2018-01-31 07:16:44 ----- OpenVPN Start ----- OpenVPN core 3.1.2 ios arm64 64-bit built on Jan 23 2018 15:56:53 2018-01-31 07:16:44 Frame=512/2048/512 mssfix-ctrl=1250 2018-01-31 07:16:44 UNUSED OPTIONS 5 [resolv-retry] [infinite] 6 [nobind] 7 [persist-key] 9 [verb] [3] 11 [verify-x509-name] [some.vpn.server] [name] 14 [explicit-exit-notify] [2] 2018-01-31 07:16:44 EVENT: RESOLVE 2018-01-31 07:16:44 Contacting [1.2.3.4]:443/UDP via UDP 2018-01-31 07:16:44 EVENT: WAIT 2018-01-31 07:16:44 Connecting to [some.vpn.server]:443 (1.2.3.4) via UDPv4 2018-01-31 07:16:44 EVENT: CONNECTING 2018-01-31 07:16:44 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2018-01-31 07:16:44 Creds: Username/Password 2018-01-31 07:16:44 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4 IV_VER=3.1.2 IV_PLAT=ios IV_IPv6=0 IV_AUTO_SESS=1 2018-01-31 07:16:44 VERIFY OK : depth=0 cert. version : 3 serial number : 00 issuer name : CN=some.vpn.server subject name : CN=some.vpn.server issued on : 2015-10-06 12:15:26 expires on : 2025-10-03 12:15:26 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing 2018-01-31 07:16:44 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2018-01-31 07:16:44 Session is ACTIVE 2018-01-31 07:16:44 EVENT: GET_CONFIG 2018-01-31 07:16:44 Sending PUSH_REQUEST to server... 2018-01-31 07:16:45 Sending PUSH_REQUEST to server... 2018-01-31 07:16:48 Sending PUSH_REQUEST to server... 2018-01-31 07:16:48 OPTIONS: 0 [dhcp-option] [DNS] [109.236.87.2] 1 [dhcp-option] [DNS] [144.217.75.55] 2 [ping] [3] 3 [ping-restart] [10] 4 [ifconfig] [10.1.213.49] [10.1.213.50] 5 [dhcp-option] [DNS] [8.8.8.8] 6 [dhcp-option] [DNS] [8.8.4.4] 7 [route-gateway] [10.1.213.50] 8 [redirect-gateway] [def1] 9 [block-ipv6] 2018-01-31 07:16:48 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 compress: NONE peer ID: -1 2018-01-31 07:16:48 EVENT: ASSIGN_IP 2018-01-31 07:16:48 NIP: preparing TUN network settings 2018-01-31 07:16:48 NIP: init TUN network settings with endpoint: 1.2.3.4 2018-01-31 07:16:48 NIP: adding IPv4 address to network settings 10.1.213.49/255.255.255.252 2018-01-31 07:16:48 NIP: adding (included) IPv4 route 10.1.213.48/30 2018-01-31 07:16:48 NIP: redirecting all IPv4 traffic to TUN interface 2018-01-31 07:16:48 NIP: adding DNS 109.236.87.2 2018-01-31 07:16:48 NIP: adding DNS 144.217.75.55 2018-01-31 07:16:48 NIP: adding DNS 8.8.8.8 2018-01-31 07:16:48 NIP: adding DNS 8.8.4.4 2018-01-31 07:16:48 NIP: blocking all IPv6 traffic - not supported 2018-01-31 07:16:48 Connected via NetworkExtensionTUN 2018-01-31 07:16:48 EVENT: CONNECTED user@some.vpn.server:443 (1.2.3.4) via /UDPv4 on NetworkExtensionTUN/10.1.213.49/ gw=[/] 2018-01-31 07:30:24 OS Event: SLEEP 2018-01-31 07:30:24 EVENT: PAUSE 2018-01-31 07:30:25 OS Event: WAKEUP 2018-01-31 07:30:28 RESUME TEST: Internet:ReachableViaWiFi/-R t------ 2018-01-31 07:30:28 STANDARD RESUME 2018-01-31 07:30:28 EVENT: RESUME 2018-01-31 07:30:28 EVENT: RECONNECTING 2018-01-31 07:30:28 Contacting [1.2.3.4]:443/UDP via UDP 2018-01-31 07:30:28 EVENT: WAIT 2018-01-31 07:30:28 Connecting