Mon Oct 23 21:48:17 2017 us=191138 Current Parameter Settings: Mon Oct 23 21:48:17 2017 us=191573 config = '/etc/openvpn/server.conf' Mon Oct 23 21:48:17 2017 us=191681 mode = 1 Mon Oct 23 21:48:17 2017 us=191780 persist_config = DISABLED Mon Oct 23 21:48:17 2017 us=191876 persist_mode = 1 Mon Oct 23 21:48:17 2017 us=191971 show_ciphers = DISABLED Mon Oct 23 21:48:17 2017 us=192066 show_digests = DISABLED Mon Oct 23 21:48:17 2017 us=192158 show_engines = DISABLED Mon Oct 23 21:48:17 2017 us=192252 genkey = DISABLED Mon Oct 23 21:48:17 2017 us=192345 key_pass_file = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=192440 show_tls_ciphers = DISABLED Mon Oct 23 21:48:17 2017 us=192534 connect_retry_max = 0 Mon Oct 23 21:48:17 2017 us=192629 Connection profiles [0]: Mon Oct 23 21:48:17 2017 us=192724 proto = udp Mon Oct 23 21:48:17 2017 us=192818 local = '192.168.1.64' Mon Oct 23 21:48:17 2017 us=192910 local_port = '443' Mon Oct 23 21:48:17 2017 us=193061 remote = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=193166 remote_port = '443' Mon Oct 23 21:48:17 2017 us=193259 remote_float = DISABLED Mon Oct 23 21:48:17 2017 us=193352 bind_defined = DISABLED Mon Oct 23 21:48:17 2017 us=193444 bind_local = ENABLED Mon Oct 23 21:48:17 2017 us=193537 bind_ipv6_only = DISABLED Mon Oct 23 21:48:17 2017 us=193631 connect_retry_seconds = 5 Mon Oct 23 21:48:17 2017 us=193725 connect_timeout = 120 Mon Oct 23 21:48:17 2017 us=193987 socks_proxy_server = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=194091 socks_proxy_port = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=194188 tun_mtu = 1500 Mon Oct 23 21:48:17 2017 us=194282 tun_mtu_defined = ENABLED Mon Oct 23 21:48:17 2017 us=194376 link_mtu = 1500 Mon Oct 23 21:48:17 2017 us=194493 link_mtu_defined = DISABLED Mon Oct 23 21:48:17 2017 us=194593 tun_mtu_extra = 0 Mon Oct 23 21:48:17 2017 us=194688 tun_mtu_extra_defined = DISABLED Mon Oct 23 21:48:17 2017 us=194784 mtu_discover_type = -1 Mon Oct 23 21:48:17 2017 us=194877 fragment = 0 Mon Oct 23 21:48:17 2017 us=194970 mssfix = 1450 Mon Oct 23 21:48:17 2017 us=195066 explicit_exit_notification = 0 Mon Oct 23 21:48:17 2017 us=195260 Connection profiles END Mon Oct 23 21:48:17 2017 us=195360 remote_random = DISABLED Mon Oct 23 21:48:17 2017 us=195456 ipchange = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=195550 dev = 'tun' Mon Oct 23 21:48:17 2017 us=195643 dev_type = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=195737 dev_node = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=195829 lladdr = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=195922 topology = 1 Mon Oct 23 21:48:17 2017 us=196016 ifconfig_local = '192.168.8.1' Mon Oct 23 21:48:17 2017 us=196113 ifconfig_remote_netmask = '192.168.8.2' Mon Oct 23 21:48:17 2017 us=196208 ifconfig_noexec = DISABLED Mon Oct 23 21:48:17 2017 us=196302 ifconfig_nowarn = DISABLED Mon Oct 23 21:48:17 2017 us=196395 ifconfig_ipv6_local = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=196489 ifconfig_ipv6_netbits = 0 Mon Oct 23 21:48:17 2017 us=196582 ifconfig_ipv6_remote = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=196676 shaper = 0 Mon Oct 23 21:48:17 2017 us=196768 mtu_test = 0 Mon Oct 23 21:48:17 2017 us=196861 mlock = DISABLED Mon Oct 23 21:48:17 2017 us=196954 keepalive_ping = 0 Mon Oct 23 21:48:17 2017 us=197102 keepalive_timeout = 0 Mon Oct 23 21:48:17 2017 us=197197 inactivity_timeout = 0 Mon Oct 23 21:48:17 2017 us=197293 ping_send_timeout = 30 Mon Oct 23 21:48:17 2017 us=197387 ping_rec_timeout = 0 Mon Oct 23 21:48:17 2017 us=197483 ping_rec_timeout_action = 2 Mon Oct 23 21:48:17 2017 us=197576 ping_timer_remote = DISABLED Mon Oct 23 21:48:17 2017 us=197670 remap_sigusr1 = 0 Mon Oct 23 21:48:17 2017 us=197762 persist_tun = ENABLED Mon Oct 23 21:48:17 2017 us=197857 persist_local_ip = DISABLED Mon Oct 23 21:48:17 2017 us=197949 persist_remote_ip = DISABLED Mon Oct 23 21:48:17 2017 us=198043 persist_key = ENABLED Mon Oct 23 21:48:17 2017 us=198137 passtos = DISABLED Mon Oct 23 21:48:17 2017 us=198233 resolve_retry_seconds = 1000000000 Mon Oct 23 21:48:17 2017 us=198327 resolve_in_advance = DISABLED Mon Oct 23 21:48:17 2017 us=198475 username = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=198573 groupname = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=198669 chroot_dir = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=198763 cd_dir = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=198858 writepid = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=198952 up_script = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=199046 down_script = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=199139 down_pre = DISABLED Mon Oct 23 21:48:17 2017 us=199235 up_restart = DISABLED Mon Oct 23 21:48:17 2017 us=199329 up_delay = DISABLED Mon Oct 23 21:48:17 2017 us=199424 daemon = DISABLED Mon Oct 23 21:48:17 2017 us=199516 inetd = 0 Mon Oct 23 21:48:17 2017 us=199610 log = DISABLED Mon Oct 23 21:48:17 2017 us=199704 suppress_timestamps = DISABLED Mon Oct 23 21:48:17 2017 us=199800 machine_readable_output = DISABLED Mon Oct 23 21:48:17 2017 us=199894 nice = 0 Mon Oct 23 21:48:17 2017 us=199989 verbosity = 4 Mon Oct 23 21:48:17 2017 us=200083 mute = 0 Mon Oct 23 21:48:17 2017 us=200178 gremlin = 0 Mon Oct 23 21:48:17 2017 us=200273 status_file = '/var/log/openvpn-status.log' Mon Oct 23 21:48:17 2017 us=200369 status_file_version = 1 Mon Oct 23 21:48:17 2017 us=200464 status_file_update_freq = 60 Mon Oct 23 21:48:17 2017 us=200558 occ = ENABLED Mon Oct 23 21:48:17 2017 us=200651 rcvbuf = 0 Mon Oct 23 21:48:17 2017 us=200745 sndbuf = 0 Mon Oct 23 21:48:17 2017 us=200839 mark = 0 Mon Oct 23 21:48:17 2017 us=200932 sockflags = 0 Mon Oct 23 21:48:17 2017 us=201084 fast_io = DISABLED Mon Oct 23 21:48:17 2017 us=201181 comp.alg = 4 Mon Oct 23 21:48:17 2017 us=201276 comp.flags = 4 Mon Oct 23 21:48:17 2017 us=201371 route_script = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=201468 route_default_gateway = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=201625 route_default_metric = 0 Mon Oct 23 21:48:17 2017 us=201723 route_noexec = DISABLED Mon Oct 23 21:48:17 2017 us=201819 route_delay = 0 Mon Oct 23 21:48:17 2017 us=201915 route_delay_window = 30 Mon Oct 23 21:48:17 2017 us=202010 route_delay_defined = DISABLED Mon Oct 23 21:48:17 2017 us=202104 route_nopull = DISABLED Mon Oct 23 21:48:17 2017 us=202199 route_gateway_via_dhcp = DISABLED Mon Oct 23 21:48:17 2017 us=202294 allow_pull_fqdn = DISABLED Mon Oct 23 21:48:17 2017 us=202397 route 192.168.8.0/255.255.255.0/default (not set)/default (not set) Mon Oct 23 21:48:17 2017 us=202494 management_addr = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=202589 management_port = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=202684 management_user_pass = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=202779 management_log_history_cache = 250 Mon Oct 23 21:48:17 2017 us=202875 management_echo_buffer_size = 100 Mon Oct 23 21:48:17 2017 us=202969 management_write_peer_info_file = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=203066 management_client_user = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=203160 management_client_group = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=203257 management_flags = 0 Mon Oct 23 21:48:17 2017 us=203351 shared_secret_file = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=203446 key_direction = 0 Mon Oct 23 21:48:17 2017 us=203539 ciphername = 'AES-256-GCM' Mon Oct 23 21:48:17 2017 us=203633 ncp_enabled = DISABLED Mon Oct 23 21:48:17 2017 us=203729 ncp_ciphers = 'AES-256-GCM:AES-128-GCM' Mon Oct 23 21:48:17 2017 us=203824 authname = 'SHA512' Mon Oct 23 21:48:17 2017 us=203918 prng_hash = 'SHA1' Mon Oct 23 21:48:17 2017 us=204016 prng_nonce_secret_len = 16 Mon Oct 23 21:48:17 2017 us=204111 keysize = 0 Mon Oct 23 21:48:17 2017 us=204206 engine = DISABLED Mon Oct 23 21:48:17 2017 us=204301 replay = ENABLED Mon Oct 23 21:48:17 2017 us=204397 mute_replay_warnings = DISABLED Mon Oct 23 21:48:17 2017 us=204493 replay_window = 64 Mon Oct 23 21:48:17 2017 us=204588 replay_time = 15 Mon Oct 23 21:48:17 2017 us=204684 packet_id_file = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=204780 use_iv = ENABLED Mon Oct 23 21:48:17 2017 us=204876 test_crypto = DISABLED Mon Oct 23 21:48:17 2017 us=205062 tls_server = ENABLED Mon Oct 23 21:48:17 2017 us=205168 tls_client = DISABLED Mon Oct 23 21:48:17 2017 us=205294 key_method = 2 Mon Oct 23 21:48:17 2017 us=205392 ca_file = '/etc/openvpn/easy-rsa/keys/ca.crt' Mon Oct 23 21:48:17 2017 us=205488 ca_path = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=205584 dh_file = '/etc/openvpn/easy-rsa/keys/dh2048.pem' Mon Oct 23 21:48:17 2017 us=205680 cert_file = '/etc/openvpn/easy-rsa/keys/server.crt' Mon Oct 23 21:48:17 2017 us=205776 extra_certs_file = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=205876 priv_key_file = '/etc/openvpn/easy-rsa/keys/server.key' Mon Oct 23 21:48:17 2017 us=205972 pkcs12_file = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=206069 cipher_list = 'TLS-DHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256' Mon Oct 23 21:48:17 2017 us=206164 tls_verify = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=206258 tls_export_cert = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=206352 verify_x509_type = 0 Mon Oct 23 21:48:17 2017 us=206445 verify_x509_name = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=206537 crl_file = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=206631 ns_cert_type = 0 Mon Oct 23 21:48:17 2017 us=206726 remote_cert_ku[i] = 65535 Mon Oct 23 21:48:17 2017 us=206819 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=206914 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207006 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207101 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207194 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207287 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207380 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207475 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207569 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207662 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207757 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207851 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=207943 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=208037 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=208130 remote_cert_ku[i] = 0 Mon Oct 23 21:48:17 2017 us=208227 remote_cert_eku = 'TLS Web Client Authentication' Mon Oct 23 21:48:17 2017 us=208323 ssl_flags = 192 Mon Oct 23 21:48:17 2017 us=208416 tls_timeout = 2 Mon Oct 23 21:48:17 2017 us=208547 renegotiate_bytes = -1 Mon Oct 23 21:48:17 2017 us=208647 renegotiate_packets = 0 Mon Oct 23 21:48:17 2017 us=208743 renegotiate_seconds = 3600 Mon Oct 23 21:48:17 2017 us=208838 handshake_window = 60 Mon Oct 23 21:48:17 2017 us=208934 transition_window = 3600 Mon Oct 23 21:48:17 2017 us=209081 single_session = DISABLED Mon Oct 23 21:48:17 2017 us=209178 push_peer_info = DISABLED Mon Oct 23 21:48:17 2017 us=209274 tls_exit = DISABLED Mon Oct 23 21:48:17 2017 us=209368 tls_auth_file = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=209462 tls_crypt_file = '/etc/openvpn/tc.key' Mon Oct 23 21:48:17 2017 us=209559 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=209655 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=209752 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=209848 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=209942 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210036 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210131 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210225 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210320 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210415 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210508 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210603 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210697 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210791 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=210934 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=211032 pkcs11_protected_authentication = DISABLED Mon Oct 23 21:48:17 2017 us=211133 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=211228 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=211323 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=211418 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=211516 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=211612 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=211708 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=211803 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=211898 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=211995 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=212090 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=212186 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=212281 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=212375 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=212471 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=212565 pkcs11_private_mode = 00000000 Mon Oct 23 21:48:17 2017 us=212658 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=212753 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=212848 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=212942 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=213097 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=213195 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=213291 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=213387 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=213482 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=213623 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=213720 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=213815 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=213909 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=214004 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=214123 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=214222 pkcs11_cert_private = DISABLED Mon Oct 23 21:48:17 2017 us=214320 pkcs11_pin_cache_period = -1 Mon Oct 23 21:48:17 2017 us=214413 pkcs11_id = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=214508 pkcs11_id_management = DISABLED Mon Oct 23 21:48:17 2017 us=214613 server_network = 192.168.8.0 Mon Oct 23 21:48:17 2017 us=214716 server_netmask = 255.255.255.0 Mon Oct 23 21:48:17 2017 us=214818 server_network_ipv6 = :: Mon Oct 23 21:48:17 2017 us=214916 server_netbits_ipv6 = 0 Mon Oct 23 21:48:17 2017 us=215018 server_bridge_ip = 0.0.0.0 Mon Oct 23 21:48:17 2017 us=215120 server_bridge_netmask = 0.0.0.0 Mon Oct 23 21:48:17 2017 us=215224 server_bridge_pool_start = 0.0.0.0 Mon Oct 23 21:48:17 2017 us=215326 server_bridge_pool_end = 0.0.0.0 Mon Oct 23 21:48:17 2017 us=215421 push_entry = 'redirect-gateway autolocal bypass-dhcp' Mon Oct 23 21:48:17 2017 us=215519 push_entry = 'route 192.168.1.0 255.255.255.0' Mon Oct 23 21:48:17 2017 us=215616 push_entry = 'dhcp-option DNS 192.168.1.1' Mon Oct 23 21:48:17 2017 us=215711 push_entry = 'route 192.168.8.1' Mon Oct 23 21:48:17 2017 us=215806 push_entry = 'topology net30' Mon Oct 23 21:48:17 2017 us=215900 ifconfig_pool_defined = ENABLED Mon Oct 23 21:48:17 2017 us=216002 ifconfig_pool_start = 192.168.8.4 Mon Oct 23 21:48:17 2017 us=216104 ifconfig_pool_end = 192.168.8.251 Mon Oct 23 21:48:17 2017 us=216206 ifconfig_pool_netmask = 0.0.0.0 Mon Oct 23 21:48:17 2017 us=216301 ifconfig_pool_persist_filename = 'ipp.txt' Mon Oct 23 21:48:17 2017 us=216399 ifconfig_pool_persist_refresh_freq = 600 Mon Oct 23 21:48:17 2017 us=216496 ifconfig_ipv6_pool_defined = DISABLED Mon Oct 23 21:48:17 2017 us=216598 ifconfig_ipv6_pool_base = :: Mon Oct 23 21:48:17 2017 us=216695 ifconfig_ipv6_pool_netbits = 0 Mon Oct 23 21:48:17 2017 us=216834 n_bcast_buf = 256 Mon Oct 23 21:48:17 2017 us=216933 tcp_queue_limit = 64 Mon Oct 23 21:48:17 2017 us=217080 real_hash_size = 256 Mon Oct 23 21:48:17 2017 us=217178 virtual_hash_size = 256 Mon Oct 23 21:48:17 2017 us=217273 client_connect_script = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=217368 learn_address_script = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=217463 client_disconnect_script = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=217560 client_config_dir = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=217654 ccd_exclusive = DISABLED Mon Oct 23 21:48:17 2017 us=217750 tmp_dir = '/tmp' Mon Oct 23 21:48:17 2017 us=217847 push_ifconfig_defined = DISABLED Mon Oct 23 21:48:17 2017 us=217950 push_ifconfig_local = 0.0.0.0 Mon Oct 23 21:48:17 2017 us=218054 push_ifconfig_remote_netmask = 0.0.0.0 Mon Oct 23 21:48:17 2017 us=218147 push_ifconfig_ipv6_defined = DISABLED Mon Oct 23 21:48:17 2017 us=218249 push_ifconfig_ipv6_local = ::/0 Mon Oct 23 21:48:17 2017 us=218350 push_ifconfig_ipv6_remote = :: Mon Oct 23 21:48:17 2017 us=218446 enable_c2c = DISABLED Mon Oct 23 21:48:17 2017 us=218542 duplicate_cn = DISABLED Mon Oct 23 21:48:17 2017 us=218636 cf_max = 0 Mon Oct 23 21:48:17 2017 us=218732 cf_per = 0 Mon Oct 23 21:48:17 2017 us=218826 max_clients = 3 Mon Oct 23 21:48:17 2017 us=218922 max_routes_per_client = 256 Mon Oct 23 21:48:17 2017 us=219017 auth_user_pass_verify_script = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=219115 auth_user_pass_verify_script_via_file = DISABLED Mon Oct 23 21:48:17 2017 us=219209 auth_token_generate = DISABLED Mon Oct 23 21:48:17 2017 us=219305 auth_token_lifetime = 0 Mon Oct 23 21:48:17 2017 us=219400 port_share_host = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=219495 port_share_port = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=219588 client = DISABLED Mon Oct 23 21:48:17 2017 us=219682 pull = DISABLED Mon Oct 23 21:48:17 2017 us=219776 auth_user_pass_file = '[UNDEF]' Mon Oct 23 21:48:17 2017 us=219882 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017 Mon Oct 23 21:48:17 2017 us=220010 library versions: OpenSSL 1.0.1f 6 Jan 2014, LZO 2.06 Mon Oct 23 21:48:17 2017 us=220623 WARNING: --ping should normally be used with --ping-restart or --ping-exit Mon Oct 23 21:48:17 2017 us=220728 WARNING: --keepalive option is missing from server config Mon Oct 23 