axel_lurcher

Untitled

Jan 31st, 2017
187
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 486.02 KB | None | 0 0
  1. Tue Jan 31 20:26:13 2017 us=58222 Current Parameter Settings:
  2. Tue Jan 31 20:26:13 2017 us=58222 config = 'C:\OpenVPN\config\server.ovpn'
  3. Tue Jan 31 20:26:13 2017 us=58222 mode = 1
  4. Tue Jan 31 20:26:13 2017 us=58222 show_ciphers = DISABLED
  5. Tue Jan 31 20:26:13 2017 us=58222 show_digests = DISABLED
  6. Tue Jan 31 20:26:13 2017 us=58222 show_engines = DISABLED
  7. Tue Jan 31 20:26:13 2017 us=58222 genkey = DISABLED
  8. Tue Jan 31 20:26:13 2017 us=58222 key_pass_file = '[UNDEF]'
  9. Tue Jan 31 20:26:13 2017 us=58222 show_tls_ciphers = DISABLED
  10. Tue Jan 31 20:26:13 2017 us=58222 connect_retry_max = 0
  11. Tue Jan 31 20:26:13 2017 us=58222 Connection profiles [0]:
  12. Tue Jan 31 20:26:13 2017 us=58222 proto = udp
  13. Tue Jan 31 20:26:13 2017 us=58222 local = '[UNDEF]'
  14. Tue Jan 31 20:26:13 2017 us=58222 local_port = '1194'
  15. Tue Jan 31 20:26:13 2017 us=58222 remote = '[UNDEF]'
  16. Tue Jan 31 20:26:13 2017 us=58222 remote_port = '1194'
  17. Tue Jan 31 20:26:13 2017 us=58222 remote_float = DISABLED
  18. Tue Jan 31 20:26:13 2017 us=58222 bind_defined = DISABLED
  19. Tue Jan 31 20:26:13 2017 us=58222 bind_local = ENABLED
  20. Tue Jan 31 20:26:13 2017 us=58222 bind_ipv6_only = DISABLED
  21. Tue Jan 31 20:26:13 2017 us=58222 connect_retry_seconds = 5
  22. Tue Jan 31 20:26:13 2017 us=58222 connect_timeout = 120
  23. Tue Jan 31 20:26:13 2017 us=58222 socks_proxy_server = '[UNDEF]'
  24. Tue Jan 31 20:26:13 2017 us=58222 socks_proxy_port = '[UNDEF]'
  25. Tue Jan 31 20:26:13 2017 us=58222 tun_mtu = 1500
  26. Tue Jan 31 20:26:13 2017 us=58222 tun_mtu_defined = ENABLED
  27. Tue Jan 31 20:26:13 2017 us=58222 link_mtu = 1500
  28. Tue Jan 31 20:26:13 2017 us=58222 link_mtu_defined = DISABLED
  29. Tue Jan 31 20:26:13 2017 us=58222 tun_mtu_extra = 0
  30. Tue Jan 31 20:26:13 2017 us=58222 tun_mtu_extra_defined = DISABLED
  31. Tue Jan 31 20:26:13 2017 us=58222 mtu_discover_type = -1
  32. Tue Jan 31 20:26:13 2017 us=58222 fragment = 0
  33. Tue Jan 31 20:26:13 2017 us=58222 mssfix = 1450
  34. Tue Jan 31 20:26:13 2017 us=58222 explicit_exit_notification = 1
  35. Tue Jan 31 20:26:13 2017 us=58222 Connection profiles END
  36. Tue Jan 31 20:26:13 2017 us=58222 remote_random = DISABLED
  37. Tue Jan 31 20:26:13 2017 us=58222 ipchange = '[UNDEF]'
  38. Tue Jan 31 20:26:13 2017 us=58222 dev = 'tun'
  39. Tue Jan 31 20:26:13 2017 us=58222 dev_type = '[UNDEF]'
  40. Tue Jan 31 20:26:13 2017 us=58222 dev_node = '[UNDEF]'
  41. Tue Jan 31 20:26:13 2017 us=58222 lladdr = '[UNDEF]'
  42. Tue Jan 31 20:26:13 2017 us=58222 topology = 3
  43. Tue Jan 31 20:26:13 2017 us=58222 ifconfig_local = '10.5.0.1'
  44. Tue Jan 31 20:26:13 2017 us=58222 ifconfig_remote_netmask = '255.255.255.0'
  45. Tue Jan 31 20:26:13 2017 us=58222 ifconfig_noexec = DISABLED
  46. Tue Jan 31 20:26:13 2017 us=58222 ifconfig_nowarn = DISABLED
  47. Tue Jan 31 20:26:13 2017 us=58222 ifconfig_ipv6_local = '[UNDEF]'
  48. Tue Jan 31 20:26:13 2017 us=58222 ifconfig_ipv6_netbits = 0
  49. Tue Jan 31 20:26:13 2017 us=58222 ifconfig_ipv6_remote = '[UNDEF]'
  50. Tue Jan 31 20:26:13 2017 us=58222 shaper = 0
  51. Tue Jan 31 20:26:13 2017 us=58222 mtu_test = 0
  52. Tue Jan 31 20:26:13 2017 us=58222 mlock = DISABLED
  53. Tue Jan 31 20:26:13 2017 us=58222 keepalive_ping = 10
  54. Tue Jan 31 20:26:13 2017 us=58222 keepalive_timeout = 120
  55. Tue Jan 31 20:26:13 2017 us=58222 inactivity_timeout = 0
  56. Tue Jan 31 20:26:13 2017 us=58222 ping_send_timeout = 10
  57. Tue Jan 31 20:26:13 2017 us=58222 ping_rec_timeout = 240
  58. Tue Jan 31 20:26:13 2017 us=58222 ping_rec_timeout_action = 2
  59. Tue Jan 31 20:26:13 2017 us=58222 ping_timer_remote = DISABLED
  60. Tue Jan 31 20:26:13 2017 us=58222 remap_sigusr1 = 0
  61. Tue Jan 31 20:26:13 2017 us=58222 persist_tun = ENABLED
  62. Tue Jan 31 20:26:13 2017 us=58222 persist_local_ip = DISABLED
  63. Tue Jan 31 20:26:13 2017 us=58222 persist_remote_ip = DISABLED
  64. Tue Jan 31 20:26:13 2017 us=58222 persist_key = ENABLED
  65. Tue Jan 31 20:26:13 2017 us=58222 passtos = DISABLED
  66. Tue Jan 31 20:26:13 2017 us=58222 resolve_retry_seconds = 1000000000
  67. Tue Jan 31 20:26:13 2017 us=58222 resolve_in_advance = DISABLED
  68. Tue Jan 31 20:26:13 2017 us=58222 username = '[UNDEF]'
  69. Tue Jan 31 20:26:13 2017 us=58222 groupname = '[UNDEF]'
  70. Tue Jan 31 20:26:13 2017 us=58222 chroot_dir = '[UNDEF]'
  71. Tue Jan 31 20:26:13 2017 us=58222 cd_dir = '[UNDEF]'
  72. Tue Jan 31 20:26:13 2017 us=58222 writepid = '[UNDEF]'
  73. Tue Jan 31 20:26:13 2017 us=58222 up_script = '[UNDEF]'
  74. Tue Jan 31 20:26:13 2017 us=58222 down_script = '[UNDEF]'
  75. Tue Jan 31 20:26:13 2017 us=58222 down_pre = DISABLED
  76. Tue Jan 31 20:26:13 2017 us=58222 up_restart = DISABLED
  77. Tue Jan 31 20:26:13 2017 us=58222 up_delay = DISABLED
  78. Tue Jan 31 20:26:13 2017 us=58222 daemon = DISABLED
  79. Tue Jan 31 20:26:13 2017 us=58222 inetd = 0
  80. Tue Jan 31 20:26:13 2017 us=58222 log = DISABLED
  81. Tue Jan 31 20:26:13 2017 us=58222 suppress_timestamps = DISABLED
  82. Tue Jan 31 20:26:13 2017 us=58222 machine_readable_output = DISABLED
  83. Tue Jan 31 20:26:13 2017 us=58222 nice = 0
  84. Tue Jan 31 20:26:13 2017 us=58222 verbosity = 4
  85. Tue Jan 31 20:26:13 2017 us=58222 mute = 0
  86. Tue Jan 31 20:26:13 2017 us=58222 gremlin = 0
  87. Tue Jan 31 20:26:13 2017 us=58222 status_file = 'openvpn-status.log'
  88. Tue Jan 31 20:26:13 2017 us=58222 status_file_version = 1
  89. Tue Jan 31 20:26:13 2017 us=58222 status_file_update_freq = 60
  90. Tue Jan 31 20:26:13 2017 us=58222 occ = ENABLED
  91. Tue Jan 31 20:26:13 2017 us=58222 rcvbuf = 0
  92. Tue Jan 31 20:26:13 2017 us=58222 sndbuf = 0
  93. Tue Jan 31 20:26:13 2017 us=58222 sockflags = 0
  94. Tue Jan 31 20:26:13 2017 us=58222 fast_io = DISABLED
  95. Tue Jan 31 20:26:13 2017 us=58222 comp.alg = 0
  96. Tue Jan 31 20:26:13 2017 us=58222 comp.flags = 0
  97. Tue Jan 31 20:26:13 2017 us=58222 route_script = '[UNDEF]'
  98. Tue Jan 31 20:26:13 2017 us=58222 route_default_gateway = '10.5.0.2'
  99. Tue Jan 31 20:26:13 2017 us=58222 route_default_metric = 0
  100. Tue Jan 31 20:26:13 2017 us=58222 route_noexec = DISABLED
  101. Tue Jan 31 20:26:13 2017 us=58222 route_delay = 0
  102. Tue Jan 31 20:26:13 2017 us=58222 route_delay_window = 30
  103. Tue Jan 31 20:26:13 2017 us=58222 route_delay_defined = DISABLED
  104. Tue Jan 31 20:26:13 2017 us=58222 route_nopull = DISABLED
  105. Tue Jan 31 20:26:13 2017 us=58222 route_gateway_via_dhcp = DISABLED
  106. Tue Jan 31 20:26:13 2017 us=58222 allow_pull_fqdn = DISABLED
  107. Tue Jan 31 20:26:13 2017 us=58222 management_addr = '[UNDEF]'
  108. Tue Jan 31 20:26:13 2017 us=58222 management_port = '[UNDEF]'
  109. Tue Jan 31 20:26:13 2017 us=58222 management_user_pass = '[UNDEF]'
  110. Tue Jan 31 20:26:13 2017 us=58222 management_log_history_cache = 250
  111. Tue Jan 31 20:26:13 2017 us=58222 management_echo_buffer_size = 100
  112. Tue Jan 31 20:26:13 2017 us=58222 management_write_peer_info_file = '[UNDEF]'
  113. Tue Jan 31 20:26:13 2017 us=58222 management_client_user = '[UNDEF]'
  114. Tue Jan 31 20:26:13 2017 us=58222 management_client_group = '[UNDEF]'
  115. Tue Jan 31 20:26:13 2017 us=58222 management_flags = 0
  116. Tue Jan 31 20:26:13 2017 us=58222 shared_secret_file = '[UNDEF]'
  117. Tue Jan 31 20:26:13 2017 us=58222 key_direction = 1
  118. Tue Jan 31 20:26:13 2017 us=58222 ciphername = 'AES-256-CBC'
  119. Tue Jan 31 20:26:13 2017 us=58222 ncp_enabled = ENABLED
  120. Tue Jan 31 20:26:13 2017 us=58222 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
  121. Tue Jan 31 20:26:13 2017 us=58222 authname = 'SHA1'
  122. Tue Jan 31 20:26:13 2017 us=58222 prng_hash = 'SHA1'
  123. Tue Jan 31 20:26:13 2017 us=58222 prng_nonce_secret_len = 16
  124. Tue Jan 31 20:26:13 2017 us=58222 keysize = 0
  125. Tue Jan 31 20:26:13 2017 us=58222 engine = DISABLED
  126. Tue Jan 31 20:26:13 2017 us=58222 replay = ENABLED
  127. Tue Jan 31 20:26:13 2017 us=58222 mute_replay_warnings = DISABLED
  128. Tue Jan 31 20:26:13 2017 us=58222 replay_window = 64
  129. Tue Jan 31 20:26:13 2017 us=58222 replay_time = 15
  130. Tue Jan 31 20:26:13 2017 us=58222 packet_id_file = '[UNDEF]'
  131. Tue Jan 31 20:26:13 2017 us=58222 use_iv = ENABLED
  132. Tue Jan 31 20:26:13 2017 us=58222 test_crypto = DISABLED
  133. Tue Jan 31 20:26:13 2017 us=58222 tls_server = ENABLED
  134. Tue Jan 31 20:26:13 2017 us=58222 tls_client = DISABLED
  135. Tue Jan 31 20:26:13 2017 us=58222 key_method = 2
  136. Tue Jan 31 20:26:13 2017 us=58222 ca_file = 'C:\OpenVPN\easy-rsa\keys\ca.crt'
  137. Tue Jan 31 20:26:13 2017 us=58222 ca_path = '[UNDEF]'
  138. Tue Jan 31 20:26:13 2017 us=58222 dh_file = 'C:\OpenVPN\easy-rsa\keys\dh1024.pem'
  139. Tue Jan 31 20:26:13 2017 us=58222 cert_file = 'C:\OpenVPN\easy-rsa\keys\OVPN.crt'
  140. Tue Jan 31 20:26:13 2017 us=58222 extra_certs_file = '[UNDEF]'
  141. Tue Jan 31 20:26:13 2017 us=58222 priv_key_file = 'C:\OpenVPN\easy-rsa\keys\OVPN.key'
  142. Tue Jan 31 20:26:13 2017 us=58222 pkcs12_file = '[UNDEF]'
  143. Tue Jan 31 20:26:13 2017 us=58222 cryptoapi_cert = '[UNDEF]'
  144. Tue Jan 31 20:26:13 2017 us=58222 cipher_list = '[UNDEF]'
  145. Tue Jan 31 20:26:13 2017 us=58222 tls_verify = '[UNDEF]'
  146. Tue Jan 31 20:26:13 2017 us=58222 tls_export_cert = '[UNDEF]'
  147. Tue Jan 31 20:26:13 2017 us=58222 verify_x509_type = 0
  148. Tue Jan 31 20:26:13 2017 us=58222 verify_x509_name = '[UNDEF]'
  149. Tue Jan 31 20:26:13 2017 us=58222 crl_file = '[UNDEF]'
  150. Tue Jan 31 20:26:13 2017 us=58222 ns_cert_type = 0
  151. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  152. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  153. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  154. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  155. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  156. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  157. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  158. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  159. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  160. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  161. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  162. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  163. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  164. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  165. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  166. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_ku[i] = 0
  167. Tue Jan 31 20:26:13 2017 us=58222 remote_cert_eku = '[UNDEF]'
  168. Tue Jan 31 20:26:13 2017 us=58222 ssl_flags = 0
  169. Tue Jan 31 20:26:13 2017 us=58222 tls_timeout = 2
  170. Tue Jan 31 20:26:13 2017 us=58222 renegotiate_bytes = -1
  171. Tue Jan 31 20:26:13 2017 us=58222 renegotiate_packets = 0
  172. Tue Jan 31 20:26:13 2017 us=58222 renegotiate_seconds = 3600
  173. Tue Jan 31 20:26:13 2017 us=58222 handshake_window = 60
  174. Tue Jan 31 20:26:13 2017 us=58222 transition_window = 3600
  175. Tue Jan 31 20:26:13 2017 us=58222 single_session = DISABLED
  176. Tue Jan 31 20:26:13 2017 us=58222 push_peer_info = DISABLED
  177. Tue Jan 31 20:26:13 2017 us=58222 tls_exit = DISABLED
  178. Tue Jan 31 20:26:13 2017 us=58222 tls_auth_file = 'C:\OpenVPN\easy-rsa\ta.key'
  179. Tue Jan 31 20:26:13 2017 us=58222 tls_crypt_file = '[UNDEF]'
  180. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  181. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  182. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  183. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  184. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  185. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  186. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  187. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  188. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  189. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  190. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  191. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  192. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  193. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  194. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  195. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_protected_authentication = DISABLED
  196. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  197. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  198. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  199. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  200. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  201. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  202. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  203. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  204. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  205. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  206. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  207. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  208. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  209. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  210. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  211. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_private_mode = 00000000
  212. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  213. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  214. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  215. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  216. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  217. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  218. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  219. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  220. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  221. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  222. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  223. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  224. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  225. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  226. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  227. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_cert_private = DISABLED
  228. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_pin_cache_period = -1
  229. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_id = '[UNDEF]'
  230. Tue Jan 31 20:26:13 2017 us=58222 pkcs11_id_management = DISABLED
  231. Tue Jan 31 20:26:13 2017 us=58222 server_network = 10.5.0.0
  232. Tue Jan 31 20:26:13 2017 us=58222 server_netmask = 255.255.255.0
  233. Tue Jan 31 20:26:13 2017 us=73854 server_network_ipv6 = ::
  234. Tue Jan 31 20:26:13 2017 us=73854 server_netbits_ipv6 = 0
  235. Tue Jan 31 20:26:13 2017 us=73854 server_bridge_ip = 0.0.0.0
  236. Tue Jan 31 20:26:13 2017 us=73854 server_bridge_netmask = 0.0.0.0
  237. Tue Jan 31 20:26:13 2017 us=73854 server_bridge_pool_start = 0.0.0.0
  238. Tue Jan 31 20:26:13 2017 us=73854 server_bridge_pool_end = 0.0.0.0
  239. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'route 192.168.0.0 255.255.255.0'
  240. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'route 10.5.0.0 255.255.255.0'
  241. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'dhcp-option DNS 192.168.0.249'
  242. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'dhcp-option DNS 192.168.0.251'
  243. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'dhcp-option DOMAIN Lening.local'
  244. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'dhcp-option SEARCH Lening.local'
  245. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'route-gateway 10.5.0.1'
  246. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'topology subnet'
  247. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'ping 10'
  248. Tue Jan 31 20:26:13 2017 us=73854 push_entry = 'ping-restart 120'
  249. Tue Jan 31 20:26:13 2017 us=73854 ifconfig_pool_defined = ENABLED
  250. Tue Jan 31 20:26:13 2017 us=73854 ifconfig_pool_start = 10.5.0.2
  251. Tue Jan 31 20:26:13 2017 us=73854 ifconfig_pool_end = 10.5.0.253
  252. Tue Jan 31 20:26:13 2017 us=73854 ifconfig_pool_netmask = 255.255.255.0
  253. Tue Jan 31 20:26:13 2017 us=73854 ifconfig_pool_persist_filename = 'ipp.txt'
  254. Tue Jan 31 20:26:13 2017 us=73854 ifconfig_pool_persist_refresh_freq = 600
  255. Tue Jan 31 20:26:13 2017 us=73854 ifconfig_ipv6_pool_defined = DISABLED
  256. Tue Jan 31 20:26:13 2017 us=73854 ifconfig_ipv6_pool_base = ::
  257. Tue Jan 31 20:26:13 2017 us=73854 ifconfig_ipv6_pool_netbits = 0
  258. Tue Jan 31 20:26:13 2017 us=73854 n_bcast_buf = 256
  259. Tue Jan 31 20:26:13 2017 us=73854 tcp_queue_limit = 64
  260. Tue Jan 31 20:26:13 2017 us=73854 real_hash_size = 256
  261. Tue Jan 31 20:26:13 2017 us=73854 virtual_hash_size = 256
  262. Tue Jan 31 20:26:13 2017 us=73854 client_connect_script = '[UNDEF]'
  263. Tue Jan 31 20:26:13 2017 us=73854 learn_address_script = '[UNDEF]'
  264. Tue Jan 31 20:26:13 2017 us=73854 client_disconnect_script = '[UNDEF]'
  265. Tue Jan 31 20:26:13 2017 us=73854 client_config_dir = '[UNDEF]'
  266. Tue Jan 31 20:26:13 2017 us=73854 ccd_exclusive = DISABLED
  267. Tue Jan 31 20:26:13 2017 us=73854 tmp_dir = 'C:\Windows\TEMP\'
  268. Tue Jan 31 20:26:13 2017 us=73854 push_ifconfig_defined = DISABLED
  269. Tue Jan 31 20:26:13 2017 us=73854 push_ifconfig_local = 0.0.0.0
  270. Tue Jan 31 20:26:13 2017 us=73854 push_ifconfig_remote_netmask = 0.0.0.0
  271. Tue Jan 31 20:26:13 2017 us=73854 push_ifconfig_ipv6_defined = DISABLED
  272. Tue Jan 31 20:26:13 2017 us=73854 push_ifconfig_ipv6_local = ::/0
  273. Tue Jan 31 20:26:13 2017 us=73854 push_ifconfig_ipv6_remote = ::
  274. Tue Jan 31 20:26:13 2017 us=73854 enable_c2c = ENABLED
  275. Tue Jan 31 20:26:13 2017 us=73854 duplicate_cn = DISABLED
  276. Tue Jan 31 20:26:13 2017 us=73854 cf_max = 0
  277. Tue Jan 31 20:26:13 2017 us=73854 cf_per = 0
  278. Tue Jan 31 20:26:13 2017 us=73854 max_clients = 1024
  279. Tue Jan 31 20:26:13 2017 us=73854 max_routes_per_client = 256
  280. Tue Jan 31 20:26:13 2017 us=73854 auth_user_pass_verify_script = '[UNDEF]'
  281. Tue Jan 31 20:26:13 2017 us=73854 auth_user_pass_verify_script_via_file = DISABLED
  282. Tue Jan 31 20:26:13 2017 us=73854 auth_token_generate = DISABLED
  283. Tue Jan 31 20:26:13 2017 us=73854 auth_token_lifetime = 0
  284. Tue Jan 31 20:26:13 2017 us=73854 client = DISABLED
  285. Tue Jan 31 20:26:13 2017 us=73854 pull = DISABLED
  286. Tue Jan 31 20:26:13 2017 us=73854 auth_user_pass_file = '[UNDEF]'
  287. Tue Jan 31 20:26:13 2017 us=73854 show_net_up = DISABLED
  288. Tue Jan 31 20:26:13 2017 us=73854 route_method = 0
  289. Tue Jan 31 20:26:13 2017 us=73854 block_outside_dns = DISABLED
  290. Tue Jan 31 20:26:13 2017 us=73854 ip_win32_defined = DISABLED
  291. Tue Jan 31 20:26:13 2017 us=73854 ip_win32_type = 3
  292. Tue Jan 31 20:26:13 2017 us=73854 dhcp_masq_offset = 0
  293. Tue Jan 31 20:26:13 2017 us=73854 dhcp_lease_time = 31536000
  294. Tue Jan 31 20:26:13 2017 us=73854 tap_sleep = 10
  295. Tue Jan 31 20:26:13 2017 us=73854 dhcp_options = DISABLED
  296. Tue Jan 31 20:26:13 2017 us=73854 dhcp_renew = DISABLED
  297. Tue Jan 31 20:26:13 2017 us=73854 dhcp_pre_release = DISABLED
  298. Tue Jan 31 20:26:13 2017 us=73854 dhcp_release = DISABLED
  299. Tue Jan 31 20:26:13 2017 us=73854 domain = '[UNDEF]'
  300. Tue Jan 31 20:26:13 2017 us=73854 netbios_scope = '[UNDEF]'
  301. Tue Jan 31 20:26:13 2017 us=73854 netbios_node_type = 0
  302. Tue Jan 31 20:26:13 2017 us=73854 disable_nbt = DISABLED
  303. Tue Jan 31 20:26:13 2017 us=73854 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 27 2016
  304. Tue Jan 31 20:26:13 2017 us=73854 Windows version 6.2 (Windows 8 or greater) 64bit
  305. Tue Jan 31 20:26:13 2017 us=73854 library versions: OpenSSL 1.0.2i 22 Sep 2016, LZO 2.09
  306. Tue Jan 31 20:26:13 2017 us=73854 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
  307. Tue Jan 31 20:26:13 2017 us=167598 Diffie-Hellman initialized with 1024 bit key
  308. Tue Jan 31 20:26:13 2017 us=167598 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  309. Tue Jan 31 20:26:13 2017 us=167598 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  310. Tue Jan 31 20:26:13 2017 us=167598 TLS-Auth MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  311. Tue Jan 31 20:26:13 2017 us=167598 interactive service msg_channel=0
  312. Tue Jan 31 20:26:13 2017 us=167598 open_tun
  313. Tue Jan 31 20:26:13 2017 us=167598 TAP-WIN32 device [VPN] opened: \\.\Global\{B27F2BA5-8AE5-4CBD-880D-95FDC29F5FC4}.tap
  314. Tue Jan 31 20:26:13 2017 us=167598 TAP-Windows Driver Version 9.21
  315. Tue Jan 31 20:26:13 2017 us=167598 TAP-Windows MTU=1500
  316. Tue Jan 31 20:26:13 2017 us=183223 Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.0.1/255.255.255.0 [SUCCEEDED]
  317. Tue Jan 31 20:26:13 2017 us=183223 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.0.1/255.255.255.0 on interface {B27F2BA5-8AE5-4CBD-880D-95FDC29F5FC4} [DHCP-serv: 10.5.0.254, lease-time: 31536000]