to [some.vpn.server]:443 (1.2.3.4) via UDPv4 2018-01-31 07:30:28 EVENT: CONNECTING 2018-01-31 07:30:28 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2018-01-31 07:30:28 Creds: Username/Password 2018-01-31 07:30:28 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4 IV_VER=3.1.2 IV_PLAT=ios IV_IPv6=0 IV_AUTO_SESS=1 2018-01-31 07:30:28 VERIFY OK : depth=0 cert. version : 3 serial number : 00 issuer name : CN=some.vpn.server subject name : CN=some.vpn.server issued on : 2015-10-06 12:15:26 expires on : 2025-10-03 12:15:26 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing 2018-01-31 07:30:28 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2018-01-31 07:30:28 Session is ACTIVE 2018-01-31 07:30:28 EVENT: GET_CONFIG 2018-01-31 07:30:28 Sending PUSH_REQUEST to server... 2018-01-31 07:30:29 Sending PUSH_REQUEST to server... 2018-01-31 07:30:32 Sending PUSH_REQUEST to server... 2018-01-31 07:30:32 OPTIONS: 0 [dhcp-option] [DNS] [109.236.87.2] 1 [dhcp-option] [DNS] [144.217.75.55] 2 [ping] [3] 3 [ping-restart] [10] 4 [ifconfig] [10.2.130.109] [10.2.130.110] 5 [dhcp-option] [DNS] [8.8.8.8] 6 [dhcp-option] [DNS] [8.8.4.4] 7 [route-gateway] [10.2.130.110] 8 [redirect-gateway] [def1] 9 [block-ipv6] 2018-01-31 07:30:32 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 compress: NONE peer ID: -1 2018-01-31 07:30:32 EVENT: ASSIGN_IP 2018-01-31 07:30:32 NIP: preparing TUN network settings 2018-01-31 07:30:32 NIP: init TUN network settings with endpoint: 1.2.3.4 2018-01-31 07:30:32 NIP: adding IPv4 address to network settings 10.2.130.109/255.255.255.252 2018-01-31 07:30:32 NIP: adding (included) IPv4 route 10.2.130.108/30 2018-01-31 07:30:32 NIP: redirecting all IPv4 traffic to TUN interface 2018-01-31 07:30:32 NIP: adding DNS 109.236.87.2 2018-01-31 07:30:32 NIP: adding DNS 144.217.75.55 2018-01-31 07:30:32 NIP: adding DNS 8.8.8.8 2018-01-31 07:30:32 NIP: adding DNS 8.8.4.4 2018-01-31 07:30:32 NIP: blocking all IPv6 traffic - not supported 2018-01-31 07:30:32 Connected via NetworkExtensionTUN 2018-01-31 07:30:32 EVENT: CONNECTED user@some.vpn.server:443 (1.2.3.4) via /UDPv4 on NetworkExtensionTUN/10.2.130.109/ gw=[/] 2018-01-31 07:30:48 OS Event: SLEEP 2018-01-31 07:30:48 EVENT: PAUSE 2018-01-31 07:30:51 OS Event: WAKEUP 2018-01-31 07:30:54 RESUME TEST: Internet:ReachableViaWiFi/-R t------ 2018-01-31 07:30:54 STANDARD RESUME 2018-01-31 07:30:54 EVENT: RESUME 2018-01-31 07:30:54 EVENT: RECONNECTING 2018-01-31 07:30:54 Contacting [1.2.3.4]:443/UDP via UDP 2018-01-31 07:30:54 EVENT: WAIT 2018-01-31 07:30:54 Connecting to [some.vpn.server]:443 (1.2.3.4) via UDPv4 2018-01-31 07:30:54 EVENT: CONNECTING 2018-01-31 07:30:54 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2018-01-31 07:30:54 Creds: Username/Password 2018-01-31 07:30:54 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4 IV_VER=3.1.2 IV_PLAT=ios IV_IPv6=0 IV_AUTO_SESS=1 2018-01-31 07:30:54 VERIFY OK : depth=0 cert. version : 3 serial number : 00 issuer name : CN=some.vpn.server subject name : CN=some.vpn.server issued on : 2015-10-06 12:15:26 expires on : 2025-10-03 12:15:26 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing 2018-01-31 07:30:55 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2018-01-31 07:30:55 Session is ACTIVE 2018-01-31 07:30:55 EVENT: GET_CONFIG 2018-01-31 07:30:55 Sending PUSH_REQUEST to server... 