21:48:17 2017 us=297831 Diffie-Hellman initialized with 2048 bit key Mon Oct 23 21:48:17 2017 us=299656 Failed to extract curve from certificate (UNDEF), using secp384r1 instead. Mon Oct 23 21:48:17 2017 us=299745 ECDH curve secp384r1 added Mon Oct 23 21:48:17 2017 us=300127 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mon Oct 23 21:48:17 2017 us=300212 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mon Oct 23 21:48:17 2017 us=300272 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key Mon Oct 23 21:48:17 2017 us=300342 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication Mon Oct 23 21:48:17 2017 us=300413 TLS-Auth MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Mon Oct 23 21:48:17 2017 us=300844 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=00:24:27:fe:4c:15 Mon Oct 23 21:48:17 2017 us=302082 TUN/TAP device tun0 opened Mon Oct 23 21:48:17 2017 us=302195 TUN/TAP TX queue length set to 100 Mon Oct 23 21:48:17 2017 us=302275 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Mon Oct 23 21:48:17 2017 us=302361 /sbin/ip link set dev tun0 up mtu 1500 Mon Oct 23 21:48:17 2017 us=306443 /sbin/ip addr add dev tun0 local 192.168.8.1 peer 192.168.8.2 Mon Oct 23 21:48:17 2017 us=310226 /sbin/ip route add 192.168.8.0/24 via 192.168.8.2 Mon Oct 23 21:48:17 2017 us=314924 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Mon Oct 23 21:48:17 2017 us=315038 Could not determine IPv4/IPv6 protocol. Using AF_INET Mon Oct 23 21:48:17 2017 us=315116 Socket Buffers: R=[212992->212992] S=[212992->212992] Mon Oct 23 21:48:17 2017 us=315227 UDPv4 link local (bound): [AF_INET]192.168.1.64:443 Mon Oct 23 21:48:17 2017 us=315278 UDPv4 link remote: [AF_UNSPEC] Mon Oct 23 21:48:17 2017 us=315340 MULTI: multi_init called, r=256 v=256 Mon Oct 23 21:48:17 2017 us=315450 IFCONFIG POOL: base=192.168.8.4 size=62, ipv6=0 Mon Oct 23 21:48:17 2017 us=324537 ifconfig_pool_read(), in='phone,192.168.8.4', TODO: IPv6 Mon Oct 23 21:48:17 2017 us=324623 succeeded -> ifconfig_pool_set() Mon Oct 23 21:48:17 2017 us=324675 IFCONFIG POOL LIST Mon Oct 23 21:48:17 2017 us=324725 phone,192.168.8.4 Mon Oct 23 21:48:17 2017 us=324825 Initialization Sequence Completed Mon Oct 23 21:48:46 2017 us=113151 MULTI: multi_create_instance called Mon Oct 23 21:48:46 2017 us=113509 192.168.1.1:57131 Re-using SSL/TLS context Mon Oct 23 21:48:46 2017 us=113641 192.168.1.1:57131 LZ4 compression initializing Mon Oct 23 21:48:46 2017 us=114311 192.168.1.1:57131 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Mon Oct 23 21:48:46 2017 us=114428 192.168.1.1:57131 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Mon Oct 23 21:48:46 2017 us=114669 192.168.1.1:57131 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Mon Oct 23 21:48:46 2017 us=114810 192.168.1.1:57131 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Mon Oct 23 21:48:46 2017 us=115026 192.168.1.1:57131 TLS: Initial packet from [AF_INET]192.168.1.1:57131, sid=9aaed749 bd0dad3b Mon Oct 23 21:48:46 2017 us=422735 192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Mon Oct 23 21:48:46 2017 us=424713 192.168.1.1:57131 VERIFY KU OK Mon Oct 23 21:48:46 2017 us=424842 192.168.1.1:57131 Validating certificate extended key usage Mon Oct 23 21:48:46 2017 us=424944 192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Mon Oct 23 21:48:46 2017 us=425087 192.168.1.1:57131 VERIFY EKU OK Mon Oct 23 21:48:46 2017 us=425180 192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Mon Oct 23 21:48:46 2017 us=528521 192.168.1.1:57131 peer info: IV_VER=2.5_master Mon Oct 23 21:48:46 2017 us=528705 192.168.1.1:57131 peer info: IV_PLAT=android Mon Oct 23 21:48:46 2017 us=528806 192.168.1.1:57131 peer info: IV_PROTO=2 Mon Oct 23 21:48:46 2017 us=528903 192.168.1.1:57131 peer info: IV_LZ4=1 Mon Oct 23 21:48:46 2017 us=529080 192.168.1.1:57131 peer info: IV_LZ4v2=1 Mon Oct 23 21:48:46 2017 us=529187 192.168.1.1:57131 peer info: IV_LZO=1 Mon Oct 23 21:48:46 2017 us=529285 192.168.1.1:57131 peer info: IV_COMP_STUB=1 Mon Oct 23 21:48:46 2017 us=529384 192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Mon Oct 23 21:48:46 2017 us=529481 192.168.1.1:57131 peer info: IV_TCPNL=1 Mon Oct 23 21:48:46 2017 us=529581 192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Mon Oct 23 21:48:46 2017 us=530308 192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Oct 23 21:48:46 2017 us=530436 192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Oct 23 21:48:46 2017 us=534911 192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Mon Oct 23 21:48:46 2017 us=535189 192.168.1.1:57131 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:57131 Mon Oct 23 21:48:46 2017 us=535403 phone/192.168.1.1:57131 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Mon Oct 23 21:48:46 2017 us=535741 phone/192.168.1.1:57131 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:57131 Mon Oct 23 21:48:46 2017 us=535854 phone/192.168.1.1:57131 MULTI: primary virtual IP for phone/192.168.1.1:57131: 192.168.8.6 Mon Oct 23 21:48:47 2017 us=649582 phone/192.168.1.1:57131 PUSH: Received control message: 'PUSH_REQUEST' Mon Oct 23 21:48:47 2017 us=649918 phone/192.168.1.1:57131 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) Mon Oct 23 21:52:39 2017 us=800910 Float requested for peer 0 to 172.56.39.104:23919 Mon Oct 23 21:52:39 2017 us=801289 peer 0 (phone) floated from 192.168.1.1:57131 to [AF_INET]172.56.39.104:23919 Mon Oct 23 21:53:25 2017 us=777935 Float requested for peer 0 to 192.168.1.1:57131 Mon Oct 23 21:53:25 2017 us=778233 peer 0 (phone) floated from 172.56.39.104:23919 to [AF_INET]192.168.1.1:57131 Mon Oct 23 22:48:47 2017 us=24269 phone/192.168.1.1:57131 TLS: soft reset sec=-1 bytes=2155185/-1 pkts=5515/0 Mon Oct 23 22:48:47 2017 us=550326 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Mon Oct 23 22:48:47 2017 us=552319 phone/192.168.1.1:57131 VERIFY KU OK Mon Oct 23 22:48:47 2017 us=552453 phone/192.168.1.1:57131 Validating certificate extended key usage Mon Oct 23 22:48:47 2017 us=552559 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Mon Oct 23 22:48:47 2017 us=552654 phone/192.168.1.1:57131 VERIFY EKU OK Mon Oct 23 22:48:47 2017 us=552746 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Mon Oct 23 22:48:47 2017 us=659373 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master Mon Oct 23 22:48:47 2017 us=659566 phone/192.168.1.1:57131 peer info: IV_PLAT=android Mon Oct 23 22:48:47 2017 us=659674 phone/192.168.1.1:57131 peer info: IV_PROTO=2 Mon Oct 23 22:48:47 2017 us=659778 phone/192.168.1.1:57131 peer info: IV_LZ4=1 Mon Oct 23 22:48:47 2017 us=659879 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 Mon Oct 23 22:48:47 2017 us=659983 phone/192.168.1.1:57131 peer info: IV_LZO=1 Mon Oct 23 22:48:47 2017 us=660088 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 Mon Oct 23 22:48:47 2017 us=660189 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Mon Oct 23 22:48:47 2017 us=660291 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 Mon Oct 23 22:48:47 2017 us=660395 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Mon Oct 23 22:48:47 2017 us=661224 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Oct 23 22:48:47 2017 us=661354 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Oct 23 22:48:47 2017 us=666466 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Mon Oct 23 23:48:47 2017 us=756306 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=594380/-1 pkts=2193/0 Mon Oct 23 23:48:48 2017 us=694325 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Mon Oct 23 23:48:48 2017 us=696307 phone/192.168.1.1:57131 VERIFY KU OK Mon Oct 23 23:48:48 2017 us=696434 phone/192.168.1.1:57131 Validating certificate extended key usage Mon Oct 23 23:48:48 2017 us=696543 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Mon Oct 23 23:48:48 2017 us=696638 phone/192.168.1.1:57131 VERIFY EKU OK Mon Oct 23 23:48:48 2017 us=696732 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Mon Oct 23 23:48:48 2017 us=801768 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master Mon Oct 23 23:48:48 2017 us=801956 phone/192.168.1.1:57131 peer info: IV_PLAT=android Mon Oct 23 23:48:48 2017 us=802063 phone/192.168.1.1:57131 peer info: IV_PROTO=2 Mon Oct 23 23:48:48 2017 us=802166 phone/192.168.1.1:57131 peer info: IV_LZ4=1 Mon Oct 23 23:48:48 2017 us=802334 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 Mon Oct 23 23:48:48 2017 us=802437 phone/192.168.1.1:57131 peer info: IV_LZO=1 Mon Oct 23 23:48:48 2017 us=802537 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 Mon Oct 23 23:48:48 2017 us=802636 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Mon Oct 23 23:48:48 2017 us=802735 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 Mon Oct 23 23:48:48 2017 us=802834 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Mon Oct 23 23:48:48 2017 us=803566 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Oct 23 23:48:48 2017 us=803698 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Mon Oct 23 23:48:48 2017 us=811107 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 00:48:47 2017 us=281447 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key Tue Oct 24 00:48:48 2017 us=474187 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=516743/-1 pkts=2308/0 Tue Oct 24 00:48:53 2017 us=732577 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 00:48:53 2017 us=734713 phone/192.168.1.1:57131 VERIFY KU OK Tue Oct 24 00:48:53 2017 us=734855 phone/192.168.1.1:57131 Validating certificate extended key usage Tue Oct 24 00:48:53 2017 us=734967 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 00:48:53 2017 us=735063 phone/192.168.1.1:57131 VERIFY EKU OK Tue Oct 24 00:48:53 2017 us=735156 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 00:48:53 2017 us=849423 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master Tue Oct 24 00:48:53 2017 us=849615 phone/192.168.1.1:57131 peer info: IV_PLAT=android Tue Oct 24 00:48:53 2017 us=849723 phone/192.168.1.1:57131 peer info: IV_PROTO=2 Tue Oct 24 00:48:53 2017 us=849825 phone/192.168.1.1:57131 peer info: IV_LZ4=1 Tue Oct 24 00:48:53 2017 us=849927 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 Tue Oct 24 00:48:53 2017 us=850028 phone/192.168.1.1:57131 peer info: IV_LZO=1 Tue Oct 24 00:48:53 2017 us=850130 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 Tue Oct 24 00:48:53 2017 us=850234 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Tue Oct 24 00:48:53 2017 us=850337 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 Tue Oct 24 00:48:53 2017 us=850440 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 00:48:53 2017 us=851181 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 00:48:53 2017 us=851314 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 00:48:53 2017 us=856633 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 01:48:48 2017 us=857869 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key Tue Oct 24 01:48:54 2017 us=95878 phone/192.168.1.1:57131 TLS: soft reset sec=-1 bytes=483731/-1 pkts=2147/0 Tue Oct 24 01:48:54 2017 us=658119 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 01:48:54 2017 us=660155 phone/192.168.1.1:57131 VERIFY KU OK Tue Oct 24 01:48:54 2017 us=660288 phone/192.168.1.1:57131 Validating certificate extended key usage Tue Oct 24 01:48:54 2017 us=660396 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 01:48:54 2017 us=660493 phone/192.168.1.1:57131 VERIFY EKU OK Tue Oct 24 01:48:54 2017 us=660587 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 01:48:54 2017 us=763903 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master Tue Oct 24 01:48:54 2017 us=764149 phone/192.168.1.1:57131 peer info: IV_PLAT=android Tue Oct 24 01:48:54 2017 us=764256 phone/192.168.1.1:57131 peer info: IV_PROTO=2 Tue Oct 24 01:48:54 2017 us=764355 phone/192.168.1.1:57131 peer info: IV_LZ4=1 Tue Oct 24 01:48:54 2017 us=764453 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 Tue Oct 24 01:48:54 2017 us=764550 phone/192.168.1.1:57131 peer info: IV_LZO=1 Tue Oct 24 01:48:54 2017 us=764647 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 Tue Oct 24 01:48:54 2017 us=764745 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Tue Oct 24 01:48:54 2017 us=764844 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 Tue Oct 24 01:48:54 2017 us=764942 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 01:48:54 2017 us=765746 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 01:48:54 2017 us=765875 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 01:48:54 2017 us=769773 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 02:48:54 2017 us=701177 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=624107/-1 pkts=2481/0 Tue Oct 24 02:48:56 2017 us=205868 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 02:48:56 2017 us=207874 phone/192.168.1.1:57131 VERIFY KU OK Tue Oct 24 02:48:56 2017 us=208017 phone/192.168.1.1:57131 Validating certificate extended key usage Tue Oct 24 02:48:56 2017 us=208125 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 02:48:56 2017 us=208221 phone/192.168.1.1:57131 VERIFY EKU OK Tue Oct 24 02:48:56 2017 us=208316 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 02:48:56 2017 us=310652 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master Tue Oct 24 02:48:56 2017 us=310843 phone/192.168.1.1:57131 peer info: IV_PLAT=android Tue Oct 24 02:48:56 2017 us=310949 phone/192.168.1.1:57131 peer info: IV_PROTO=2 Tue Oct 24 02:48:56 2017 us=311052 phone/192.168.1.1:57131 peer info: IV_LZ4=1 Tue Oct 24 02:48:56 2017 us=311153 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 Tue Oct 24 02:48:56 2017 us=311254 phone/192.168.1.1:57131 peer info: IV_LZO=1 Tue Oct 24 02:48:56 2017 us=311356 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 Tue Oct 24 02:48:56 2017 us=311459 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Tue Oct 24 02:48:56 2017 us=311560 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 Tue Oct 24 02:48:56 2017 us=311661 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 02:48:56 2017 us=312403 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 02:48:56 2017 us=312533 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 02:48:56 2017 us=317103 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 03:48:54 2017 us=350527 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key Tue Oct 24 03:48:56 2017 us=514322 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=356379/-1 pkts=1641/0 Tue Oct 24 03:49:00 2017 us=34337 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 03:49:00 2017 us=36357 phone/192.168.1.1:57131 VERIFY KU OK Tue Oct 24 03:49:00 2017 us=36518 phone/192.168.1.1:57131 Validating certificate extended key usage Tue Oct 24 03:49:00 2017 us=36628 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 03:49:00 2017 us=36726 phone/192.168.1.1:57131 VERIFY EKU OK Tue Oct 24 03:49:00 2017 us=36883 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 03:49:00 2017 us=142833 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master Tue Oct 24 03:49:00 2017 us=143031 phone/192.168.1.1:57131 peer info: IV_PLAT=android Tue Oct 24 03:49:00 2017 us=143135 phone/192.168.1.1:57131 peer info: IV_PROTO=2 Tue Oct 24 03:49:00 2017 us=143234 phone/192.168.1.1:57131 peer info: IV_LZ4=1 Tue Oct 24 03:49:00 2017 us=143331 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 Tue Oct 24 03:49:00 2017 us=143429 phone/192.168.1.1:57131 peer info: IV_LZO=1 Tue Oct 24 03:49:00 2017 us=143528 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 Tue Oct 24 03:49:00 2017 us=143628 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Tue Oct 24 03:49:00 2017 us=143727 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 Tue Oct 24 03:49:00 2017 us=143826 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 03:49:00 2017 us=144563 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 03:49:00 2017 us=144695 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 03:49:00 2017 us=149016 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 04:02:59 2017 us=889660 phone/192.168.1.1:57131 PID_ERR replay-window backtrack occurred [127] [SSL-6] [0000000000000000000000000000000000000000000000000000000000000000] 0:35491 0:35364 t=1508839379[0] r=[-4,64,15,127,1] sl=[29,64,64,528] Tue Oct 24 04:02:59 2017 us=889751 phone/192.168.1.1:57131 PID_ERR large diff [127] [SSL-6] [0000000000000000000000000000000000000000000000000000000000000000] 0:35491 0:35364 t=1508839379[0] r=[-4,64,15,127,1] sl=[29,64,64,528] Tue Oct 24 04:02:59 2017 us=889775 phone/192.168.1.1:57131 AEAD Decrypt error: bad packet ID (may be a replay): [ #35364 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings Tue Oct 24 04:43:10 2017 us=460926 Float requested for peer 0 to 192.168.1.1:1024 Tue Oct 24 04:43:10 2017 us=461309 peer 0 (phone) floated from 192.168.1.1:57131 to [AF_INET]192.168.1.1:1024 Tue Oct 24 04:43:10 2017 us=462335 Float requested for peer 0 to 192.168.1.1:57131 Tue Oct 24 04:43:10 2017 us=462494 peer 0 (phone) floated from 192.168.1.1:1024 to [AF_INET]192.168.1.1:57131 Tue Oct 24 04:48:56 2017 us=197945 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key Tue Oct 24 04:49:00 2017 us=326091 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=594131847/-1 pkts=661581/0 Tue Oct 24 04:49:00 2017 us=921726 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 04:49:00 2017 us=923710 phone/192.168.1.1:57131 VERIFY KU OK Tue Oct 24 04:49:00 2017 us=923847 phone/192.168.1.1:57131 Validating certificate extended key usage Tue Oct 24 04:49:00 2017 us=923957 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 04:49:00 2017 us=924053 phone/192.168.1.1:57131 VERIFY EKU OK Tue Oct 24 04:49:00 2017 us=924147 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 04:49:01 2017 us=146758 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master Tue Oct 24 04:49:01 2017 us=146952 phone/192.168.1.1:57131 peer info: IV_PLAT=android Tue Oct 24 04:49:01 2017 us=147059 phone/192.168.1.1:57131 peer info: IV_PROTO=2 Tue Oct 24 04:49:01 2017 us=147159 phone/192.168.1.1:57131 peer info: IV_LZ4=1 Tue Oct 24 04:49:01 2017 us=147261 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 Tue Oct 24 04:49:01 2017 us=147363 phone/192.168.1.1:57131 peer info: IV_LZO=1 Tue Oct 24 04:49:01 2017 us=147464 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 Tue Oct 24 04:49:01 2017 us=147629 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Tue