  318. Tue Jan 31 20:26:13 2017 us=183223 Sleeping for 10 seconds...
  319. Tue Jan 31 20:26:23 2017 us=198866 Successful ARP Flush on interface [15] {B27F2BA5-8AE5-4CBD-880D-95FDC29F5FC4}
  320. Tue Jan 31 20:26:23 2017 us=198866 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  321. Tue Jan 31 20:26:23 2017 us=198866 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  322. Tue Jan 31 20:26:23 2017 us=198866 Could not determine IPv4/IPv6 protocol. Using AF_INET6
  323. Tue Jan 31 20:26:23 2017 us=198866 Socket Buffers: R=[65536->65536] S=[65536->65536]
  324. Tue Jan 31 20:26:23 2017 us=198866 setsockopt(IPV6_V6ONLY=0)
  325. Tue Jan 31 20:26:23 2017 us=198866 UDPv6 link local (bound): [AF_INET6][undef]:1194
  326. Tue Jan 31 20:26:23 2017 us=198866 UDPv6 link remote: [AF_UNSPEC]
  327. Tue Jan 31 20:26:23 2017 us=198866 MULTI: multi_init called, r=256 v=256
  328. Tue Jan 31 20:26:23 2017 us=198866 IFCONFIG POOL: base=10.5.0.2 size=252, ipv6=0
  329. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BelebeiFS,10.5.0.2', TODO: IPv6
  330. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  331. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BaimakES,10.5.0.3', TODO: IPv6
  332. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  333. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='DavlekanovoMTS2,10.5.0.4', TODO: IPv6
  334. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  335. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='ArhangelskoyeMTS,10.5.0.5', TODO: IPv6
  336. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  337. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='Passag2,10.5.0.6', TODO: IPv6
  338. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  339. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BuguruslanFS2,10.5.0.7', TODO: IPv6
  340. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  341. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BuzdakES,10.5.0.8', TODO: IPv6
  342. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  343. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='DavlekanovoES,10.5.0.9', TODO: IPv6
  344. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  345. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='ErmolaevoFS,10.5.0.10', TODO: IPv6
  346. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  347. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='ErmekeevoFS,10.5.0.11', TODO: IPv6
  348. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  349. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='IsyangulovoEs,10.5.0.12', TODO: IPv6
  350. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  351. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KandryES,10.5.0.13', TODO: IPv6
  352. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  353. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KarmaskaliFS2,10.5.0.14', TODO: IPv6
  354. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  355. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KarmaskaliFS,10.5.0.15', TODO: IPv6
  356. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  357. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='Llocal,10.5.0.16', TODO: IPv6
  358. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  359. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KMiyakiFS,10.5.0.17', TODO: IPv6
  360. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  361. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KmiyakiES,10.5.0.18', TODO: IPv6
  362. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  363. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BuzdakES,10.5.0.19', TODO: IPv6
  364. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  365. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='MeleuzES,10.5.0.20', TODO: IPv6
  366. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  367. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='NeftekamskES,10.5.0.21', TODO: IPv6
  368. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  369. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='NeftekamskES2,10.5.0.22', TODO: IPv6
  370. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  371. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='OktyabrskiiES2,10.5.0.23', TODO: IPv6
  372. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  373. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='RaevskiiMTS,10.5.0.24', TODO: IPv6
  374. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  375. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SterlibashevoFS,10.5.0.25', TODO: IPv6
  376. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  377. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='RaevskiiES,10.5.0.26', TODO: IPv6
  378. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  379. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SterlibashevoES,10.5.0.27', TODO: IPv6
  380. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  381. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='TuimaziFS2,10.5.0.28', TODO: IPv6
  382. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  383. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='UfamvdFS,10.5.0.29', TODO: IPv6
  384. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  385. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='UfamvdES,10.5.0.30', TODO: IPv6
  386. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  387. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='FedorovkaES,10.5.0.31', TODO: IPv6
  388. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  389. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='ChekmagushES,10.5.0.32', TODO: IPv6
  390. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  391. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='ChishmiES,10.5.0.33', TODO: IPv6
  392. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  393. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='ChishmiES2,10.5.0.34', TODO: IPv6
  394. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  395. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SharanFS,10.5.0.35', TODO: IPv6
  396. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  397. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='FedorovkaMTS,10.5.0.36', TODO: IPv6
  398. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  399. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SharanMTS,10.5.0.37', TODO: IPv6
  400. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  401. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='FedorovkaFS,10.5.0.38', TODO: IPv6
  402. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  403. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SharanES,10.5.0.39', TODO: IPv6
  404. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  405. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='YazikovoES,10.5.0.40', TODO: IPv6
  406. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  407. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='YazikovoFS2,10.5.0.41', TODO: IPv6
  408. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  409. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='YazikovoES2,10.5.0.42', TODO: IPv6
  410. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  411. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='YazikovoFS,10.5.0.43', TODO: IPv6
  412. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  413. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BirskFS,10.5.0.44', TODO: IPv6
  414. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  415. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='NovosergievkaT2,10.5.0.45', TODO: IPv6
  416. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  417. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AdamovkaMTS2,10.5.0.46', TODO: IPv6
  418. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  419. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AdamovkaMTS,10.5.0.47', TODO: IPv6
  420. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  421. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AdamovkaFs,10.5.0.48', TODO: IPv6
  422. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  423. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AdamovkaFS2,10.5.0.49', TODO: IPv6
  424. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  425. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BeliaevkaMTS2,10.5.0.50', TODO: IPv6
  426. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  427. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AdamovkaES2,10.5.0.51', TODO: IPv6
  428. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  429. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='DombarovkaMTS2,10.5.0.52', TODO: IPv6
  430. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  431. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KvarkenoMTS,10.5.0.53', TODO: IPv6
  432. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  433. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KandryES,10.5.0.54', TODO: IPv6
  434. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  435. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KvarkenoFS,10.5.0.55', TODO: IPv6
  436. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  437. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KvarkenoFS2,10.5.0.56', TODO: IPv6
  438. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  439. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KvarkenoES2,10.5.0.57', TODO: IPv6
  440. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  441. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KvarkenoES,10.5.0.58', TODO: IPv6
  442. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  443. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KuvandikMTS2,10.5.0.59', TODO: IPv6
  444. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  445. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KuvandikMTS,10.5.0.60', TODO: IPv6
  446. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  447. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KuvandikMTS3,10.5.0.61', TODO: IPv6
  448. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  449. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='MednogorskMTS,10.5.0.62', TODO: IPv6
  450. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  451. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='MednogorskMTS2,10.5.0.63', TODO: IPv6
  452. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  453. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='NovoorskT2,10.5.0.64', TODO: IPv6
  454. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  455. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='NovoorskMTS2,10.5.0.65', TODO: IPv6
  456. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  457. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='NovoorskMTS,10.5.0.66', TODO: IPv6
  458. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  459. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='NovoorskFS2,10.5.0.67', TODO: IPv6
  460. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  461. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='NovoorskFS,10.5.0.68', TODO: IPv6
  462. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  463. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='MednogorskFS,10.5.0.69', TODO: IPv6
  464. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  465. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='Orsk5MTS,10.5.0.70', TODO: IPv6
  466. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  467. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='OrskHoz,10.5.0.71', TODO: IPv6
  468. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  469. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SaraktashT2,10.5.0.72', TODO: IPv6
  470. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  471. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='Orsk5FS,10.5.0.73', TODO: IPv6
  472. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  473. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='OrskEkspressFS,10.5.0.74', TODO: IPv6
  474. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  475. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='OrskEkspressES,10.5.0.75', TODO: IPv6
  476. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  477. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='OrskEkspressES2,10.5.0.76', TODO: IPv6
  478. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  479. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BuzulukFS,10.5.0.77', TODO: IPv6
  480. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  481. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BuzulukFS2,10.5.0.78', TODO: IPv6
  482. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  483. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='GrachevkaMTS,10.5.0.79', TODO: IPv6
  484. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  485. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='GrachevkaES,10.5.0.80', TODO: IPv6
  486. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  487. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='GrachevkaFS,10.5.0.81', TODO: IPv6
  488. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  489. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BuzulukRus,10.5.0.82', TODO: IPv6
  490. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  491. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KrasnoholmFS,10.5.0.83', TODO: IPv6
  492. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  493. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='PleshanovoFS,10.5.0.84', TODO: IPv6
  494. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  495. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='PleshanovoFS2,10.5.0.85', TODO: IPv6
  496. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  497. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KrasnoholmES2,10.5.0.86', TODO: IPv6
  498. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  499. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KrasnoholmES,10.5.0.87', TODO: IPv6
  500. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  501. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='PleshanovoMTS,10.5.0.88', TODO: IPv6
  502. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  503. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SorochinskT2,10.5.0.89', TODO: IPv6
  504. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  505. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SorochinskFS2,10.5.0.90', TODO: IPv6
  506. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  507. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SorochinskFS,10.5.0.91', TODO: IPv6
  508. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  509. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='TashlaES2,10.5.0.92', TODO: IPv6
  510. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  511. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='TockoeMTS,10.5.0.93', TODO: IPv6
  512. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  513. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='Tockoe2MTS,10.5.0.94', TODO: IPv6
  514. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  515. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='TockoeMTS2,10.5.0.95', TODO: IPv6
  516. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  517. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='TockoeFS,10.5.0.96', TODO: IPv6
  518. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  519. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='TockoeFS2,10.5.0.97', TODO: IPv6
  520. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  521. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='ArlanFS,10.5.0.98', TODO: IPv6
  522. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  523. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AkbulakFS,10.5.0.99', TODO: IPv6
  524. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  525. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AkbulakFS2,10.5.0.100', TODO: IPv6
  526. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  527. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AkbulakES,10.5.0.101', TODO: IPv6
  528. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  529. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AkbulakES2,10.5.0.102', TODO: IPv6
  530. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  531. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SolIleckT2,10.5.0.103', TODO: IPv6
  532. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  533. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='JuzniiES,10.5.0.104', TODO: IPv6
  534. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  535. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SakmaraMTS,10.5.0.105', TODO: IPv6
  536. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  537. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='JuzniiMTS,10.5.0.106', TODO: IPv6
  538. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  539. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AkbulakT2,10.5.0.107', TODO: IPv6
  540. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  541. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SakmaraFS,10.5.0.108', TODO: IPv6
  542. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  543. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='ZamalPC,10.5.0.109', TODO: IPv6
  544. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  545. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='ZamalRasp,10.5.0.110', TODO: IPv6
  546. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  547. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AlexandrovkaMTS,10.5.0.111', TODO: IPv6
  548. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  549. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AbdulinoMTS,10.5.0.112', TODO: IPv6
  550. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  551. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AbdulinoFS,10.5.0.113', TODO: IPv6
  552. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  553. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AbdulinoFS2,10.5.0.114', TODO: IPv6
  554. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  555. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SevernoeMTS,10.5.0.115', TODO: IPv6
  556. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  557. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SevernoeFS2,10.5.0.116', TODO: IPv6
  558. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  559. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='SevernoeFS,10.5.0.117', TODO: IPv6
  560. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  561. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AlexandrovkaES,10.5.0.118', TODO: IPv6
  562. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  563. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KurmanaevkaT2,10.5.0.119', TODO: IPv6
  564. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  565. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BuguruslanMTS,10.5.0.120', TODO: IPv6
  566. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  567. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KurmanaevkaFS,10.5.0.121', TODO: IPv6
  568. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  569. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KurmanaevkaFS2,10.5.0.122', TODO: IPv6
  570. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  571. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KurmanaevkaMTS,10.5.0.123', TODO: IPv6
  572. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  573. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='BuguruslanFS,10.5.0.124', TODO: IPv6
  574. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  575. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AsekeevoMTS,10.5.0.125', TODO: IPv6
  576. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  577. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AlexandrovkaFS2,10.5.0.126', TODO: IPv6
  578. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  579. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='PonomarevkaMTS,10.5.0.127', TODO: IPv6
  580. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  581. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='OktyabrskoeFS,10.5.0.128', TODO: IPv6
  582. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  583. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='PonomarevkaES,10.5.0.129', TODO: IPv6
  584. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  585. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AsekeevoFS2,10.5.0.130', TODO: IPv6
  586. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  587. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AlexandrovkaFS,10.5.0.131', TODO: IPv6
  588. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  589. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='PonomarevkaFS,10.5.0.132', TODO: IPv6
  590. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  591. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='PonomarevkaFS2,10.5.0.133', TODO: IPv6
  592. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  593. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='OktyabrskoeMTS,10.5.0.134', TODO: IPv6
  594. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  595. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='MatveevkaMTS,10.5.0.135', TODO: IPv6
  596. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  597. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='MatveevkaFS,10.5.0.136', TODO: IPv6
  598. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  599. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='AsekeevoFS,10.5.0.137', TODO: IPv6
  600. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  601. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='TockoeMTS2,10.5.0.138', TODO: IPv6
  602. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  603. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KurmanaevkaFS,10.5.0.139', TODO: IPv6
  604. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  605. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='KurmanaevkaFS2,10.5.0.140', TODO: IPv6
  606. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  607. Tue Jan 31 20:26:23 2017 us=198866 ifconfig_pool_read(), in='YazikovoFS2,10.5.0.141', TODO: IPv6
  608. Tue Jan 31 20:26:23 2017 us=198866 succeeded -> ifconfig_pool_set()
  609. Tue Jan 31 20:26:23 2017 us=198866 IFCONFIG POOL LIST
  610. Tue Jan 31 20:26:23 2017 us=198866 BelebeiFS,10.5.0.2
  611. Tue Jan 31 20:26:23 2017 us=198866 BaimakES,10.5.0.3
  612. Tue Jan 31 20:26:23 2017 us=198866 DavlekanovoMTS2,10.5.0.4
  613. Tue Jan 31 20:26:23 2017 us=198866 ArhangelskoyeMTS,10.5.0.5
  614. Tue Jan 31 20:26:23 2017 us=198866 Passag2,10.5.0.6
  615. Tue Jan 31 20:26:23 2017 us=198866 BuguruslanFS2,10.5.0.7
  616. Tue Jan 31 20:26:23 2017 us=198866 BuzdakES,10.5.0.8
  617. Tue Jan 31 20:26:23 2017 us=198866 DavlekanovoES,10.5.0.9
  618. Tue Jan 31 20:26:23 2017 us=198866 ErmolaevoFS,10.5.0.10
  619. Tue Jan 31 20:26:23 2017 us=198866 ErmekeevoFS,10.5.0.11
  620. Tue Jan 31 20:26:23 2017 us=198866 IsyangulovoEs,10.5.0.12
  621. Tue Jan 31 20:26:23 2017 us=198866 KandryES,10.5.0.13
  622. Tue Jan 31 20:26:23 2017 us=198866 KarmaskaliFS2,10.5.0.14
  623. Tue Jan 31 20:26:23 2017 us=198866 KarmaskaliFS,10.5.0.15
  624. Tue Jan 31 20:26:23 2017 us=198866 Llocal,10.5.0.16
  625. Tue Jan 31 20:26:23 2017 us=198866 KMiyakiFS,10.5.0.17
  626. Tue Jan 31 20:26:23 2017 us=198866 KmiyakiES,10.5.0.18
  627. Tue Jan 31 20:26:23 2017 us=198866 BuzdakES,10.5.0.19
  628. Tue Jan 31 20:26:23 2017 us=198866 MeleuzES,10.5.0.20
  629. Tue Jan 31 20:26:23 2017 us=198866 NeftekamskES,10.5.0.21
  630. Tue Jan 31 20:26:23 2017 us=198866 NeftekamskES2,10.5.0.22
  631. Tue Jan 31 20:26:23 2017 us=198866 OktyabrskiiES2,10.5.0.23
  632. Tue Jan 31 20:26:23 2017 us=198866 RaevskiiMTS,10.5.0.24
  633. Tue Jan 31 20:26:23 2017 us=198866 SterlibashevoFS,10.5.0.25
  634. Tue Jan 31 20:26:23 2017 us=198866 RaevskiiES,10.5.0.26
  635. Tue Jan 31 20:26:23 2017 us=198866 SterlibashevoES,10.5.0.27
  636. Tue Jan 31 20:26:23 2017 us=198866 TuimaziFS2,10.5.0.28
  637. Tue Jan 31 20:26:23 2017 us=198866 UfamvdFS,10.5.0.29
  638. Tue Jan 31 20:26:23 2017 us=198866 UfamvdES,10.5.0.30
  639. Tue Jan 31 20:26:23 2017 us=198866 FedorovkaES,10.5.0.31
  640. Tue Jan 31 20:26:23 2017 us=198866 ChekmagushES,10.5.0.32
  641. Tue Jan 31 20:26:23 2017 us=198866 ChishmiES,10.5.0.33
  642. Tue Jan 31 20:26:23 2017 us=198866 ChishmiES2,10.5.0.34
  643. Tue Jan 31 20:26:23 2017 us=198866 SharanFS,10.5.0.35
  644. Tue Jan 31 20:26:23 2017 us=198866 FedorovkaMTS,10.5.0.36
  645. Tue Jan 31 20:26:23 2017 us=198866 SharanMTS,10.5.0.37
  646. Tue Jan 31 20:26:23 2017 us=198866 FedorovkaFS,10.5.0.38
  647. Tue Jan 31 20:26:23 2017 us=198866 SharanES,10.5.0.39
  648. Tue Jan 31 20:26:23 2017 us=198866 YazikovoES,10.5.0.40
  649. Tue Jan 31 20:26:23 2017 us=198866 YazikovoFS2,10.5.0.41
  650. Tue Jan 31 20:26:23 2017 us=198866 YazikovoES2,10.5.0.42
  651. Tue Jan 31 20:26:23 2017 us=198866 YazikovoFS,10.5.0.43
  652. Tue Jan 31 20:26:23 2017 us=198866 BirskFS,10.5.0.44
  653. Tue Jan 31 20:26:23 2017 us=198866 NovosergievkaT2,10.5.0.45
  654. Tue Jan 31 20:26:23 2017 us=198866 AdamovkaMTS2,10.5.0.46
  655. Tue Jan 31 20:26:23 2017 us=198866 AdamovkaMTS,10.5.0.47
  656. Tue Jan 31 20:26:23 2017 us=198866 AdamovkaFs,10.5.0.48
  657. Tue Jan 31 20:26:23 2017 us=198866 AdamovkaFS2,10.5.0.49
  658. Tue Jan 31 20:26:23 2017 us=198866 BeliaevkaMTS2,10.5.0.50
  659. Tue Jan 31 20:26:23 2017 us=198866 AdamovkaES2,10.5.0.51
  660. Tue Jan 31 20:26:23 2017 us=198866 DombarovkaMTS2,10.5.0.52
  661. Tue Jan 31 20:26:23 2017 us=198866 KvarkenoMTS,10.5.0.53
