:07:58 us=623414 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=1, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=CA tct-secp384r1, emailAddress=me@home.org 2020-08-17 17:07:58 us=625288 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY KU OK 2020-08-17 17:07:58 us=625321 tct.ccc.c01/79.71.aaa.bbb:4024 Validating certificate extended key usage 2020-08-17 17:07:58 us=625340 tct.ccc.c01/79.71.aaa.bbb:4024 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication 2020-08-17 17:07:58 us=625356 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY EKU OK 2020-08-17 17:07:58 us=625372 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=0, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=tct.ccc.c01, emailAddress=me@home.org 2020-08-17 17:07:58 us=631291 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_VER=2.6_git 2020-08-17 17:07:58 us=631344 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PLAT=linux 2020-08-17 17:07:58 us=631363 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PROTO=6 2020-08-17 17:07:58 us=631380 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_NCP=2 2020-08-17 17:07:58 us=631416 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM 2020-08-17 17:07:58 us=631434 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4=1 2020-08-17 17:07:58 us=631451 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4v2=1 2020-08-17 17:07:58 us=631467 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZO=1 2020-08-17 17:07:58 us=631484 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUB=1 2020-08-17 17:07:58 us=631500 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUBv2=1 2020-08-17 17:07:58 us=631519 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_TCPNL=1 2020-08-17 17:07:58 us=631535 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_HWADDR=24:b6:fd:31:bc:ca 2020-08-17 17:07:58 us=631552 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_SSL=OpenSSL_1.1.1__11_Sep_2018 2020-08-17 17:07:58 us=631569 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_INFO=v3.rsa.ossl11.cli01.mint 2020-08-17 17:07:58 us=631585 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PING=10 2020-08-17 17:07:58 us=631601 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PINGR=60 2020-08-17 17:07:58 us=631689 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 2020-08-17 17:07:58 us=631791 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: tls_multi_process: untrusted session promoted to semi-trusted 2020-08-17 17:07:58 us=633374 tct.ccc.c01/79.71.aaa.bbb:4024 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 384 bit EC, curve: secp384r1 2020-08-17 17:07:59 us=663318 tct.ccc.c01/79.71.aaa.bbb:4024 PUSH: Received control message: 'PUSH_REQUEST' 2020-08-17 17:07:59 us=663671 tct.ccc.c01/79.71.aaa.bbb:4024 SENT CONTROL [tct.ccc.c01]: 'PUSH_REPLY,topology subnet,explicit-exit-notify 3,comp-lzo no,tun-ipv6,route-gateway 10.55.111.1,topology subnet,ping 10,ping-restart 30,route 10.7.39.137,ifconfig-ipv6 12fc:1918::10:55:111:2/112 12fc:1918::10:55:111:1,ifconfig 10.55.111.101 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1) 2020-08-17 17:08:09 us=806848 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:08:19 us=43358 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:08:34 us=477278 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: new session incoming connection from [AF_INET]79.71.aaa.bbb:4024 2020-08-17 17:08:34 us=511899 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=1, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=CA tct-secp384r1, emailAddress=me@home.org 2020-08-17 17:08:34 us=514172 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY KU OK 2020-08-17 17:08:34 us=514200 tct.ccc.c01/79.71.aaa.bbb:4024 Validating certificate extended key usage 2020-08-17 17:08:34 us=514216 tct.ccc.c01/79.71.aaa.bbb:4024 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication 2020-08-17 17:08:34 us=514229 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY EKU OK 2020-08-17 17:08:34 us=514242 tct.ccc.c01/79.71.aaa.bbb:4024 VERIFY OK: depth=0, C=00, ST=tct, L=home, O=tctnet, OU=tctnet-secp384r1, CN=tct.ccc.c01, emailAddress=me@home.org 2020-08-17 17:08:34 us=519730 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_VER=2.6_git 2020-08-17 17:08:34 us=519788 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PLAT=linux 2020-08-17 17:08:34 us=519804 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_PROTO=6 2020-08-17 17:08:34 us=519818 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_NCP=2 2020-08-17 17:08:34 us=519832 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM 2020-08-17 17:08:34 us=519847 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4=1 2020-08-17 17:08:34 us=519883 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZ4v2=1 2020-08-17 17:08:34 us=519898 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_LZO=1 2020-08-17 17:08:34 us=519911 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUB=1 2020-08-17 17:08:34 us=519925 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_COMP_STUBv2=1 2020-08-17 17:08:34 us=519939 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_TCPNL=1 2020-08-17 17:08:34 us=519953 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_HWADDR=24:b6:fd:31:bc:ca 2020-08-17 17:08:34 us=519967 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: IV_SSL=OpenSSL_1.1.1__11_Sep_2018 2020-08-17 17:08:34 us=519981 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_INFO=v3.rsa.ossl11.cli01.mint 2020-08-17 17:08:34 us=519995 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PING=10 2020-08-17 17:08:34 us=520009 tct.ccc.c01/79.71.aaa.bbb:4024 peer info: UV_PINGR=60 2020-08-17 17:08:34 us=520090 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1 2020-08-17 17:08:34 us=520191 tct.ccc.c01/79.71.aaa.bbb:4024 TLS: tls_multi_process: untrusted session promoted to semi-trusted 2020-08-17 17:08:34 us=521707 tct.ccc.c01/79.71.aaa.bbb:4024 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 384 bit EC, curve: secp384r1 2020-08-17 17:08:35 us=596329 tct.ccc.c01/79.71.aaa.bbb:4024 PUSH: Received control message: 'PUSH_REQUEST' 2020-08-17 17:08:35 us=596559 tct.ccc.c01/79.71.aaa.bbb:4024 SENT CONTROL [tct.ccc.c01]: 'PUSH_REPLY,topology subnet,explicit-exit-notify 3,comp-lzo no,tun-ipv6,route-gateway 10.55.111.1,topology subnet,ping 10,ping-restart 30,route 10.7.39.137,ifconfig-ipv6 12fc:1918::10:55:111:2/112 12fc:1918::10:55:111:1,ifconfig 10.55.111.101 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1) 2020-08-17 17:08:45 us=426100 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:08:45 us=426208 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:08:46 us=622066 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:08:47 us=808911 tct.ccc.c01/79.71.aaa.bbb:4024 Key [AF_INET]79.71.aaa.bbb:4024 [0] not initialized (yet), dropping packet. 2020-08-17 17:09:05 us=851858 event_wait : Interrupted system call (code=4) 2020-08-17 17:09:05 us=851925 SENT CONTROL [tct.ccc.c01]: 'RESTART,[N]' (status=1) 2020-08-17 17:09:07 us=854778 TCP/UDP: Closing socket 2020-08-17 17:09:07 us=855008 /usr/bin/ip route del 10.66.97.86/32 2020-08-17 17:09:07 us=859348 Closing TUN/TAP interface 2020-08-17 17:09:07 us=859411 /usr/bin/ip addr del dev tuns55111 10.55.111.1/24 2020-08-17 17:09:07 us=861734 /usr/bin/ip -6 addr del 12fc:1918::10:55:111:1/112 dev tuns55111 2020-08-17 17:09:07 us=870520 SIGTERM[hard,] received, process exiting