Oct 24 04:49:01 2017 us=147733 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 Tue Oct 24 04:49:01 2017 us=147834 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 04:49:01 2017 us=148570 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 04:49:01 2017 us=148698 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 04:49:01 2017 us=154527 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 05:49:00 2017 us=945541 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key Tue Oct 24 05:49:01 2017 us=993765 phone/192.168.1.1:57131 TLS: soft reset sec=0 bytes=628698/-1 pkts=2136/0 Tue Oct 24 05:49:08 2017 us=307602 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 05:49:08 2017 us=310304 phone/192.168.1.1:57131 VERIFY KU OK Tue Oct 24 05:49:08 2017 us=310466 phone/192.168.1.1:57131 Validating certificate extended key usage Tue Oct 24 05:49:08 2017 us=310577 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 05:49:08 2017 us=310672 phone/192.168.1.1:57131 VERIFY EKU OK Tue Oct 24 05:49:08 2017 us=310766 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 05:49:08 2017 us=447972 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master Tue Oct 24 05:49:08 2017 us=448169 phone/192.168.1.1:57131 peer info: IV_PLAT=android Tue Oct 24 05:49:08 2017 us=448275 phone/192.168.1.1:57131 peer info: IV_PROTO=2 Tue Oct 24 05:49:08 2017 us=448378 phone/192.168.1.1:57131 peer info: IV_LZ4=1 Tue Oct 24 05:49:08 2017 us=448478 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 Tue Oct 24 05:49:08 2017 us=448577 phone/192.168.1.1:57131 peer info: IV_LZO=1 Tue Oct 24 05:49:08 2017 us=448678 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 Tue Oct 24 05:49:08 2017 us=448779 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Tue Oct 24 05:49:08 2017 us=448881 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 Tue Oct 24 05:49:08 2017 us=449058 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 05:49:08 2017 us=449926 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 05:49:08 2017 us=450088 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 05:49:08 2017 us=460305 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 06:49:01 2017 us=272937 phone/192.168.1.1:57131 TLS: tls_process: killed expiring key Tue Oct 24 06:49:08 2017 us=680505 phone/192.168.1.1:57131 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 06:49:08 2017 us=682608 phone/192.168.1.1:57131 VERIFY KU OK Tue Oct 24 06:49:08 2017 us=682758 phone/192.168.1.1:57131 Validating certificate extended key usage Tue Oct 24 06:49:08 2017 us=682867 phone/192.168.1.1:57131 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 06:49:08 2017 us=682965 phone/192.168.1.1:57131 VERIFY EKU OK Tue Oct 24 06:49:08 2017 us=683060 phone/192.168.1.1:57131 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 06:49:08 2017 us=790405 phone/192.168.1.1:57131 peer info: IV_VER=2.5_master Tue Oct 24 06:49:08 2017 us=790585 phone/192.168.1.1:57131 peer info: IV_PLAT=android Tue Oct 24 06:49:08 2017 us=790693 phone/192.168.1.1:57131 peer info: IV_PROTO=2 Tue Oct 24 06:49:08 2017 us=790795 phone/192.168.1.1:57131 peer info: IV_LZ4=1 Tue Oct 24 06:49:08 2017 us=790897 phone/192.168.1.1:57131 peer info: IV_LZ4v2=1 Tue Oct 24 06:49:08 2017 us=791080 phone/192.168.1.1:57131 peer info: IV_LZO=1 Tue Oct 24 06:49:08 2017 us=791182 phone/192.168.1.1:57131 peer info: IV_COMP_STUB=1 Tue Oct 24 06:49:08 2017 us=791281 phone/192.168.1.1:57131 peer info: IV_COMP_STUBv2=1 Tue Oct 24 06:49:08 2017 us=791379 phone/192.168.1.1:57131 peer info: IV_TCPNL=1 Tue Oct 24 06:49:08 2017 us=791519 phone/192.168.1.1:57131 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 06:49:08 2017 us=792247 phone/192.168.1.1:57131 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 06:49:08 2017 us=792377 phone/192.168.1.1:57131 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 06:49:08 2017 us=803333 phone/192.168.1.1:57131 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 07:07:12 2017 us=679519 Float requested for peer 0 to 172.56.39.254:46919 Tue Oct 24 07:07:12 2017 us=680246 peer 0 (phone) floated from 192.168.1.1:57131 to [AF_INET]172.56.39.254:46919 Tue Oct 24 07:07:15 2017 us=941365 Float requested for peer 0 to 192.168.1.1:57131 Tue Oct 24 07:07:15 2017 us=941624 peer 0 (phone) floated from 172.56.39.254:46919 to [AF_INET]192.168.1.1:57131 Tue Oct 24 07:07:49 2017 us=4224 MULTI: multi_create_instance called Tue Oct 24 07:07:49 2017 us=12804 192.168.1.1:56035 Re-using SSL/TLS context Tue Oct 24 07:07:49 2017 us=12907 192.168.1.1:56035 LZ4 compression initializing Tue Oct 24 07:07:49 2017 us=13146 192.168.1.1:56035 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 07:07:49 2017 us=13182 192.168.1.1:56035 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 07:07:49 2017 us=13268 192.168.1.1:56035 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 07:07:49 2017 us=13305 192.168.1.1:56035 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 07:07:49 2017 us=13380 192.168.1.1:56035 TLS: Initial packet from [AF_INET]192.168.1.1:56035, sid=8bef5a22 9492a94c Tue Oct 24 07:07:49 2017 us=329720 192.168.1.1:56035 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 07:07:49 2017 us=330259 192.168.1.1:56035 VERIFY KU OK Tue Oct 24 07:07:49 2017 us=330304 192.168.1.1:56035 Validating certificate extended key usage Tue Oct 24 07:07:49 2017 us=330331 192.168.1.1:56035 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 07:07:49 2017 us=330355 192.168.1.1:56035 VERIFY EKU OK Tue Oct 24 07:07:49 2017 us=330378 192.168.1.1:56035 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 07:07:49 2017 us=359096 192.168.1.1:56035 peer info: IV_VER=2.5_master Tue Oct 24 07:07:49 2017 us=359177 192.168.1.1:56035 peer info: IV_PLAT=android Tue Oct 24 07:07:49 2017 us=359202 192.168.1.1:56035 peer info: IV_PROTO=2 Tue Oct 24 07:07:49 2017 us=359226 192.168.1.1:56035 peer info: IV_LZ4=1 Tue Oct 24 07:07:49 2017 us=359250 192.168.1.1:56035 peer info: IV_LZ4v2=1 Tue Oct 24 07:07:49 2017 us=359273 192.168.1.1:56035 peer info: IV_LZO=1 Tue Oct 24 07:07:49 2017 us=359297 192.168.1.1:56035 peer info: IV_COMP_STUB=1 Tue Oct 24 07:07:49 2017 us=359320 192.168.1.1:56035 peer info: IV_COMP_STUBv2=1 Tue Oct 24 07:07:49 2017 us=359344 192.168.1.1:56035 peer info: IV_TCPNL=1 Tue Oct 24 07:07:49 2017 us=359368 192.168.1.1:56035 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 07:07:49 2017 us=359545 192.168.1.1:56035 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 07:07:49 2017 us=359576 192.168.1.1:56035 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 07:07:49 2017 us=362662 192.168.1.1:56035 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 07:07:49 2017 us=362982 192.168.1.1:56035 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:56035 Tue Oct 24 07:07:49 2017 us=372749 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 07:07:49 2017 us=372917 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 07:07:49 2017 us=373376 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:56035 Tue Oct 24 07:07:49 2017 us=373479 MULTI: primary virtual IP for phone/192.168.1.1:56035: 192.168.8.6 Tue Oct 24 07:07:50 2017 us=384442 phone/192.168.1.1:56035 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 07:07:50 2017 us=384658 phone/192.168.1.1:56035 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) Tue Oct 24 07:47:19 2017 us=674031 phone/192.168.1.1:56035 PID_ERR replay-window backtrack occurred [120] [SSL-0] [0000000000000000000000000000000000000000000000000000000000000000] 0:712213 0:712093 t=1508852839[0] r=[-3,64,15,120,1] sl=[43,64,64,528] Tue Oct 24 07:47:19 2017 us=675952 phone/192.168.1.1:56035 PID_ERR large diff [120] [SSL-0] [0000000000000000000000000000000000000000000000000000000000000000] 0:712213 0:712093 t=1508852839[0] r=[-3,64,15,120,1] sl=[43,64,64,528] Tue Oct 24 07:47:19 2017 us=675982 phone/192.168.1.1:56035 AEAD Decrypt error: bad packet ID (may be a replay): [ #712093 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings Tue Oct 24 08:07:49 2017 us=808265 phone/192.168.1.1:56035 TLS: soft reset sec=0 bytes=1481829476/-1 pkts=1795127/0 Tue Oct 24 08:07:50 2017 us=582853 phone/192.168.1.1:56035 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 08:07:50 2017 us=584847 phone/192.168.1.1:56035 VERIFY KU OK Tue Oct 24 08:07:50 2017 us=585057 phone/192.168.1.1:56035 Validating certificate extended key usage Tue Oct 24 08:07:50 2017 us=585177 phone/192.168.1.1:56035 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 08:07:50 2017 us=585273 phone/192.168.1.1:56035 VERIFY EKU OK Tue Oct 24 08:07:50 2017 us=585367 phone/192.168.1.1:56035 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 08:07:50 2017 us=689286 phone/192.168.1.1:56035 peer info: IV_VER=2.5_master Tue Oct 24 08:07:50 2017 us=689482 phone/192.168.1.1:56035 peer info: IV_PLAT=android Tue Oct 24 08:07:50 2017 us=689590 phone/192.168.1.1:56035 peer info: IV_PROTO=2 Tue Oct 24 08:07:50 2017 us=689694 phone/192.168.1.1:56035 peer info: IV_LZ4=1 Tue Oct 24 08:07:50 2017 us=689797 phone/192.168.1.1:56035 peer info: IV_LZ4v2=1 Tue Oct 24 08:07:50 2017 us=689901 phone/192.168.1.1:56035 peer info: IV_LZO=1 Tue Oct 24 08:07:50 2017 us=690006 phone/192.168.1.1:56035 peer info: IV_COMP_STUB=1 Tue Oct 24 08:07:50 2017 us=690109 phone/192.168.1.1:56035 peer info: IV_COMP_STUBv2=1 Tue Oct 24 08:07:50 2017 us=690212 phone/192.168.1.1:56035 peer info: IV_TCPNL=1 Tue Oct 24 08:07:50 2017 us=690317 phone/192.168.1.1:56035 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 08:07:50 2017 us=697560 phone/192.168.1.1:56035 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 08:07:50 2017 us=697738 phone/192.168.1.1:56035 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 08:07:50 2017 us=703032 phone/192.168.1.1:56035 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 08:55:58 2017 us=74359 Float requested for peer 1 to 172.56.39.156:21857 Tue Oct 24 08:55:58 2017 us=74719 peer 1 (phone) floated from 192.168.1.1:56035 to [AF_INET]172.56.39.156:21857 Tue Oct 24 09:02:57 2017 us=216606 phone/172.56.39.156:21857 PID_ERR replay [0] [SSL-1] [0001111>>>>>>>>>>>>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:13269 0:13269 t=1508857377[0] r=[-1,64,15,0,1] sl=[43,64,64,528] Tue Oct 24 09:02:57 2017 us=216814 phone/172.56.39.156:21857 AEAD Decrypt error: bad packet ID (may be a replay): [ #13269 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings Tue Oct 24 09:04:05 2017 us=675153 Float requested for peer 1 to 65.44.211.33:56035 Tue Oct 24 09:04:05 2017 us=675421 peer 1 (phone) floated from 172.56.39.156:21857 to [AF_INET]65.44.211.33:56035 Tue Oct 24 09:07:49 2017 us=160672 phone/65.44.211.33:56035 TLS: tls_process: killed expiring key Tue Oct 24 09:07:50 2017 us=206082 phone/65.44.211.33:56035 TLS: soft reset sec=0 bytes=15345712/-1 pkts=29728/0 Tue Oct 24 09:07:50 2017 us=818669 phone/65.44.211.33:56035 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 09:07:50 2017 us=820737 phone/65.44.211.33:56035 VERIFY KU OK Tue Oct 24 09:07:50 2017 us=820873 phone/65.44.211.33:56035 Validating certificate extended key usage Tue Oct 24 09:07:50 2017 us=821079 phone/65.44.211.33:56035 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 09:07:50 2017 us=821190 phone/65.44.211.33:56035 VERIFY EKU OK Tue Oct 24 09:07:50 2017 us=821286 phone/65.44.211.33:56035 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 09:07:50 2017 us=968409 phone/65.44.211.33:56035 peer info: IV_VER=2.5_master Tue Oct 24 09:07:50 2017 us=968605 phone/65.44.211.33:56035 peer info: IV_PLAT=android Tue Oct 24 09:07:50 2017 us=968714 phone/65.44.211.33:56035 peer info: IV_PROTO=2 Tue Oct 24 09:07:50 2017 us=968858 phone/65.44.211.33:56035 peer info: IV_LZ4=1 Tue Oct 24 09:07:50 2017 us=968963 phone/65.44.211.33:56035 peer info: IV_LZ4v2=1 Tue Oct 24 09:07:50 2017 us=969150 phone/65.44.211.33:56035 peer info: IV_LZO=1 Tue Oct 24 09:07:50 2017 us=969254 phone/65.44.211.33:56035 peer info: IV_COMP_STUB=1 Tue Oct 24 09:07:50 2017 us=969358 phone/65.44.211.33:56035 peer info: IV_COMP_STUBv2=1 Tue Oct 24 09:07:50 2017 us=969460 phone/65.44.211.33:56035 peer info: IV_TCPNL=1 Tue Oct 24 09:07:50 2017 us=969564 phone/65.44.211.33:56035 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 09:07:50 2017 us=970305 phone/65.44.211.33:56035 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 09:07:50 2017 us=970438 phone/65.44.211.33:56035 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 09:07:50 2017 us=990680 phone/65.44.211.33:56035 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 09:10:01 2017 us=760064 Float requested for peer 1 to 208.54.5.144:42557 Tue Oct 24 09:10:01 2017 us=760346 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]208.54.5.144:42557 Tue Oct 24 09:10:31 2017 us=637980 Float requested for peer 1 to 65.44.211.33:56035 Tue Oct 24 09:10:31 2017 us=638257 peer 1 (phone) floated from 208.54.5.144:42557 to [AF_INET]65.44.211.33:56035 Tue Oct 24 09:12:42 2017 us=866963 Float requested for peer 1 to 172.56.38.172:24111 Tue Oct 24 09:12:42 2017 us=867239 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 Tue Oct 24 09:13:51 2017 us=800919 Float requested for peer 1 to 65.44.211.33:56035 Tue Oct 24 09:13:51 2017 us=801247 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 Tue Oct 24 09:14:18 2017 us=971436 Float requested for peer 1 to 172.56.38.172:24111 Tue Oct 24 09:14:18 2017 us=971711 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 Tue Oct 24 09:14:23 2017 us=38579 Float requested for peer 1 to 65.44.211.33:56035 Tue Oct 24 09:14:23 2017 us=38853 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 Tue Oct 24 09:14:35 2017 us=277075 Float requested for peer 1 to 172.56.38.172:24111 Tue Oct 24 09:14:35 2017 us=277349 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 Tue Oct 24 09:14:39 2017 us=195893 Float requested for peer 1 to 65.44.211.33:56035 Tue Oct 24 09:14:39 2017 us=196171 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 Tue Oct 24 09:15:53 2017 us=747351 Float requested for peer 1 to 172.56.38.172:24111 Tue Oct 24 09:15:53 2017 us=747636 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 Tue Oct 24 09:16:37 2017 us=533340 Float requested for peer 1 to 65.44.211.33:56035 Tue Oct 24 09:16:37 2017 us=533645 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 Tue Oct 24 09:16:37 2017 us=571974 Float requested for peer 1 to 172.56.38.172:24111 Tue Oct 24 09:16:37 2017 us=572272 PID_ERR replay-window backtrack occurred [2] [SSL-2] [00_EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:2629 0:2627 t=1508858197[0] r=[0,64,15,2,1] sl=[59,64,64,528] Tue Oct 24 09:16:37 2017 us=572428 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.38.172:24111 Tue Oct 24 09:16:37 2017 us=602145 Float requested for peer 1 to 65.44.211.33:56035 Tue Oct 24 09:16:37 2017 us=602411 peer 1 (phone) floated from 172.56.38.172:24111 to [AF_INET]65.44.211.33:56035 Tue Oct 24 09:28:41 2017 us=430041 Float requested for peer 1 to 172.56.39.178:49779 Tue Oct 24 09:28:41 2017 us=430318 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.39.178:49779 Tue Oct 24 09:28:58 2017 us=644047 Float requested for peer 1 to 65.44.211.33:56035 Tue Oct 24 09:28:58 2017 us=644346 peer 1 (phone) floated from 172.56.39.178:49779 to [AF_INET]65.44.211.33:56035 Tue Oct 24 09:32:16 2017 us=207560 Float requested for peer 1 to 172.56.39.168:60221 Tue Oct 24 09:32:16 2017 us=207836 peer 1 (phone) floated from 65.44.211.33:56035 to [AF_INET]172.56.39.168:60221 Tue Oct 24 09:32:22 2017 us=432603 Float requested for peer 1 to 65.44.211.33:56035 Tue Oct 24 09:32:22 2017 us=432869 peer 1 (phone) floated from 172.56.39.168:60221 to [AF_INET]65.44.211.33:56035 Tue Oct 24 09:33:46 2017 us=784797 MULTI: multi_create_instance called Tue Oct 24 09:33:46 2017 us=785278 65.44.211.33:45403 Re-using SSL/TLS context Tue Oct 24 09:33:46 2017 us=785406 65.44.211.33:45403 LZ4 compression initializing Tue Oct 24 09:33:46 2017 us=785871 65.44.211.33:45403 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 09:33:46 2017 us=785987 65.44.211.33:45403 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 09:33:46 2017 us=786228 65.44.211.33:45403 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 09:33:46 2017 us=786330 65.44.211.33:45403 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 09:33:46 2017 us=786534 65.44.211.33:45403 TLS: Initial packet from [AF_INET]65.44.211.33:45403, sid=73970236 c34e76ee Tue Oct 24 09:33:51 2017 us=966745 65.44.211.33:45403 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 09:33:51 2017 us=968721 65.44.211.33:45403 VERIFY KU OK Tue Oct 24 09:33:51 2017 us=968848 65.44.211.33:45403 Validating certificate extended key usage Tue Oct 24 09:33:51 2017 us=968956 65.44.211.33:45403 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 09:33:51 2017 us=969112 65.44.211.33:45403 VERIFY EKU OK Tue Oct 24 09:33:51 2017 us=969206 65.44.211.33:45403 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 09:33:52 2017 us=106179 65.44.211.33:45403 peer info: IV_VER=2.5_master Tue Oct 24 09:33:52 2017 us=106438 65.44.211.33:45403 peer info: IV_PLAT=android Tue Oct 24 09:33:52 2017 us=106549 65.44.211.33:45403 peer info: IV_PROTO=2 Tue Oct 24 09:33:52 2017 us=106652 65.44.211.33:45403 peer info: IV_LZ4=1 Tue Oct 24 09:33:52 2017 us=106754 65.44.211.33:45403 peer info: IV_LZ4v2=1 Tue Oct 24 09:33:52 2017 us=106852 65.44.211.33:45403 peer info: IV_LZO=1 Tue Oct 24 09:33:52 2017 us=106989 65.44.211.33:45403 peer info: IV_COMP_STUB=1 Tue Oct 24 09:33:52 2017 us=107094 65.44.211.33:45403 peer info: IV_COMP_STUBv2=1 Tue Oct 24 09:33:52 2017 us=107194 65.44.211.33:45403 peer info: IV_TCPNL=1 Tue Oct 24 09:33:52 2017 us=107296 65.44.211.33:45403 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 09:33:52 2017 us=108042 65.44.211.33:45403 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 09:33:52 2017 us=108170 65.44.211.33:45403 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 09:33:52 2017 us=130019 65.44.211.33:45403 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 09:33:52 2017 us=130297 65.44.211.33:45403 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:45403 Tue Oct 24 09:33:52 2017 us=131408 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 09:33:52 2017 us=131530 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 09:33:52 2017 us=131870 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:45403 