  662. Tue Jan 31 20:26:23 2017 us=198866 KandryES,10.5.0.54
  663. Tue Jan 31 20:26:23 2017 us=198866 KvarkenoFS,10.5.0.55
  664. Tue Jan 31 20:26:23 2017 us=198866 KvarkenoFS2,10.5.0.56
  665. Tue Jan 31 20:26:23 2017 us=198866 KvarkenoES2,10.5.0.57
  666. Tue Jan 31 20:26:23 2017 us=198866 KvarkenoES,10.5.0.58
  667. Tue Jan 31 20:26:23 2017 us=198866 KuvandikMTS2,10.5.0.59
  668. Tue Jan 31 20:26:23 2017 us=198866 KuvandikMTS,10.5.0.60
  669. Tue Jan 31 20:26:23 2017 us=198866 KuvandikMTS3,10.5.0.61
  670. Tue Jan 31 20:26:23 2017 us=198866 MednogorskMTS,10.5.0.62
  671. Tue Jan 31 20:26:23 2017 us=198866 MednogorskMTS2,10.5.0.63
  672. Tue Jan 31 20:26:23 2017 us=198866 NovoorskT2,10.5.0.64
  673. Tue Jan 31 20:26:23 2017 us=198866 NovoorskMTS2,10.5.0.65
  674. Tue Jan 31 20:26:23 2017 us=198866 NovoorskMTS,10.5.0.66
  675. Tue Jan 31 20:26:23 2017 us=198866 NovoorskFS2,10.5.0.67
  676. Tue Jan 31 20:26:23 2017 us=198866 NovoorskFS,10.5.0.68
  677. Tue Jan 31 20:26:23 2017 us=198866 MednogorskFS,10.5.0.69
  678. Tue Jan 31 20:26:23 2017 us=198866 Orsk5MTS,10.5.0.70
  679. Tue Jan 31 20:26:23 2017 us=198866 OrskHoz,10.5.0.71
  680. Tue Jan 31 20:26:23 2017 us=198866 SaraktashT2,10.5.0.72
  681. Tue Jan 31 20:26:23 2017 us=198866 Orsk5FS,10.5.0.73
  682. Tue Jan 31 20:26:23 2017 us=198866 OrskEkspressFS,10.5.0.74
  683. Tue Jan 31 20:26:23 2017 us=198866 OrskEkspressES,10.5.0.75
  684. Tue Jan 31 20:26:23 2017 us=198866 OrskEkspressES2,10.5.0.76
  685. Tue Jan 31 20:26:23 2017 us=198866 BuzulukFS,10.5.0.77
  686. Tue Jan 31 20:26:23 2017 us=198866 BuzulukFS2,10.5.0.78
  687. Tue Jan 31 20:26:23 2017 us=198866 GrachevkaMTS,10.5.0.79
  688. Tue Jan 31 20:26:23 2017 us=198866 GrachevkaES,10.5.0.80
  689. Tue Jan 31 20:26:23 2017 us=198866 GrachevkaFS,10.5.0.81
  690. Tue Jan 31 20:26:23 2017 us=198866 BuzulukRus,10.5.0.82
  691. Tue Jan 31 20:26:23 2017 us=198866 KrasnoholmFS,10.5.0.83
  692. Tue Jan 31 20:26:23 2017 us=198866 PleshanovoFS,10.5.0.84
  693. Tue Jan 31 20:26:23 2017 us=198866 PleshanovoFS2,10.5.0.85
  694. Tue Jan 31 20:26:23 2017 us=198866 KrasnoholmES2,10.5.0.86
  695. Tue Jan 31 20:26:23 2017 us=198866 KrasnoholmES,10.5.0.87
  696. Tue Jan 31 20:26:23 2017 us=198866 PleshanovoMTS,10.5.0.88
  697. Tue Jan 31 20:26:23 2017 us=198866 SorochinskT2,10.5.0.89
  698. Tue Jan 31 20:26:23 2017 us=198866 SorochinskFS2,10.5.0.90
  699. Tue Jan 31 20:26:23 2017 us=198866 SorochinskFS,10.5.0.91
  700. Tue Jan 31 20:26:23 2017 us=198866 TashlaES2,10.5.0.92
  701. Tue Jan 31 20:26:23 2017 us=198866 TockoeMTS,10.5.0.93
  702. Tue Jan 31 20:26:23 2017 us=198866 Tockoe2MTS,10.5.0.94
  703. Tue Jan 31 20:26:23 2017 us=198866 TockoeMTS2,10.5.0.95
  704. Tue Jan 31 20:26:23 2017 us=198866 TockoeFS,10.5.0.96
  705. Tue Jan 31 20:26:23 2017 us=198866 TockoeFS2,10.5.0.97
  706. Tue Jan 31 20:26:23 2017 us=198866 ArlanFS,10.5.0.98
  707. Tue Jan 31 20:26:23 2017 us=198866 AkbulakFS,10.5.0.99
  708. Tue Jan 31 20:26:23 2017 us=198866 AkbulakFS2,10.5.0.100
  709. Tue Jan 31 20:26:23 2017 us=198866 AkbulakES,10.5.0.101
  710. Tue Jan 31 20:26:23 2017 us=198866 AkbulakES2,10.5.0.102
  711. Tue Jan 31 20:26:23 2017 us=198866 SolIleckT2,10.5.0.103
  712. Tue Jan 31 20:26:23 2017 us=198866 JuzniiES,10.5.0.104
  713. Tue Jan 31 20:26:23 2017 us=198866 SakmaraMTS,10.5.0.105
  714. Tue Jan 31 20:26:23 2017 us=198866 JuzniiMTS,10.5.0.106
  715. Tue Jan 31 20:26:23 2017 us=198866 AkbulakT2,10.5.0.107
  716. Tue Jan 31 20:26:23 2017 us=198866 SakmaraFS,10.5.0.108
  717. Tue Jan 31 20:26:23 2017 us=198866 ZamalPC,10.5.0.109
  718. Tue Jan 31 20:26:23 2017 us=198866 ZamalRasp,10.5.0.110
  719. Tue Jan 31 20:26:23 2017 us=198866 AlexandrovkaMTS,10.5.0.111
  720. Tue Jan 31 20:26:23 2017 us=198866 AbdulinoMTS,10.5.0.112
  721. Tue Jan 31 20:26:23 2017 us=198866 AbdulinoFS,10.5.0.113
  722. Tue Jan 31 20:26:23 2017 us=198866 AbdulinoFS2,10.5.0.114
  723. Tue Jan 31 20:26:23 2017 us=198866 SevernoeMTS,10.5.0.115
  724. Tue Jan 31 20:26:23 2017 us=198866 SevernoeFS2,10.5.0.116
  725. Tue Jan 31 20:26:23 2017 us=198866 SevernoeFS,10.5.0.117
  726. Tue Jan 31 20:26:23 2017 us=198866 AlexandrovkaES,10.5.0.118
  727. Tue Jan 31 20:26:23 2017 us=198866 KurmanaevkaT2,10.5.0.119
  728. Tue Jan 31 20:26:23 2017 us=198866 BuguruslanMTS,10.5.0.120
  729. Tue Jan 31 20:26:23 2017 us=198866 KurmanaevkaFS,10.5.0.121
  730. Tue Jan 31 20:26:23 2017 us=198866 KurmanaevkaFS2,10.5.0.122
  731. Tue Jan 31 20:26:23 2017 us=198866 KurmanaevkaMTS,10.5.0.123
  732. Tue Jan 31 20:26:23 2017 us=198866 BuguruslanFS,10.5.0.124
  733. Tue Jan 31 20:26:23 2017 us=198866 AsekeevoMTS,10.5.0.125
  734. Tue Jan 31 20:26:23 2017 us=198866 AlexandrovkaFS2,10.5.0.126
  735. Tue Jan 31 20:26:23 2017 us=198866 PonomarevkaMTS,10.5.0.127
  736. Tue Jan 31 20:26:23 2017 us=198866 OktyabrskoeFS,10.5.0.128
  737. Tue Jan 31 20:26:23 2017 us=198866 PonomarevkaES,10.5.0.129
  738. Tue Jan 31 20:26:23 2017 us=198866 AsekeevoFS2,10.5.0.130
  739. Tue Jan 31 20:26:23 2017 us=198866 AlexandrovkaFS,10.5.0.131
  740. Tue Jan 31 20:26:23 2017 us=198866 PonomarevkaFS,10.5.0.132
  741. Tue Jan 31 20:26:23 2017 us=198866 PonomarevkaFS2,10.5.0.133
  742. Tue Jan 31 20:26:23 2017 us=198866 OktyabrskoeMTS,10.5.0.134
  743. Tue Jan 31 20:26:23 2017 us=198866 MatveevkaMTS,10.5.0.135
  744. Tue Jan 31 20:26:23 2017 us=198866 MatveevkaFS,10.5.0.136
  745. Tue Jan 31 20:26:23 2017 us=198866 AsekeevoFS,10.5.0.137
  746. Tue Jan 31 20:26:23 2017 us=198866 TockoeMTS2,10.5.0.138
  747. Tue Jan 31 20:26:23 2017 us=198866 KurmanaevkaFS,10.5.0.139
  748. Tue Jan 31 20:26:23 2017 us=198866 KurmanaevkaFS2,10.5.0.140
  749. Tue Jan 31 20:26:23 2017 us=198866 YazikovoFS2,10.5.0.141
  750. Tue Jan 31 20:26:23 2017 us=198866 Initialization Sequence Completed
  751. Tue Jan 31 20:28:09 2017 us=136606 MULTI: multi_create_instance called
  752. Tue Jan 31 20:28:09 2017 us=136606 85.192.131.101 Re-using SSL/TLS context
  753. Tue Jan 31 20:28:09 2017 us=136606 85.192.131.101 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  754. Tue Jan 31 20:28:09 2017 us=136606 85.192.131.101 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  755. Tue Jan 31 20:28:09 2017 us=136606 85.192.131.101 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  756. Tue Jan 31 20:28:09 2017 us=136606 85.192.131.101 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  757. Tue Jan 31 20:28:09 2017 us=136606 85.192.131.101 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.101:3578, sid=f26e2add 308e7aa0
  758. Tue Jan 31 20:28:09 2017 us=199091 85.192.131.101 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  759. Tue Jan 31 20:28:09 2017 us=199091 85.192.131.101 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KvarkenoES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  760. Tue Jan 31 20:28:09 2017 us=230356 85.192.131.101 peer info: IV_VER=2.3.14
  761. Tue Jan 31 20:28:09 2017 us=230356 85.192.131.101 peer info: IV_PLAT=win
  762. Tue Jan 31 20:28:09 2017 us=230356 85.192.131.101 peer info: IV_PROTO=2
  763. Tue Jan 31 20:28:09 2017 us=230356 85.192.131.101 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  764. Tue Jan 31 20:28:09 2017 us=230356 85.192.131.101 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  765. Tue Jan 31 20:28:09 2017 us=230356 85.192.131.101 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  766. Tue Jan 31 20:28:09 2017 us=230356 85.192.131.101 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  767. Tue Jan 31 20:28:09 2017 us=261593 85.192.131.101 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  768. Tue Jan 31 20:28:09 2017 us=261593 85.192.131.101 [KvarkenoES] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.101:3578
  769. Tue Jan 31 20:28:09 2017 us=261593 KvarkenoES/85.192.131.101 MULTI_sva: pool returned IPv4=10.5.0.58, IPv6=(Not enabled)
  770. Tue Jan 31 20:28:09 2017 us=261593 KvarkenoES/85.192.131.101 MULTI: Learn: 10.5.0.58 -> KvarkenoES/85.192.131.101
  771. Tue Jan 31 20:28:09 2017 us=261593 KvarkenoES/85.192.131.101 MULTI: primary virtual IP for KvarkenoES/85.192.131.101: 10.5.0.58
  772. Tue Jan 31 20:28:09 2017 us=292842 MULTI: multi_create_instance called
  773. Tue Jan 31 20:28:09 2017 us=292842 85.192.167.58 Re-using SSL/TLS context
  774. Tue Jan 31 20:28:09 2017 us=292842 85.192.167.58 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  775. Tue Jan 31 20:28:09 2017 us=292842 85.192.167.58 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  776. Tue Jan 31 20:28:09 2017 us=292842 85.192.167.58 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  777. Tue Jan 31 20:28:09 2017 us=292842 85.192.167.58 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  778. Tue Jan 31 20:28:09 2017 us=292842 85.192.167.58 TLS: Initial packet from [AF_INET6]::ffff:85.192.167.58:2987, sid=44e2e727 5574240a
  779. Tue Jan 31 20:28:09 2017 us=355335 85.192.167.58 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  780. Tue Jan 31 20:28:09 2017 us=355335 85.192.167.58 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KurmanaevkaMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  781. Tue Jan 31 20:28:09 2017 us=386580 85.192.167.58 peer info: IV_VER=2.3.14
  782. Tue Jan 31 20:28:09 2017 us=386580 85.192.167.58 peer info: IV_PLAT=win
  783. Tue Jan 31 20:28:09 2017 us=386580 85.192.167.58 peer info: IV_PROTO=2
  784. Tue Jan 31 20:28:09 2017 us=386580 85.192.167.58 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  785. Tue Jan 31 20:28:09 2017 us=386580 85.192.167.58 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  786. Tue Jan 31 20:28:09 2017 us=386580 85.192.167.58 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  787. Tue Jan 31 20:28:09 2017 us=386580 85.192.167.58 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  788. Tue Jan 31 20:28:09 2017 us=402200 85.192.167.58 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  789. Tue Jan 31 20:28:09 2017 us=402200 85.192.167.58 [KurmanaevkaMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.167.58:2987
  790. Tue Jan 31 20:28:09 2017 us=402200 KurmanaevkaMTS/85.192.167.58 MULTI_sva: pool returned IPv4=10.5.0.123, IPv6=(Not enabled)
  791. Tue Jan 31 20:28:09 2017 us=402200 KurmanaevkaMTS/85.192.167.58 MULTI: Learn: 10.5.0.123 -> KurmanaevkaMTS/85.192.167.58
  792. Tue Jan 31 20:28:09 2017 us=402200 KurmanaevkaMTS/85.192.167.58 MULTI: primary virtual IP for KurmanaevkaMTS/85.192.167.58: 10.5.0.123
  793. Tue Jan 31 20:28:09 2017 us=449090 MULTI: multi_create_instance called
  794. Tue Jan 31 20:28:09 2017 us=449090 83.174.213.186 Re-using SSL/TLS context
  795. Tue Jan 31 20:28:09 2017 us=449090 83.174.213.186 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  796. Tue Jan 31 20:28:09 2017 us=449090 83.174.213.186 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  797. Tue Jan 31 20:28:09 2017 us=449090 83.174.213.186 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  798. Tue Jan 31 20:28:09 2017 us=449090 83.174.213.186 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  799. Tue Jan 31 20:28:09 2017 us=449090 83.174.213.186 TLS: Initial packet from [AF_INET6]::ffff:83.174.213.186:1031, sid=58ea067b 8d5ec56c
  800. Tue Jan 31 20:28:09 2017 us=574090 MULTI: multi_create_instance called
  801. Tue Jan 31 20:28:09 2017 us=574090 85.192.129.228 Re-using SSL/TLS context
  802. Tue Jan 31 20:28:09 2017 us=574090 85.192.129.228 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  803. Tue Jan 31 20:28:09 2017 us=574090 85.192.129.228 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  804. Tue Jan 31 20:28:09 2017 us=574090 85.192.129.228 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  805. Tue Jan 31 20:28:09 2017 us=574090 85.192.129.228 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  806. Tue Jan 31 20:28:09 2017 us=574090 85.192.129.228 TLS: Initial packet from [AF_INET6]::ffff:85.192.129.228:3663, sid=89da8389 6575c187
  807. Tue Jan 31 20:28:09 2017 us=574090 83.174.213.186 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  808. Tue Jan 31 20:28:09 2017 us=574090 83.174.213.186 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=YazikovoFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  809. Tue Jan 31 20:28:09 2017 us=620968 MULTI: multi_create_instance called
  810. Tue Jan 31 20:28:09 2017 us=620968 85.192.128.241 Re-using SSL/TLS context
  811. Tue Jan 31 20:28:09 2017 us=620968 85.192.128.241 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  812. Tue Jan 31 20:28:09 2017 us=620968 85.192.128.241 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  813. Tue Jan 31 20:28:09 2017 us=620968 85.192.128.241 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  814. Tue Jan 31 20:28:09 2017 us=620968 85.192.128.241 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  815. Tue Jan 31 20:28:09 2017 us=620968 85.192.128.241 TLS: Initial packet from [AF_INET6]::ffff:85.192.128.241:4312, sid=406a8cea e070b09a
  816. Tue Jan 31 20:28:09 2017 us=636575 83.174.213.186 peer info: IV_VER=2.3.14
  817. Tue Jan 31 20:28:09 2017 us=636575 83.174.213.186 peer info: IV_PLAT=win
  818. Tue Jan 31 20:28:09 2017 us=636575 83.174.213.186 peer info: IV_PROTO=2
  819. Tue Jan 31 20:28:09 2017 us=636575 83.174.213.186 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  820. Tue Jan 31 20:28:09 2017 us=636575 83.174.213.186 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  821. Tue Jan 31 20:28:09 2017 us=636575 83.174.213.186 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  822. Tue Jan 31 20:28:09 2017 us=636575 83.174.213.186 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  823. Tue Jan 31 20:28:09 2017 us=636575 85.192.129.228 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  824. Tue Jan 31 20:28:09 2017 us=636575 85.192.129.228 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=NovoorskMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  825. Tue Jan 31 20:28:09 2017 us=652200 MULTI: multi_create_instance called
  826. Tue Jan 31 20:28:09 2017 us=652200 83.174.222.13 Re-using SSL/TLS context
  827. Tue Jan 31 20:28:09 2017 us=652200 83.174.222.13 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  828. Tue Jan 31 20:28:09 2017 us=652200 83.174.222.13 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  829. Tue Jan 31 20:28:09 2017 us=652200 83.174.222.13 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  830. Tue Jan 31 20:28:09 2017 us=652200 83.174.222.13 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  831. Tue Jan 31 20:28:09 2017 us=652200 83.174.222.13 TLS: Initial packet from [AF_INET6]::ffff:83.174.222.13:21269, sid=9a62989c 12b6878c
  832. Tue Jan 31 20:28:09 2017 us=667825 MULTI: multi_create_instance called
  833. Tue Jan 31 20:28:09 2017 us=667825 85.192.131.237 Re-using SSL/TLS context
  834. Tue Jan 31 20:28:09 2017 us=667825 85.192.131.237 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  835. Tue Jan 31 20:28:09 2017 us=667825 85.192.131.237 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  836. Tue Jan 31 20:28:09 2017 us=667825 85.192.131.237 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  837. Tue Jan 31 20:28:09 2017 us=667825 85.192.131.237 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  838. Tue Jan 31 20:28:09 2017 us=667825 85.192.131.237 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.237:4738, sid=7cf71acc 5f523c52
  839. Tue Jan 31 20:28:09 2017 us=667825 85.192.129.228 peer info: IV_VER=2.3.14
  840. Tue Jan 31 20:28:09 2017 us=667825 85.192.129.228 peer info: IV_PLAT=win
  841. Tue Jan 31 20:28:09 2017 us=667825 85.192.129.228 peer info: IV_PROTO=2
  842. Tue Jan 31 20:28:09 2017 us=667825 85.192.129.228 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  843. Tue Jan 31 20:28:09 2017 us=667825 85.192.129.228 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  844. Tue Jan 31 20:28:09 2017 us=667825 85.192.129.228 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  845. Tue Jan 31 20:28:09 2017 us=667825 85.192.129.228 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  846. Tue Jan 31 20:28:09 2017 us=683461 83.174.213.186 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  847. Tue Jan 31 20:28:09 2017 us=683461 83.174.213.186 [YazikovoFS2] Peer Connection Initiated with [AF_INET6]::ffff:83.174.213.186:1031
  848. Tue Jan 31 20:28:09 2017 us=683461 YazikovoFS2/83.174.213.186 MULTI_sva: pool returned IPv4=10.5.0.41, IPv6=(Not enabled)
  849. Tue Jan 31 20:28:09 2017 us=683461 YazikovoFS2/83.174.213.186 MULTI: Learn: 10.5.0.41 -> YazikovoFS2/83.174.213.186
  850. Tue Jan 31 20:28:09 2017 us=683461 YazikovoFS2/83.174.213.186 MULTI: primary virtual IP for YazikovoFS2/83.174.213.186: 10.5.0.41
  851. Tue Jan 31 20:28:09 2017 us=699076 85.192.128.241 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  852. Tue Jan 31 20:28:09 2017 us=699076 85.192.128.241 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SorochinskT2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  853. Tue Jan 31 20:28:09 2017 us=699076 85.192.129.228 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  854. Tue Jan 31 20:28:09 2017 us=699076 85.192.129.228 [NovoorskMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.129.228:3663
  855. Tue Jan 31 20:28:09 2017 us=699076 NovoorskMTS/85.192.129.228 MULTI_sva: pool returned IPv4=10.5.0.66, IPv6=(Not enabled)
  856. Tue Jan 31 20:28:09 2017 us=699076 NovoorskMTS/85.192.129.228 MULTI: Learn: 10.5.0.66 -> NovoorskMTS/85.192.129.228
  857. Tue Jan 31 20:28:09 2017 us=699076 NovoorskMTS/85.192.129.228 MULTI: primary virtual IP for NovoorskMTS/85.192.129.228: 10.5.0.66
  858. Tue Jan 31 20:28:09 2017 us=714699 MULTI: multi_create_instance called
  859. Tue Jan 31 20:28:09 2017 us=714699 81.30.220.17 Re-using SSL/TLS context
  860. Tue Jan 31 20:28:09 2017 us=714699 81.30.220.17 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  861. Tue Jan 31 20:28:09 2017 us=714699 81.30.220.17 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  862. Tue Jan 31 20:28:09 2017 us=714699 81.30.220.17 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  863. Tue Jan 31 20:28:09 2017 us=714699 81.30.220.17 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  864. Tue Jan 31 20:28:09 2017 us=714699 81.30.220.17 TLS: Initial packet from [AF_INET6]::ffff:81.30.220.17:1272, sid=eb4168ab df58da43
  865. Tue Jan 31 20:28:09 2017 us=714699 85.192.131.237 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  866. Tue Jan 31 20:28:09 2017 us=714699 85.192.131.237 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AlexandrovkaES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  867. Tue Jan 31 20:28:09 2017 us=730344 85.192.128.241 peer info: IV_VER=2.3.14
  868. Tue Jan 31 20:28:09 2017 us=730344 85.192.128.241 peer info: IV_PLAT=win
  869. Tue Jan 31 20:28:09 2017 us=730344 85.192.128.241 peer info: IV_PROTO=2
  870. Tue Jan 31 20:28:09 2017 us=730344 85.192.128.241 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  871. Tue Jan 31 20:28:09 2017 us=730344 85.192.128.241 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  872. Tue Jan 31 20:28:09 2017 us=730344 85.192.128.241 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  873. Tue Jan 31 20:28:09 2017 us=730344 85.192.128.241 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  874. Tue Jan 31 20:28:09 2017 us=745976 81.30.220.17 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  875. Tue Jan 31 20:28:09 2017 us=745976 81.30.220.17 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=UfamvdES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  876. Tue Jan 31 20:28:09 2017 us=745976 85.192.131.237 peer info: IV_VER=2.3.14
  877. Tue Jan 31 20:28:09 2017 us=745976 85.192.131.237 peer info: IV_PLAT=win
  878. Tue Jan 31 20:28:09 2017 us=745976 85.192.131.237 peer info: IV_PROTO=2
  879. Tue Jan 31 20:28:09 2017 us=745976 85.192.131.237 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  880. Tue Jan 31 20:28:09 2017 us=745976 85.192.131.237 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  881. Tue Jan 31 20:28:09 2017 us=745976 85.192.131.237 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  882. Tue Jan 31 20:28:09 2017 us=745976 85.192.131.237 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  883. Tue Jan 31 20:28:09 2017 us=761592 81.30.220.17 peer info: IV_VER=2.3.14
  884. Tue Jan 31 20:28:09 2017 us=761592 81.30.220.17 peer info: IV_PLAT=win
  885. Tue Jan 31 20:28:09 2017 us=761592 81.30.220.17 peer info: IV_PROTO=2
  886. Tue Jan 31 20:28:09 2017 us=761592 81.30.220.17 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  887. Tue Jan 31 20:28:09 2017 us=761592 81.30.220.17 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  888. Tue Jan 31 20:28:09 2017 us=761592 81.30.220.17 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  889. Tue Jan 31 20:28:09 2017 us=761592 81.30.220.17 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  890. Tue Jan 31 20:28:09 2017 us=761592 85.192.128.241 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  891. Tue Jan 31 20:28:09 2017 us=761592 85.192.128.241 [SorochinskT2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.128.241:4312
  892. Tue Jan 31 20:28:09 2017 us=761592 SorochinskT2/85.192.128.241 MULTI_sva: pool returned IPv4=10.5.0.89, IPv6=(Not enabled)
  893. Tue Jan 31 20:28:09 2017 us=761592 SorochinskT2/85.192.128.241 MULTI: Learn: 10.5.0.89 -> SorochinskT2/85.192.128.241
  894. Tue Jan 31 20:28:09 2017 us=761592 SorochinskT2/85.192.128.241 MULTI: primary virtual IP for SorochinskT2/85.192.128.241: 10.5.0.89
  895. Tue Jan 31 20:28:09 2017 us=777233 81.30.220.17 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  896. Tue Jan 31 20:28:09 2017 us=777233 81.30.220.17 [UfamvdES] Peer Connection Initiated with [AF_INET6]::ffff:81.30.220.17:1272
  897. Tue Jan 31 20:28:09 2017 us=777233 UfamvdES/81.30.220.17 MULTI_sva: pool returned IPv4=10.5.0.30, IPv6=(Not enabled)
  898. Tue Jan 31 20:28:09 2017 us=777233 UfamvdES/81.30.220.17 MULTI: Learn: 10.5.0.30 -> UfamvdES/81.30.220.17
  899. Tue Jan 31 20:28:09 2017 us=777233 UfamvdES/81.30.220.17 MULTI: primary virtual IP for UfamvdES/81.30.220.17: 10.5.0.30
  900. Tue Jan 31 20:28:09 2017 us=777233 85.192.131.237 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  901. Tue Jan 31 20:28:09 2017 us=777233 85.192.131.237 [AlexandrovkaES] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.237:4738
  902. Tue Jan 31 20:28:09 2017 us=777233 AlexandrovkaES/85.192.131.237 MULTI_sva: pool returned IPv4=10.5.0.118, IPv6=(Not enabled)
  903. Tue Jan 31 20:28:09 2017 us=777233 AlexandrovkaES/85.192.131.237 MULTI: Learn: 10.5.0.118 -> AlexandrovkaES/85.192.131.237
  904. Tue Jan 31 20:28:09 2017 us=777233 AlexandrovkaES/85.192.131.237 MULTI: primary virtual IP for AlexandrovkaES/85.192.131.237: 10.5.0.118
  905. Tue Jan 31 20:28:09 2017 us=792843 MULTI: multi_create_instance called
  906. Tue Jan 31 20:28:09 2017 us=792843 85.192.131.137 Re-using SSL/TLS context
  907. Tue Jan 31 20:28:09 2017 us=792843 85.192.131.137 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  908. Tue Jan 31 20:28:09 2017 us=792843 85.192.131.137 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  909. Tue Jan 31 20:28:09 2017 us=792843 85.192.131.137 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  910. Tue Jan 31 20:28:09 2017 us=792843 85.192.131.137 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  911. Tue Jan 31 20:28:09 2017 us=792843 85.192.131.137 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.137:1766, sid=9a7aa268 cf6944cb
  912. Tue Jan 31 20:28:09 2017 us=792843 83.174.222.13 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  913. Tue Jan 31 20:28:09 2017 us=792843 83.174.222.13 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SterlibashevoES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  914. Tue Jan 31 20:28:09 2017 us=824098 MULTI: multi_create_instance called
  915. Tue Jan 31 20:28:09 2017 us=824098 85.192.131.3 Re-using SSL/TLS context
  916. Tue Jan 31 20:28:09 2017 us=824098 85.192.131.3 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  917. Tue Jan 31 20:28:09 2017 us=824098 85.192.131.3 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  918. Tue Jan 31 20:28:09 2017 us=824098 85.192.131.3 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  919. Tue Jan 31 20:28:09 2017 us=824098 85.192.131.3 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  920. Tue Jan 31 20:28:09 2017 us=824098 85.192.131.3 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.3:24037, sid=5e8d46cb a73c12dc
  921. Tue Jan 31 20:28:09 2017 us=839718 83.174.222.13 peer info: IV_VER=2.3.14
  922. Tue Jan 31 20:28:09 2017 us=839718 83.174.222.13 peer info: IV_PLAT=win
  923. Tue Jan 31 20:28:09 2017 us=839718 83.174.222.13 peer info: IV_PROTO=2
  924. Tue Jan 31 20:28:09 2017 us=839718 83.174.222.13 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  925. Tue Jan 31 20:28:09 2017 us=839718 83.174.222.13 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  926. Tue Jan 31 20:28:09 2017 us=839718 83.174.222.13 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  927. Tue Jan 31 20:28:09 2017 us=839718 83.174.222.13 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  928. Tue Jan 31 20:28:09 2017 us=886596 MULTI: multi_create_instance called
  929. Tue Jan 31 20:28:09 2017 us=886596 85.192.129.228 Re-using SSL/TLS context
  930. Tue Jan 31 20:28:09 2017 us=886596 85.192.129.228 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  931. Tue Jan 31 20:28:09 2017 us=886596 85.192.129.228 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  932. Tue Jan 31 20:28:09 2017 us=886596 85.192.129.228 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  933. Tue Jan 31 20:28:09 2017 us=886596 85.192.129.228 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  934. Tue Jan 31 20:28:09 2017 us=886596 85.192.129.228 TLS: Initial packet from [AF_INET6]::ffff:85.192.129.228:1027, sid=449d6c51 f1c85fa6