2018-01-31 07:30:55 OS Event: SLEEP 2018-01-31 07:30:55 EVENT: PAUSE 2018-01-31 07:30:57 OS Event: WAKEUP 2018-01-31 07:31:00 RESUME TEST: Internet:ReachableViaWiFi/-R t------ 2018-01-31 07:31:00 STANDARD RESUME 2018-01-31 07:31:00 EVENT: RESUME 2018-01-31 07:31:00 EVENT: RECONNECTING 2018-01-31 07:31:00 Contacting [185.117.88.9]:443/UDP via UDP 2018-01-31 07:31:00 EVENT: WAIT 2018-01-31 07:31:00 Connecting to [some.vpn.server]:443 (185.117.88.9) via UDPv4 2018-01-31 07:31:00 EVENT: CONNECTING 2018-01-31 07:31:00 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2018-01-31 07:31:00 Creds: Username/Password 2018-01-31 07:31:00 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4 IV_VER=3.1.2 IV_PLAT=ios IV_IPv6=0 IV_AUTO_SESS=1 2018-01-31 07:31:00 VERIFY OK : depth=0 cert. version : 3 serial number : 00 issuer name : CN=some.vpn.server subject name : CN=some.vpn.server issued on : 2015-10-06 12:15:26 expires on : 2025-10-03 12:15:26 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing 2018-01-31 07:31:00 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2018-01-31 07:31:00 Session is ACTIVE 2018-01-31 07:31:00 EVENT: GET_CONFIG 2018-01-31 07:31:00 Sending PUSH_REQUEST to server... 2018-01-31 07:31:01 OS Event: SLEEP 2018-01-31 07:31:01 EVENT: PAUSE 2018-01-31 07:31:02 OS Event: WAKEUP 2018-01-31 07:31:05 RESUME TEST: Internet:ReachableViaWiFi/-R t------ 2018-01-31 07:31:05 STANDARD RESUME 2018-01-31 07:31:05 EVENT: RESUME 2018-01-31 07:31:05 EVENT: RECONNECTING 2018-01-31 07:31:05 Contacting [1.2.3.4]:443/UDP via UDP 2018-01-31 07:31:05 EVENT: WAIT 2018-01-31 07:31:05 Connecting to [some.vpn.server]:443 (1.2.3.4) via UDPv4 2018-01-31 07:31:05 EVENT: CONNECTING 2018-01-31 07:31:05 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2018-01-31 07:31:05 Creds: Username/Password 2018-01-31 07:31:05 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4 IV_VER=3.1.2 IV_PLAT=ios IV_IPv6=0 IV_AUTO_SESS=1 2018-01-31 07:31:05 VERIFY OK : depth=0 cert. version : 3 serial number : 00 issuer name : CN=some.vpn.server subject name : CN=some.vpn.server issued on : 2015-10-06 12:15:26 expires on : 2025-10-03 12:15:26 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing 2018-01-31 07:31:05 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2018-01-31 07:31:05 Session is ACTIVE 2018-01-31 07:31:05 EVENT: GET_CONFIG 2018-01-31 07:31:05 Sending PUSH_REQUEST to server... 