Tue Oct 24 09:33:52 2017 us=131985 MULTI: primary virtual IP for phone/65.44.211.33:45403: 192.168.8.6 Tue Oct 24 09:33:54 2017 us=64036 phone/65.44.211.33:45403 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 09:33:54 2017 us=64365 phone/65.44.211.33:45403 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) Tue Oct 24 09:33:57 2017 us=284720 MULTI: multi_create_instance called Tue Oct 24 09:33:57 2017 us=285168 65.44.211.33:45427 Re-using SSL/TLS context Tue Oct 24 09:33:57 2017 us=285291 65.44.211.33:45427 LZ4 compression initializing Tue Oct 24 09:33:57 2017 us=285763 65.44.211.33:45427 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 09:33:57 2017 us=285878 65.44.211.33:45427 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 09:33:57 2017 us=286105 65.44.211.33:45427 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 09:33:57 2017 us=286330 65.44.211.33:45427 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 09:33:57 2017 us=286550 65.44.211.33:45427 TLS: Initial packet from [AF_INET]65.44.211.33:45427, sid=6520964b 74918729 Tue Oct 24 09:33:57 2017 us=746348 65.44.211.33:45427 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 09:33:57 2017 us=748492 65.44.211.33:45427 VERIFY KU OK Tue Oct 24 09:33:57 2017 us=748650 65.44.211.33:45427 Validating certificate extended key usage Tue Oct 24 09:33:57 2017 us=748761 65.44.211.33:45427 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 09:33:57 2017 us=748853 65.44.211.33:45427 VERIFY EKU OK Tue Oct 24 09:33:57 2017 us=748944 65.44.211.33:45427 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 09:33:57 2017 us=899953 65.44.211.33:45427 peer info: IV_VER=2.5_master Tue Oct 24 09:33:57 2017 us=900139 65.44.211.33:45427 peer info: IV_PLAT=android Tue Oct 24 09:33:57 2017 us=900342 65.44.211.33:45427 peer info: IV_PROTO=2 Tue Oct 24 09:33:57 2017 us=900447 65.44.211.33:45427 peer info: IV_LZ4=1 Tue Oct 24 09:33:57 2017 us=900548 65.44.211.33:45427 peer info: IV_LZ4v2=1 Tue Oct 24 09:33:57 2017 us=900649 65.44.211.33:45427 peer info: IV_LZO=1 Tue Oct 24 09:33:57 2017 us=900748 65.44.211.33:45427 peer info: IV_COMP_STUB=1 Tue Oct 24 09:33:57 2017 us=900847 65.44.211.33:45427 peer info: IV_COMP_STUBv2=1 Tue Oct 24 09:33:57 2017 us=900946 65.44.211.33:45427 peer info: IV_TCPNL=1 Tue Oct 24 09:33:57 2017 us=901206 65.44.211.33:45427 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 09:33:57 2017 us=901937 65.44.211.33:45427 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 09:33:57 2017 us=902076 65.44.211.33:45427 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 09:33:57 2017 us=922595 65.44.211.33:45427 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 09:33:57 2017 us=922875 65.44.211.33:45427 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:45427 Tue Oct 24 09:33:57 2017 us=923717 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 09:33:57 2017 us=923857 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 09:33:57 2017 us=924197 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:45427 Tue Oct 24 09:33:57 2017 us=924308 MULTI: primary virtual IP for phone/65.44.211.33:45427: 192.168.8.6 Tue Oct 24 09:33:58 2017 us=110994 phone/65.44.211.33:45427 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 09:33:58 2017 us=111335 phone/65.44.211.33:45427 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) Tue Oct 24 10:29:40 2017 us=242309 Float requested for peer 1 to 172.56.38.195:61021 Tue Oct 24 10:29:40 2017 us=242574 peer 1 (phone) floated from 65.44.211.33:45427 to [AF_INET]172.56.38.195:61021 Tue Oct 24 10:29:50 2017 us=132582 Float requested for peer 1 to 65.44.211.33:45427 Tue Oct 24 10:29:50 2017 us=132848 peer 1 (phone) floated from 172.56.38.195:61021 to [AF_INET]65.44.211.33:45427 Tue Oct 24 10:30:08 2017 us=558063 MULTI: multi_create_instance called Tue Oct 24 10:30:08 2017 us=558414 65.44.211.33:33806 Re-using SSL/TLS context Tue Oct 24 10:30:08 2017 us=558533 65.44.211.33:33806 LZ4 compression initializing Tue Oct 24 10:30:08 2017 us=559004 65.44.211.33:33806 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 10:30:08 2017 us=559129 65.44.211.33:33806 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 10:30:08 2017 us=559361 65.44.211.33:33806 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 10:30:08 2017 us=559463 65.44.211.33:33806 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 10:30:08 2017 us=559657 65.44.211.33:33806 TLS: Initial packet from [AF_INET]65.44.211.33:33806, sid=f98a9d2a 6c37f4a5 Tue Oct 24 10:30:09 2017 us=14321 65.44.211.33:33806 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 10:30:09 2017 us=16303 65.44.211.33:33806 VERIFY KU OK Tue Oct 24 10:30:09 2017 us=16434 65.44.211.33:33806 Validating certificate extended key usage Tue Oct 24 10:30:09 2017 us=16545 65.44.211.33:33806 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 10:30:09 2017 us=16641 65.44.211.33:33806 VERIFY EKU OK Tue Oct 24 10:30:09 2017 us=16738 65.44.211.33:33806 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 10:30:09 2017 us=139692 65.44.211.33:33806 peer info: IV_VER=2.5_master Tue Oct 24 10:30:09 2017 us=139879 65.44.211.33:33806 peer info: IV_PLAT=android Tue Oct 24 10:30:09 2017 us=139983 65.44.211.33:33806 peer info: IV_PROTO=2 Tue Oct 24 10:30:09 2017 us=140083 65.44.211.33:33806 peer info: IV_LZ4=1 Tue Oct 24 10:30:09 2017 us=140181 65.44.211.33:33806 peer info: IV_LZ4v2=1 Tue Oct 24 10:30:09 2017 us=140281 65.44.211.33:33806 peer info: IV_LZO=1 Tue Oct 24 10:30:09 2017 us=140381 65.44.211.33:33806 peer info: IV_COMP_STUB=1 Tue Oct 24 10:30:09 2017 us=140482 65.44.211.33:33806 peer info: IV_COMP_STUBv2=1 Tue Oct 24 10:30:09 2017 us=140581 65.44.211.33:33806 peer info: IV_TCPNL=1 Tue Oct 24 10:30:09 2017 us=140683 65.44.211.33:33806 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 10:30:09 2017 us=141519 65.44.211.33:33806 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 10:30:09 2017 us=141660 65.44.211.33:33806 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 10:30:09 2017 us=162659 65.44.211.33:33806 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 10:30:09 2017 us=162897 65.44.211.33:33806 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:33806 Tue Oct 24 10:30:09 2017 us=163699 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 10:30:09 2017 us=163831 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 10:30:09 2017 us=164172 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:33806 Tue Oct 24 10:30:09 2017 us=164287 MULTI: primary virtual IP for phone/65.44.211.33:33806: 192.168.8.6 Tue Oct 24 10:30:09 2017 us=901770 phone/65.44.211.33:33806 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 10:30:09 2017 us=902106 phone/65.44.211.33:33806 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) Tue Oct 24 11:30:09 2017 us=15737 phone/65.44.211.33:33806 TLS: soft reset sec=0 bytes=285774809/-1 pkts=1075209/0 Tue Oct 24 11:30:09 2017 us=408273 phone/65.44.211.33:33806 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 11:30:09 2017 us=410364 phone/65.44.211.33:33806 VERIFY KU OK Tue Oct 24 11:30:09 2017 us=410514 phone/65.44.211.33:33806 Validating certificate extended key usage Tue Oct 24 11:30:09 2017 us=410625 phone/65.44.211.33:33806 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 11:30:09 2017 us=410721 phone/65.44.211.33:33806 VERIFY EKU OK Tue Oct 24 11:30:09 2017 us=410816 phone/65.44.211.33:33806 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 11:30:09 2017 us=530708 phone/65.44.211.33:33806 peer info: IV_VER=2.5_master Tue Oct 24 11:30:09 2017 us=530884 phone/65.44.211.33:33806 peer info: IV_PLAT=android Tue Oct 24 11:30:09 2017 us=530977 phone/65.44.211.33:33806 peer info: IV_PROTO=2 Tue Oct 24 11:30:09 2017 us=531064 phone/65.44.211.33:33806 peer info: IV_LZ4=1 Tue Oct 24 11:30:09 2017 us=531152 phone/65.44.211.33:33806 peer info: IV_LZ4v2=1 Tue Oct 24 11:30:09 2017 us=531239 phone/65.44.211.33:33806 peer info: IV_LZO=1 Tue Oct 24 11:30:09 2017 us=531328 phone/65.44.211.33:33806 peer info: IV_COMP_STUB=1 Tue Oct 24 11:30:09 2017 us=531417 phone/65.44.211.33:33806 peer info: IV_COMP_STUBv2=1 Tue Oct 24 11:30:09 2017 us=531508 phone/65.44.211.33:33806 peer info: IV_TCPNL=1 Tue Oct 24 11:30:09 2017 us=531597 phone/65.44.211.33:33806 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 11:30:09 2017 us=532233 phone/65.44.211.33:33806 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 11:30:09 2017 us=532405 phone/65.44.211.33:33806 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 11:30:09 2017 us=556398 phone/65.44.211.33:33806 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 11:32:19 2017 us=426593 Float requested for peer 0 to 208.54.5.183:55012 Tue Oct 24 11:32:19 2017 us=426879 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]208.54.5.183:55012 Tue Oct 24 11:34:27 2017 us=377106 Float requested for peer 0 to 65.44.211.33:33806 Tue Oct 24 11:34:27 2017 us=377389 peer 0 (phone) floated from 208.54.5.183:55012 to [AF_INET]65.44.211.33:33806 Tue Oct 24 11:36:59 2017 us=937480 Float requested for peer 0 to 172.56.38.51:22536 Tue Oct 24 11:36:59 2017 us=937771 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 Tue Oct 24 11:37:02 2017 us=474284 Float requested for peer 0 to 65.44.211.33:33806 Tue Oct 24 11:37:02 2017 us=474550 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806 Tue Oct 24 11:37:02 2017 us=573705 Float requested for peer 0 to 172.56.38.51:22536 Tue Oct 24 11:37:02 2017 us=574007 PID_ERR replay-window backtrack occurred [9] [SSL-1] [00000_____000000000000000000000000001111111111111111111111111222] 0:1276 0:1267 t=1508866622[0] r=[-3,64,15,9,1] sl=[4,64,64,528] Tue Oct 24 11:37:02 2017 us=574162 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 Tue Oct 24 11:37:02 2017 us=650379 Float requested for peer 0 to 65.44.211.33:33806 Tue Oct 24 11:37:02 2017 us=650640 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806 Tue Oct 24 11:37:15 2017 us=455595 Float requested for peer 0 to 172.56.38.51:22536 Tue Oct 24 11:37:15 2017 us=455916 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 Tue Oct 24 11:37:51 2017 us=237746 Float requested for peer 0 to 65.44.211.33:33806 Tue Oct 24 11:37:51 2017 us=238023 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806 Tue Oct 24 11:38:37 2017 us=754034 Float requested for peer 0 to 172.56.38.51:22536 Tue Oct 24 11:38:37 2017 us=754312 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 Tue Oct 24 11:43:55 2017 us=760068 Float requested for peer 0 to 65.44.211.33:33806 Tue Oct 24 11:43:55 2017 us=760354 peer 0 (phone) floated from 172.56.38.51:22536 to [AF_INET]65.44.211.33:33806 Tue Oct 24 11:44:07 2017 us=814520 Float requested for peer 0 to 172.56.38.51:22536 Tue Oct 24 11:44:07 2017 us=814800 peer 0 (phone) floated from 65.44.211.33:33806 to [AF_INET]172.56.38.51:22536 Tue Oct 24 11:44:14 2017 us=449807 MULTI: multi_create_instance called Tue Oct 24 11:44:14 2017 us=450146 172.56.38.51:19368 Re-using SSL/TLS context Tue Oct 24 11:44:14 2017 us=450261 172.56.38.51:19368 LZ4 compression initializing Tue Oct 24 11:44:14 2017 us=450772 172.56.38.51:19368 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 11:44:14 2017 us=450900 172.56.38.51:19368 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 11:44:14 2017 us=451128 172.56.38.51:19368 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 11:44:14 2017 us=451230 172.56.38.51:19368 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 11:44:14 2017 us=451438 172.56.38.51:19368 TLS: Initial packet from [AF_INET]172.56.38.51:19368, sid=640defb6 5c386d3f Tue Oct 24 11:44:15 2017 us=50360 172.56.38.51:19368 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 11:44:15 2017 us=52326 172.56.38.51:19368 VERIFY KU OK Tue Oct 24 11:44:15 2017 us=52459 172.56.38.51:19368 Validating certificate extended key usage Tue Oct 24 11:44:15 2017 us=52630 172.56.38.51:19368 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 11:44:15 2017 us=52727 172.56.38.51:19368 VERIFY EKU OK Tue Oct 24 11:44:15 2017 us=52816 172.56.38.51:19368 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 11:44:15 2017 us=606936 172.56.38.51:19368 peer info: IV_VER=2.5_master Tue Oct 24 11:44:15 2017 us=607123 172.56.38.51:19368 peer info: IV_PLAT=android Tue Oct 24 11:44:15 2017 us=607224 172.56.38.51:19368 peer info: IV_PROTO=2 Tue Oct 24 11:44:15 2017 us=607324 172.56.38.51:19368 peer info: IV_LZ4=1 Tue Oct 24 11:44:15 2017 us=607424 172.56.38.51:19368 peer info: IV_LZ4v2=1 Tue Oct 24 11:44:15 2017 us=607521 172.56.38.51:19368 peer info: IV_LZO=1 Tue Oct 24 11:44:15 2017 us=607619 172.56.38.51:19368 peer info: IV_COMP_STUB=1 Tue Oct 24 11:44:15 2017 us=607716 172.56.38.51:19368 peer info: IV_COMP_STUBv2=1 Tue Oct 24 11:44:15 2017 us=607816 172.56.38.51:19368 peer info: IV_TCPNL=1 Tue Oct 24 11:44:15 2017 us=607917 172.56.38.51:19368 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 11:44:15 2017 us=608664 172.56.38.51:19368 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 11:44:15 2017 us=608796 172.56.38.51:19368 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 11:44:15 2017 us=704166 172.56.38.51:19368 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 11:44:15 2017 us=704441 172.56.38.51:19368 [phone] Peer Connection Initiated with [AF_INET]172.56.38.51:19368 Tue Oct 24 11:44:15 2017 us=705680 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 11:44:15 2017 us=705805 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 11:44:15 2017 us=706153 MULTI: Learn: 192.168.8.6 -> phone/172.56.38.51:19368 Tue Oct 24 11:44:15 2017 us=706266 MULTI: primary virtual IP for phone/172.56.38.51:19368: 192.168.8.6 Tue Oct 24 11:44:16 2017 us=204601 phone/172.56.38.51:19368 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 11:44:16 2017 us=204938 phone/172.56.38.51:19368 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) Tue Oct 24 11:44:50 2017 us=893350 Float requested for peer 1 to 65.44.211.33:55524 Tue Oct 24 11:44:50 2017 us=893632 peer 1 (phone) floated from 172.56.38.51:19368 to [AF_INET]65.44.211.33:55524 Tue Oct 24 11:58:58 2017 us=567761 Float requested for peer 1 to 172.56.39.195:19644 Tue Oct 24 11:58:58 2017 us=568040 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.195:19644 Tue Oct 24 12:00:02 2017 us=817418 Float requested for peer 1 to 65.44.211.33:55524 Tue Oct 24 12:00:02 2017 us=817695 peer 1 (phone) floated from 172.56.39.195:19644 to [AF_INET]65.44.211.33:55524 Tue Oct 24 12:01:09 2017 us=620549 Float requested for peer 1 to 172.56.39.195:19644 Tue Oct 24 12:01:09 2017 us=620827 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.195:19644 Tue Oct 24 12:13:18 2017 us=453234 Float requested for peer 1 to 65.44.211.33:55524 Tue Oct 24 12:13:18 2017 us=453512 peer 1 (phone) floated from 172.56.39.195:19644 to [AF_INET]65.44.211.33:55524 Tue Oct 24 12:14:57 2017 us=701158 Float requested for peer 1 to 172.56.39.195:19644 Tue Oct 24 12:14:57 2017 us=701458 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.195:19644 Tue Oct 24 12:44:15 2017 us=788702 phone/172.56.39.195:19644 TLS: soft reset sec=0 bytes=2332419/-1 pkts=8057/0 Tue Oct 24 12:44:18 2017 us=618358 phone/172.56.39.195:19644 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 12:44:18 2017 us=620489 phone/172.56.39.195:19644 VERIFY KU OK Tue Oct 24 12:44:18 2017 us=620620 phone/172.56.39.195:19644 Validating certificate extended key usage Tue Oct 24 12:44:18 2017 us=620726 phone/172.56.39.195:19644 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 12:44:18 2017 us=620819 phone/172.56.39.195:19644 VERIFY EKU OK Tue Oct 24 12:44:18 2017 us=620911 phone/172.56.39.195:19644 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 12:44:18 2017 us=826618 phone/172.56.39.195:19644 peer info: IV_VER=2.5_master Tue Oct 24 12:44:18 2017 us=826800 phone/172.56.39.195:19644 peer info: IV_PLAT=android Tue Oct 24 12:44:18 2017 us=826902 phone/172.56.39.195:19644 peer info: IV_PROTO=2 Tue Oct 24 12:44:18 2017 us=827000 phone/172.56.39.195:19644 peer info: IV_LZ4=1 Tue Oct 24 12:44:18 2017 us=827098 phone/172.56.39.195:19644 peer info: IV_LZ4v2=1 Tue Oct 24 12:44:18 2017 us=827197 phone/172.56.39.195:19644 peer info: IV_LZO=1 Tue Oct 24 12:44:18 2017 us=827295 phone/172.56.39.195:19644 peer info: IV_COMP_STUB=1 Tue Oct 24 12:44:18 2017 us=827394 phone/172.56.39.195:19644 peer info: IV_COMP_STUBv2=1 Tue Oct 24 12:44:18 2017 us=827494 phone/172.56.39.195:19644 peer info: IV_TCPNL=1 Tue Oct 24 12:44:18 2017 us=827593 phone/172.56.39.195:19644 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 12:44:18 2017 us=828336 phone/172.56.39.195:19644 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 12:44:18 2017 us=828464 phone/172.56.39.195:19644 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 12:44:18 2017 us=909230 phone/172.56.39.195:19644 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 13:44:15 2017 us=689072 phone/172.56.39.195:19644 TLS: tls_process: killed expiring key Tue Oct 24 13:44:18 2017 us=73187 phone/172.56.39.195:19644 TLS: soft reset sec=0 bytes=7711876/-1 pkts=12250/0 Tue Oct 24 13:44:18 2017 us=836171 phone/172.56.39.195:19644 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 13:44:18 2017 us=838245 phone/172.56.39.195:19644 VERIFY KU OK Tue Oct 24 13:44:18 2017 us=838389 phone/172.56.39.195:19644 Validating certificate extended key usage Tue Oct 24 13:44:18 2017 us=838499 phone/172.56.39.195:19644 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 13:44:18 2017 us=838595 phone/172.56.39.195:19644 VERIFY EKU OK Tue Oct 24 13:44:18 2017 us=838690 phone/172.56.39.195:19644 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 13:44:19 2017 us=33730 phone/172.56.39.195:19644 peer info: IV_VER=2.5_master Tue Oct 24 13:44:19 2017 us=33923 phone/172.56.39.195:19644 peer info: IV_PLAT=android Tue Oct 24 13:44:19 2017 us=34030 phone/172.56.39.195:19644 peer info: IV_PROTO=2 Tue Oct 24 13:44:19 2017 us=34132 phone/172.56.39.195:19644 peer info: IV_LZ4=1 Tue Oct 24 13:44:19 2017 us=34233 phone/172.56.39.195:19644 peer info: IV_LZ4v2=1 Tue Oct 24 13:44:19 2017 us=34334 phone/172.56.39.195:19644 peer info: IV_LZO=1 Tue Oct 24 13:44:19 2017 us=34433 phone/172.56.39.195:19644 peer info: IV_COMP_STUB=1 Tue Oct 24 13:44:19 2017 us=34536 phone/172.56.39.195:19644 peer info: IV_COMP_STUBv2=1 Tue Oct 24 13:44:19 2017 us=34638 phone/172.56.39.195:19644 peer info: IV_TCPNL=1 Tue Oct 24 13:44:19 