  935. Tue Jan 31 20:28:09 2017 us=886596 83.174.222.13 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  936. Tue Jan 31 20:28:09 2017 us=886596 83.174.222.13 [SterlibashevoES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.222.13:21269
  937. Tue Jan 31 20:28:09 2017 us=886596 SterlibashevoES/83.174.222.13 MULTI_sva: pool returned IPv4=10.5.0.27, IPv6=(Not enabled)
  938. Tue Jan 31 20:28:09 2017 us=902202 SterlibashevoES/83.174.222.13 MULTI: Learn: 10.5.0.27 -> SterlibashevoES/83.174.222.13
  939. Tue Jan 31 20:28:09 2017 us=902202 SterlibashevoES/83.174.222.13 MULTI: primary virtual IP for SterlibashevoES/83.174.222.13: 10.5.0.27
  940. Tue Jan 31 20:28:09 2017 us=917844 MULTI: multi_create_instance called
  941. Tue Jan 31 20:28:09 2017 us=917844 83.174.214.60 Re-using SSL/TLS context
  942. Tue Jan 31 20:28:09 2017 us=917844 83.174.214.60 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  943. Tue Jan 31 20:28:09 2017 us=917844 83.174.214.60 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  944. Tue Jan 31 20:28:09 2017 us=917844 83.174.214.60 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  945. Tue Jan 31 20:28:09 2017 us=917844 83.174.214.60 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  946. Tue Jan 31 20:28:09 2017 us=917844 83.174.214.60 TLS: Initial packet from [AF_INET6]::ffff:83.174.214.60:27886, sid=4cccb8ee 63e8b69a
  947. Tue Jan 31 20:28:09 2017 us=949096 MULTI: multi_create_instance called
  948. Tue Jan 31 20:28:09 2017 us=949096 89.189.130.140 Re-using SSL/TLS context
  949. Tue Jan 31 20:28:09 2017 us=949096 89.189.130.140 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  950. Tue Jan 31 20:28:09 2017 us=949096 89.189.130.140 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  951. Tue Jan 31 20:28:09 2017 us=949096 89.189.130.140 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  952. Tue Jan 31 20:28:09 2017 us=949096 89.189.130.140 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  953. Tue Jan 31 20:28:09 2017 us=949096 89.189.130.140 TLS: Initial packet from [AF_INET6]::ffff:89.189.130.140:2783, sid=8debfdd8 29ec0f18
  954. Tue Jan 31 20:28:09 2017 us=964707 85.192.129.228 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  955. Tue Jan 31 20:28:09 2017 us=964707 85.192.129.228 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=NovoorskMTS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  956. Tue Jan 31 20:28:09 2017 us=980332 MULTI: multi_create_instance called
  957. Tue Jan 31 20:28:09 2017 us=980332 85.192.131.101 Re-using SSL/TLS context
  958. Tue Jan 31 20:28:09 2017 us=980332 85.192.131.101 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  959. Tue Jan 31 20:28:09 2017 us=980332 85.192.131.101 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  960. Tue Jan 31 20:28:09 2017 us=980332 85.192.131.101 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  961. Tue Jan 31 20:28:09 2017 us=980332 85.192.131.101 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  962. Tue Jan 31 20:28:09 2017 us=980332 85.192.131.101 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.101:3653, sid=3d0be733 a0755b0d
  963. Tue Jan 31 20:28:09 2017 us=980332 89.189.130.140 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  964. Tue Jan 31 20:28:09 2017 us=980332 89.189.130.140 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=NeftekamskES2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  965. Tue Jan 31 20:28:09 2017 us=995958 85.192.129.228 peer info: IV_VER=2.3.14
  966. Tue Jan 31 20:28:09 2017 us=995958 85.192.129.228 peer info: IV_PLAT=win
  967. Tue Jan 31 20:28:09 2017 us=995958 85.192.129.228 peer info: IV_PROTO=2
  968. Tue Jan 31 20:28:09 2017 us=995958 85.192.129.228 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  969. Tue Jan 31 20:28:09 2017 us=995958 85.192.129.228 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  970. Tue Jan 31 20:28:09 2017 us=995958 85.192.129.228 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  971. Tue Jan 31 20:28:09 2017 us=995958 85.192.129.228 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  972. Tue Jan 31 20:28:09 2017 us=995958 85.192.131.3 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  973. Tue Jan 31 20:28:09 2017 us=995958 85.192.131.3 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AdamovkaES2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  974. Tue Jan 31 20:28:09 2017 us=995958 89.189.130.140 peer info: IV_VER=2.3.14
  975. Tue Jan 31 20:28:09 2017 us=995958 89.189.130.140 peer info: IV_PLAT=win
  976. Tue Jan 31 20:28:09 2017 us=995958 89.189.130.140 peer info: IV_PROTO=2
  977. Tue Jan 31 20:28:09 2017 us=995958 89.189.130.140 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  978. Tue Jan 31 20:28:09 2017 us=995958 89.189.130.140 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  979. Tue Jan 31 20:28:09 2017 us=995958 89.189.130.140 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  980. Tue Jan 31 20:28:09 2017 us=995958 89.189.130.140 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  981. Tue Jan 31 20:28:10 2017 us=11581 89.189.130.140 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  982. Tue Jan 31 20:28:10 2017 us=27199 89.189.130.140 [NeftekamskES2] Peer Connection Initiated with [AF_INET6]::ffff:89.189.130.140:2783
  983. Tue Jan 31 20:28:10 2017 us=27199 NeftekamskES2/89.189.130.140 MULTI_sva: pool returned IPv4=10.5.0.22, IPv6=(Not enabled)
  984. Tue Jan 31 20:28:10 2017 us=27199 NeftekamskES2/89.189.130.140 MULTI: Learn: 10.5.0.22 -> NeftekamskES2/89.189.130.140
  985. Tue Jan 31 20:28:10 2017 us=27199 NeftekamskES2/89.189.130.140 MULTI: primary virtual IP for NeftekamskES2/89.189.130.140: 10.5.0.22
  986. Tue Jan 31 20:28:10 2017 us=27199 85.192.129.228 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  987. Tue Jan 31 20:28:10 2017 us=27199 85.192.129.228 [NovoorskMTS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.129.228:1027
  988. Tue Jan 31 20:28:10 2017 us=27199 NovoorskMTS2/85.192.129.228 MULTI_sva: pool returned IPv4=10.5.0.65, IPv6=(Not enabled)
  989. Tue Jan 31 20:28:10 2017 us=27199 NovoorskMTS2/85.192.129.228 MULTI: Learn: 10.5.0.65 -> NovoorskMTS2/85.192.129.228
  990. Tue Jan 31 20:28:10 2017 us=27199 NovoorskMTS2/85.192.129.228 MULTI: primary virtual IP for NovoorskMTS2/85.192.129.228: 10.5.0.65
  991. Tue Jan 31 20:28:10 2017 us=27199 MULTI: multi_create_instance called
  992. Tue Jan 31 20:28:10 2017 us=27199 83.174.221.126 Re-using SSL/TLS context
  993. Tue Jan 31 20:28:10 2017 us=27199 83.174.221.126 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  994. Tue Jan 31 20:28:10 2017 us=27199 83.174.221.126 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  995. Tue Jan 31 20:28:10 2017 us=27199 83.174.221.126 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  996. Tue Jan 31 20:28:10 2017 us=27199 83.174.221.126 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  997. Tue Jan 31 20:28:10 2017 us=27199 83.174.221.126 TLS: Initial packet from [AF_INET6]::ffff:83.174.221.126:14804, sid=c0a2d2ff 61a9937e
  998. Tue Jan 31 20:28:10 2017 us=58453 85.192.131.3 peer info: IV_VER=2.3.14
  999. Tue Jan 31 20:28:10 2017 us=58453 85.192.131.3 peer info: IV_PLAT=win
  1000. Tue Jan 31 20:28:10 2017 us=58453 85.192.131.3 peer info: IV_PROTO=2
  1001. Tue Jan 31 20:28:10 2017 us=58453 85.192.131.3 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1002. Tue Jan 31 20:28:10 2017 us=58453 85.192.131.3 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1003. Tue Jan 31 20:28:10 2017 us=58453 85.192.131.3 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1004. Tue Jan 31 20:28:10 2017 us=58453 85.192.131.3 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1005. Tue Jan 31 20:28:10 2017 us=58453 MULTI: multi_create_instance called
  1006. Tue Jan 31 20:28:10 2017 us=58453 62.133.169.225 Re-using SSL/TLS context
  1007. Tue Jan 31 20:28:10 2017 us=58453 62.133.169.225 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1008. Tue Jan 31 20:28:10 2017 us=58453 62.133.169.225 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1009. Tue Jan 31 20:28:10 2017 us=58453 62.133.169.225 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1010. Tue Jan 31 20:28:10 2017 us=58453 62.133.169.225 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1011. Tue Jan 31 20:28:10 2017 us=58453 62.133.169.225 TLS: Initial packet from [AF_INET6]::ffff:62.133.169.225:10132, sid=9daae6b3 813bc274
  1012. Tue Jan 31 20:28:10 2017 us=105351 MULTI: multi_create_instance called
  1013. Tue Jan 31 20:28:10 2017 us=105351 85.192.129.228 Re-using SSL/TLS context
  1014. Tue Jan 31 20:28:10 2017 us=105351 85.192.129.228 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1015. Tue Jan 31 20:28:10 2017 us=105351 85.192.129.228 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1016. Tue Jan 31 20:28:10 2017 us=105351 85.192.129.228 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1017. Tue Jan 31 20:28:10 2017 us=105351 85.192.129.228 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1018. Tue Jan 31 20:28:10 2017 us=105351 85.192.129.228 TLS: Initial packet from [AF_INET6]::ffff:85.192.129.228:2943, sid=cfd7095c fdb6b847
  1019. Tue Jan 31 20:28:10 2017 us=120958 MULTI: multi_create_instance called
  1020. Tue Jan 31 20:28:10 2017 us=120958 85.192.182.110 Re-using SSL/TLS context
  1021. Tue Jan 31 20:28:10 2017 us=120958 85.192.182.110 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1022. Tue Jan 31 20:28:10 2017 us=120958 85.192.182.110 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1023. Tue Jan 31 20:28:10 2017 us=120958 85.192.182.110 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1024. Tue Jan 31 20:28:10 2017 us=120958 85.192.182.110 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1025. Tue Jan 31 20:28:10 2017 us=120958 85.192.182.110 TLS: Initial packet from [AF_INET6]::ffff:85.192.182.110:2790, sid=54635eee 29cada04
  1026. Tue Jan 31 20:28:10 2017 us=120958 85.192.131.3 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1027. Tue Jan 31 20:28:10 2017 us=120958 85.192.131.3 [AdamovkaES2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.3:24037
  1028. Tue Jan 31 20:28:10 2017 us=120958 AdamovkaES2/85.192.131.3 MULTI_sva: pool returned IPv4=10.5.0.51, IPv6=(Not enabled)
  1029. Tue Jan 31 20:28:10 2017 us=120958 AdamovkaES2/85.192.131.3 MULTI: Learn: 10.5.0.51 -> AdamovkaES2/85.192.131.3
  1030. Tue Jan 31 20:28:10 2017 us=120958 AdamovkaES2/85.192.131.3 MULTI: primary virtual IP for AdamovkaES2/85.192.131.3: 10.5.0.51
  1031. Tue Jan 31 20:28:10 2017 us=120958 MULTI: multi_create_instance called
  1032. Tue Jan 31 20:28:10 2017 us=120958 85.192.128.115 Re-using SSL/TLS context
  1033. Tue Jan 31 20:28:10 2017 us=120958 85.192.128.115 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1034. Tue Jan 31 20:28:10 2017 us=120958 85.192.128.115 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1035. Tue Jan 31 20:28:10 2017 us=120958 85.192.128.115 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1036. Tue Jan 31 20:28:10 2017 us=120958 85.192.128.115 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1037. Tue Jan 31 20:28:10 2017 us=120958 85.192.128.115 TLS: Initial packet from [AF_INET6]::ffff:85.192.128.115:3180, sid=148a12df 5c98a294
  1038. Tue Jan 31 20:28:10 2017 us=152229 83.174.221.126 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1039. Tue Jan 31 20:28:10 2017 us=152229 83.174.221.126 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=YazikovoES2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1040. Tue Jan 31 20:28:10 2017 us=167859 85.192.129.228 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1041. Tue Jan 31 20:28:10 2017 us=167859 85.192.129.228 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=NovoorskFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1042. Tue Jan 31 20:28:10 2017 us=167859 85.192.128.115 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1043. Tue Jan 31 20:28:10 2017 us=167859 85.192.128.115 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SakmaraMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1044. Tue Jan 31 20:28:10 2017 us=167859 85.192.131.101 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1045. Tue Jan 31 20:28:10 2017 us=167859 85.192.131.101 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KvarkenoFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1046. Tue Jan 31 20:28:10 2017 us=183452 85.192.182.110 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1047. Tue Jan 31 20:28:10 2017 us=183452 85.192.182.110 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=TockoeMTS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1048. Tue Jan 31 20:28:10 2017 us=199078 85.192.129.228 peer info: IV_VER=2.3.14
  1049. Tue Jan 31 20:28:10 2017 us=199078 85.192.129.228 peer info: IV_PLAT=win
  1050. Tue Jan 31 20:28:10 2017 us=199078 85.192.129.228 peer info: IV_PROTO=2
  1051. Tue Jan 31 20:28:10 2017 us=199078 85.192.129.228 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1052. Tue Jan 31 20:28:10 2017 us=199078 85.192.129.228 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1053. Tue Jan 31 20:28:10 2017 us=199078 85.192.129.228 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1054. Tue Jan 31 20:28:10 2017 us=199078 85.192.129.228 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1055. Tue Jan 31 20:28:10 2017 us=199078 85.192.128.115 peer info: IV_VER=2.3.14
  1056. Tue Jan 31 20:28:10 2017 us=199078 85.192.128.115 peer info: IV_PLAT=win
  1057. Tue Jan 31 20:28:10 2017 us=199078 85.192.128.115 peer info: IV_PROTO=2
  1058. Tue Jan 31 20:28:10 2017 us=199078 85.192.128.115 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1059. Tue Jan 31 20:28:10 2017 us=199078 85.192.128.115 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1060. Tue Jan 31 20:28:10 2017 us=199078 85.192.128.115 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1061. Tue Jan 31 20:28:10 2017 us=199078 85.192.128.115 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1062. Tue Jan 31 20:28:10 2017 us=199078 83.174.221.126 peer info: IV_VER=2.3.14
  1063. Tue Jan 31 20:28:10 2017 us=199078 83.174.221.126 peer info: IV_PLAT=win
  1064. Tue Jan 31 20:28:10 2017 us=199078 83.174.221.126 peer info: IV_PROTO=2
  1065. Tue Jan 31 20:28:10 2017 us=199078 83.174.221.126 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1066. Tue Jan 31 20:28:10 2017 us=199078 83.174.221.126 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1067. Tue Jan 31 20:28:10 2017 us=199078 83.174.221.126 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1068. Tue Jan 31 20:28:10 2017 us=199078 83.174.221.126 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1069. Tue Jan 31 20:28:10 2017 us=199078 MULTI: multi_create_instance called
  1070. Tue Jan 31 20:28:10 2017 us=199078 83.174.219.156 Re-using SSL/TLS context
  1071. Tue Jan 31 20:28:10 2017 us=199078 83.174.219.156 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1072. Tue Jan 31 20:28:10 2017 us=199078 83.174.219.156 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1073. Tue Jan 31 20:28:10 2017 us=199078 83.174.219.156 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1074. Tue Jan 31 20:28:10 2017 us=199078 83.174.219.156 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1075. Tue Jan 31 20:28:10 2017 us=199078 83.174.219.156 TLS: Initial packet from [AF_INET6]::ffff:83.174.219.156:4076, sid=2edd49ba 4b91bba9
  1076. Tue Jan 31 20:28:10 2017 us=199078 85.192.131.101 peer info: IV_VER=2.3.14
  1077. Tue Jan 31 20:28:10 2017 us=199078 85.192.131.101 peer info: IV_PLAT=win
  1078. Tue Jan 31 20:28:10 2017 us=199078 85.192.131.101 peer info: IV_PROTO=2
  1079. Tue Jan 31 20:28:10 2017 us=199078 85.192.131.101 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1080. Tue Jan 31 20:28:10 2017 us=199078 85.192.131.101 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1081. Tue Jan 31 20:28:10 2017 us=199078 85.192.131.101 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1082. Tue Jan 31 20:28:10 2017 us=199078 85.192.131.101 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1083. Tue Jan 31 20:28:10 2017 us=214702 MULTI: multi_create_instance called
  1084. Tue Jan 31 20:28:10 2017 us=214702 85.192.130.75 Re-using SSL/TLS context
  1085. Tue Jan 31 20:28:10 2017 us=214702 85.192.130.75 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1086. Tue Jan 31 20:28:10 2017 us=214702 85.192.130.75 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1087. Tue Jan 31 20:28:10 2017 us=214702 85.192.130.75 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1088. Tue Jan 31 20:28:10 2017 us=214702 85.192.130.75 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1089. Tue Jan 31 20:28:10 2017 us=214702 85.192.130.75 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.75:19074, sid=3fb76a36 74c52a26
  1090. Tue Jan 31 20:28:10 2017 us=214702 85.192.182.110 peer info: IV_VER=2.3.14
  1091. Tue Jan 31 20:28:10 2017 us=214702 85.192.182.110 peer info: IV_PLAT=win
  1092. Tue Jan 31 20:28:10 2017 us=214702 85.192.182.110 peer info: IV_PROTO=2
  1093. Tue Jan 31 20:28:10 2017 us=214702 85.192.182.110 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1094. Tue Jan 31 20:28:10 2017 us=214702 85.192.182.110 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1095. Tue Jan 31 20:28:10 2017 us=214702 85.192.182.110 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1096. Tue Jan 31 20:28:10 2017 us=214702 85.192.182.110 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1097. Tue Jan 31 20:28:10 2017 us=214702 85.192.128.115 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1098. Tue Jan 31 20:28:10 2017 us=214702 85.192.128.115 [SakmaraMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.128.115:3180
  1099. Tue Jan 31 20:28:10 2017 us=214702 SakmaraMTS/85.192.128.115 MULTI_sva: pool returned IPv4=10.5.0.105, IPv6=(Not enabled)
  1100. Tue Jan 31 20:28:10 2017 us=214702 SakmaraMTS/85.192.128.115 MULTI: Learn: 10.5.0.105 -> SakmaraMTS/85.192.128.115
  1101. Tue Jan 31 20:28:10 2017 us=214702 SakmaraMTS/85.192.128.115 MULTI: primary virtual IP for SakmaraMTS/85.192.128.115: 10.5.0.105
  1102. Tue Jan 31 20:28:10 2017 us=214702 MULTI: multi_create_instance called
  1103. Tue Jan 31 20:28:10 2017 us=214702 85.192.149.140 Re-using SSL/TLS context
  1104. Tue Jan 31 20:28:10 2017 us=214702 85.192.149.140 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1105. Tue Jan 31 20:28:10 2017 us=214702 85.192.149.140 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1106. Tue Jan 31 20:28:10 2017 us=214702 85.192.149.140 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1107. Tue Jan 31 20:28:10 2017 us=214702 85.192.149.140 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1108. Tue Jan 31 20:28:10 2017 us=214702 85.192.149.140 TLS: Initial packet from [AF_INET6]::ffff:85.192.149.140:2487, sid=e29ad70a 7bb9a6b3
  1109. Tue Jan 31 20:28:10 2017 us=214702 85.192.129.228 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1110. Tue Jan 31 20:28:10 2017 us=214702 85.192.129.228 [NovoorskFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.129.228:2943
  1111. Tue Jan 31 20:28:10 2017 us=214702 NovoorskFS2/85.192.129.228 MULTI_sva: pool returned IPv4=10.5.0.67, IPv6=(Not enabled)
  1112. Tue Jan 31 20:28:10 2017 us=214702 NovoorskFS2/85.192.129.228 MULTI: Learn: 10.5.0.67 -> NovoorskFS2/85.192.129.228
  1113. Tue Jan 31 20:28:10 2017 us=214702 NovoorskFS2/85.192.129.228 MULTI: primary virtual IP for NovoorskFS2/85.192.129.228: 10.5.0.67
  1114. Tue Jan 31 20:28:10 2017 us=230326 85.192.131.137 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1115. Tue Jan 31 20:28:10 2017 us=230326 85.192.131.137 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=BuguruslanMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1116. Tue Jan 31 20:28:10 2017 us=230326 MULTI: multi_create_instance called
  1117. Tue Jan 31 20:28:10 2017 us=230326 83.174.228.78 Re-using SSL/TLS context
  1118. Tue Jan 31 20:28:10 2017 us=230326 83.174.228.78 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1119. Tue Jan 31 20:28:10 2017 us=230326 83.174.228.78 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1120. Tue Jan 31 20:28:10 2017 us=230326 83.174.228.78 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1121. Tue Jan 31 20:28:10 2017 us=230326 83.174.228.78 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1122. Tue Jan 31 20:28:10 2017 us=230326 83.174.228.78 TLS: Initial packet from [AF_INET6]::ffff:83.174.228.78:4542, sid=0c823622 d169bb21
  1123. Tue Jan 31 20:28:10 2017 us=230326 85.192.131.101 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1124. Tue Jan 31 20:28:10 2017 us=230326 85.192.131.101 [KvarkenoFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.101:3653
  1125. Tue Jan 31 20:28:10 2017 us=230326 KvarkenoFS/85.192.131.101 MULTI_sva: pool returned IPv4=10.5.0.55, IPv6=(Not enabled)
  1126. Tue Jan 31 20:28:10 2017 us=230326 KvarkenoFS/85.192.131.101 MULTI: Learn: 10.5.0.55 -> KvarkenoFS/85.192.131.101
  1127. Tue Jan 31 20:28:10 2017 us=230326 KvarkenoFS/85.192.131.101 MULTI: primary virtual IP for KvarkenoFS/85.192.131.101: 10.5.0.55
  1128. Tue Jan 31 20:28:10 2017 us=245951 85.192.182.110 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1129. Tue Jan 31 20:28:10 2017 us=245951 85.192.182.110 [TockoeMTS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.182.110:2790
  1130. Tue Jan 31 20:28:10 2017 us=245951 TockoeMTS2/85.192.182.110 MULTI_sva: pool returned IPv4=10.5.0.95, IPv6=(Not enabled)
  1131. Tue Jan 31 20:28:10 2017 us=245951 TockoeMTS2/85.192.182.110 MULTI: Learn: 10.5.0.95 -> TockoeMTS2/85.192.182.110
  1132. Tue Jan 31 20:28:10 2017 us=245951 TockoeMTS2/85.192.182.110 MULTI: primary virtual IP for TockoeMTS2/85.192.182.110: 10.5.0.95
  1133. Tue Jan 31 20:28:10 2017 us=245951 83.174.221.126 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1134. Tue Jan 31 20:28:10 2017 us=245951 83.174.221.126 [YazikovoES2] Peer Connection Initiated with [AF_INET6]::ffff:83.174.221.126:14804
  1135. Tue Jan 31 20:28:10 2017 us=245951 YazikovoES2/83.174.221.126 MULTI_sva: pool returned IPv4=10.5.0.42, IPv6=(Not enabled)
  1136. Tue Jan 31 20:28:10 2017 us=245951 YazikovoES2/83.174.221.126 MULTI: Learn: 10.5.0.42 -> YazikovoES2/83.174.221.126
  1137. Tue Jan 31 20:28:10 2017 us=245951 YazikovoES2/83.174.221.126 MULTI: primary virtual IP for YazikovoES2/83.174.221.126: 10.5.0.42
  1138. Tue Jan 31 20:28:10 2017 us=292855 83.174.219.156 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1139. Tue Jan 31 20:28:10 2017 us=292855 83.174.219.156 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=MeleuzES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1140. Tue Jan 31 20:28:10 2017 us=292855 85.192.149.140 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1141. Tue Jan 31 20:28:10 2017 us=292855 85.192.149.140 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=OktyabrskoeMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1142. Tue Jan 31 20:28:10 2017 us=324117 MULTI: multi_create_instance called
  1143. Tue Jan 31 20:28:10 2017 us=324117 85.192.171.215 Re-using SSL/TLS context
  1144. Tue Jan 31 20:28:10 2017 us=324117 85.192.171.215 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1145. Tue Jan 31 20:28:10 2017 us=324117 85.192.171.215 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1146. Tue Jan 31 20:28:10 2017 us=324117 85.192.171.215 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1147. Tue Jan 31 20:28:10 2017 us=324117 85.192.171.215 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1148. Tue Jan 31 20:28:10 2017 us=324117 85.192.171.215 TLS: Initial packet from [AF_INET6]::ffff:85.192.171.215:11225, sid=871b0d06 e638f112
  1149. Tue Jan 31 20:28:10 2017 us=324117 83.174.214.60 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1150. Tue Jan 31 20:28:10 2017 us=324117 83.174.214.60 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=DavlekanovoES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1151. Tue Jan 31 20:28:10 2017 us=324117 85.192.149.140 peer info: IV_VER=2.3.14
  1152. Tue Jan 31 20:28:10 2017 us=324117 85.192.149.140 peer info: IV_PLAT=win
  1153. Tue Jan 31 20:28:10 2017 us=324117 85.192.149.140 peer info: IV_PROTO=2
  1154. Tue Jan 31 20:28:10 2017 us=324117 85.192.149.140 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1155. Tue Jan 31 20:28:10 2017 us=324117 85.192.149.140 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1156. Tue Jan 31 20:28:10 2017 us=324117 85.192.149.140 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1157. Tue Jan 31 20:28:10 2017 us=324117 85.192.149.140 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1158. Tue Jan 31 20:28:10 2017 us=339720 83.174.219.156 peer info: IV_VER=2.3.14
  1159. Tue Jan 31 20:28:10 2017 us=339720 83.174.219.156 peer info: IV_PLAT=win
  1160. Tue Jan 31 20:28:10 2017 us=339720 83.174.219.156 peer info: IV_PROTO=2
  1161. Tue Jan 31 20:28:10 2017 us=339720 83.174.219.156 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1162. Tue Jan 31 20:28:10 2017 us=339720 83.174.219.156 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1163. Tue Jan 31 20:28:10 2017 us=339720 83.174.219.156 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1164. Tue Jan 31 20:28:10 2017 us=339720 83.174.219.156 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1165. Tue Jan 31 20:28:10 2017 us=339720 62.133.169.225 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1166. Tue Jan 31 20:28:10 2017 us=339720 62.133.169.225 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=ChekmagushES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1167. Tue Jan 31 20:28:10 2017 us=355358 85.192.149.140 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1168. Tue Jan 31 20:28:10 2017 us=355358 85.192.149.140 [OktyabrskoeMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.149.140:2487