2018-01-31 07:31:05 OS Event: SLEEP 2018-01-31 07:31:05 EVENT: PAUSE 2018-01-31 07:31:07 OS Event: WAKEUP 2018-01-31 07:31:10 RESUME TEST: Internet:ReachableViaWiFi/-R t------ 2018-01-31 07:31:10 STANDARD RESUME 2018-01-31 07:31:10 EVENT: RESUME 2018-01-31 07:31:10 EVENT: RECONNECTING 2018-01-31 07:31:10 Contacting [185.117.88.9]:443/UDP via UDP 2018-01-31 07:31:10 EVENT: WAIT 2018-01-31 07:31:10 Connecting to [some.vpn.server]:443 (185.117.88.9) via UDPv4 2018-01-31 07:31:10 EVENT: CONNECTING 2018-01-31 07:31:10 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2018-01-31 07:31:10 Creds: Username/Password 2018-01-31 07:31:10 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4 IV_VER=3.1.2 IV_PLAT=ios IV_IPv6=0 IV_AUTO_SESS=1 2018-01-31 07:31:10 VERIFY OK : depth=0 cert. version : 3 serial number : 00 issuer name : CN=some.vpn.server subject name : CN=some.vpn.server issued on : 2015-10-06 12:15:26 expires on : 2025-10-03 12:15:26 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing 2018-01-31 07:31:10 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2018-01-31 07:31:10 Session is ACTIVE 2018-01-31 07:31:10 EVENT: GET_CONFIG 2018-01-31 07:31:10 Sending PUSH_REQUEST to server... 2018-01-31 07:31:10 OS Event: SLEEP 2018-01-31 07:31:10 EVENT: PAUSE 2018-01-31 07:31:11 OS Event: WAKEUP 2018-01-31 07:31:14 RESUME TEST: Internet:ReachableViaWiFi/-R t------ 2018-01-31 07:31:14 STANDARD RESUME 2018-01-31 07:31:14 EVENT: RESUME 2018-01-31 07:31:14 EVENT: RECONNECTING 2018-01-31 07:31:14 Contacting [1.2.3.4]:443/UDP via UDP 2018-01-31 07:31:14 EVENT: WAIT 2018-01-31 07:31:14 Connecting to [some.vpn.server]:443 (1.2.3.4) via UDPv4 2018-01-31 07:31:14 EVENT: CONNECTING 2018-01-31 07:31:14 Tunnel Options:V4,dev-type tun,link-mtu 1601,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client 2018-01-31 07:31:14 Creds: Username/Password 2018-01-31 07:31:14 Peer Info: IV_GUI_VER=net.openvpn.connect.ios 1.2.7-4 IV_VER=3.1.2 IV_PLAT=ios IV_IPv6=0 IV_AUTO_SESS=1 2018-01-31 07:31:14 VERIFY OK : depth=0 cert. version : 3 serial number : 00 issuer name : CN=some.vpn.server subject name : CN=some.vpn.server issued on : 2015-10-06 12:15:26 expires on : 2025-10-03 12:15:26 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true key usage : Digital Signature, Non Repudiation, Key Encipherment, Data Encipherment, Key Cert Sign, CRL Sign ext key usage : TLS Web Server Authentication, TLS Web Client Authentication, Code Signing, E-mail Protection, ???, ???, ???, Time Stamping, OCSP Signing 2018-01-31 07:31:14 SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-AES-256-CBC-SHA 2018-01-31 07:31:14 Session is ACTIVE 2018-01-31 07:31:14 EVENT: GET_CONFIG 2018-01-31 07:31:14 Sending PUSH_REQUEST to server... 2018-01-31 07:31:14 AUTH_FAILED 2018-01-31 07:31:14 EVENT: AUTH_FAILED [ERR] 2018-01-31 07:31:14 EVENT: DISCONNECTED 2018-01-31 07:31:14 Raw stats on disconnect: BYTES_IN : 23196715 BYTES_OUT : 2212308 PACKETS_IN : 18637 PACKETS_OUT : 11545 TUN_BYTES_IN : 1132340 TUN_BYTES_OUT : 21341729 TUN_PACKETS_IN : 11322 TUN_PACKETS_OUT : 18310 AUTH_FAILED : 1 N_PAUSE : 6 N_RECONNECT : 6 2018-01-31 07:31:14 Performance stats on disconnect: CPU usage (microseconds): 3391400 Tunnel compression ratio (uplink): 1.95375 Tunnel compression ratio (downlink): 1.08692 Network bytes per CPU second: 7492192 Tunnel bytes per CPU second: 6626782 2018-01-31 07:31:14 OS Event: SLEEP