2017 us=34741 phone/172.56.39.195:19644 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 13:44:19 2017 us=35477 phone/172.56.39.195:19644 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 13:44:19 2017 us=35607 phone/172.56.39.195:19644 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 13:44:19 2017 us=145718 phone/172.56.39.195:19644 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 14:35:34 2017 us=818681 Float requested for peer 1 to 65.44.211.33:55524 Tue Oct 24 14:35:34 2017 us=827026 peer 1 (phone) floated from 172.56.39.195:19644 to [AF_INET]65.44.211.33:55524 Tue Oct 24 14:37:37 2017 us=556810 Float requested for peer 1 to 172.56.38.134:46002 Tue Oct 24 14:37:37 2017 us=557161 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.38.134:46002 Tue Oct 24 14:39:20 2017 us=977779 Float requested for peer 1 to 65.44.211.33:55524 Tue Oct 24 14:39:20 2017 us=978033 peer 1 (phone) floated from 172.56.38.134:46002 to [AF_INET]65.44.211.33:55524 Tue Oct 24 14:39:21 2017 us=61913 Float requested for peer 1 to 172.56.38.134:46002 Tue Oct 24 14:39:21 2017 us=62211 PID_ERR replay-window backtrack occurred [4] [SSL-2] [0111_>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:2555 0:2551 t=1508877561[0] r=[-1,64,15,4,1] sl=[5,64,64,528] Tue Oct 24 14:39:21 2017 us=62423 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.38.134:46002 Tue Oct 24 14:39:21 2017 us=64943 Float requested for peer 1 to 65.44.211.33:55524 Tue Oct 24 14:39:21 2017 us=65280 peer 1 (phone) floated from 172.56.38.134:46002 to [AF_INET]65.44.211.33:55524 Tue Oct 24 14:41:14 2017 us=210115 Float requested for peer 1 to 172.56.39.236:31926 Tue Oct 24 14:41:14 2017 us=210401 peer 1 (phone) floated from 65.44.211.33:55524 to [AF_INET]172.56.39.236:31926 Tue Oct 24 14:41:19 2017 us=477374 Float requested for peer 1 to 65.44.211.33:55524 Tue Oct 24 14:41:19 2017 us=477642 peer 1 (phone) floated from 172.56.39.236:31926 to [AF_INET]65.44.211.33:55524 Tue Oct 24 14:41:44 2017 us=316351 MULTI: multi_create_instance called Tue Oct 24 14:41:44 2017 us=316732 65.44.211.33:47404 Re-using SSL/TLS context Tue Oct 24 14:41:44 2017 us=316852 65.44.211.33:47404 LZ4 compression initializing Tue Oct 24 14:41:44 2017 us=317426 65.44.211.33:47404 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 14:41:44 2017 us=317559 65.44.211.33:47404 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 14:41:44 2017 us=317831 65.44.211.33:47404 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 14:41:44 2017 us=317934 65.44.211.33:47404 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 14:41:44 2017 us=318140 65.44.211.33:47404 TLS: Initial packet from [AF_INET]65.44.211.33:47404, sid=0651792f ee2b1b06 Tue Oct 24 14:42:44 2017 us=529076 65.44.211.33:47404 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Tue Oct 24 14:42:44 2017 us=529285 65.44.211.33:47404 TLS Error: TLS handshake failed Tue Oct 24 14:42:44 2017 us=529723 65.44.211.33:47404 SIGUSR1[soft,tls-error] received, client-instance restarting Tue Oct 24 14:43:00 2017 us=814821 MULTI: multi_create_instance called Tue Oct 24 14:43:00 2017 us=815161 65.44.211.33:33659 Re-using SSL/TLS context Tue Oct 24 14:43:00 2017 us=815279 65.44.211.33:33659 LZ4 compression initializing Tue Oct 24 14:43:00 2017 us=815729 65.44.211.33:33659 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 14:43:00 2017 us=815845 65.44.211.33:33659 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 14:43:00 2017 us=816076 65.44.211.33:33659 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 14:43:00 2017 us=816176 65.44.211.33:33659 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 14:43:00 2017 us=816382 65.44.211.33:33659 TLS: Initial packet from [AF_INET]65.44.211.33:33659, sid=7708bafe 09804a30 Tue Oct 24 14:43:01 2017 us=65802 MULTI: multi_create_instance called Tue Oct 24 14:43:01 2017 us=66190 65.44.211.33:33702 Re-using SSL/TLS context Tue Oct 24 14:43:01 2017 us=66306 65.44.211.33:33702 LZ4 compression initializing Tue Oct 24 14:43:01 2017 us=66872 65.44.211.33:33702 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 14:43:01 2017 us=66983 65.44.211.33:33702 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 14:43:01 2017 us=67208 65.44.211.33:33702 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 14:43:01 2017 us=67343 65.44.211.33:33702 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 14:43:01 2017 us=67536 65.44.211.33:33702 TLS: Initial packet from [AF_INET]65.44.211.33:33702, sid=1f8ddb2e 97a761b9 Tue Oct 24 14:43:01 2017 us=257049 65.44.211.33:33659 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 14:43:01 2017 us=258753 65.44.211.33:33659 VERIFY KU OK Tue Oct 24 14:43:01 2017 us=258866 65.44.211.33:33659 Validating certificate extended key usage Tue Oct 24 14:43:01 2017 us=258960 65.44.211.33:33659 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 14:43:01 2017 us=259038 65.44.211.33:33659 VERIFY EKU OK Tue Oct 24 14:43:01 2017 us=259116 65.44.211.33:33659 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 14:43:01 2017 us=339687 65.44.211.33:33659 peer info: IV_VER=2.5_master Tue Oct 24 14:43:01 2017 us=339788 65.44.211.33:33659 peer info: IV_PLAT=android Tue Oct 24 14:43:01 2017 us=339840 65.44.211.33:33659 peer info: IV_PROTO=2 Tue Oct 24 14:43:01 2017 us=339890 65.44.211.33:33659 peer info: IV_LZ4=1 Tue Oct 24 14:43:01 2017 us=339939 65.44.211.33:33659 peer info: IV_LZ4v2=1 Tue Oct 24 14:43:01 2017 us=339988 65.44.211.33:33659 peer info: IV_LZO=1 Tue Oct 24 14:43:01 2017 us=340037 65.44.211.33:33659 peer info: IV_COMP_STUB=1 Tue Oct 24 14:43:01 2017 us=340087 65.44.211.33:33659 peer info: IV_COMP_STUBv2=1 Tue Oct 24 14:43:01 2017 us=340137 65.44.211.33:33659 peer info: IV_TCPNL=1 Tue Oct 24 14:43:01 2017 us=340187 65.44.211.33:33659 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 14:43:01 2017 us=340603 65.44.211.33:33659 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:43:01 2017 us=340669 65.44.211.33:33659 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:43:01 2017 us=359825 65.44.211.33:33659 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 14:43:01 2017 us=359996 65.44.211.33:33659 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:33659 Tue Oct 24 14:43:01 2017 us=366014 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 14:43:01 2017 us=366104 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 14:43:01 2017 us=366290 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:33659 Tue Oct 24 14:43:01 2017 us=366347 MULTI: primary virtual IP for phone/65.44.211.33:33659: 192.168.8.6 Tue Oct 24 14:43:01 2017 us=408329 65.44.211.33:33702 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 14:43:01 2017 us=410347 65.44.211.33:33702 VERIFY KU OK Tue Oct 24 14:43:01 2017 us=410493 65.44.211.33:33702 Validating certificate extended key usage Tue Oct 24 14:43:01 2017 us=410600 65.44.211.33:33702 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 14:43:01 2017 us=410694 65.44.211.33:33702 VERIFY EKU OK Tue Oct 24 14:43:01 2017 us=410785 65.44.211.33:33702 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 14:43:01 2017 us=531194 65.44.211.33:33702 peer info: IV_VER=2.5_master Tue Oct 24 14:43:01 2017 us=531385 65.44.211.33:33702 peer info: IV_PLAT=android Tue Oct 24 14:43:01 2017 us=531487 65.44.211.33:33702 peer info: IV_PROTO=2 Tue Oct 24 14:43:01 2017 us=531585 65.44.211.33:33702 peer info: IV_LZ4=1 Tue Oct 24 14:43:01 2017 us=531684 65.44.211.33:33702 peer info: IV_LZ4v2=1 Tue Oct 24 14:43:01 2017 us=531783 65.44.211.33:33702 peer info: IV_LZO=1 Tue Oct 24 14:43:01 2017 us=531882 65.44.211.33:33702 peer info: IV_COMP_STUB=1 Tue Oct 24 14:43:01 2017 us=531980 65.44.211.33:33702 peer info: IV_COMP_STUBv2=1 Tue Oct 24 14:43:01 2017 us=532077 65.44.211.33:33702 peer info: IV_TCPNL=1 Tue Oct 24 14:43:01 2017 us=532177 65.44.211.33:33702 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 14:43:01 2017 us=532911 65.44.211.33:33702 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:43:01 2017 us=533110 65.44.211.33:33702 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:43:01 2017 us=556427 65.44.211.33:33702 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 14:43:01 2017 us=556699 65.44.211.33:33702 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:33702 Tue Oct 24 14:43:01 2017 us=557610 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 14:43:01 2017 us=557747 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 14:43:01 2017 us=558129 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:33702 Tue Oct 24 14:43:01 2017 us=558247 MULTI: primary virtual IP for phone/65.44.211.33:33702: 192.168.8.6 Tue Oct 24 14:43:05 2017 us=933299 phone/65.44.211.33:33702 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 14:43:05 2017 us=933645 phone/65.44.211.33:33702 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 2' (status=1) Tue Oct 24 14:43:23 2017 us=105070 Float requested for peer 2 to 172.56.39.236:41384 Tue Oct 24 14:43:23 2017 us=105354 peer 2 (phone) floated from 65.44.211.33:33702 to [AF_INET]172.56.39.236:41384 Tue Oct 24 14:44:29 2017 us=191314 Float requested for peer 2 to 65.44.211.33:33702 Tue Oct 24 14:44:29 2017 us=191591 peer 2 (phone) floated from 172.56.39.236:41384 to [AF_INET]65.44.211.33:33702 Tue Oct 24 14:44:31 2017 us=507521 MULTI: multi_create_instance called Tue Oct 24 14:44:31 2017 us=507852 65.44.211.33:48084 Re-using SSL/TLS context Tue Oct 24 14:44:31 2017 us=507967 65.44.211.33:48084 LZ4 compression initializing Tue Oct 24 14:44:31 2017 us=508443 65.44.211.33:48084 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 14:44:31 2017 us=508561 65.44.211.33:48084 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 14:44:31 2017 us=508786 65.44.211.33:48084 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 14:44:31 2017 us=508887 65.44.211.33:48084 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 14:44:31 2017 us=509168 65.44.211.33:48084 TLS: Initial packet from [AF_INET]65.44.211.33:48084, sid=22b2b112 21151183 Tue Oct 24 14:44:31 2017 us=974263 65.44.211.33:48084 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 14:44:31 2017 us=976224 65.44.211.33:48084 VERIFY KU OK Tue Oct 24 14:44:31 2017 us=976358 65.44.211.33:48084 Validating certificate extended key usage Tue Oct 24 14:44:31 2017 us=976525 65.44.211.33:48084 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 14:44:31 2017 us=976623 65.44.211.33:48084 VERIFY EKU OK Tue Oct 24 14:44:31 2017 us=976713 65.44.211.33:48084 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 14:44:32 2017 us=113277 65.44.211.33:48084 peer info: IV_VER=2.5_master Tue Oct 24 14:44:32 2017 us=113460 65.44.211.33:48084 peer info: IV_PLAT=android Tue Oct 24 14:44:32 2017 us=113564 65.44.211.33:48084 peer info: IV_PROTO=2 Tue Oct 24 14:44:32 2017 us=113664 65.44.211.33:48084 peer info: IV_LZ4=1 Tue Oct 24 14:44:32 2017 us=113764 65.44.211.33:48084 peer info: IV_LZ4v2=1 Tue Oct 24 14:44:32 2017 us=113863 65.44.211.33:48084 peer info: IV_LZO=1 Tue Oct 24 14:44:32 2017 us=113960 65.44.211.33:48084 peer info: IV_COMP_STUB=1 Tue Oct 24 14:44:32 2017 us=114058 65.44.211.33:48084 peer info: IV_COMP_STUBv2=1 Tue Oct 24 14:44:32 2017 us=114156 65.44.211.33:48084 peer info: IV_TCPNL=1 Tue Oct 24 14:44:32 2017 us=114256 65.44.211.33:48084 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 14:44:32 2017 us=115101 65.44.211.33:48084 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:44:32 2017 us=115234 65.44.211.33:48084 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:44:32 2017 us=139815 65.44.211.33:48084 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 14:44:32 2017 us=140090 65.44.211.33:48084 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:48084 Tue Oct 24 14:44:32 2017 us=140895 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 14:44:32 2017 us=141110 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 14:44:32 2017 us=141459 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:48084 Tue Oct 24 14:44:32 2017 us=141571 MULTI: primary virtual IP for phone/65.44.211.33:48084: 192.168.8.6 Tue Oct 24 14:44:33 2017 us=168381 phone/65.44.211.33:48084 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 14:44:33 2017 us=168715 phone/65.44.211.33:48084 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) Tue Oct 24 14:44:52 2017 us=786370 MULTI: multi_create_instance called Tue Oct 24 14:44:52 2017 us=786722 65.44.211.33:38254 Re-using SSL/TLS context Tue Oct 24 14:44:52 2017 us=786840 65.44.211.33:38254 LZ4 compression initializing Tue Oct 24 14:44:52 2017 us=787315 65.44.211.33:38254 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 14:44:52 2017 us=787429 65.44.211.33:38254 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 14:44:52 2017 us=787739 65.44.211.33:38254 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 14:44:52 2017 us=787842 65.44.211.33:38254 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 14:44:52 2017 us=788052 65.44.211.33:38254 TLS: Initial packet from [AF_INET]65.44.211.33:38254, sid=36e35b65 b9907496 Tue Oct 24 14:44:55 2017 us=591871 65.44.211.33:38254 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 14:44:55 2017 us=593888 65.44.211.33:38254 VERIFY KU OK Tue Oct 24 14:44:55 2017 us=594025 65.44.211.33:38254 Validating certificate extended key usage Tue Oct 24 14:44:55 2017 us=594133 65.44.211.33:38254 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 14:44:55 2017 us=594291 65.44.211.33:38254 VERIFY EKU OK Tue Oct 24 14:44:55 2017 us=594388 65.44.211.33:38254 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 14:44:55 2017 us=717610 65.44.211.33:38254 peer info: IV_VER=2.5_master Tue Oct 24 14:44:55 2017 us=717833 65.44.211.33:38254 peer info: IV_PLAT=android Tue Oct 24 14:44:55 2017 us=717938 65.44.211.33:38254 peer info: IV_PROTO=2 Tue Oct 24 14:44:55 2017 us=718037 65.44.211.33:38254 peer info: IV_LZ4=1 Tue Oct 24 14:44:55 2017 us=718137 65.44.211.33:38254 peer info: IV_LZ4v2=1 Tue Oct 24 14:44:55 2017 us=718235 65.44.211.33:38254 peer info: IV_LZO=1 Tue Oct 24 14:44:55 2017 us=718333 65.44.211.33:38254 peer info: IV_COMP_STUB=1 Tue Oct 24 14:44:55 2017 us=718432 65.44.211.33:38254 peer info: IV_COMP_STUBv2=1 Tue Oct 24 14:44:55 2017 us=718529 65.44.211.33:38254 peer info: IV_TCPNL=1 Tue Oct 24 14:44:55 2017 us=718629 65.44.211.33:38254 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 14:44:55 2017 us=719357 65.44.211.33:38254 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:44:55 2017 us=719485 65.44.211.33:38254 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:44:55 2017 us=740134 65.44.211.33:38254 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 14:44:55 2017 us=740411 65.44.211.33:38254 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:38254 Tue Oct 24 14:44:55 2017 us=741228 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 14:44:55 2017 us=741357 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 14:44:55 2017 us=741690 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:38254 Tue Oct 24 14:44:55 2017 us=741804 MULTI: primary virtual IP for phone/65.44.211.33:38254: 192.168.8.6 Tue Oct 24 14:44:57 2017 us=187951 phone/65.44.211.33:38254 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 14:44:57 2017 us=188286 phone/65.44.211.33:38254 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) Tue Oct 24 14:46:55 2017 us=138090 Float requested for peer 1 to 172.56.39.203:61300 Tue Oct 24 14:46:55 2017 us=138366 peer 1 (phone) floated from 65.44.211.33:38254 to [AF_INET]172.56.39.203:61300 Tue Oct 24 14:46:58 2017 us=285748 Float requested for peer 1 to 65.44.211.33:38254 Tue Oct 24 14:46:58 2017 us=286011 peer 1 (phone) floated from 172.56.39.203:61300 to [AF_INET]65.44.211.33:38254 Tue Oct 24 14:47:38 2017 us=552551 MULTI: multi_create_instance called Tue Oct 24 14:47:38 2017 us=552895 65.44.211.33:34846 Re-using SSL/TLS context Tue Oct 24 14:47:38 2017 us=553097 65.44.211.33:34846 LZ4 compression initializing Tue Oct 24 14:47:38 2017 us=553645 65.44.211.33:34846 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 14:47:38 2017 us=553774 65.44.211.33:34846 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 14:47:38 2017 us=554003 65.44.211.33:34846 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 14:47:38 2017 us=554103 65.44.211.33:34846 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 14:47:38 2017 us=554316 65.44.211.33:34846 TLS: Initial packet from [AF_INET]65.44.211.33:34846, sid=6b8cc27a 266a2e0e Tue Oct 24 14:47:40 2017 us=442097 65.44.211.33:34846 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 14:47:40 2017 us=444300 65.44.211.33:34846 VERIFY KU OK Tue Oct 24 14:47:40 2017 us=444454 65.44.211.33:34846 Validating certificate extended key usage Tue Oct 24 14:47:40 2017 us=444561 65.44.211.33:34846 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 14:47:40 2017 us=444653 65.44.211.33:34846 VERIFY EKU OK Tue Oct 24 14:47:40 2017 us=444746 65.44.211.33:34846 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 14:47:42 2017 us=362803 65.44.211.33:34846 peer info: IV_VER=2.5_master Tue Oct 24 14:47:42 2017 us=362993 65.44.211.33:34846 peer info: IV_PLAT=android Tue Oct 24 14:47:42 2017 us=363096 65.44.211.33:34846 peer info: IV_PROTO=2 Tue Oct 24 14:47:42 2017 us=363195 65.44.211.33:34846 peer info: IV_LZ4=1 Tue Oct 24 14:47:42 2017 us=363294 65.44.211.33:34846 peer info: IV_LZ4v2=1 Tue Oct 24 14:47:42 2017 us=363392 65.44.211.33:34846 peer info: IV_LZO=1 Tue Oct 24 14:47:42 2017 us=363490 65.44.211.33:34846 peer info: IV_COMP_STUB=1 Tue Oct 24 14:47:42 2017 us=363589 65.44.211.33:34846 peer info: IV_COMP_STUBv2=1 Tue Oct 24 14:47:42 2017 us=363688 65.44.211.33:34846 peer info: IV_TCPNL=1 Tue Oct 24 14:47:42 2017 us=363789 65.44.211.33:34846 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 14:47:42 2017 us=364525 65.44.211.33:34846 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:47:42 2017 us=364654 65.44.211.33:34846 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:47:42 2017 us=486959 65.44.211.33:34846 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 14:47:42 2017 us=487234 65.44.211.33:34846 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:34846 Tue Oct 24 14:47:42 2017 us=488048 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 14:47:42 2017 us=488176 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 14:47:42 2017 us=488512 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:34846 