  1169. Tue Jan 31 20:28:10 2017 us=355358 OktyabrskoeMTS/85.192.149.140 MULTI_sva: pool returned IPv4=10.5.0.134, IPv6=(Not enabled)
  1170. Tue Jan 31 20:28:10 2017 us=355358 OktyabrskoeMTS/85.192.149.140 MULTI: Learn: 10.5.0.134 -> OktyabrskoeMTS/85.192.149.140
  1171. Tue Jan 31 20:28:10 2017 us=355358 OktyabrskoeMTS/85.192.149.140 MULTI: primary virtual IP for OktyabrskoeMTS/85.192.149.140: 10.5.0.134
  1172. Tue Jan 31 20:28:10 2017 us=370975 MULTI: multi_create_instance called
  1173. Tue Jan 31 20:28:10 2017 us=370975 85.192.129.248 Re-using SSL/TLS context
  1174. Tue Jan 31 20:28:10 2017 us=370975 85.192.129.248 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1175. Tue Jan 31 20:28:10 2017 us=370975 85.192.129.248 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1176. Tue Jan 31 20:28:10 2017 us=370975 85.192.129.248 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1177. Tue Jan 31 20:28:10 2017 us=370975 85.192.129.248 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1178. Tue Jan 31 20:28:10 2017 us=370975 85.192.129.248 TLS: Initial packet from [AF_INET6]::ffff:85.192.129.248:2858, sid=0568fee5 b41dd40b
  1179. Tue Jan 31 20:28:10 2017 us=370975 83.174.219.156 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1180. Tue Jan 31 20:28:10 2017 us=370975 83.174.219.156 [MeleuzES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.219.156:4076
  1181. Tue Jan 31 20:28:10 2017 us=370975 MeleuzES/83.174.219.156 MULTI_sva: pool returned IPv4=10.5.0.20, IPv6=(Not enabled)
  1182. Tue Jan 31 20:28:10 2017 us=370975 MeleuzES/83.174.219.156 MULTI: Learn: 10.5.0.20 -> MeleuzES/83.174.219.156
  1183. Tue Jan 31 20:28:10 2017 us=370975 MeleuzES/83.174.219.156 MULTI: primary virtual IP for MeleuzES/83.174.219.156: 10.5.0.20
  1184. Tue Jan 31 20:28:10 2017 us=386595 MULTI: multi_create_instance called
  1185. Tue Jan 31 20:28:10 2017 us=386595 85.192.131.125 Re-using SSL/TLS context
  1186. Tue Jan 31 20:28:10 2017 us=386595 85.192.131.125 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1187. Tue Jan 31 20:28:10 2017 us=386595 85.192.131.125 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1188. Tue Jan 31 20:28:10 2017 us=386595 85.192.131.125 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1189. Tue Jan 31 20:28:10 2017 us=386595 85.192.131.125 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1190. Tue Jan 31 20:28:10 2017 us=386595 85.192.131.125 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.125:2745, sid=35b62733 4b36438e
  1191. Tue Jan 31 20:28:10 2017 us=402219 83.174.228.78 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1192. Tue Jan 31 20:28:10 2017 us=402219 83.174.228.78 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KmiyakiES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1193. Tue Jan 31 20:28:10 2017 us=417847 85.192.131.137 peer info: IV_VER=2.3.14
  1194. Tue Jan 31 20:28:10 2017 us=417847 85.192.131.137 peer info: IV_PLAT=win
  1195. Tue Jan 31 20:28:10 2017 us=417847 85.192.131.137 peer info: IV_PROTO=2
  1196. Tue Jan 31 20:28:10 2017 us=417847 85.192.131.137 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1197. Tue Jan 31 20:28:10 2017 us=417847 85.192.131.137 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1198. Tue Jan 31 20:28:10 2017 us=417847 85.192.131.137 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1199. Tue Jan 31 20:28:10 2017 us=417847 85.192.131.137 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1200. Tue Jan 31 20:28:10 2017 us=417847 MULTI: multi_create_instance called
  1201. Tue Jan 31 20:28:10 2017 us=417847 85.192.130.22 Re-using SSL/TLS context
  1202. Tue Jan 31 20:28:10 2017 us=417847 85.192.130.22 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1203. Tue Jan 31 20:28:10 2017 us=433462 85.192.130.22 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1204. Tue Jan 31 20:28:10 2017 us=433462 85.192.130.22 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1205. Tue Jan 31 20:28:10 2017 us=433462 85.192.130.22 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1206. Tue Jan 31 20:28:10 2017 us=433462 85.192.130.22 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.22:23457, sid=f50306d6 22e85a67
  1207. Tue Jan 31 20:28:10 2017 us=449106 85.192.129.248 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1208. Tue Jan 31 20:28:10 2017 us=449106 85.192.129.248 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AkbulakFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1209. Tue Jan 31 20:28:10 2017 us=449106 85.192.131.125 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1210. Tue Jan 31 20:28:10 2017 us=449106 85.192.131.125 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=MatveevkaMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1211. Tue Jan 31 20:28:10 2017 us=464739 83.174.228.78 peer info: IV_VER=2.3.14
  1212. Tue Jan 31 20:28:10 2017 us=464739 83.174.228.78 peer info: IV_PLAT=win
  1213. Tue Jan 31 20:28:10 2017 us=464739 83.174.228.78 peer info: IV_PROTO=2
  1214. Tue Jan 31 20:28:10 2017 us=464739 83.174.228.78 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1215. Tue Jan 31 20:28:10 2017 us=464739 83.174.228.78 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1216. Tue Jan 31 20:28:10 2017 us=464739 83.174.228.78 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1217. Tue Jan 31 20:28:10 2017 us=464739 83.174.228.78 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1218. Tue Jan 31 20:28:10 2017 us=480352 85.192.129.248 peer info: IV_VER=2.3.14
  1219. Tue Jan 31 20:28:10 2017 us=480352 85.192.129.248 peer info: IV_PLAT=win
  1220. Tue Jan 31 20:28:10 2017 us=480352 85.192.129.248 peer info: IV_PROTO=2
  1221. Tue Jan 31 20:28:10 2017 us=480352 85.192.129.248 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1222. Tue Jan 31 20:28:10 2017 us=480352 85.192.129.248 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1223. Tue Jan 31 20:28:10 2017 us=480352 85.192.129.248 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1224. Tue Jan 31 20:28:10 2017 us=480352 85.192.129.248 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1225. Tue Jan 31 20:28:10 2017 us=480352 85.192.131.125 peer info: IV_VER=2.3.14
  1226. Tue Jan 31 20:28:10 2017 us=480352 85.192.131.125 peer info: IV_PLAT=win
  1227. Tue Jan 31 20:28:10 2017 us=480352 85.192.131.125 peer info: IV_PROTO=2
  1228. Tue Jan 31 20:28:10 2017 us=480352 85.192.131.125 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1229. Tue Jan 31 20:28:10 2017 us=480352 85.192.131.125 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1230. Tue Jan 31 20:28:10 2017 us=480352 85.192.131.125 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1231. Tue Jan 31 20:28:10 2017 us=480352 85.192.131.125 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1232. Tue Jan 31 20:28:10 2017 us=480352 MULTI: multi_create_instance called
  1233. Tue Jan 31 20:28:10 2017 us=480352 89.189.130.140 Re-using SSL/TLS context
  1234. Tue Jan 31 20:28:10 2017 us=480352 89.189.130.140 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1235. Tue Jan 31 20:28:10 2017 us=480352 89.189.130.140 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1236. Tue Jan 31 20:28:10 2017 us=480352 89.189.130.140 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1237. Tue Jan 31 20:28:10 2017 us=480352 89.189.130.140 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1238. Tue Jan 31 20:28:10 2017 us=480352 89.189.130.140 TLS: Initial packet from [AF_INET6]::ffff:89.189.130.140:4939, sid=35764c41 e5045681
  1239. Tue Jan 31 20:28:10 2017 us=511607 85.192.131.125 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1240. Tue Jan 31 20:28:10 2017 us=511607 85.192.131.125 [MatveevkaMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.125:2745
  1241. Tue Jan 31 20:28:10 2017 us=511607 MatveevkaMTS/85.192.131.125 MULTI_sva: pool returned IPv4=10.5.0.135, IPv6=(Not enabled)
  1242. Tue Jan 31 20:28:10 2017 us=511607 MatveevkaMTS/85.192.131.125 MULTI: Learn: 10.5.0.135 -> MatveevkaMTS/85.192.131.125
  1243. Tue Jan 31 20:28:10 2017 us=511607 MatveevkaMTS/85.192.131.125 MULTI: primary virtual IP for MatveevkaMTS/85.192.131.125: 10.5.0.135
  1244. Tue Jan 31 20:28:10 2017 us=511607 85.192.129.248 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1245. Tue Jan 31 20:28:10 2017 us=511607 85.192.129.248 [AkbulakFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.129.248:2858
  1246. Tue Jan 31 20:28:10 2017 us=511607 AkbulakFS2/85.192.129.248 MULTI_sva: pool returned IPv4=10.5.0.100, IPv6=(Not enabled)
  1247. Tue Jan 31 20:28:10 2017 us=511607 AkbulakFS2/85.192.129.248 MULTI: Learn: 10.5.0.100 -> AkbulakFS2/85.192.129.248
  1248. Tue Jan 31 20:28:10 2017 us=511607 AkbulakFS2/85.192.129.248 MULTI: primary virtual IP for AkbulakFS2/85.192.129.248: 10.5.0.100
  1249. Tue Jan 31 20:28:10 2017 us=511607 89.189.130.140 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1250. Tue Jan 31 20:28:10 2017 us=511607 89.189.130.140 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=NeftekamskES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1251. Tue Jan 31 20:28:10 2017 us=511607 MULTI: multi_create_instance called
  1252. Tue Jan 31 20:28:10 2017 us=511607 83.174.229.219 Re-using SSL/TLS context
  1253. Tue Jan 31 20:28:10 2017 us=511607 83.174.229.219 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1254. Tue Jan 31 20:28:10 2017 us=511607 83.174.229.219 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1255. Tue Jan 31 20:28:10 2017 us=511607 83.174.229.219 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1256. Tue Jan 31 20:28:10 2017 us=511607 83.174.229.219 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1257. Tue Jan 31 20:28:10 2017 us=511607 83.174.229.219 TLS: Initial packet from [AF_INET6]::ffff:83.174.229.219:24057, sid=2499317c c211dda1
  1258. Tue Jan 31 20:28:10 2017 us=527230 62.133.169.225 peer info: IV_VER=2.3.14
  1259. Tue Jan 31 20:28:10 2017 us=527230 62.133.169.225 peer info: IV_PLAT=win
  1260. Tue Jan 31 20:28:10 2017 us=527230 62.133.169.225 peer info: IV_PROTO=2
  1261. Tue Jan 31 20:28:10 2017 us=527230 62.133.169.225 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1262. Tue Jan 31 20:28:10 2017 us=527230 62.133.169.225 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1263. Tue Jan 31 20:28:10 2017 us=527230 62.133.169.225 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1264. Tue Jan 31 20:28:10 2017 us=527230 62.133.169.225 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1265. Tue Jan 31 20:28:10 2017 us=527230 89.189.130.140 peer info: IV_VER=2.3.14
  1266. Tue Jan 31 20:28:10 2017 us=527230 89.189.130.140 peer info: IV_PLAT=win
  1267. Tue Jan 31 20:28:10 2017 us=527230 89.189.130.140 peer info: IV_PROTO=2
  1268. Tue Jan 31 20:28:10 2017 us=527230 89.189.130.140 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1269. Tue Jan 31 20:28:10 2017 us=527230 89.189.130.140 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1270. Tue Jan 31 20:28:10 2017 us=527230 89.189.130.140 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1271. Tue Jan 31 20:28:10 2017 us=527230 89.189.130.140 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1272. Tue Jan 31 20:28:10 2017 us=542849 83.174.228.78 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1273. Tue Jan 31 20:28:10 2017 us=542849 83.174.228.78 [KmiyakiES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.228.78:4542
  1274. Tue Jan 31 20:28:10 2017 us=542849 KmiyakiES/83.174.228.78 MULTI_sva: pool returned IPv4=10.5.0.18, IPv6=(Not enabled)
  1275. Tue Jan 31 20:28:10 2017 us=542849 KmiyakiES/83.174.228.78 MULTI: Learn: 10.5.0.18 -> KmiyakiES/83.174.228.78
  1276. Tue Jan 31 20:28:10 2017 us=542849 KmiyakiES/83.174.228.78 MULTI: primary virtual IP for KmiyakiES/83.174.228.78: 10.5.0.18
  1277. Tue Jan 31 20:28:10 2017 us=542849 83.174.214.60 peer info: IV_VER=2.3.14
  1278. Tue Jan 31 20:28:10 2017 us=542849 83.174.214.60 peer info: IV_PLAT=win
  1279. Tue Jan 31 20:28:10 2017 us=542849 83.174.214.60 peer info: IV_PROTO=2
  1280. Tue Jan 31 20:28:10 2017 us=542849 83.174.214.60 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1281. Tue Jan 31 20:28:10 2017 us=542849 83.174.214.60 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1282. Tue Jan 31 20:28:10 2017 us=542849 83.174.214.60 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1283. Tue Jan 31 20:28:10 2017 us=542849 83.174.214.60 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1284. Tue Jan 31 20:28:10 2017 us=542849 89.189.130.140 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1285. Tue Jan 31 20:28:10 2017 us=542849 89.189.130.140 [NeftekamskES] Peer Connection Initiated with [AF_INET6]::ffff:89.189.130.140:4939
  1286. Tue Jan 31 20:28:10 2017 us=542849 NeftekamskES/89.189.130.140 MULTI_sva: pool returned IPv4=10.5.0.21, IPv6=(Not enabled)
  1287. Tue Jan 31 20:28:10 2017 us=542849 NeftekamskES/89.189.130.140 MULTI: Learn: 10.5.0.21 -> NeftekamskES/89.189.130.140
  1288. Tue Jan 31 20:28:10 2017 us=542849 NeftekamskES/89.189.130.140 MULTI: primary virtual IP for NeftekamskES/89.189.130.140: 10.5.0.21
  1289. Tue Jan 31 20:28:10 2017 us=589722 85.192.130.22 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1290. Tue Jan 31 20:28:10 2017 us=589722 85.192.130.22 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AsekeevoMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1291. Tue Jan 31 20:28:10 2017 us=620953 83.174.214.60 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1292. Tue Jan 31 20:28:10 2017 us=620953 83.174.214.60 [DavlekanovoES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.214.60:27886
  1293. Tue Jan 31 20:28:10 2017 us=620953 DavlekanovoES/83.174.214.60 MULTI_sva: pool returned IPv4=10.5.0.9, IPv6=(Not enabled)
  1294. Tue Jan 31 20:28:10 2017 us=620953 DavlekanovoES/83.174.214.60 MULTI: Learn: 10.5.0.9 -> DavlekanovoES/83.174.214.60
  1295. Tue Jan 31 20:28:10 2017 us=620953 DavlekanovoES/83.174.214.60 MULTI: primary virtual IP for DavlekanovoES/83.174.214.60: 10.5.0.9
  1296. Tue Jan 31 20:28:10 2017 us=620953 85.192.131.137 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1297. Tue Jan 31 20:28:10 2017 us=620953 85.192.131.137 [BuguruslanMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.137:1766
  1298. Tue Jan 31 20:28:10 2017 us=620953 BuguruslanMTS/85.192.131.137 MULTI_sva: pool returned IPv4=10.5.0.120, IPv6=(Not enabled)
  1299. Tue Jan 31 20:28:10 2017 us=620953 BuguruslanMTS/85.192.131.137 MULTI: Learn: 10.5.0.120 -> BuguruslanMTS/85.192.131.137
  1300. Tue Jan 31 20:28:10 2017 us=620953 BuguruslanMTS/85.192.131.137 MULTI: primary virtual IP for BuguruslanMTS/85.192.131.137: 10.5.0.120
  1301. Tue Jan 31 20:28:10 2017 us=636575 62.133.169.225 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1302. Tue Jan 31 20:28:10 2017 us=636575 62.133.169.225 [ChekmagushES] Peer Connection Initiated with [AF_INET6]::ffff:62.133.169.225:10132
  1303. Tue Jan 31 20:28:10 2017 us=636575 ChekmagushES/62.133.169.225 MULTI_sva: pool returned IPv4=10.5.0.32, IPv6=(Not enabled)
  1304. Tue Jan 31 20:28:10 2017 us=636575 ChekmagushES/62.133.169.225 MULTI: Learn: 10.5.0.32 -> ChekmagushES/62.133.169.225
  1305. Tue Jan 31 20:28:10 2017 us=636575 ChekmagushES/62.133.169.225 MULTI: primary virtual IP for ChekmagushES/62.133.169.225: 10.5.0.32
  1306. Tue Jan 31 20:28:10 2017 us=667838 85.192.171.215 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1307. Tue Jan 31 20:28:10 2017 us=667838 85.192.171.215 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KvarkenoMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1308. Tue Jan 31 20:28:10 2017 us=699082 85.192.130.22 peer info: IV_VER=2.3.14
  1309. Tue Jan 31 20:28:10 2017 us=699082 85.192.130.22 peer info: IV_PLAT=win
  1310. Tue Jan 31 20:28:10 2017 us=699082 85.192.130.22 peer info: IV_PROTO=2
  1311. Tue Jan 31 20:28:10 2017 us=699082 85.192.130.22 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1312. Tue Jan 31 20:28:10 2017 us=699082 85.192.130.22 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1313. Tue Jan 31 20:28:10 2017 us=699082 85.192.130.22 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1314. Tue Jan 31 20:28:10 2017 us=699082 85.192.130.22 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1315. Tue Jan 31 20:28:10 2017 us=745975 85.192.130.22 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1316. Tue Jan 31 20:28:10 2017 us=745975 85.192.130.22 [AsekeevoMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.22:23457
  1317. Tue Jan 31 20:28:10 2017 us=745975 AsekeevoMTS/85.192.130.22 MULTI_sva: pool returned IPv4=10.5.0.125, IPv6=(Not enabled)
  1318. Tue Jan 31 20:28:10 2017 us=745975 AsekeevoMTS/85.192.130.22 MULTI: Learn: 10.5.0.125 -> AsekeevoMTS/85.192.130.22
  1319. Tue Jan 31 20:28:10 2017 us=745975 AsekeevoMTS/85.192.130.22 MULTI: primary virtual IP for AsekeevoMTS/85.192.130.22: 10.5.0.125
  1320. Tue Jan 31 20:28:10 2017 us=777229 85.192.171.215 peer info: IV_VER=2.3.14
  1321. Tue Jan 31 20:28:10 2017 us=777229 85.192.171.215 peer info: IV_PLAT=win
  1322. Tue Jan 31 20:28:10 2017 us=777229 85.192.171.215 peer info: IV_PROTO=2
  1323. Tue Jan 31 20:28:10 2017 us=777229 85.192.171.215 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1324. Tue Jan 31 20:28:10 2017 us=777229 85.192.171.215 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1325. Tue Jan 31 20:28:10 2017 us=777229 85.192.171.215 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1326. Tue Jan 31 20:28:10 2017 us=777229 85.192.171.215 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1327. Tue Jan 31 20:28:10 2017 us=808471 MULTI: multi_create_instance called
  1328. Tue Jan 31 20:28:10 2017 us=808471 85.192.131.83 Re-using SSL/TLS context
  1329. Tue Jan 31 20:28:10 2017 us=808471 85.192.131.83 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1330. Tue Jan 31 20:28:10 2017 us=808471 85.192.131.83 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1331. Tue Jan 31 20:28:10 2017 us=808471 85.192.131.83 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1332. Tue Jan 31 20:28:10 2017 us=808471 85.192.131.83 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1333. Tue Jan 31 20:28:10 2017 us=808471 85.192.131.83 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.83:3079, sid=70d68e39 f9517cdb
  1334. Tue Jan 31 20:28:10 2017 us=839704 85.192.171.215 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1335. Tue Jan 31 20:28:10 2017 us=839704 85.192.171.215 [KvarkenoMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.171.215:11225
  1336. Tue Jan 31 20:28:10 2017 us=839704 KvarkenoMTS/85.192.171.215 MULTI_sva: pool returned IPv4=10.5.0.53, IPv6=(Not enabled)
  1337. Tue Jan 31 20:28:10 2017 us=839704 KvarkenoMTS/85.192.171.215 MULTI: Learn: 10.5.0.53 -> KvarkenoMTS/85.192.171.215
  1338. Tue Jan 31 20:28:10 2017 us=839704 KvarkenoMTS/85.192.171.215 MULTI: primary virtual IP for KvarkenoMTS/85.192.171.215: 10.5.0.53
  1339. Tue Jan 31 20:28:10 2017 us=980354 MULTI: multi_create_instance called
  1340. Tue Jan 31 20:28:10 2017 us=980354 85.192.131.86 Re-using SSL/TLS context
  1341. Tue Jan 31 20:28:10 2017 us=980354 85.192.131.86 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1342. Tue Jan 31 20:28:10 2017 us=980354 85.192.131.86 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1343. Tue Jan 31 20:28:10 2017 us=980354 85.192.131.86 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1344. Tue Jan 31 20:28:10 2017 us=980354 85.192.131.86 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1345. Tue Jan 31 20:28:10 2017 us=980354 85.192.131.86 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.86:26810, sid=280552de a2a2a427
  1346. Tue Jan 31 20:28:11 2017 us=74115 85.192.131.83 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1347. Tue Jan 31 20:28:11 2017 us=74115 85.192.131.83 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=PonomarevkaMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1348. Tue Jan 31 20:28:11 2017 us=167832 85.192.131.86 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1349. Tue Jan 31 20:28:11 2017 us=167832 85.192.131.86 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KrasnoholmES2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1350. Tue Jan 31 20:28:11 2017 us=199079 85.192.131.83 peer info: IV_VER=2.3.14
  1351. Tue Jan 31 20:28:11 2017 us=199079 85.192.131.83 peer info: IV_PLAT=win
  1352. Tue Jan 31 20:28:11 2017 us=199079 85.192.131.83 peer info: IV_PROTO=2
  1353. Tue Jan 31 20:28:11 2017 us=199079 85.192.131.83 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1354. Tue Jan 31 20:28:11 2017 us=199079 85.192.131.83 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1355. Tue Jan 31 20:28:11 2017 us=199079 85.192.131.83 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1356. Tue Jan 31 20:28:11 2017 us=199079 85.192.131.83 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1357. Tue Jan 31 20:28:11 2017 us=230329 85.192.131.86 peer info: IV_VER=2.3.14
  1358. Tue Jan 31 20:28:11 2017 us=230329 85.192.131.86 peer info: IV_PLAT=win
  1359. Tue Jan 31 20:28:11 2017 us=230329 85.192.131.86 peer info: IV_PROTO=2
  1360. Tue Jan 31 20:28:11 2017 us=230329 85.192.131.86 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1361. Tue Jan 31 20:28:11 2017 us=230329 85.192.131.86 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1362. Tue Jan 31 20:28:11 2017 us=230329 85.192.131.86 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1363. Tue Jan 31 20:28:11 2017 us=230329 85.192.131.86 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1364. Tue Jan 31 20:28:11 2017 us=292852 85.192.131.86 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1365. Tue Jan 31 20:28:11 2017 us=292852 85.192.131.86 [KrasnoholmES2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.86:26810
  1366. Tue Jan 31 20:28:11 2017 us=292852 KrasnoholmES2/85.192.131.86 MULTI_sva: pool returned IPv4=10.5.0.86, IPv6=(Not enabled)
  1367. Tue Jan 31 20:28:11 2017 us=292852 KrasnoholmES2/85.192.131.86 MULTI: Learn: 10.5.0.86 -> KrasnoholmES2/85.192.131.86
  1368. Tue Jan 31 20:28:11 2017 us=292852 KrasnoholmES2/85.192.131.86 MULTI: primary virtual IP for KrasnoholmES2/85.192.131.86: 10.5.0.86
  1369. Tue Jan 31 20:28:11 2017 us=324108 85.192.131.83 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1370. Tue Jan 31 20:28:11 2017 us=324108 85.192.131.83 [PonomarevkaMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.83:3079
  1371. Tue Jan 31 20:28:11 2017 us=324108 PonomarevkaMTS/85.192.131.83 MULTI_sva: pool returned IPv4=10.5.0.127, IPv6=(Not enabled)
  1372. Tue Jan 31 20:28:11 2017 us=324108 PonomarevkaMTS/85.192.131.83 MULTI: Learn: 10.5.0.127 -> PonomarevkaMTS/85.192.131.83
  1373. Tue Jan 31 20:28:11 2017 us=324108 PonomarevkaMTS/85.192.131.83 MULTI: primary virtual IP for PonomarevkaMTS/85.192.131.83: 10.5.0.127
  1374. Tue Jan 31 20:28:11 2017 us=417850 MULTI: multi_create_instance called
  1375. Tue Jan 31 20:28:11 2017 us=417850 77.94.104.55 Re-using SSL/TLS context
  1376. Tue Jan 31 20:28:11 2017 us=417850 77.94.104.55 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1377. Tue Jan 31 20:28:11 2017 us=417850 77.94.104.55 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1378. Tue Jan 31 20:28:11 2017 us=417850 77.94.104.55 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1379. Tue Jan 31 20:28:11 2017 us=417850 77.94.104.55 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1380. Tue Jan 31 20:28:11 2017 us=417850 77.94.104.55 TLS: Initial packet from [AF_INET6]::ffff:77.94.104.55:14637, sid=f2bdf621 c08a56b6
  1381. Tue Jan 31 20:28:11 2017 us=495960 KurmanaevkaMTS/85.192.167.58 PUSH: Received control message: 'PUSH_REQUEST'
  1382. Tue Jan 31 20:28:11 2017 us=495960 KurmanaevkaMTS/85.192.167.58 SENT CONTROL [KurmanaevkaMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.123 255.255.255.0,peer-id 1' (status=1)
  1383. Tue Jan 31 20:28:11 2017 us=699097 KvarkenoES/85.192.131.101 PUSH: Received control message: 'PUSH_REQUEST'
  1384. Tue Jan 31 20:28:11 2017 us=699097 KvarkenoES/85.192.131.101 SENT CONTROL [KvarkenoES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.58 255.255.255.0,peer-id 0' (status=1)
  1385. Tue Jan 31 20:28:11 2017 us=730349 NovoorskMTS/85.192.129.228 PUSH: Received control message: 'PUSH_REQUEST'
  1386. Tue Jan 31 20:28:11 2017 us=730349 NovoorskMTS/85.192.129.228 SENT CONTROL [NovoorskMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.66 255.255.255.0,peer-id 3' (status=1)
  1387. Tue Jan 31 20:28:11 2017 us=808472 AlexandrovkaES/85.192.131.237 PUSH: Received control message: 'PUSH_REQUEST'
  1388. Tue Jan 31 20:28:11 2017 us=808472 AlexandrovkaES/85.192.131.237 SENT CONTROL [AlexandrovkaES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.118 255.255.255.0,peer-id 6' (status=1)
  1389. Tue Jan 31 20:28:11 2017 us=933493 77.94.104.55 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1390. Tue Jan 31 20:28:11 2017 us=933493 77.94.104.55 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=ChishmiES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1391. Tue Jan 31 20:28:11 2017 us=980365 77.94.104.55 peer info: IV_VER=2.3.14
  1392. Tue Jan 31 20:28:11 2017 us=980365 77.94.104.55 peer info: IV_PLAT=win
  1393. Tue Jan 31 20:28:11 2017 us=980365 77.94.104.55 peer info: IV_PROTO=2
  1394. Tue Jan 31 20:28:11 2017 us=980365 77.94.104.55 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1395. Tue Jan 31 20:28:11 2017 us=980365 77.94.104.55 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1396. Tue Jan 31 20:28:11 2017 us=980365 77.94.104.55 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1397. Tue Jan 31 20:28:11 2017 us=980365 77.94.104.55 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1398. Tue Jan 31 20:28:12 2017 us=27227 77.94.104.55 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1399. Tue Jan 31 20:28:12 2017 us=27227 77.94.104.55 [ChishmiES] Peer Connection Initiated with [AF_INET6]::ffff:77.94.104.55:14637
  1400. Tue Jan 31 20:28:12 2017 us=27227 ChishmiES/77.94.104.55 MULTI_sva: pool returned IPv4=10.5.0.33, IPv6=(Not enabled)
  1401. Tue Jan 31 20:28:12 2017 us=27227 ChishmiES/77.94.104.55 MULTI: Learn: 10.5.0.33 -> ChishmiES/77.94.104.55
  1402. Tue Jan 31 20:28:12 2017 us=27227 ChishmiES/77.94.104.55 MULTI: primary virtual IP for ChishmiES/77.94.104.55: 10.5.0.33
  1403. Tue Jan 31 20:28:12 2017 us=89710 NovoorskMTS/85.192.129.228 MULTI: bad source address from client [192.168.1.4], packet dropped
  1404. Tue Jan 31 20:28:12 2017 us=136585 AdamovkaES2/85.192.131.3 PUSH: Received control message: 'PUSH_REQUEST'
  1405. Tue Jan 31 20:28:12 2017 us=136585 AdamovkaES2/85.192.131.3 SENT CONTROL [AdamovkaES2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.51 255.255.255.0,peer-id 9' (status=1)
  1406. Tue Jan 31 20:28:12 2017 us=152426 MULTI: multi_create_instance called
  1407. Tue Jan 31 20:28:12 2017 us=152426 85.192.131.125 Re-using SSL/TLS context
  1408. Tue Jan 31 20:28:12 2017 us=152426 85.192.131.125 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1409. Tue Jan 31 20:28:12 2017 us=152426 85.192.131.125 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1410. Tue Jan 31 20:28:12 2017 us=152426 85.192.131.125 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1411. Tue Jan 31 20:28:12 2017 us=152426 85.192.131.125 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1412. Tue Jan 31 20:28:12 2017 us=152426 85.192.131.125 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.125:59538, sid=f4c4da7e 08863d04
  1413. Tue Jan 31 20:28:12 2017 us=152426 YazikovoFS2/83.174.213.186 PUSH: Received control message: 'PUSH_REQUEST'
  1414. Tue Jan 31 20:28:12 2017 us=152426 YazikovoFS2/83.174.213.186 SENT CONTROL [YazikovoFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.41 255.255.255.0,peer-id 2' (status=1)
  1415. Tue Jan 31 20:28:12 2017 us=199189 MULTI: multi_create_instance called
  1416. Tue Jan 31 20:28:12 2017 us=199189 79.140.20.2 Re-using SSL/TLS context
  1417. Tue Jan 31 20:28:12 2017 us=199189 79.140.20.2 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1418. Tue Jan 31 20:28:12 2017 us=199189 79.140.20.2 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1419. Tue Jan 31 20:28:12 2017 us=199189 79.140.20.2 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1420. Tue Jan 31 20:28:12 2017 us=199189 79.140.20.2 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1421. Tue Jan 31 20:28:12 2017 us=199189 79.140.20.2 TLS: Initial packet from [AF_INET6]::ffff:79.140.20.2:64461, sid=9520441c 81c81695
  1422. Tue Jan 31 20:28:12 2017 us=214842 85.192.131.125 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1423. Tue Jan 31 20:28:12 2017 us=214842 85.192.131.125 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=MatveevkaFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1424. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1425. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=JuzniiES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1426. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_VER=2.4.0
  1427. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_PLAT=win
  1428. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_PROTO=2
  1429. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_NCP=2
  1430. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_LZ4=1
  1431. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_LZ4v2=1
  1432. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_LZO=1
  1433. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_COMP_STUB=1
  1434. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_COMP_STUBv2=1
  1435. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 peer info: IV_TCPNL=1
  1436. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1437. Tue Jan 31 20:28:12 2017 us=230340 79.140.20.2 [JuzniiES] Peer Connection Initiated with [AF_INET6]::ffff:79.140.20.2:64461
  1438. Tue Jan 31 20:28:12 2017 us=230340 JuzniiES/79.140.20.2 MULTI_sva: pool returned IPv4=10.5.0.104, IPv6=(Not enabled)
  1439. Tue Jan 31 20:28:12 2017 us=230340 JuzniiES/79.140.20.2 MULTI: Learn: 10.5.0.104 -> JuzniiES/79.140.20.2
  1440. Tue Jan 31 20:28:12 2017 us=230340 JuzniiES/79.140.20.2 MULTI: primary virtual IP for JuzniiES/79.140.20.2: 10.5.0.104
  1441. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_VER=2.4.0
  1442. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_PLAT=win
  1443. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_PROTO=2
  1444. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_NCP=2
  1445. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_LZ4=1
  1446. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_LZ4v2=1
  1447. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_LZO=1
  1448. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_COMP_STUB=1
  1449. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_COMP_STUBv2=1
  1450. Tue Jan 31 20:28:12 2017 us=245956 85.192.131.125 peer info: IV_TCPNL=1
  1451. Tue Jan 31 20:28:12 2017 us=261583 NeftekamskES2/89.189.130.140 PUSH: Received control message: 'PUSH_REQUEST'
  1452. Tue Jan 31 20:28:12 2017 us=261583 NeftekamskES2/89.189.130.140 SENT CONTROL [NeftekamskES2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.22 255.255.255.0,peer-id 12' (status=1)
  1453. Tue Jan 31 20:28:12 2017 us=277230 UfamvdES/81.30.220.17 PUSH: Received control message: 'PUSH_REQUEST'
  1454. Tue Jan 31 20:28:12 2017 us=277230 UfamvdES/81.30.220.17 SENT CONTROL [UfamvdES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.30 255.255.255.0,peer-id 7' (status=1)
  1455. Tue Jan 31 20:28:12 2017 us=277230 85.192.131.125 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1456. Tue Jan 31 20:28:12 2017 us=277230 85.192.131.125 [MatveevkaFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.125:59538
  1457. Tue Jan 31 20:28:12 2017 us=277230 MatveevkaFS/85.192.131.125 MULTI_sva: pool returned IPv4=10.5.0.136, IPv6=(Not enabled)
  1458. Tue Jan 31 20:28:12 2017 us=277230 MatveevkaFS/85.192.131.125 MULTI: Learn: 10.5.0.136 -> MatveevkaFS/85.192.131.125
  1459. Tue Jan 31 20:28:12 2017 us=277230 MatveevkaFS/85.192.131.125 MULTI: primary virtual IP for MatveevkaFS/85.192.131.125: 10.5.0.136
  1460. Tue Jan 31 20:28:12 2017 us=292855 NovoorskMTS2/85.192.129.228 PUSH: Received control message: 'PUSH_REQUEST'
  1461. Tue Jan 31 20:28:12 2017 us=292855 NovoorskMTS2/85.192.129.228 SENT CONTROL [NovoorskMTS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.65 255.255.255.0,peer-id 10' (status=1)
  1462. Tue Jan 31 20:28:12 2017 us=308483 SterlibashevoES/83.174.222.13 PUSH: Received control message: 'PUSH_REQUEST'
  1463. Tue Jan 31 20:28:12 2017 us=308483 SterlibashevoES/83.174.222.13 SENT CONTROL [SterlibashevoES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.27 255.255.255.0,peer-id 5' (status=1)
  1464. Tue Jan 31 20:28:12 2017 us=308483 MULTI: multi_create_instance called
  1465. Tue Jan 31 20:28:12 2017 us=308483 85.192.182.110 Re-using SSL/TLS context
  1466. Tue Jan 31 20:28:12 2017 us=308483 85.192.182.110 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1467. Tue Jan 31 20:28:12 2017 us=308483 85.192.182.110 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1468. Tue Jan 31 20:28:12 2017 us=308483 85.192.182.110 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1469. Tue Jan 31 20:28:12 2017 us=308483 85.192.182.110 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1470. Tue Jan 31 20:28:12 2017 us=308483 85.192.182.110 TLS: Initial packet from [AF_INET6]::ffff:85.192.182.110:55737, sid=53c883f8 19a3ac0d
  1471. Tue Jan 31 20:28:12 2017 us=308483 SorochinskT2/85.192.128.241 PUSH: Received control message: 'PUSH_REQUEST'
  1472. Tue Jan 31 20:28:12 2017 us=308483 SorochinskT2/85.192.128.241 SENT CONTROL [SorochinskT2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.89 255.255.255.0,peer-id 4' (status=1)
  1473. Tue Jan 31 20:28:12 2017 us=339723 SakmaraMTS/85.192.128.115 PUSH: Received control message: 'PUSH_REQUEST'
  1474. Tue Jan 31 20:28:12 2017 us=339723 SakmaraMTS/85.192.128.115 SENT CONTROL [SakmaraMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.105 255.255.255.0,peer-id 18' (status=1)
  1475. Tue Jan 31 20:28:12 2017 us=355354 MULTI: multi_create_instance called
  1476. Tue Jan 31 20:28:12 2017 us=355354 85.192.167.58 Re-using SSL/TLS context
  1477. Tue Jan 31 20:28:12 2017 us=355354 85.192.167.58 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1478. Tue Jan 31 20:28:12 2017 us=355354 85.192.167.58 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1479. Tue Jan 31 20:28:12 2017 us=355354 85.192.167.58 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1480. Tue Jan 31 20:28:12 2017 us=355354 85.192.167.58 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1481. Tue Jan 31 20:28:12 2017 us=355354 85.192.167.58 TLS: Initial packet from [AF_INET6]::ffff:85.192.167.58:51088, sid=d2b3c0f7 8129c1c6
  1482. Tue Jan 31 20:28:12 2017 us=386609 TockoeMTS2/85.192.182.110 PUSH: Received control message: 'PUSH_REQUEST'
  1483. Tue Jan 31 20:28:12 2017 us=386609 TockoeMTS2/85.192.182.110 SENT CONTROL [TockoeMTS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.95 255.255.255.0,peer-id 17' (status=1)
  1484. Tue Jan 31 20:28:12 2017 us=386609 85.192.182.110 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1485. Tue Jan 31 20:28:12 2017 us=386609 85.192.182.110 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=TockoeFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1486. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_VER=2.4.0
  1487. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_PLAT=win
  1488. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_PROTO=2
  1489. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_NCP=2
  1490. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_LZ4=1
  1491. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_LZ4v2=1
  1492. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_LZO=1
  1493. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_COMP_STUB=1
  1494. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_COMP_STUBv2=1
  1495. Tue Jan 31 20:28:12 2017 us=417852 85.192.182.110 peer info: IV_TCPNL=1
  1496. Tue Jan 31 20:28:12 2017 us=433474 85.192.167.58 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1497. Tue Jan 31 20:28:12 2017 us=433474 85.192.167.58 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KurmanaevkaFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1498. Tue Jan 31 20:28:12 2017 us=449097 85.192.182.110 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1499. Tue Jan 31 20:28:12 2017 us=449097 85.192.182.110 [TockoeFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.182.110:55737
  1500. Tue Jan 31 20:28:12 2017 us=449097 TockoeFS/85.192.182.110 MULTI_sva: pool returned IPv4=10.5.0.96, IPv6=(Not enabled)
  1501. Tue Jan 31 20:28:12 2017 us=449097 TockoeFS/85.192.182.110 MULTI: Learn: 10.5.0.96 -> TockoeFS/85.192.182.110
  1502. Tue Jan 31 20:28:12 2017 us=449097 TockoeFS/85.192.182.110 MULTI: primary virtual IP for TockoeFS/85.192.182.110: 10.5.0.96
  1503. Tue Jan 31 20:28:12 2017 us=449097 BuguruslanMTS/85.192.131.137 PUSH: Received control message: 'PUSH_REQUEST'
  1504. Tue Jan 31 20:28:12 2017 us=449097 BuguruslanMTS/85.192.131.137 SENT CONTROL [BuguruslanMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.120 255.255.255.0,peer-id 8' (status=1)
  1505. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_VER=2.4.0
  1506. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_PLAT=win
  1507. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_PROTO=2
  1508. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_NCP=2
  1509. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_LZ4=1
  1510. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_LZ4v2=1
  1511. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_LZO=1
  1512. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_COMP_STUB=1
  1513. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_COMP_STUBv2=1
  1514. Tue Jan 31 20:28:12 2017 us=449097 85.192.167.58 peer info: IV_TCPNL=1
  1515. Tue Jan 31 20:28:12 2017 us=480355 85.192.167.58 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1516. Tue Jan 31 20:28:12 2017 us=480355 85.192.167.58 [KurmanaevkaFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.167.58:51088
  1517. Tue Jan 31 20:28:12 2017 us=480355 KurmanaevkaFS2/85.192.167.58 MULTI_sva: pool returned IPv4=10.5.0.122, IPv6=(Not enabled)
  1518. Tue Jan 31 20:28:12 2017 us=480355 KurmanaevkaFS2/85.192.167.58 MULTI: Learn: 10.5.0.122 -> KurmanaevkaFS2/85.192.167.58
  1519. Tue Jan 31 20:28:12 2017 us=480355 KurmanaevkaFS2/85.192.167.58 MULTI: primary virtual IP for KurmanaevkaFS2/85.192.167.58: 10.5.0.122
  1520. Tue Jan 31 20:28:12 2017 us=495956 MULTI: multi_create_instance called
  1521. Tue Jan 31 20:28:12 2017 us=495956 83.174.224.221 Re-using SSL/TLS context
  1522. Tue Jan 31 20:28:12 2017 us=495956 83.174.224.221 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1523. Tue Jan 31 20:28:12 2017 us=495956 83.174.224.221 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1524. Tue Jan 31 20:28:12 2017 us=495956 83.174.224.221 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1525. Tue Jan 31 20:28:12 2017 us=495956 83.174.224.221 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1526. Tue Jan 31 20:28:12 2017 us=495956 83.174.224.221 TLS: Initial packet from [AF_INET6]::ffff:83.174.224.221:65497, sid=d8fe53a8 6a16e186
  1527. Tue Jan 31 20:28:12 2017 us=495956 NeftekamskES/89.189.130.140 PUSH: Received control message: 'PUSH_REQUEST'
  1528. Tue Jan 31 20:28:12 2017 us=495956 NeftekamskES/89.189.130.140 SENT CONTROL [NeftekamskES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.21 255.255.255.0,peer-id 27' (status=1)
  1529. Tue Jan 31 20:28:12 2017 us=511581 MULTI: multi_create_instance called
  1530. Tue Jan 31 20:28:12 2017 us=511581 85.192.130.212 Re-using SSL/TLS context
  1531. Tue Jan 31 20:28:12 2017 us=511581 85.192.130.212 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1532. Tue Jan 31 20:28:12 2017 us=511581 85.192.130.212 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1533. Tue Jan 31 20:28:12 2017 us=511581 85.192.130.212 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1534. Tue Jan 31 20:28:12 2017 us=511581 85.192.130.212 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1535. Tue Jan 31 20:28:12 2017 us=511581 85.192.130.212 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.212:20568, sid=46d2a919 9a79a974
  1536. Tue Jan 31 20:28:12 2017 us=511581 NovoorskFS2/85.192.129.228 PUSH: Received control message: 'PUSH_REQUEST'
  1537. Tue Jan 31 20:28:12 2017 us=511581 NovoorskFS2/85.192.129.228 SENT CONTROL [NovoorskFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.67 255.255.255.0,peer-id 16' (status=1)
  1538. Tue Jan 31 20:28:12 2017 us=527225 MULTI: multi_create_instance called
  1539. Tue Jan 31 20:28:12 2017 us=527225 85.192.131.237 Re-using SSL/TLS context
  1540. Tue Jan 31 20:28:12 2017 us=527225 85.192.131.237 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1541. Tue Jan 31 20:28:12 2017 us=527225 85.192.131.237 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1542. Tue Jan 31 20:28:12 2017 us=527225 85.192.131.237 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1543. Tue Jan 31 20:28:12 2017 us=527225 85.192.131.237 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1544. Tue Jan 31 20:28:12 2017 us=527225 85.192.131.237 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.237:58899, sid=2fe194e5 27d5b977
  1545. Tue Jan 31 20:28:12 2017 us=542854 MatveevkaMTS/85.192.131.125 PUSH: Received control message: 'PUSH_REQUEST'
  1546. Tue Jan 31 20:28:12 2017 us=542854 MatveevkaMTS/85.192.131.125 SENT CONTROL [MatveevkaMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.135 255.255.255.0,peer-id 25' (status=1)
  1547. Tue Jan 31 20:28:12 2017 us=542854 MULTI: multi_create_instance called
  1548. Tue Jan 31 20:28:12 2017 us=542854 85.192.131.86 Re-using SSL/TLS context
  1549. Tue Jan 31 20:28:12 2017 us=542854 85.192.131.86 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1550. Tue Jan 31 20:28:12 2017 us=542854 85.192.131.86 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1551. Tue Jan 31 20:28:12 2017 us=542854 85.192.131.86 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1552. Tue Jan 31 20:28:12 2017 us=542854 85.192.131.86 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1553. Tue Jan 31 20:28:12 2017 us=542854 85.192.131.86 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.86:26811, sid=5a061c92 16200388
  1554. Tue Jan 31 20:28:12 2017 us=558475 YazikovoES2/83.174.221.126 PUSH: Received control message: 'PUSH_REQUEST'
  1555. Tue Jan 31 20:28:12 2017 us=558475 YazikovoES2/83.174.221.126 SENT CONTROL [YazikovoES2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.42 255.255.255.0,peer-id 14' (status=1)
  1556. Tue Jan 31 20:28:12 2017 us=589705 AkbulakFS2/85.192.129.248 PUSH: Received control message: 'PUSH_REQUEST'
  1557. Tue Jan 31 20:28:12 2017 us=589705 AkbulakFS2/85.192.129.248 SENT CONTROL [AkbulakFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.100 255.255.255.0,peer-id 24' (status=1)
  1558. Tue Jan 31 20:28:12 2017 us=589705 83.174.224.221 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1559. Tue Jan 31 20:28:12 2017 us=589705 83.174.224.221 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=BelebeiFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1560. Tue Jan 31 20:28:12 2017 us=589705 MULTI: multi_create_instance called
  1561. Tue Jan 31 20:28:12 2017 us=589705 85.192.130.251 Re-using SSL/TLS context
  1562. Tue Jan 31 20:28:12 2017 us=589705 85.192.130.251 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1563. Tue Jan 31 20:28:12 2017 us=589705 85.192.130.251 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1564. Tue Jan 31 20:28:12 2017 us=589705 85.192.130.251 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1565. Tue Jan 31 20:28:12 2017 us=589705 85.192.130.251 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1566. Tue Jan 31 20:28:12 2017 us=589705 85.192.130.251 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.251:64587, sid=3d661746 702b31dd
  1567. Tue Jan 31 20:28:12 2017 us=589705 MULTI: multi_create_instance called
  1568. Tue Jan 31 20:28:12 2017 us=589705 85.192.132.111 Re-using SSL/TLS context
  1569. Tue Jan 31 20:28:12 2017 us=589705 85.192.132.111 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1570. Tue Jan 31 20:28:12 2017 us=589705 85.192.132.111 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1571. Tue Jan 31 20:28:12 2017 us=589705 85.192.132.111 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1572. Tue Jan 31 20:28:12 2017 us=589705 85.192.132.111 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1573. Tue Jan 31 20:28:12 2017 us=589705 85.192.132.111 TLS: Initial packet from [AF_INET6]::ffff:85.192.132.111:64891, sid=d460f947 d6d363fa
  1574. Tue Jan 31 20:28:12 2017 us=605333 85.192.131.237 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1575. Tue Jan 31 20:28:12 2017 us=605333 85.192.131.237 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AlexandrovkaFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1576. Tue Jan 31 20:28:12 2017 us=605333 MULTI: multi_create_instance called
  1577. Tue Jan 31 20:28:12 2017 us=605333 85.192.132.111 Re-using SSL/TLS context
  1578. Tue Jan 31 20:28:12 2017 us=605333 85.192.132.111 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1579. Tue Jan 31 20:28:12 2017 us=605333 85.192.132.111 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1580. Tue Jan 31 20:28:12 2017 us=605333 85.192.132.111 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1581. Tue Jan 31 20:28:12 2017 us=605333 85.192.132.111 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1582. Tue Jan 31 20:28:12 2017 us=605333 85.192.132.111 TLS: Initial packet from [AF_INET6]::ffff:85.192.132.111:61452, sid=df444765 39d4b764
  1583. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_VER=2.4.0
  1584. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_PLAT=win
  1585. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_PROTO=2
  1586. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_NCP=2
  1587. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_LZ4=1
  1588. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_LZ4v2=1
  1589. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_LZO=1
  1590. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_COMP_STUB=1
  1591. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_COMP_STUBv2=1
  1592. Tue Jan 31 20:28:12 2017 us=620961 85.192.131.237 peer info: IV_TCPNL=1
  1593. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_VER=2.4.0
  1594. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_PLAT=win
  1595. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_PROTO=2
  1596. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_NCP=2
  1597. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_LZ4=1
  1598. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_LZ4v2=1
  1599. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_LZO=1
  1600. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_COMP_STUB=1
  1601. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_COMP_STUBv2=1
  1602. Tue Jan 31 20:28:12 2017 us=636588 83.174.224.221 peer info: IV_TCPNL=1
  1603. Tue Jan 31 20:28:12 2017 us=636588 MULTI: multi_create_instance called
  1604. Tue Jan 31 20:28:12 2017 us=636588 79.140.20.2 Re-using SSL/TLS context
  1605. Tue Jan 31 20:28:12 2017 us=636588 79.140.20.2 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1606. Tue Jan 31 20:28:12 2017 us=636588 79.140.20.2 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1607. Tue Jan 31 20:28:12 2017 us=636588 79.140.20.2 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1608. Tue Jan 31 20:28:12 2017 us=636588 79.140.20.2 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1609. Tue Jan 31 20:28:12 2017 us=636588 79.140.20.2 TLS: Initial packet from [AF_INET6]::ffff:79.140.20.2:51906, sid=2ea0fa92 5d20a6d9
  1610. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1611. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=JuzniiMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1612. Tue Jan 31 20:28:12 2017 us=652211 MULTI: multi_create_instance called
  1613. Tue Jan 31 20:28:12 2017 us=652211 85.192.129.248 Re-using SSL/TLS context
  1614. Tue Jan 31 20:28:12 2017 us=652211 85.192.129.248 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1615. Tue Jan 31 20:28:12 2017 us=652211 85.192.129.248 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1616. Tue Jan 31 20:28:12 2017 us=652211 85.192.129.248 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1617. Tue Jan 31 20:28:12 2017 us=652211 85.192.129.248 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1618. Tue Jan 31 20:28:12 2017 us=652211 85.192.129.248 TLS: Initial packet from [AF_INET6]::ffff:85.192.129.248:51251, sid=cbf1ced7 886f3149
  1619. Tue Jan 31 20:28:12 2017 us=652211 85.192.131.237 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1620. Tue Jan 31 20:28:12 2017 us=652211 85.192.131.237 [AlexandrovkaFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.237:58899
  1621. Tue Jan 31 20:28:12 2017 us=652211 AlexandrovkaFS2/85.192.131.237 MULTI_sva: pool returned IPv4=10.5.0.126, IPv6=(Not enabled)
  1622. Tue Jan 31 20:28:12 2017 us=652211 AlexandrovkaFS2/85.192.131.237 MULTI: Learn: 10.5.0.126 -> AlexandrovkaFS2/85.192.131.237
  1623. Tue Jan 31 20:28:12 2017 us=652211 AlexandrovkaFS2/85.192.131.237 MULTI: primary virtual IP for AlexandrovkaFS2/85.192.131.237: 10.5.0.126
  1624. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_VER=2.4.0
  1625. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_PLAT=win
  1626. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_PROTO=2
  1627. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_NCP=2
  1628. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_LZ4=1
  1629. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_LZ4v2=1
  1630. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_LZO=1
  1631. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_COMP_STUB=1
  1632. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_COMP_STUBv2=1
  1633. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 peer info: IV_TCPNL=1
  1634. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1635. Tue Jan 31 20:28:12 2017 us=652211 79.140.20.2 [JuzniiMTS] Peer Connection Initiated with [AF_INET6]::ffff:79.140.20.2:51906
  1636. Tue Jan 31 20:28:12 2017 us=652211 JuzniiMTS/79.140.20.2 MULTI_sva: pool returned IPv4=10.5.0.106, IPv6=(Not enabled)
  1637. Tue Jan 31 20:28:12 2017 us=652211 JuzniiMTS/79.140.20.2 MULTI: Learn: 10.5.0.106 -> JuzniiMTS/79.140.20.2
  1638. Tue Jan 31 20:28:12 2017 us=652211 JuzniiMTS/79.140.20.2 MULTI: primary virtual IP for JuzniiMTS/79.140.20.2: 10.5.0.106
  1639. Tue Jan 31 20:28:12 2017 us=652211 MULTI: multi_create_instance called
  1640. Tue Jan 31 20:28:12 2017 us=652211 85.192.179.42 Re-using SSL/TLS context
  1641. Tue Jan 31 20:28:12 2017 us=652211 85.192.179.42 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1642. Tue Jan 31 20:28:12 2017 us=652211 85.192.179.42 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1643. Tue Jan 31 20:28:12 2017 us=652211 85.192.179.42 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1644. Tue Jan 31 20:28:12 2017 us=652211 85.192.179.42 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1645. Tue Jan 31 20:28:12 2017 us=652211 85.192.179.42 TLS: Initial packet from [AF_INET6]::ffff:85.192.179.42:60331, sid=a08fe2d8 1c324ab3