Tue Oct 24 14:47:42 2017 us=488624 MULTI: primary virtual IP for phone/65.44.211.33:34846: 192.168.8.6 Tue Oct 24 14:47:43 2017 us=956446 phone/65.44.211.33:34846 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 14:47:43 2017 us=956773 phone/65.44.211.33:34846 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) Tue Oct 24 14:48:38 2017 us=797788 Float requested for peer 0 to 172.56.39.203:44874 Tue Oct 24 14:48:38 2017 us=798073 peer 0 (phone) floated from 65.44.211.33:34846 to [AF_INET]172.56.39.203:44874 Tue Oct 24 14:48:45 2017 us=798295 Float requested for peer 0 to 65.44.211.33:34846 Tue Oct 24 14:48:45 2017 us=798578 peer 0 (phone) floated from 172.56.39.203:44874 to [AF_INET]65.44.211.33:34846 Tue Oct 24 14:49:05 2017 us=963277 MULTI: multi_create_instance called Tue Oct 24 14:49:05 2017 us=963637 172.56.39.203:33162 Re-using SSL/TLS context Tue Oct 24 14:49:05 2017 us=969517 172.56.39.203:33162 LZ4 compression initializing Tue Oct 24 14:49:05 2017 us=970068 172.56.39.203:33162 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 14:49:05 2017 us=970207 172.56.39.203:33162 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 14:49:05 2017 us=970438 172.56.39.203:33162 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 14:49:05 2017 us=970581 172.56.39.203:33162 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 14:49:05 2017 us=970858 172.56.39.203:33162 TLS: Initial packet from [AF_INET]172.56.39.203:33162, sid=9d56c01e 9be983fa Tue Oct 24 14:49:06 2017 us=663780 172.56.39.203:33162 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 14:49:06 2017 us=665802 172.56.39.203:33162 VERIFY KU OK Tue Oct 24 14:49:06 2017 us=665938 172.56.39.203:33162 Validating certificate extended key usage Tue Oct 24 14:49:06 2017 us=666044 172.56.39.203:33162 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 14:49:06 2017 us=666136 172.56.39.203:33162 VERIFY EKU OK Tue Oct 24 14:49:06 2017 us=666227 172.56.39.203:33162 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 14:49:06 2017 us=873968 172.56.39.203:33162 peer info: IV_VER=2.5_master Tue Oct 24 14:49:06 2017 us=874155 172.56.39.203:33162 peer info: IV_PLAT=android Tue Oct 24 14:49:06 2017 us=874259 172.56.39.203:33162 peer info: IV_PROTO=2 Tue Oct 24 14:49:06 2017 us=874357 172.56.39.203:33162 peer info: IV_LZ4=1 Tue Oct 24 14:49:06 2017 us=874456 172.56.39.203:33162 peer info: IV_LZ4v2=1 Tue Oct 24 14:49:06 2017 us=874553 172.56.39.203:33162 peer info: IV_LZO=1 Tue Oct 24 14:49:06 2017 us=874651 172.56.39.203:33162 peer info: IV_COMP_STUB=1 Tue Oct 24 14:49:06 2017 us=874749 172.56.39.203:33162 peer info: IV_COMP_STUBv2=1 Tue Oct 24 14:49:06 2017 us=874846 172.56.39.203:33162 peer info: IV_TCPNL=1 Tue Oct 24 14:49:06 2017 us=874945 172.56.39.203:33162 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 14:49:06 2017 us=875679 172.56.39.203:33162 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:49:06 2017 us=875808 172.56.39.203:33162 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:49:06 2017 us=961949 172.56.39.203:33162 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 14:49:06 2017 us=962216 172.56.39.203:33162 [phone] Peer Connection Initiated with [AF_INET]172.56.39.203:33162 Tue Oct 24 14:49:06 2017 us=963031 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 14:49:06 2017 us=963153 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 14:49:06 2017 us=963492 MULTI: Learn: 192.168.8.6 -> phone/172.56.39.203:33162 Tue Oct 24 14:49:06 2017 us=963605 MULTI: primary virtual IP for phone/172.56.39.203:33162: 192.168.8.6 Tue Oct 24 14:49:08 2017 us=182132 phone/172.56.39.203:33162 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 14:49:08 2017 us=182473 phone/172.56.39.203:33162 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) Tue Oct 24 14:54:28 2017 us=479962 Float requested for peer 1 to 65.44.211.33:41166 Tue Oct 24 14:54:28 2017 us=487011 peer 1 (phone) floated from 172.56.39.203:33162 to [AF_INET]65.44.211.33:41166 Tue Oct 24 14:54:56 2017 us=483291 MULTI: multi_create_instance called Tue Oct 24 14:54:56 2017 us=483627 65.44.211.33:58877 Re-using SSL/TLS context Tue Oct 24 14:54:56 2017 us=483746 65.44.211.33:58877 LZ4 compression initializing Tue Oct 24 14:54:56 2017 us=484216 65.44.211.33:58877 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 14:54:56 2017 us=484334 65.44.211.33:58877 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 14:54:56 2017 us=484564 65.44.211.33:58877 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 14:54:56 2017 us=484726 65.44.211.33:58877 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 14:54:56 2017 us=484931 65.44.211.33:58877 TLS: Initial packet from [AF_INET]65.44.211.33:58877, sid=163fbc45 138f3378 Tue Oct 24 14:55:01 2017 us=964373 65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 14:55:01 2017 us=966430 65.44.211.33:58877 VERIFY KU OK Tue Oct 24 14:55:01 2017 us=966586 65.44.211.33:58877 Validating certificate extended key usage Tue Oct 24 14:55:01 2017 us=966693 65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 14:55:01 2017 us=966785 65.44.211.33:58877 VERIFY EKU OK Tue Oct 24 14:55:01 2017 us=966877 65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 14:55:02 2017 us=93071 65.44.211.33:58877 peer info: IV_VER=2.5_master Tue Oct 24 14:55:02 2017 us=93254 65.44.211.33:58877 peer info: IV_PLAT=android Tue Oct 24 14:55:02 2017 us=93362 65.44.211.33:58877 peer info: IV_PROTO=2 Tue Oct 24 14:55:02 2017 us=93462 65.44.211.33:58877 peer info: IV_LZ4=1 Tue Oct 24 14:55:02 2017 us=93565 65.44.211.33:58877 peer info: IV_LZ4v2=1 Tue Oct 24 14:55:02 2017 us=93663 65.44.211.33:58877 peer info: IV_LZO=1 Tue Oct 24 14:55:02 2017 us=93761 65.44.211.33:58877 peer info: IV_COMP_STUB=1 Tue Oct 24 14:55:02 2017 us=93860 65.44.211.33:58877 peer info: IV_COMP_STUBv2=1 Tue Oct 24 14:55:02 2017 us=93959 65.44.211.33:58877 peer info: IV_TCPNL=1 Tue Oct 24 14:55:02 2017 us=94060 65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 14:55:02 2017 us=94800 65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:55:02 2017 us=94932 65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 14:55:02 2017 us=118358 65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 14:55:02 2017 us=118735 65.44.211.33:58877 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:58877 Tue Oct 24 14:55:02 2017 us=119642 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 14:55:02 2017 us=119776 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 14:55:02 2017 us=120112 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:58877 Tue Oct 24 14:55:02 2017 us=120225 MULTI: primary virtual IP for phone/65.44.211.33:58877: 192.168.8.6 Tue Oct 24 14:55:04 2017 us=219601 phone/65.44.211.33:58877 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 14:55:04 2017 us=219972 phone/65.44.211.33:58877 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) Tue Oct 24 15:06:24 2017 us=148015 Float requested for peer 0 to 208.54.5.202:32151 Tue Oct 24 15:06:24 2017 us=155013 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]208.54.5.202:32151 Tue Oct 24 15:18:55 2017 us=904942 Float requested for peer 0 to 65.44.211.33:58877 Tue Oct 24 15:18:55 2017 us=905306 peer 0 (phone) floated from 208.54.5.202:32151 to [AF_INET]65.44.211.33:58877 Tue Oct 24 15:22:51 2017 us=780007 Float requested for peer 0 to 208.54.5.174:55565 Tue Oct 24 15:22:51 2017 us=780279 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]208.54.5.174:55565 Tue Oct 24 15:22:55 2017 us=64706 Float requested for peer 0 to 65.44.211.33:58877 Tue Oct 24 15:22:55 2017 us=64961 peer 0 (phone) floated from 208.54.5.174:55565 to [AF_INET]65.44.211.33:58877 Tue Oct 24 15:26:01 2017 us=786095 Float requested for peer 0 to 172.56.39.8:34313 Tue Oct 24 15:26:01 2017 us=786435 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.39.8:34313 Tue Oct 24 15:35:00 2017 us=241152 Float requested for peer 0 to 65.44.211.33:58877 Tue Oct 24 15:35:00 2017 us=241432 peer 0 (phone) floated from 172.56.39.8:34313 to [AF_INET]65.44.211.33:58877 Tue Oct 24 15:55:02 2017 us=681224 phone/65.44.211.33:58877 TLS: soft reset sec=0 bytes=1422647/-1 pkts=6572/0 Tue Oct 24 15:55:08 2017 us=686310 phone/65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 15:55:08 2017 us=688320 phone/65.44.211.33:58877 VERIFY KU OK Tue Oct 24 15:55:08 2017 us=688449 phone/65.44.211.33:58877 Validating certificate extended key usage Tue Oct 24 15:55:08 2017 us=688558 phone/65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 15:55:08 2017 us=688654 phone/65.44.211.33:58877 VERIFY EKU OK Tue Oct 24 15:55:08 2017 us=688748 phone/65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 15:55:08 2017 us=809059 phone/65.44.211.33:58877 peer info: IV_VER=2.5_master Tue Oct 24 15:55:08 2017 us=809257 phone/65.44.211.33:58877 peer info: IV_PLAT=android Tue Oct 24 15:55:08 2017 us=809366 phone/65.44.211.33:58877 peer info: IV_PROTO=2 Tue Oct 24 15:55:08 2017 us=809471 phone/65.44.211.33:58877 peer info: IV_LZ4=1 Tue Oct 24 15:55:08 2017 us=809575 phone/65.44.211.33:58877 peer info: IV_LZ4v2=1 Tue Oct 24 15:55:08 2017 us=809678 phone/65.44.211.33:58877 peer info: IV_LZO=1 Tue Oct 24 15:55:08 2017 us=809783 phone/65.44.211.33:58877 peer info: IV_COMP_STUB=1 Tue Oct 24 15:55:08 2017 us=809887 phone/65.44.211.33:58877 peer info: IV_COMP_STUBv2=1 Tue Oct 24 15:55:08 2017 us=809992 phone/65.44.211.33:58877 peer info: IV_TCPNL=1 Tue Oct 24 15:55:08 2017 us=810097 phone/65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 15:55:08 2017 us=810843 phone/65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 15:55:08 2017 us=810975 phone/65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 15:55:08 2017 us=834525 phone/65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 16:47:49 2017 us=180056 Float requested for peer 0 to 172.56.38.49:20375 Tue Oct 24 16:47:49 2017 us=180332 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.49:20375 Tue Oct 24 16:49:02 2017 us=927621 Float requested for peer 0 to 65.44.211.33:58877 Tue Oct 24 16:49:02 2017 us=927944 peer 0 (phone) floated from 172.56.38.49:20375 to [AF_INET]65.44.211.33:58877 Tue Oct 24 16:49:02 2017 us=934468 Float requested for peer 0 to 172.56.38.49:20375 Tue Oct 24 16:49:02 2017 us=934766 PID_ERR replay-window backtrack occurred [4] [SSL-1] [00___EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:1963 0:1959 t=1508885342[0] r=[0,64,15,4,1] sl=[21,64,64,528] Tue Oct 24 16:49:02 2017 us=934919 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.49:20375 Tue Oct 24 16:49:02 2017 us=951117 Float requested for peer 0 to 65.44.211.33:58877 Tue Oct 24 16:49:02 2017 us=951359 peer 0 (phone) floated from 172.56.38.49:20375 to [AF_INET]65.44.211.33:58877 Tue Oct 24 16:55:02 2017 us=441643 phone/65.44.211.33:58877 TLS: tls_process: killed expiring key Tue Oct 24 16:55:08 2017 us=580015 phone/65.44.211.33:58877 TLS: soft reset sec=0 bytes=762747/-1 pkts=4162/0 Tue Oct 24 16:55:13 2017 us=437703 phone/65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 16:55:13 2017 us=439711 phone/65.44.211.33:58877 VERIFY KU OK Tue Oct 24 16:55:13 2017 us=439844 phone/65.44.211.33:58877 Validating certificate extended key usage Tue Oct 24 16:55:13 2017 us=439954 phone/65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 16:55:13 2017 us=440115 phone/65.44.211.33:58877 VERIFY EKU OK Tue Oct 24 16:55:13 2017 us=440210 phone/65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 16:55:13 2017 us=589706 phone/65.44.211.33:58877 peer info: IV_VER=2.5_master Tue Oct 24 16:55:13 2017 us=589909 phone/65.44.211.33:58877 peer info: IV_PLAT=android Tue Oct 24 16:55:13 2017 us=590015 phone/65.44.211.33:58877 peer info: IV_PROTO=2 Tue Oct 24 16:55:13 2017 us=590140 phone/65.44.211.33:58877 peer info: IV_LZ4=1 Tue Oct 24 16:55:13 2017 us=590241 phone/65.44.211.33:58877 peer info: IV_LZ4v2=1 Tue Oct 24 16:55:13 2017 us=590399 phone/65.44.211.33:58877 peer info: IV_LZO=1 Tue Oct 24 16:55:13 2017 us=590502 phone/65.44.211.33:58877 peer info: IV_COMP_STUB=1 Tue Oct 24 16:55:13 2017 us=590603 phone/65.44.211.33:58877 peer info: IV_COMP_STUBv2=1 Tue Oct 24 16:55:13 2017 us=590702 phone/65.44.211.33:58877 peer info: IV_TCPNL=1 Tue Oct 24 16:55:13 2017 us=590801 phone/65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 16:55:13 2017 us=591537 phone/65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 16:55:13 2017 us=591672 phone/65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 16:55:13 2017 us=613621 phone/65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 17:32:44 2017 us=343409 Float requested for peer 0 to 172.56.39.159:51149 Tue Oct 24 17:32:44 2017 us=356338 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.39.159:51149 Tue Oct 24 17:33:00 2017 us=561088 Float requested for peer 0 to 65.44.211.33:58877 Tue Oct 24 17:33:00 2017 us=561404 peer 0 (phone) floated from 172.56.39.159:51149 to [AF_INET]65.44.211.33:58877 Tue Oct 24 17:46:45 2017 us=406925 Float requested for peer 0 to 172.56.38.99:60579 Tue Oct 24 17:46:45 2017 us=407209 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.99:60579 Tue Oct 24 17:46:55 2017 us=254422 Float requested for peer 0 to 65.44.211.33:58877 Tue Oct 24 17:46:55 2017 us=254686 peer 0 (phone) floated from 172.56.38.99:60579 to [AF_INET]65.44.211.33:58877 Tue Oct 24 17:46:55 2017 us=420670 Float requested for peer 0 to 172.56.38.99:60579 Tue Oct 24 17:46:55 2017 us=421069 PID_ERR replay-window backtrack occurred [1] [SSL-2] [0_00001111111_11111111112222222222222222223333333333333333333333] 0:1719 0:1718 t=1508888815[0] r=[0,64,15,1,1] sl=[9,64,64,528] Tue Oct 24 17:46:55 2017 us=421231 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.38.99:60579 Tue Oct 24 17:46:55 2017 us=483945 Float requested for peer 0 to 65.44.211.33:58877 Tue Oct 24 17:46:55 2017 us=484205 peer 0 (phone) floated from 172.56.38.99:60579 to [AF_INET]65.44.211.33:58877 Tue Oct 24 17:47:15 2017 us=708959 MULTI: multi_create_instance called Tue Oct 24 17:47:15 2017 us=712667 65.44.211.33:49471 Re-using SSL/TLS context Tue Oct 24 17:47:15 2017 us=712812 65.44.211.33:49471 LZ4 compression initializing Tue Oct 24 17:47:15 2017 us=714659 65.44.211.33:49471 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 17:47:15 2017 us=714806 65.44.211.33:49471 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 17:47:15 2017 us=715085 65.44.211.33:49471 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 17:47:15 2017 us=715187 65.44.211.33:49471 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 17:47:15 2017 us=715402 65.44.211.33:49471 TLS: Initial packet from [AF_INET]65.44.211.33:49471, sid=a87e7f1b 04eb5237 Tue Oct 24 17:47:30 2017 us=518072 65.44.211.33:49471 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 17:47:30 2017 us=520157 65.44.211.33:49471 VERIFY KU OK Tue Oct 24 17:47:30 2017 us=520289 65.44.211.33:49471 Validating certificate extended key usage Tue Oct 24 17:47:30 2017 us=520394 65.44.211.33:49471 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 17:47:30 2017 us=520487 65.44.211.33:49471 VERIFY EKU OK Tue Oct 24 17:47:30 2017 us=520578 65.44.211.33:49471 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 17:47:30 2017 us=674106 65.44.211.33:49471 peer info: IV_VER=2.5_master Tue Oct 24 17:47:30 2017 us=674295 65.44.211.33:49471 peer info: IV_PLAT=android Tue Oct 24 17:47:30 2017 us=674397 65.44.211.33:49471 peer info: IV_PROTO=2 Tue Oct 24 17:47:30 2017 us=674495 65.44.211.33:49471 peer info: IV_LZ4=1 Tue Oct 24 17:47:30 2017 us=674593 65.44.211.33:49471 peer info: IV_LZ4v2=1 Tue Oct 24 17:47:30 2017 us=674689 65.44.211.33:49471 peer info: IV_LZO=1 Tue Oct 24 17:47:30 2017 us=674786 65.44.211.33:49471 peer info: IV_COMP_STUB=1 Tue Oct 24 17:47:30 2017 us=674886 65.44.211.33:49471 peer info: IV_COMP_STUBv2=1 Tue Oct 24 17:47:30 2017 us=674985 65.44.211.33:49471 peer info: IV_TCPNL=1 Tue Oct 24 17:47:30 2017 us=675085 65.44.211.33:49471 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 17:47:30 2017 us=683639 65.44.211.33:49471 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 17:47:30 2017 us=683810 65.44.211.33:49471 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 17:47:30 2017 us=751876 65.44.211.33:49471 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 17:47:30 2017 us=752148 65.44.211.33:49471 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:49471 Tue Oct 24 17:47:30 2017 us=760625 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 17:47:30 2017 us=760802 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 17:47:30 2017 us=761253 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:49471 Tue Oct 24 17:47:30 2017 us=761376 MULTI: primary virtual IP for phone/65.44.211.33:49471: 192.168.8.6 Tue Oct 24 17:47:31 2017 us=788963 phone/65.44.211.33:49471 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 17:47:31 2017 us=789356 phone/65.44.211.33:49471 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) Tue Oct 24 17:56:37 2017 us=867285 MULTI: multi_create_instance called Tue Oct 24 17:56:37 2017 us=867645 65.44.211.33:58877 Re-using SSL/TLS context Tue Oct 24 17:56:37 2017 us=867761 65.44.211.33:58877 LZ4 compression initializing Tue Oct 24 17:56:37 2017 us=868226 65.44.211.33:58877 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 17:56:37 2017 us=868342 65.44.211.33:58877 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 17:56:37 2017 us=868568 65.44.211.33:58877 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 17:56:37 2017 us=868667 65.44.211.33:58877 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 17:56:37 2017 us=868865 65.44.211.33:58877 TLS: Initial packet from [AF_INET]65.44.211.33:58877, sid=a7fbd933 c531d7d6 Tue Oct 24 17:56:38 2017 us=220594 65.44.211.33:58877 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 17:56:38 2017 us=222567 65.44.211.33:58877 VERIFY KU OK Tue Oct 24 17:56:38 2017 us=222774 65.44.211.33:58877 Validating certificate extended key usage Tue Oct 24 17:56:38 2017 us=222883 65.44.211.33:58877 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 17:56:38 2017 us=222976 65.44.211.33:58877 VERIFY EKU OK Tue Oct 24 17:56:38 2017 us=223066 65.44.211.33:58877 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 17:56:38 2017 us=343532 65.44.211.33:58877 peer info: IV_VER=2.5_master Tue Oct 24 17:56:38 2017 us=343716 65.44.211.33:58877 peer info: IV_PLAT=android Tue Oct 24 17:56:38 2017 us=343818 