  1646. Tue Jan 31 20:28:12 2017 us=652211 85.192.130.212 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1647. Tue Jan 31 20:28:12 2017 us=667831 85.192.130.212 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KuvandikMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1648. Tue Jan 31 20:28:12 2017 us=667831 83.174.224.221 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1649. Tue Jan 31 20:28:12 2017 us=667831 83.174.224.221 [BelebeiFS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.224.221:65497
  1650. Tue Jan 31 20:28:12 2017 us=667831 BelebeiFS/83.174.224.221 MULTI_sva: pool returned IPv4=10.5.0.2, IPv6=(Not enabled)
  1651. Tue Jan 31 20:28:12 2017 us=667831 BelebeiFS/83.174.224.221 MULTI: Learn: 10.5.0.2 -> BelebeiFS/83.174.224.221
  1652. Tue Jan 31 20:28:12 2017 us=667831 BelebeiFS/83.174.224.221 MULTI: primary virtual IP for BelebeiFS/83.174.224.221: 10.5.0.2
  1653. Tue Jan 31 20:28:12 2017 us=683457 85.192.130.75 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1654. Tue Jan 31 20:28:12 2017 us=683457 85.192.130.75 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=OrskEkspressES2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1655. Tue Jan 31 20:28:12 2017 us=699103 MULTI: multi_create_instance called
  1656. Tue Jan 31 20:28:12 2017 us=699103 85.192.128.34 Re-using SSL/TLS context
  1657. Tue Jan 31 20:28:12 2017 us=699103 85.192.128.34 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1658. Tue Jan 31 20:28:12 2017 us=699103 85.192.128.34 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1659. Tue Jan 31 20:28:12 2017 us=699103 85.192.128.34 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1660. Tue Jan 31 20:28:12 2017 us=699103 85.192.128.34 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1661. Tue Jan 31 20:28:12 2017 us=699103 85.192.128.34 TLS: Initial packet from [AF_INET6]::ffff:85.192.128.34:16740, sid=20d61d7e 2c718323
  1662. Tue Jan 31 20:28:12 2017 us=699103 MULTI: multi_create_instance called
  1663. Tue Jan 31 20:28:12 2017 us=699103 85.192.132.220 Re-using SSL/TLS context
  1664. Tue Jan 31 20:28:12 2017 us=699103 85.192.132.220 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1665. Tue Jan 31 20:28:12 2017 us=699103 85.192.132.220 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1666. Tue Jan 31 20:28:12 2017 us=699103 85.192.132.220 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1667. Tue Jan 31 20:28:12 2017 us=699103 85.192.132.220 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1668. Tue Jan 31 20:28:12 2017 us=699103 85.192.132.220 TLS: Initial packet from [AF_INET6]::ffff:85.192.132.220:51436, sid=69a274a8 c2501ff6
  1669. Tue Jan 31 20:28:12 2017 us=699103 MULTI: multi_create_instance called
  1670. Tue Jan 31 20:28:12 2017 us=699103 85.192.130.217 Re-using SSL/TLS context
  1671. Tue Jan 31 20:28:12 2017 us=699103 85.192.130.217 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1672. Tue Jan 31 20:28:12 2017 us=699103 85.192.130.217 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1673. Tue Jan 31 20:28:12 2017 us=699103 85.192.130.217 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1674. Tue Jan 31 20:28:12 2017 us=699103 85.192.130.217 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1675. Tue Jan 31 20:28:12 2017 us=699103 85.192.130.217 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.217:21941, sid=8a62bbc2 32b55cfa
  1676. Tue Jan 31 20:28:12 2017 us=714735 KvarkenoFS/85.192.131.101 PUSH: Received control message: 'PUSH_REQUEST'
  1677. Tue Jan 31 20:28:12 2017 us=714735 KvarkenoFS/85.192.131.101 SENT CONTROL [KvarkenoFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.55 255.255.255.0,peer-id 13' (status=1)
  1678. Tue Jan 31 20:28:12 2017 us=714735 OktyabrskoeMTS/85.192.149.140 PUSH: Received control message: 'PUSH_REQUEST'
  1679. Tue Jan 31 20:28:12 2017 us=714735 OktyabrskoeMTS/85.192.149.140 SENT CONTROL [OktyabrskoeMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.134 255.255.255.0,peer-id 21' (status=1)
  1680. Tue Jan 31 20:28:12 2017 us=714735 85.192.129.248 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1681. Tue Jan 31 20:28:12 2017 us=714735 85.192.129.248 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AkbulakFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1682. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_VER=2.4.0
  1683. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_PLAT=win
  1684. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_PROTO=2
  1685. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_NCP=2
  1686. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_LZ4=1
  1687. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_LZ4v2=1
  1688. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_LZO=1
  1689. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_COMP_STUB=1
  1690. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_COMP_STUBv2=1
  1691. Tue Jan 31 20:28:12 2017 us=714735 85.192.130.212 peer info: IV_TCPNL=1
  1692. Tue Jan 31 20:28:12 2017 us=730348 85.192.131.86 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1693. Tue Jan 31 20:28:12 2017 us=730348 85.192.131.86 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KrasnoholmFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1694. Tue Jan 31 20:28:12 2017 us=730348 85.192.179.42 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1695. Tue Jan 31 20:28:12 2017 us=730348 85.192.179.42 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=OrskEkspressFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1696. Tue Jan 31 20:28:12 2017 us=730348 MeleuzES/83.174.219.156 PUSH: Received control message: 'PUSH_REQUEST'
  1697. Tue Jan 31 20:28:12 2017 us=730348 MeleuzES/83.174.219.156 SENT CONTROL [MeleuzES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.20 255.255.255.0,peer-id 19' (status=1)
  1698. Tue Jan 31 20:28:12 2017 us=730348 85.192.130.75 peer info: IV_VER=2.3.14
  1699. Tue Jan 31 20:28:12 2017 us=730348 85.192.130.75 peer info: IV_PLAT=win
  1700. Tue Jan 31 20:28:12 2017 us=730348 85.192.130.75 peer info: IV_PROTO=2
  1701. Tue Jan 31 20:28:12 2017 us=730348 85.192.130.75 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1702. Tue Jan 31 20:28:12 2017 us=730348 85.192.130.75 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1703. Tue Jan 31 20:28:12 2017 us=730348 85.192.130.75 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  1704. Tue Jan 31 20:28:12 2017 us=730348 85.192.130.75 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1705. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_VER=2.4.0
  1706. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_PLAT=win
  1707. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_PROTO=2
  1708. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_NCP=2
  1709. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_LZ4=1
  1710. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_LZ4v2=1
  1711. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_LZO=1
  1712. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_COMP_STUB=1
  1713. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_COMP_STUBv2=1
  1714. Tue Jan 31 20:28:12 2017 us=745972 85.192.129.248 peer info: IV_TCPNL=1
  1715. Tue Jan 31 20:28:12 2017 us=761600 85.192.130.251 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1716. Tue Jan 31 20:28:12 2017 us=761600 85.192.130.251 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=PleshanovoMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1717. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_VER=2.4.0
  1718. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_PLAT=win
  1719. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_PROTO=2
  1720. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_NCP=2
  1721. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_LZ4=1
  1722. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_LZ4v2=1
  1723. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_LZO=1
  1724. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_COMP_STUB=1
  1725. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_COMP_STUBv2=1
  1726. Tue Jan 31 20:28:12 2017 us=761600 85.192.179.42 peer info: IV_TCPNL=1
  1727. Tue Jan 31 20:28:12 2017 us=761600 MULTI: multi_create_instance called
  1728. Tue Jan 31 20:28:12 2017 us=761600 85.192.133.99 Re-using SSL/TLS context
  1729. Tue Jan 31 20:28:12 2017 us=761600 85.192.133.99 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1730. Tue Jan 31 20:28:12 2017 us=761600 85.192.133.99 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1731. Tue Jan 31 20:28:12 2017 us=761600 85.192.133.99 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1732. Tue Jan 31 20:28:12 2017 us=761600 85.192.133.99 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1733. Tue Jan 31 20:28:12 2017 us=761600 85.192.133.99 TLS: Initial packet from [AF_INET6]::ffff:85.192.133.99:25728, sid=060a9844 da464055
  1734. Tue Jan 31 20:28:12 2017 us=761600 85.192.130.212 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1735. Tue Jan 31 20:28:12 2017 us=761600 85.192.130.212 [KuvandikMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.212:20568
  1736. Tue Jan 31 20:28:12 2017 us=761600 KuvandikMTS/85.192.130.212 MULTI_sva: pool returned IPv4=10.5.0.60, IPv6=(Not enabled)
  1737. Tue Jan 31 20:28:12 2017 us=761600 KuvandikMTS/85.192.130.212 MULTI: Learn: 10.5.0.60 -> KuvandikMTS/85.192.130.212
  1738. Tue Jan 31 20:28:12 2017 us=761600 KuvandikMTS/85.192.130.212 MULTI: primary virtual IP for KuvandikMTS/85.192.130.212: 10.5.0.60
  1739. Tue Jan 31 20:28:12 2017 us=761600 85.192.129.248 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1740. Tue Jan 31 20:28:12 2017 us=761600 85.192.129.248 [AkbulakFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.129.248:51251
  1741. Tue Jan 31 20:28:12 2017 us=761600 AkbulakFS/85.192.129.248 MULTI_sva: pool returned IPv4=10.5.0.99, IPv6=(Not enabled)
  1742. Tue Jan 31 20:28:12 2017 us=761600 AkbulakFS/85.192.129.248 MULTI: Learn: 10.5.0.99 -> AkbulakFS/85.192.129.248
  1743. Tue Jan 31 20:28:12 2017 us=761600 AkbulakFS/85.192.129.248 MULTI: primary virtual IP for AkbulakFS/85.192.129.248: 10.5.0.99
  1744. Tue Jan 31 20:28:12 2017 us=777238 85.192.132.220 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1745. Tue Jan 31 20:28:12 2017 us=777238 85.192.132.220 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AbdulinoMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1746. Tue Jan 31 20:28:12 2017 us=777238 MULTI: multi_create_instance called
  1747. Tue Jan 31 20:28:12 2017 us=777238 85.192.131.237 Re-using SSL/TLS context
  1748. Tue Jan 31 20:28:12 2017 us=777238 85.192.131.237 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1749. Tue Jan 31 20:28:12 2017 us=777238 85.192.131.237 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1750. Tue Jan 31 20:28:12 2017 us=777238 85.192.131.237 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1751. Tue Jan 31 20:28:12 2017 us=777238 85.192.131.237 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1752. Tue Jan 31 20:28:12 2017 us=777238 85.192.131.237 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.237:62516, sid=18a6a889 b2bf4c7a
  1753. Tue Jan 31 20:28:12 2017 us=792858 85.192.132.111 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1754. Tue Jan 31 20:28:12 2017 us=792858 85.192.132.111 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AdamovkaMTS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1755. Tue Jan 31 20:28:12 2017 us=792858 85.192.130.75 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1756. Tue Jan 31 20:28:12 2017 us=792858 85.192.130.75 [OrskEkspressES2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.75:19074
  1757. Tue Jan 31 20:28:12 2017 us=792858 OrskEkspressES2/85.192.130.75 MULTI_sva: pool returned IPv4=10.5.0.76, IPv6=(Not enabled)
  1758. Tue Jan 31 20:28:12 2017 us=792858 OrskEkspressES2/85.192.130.75 MULTI: Learn: 10.5.0.76 -> OrskEkspressES2/85.192.130.75
  1759. Tue Jan 31 20:28:12 2017 us=792858 OrskEkspressES2/85.192.130.75 MULTI: primary virtual IP for OrskEkspressES2/85.192.130.75: 10.5.0.76
  1760. Tue Jan 31 20:28:12 2017 us=792858 85.192.179.42 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1761. Tue Jan 31 20:28:12 2017 us=792858 85.192.179.42 [OrskEkspressFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.179.42:60331
  1762. Tue Jan 31 20:28:12 2017 us=792858 OrskEkspressFS/85.192.179.42 MULTI_sva: pool returned IPv4=10.5.0.74, IPv6=(Not enabled)
  1763. Tue Jan 31 20:28:12 2017 us=792858 OrskEkspressFS/85.192.179.42 MULTI: Learn: 10.5.0.74 -> OrskEkspressFS/85.192.179.42
  1764. Tue Jan 31 20:28:12 2017 us=792858 OrskEkspressFS/85.192.179.42 MULTI: primary virtual IP for OrskEkspressFS/85.192.179.42: 10.5.0.74
  1765. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_VER=2.4.0
  1766. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_PLAT=win
  1767. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_PROTO=2
  1768. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_NCP=2
  1769. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_LZ4=1
  1770. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_LZ4v2=1
  1771. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_LZO=1
  1772. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_COMP_STUB=1
  1773. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_COMP_STUBv2=1
  1774. Tue Jan 31 20:28:12 2017 us=792858 85.192.131.86 peer info: IV_TCPNL=1
  1775. Tue Jan 31 20:28:12 2017 us=792858 MULTI: multi_create_instance called
  1776. Tue Jan 31 20:28:12 2017 us=792858 85.192.182.110 Re-using SSL/TLS context
  1777. Tue Jan 31 20:28:12 2017 us=792858 85.192.182.110 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1778. Tue Jan 31 20:28:12 2017 us=792858 85.192.182.110 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1779. Tue Jan 31 20:28:12 2017 us=792858 85.192.182.110 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1780. Tue Jan 31 20:28:12 2017 us=792858 85.192.182.110 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1781. Tue Jan 31 20:28:12 2017 us=792858 85.192.182.110 TLS: Initial packet from [AF_INET6]::ffff:85.192.182.110:63050, sid=aa21fb5d e6f9d1bc
  1782. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_VER=2.4.0
  1783. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_PLAT=win
  1784. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_PROTO=2
  1785. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_NCP=2
  1786. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_LZ4=1
  1787. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_LZ4v2=1
  1788. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_LZO=1
  1789. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_COMP_STUB=1
  1790. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_COMP_STUBv2=1
  1791. Tue Jan 31 20:28:12 2017 us=808482 85.192.132.220 peer info: IV_TCPNL=1
  1792. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_VER=2.4.0
  1793. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_PLAT=win
  1794. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_PROTO=2
  1795. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_NCP=2
  1796. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_LZ4=1
  1797. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_LZ4v2=1
  1798. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_LZO=1
  1799. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_COMP_STUB=1
  1800. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_COMP_STUBv2=1
  1801. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.251 peer info: IV_TCPNL=1
  1802. Tue Jan 31 20:28:12 2017 us=824103 MULTI: multi_create_instance called
  1803. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.64 Re-using SSL/TLS context
  1804. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.64 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1805. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.64 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1806. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.64 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1807. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.64 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1808. Tue Jan 31 20:28:12 2017 us=824103 85.192.130.64 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.64:27822, sid=b63af11f e17fc0de
  1809. Tue Jan 31 20:28:12 2017 us=824103 MULTI: multi_create_instance called
  1810. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.248 Re-using SSL/TLS context
  1811. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.248 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1812. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.248 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1813. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.248 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1814. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.248 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1815. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.248 TLS: Initial packet from [AF_INET6]::ffff:85.192.129.248:61714, sid=d0e9c478 ea1da83c
  1816. Tue Jan 31 20:28:12 2017 us=824103 MULTI: multi_create_instance called
  1817. Tue Jan 31 20:28:12 2017 us=824103 85.192.150.87 Re-using SSL/TLS context
  1818. Tue Jan 31 20:28:12 2017 us=824103 85.192.150.87 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1819. Tue Jan 31 20:28:12 2017 us=824103 85.192.150.87 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1820. Tue Jan 31 20:28:12 2017 us=824103 85.192.150.87 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1821. Tue Jan 31 20:28:12 2017 us=824103 85.192.150.87 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1822. Tue Jan 31 20:28:12 2017 us=824103 85.192.150.87 TLS: Initial packet from [AF_INET6]::ffff:85.192.150.87:10660, sid=02113615 bc39f9d1
  1823. Tue Jan 31 20:28:12 2017 us=824103 85.192.132.111 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1824. Tue Jan 31 20:28:12 2017 us=824103 85.192.132.111 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AdamovkaFs, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1825. Tue Jan 31 20:28:12 2017 us=824103 KmiyakiES/83.174.228.78 PUSH: Received control message: 'PUSH_REQUEST'
  1826. Tue Jan 31 20:28:12 2017 us=824103 KmiyakiES/83.174.228.78 SENT CONTROL [KmiyakiES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.18 255.255.255.0,peer-id 22' (status=1)
  1827. Tue Jan 31 20:28:12 2017 us=824103 MULTI: multi_create_instance called
  1828. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.228 Re-using SSL/TLS context
  1829. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.228 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1830. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.228 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1831. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.228 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1832. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.228 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1833. Tue Jan 31 20:28:12 2017 us=824103 85.192.129.228 TLS: Initial packet from [AF_INET6]::ffff:85.192.129.228:57915, sid=0176ae2e 6dc12b51
  1834. Tue Jan 31 20:28:12 2017 us=839719 MULTI: multi_create_instance called
  1835. Tue Jan 31 20:28:12 2017 us=839719 83.174.218.234 Re-using SSL/TLS context
  1836. Tue Jan 31 20:28:12 2017 us=839719 83.174.218.234 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1837. Tue Jan 31 20:28:12 2017 us=839719 83.174.218.234 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1838. Tue Jan 31 20:28:12 2017 us=839719 83.174.218.234 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1839. Tue Jan 31 20:28:12 2017 us=839719 83.174.218.234 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1840. Tue Jan 31 20:28:12 2017 us=839719 83.174.218.234 TLS: Initial packet from [AF_INET6]::ffff:83.174.218.234:12956, sid=9a975ee9 cf0bee4b
  1841. Tue Jan 31 20:28:12 2017 us=839719 85.192.132.220 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1842. Tue Jan 31 20:28:12 2017 us=839719 85.192.132.220 [AbdulinoMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.132.220:51436
  1843. Tue Jan 31 20:28:12 2017 us=839719 AbdulinoMTS/85.192.132.220 MULTI_sva: pool returned IPv4=10.5.0.112, IPv6=(Not enabled)
  1844. Tue Jan 31 20:28:12 2017 us=839719 AbdulinoMTS/85.192.132.220 MULTI: Learn: 10.5.0.112 -> AbdulinoMTS/85.192.132.220
  1845. Tue Jan 31 20:28:12 2017 us=839719 AbdulinoMTS/85.192.132.220 MULTI: primary virtual IP for AbdulinoMTS/85.192.132.220: 10.5.0.112
  1846. Tue Jan 31 20:28:12 2017 us=855368 85.192.131.237 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1847. Tue Jan 31 20:28:12 2017 us=855368 85.192.131.237 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AlexandrovkaMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1848. Tue Jan 31 20:28:12 2017 us=855368 MULTI: multi_create_instance called
  1849. Tue Jan 31 20:28:12 2017 us=855368 85.192.128.115 Re-using SSL/TLS context
  1850. Tue Jan 31 20:28:12 2017 us=855368 85.192.128.115 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1851. Tue Jan 31 20:28:12 2017 us=855368 85.192.128.115 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1852. Tue Jan 31 20:28:12 2017 us=855368 85.192.128.115 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1853. Tue Jan 31 20:28:12 2017 us=855368 85.192.128.115 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1854. Tue Jan 31 20:28:12 2017 us=855368 85.192.128.115 TLS: Initial packet from [AF_INET6]::ffff:85.192.128.115:55335, sid=c09df1ec c2a2b577
  1855. Tue Jan 31 20:28:12 2017 us=855368 MULTI: multi_create_instance called
  1856. Tue Jan 31 20:28:12 2017 us=855368 85.192.167.58 Re-using SSL/TLS context
  1857. Tue Jan 31 20:28:12 2017 us=855368 85.192.167.58 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1858. Tue Jan 31 20:28:12 2017 us=855368 85.192.167.58 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1859. Tue Jan 31 20:28:12 2017 us=855368 85.192.167.58 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1860. Tue Jan 31 20:28:12 2017 us=855368 85.192.167.58 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1861. Tue Jan 31 20:28:12 2017 us=855368 85.192.167.58 TLS: Initial packet from [AF_INET6]::ffff:85.192.167.58:53249, sid=b2d77f57 aaf7b076
  1862. Tue Jan 31 20:28:12 2017 us=855368 85.192.131.86 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1863. Tue Jan 31 20:28:12 2017 us=855368 85.192.131.86 [KrasnoholmFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.86:26811
  1864. Tue Jan 31 20:28:12 2017 us=855368 KrasnoholmFS/85.192.131.86 MULTI_sva: pool returned IPv4=10.5.0.83, IPv6=(Not enabled)
  1865. Tue Jan 31 20:28:12 2017 us=855368 KrasnoholmFS/85.192.131.86 MULTI: Learn: 10.5.0.83 -> KrasnoholmFS/85.192.131.86
  1866. Tue Jan 31 20:28:12 2017 us=855368 KrasnoholmFS/85.192.131.86 MULTI: primary virtual IP for KrasnoholmFS/85.192.131.86: 10.5.0.83
  1867. Tue Jan 31 20:28:12 2017 us=855368 85.192.130.217 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1868. Tue Jan 31 20:28:12 2017 us=855368 85.192.130.217 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AsekeevoFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1869. Tue Jan 31 20:28:12 2017 us=870977 85.192.182.110 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1870. Tue Jan 31 20:28:12 2017 us=870977 85.192.182.110 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=TockoeMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1871. Tue Jan 31 20:28:12 2017 us=870977 85.192.130.251 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1872. Tue Jan 31 20:28:12 2017 us=870977 85.192.130.251 [PleshanovoMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.251:64587
  1873. Tue Jan 31 20:28:12 2017 us=870977 PleshanovoMTS/85.192.130.251 MULTI_sva: pool returned IPv4=10.5.0.88, IPv6=(Not enabled)
  1874. Tue Jan 31 20:28:12 2017 us=870977 PleshanovoMTS/85.192.130.251 MULTI: Learn: 10.5.0.88 -> PleshanovoMTS/85.192.130.251
  1875. Tue Jan 31 20:28:12 2017 us=870977 PleshanovoMTS/85.192.130.251 MULTI: primary virtual IP for PleshanovoMTS/85.192.130.251: 10.5.0.88
  1876. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_VER=2.4.0
  1877. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_PLAT=win
  1878. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_PROTO=2
  1879. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_NCP=2
  1880. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_LZ4=1
  1881. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_LZ4v2=1
  1882. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_LZO=1
  1883. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_COMP_STUB=1
  1884. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_COMP_STUBv2=1
  1885. Tue Jan 31 20:28:12 2017 us=870977 85.192.131.237 peer info: IV_TCPNL=1
  1886. Tue Jan 31 20:28:12 2017 us=870977 MULTI: multi_create_instance called
  1887. Tue Jan 31 20:28:12 2017 us=870977 62.133.169.132 Re-using SSL/TLS context
  1888. Tue Jan 31 20:28:12 2017 us=870977 62.133.169.132 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1889. Tue Jan 31 20:28:12 2017 us=870977 62.133.169.132 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1890. Tue Jan 31 20:28:12 2017 us=870977 62.133.169.132 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1891. Tue Jan 31 20:28:12 2017 us=870977 62.133.169.132 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1892. Tue Jan 31 20:28:12 2017 us=870977 62.133.169.132 TLS: Initial packet from [AF_INET6]::ffff:62.133.169.132:16394, sid=e963ed71 181135ab
  1893. Tue Jan 31 20:28:12 2017 us=886609 DavlekanovoES/83.174.214.60 PUSH: Received control message: 'PUSH_REQUEST'