65.44.211.33:58877 peer info: IV_PROTO=2 Tue Oct 24 17:56:38 2017 us=343918 65.44.211.33:58877 peer info: IV_LZ4=1 Tue Oct 24 17:56:38 2017 us=344016 65.44.211.33:58877 peer info: IV_LZ4v2=1 Tue Oct 24 17:56:38 2017 us=344114 65.44.211.33:58877 peer info: IV_LZO=1 Tue Oct 24 17:56:38 2017 us=344213 65.44.211.33:58877 peer info: IV_COMP_STUB=1 Tue Oct 24 17:56:38 2017 us=344311 65.44.211.33:58877 peer info: IV_COMP_STUBv2=1 Tue Oct 24 17:56:38 2017 us=344409 65.44.211.33:58877 peer info: IV_TCPNL=1 Tue Oct 24 17:56:38 2017 us=344509 65.44.211.33:58877 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 17:56:38 2017 us=345331 65.44.211.33:58877 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 17:56:38 2017 us=345472 65.44.211.33:58877 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 17:56:38 2017 us=367414 65.44.211.33:58877 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 17:56:38 2017 us=367690 65.44.211.33:58877 [phone] Peer Connection Initiated with [AF_INET]65.44.211.33:58877 Tue Oct 24 17:56:38 2017 us=368493 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 17:56:38 2017 us=368615 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 17:56:38 2017 us=368951 MULTI: Learn: 192.168.8.6 -> phone/65.44.211.33:58877 Tue Oct 24 17:56:38 2017 us=369160 MULTI: primary virtual IP for phone/65.44.211.33:58877: 192.168.8.6 Tue Oct 24 17:57:17 2017 us=329367 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] Tue Oct 24 17:57:52 2017 us=526506 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] Tue Oct 24 17:58:28 2017 us=178226 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] Tue Oct 24 17:59:03 2017 us=507707 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] Tue Oct 24 17:59:39 2017 us=128017 phone/65.44.211.33:58877 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] Tue Oct 24 18:00:14 2017 us=449372 Float requested for peer 0 to 172.56.39.235:47193 Tue Oct 24 18:00:14 2017 us=449536 TLS Error: local/remote TLS keys are out of sync: [AF_INET]65.44.211.33:58877 [2] Tue Oct 24 18:00:14 2017 us=449730 peer 0 (phone) floated from 65.44.211.33:58877 to [AF_INET]172.56.39.235:47193 Tue Oct 24 18:00:50 2017 us=188366 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] Tue Oct 24 18:01:25 2017 us=526653 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] Tue Oct 24 18:02:01 2017 us=208679 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] Tue Oct 24 18:02:37 2017 us=141864 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] Tue Oct 24 18:03:12 2017 us=32279 phone/172.56.39.235:47193 TLS Error: local/remote TLS keys are out of sync: [AF_INET]172.56.39.235:47193 [2] Tue Oct 24 18:03:23 2017 us=682107 MULTI: multi_create_instance called Tue Oct 24 18:03:23 2017 us=682457 172.56.39.235:41284 Re-using SSL/TLS context Tue Oct 24 18:03:23 2017 us=682665 172.56.39.235:41284 LZ4 compression initializing Tue Oct 24 18:03:23 2017 us=683148 172.56.39.235:41284 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 18:03:23 2017 us=683379 172.56.39.235:41284 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 18:03:23 2017 us=683617 172.56.39.235:41284 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 18:03:23 2017 us=683720 172.56.39.235:41284 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 18:03:23 2017 us=683935 172.56.39.235:41284 TLS: Initial packet from [AF_INET]172.56.39.235:41284, sid=dac765d9 bbed58f0 Tue Oct 24 18:03:24 2017 us=335291 172.56.39.235:41284 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 18:03:24 2017 us=337713 172.56.39.235:41284 VERIFY KU OK Tue Oct 24 18:03:24 2017 us=337869 172.56.39.235:41284 Validating certificate extended key usage Tue Oct 24 18:03:24 2017 us=337982 172.56.39.235:41284 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 18:03:24 2017 us=338082 172.56.39.235:41284 VERIFY EKU OK Tue Oct 24 18:03:24 2017 us=338180 172.56.39.235:41284 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 18:03:24 2017 us=589165 172.56.39.235:41284 peer info: IV_VER=2.5_master Tue Oct 24 18:03:24 2017 us=589270 172.56.39.235:41284 peer info: IV_PLAT=android Tue Oct 24 18:03:24 2017 us=589312 172.56.39.235:41284 peer info: IV_PROTO=2 Tue Oct 24 18:03:24 2017 us=589352 172.56.39.235:41284 peer info: IV_LZ4=1 Tue Oct 24 18:03:24 2017 us=589392 172.56.39.235:41284 peer info: IV_LZ4v2=1 Tue Oct 24 18:03:24 2017 us=589433 172.56.39.235:41284 peer info: IV_LZO=1 Tue Oct 24 18:03:24 2017 us=589474 172.56.39.235:41284 peer info: IV_COMP_STUB=1 Tue Oct 24 18:03:24 2017 us=589516 172.56.39.235:41284 peer info: IV_COMP_STUBv2=1 Tue Oct 24 18:03:24 2017 us=589557 172.56.39.235:41284 peer info: IV_TCPNL=1 Tue Oct 24 18:03:24 2017 us=589599 172.56.39.235:41284 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 18:03:24 2017 us=589907 172.56.39.235:41284 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 18:03:24 2017 us=589962 172.56.39.235:41284 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 18:03:24 2017 us=671105 172.56.39.235:41284 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 18:03:24 2017 us=671258 172.56.39.235:41284 [phone] Peer Connection Initiated with [AF_INET]172.56.39.235:41284 Tue Oct 24 18:03:24 2017 us=671662 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 18:03:24 2017 us=671721 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 18:03:24 2017 us=671885 MULTI: Learn: 192.168.8.6 -> phone/172.56.39.235:41284 Tue Oct 24 18:03:24 2017 us=671941 MULTI: primary virtual IP for phone/172.56.39.235:41284: 192.168.8.6 Tue Oct 24 18:03:25 2017 us=800632 phone/172.56.39.235:41284 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 18:03:25 2017 us=801077 phone/172.56.39.235:41284 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 1' (status=1) Tue Oct 24 18:04:28 2017 us=312624 Float requested for peer 1 to 174.52.84.126:40916 Tue Oct 24 18:04:28 2017 us=312940 peer 1 (phone) floated from 172.56.39.235:41284 to [AF_INET]174.52.84.126:40916 Tue Oct 24 18:04:46 2017 us=681292 Float requested for peer 1 to 172.56.39.235:41284 Tue Oct 24 18:04:46 2017 us=681557 peer 1 (phone) floated from 174.52.84.126:40916 to [AF_INET]172.56.39.235:41284 Tue Oct 24 18:05:01 2017 us=25688 MULTI: multi_create_instance called Tue Oct 24 18:05:01 2017 us=26032 172.56.39.235:45483 Re-using SSL/TLS context Tue Oct 24 18:05:01 2017 us=26149 172.56.39.235:45483 LZ4 compression initializing Tue Oct 24 18:05:01 2017 us=26617 172.56.39.235:45483 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 18:05:01 2017 us=26736 172.56.39.235:45483 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 18:05:01 2017 us=26968 172.56.39.235:45483 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 18:05:01 2017 us=27070 172.56.39.235:45483 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 18:05:01 2017 us=27283 172.56.39.235:45483 TLS: Initial packet from [AF_INET]172.56.39.235:45483, sid=08552430 7f7e56ac Tue Oct 24 18:05:01 2017 us=895778 172.56.39.235:45483 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 18:05:01 2017 us=897205 172.56.39.235:45483 VERIFY KU OK Tue Oct 24 18:05:01 2017 us=897310 172.56.39.235:45483 Validating certificate extended key usage Tue Oct 24 18:05:01 2017 us=897386 172.56.39.235:45483 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 18:05:01 2017 us=897453 172.56.39.235:45483 VERIFY EKU OK Tue Oct 24 18:05:01 2017 us=897519 172.56.39.235:45483 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 18:05:02 2017 us=33884 172.56.39.235:45483 peer info: IV_VER=2.5_master Tue Oct 24 18:05:02 2017 us=34080 172.56.39.235:45483 peer info: IV_PLAT=android Tue Oct 24 18:05:02 2017 us=34190 172.56.39.235:45483 peer info: IV_PROTO=2 Tue Oct 24 18:05:02 2017 us=34294 172.56.39.235:45483 peer info: IV_LZ4=1 Tue Oct 24 18:05:02 2017 us=34399 172.56.39.235:45483 peer info: IV_LZ4v2=1 Tue Oct 24 18:05:02 2017 us=34503 172.56.39.235:45483 peer info: IV_LZO=1 Tue Oct 24 18:05:02 2017 us=34606 172.56.39.235:45483 peer info: IV_COMP_STUB=1 Tue Oct 24 18:05:02 2017 us=34709 172.56.39.235:45483 peer info: IV_COMP_STUBv2=1 Tue Oct 24 18:05:02 2017 us=34812 172.56.39.235:45483 peer info: IV_TCPNL=1 Tue Oct 24 18:05:02 2017 us=34918 172.56.39.235:45483 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 18:05:02 2017 us=35660 172.56.39.235:45483 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 18:05:02 2017 us=35797 172.56.39.235:45483 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 18:05:02 2017 us=124443 172.56.39.235:45483 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 18:05:02 2017 us=124811 172.56.39.235:45483 [phone] Peer Connection Initiated with [AF_INET]172.56.39.235:45483 Tue Oct 24 18:05:02 2017 us=125796 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 18:05:02 2017 us=126050 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 18:05:02 2017 us=126399 MULTI: Learn: 192.168.8.6 -> phone/172.56.39.235:45483 Tue Oct 24 18:05:02 2017 us=126516 MULTI: primary virtual IP for phone/172.56.39.235:45483: 192.168.8.6 Tue Oct 24 18:05:03 2017 us=253866 phone/172.56.39.235:45483 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 18:05:03 2017 us=254200 phone/172.56.39.235:45483 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) Tue Oct 24 18:08:33 2017 us=884238 Float requested for peer 0 to 192.168.1.1:37755 Tue Oct 24 18:08:33 2017 us=884531 peer 0 (phone) floated from 172.56.39.235:45483 to [AF_INET]192.168.1.1:37755 Tue Oct 24 18:08:33 2017 us=935647 Float requested for peer 0 to 172.56.39.235:45483 Tue Oct 24 18:08:33 2017 us=935965 PID_ERR replay-window backtrack occurred [2] [SSL-0] [00_EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:499 0:497 t=1508890113[0] r=[0,64,15,2,1] sl=[13,64,64,528] Tue Oct 24 18:08:33 2017 us=936120 peer 0 (phone) floated from 192.168.1.1:37755 to [AF_INET]172.56.39.235:45483 Tue Oct 24 18:08:33 2017 us=972945 Float requested for peer 0 to 192.168.1.1:37755 Tue Oct 24 18:08:33 2017 us=973276 peer 0 (phone) floated from 172.56.39.235:45483 to [AF_INET]192.168.1.1:37755 Tue Oct 24 19:05:02 2017 us=926497 phone/192.168.1.1:37755 TLS: soft reset sec=0 bytes=913523/-1 pkts=3290/0 Tue Oct 24 19:05:08 2017 us=734214 phone/192.168.1.1:37755 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 19:05:08 2017 us=736222 phone/192.168.1.1:37755 VERIFY KU OK Tue Oct 24 19:05:08 2017 us=736355 phone/192.168.1.1:37755 Validating certificate extended key usage Tue Oct 24 19:05:08 2017 us=736464 phone/192.168.1.1:37755 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 19:05:08 2017 us=736561 phone/192.168.1.1:37755 VERIFY EKU OK Tue Oct 24 19:05:08 2017 us=736658 phone/192.168.1.1:37755 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 19:05:08 2017 us=838652 phone/192.168.1.1:37755 peer info: IV_VER=2.5_master Tue Oct 24 19:05:08 2017 us=838843 phone/192.168.1.1:37755 peer info: IV_PLAT=android Tue Oct 24 19:05:08 2017 us=838957 phone/192.168.1.1:37755 peer info: IV_PROTO=2 Tue Oct 24 19:05:08 2017 us=839063 phone/192.168.1.1:37755 peer info: IV_LZ4=1 Tue Oct 24 19:05:08 2017 us=839167 phone/192.168.1.1:37755 peer info: IV_LZ4v2=1 Tue Oct 24 19:05:08 2017 us=839270 phone/192.168.1.1:37755 peer info: IV_LZO=1 Tue Oct 24 19:05:08 2017 us=839375 phone/192.168.1.1:37755 peer info: IV_COMP_STUB=1 Tue Oct 24 19:05:08 2017 us=839478 phone/192.168.1.1:37755 peer info: IV_COMP_STUBv2=1 Tue Oct 24 19:05:08 2017 us=839581 phone/192.168.1.1:37755 peer info: IV_TCPNL=1 Tue Oct 24 19:05:08 2017 us=839685 phone/192.168.1.1:37755 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 19:05:08 2017 us=840414 phone/192.168.1.1:37755 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 19:05:08 2017 us=840549 phone/192.168.1.1:37755 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 19:05:08 2017 us=845156 phone/192.168.1.1:37755 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 19:08:59 2017 us=605888 MULTI: multi_create_instance called Tue Oct 24 19:08:59 2017 us=606247 192.168.1.1:40916 Re-using SSL/TLS context Tue Oct 24 19:08:59 2017 us=606364 192.168.1.1:40916 LZ4 compression initializing Tue Oct 24 19:08:59 2017 us=606826 192.168.1.1:40916 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 19:08:59 2017 us=606948 192.168.1.1:40916 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 19:08:59 2017 us=607188 192.168.1.1:40916 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 19:08:59 2017 us=607292 192.168.1.1:40916 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 19:08:59 2017 us=607579 192.168.1.1:40916 TLS: Initial packet from [AF_INET]192.168.1.1:40916, sid=bb5fce43 1702bb9a Tue Oct 24 19:08:59 2017 us=940475 192.168.1.1:40916 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 19:08:59 2017 us=942490 192.168.1.1:40916 VERIFY KU OK Tue Oct 24 19:08:59 2017 us=942628 192.168.1.1:40916 Validating certificate extended key usage Tue Oct 24 19:08:59 2017 us=942734 192.168.1.1:40916 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 19:08:59 2017 us=942828 192.168.1.1:40916 VERIFY EKU OK Tue Oct 24 19:08:59 2017 us=942920 192.168.1.1:40916 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 19:09:00 2017 us=47298 192.168.1.1:40916 peer info: IV_VER=2.5_master Tue Oct 24 19:09:00 2017 us=47487 192.168.1.1:40916 peer info: IV_PLAT=android Tue Oct 24 19:09:00 2017 us=47590 192.168.1.1:40916 peer info: IV_PROTO=2 Tue Oct 24 19:09:00 2017 us=47688 192.168.1.1:40916 peer info: IV_LZ4=1 Tue Oct 24 19:09:00 2017 us=47786 192.168.1.1:40916 peer info: IV_LZ4v2=1 Tue Oct 24 19:09:00 2017 us=47882 192.168.1.1:40916 peer info: IV_LZO=1 Tue Oct 24 19:09:00 2017 us=47981 192.168.1.1:40916 peer info: IV_COMP_STUB=1 Tue Oct 24 19:09:00 2017 us=48079 192.168.1.1:40916 peer info: IV_COMP_STUBv2=1 Tue Oct 24 19:09:00 2017 us=48177 192.168.1.1:40916 peer info: IV_TCPNL=1 Tue Oct 24 19:09:00 2017 us=48277 192.168.1.1:40916 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 19:09:00 2017 us=49087 192.168.1.1:40916 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 19:09:00 2017 us=49232 192.168.1.1:40916 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 19:09:00 2017 us=53766 192.168.1.1:40916 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 19:09:00 2017 us=53973 192.168.1.1:40916 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:40916 Tue Oct 24 19:09:00 2017 us=54939 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 19:09:00 2017 us=55051 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 19:09:00 2017 us=55339 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:40916 Tue Oct 24 19:09:00 2017 us=55439 MULTI: primary virtual IP for phone/192.168.1.1:40916: 192.168.8.6 Tue Oct 24 19:09:40 2017 us=55819 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:10:30 2017 us=667500 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:11:06 2017 us=289440 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:12:04 2017 us=52131 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:12:54 2017 us=57206 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:13:29 2017 us=196842 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:14:04 2017 us=942777 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:14:39 2017 us=553898 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:15:14 2017 us=180489 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:16:03 2017 us=701802 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:17:03 2017 us=870894 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:17:38 2017 us=910962 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:18:21 2017 us=268289 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:19:01 2017 us=601220 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:19:38 2017 us=161849 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:20:13 2017 us=839672 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:20:50 2017 us=162182 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:21:25 2017 us=871030 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:22:00 2017 us=696655 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:22:35 2017 us=683491 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:23:11 2017 us=16531 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:24:37 2017 us=681289 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:25:37 2017 us=281703 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:26:13 2017 us=331207 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:26:48 2017 us=834953 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:27:23 2017 us=741529 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:28:08 2017 us=113950 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:28:44 2017 us=57980 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:29:18 2017 us=398147 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:29:53 2017 us=404251 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:30:28 2017 us=307336 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:31:04 2017 us=147868 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:31:39 2017 us=841369 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:32:14 2017 us=422171 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:32:49 2017 us=451085 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:33:24 2017 us=984363 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:33:59 2017 us=900342 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:34:35 2017 us=262151 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:35:11 2017 us=415026 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:35:59 2017 us=591967 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:36:34 2017 us=664801 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:37:12 2017 us=385316 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:37:48 2017 us=690993 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:38:47 2017 us=81065 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:39:26 2017 us=427716 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:40:02 2017 us=40050 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:40:37 2017 us=382579 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:41:37 2017 us=900026 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:42:38 2017 us=433168 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:43:38 2017 us=305468 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:44:37 2017 us=626170 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:45:12 2017 us=208107 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:45:54 2017 us=434331 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:46:30 2017 us=328444 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:47:31 2017 us=196110 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:48:06 2017 us=762390 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:49:01 2017 us=533856 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:50:25 2017 us=798723 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:51:00 2017 us=266778 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:51:49 2017 us=13403 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:52:23 2017 us=245900 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:53:02 2017 us=361988 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:53:37 2017 us=930457 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:54:21 2017 us=118790 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:55:03 2017 us=449525 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:56:03 2017 us=93290 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:56:37 2017 us=361914 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:57:35 2017 us=165028 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:58:30 2017 us=264780 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 19:59:05 2017 us=522177 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:00:05 2017 us=386113 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:00:41 2017 us=94358 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:01:15 2017 us=749637 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:01:50 2017 us=945080 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:02:25 2017 us=764109 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:03:01 2017 us=82871 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:03:36 2017 us=738926 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:04:11 2017 us=825486 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:04:46 2017 us=934210 phone/192.168.1.1:40916 AEAD Decrypt error: cipher final failed Tue Oct 24 20:06:23 2017 us=192096 MULTI: multi_create_instance called Tue Oct 24 20:06:23 2017 us=192444 192.168.1.1:37755 Re-using SSL/TLS context Tue Oct 24 20:06:23 2017 us=192568 192.168.1.1:37755 LZ4 compression initializing Tue Oct 24 20:06:23 2017 us=193167 192.168.1.1:37755 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 20:06:23 2017 us=193339 192.168.1.1:37755 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 20:06:23 2017 us=193583 192.168.1.1:37755 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 20:06:23 2017 us=193693 192.168.1.1:37755 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 20:06:23 2017 us=193993 192.168.1.1:37755 TLS: Initial packet from [AF_INET]192.168.1.1:37755, sid=153d4e02 8016bd8f Tue Oct 24 20:06:23 2017 us=632340 192.168.1.1:37755 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 20:06:23 2017 us=633794 192.168.1.1:37755 VERIFY KU OK Tue Oct 24 20:06:23 2017 us=633905 192.168.1.1:37755 Validating certificate extended key usage Tue Oct 24 20:06:23 2017 us=633973 192.168.1.1:37755 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 20:06:23 2017 us=634032 192.168.1.1:37755 VERIFY EKU OK Tue Oct 24 20:06:23 2017 us=634091 192.168.1.1:37755 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 20:06:23 2017 us=693470 192.168.1.1:37755 peer info: IV_VER=2.5_master Tue Oct 24 20:06:23 2017 us=693572 192.168.1.1:37755 peer info: IV_PLAT=android Tue Oct 24 20:06:23 2017 us=693607 192.168.1.1:37755 peer info: IV_PROTO=2 Tue Oct 24 20:06:23 2017 us=693642 192.168.1.1:37755 peer info: IV_LZ4=1 Tue Oct 24 20:06:23 2017 us=693676 192.168.1.1:37755 peer info: IV_LZ4v2=1 Tue Oct 24 20:06:23 2017 us=693711 192.168.1.1:37755 peer info: IV_LZO=1 Tue Oct 24 20:06:23 2017 us=693745 192.168.1.1:37755 peer info: IV_COMP_STUB=1 Tue Oct 24 20:06:23 2017 us=693778 192.168.1.1:37755 peer info: IV_COMP_STUBv2=1 Tue Oct 24 20:06:23 2017 us=693812 192.168.1.1:37755 peer info: IV_TCPNL=1 Tue Oct 24 20:06:23 2017 us=693846 192.168.1.1:37755 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 20:06:23 2017 us=694111 192.168.1.1:37755 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 20:06:23 2017 us=694161 192.168.1.1:37755 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 20:06:23 2017 us=697659 192.168.1.1:37755 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 20:06:23 2017 us=697816 192.168.1.1:37755 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:37755 Tue Oct 24 20:06:23 2017 us=698193 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 20:06:23 2017 us=698242 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 20:06:23 2017 us=698373 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:37755 Tue Oct 24 20:06:23 2017 us=698417 MULTI: primary virtual IP for phone/192.168.1.1:37755: 192.168.8.6 Tue Oct 24 20:06:24 2017 us=132340 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:06:58 2017 us=757653 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:00 2017 us=346728 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:07 2017 us=899901 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:07 2017 us=900183 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:07 2017 us=900344 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:09 2017 us=726446 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:09 2017 us=757800 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:14 2017 us=220281 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:14 2017 us=737199 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:14 2017 us=760467 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:19 2017 us=753896 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:19 2017 us=764635 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:54 2017 us=468329 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:56 2017 us=616110 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:07:58 2017 us=355367 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:01 2017 us=421843 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:08 2017 us=85346 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:20 2017 us=98108 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:20 2017 us=124704 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:20 2017 us=290596 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:20 2017 us=485488 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:20 2017 us=493642 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:25 2017 us=101136 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:25 2017 us=129669 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:25 2017 us=295884 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:25 2017 us=487804 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:25 2017 us=498469 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:30 2017 us=111595 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:30 2017 us=111837 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:30 2017 us=111980 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:30 2017 us=147860 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:30 2017 us=148073 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:30 2017 us=299933 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:30 2017 us=494252 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:30 2017 us=494450 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:30 2017 us=500641 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:35 2017 us=582486 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:35 2017 us=582987 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:35 2017 us=583058 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:35 2017 us=583122 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:35 2017 us=583180 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:35 2017 us=583252 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:35 2017 us=583360 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:35 2017 us=583428 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:35 2017 us=583494 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:40 2017 us=125228 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:40 2017 us=125486 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:40 2017 us=125626 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:40 2017 us=145806 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:40 2017 us=306001 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:40 2017 us=502432 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:40 2017 us=502626 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:45 2017 us=126495 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:45 2017 us=126703 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:45 2017 us=126822 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:45 2017 us=153798 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:45 2017 us=309521 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:45 2017 us=505607 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:45 2017 us=505829 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:50 2017 us=141444 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:50 2017 us=312710 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:50 2017 us=322982 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:50 2017 us=469974 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:50 2017 us=503407 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:55 2017 us=134357 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:55 2017 us=315842 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:55 2017 us=325832 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:08:55 2017 us=514521 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:00 2017 us=332044 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:00 2017 us=333313 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:05 2017 us=351318 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:05 2017 us=351455 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:10 2017 us=360743 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:10 2017 us=360963 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:15 2017 us=359721 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:15 2017 us=360445 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:17 2017 us=297138 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:17 2017 us=360134 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:20 2017 us=368843 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:22 2017 us=297377 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:22 2017 us=363904 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:25 2017 us=372225 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:27 2017 us=306654 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:27 2017 us=370099 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:32 2017 us=309841 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:32 2017 us=372436 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:37 2017 us=435310 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:42 2017 us=444614 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:47 2017 us=449965 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:09:52 2017 us=456942 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:10:02 2017 us=297102 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:10:07 2017 us=85391 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:10:09 2017 us=653241 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:10:14 2017 us=666941 phone/192.168.1.1:37755 TLS Error: local/remote TLS keys are out of sync: [AF_INET]192.168.1.1:37755 [1] Tue Oct 24 20:10:14 2017 us=857248 MULTI: multi_create_instance called Tue Oct 24 20:10:14 2017 us=857518 192.168.1.1:40916 Re-using SSL/TLS context Tue Oct 24 20:10:14 2017 us=857613 192.168.1.1:40916 LZ4 compression initializing Tue Oct 24 20:10:14 2017 us=857990 192.168.1.1:40916 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 20:10:14 2017 us=858089 192.168.1.1:40916 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 20:10:14 2017 us=858277 192.168.1.1:40916 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 20:10:14 2017 us=858414 192.168.1.1:40916 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 20:10:14 2017 us=858581 192.168.1.1:40916 TLS: Initial packet from [AF_INET]192.168.1.1:40916, sid=632f2c7a a9b05198 Tue Oct 24 20:10:15 2017 us=206144 192.168.1.1:40916 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 20:10:15 2017 us=207346 192.168.1.1:40916 VERIFY KU OK Tue Oct 24 20:10:15 2017 us=207423 192.168.1.1:40916 Validating certificate extended key usage Tue Oct 24 20:10:15 2017 us=207485 192.168.1.1:40916 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 20:10:15 2017 us=207541 192.168.1.1:40916 VERIFY EKU OK Tue Oct 24 20:10:15 2017 us=207596 192.168.1.1:40916 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 20:10:15 2017 us=263151 192.168.1.1:40916 peer info: IV_VER=2.5_master Tue Oct 24 20:10:15 2017 us=263253 192.168.1.1:40916 peer info: IV_PLAT=android Tue Oct 24 20:10:15 2017 us=263297 192.168.1.1:40916 peer info: IV_PROTO=2 Tue Oct 24 20:10:15 2017 us=263338 192.168.1.1:40916 peer info: IV_LZ4=1 Tue Oct 24 20:10:15 2017 us=263380 192.168.1.1:40916 peer info: IV_LZ4v2=1 Tue Oct 24 20:10:15 2017 us=263422 192.168.1.1:40916 peer info: IV_LZO=1 Tue Oct 24 20:10:15 2017 us=263464 192.168.1.1:40916 peer info: IV_COMP_STUB=1 Tue Oct 24 20:10:15 2017 us=263506 192.168.1.1:40916 peer info: IV_COMP_STUBv2=1 Tue Oct 24 20:10:15 2017 us=263548 192.168.1.1:40916 peer info: IV_TCPNL=1 Tue Oct 24 20:10:15 2017 us=263591 192.168.1.1:40916 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 20:10:15 2017 us=263912 192.168.1.1:40916 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 20:10:15 2017 us=263966 192.168.1.1:40916 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 20:10:15 2017 us=266953 192.168.1.1:40916 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 20:10:15 2017 us=267044 192.168.1.1:40916 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:40916 Tue Oct 24 20:10:15 2017 us=267384 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 20:10:15 2017 us=267436 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 20:10:15 2017 us=267582 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:40916 Tue Oct 24 20:10:15 2017 us=267631 MULTI: primary virtual IP for phone/192.168.1.1:40916: 192.168.8.6 Tue Oct 24 20:18:23 2017 us=898496 MULTI: multi_create_instance called Tue Oct 24 20:18:23 2017 us=898641 192.168.1.1:37798 Re-using SSL/TLS context Tue Oct 24 20:18:23 2017 us=898679 192.168.1.1:37798 LZ4 compression initializing Tue Oct 24 20:18:23 2017 us=898853 192.168.1.1:37798 Control Channel MTU parms [ L:1622 D:1156 EF:94 EB:0 ET:0 EL:3 ] Tue Oct 24 20:18:23 2017 us=898887 192.168.1.1:37798 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Tue Oct 24 20:18:23 2017 us=898962 192.168.1.1:37798 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server' Tue Oct 24 20:18:23 2017 us=898992 192.168.1.1:37798 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client' Tue Oct 24 20:18:23 2017 us=899061 192.168.1.1:37798 TLS: Initial packet from [AF_INET]192.168.1.1:37798, sid=e0e7233b 63e2d0ce Tue Oct 24 20:18:24 2017 us=147078 192.168.1.1:37798 VERIFY OK: depth=1, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=Home, name=Home Tue Oct 24 20:18:24 2017 us=148050 192.168.1.1:37798 VERIFY KU OK Tue Oct 24 20:18:24 2017 us=148108 192.168.1.1:37798 Validating certificate extended key usage Tue Oct 24 20:18:24 2017 us=148157 192.168.1.1:37798 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication Tue Oct 24 20:18:24 2017 us=148200 192.168.1.1:37798 VERIFY EKU OK Tue Oct 24 20:18:24 2017 us=148242 192.168.1.1:37798 VERIFY OK: depth=0, C=US, ST=UT, L=Home, O=Home Network, OU=Home, CN=phone, name=Home Tue Oct 24 20:18:24 2017 us=193150 192.168.1.1:37798 peer info: IV_VER=2.5_master Tue Oct 24 20:18:24 2017 us=193252 192.168.1.1:37798 peer info: IV_PLAT=android Tue Oct 24 20:18:24 2017 us=193292 192.168.1.1:37798 peer info: IV_PROTO=2 Tue Oct 24 20:18:24 2017 us=193329 192.168.1.1:37798 peer info: IV_LZ4=1 Tue Oct 24 20:18:24 2017 us=193367 192.168.1.1:37798 peer info: IV_LZ4v2=1 Tue Oct 24 20:18:24 2017 us=193405 192.168.1.1:37798 peer info: IV_LZO=1 Tue Oct 24 20:18:24 2017 us=193443 192.168.1.1:37798 peer info: IV_COMP_STUB=1 Tue Oct 24 20:18:24 2017 us=193480 192.168.1.1:37798 peer info: IV_COMP_STUBv2=1 Tue Oct 24 20:18:24 2017 us=193518 192.168.1.1:37798 peer info: IV_TCPNL=1 Tue Oct 24 20:18:24 2017 us=193557 192.168.1.1:37798 peer info: IV_GUI_VER=de.blinkt.openvpn_0.6.73 Tue Oct 24 20:18:24 2017 us=193863 192.168.1.1:37798 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 20:18:24 2017 us=193920 192.168.1.1:37798 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Tue Oct 24 20:18:24 2017 us=196837 192.168.1.1:37798 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Tue Oct 24 20:18:24 2017 us=196932 192.168.1.1:37798 [phone] Peer Connection Initiated with [AF_INET]192.168.1.1:37798 Tue Oct 24 20:18:24 2017 us=197292 MULTI: new connection by client 'phone' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Tue Oct 24 20:18:24 2017 us=197341 MULTI_sva: pool returned IPv4=192.168.8.6, IPv6=(Not enabled) Tue Oct 24 20:18:24 2017 us=197461 MULTI: Learn: 192.168.8.6 -> phone/192.168.1.1:37798 Tue Oct 24 20:18:24 2017 us=197501 MULTI: primary virtual IP for phone/192.168.1.1:37798: 192.168.8.6 Tue Oct 24 20:18:25 2017 us=386543 phone/192.168.1.1:37798 PUSH: Received control message: 'PUSH_REQUEST' Tue Oct 24 20:18:25 2017 us=386794 phone/192.168.1.1:37798 SENT CONTROL [phone]: 'PUSH_REPLY,redirect-gateway autolocal bypass-dhcp,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 192.168.8.1,topology net30,ifconfig 192.168.8.6 192.168.8.5,peer-id 0' (status=1) Tue Oct 24 20:20:09 2017 us=376465 event_wait : Interrupted system call (code=4) Tue Oct 24 20:20:09 2017 us=381659 TCP/UDP: Closing socket Tue Oct 24 20:20:09 2017 us=381954 /sbin/ip route del 192.168.8.0/24 Tue Oct 24 20:20:09 2017 us=386647 Closing TUN/TAP interface Tue Oct 24 20:20:09 2017 us=386850 /sbin/ip addr del dev tun0 local 192.168.8.1 peer 192.168.8.2 Tue Oct 24 20:20:09 2017 us=429176 SIGINT[hard,] received, process exiting