  1894. Tue Jan 31 20:28:12 2017 us=886609 DavlekanovoES/83.174.214.60 SENT CONTROL [DavlekanovoES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.9 255.255.255.0,peer-id 11' (status=1)
  1895. Tue Jan 31 20:28:12 2017 us=886609 MULTI: multi_create_instance called
  1896. Tue Jan 31 20:28:12 2017 us=886609 85.192.130.212 Re-using SSL/TLS context
  1897. Tue Jan 31 20:28:12 2017 us=886609 85.192.130.212 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1898. Tue Jan 31 20:28:12 2017 us=886609 85.192.130.212 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1899. Tue Jan 31 20:28:12 2017 us=886609 85.192.130.212 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1900. Tue Jan 31 20:28:12 2017 us=886609 85.192.130.212 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1901. Tue Jan 31 20:28:12 2017 us=886609 85.192.130.212 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.212:20569, sid=88dc6cda 53b12ee7
  1902. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_VER=2.4.0
  1903. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_PLAT=win
  1904. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_PROTO=2
  1905. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_NCP=2
  1906. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_LZ4=1
  1907. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_LZ4v2=1
  1908. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_LZO=1
  1909. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_COMP_STUB=1
  1910. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_COMP_STUBv2=1
  1911. Tue Jan 31 20:28:12 2017 us=886609 85.192.132.111 peer info: IV_TCPNL=1
  1912. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_VER=2.4.0
  1913. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_PLAT=win
  1914. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_PROTO=2
  1915. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_NCP=2
  1916. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_LZ4=1
  1917. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_LZ4v2=1
  1918. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_LZO=1
  1919. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_COMP_STUB=1
  1920. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_COMP_STUBv2=1
  1921. Tue Jan 31 20:28:12 2017 us=902234 85.192.132.111 peer info: IV_TCPNL=1
  1922. Tue Jan 31 20:28:12 2017 us=902234 MULTI: multi_create_instance called
  1923. Tue Jan 31 20:28:12 2017 us=902234 85.192.156.156 Re-using SSL/TLS context
  1924. Tue Jan 31 20:28:12 2017 us=902234 85.192.156.156 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1925. Tue Jan 31 20:28:12 2017 us=902234 85.192.156.156 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1926. Tue Jan 31 20:28:12 2017 us=902234 85.192.156.156 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1927. Tue Jan 31 20:28:12 2017 us=902234 85.192.156.156 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1928. Tue Jan 31 20:28:12 2017 us=902234 85.192.156.156 TLS: Initial packet from [AF_INET6]::ffff:85.192.156.156:11828, sid=5878827a ffb998e8
  1929. Tue Jan 31 20:28:12 2017 us=902234 85.192.129.248 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1930. Tue Jan 31 20:28:12 2017 us=902234 85.192.129.248 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AkbulakES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1931. Tue Jan 31 20:28:12 2017 us=902234 85.192.129.228 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1932. Tue Jan 31 20:28:12 2017 us=902234 85.192.129.228 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=NovoorskT2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1933. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_VER=2.4.0
  1934. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_PLAT=win
  1935. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_PROTO=2
  1936. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_NCP=2
  1937. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_LZ4=1
  1938. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_LZ4v2=1
  1939. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_LZO=1
  1940. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_COMP_STUB=1
  1941. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_COMP_STUBv2=1
  1942. Tue Jan 31 20:28:12 2017 us=902234 85.192.182.110 peer info: IV_TCPNL=1
  1943. Tue Jan 31 20:28:12 2017 us=902234 85.192.131.237 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1944. Tue Jan 31 20:28:12 2017 us=902234 85.192.131.237 [AlexandrovkaMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.237:62516
  1945. Tue Jan 31 20:28:12 2017 us=902234 AlexandrovkaMTS/85.192.131.237 MULTI_sva: pool returned IPv4=10.5.0.111, IPv6=(Not enabled)
  1946. Tue Jan 31 20:28:12 2017 us=902234 AlexandrovkaMTS/85.192.131.237 MULTI: Learn: 10.5.0.111 -> AlexandrovkaMTS/85.192.131.237
  1947. Tue Jan 31 20:28:12 2017 us=902234 AlexandrovkaMTS/85.192.131.237 MULTI: primary virtual IP for AlexandrovkaMTS/85.192.131.237: 10.5.0.111
  1948. Tue Jan 31 20:28:12 2017 us=902234 85.192.133.99 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1949. Tue Jan 31 20:28:12 2017 us=902234 85.192.133.99 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=TashlaES2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1950. Tue Jan 31 20:28:12 2017 us=902234 85.192.128.115 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1951. Tue Jan 31 20:28:12 2017 us=902234 85.192.128.115 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SakmaraFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1952. Tue Jan 31 20:28:12 2017 us=902234 MULTI: multi_create_instance called
  1953. Tue Jan 31 20:28:12 2017 us=902234 85.192.141.180 Re-using SSL/TLS context
  1954. Tue Jan 31 20:28:12 2017 us=902234 85.192.141.180 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1955. Tue Jan 31 20:28:12 2017 us=902234 85.192.141.180 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1956. Tue Jan 31 20:28:12 2017 us=902234 85.192.141.180 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1957. Tue Jan 31 20:28:12 2017 us=902234 85.192.141.180 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1958. Tue Jan 31 20:28:12 2017 us=902234 85.192.141.180 TLS: Initial packet from [AF_INET6]::ffff:85.192.141.180:60709, sid=29e5b78b 19a47665
  1959. Tue Jan 31 20:28:12 2017 us=917857 MULTI: multi_create_instance called
  1960. Tue Jan 31 20:28:12 2017 us=917857 85.192.132.220 Re-using SSL/TLS context
  1961. Tue Jan 31 20:28:12 2017 us=917857 85.192.132.220 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  1962. Tue Jan 31 20:28:12 2017 us=917857 85.192.132.220 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  1963. Tue Jan 31 20:28:12 2017 us=917857 85.192.132.220 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  1964. Tue Jan 31 20:28:12 2017 us=917857 85.192.132.220 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  1965. Tue Jan 31 20:28:12 2017 us=917857 85.192.132.220 TLS: Initial packet from [AF_INET6]::ffff:85.192.132.220:58369, sid=aa9a388c c82007db
  1966. Tue Jan 31 20:28:12 2017 us=917857 85.192.167.58 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1967. Tue Jan 31 20:28:12 2017 us=917857 85.192.167.58 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KurmanaevkaFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  1968. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_VER=2.4.0
  1969. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_PLAT=win
  1970. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_PROTO=2
  1971. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_NCP=2
  1972. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_LZ4=1
  1973. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_LZ4v2=1
  1974. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_LZO=1
  1975. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_COMP_STUB=1
  1976. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_COMP_STUBv2=1
  1977. Tue Jan 31 20:28:12 2017 us=917857 85.192.130.217 peer info: IV_TCPNL=1
  1978. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_VER=2.4.0
  1979. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_PLAT=win
  1980. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_PROTO=2
  1981. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_NCP=2
  1982. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_LZ4=1
  1983. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_LZ4v2=1
  1984. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_LZO=1
  1985. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_COMP_STUB=1
  1986. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_COMP_STUBv2=1
  1987. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.228 peer info: IV_TCPNL=1
  1988. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_VER=2.4.0
  1989. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_PLAT=win
  1990. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_PROTO=2
  1991. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_NCP=2
  1992. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_LZ4=1
  1993. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_LZ4v2=1
  1994. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_LZO=1
  1995. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_COMP_STUB=1
  1996. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_COMP_STUBv2=1
  1997. Tue Jan 31 20:28:12 2017 us=933489 85.192.129.248 peer info: IV_TCPNL=1
  1998. Tue Jan 31 20:28:12 2017 us=933489 85.192.182.110 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  1999. Tue Jan 31 20:28:12 2017 us=933489 85.192.182.110 [TockoeMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.182.110:63050
  2000. Tue Jan 31 20:28:12 2017 us=933489 TockoeMTS/85.192.182.110 MULTI_sva: pool returned IPv4=10.5.0.93, IPv6=(Not enabled)
  2001. Tue Jan 31 20:28:12 2017 us=933489 TockoeMTS/85.192.182.110 MULTI: Learn: 10.5.0.93 -> TockoeMTS/85.192.182.110
  2002. Tue Jan 31 20:28:12 2017 us=933489 TockoeMTS/85.192.182.110 MULTI: primary virtual IP for TockoeMTS/85.192.182.110: 10.5.0.93
  2003. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_VER=2.4.0
  2004. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_PLAT=win
  2005. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_PROTO=2
  2006. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_NCP=2
  2007. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_LZ4=1
  2008. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_LZ4v2=1
  2009. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_LZO=1
  2010. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_COMP_STUB=1
  2011. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_COMP_STUBv2=1
  2012. Tue Jan 31 20:28:12 2017 us=933489 85.192.128.115 peer info: IV_TCPNL=1
  2013. Tue Jan 31 20:28:12 2017 us=933489 MULTI: multi_create_instance called
  2014. Tue Jan 31 20:28:12 2017 us=933489 77.94.104.123 Re-using SSL/TLS context
  2015. Tue Jan 31 20:28:12 2017 us=933489 77.94.104.123 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2016. Tue Jan 31 20:28:12 2017 us=933489 77.94.104.123 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2017. Tue Jan 31 20:28:12 2017 us=933489 77.94.104.123 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2018. Tue Jan 31 20:28:12 2017 us=933489 77.94.104.123 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2019. Tue Jan 31 20:28:12 2017 us=933489 77.94.104.123 TLS: Initial packet from [AF_INET6]::ffff:77.94.104.123:25260, sid=b70baeee fdeaae16
  2020. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_VER=2.4.0
  2021. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_PLAT=win
  2022. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_PROTO=2
  2023. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_NCP=2
  2024. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_LZ4=1
  2025. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_LZ4v2=1
  2026. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_LZO=1
  2027. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_COMP_STUB=1
  2028. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_COMP_STUBv2=1
  2029. Tue Jan 31 20:28:12 2017 us=949099 85.192.167.58 peer info: IV_TCPNL=1
  2030. Tue Jan 31 20:28:12 2017 us=949099 85.192.132.111 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2031. Tue Jan 31 20:28:12 2017 us=949099 85.192.132.111 [AdamovkaMTS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.132.111:61452
  2032. Tue Jan 31 20:28:12 2017 us=949099 AdamovkaMTS2/85.192.132.111 MULTI_sva: pool returned IPv4=10.5.0.46, IPv6=(Not enabled)
  2033. Tue Jan 31 20:28:12 2017 us=949099 AdamovkaMTS2/85.192.132.111 MULTI: Learn: 10.5.0.46 -> AdamovkaMTS2/85.192.132.111
  2034. Tue Jan 31 20:28:12 2017 us=949099 AdamovkaMTS2/85.192.132.111 MULTI: primary virtual IP for AdamovkaMTS2/85.192.132.111: 10.5.0.46
  2035. Tue Jan 31 20:28:12 2017 us=949099 85.192.132.111 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2036. Tue Jan 31 20:28:12 2017 us=949099 85.192.132.111 [AdamovkaFs] Peer Connection Initiated with [AF_INET6]::ffff:85.192.132.111:64891
  2037. Tue Jan 31 20:28:12 2017 us=949099 AdamovkaFs/85.192.132.111 MULTI_sva: pool returned IPv4=10.5.0.48, IPv6=(Not enabled)
  2038. Tue Jan 31 20:28:12 2017 us=949099 AdamovkaFs/85.192.132.111 MULTI: Learn: 10.5.0.48 -> AdamovkaFs/85.192.132.111
  2039. Tue Jan 31 20:28:12 2017 us=949099 AdamovkaFs/85.192.132.111 MULTI: primary virtual IP for AdamovkaFs/85.192.132.111: 10.5.0.48
  2040. Tue Jan 31 20:28:12 2017 us=949099 85.192.129.228 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2041. Tue Jan 31 20:28:12 2017 us=949099 85.192.129.228 [NovoorskT2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.129.228:57915
  2042. Tue Jan 31 20:28:12 2017 us=949099 NovoorskT2/85.192.129.228 MULTI_sva: pool returned IPv4=10.5.0.64, IPv6=(Not enabled)
  2043. Tue Jan 31 20:28:12 2017 us=949099 NovoorskT2/85.192.129.228 MULTI: Learn: 10.5.0.64 -> NovoorskT2/85.192.129.228
  2044. Tue Jan 31 20:28:12 2017 us=949099 NovoorskT2/85.192.129.228 MULTI: primary virtual IP for NovoorskT2/85.192.129.228: 10.5.0.64
  2045. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_VER=2.4.0
  2046. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_PLAT=win
  2047. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_PROTO=2
  2048. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_NCP=2
  2049. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_LZ4=1
  2050. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_LZ4v2=1
  2051. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_LZO=1
  2052. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_COMP_STUB=1
  2053. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_COMP_STUBv2=1
  2054. Tue Jan 31 20:28:12 2017 us=949099 85.192.133.99 peer info: IV_TCPNL=1
  2055. Tue Jan 31 20:28:12 2017 us=949099 85.192.128.34 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2056. Tue Jan 31 20:28:12 2017 us=964727 85.192.128.34 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SaraktashT2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2057. Tue Jan 31 20:28:12 2017 us=964727 85.192.128.115 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2058. Tue Jan 31 20:28:12 2017 us=964727 85.192.128.115 [SakmaraFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.128.115:55335
  2059. Tue Jan 31 20:28:12 2017 us=964727 SakmaraFS/85.192.128.115 MULTI_sva: pool returned IPv4=10.5.0.108, IPv6=(Not enabled)
  2060. Tue Jan 31 20:28:12 2017 us=964727 SakmaraFS/85.192.128.115 MULTI: Learn: 10.5.0.108 -> SakmaraFS/85.192.128.115
  2061. Tue Jan 31 20:28:12 2017 us=964727 SakmaraFS/85.192.128.115 MULTI: primary virtual IP for SakmaraFS/85.192.128.115: 10.5.0.108
  2062. Tue Jan 31 20:28:12 2017 us=964727 85.192.129.248 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2063. Tue Jan 31 20:28:12 2017 us=964727 85.192.129.248 [AkbulakES] Peer Connection Initiated with [AF_INET6]::ffff:85.192.129.248:61714
  2064. Tue Jan 31 20:28:12 2017 us=964727 AkbulakES/85.192.129.248 MULTI_sva: pool returned IPv4=10.5.0.101, IPv6=(Not enabled)
  2065. Tue Jan 31 20:28:12 2017 us=964727 AkbulakES/85.192.129.248 MULTI: Learn: 10.5.0.101 -> AkbulakES/85.192.129.248
  2066. Tue Jan 31 20:28:12 2017 us=964727 AkbulakES/85.192.129.248 MULTI: primary virtual IP for AkbulakES/85.192.129.248: 10.5.0.101
  2067. Tue Jan 31 20:28:12 2017 us=964727 MULTI: multi_create_instance called
  2068. Tue Jan 31 20:28:12 2017 us=964727 85.192.130.75 Re-using SSL/TLS context
  2069. Tue Jan 31 20:28:12 2017 us=964727 85.192.130.75 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2070. Tue Jan 31 20:28:12 2017 us=964727 85.192.130.75 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2071. Tue Jan 31 20:28:12 2017 us=964727 85.192.130.75 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2072. Tue Jan 31 20:28:12 2017 us=964727 85.192.130.75 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2073. Tue Jan 31 20:28:12 2017 us=964727 85.192.130.75 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.75:19075, sid=348cd1b7 2c259902
  2074. Tue Jan 31 20:28:12 2017 us=964727 85.192.130.217 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2075. Tue Jan 31 20:28:12 2017 us=964727 85.192.130.217 [AsekeevoFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.217:21941
  2076. Tue Jan 31 20:28:12 2017 us=964727 AsekeevoFS/85.192.130.217 MULTI_sva: pool returned IPv4=10.5.0.137, IPv6=(Not enabled)
  2077. Tue Jan 31 20:28:12 2017 us=964727 AsekeevoFS/85.192.130.217 MULTI: Learn: 10.5.0.137 -> AsekeevoFS/85.192.130.217
  2078. Tue Jan 31 20:28:12 2017 us=964727 AsekeevoFS/85.192.130.217 MULTI: primary virtual IP for AsekeevoFS/85.192.130.217: 10.5.0.137
  2079. Tue Jan 31 20:28:12 2017 us=964727 85.192.141.180 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2080. Tue Jan 31 20:28:12 2017 us=980331 85.192.141.180 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=OktyabrskoeFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2081. Tue Jan 31 20:28:12 2017 us=980331 85.192.167.58 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2082. Tue Jan 31 20:28:12 2017 us=980331 85.192.167.58 [KurmanaevkaFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.167.58:53249
  2083. Tue Jan 31 20:28:12 2017 us=980331 KurmanaevkaFS/85.192.167.58 MULTI_sva: pool returned IPv4=10.5.0.121, IPv6=(Not enabled)
  2084. Tue Jan 31 20:28:12 2017 us=980331 KurmanaevkaFS/85.192.167.58 MULTI: Learn: 10.5.0.121 -> KurmanaevkaFS/85.192.167.58
  2085. Tue Jan 31 20:28:12 2017 us=980331 KurmanaevkaFS/85.192.167.58 MULTI: primary virtual IP for KurmanaevkaFS/85.192.167.58: 10.5.0.121
  2086. Tue Jan 31 20:28:12 2017 us=980331 85.192.132.220 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2087. Tue Jan 31 20:28:12 2017 us=980331 85.192.132.220 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AbdulinoFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2088. Tue Jan 31 20:28:12 2017 us=995980 85.192.130.64 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2089. Tue Jan 31 20:28:12 2017 us=995980 85.192.130.64 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=PleshanovoFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2090. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_VER=2.4.0
  2091. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_PLAT=win
  2092. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_PROTO=2
  2093. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_NCP=2
  2094. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_LZ4=1
  2095. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_LZ4v2=1
  2096. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_LZO=1
  2097. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_COMP_STUB=1
  2098. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_COMP_STUBv2=1
  2099. Tue Jan 31 20:28:12 2017 us=995980 85.192.141.180 peer info: IV_TCPNL=1
  2100. Tue Jan 31 20:28:12 2017 us=995980 85.192.133.99 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2101. Tue Jan 31 20:28:12 2017 us=995980 85.192.133.99 [TashlaES2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.133.99:25728
  2102. Tue Jan 31 20:28:12 2017 us=995980 TashlaES2/85.192.133.99 MULTI_sva: pool returned IPv4=10.5.0.92, IPv6=(Not enabled)
  2103. Tue Jan 31 20:28:12 2017 us=995980 TashlaES2/85.192.133.99 MULTI: Learn: 10.5.0.92 -> TashlaES2/85.192.133.99
  2104. Tue Jan 31 20:28:12 2017 us=995980 TashlaES2/85.192.133.99 MULTI: primary virtual IP for TashlaES2/85.192.133.99: 10.5.0.92
  2105. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_VER=2.4.0
  2106. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_PLAT=win
  2107. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_PROTO=2
  2108. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_NCP=2
  2109. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_LZ4=1
  2110. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_LZ4v2=1
  2111. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_LZO=1
  2112. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_COMP_STUB=1
  2113. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_COMP_STUBv2=1
  2114. Tue Jan 31 20:28:13 2017 us=11602 85.192.132.220 peer info: IV_TCPNL=1
  2115. Tue Jan 31 20:28:13 2017 us=11602 MULTI: multi_create_instance called
  2116. Tue Jan 31 20:28:13 2017 us=11602 85.192.131.123 Re-using SSL/TLS context
  2117. Tue Jan 31 20:28:13 2017 us=11602 85.192.131.123 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2118. Tue Jan 31 20:28:13 2017 us=11602 85.192.131.123 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2119. Tue Jan 31 20:28:13 2017 us=11602 85.192.131.123 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2120. Tue Jan 31 20:28:13 2017 us=11602 85.192.131.123 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2121. Tue Jan 31 20:28:13 2017 us=11602 85.192.131.123 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.123:10111, sid=457951c6 253a0e0d
  2122. Tue Jan 31 20:28:13 2017 us=27208 85.192.130.212 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2123. Tue Jan 31 20:28:13 2017 us=27208 85.192.130.212 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KuvandikMTS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2124. Tue Jan 31 20:28:13 2017 us=27208 85.192.150.87 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2125. Tue Jan 31 20:28:13 2017 us=27208 85.192.150.87 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SolIleckT2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2126. Tue Jan 31 20:28:13 2017 us=27208 85.192.141.180 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2127. Tue Jan 31 20:28:13 2017 us=27208 85.192.141.180 [OktyabrskoeFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.141.180:60709
  2128. Tue Jan 31 20:28:13 2017 us=27208 OktyabrskoeFS/85.192.141.180 MULTI_sva: pool returned IPv4=10.5.0.128, IPv6=(Not enabled)
  2129. Tue Jan 31 20:28:13 2017 us=27208 OktyabrskoeFS/85.192.141.180 MULTI: Learn: 10.5.0.128 -> OktyabrskoeFS/85.192.141.180
  2130. Tue Jan 31 20:28:13 2017 us=27208 OktyabrskoeFS/85.192.141.180 MULTI: primary virtual IP for OktyabrskoeFS/85.192.141.180: 10.5.0.128
  2131. Tue Jan 31 20:28:13 2017 us=42839 85.192.132.220 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2132. Tue Jan 31 20:28:13 2017 us=42839 85.192.132.220 [AbdulinoFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.132.220:58369
  2133. Tue Jan 31 20:28:13 2017 us=42839 AbdulinoFS/85.192.132.220 MULTI_sva: pool returned IPv4=10.5.0.113, IPv6=(Not enabled)
  2134. Tue Jan 31 20:28:13 2017 us=42839 AbdulinoFS/85.192.132.220 MULTI: Learn: 10.5.0.113 -> AbdulinoFS/85.192.132.220
  2135. Tue Jan 31 20:28:13 2017 us=42839 AbdulinoFS/85.192.132.220 MULTI: primary virtual IP for AbdulinoFS/85.192.132.220: 10.5.0.113
  2136. Tue Jan 31 20:28:13 2017 us=58463 MULTI: multi_create_instance called
  2137. Tue Jan 31 20:28:13 2017 us=58463 83.174.222.50 Re-using SSL/TLS context
  2138. Tue Jan 31 20:28:13 2017 us=58463 83.174.222.50 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2139. Tue Jan 31 20:28:13 2017 us=58463 83.174.222.50 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2140. Tue Jan 31 20:28:13 2017 us=58463 83.174.222.50 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2141. Tue Jan 31 20:28:13 2017 us=58463 83.174.222.50 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2142. Tue Jan 31 20:28:13 2017 us=58463 83.174.222.50 TLS: Initial packet from [AF_INET6]::ffff:83.174.222.50:17174, sid=9bede0d1 29196cd7
  2143. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_VER=2.4.0
  2144. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_PLAT=win
  2145. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_PROTO=2
  2146. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_NCP=2
  2147. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_LZ4=1
  2148. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_LZ4v2=1
  2149. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_LZO=1
  2150. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_COMP_STUB=1
  2151. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_COMP_STUBv2=1
  2152. Tue Jan 31 20:28:13 2017 us=58463 85.192.130.64 peer info: IV_TCPNL=1
  2153. Tue Jan 31 20:28:13 2017 us=58463 62.133.169.132 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2154. Tue Jan 31 20:28:13 2017 us=58463 62.133.169.132 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=ErmolaevoFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2155. Tue Jan 31 20:28:13 2017 us=58463 MULTI: multi_create_instance called
  2156. Tue Jan 31 20:28:13 2017 us=58463 85.192.131.137 Re-using SSL/TLS context
  2157. Tue Jan 31 20:28:13 2017 us=58463 85.192.131.137 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2158. Tue Jan 31 20:28:13 2017 us=58463 85.192.131.137 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2159. Tue Jan 31 20:28:13 2017 us=58463 85.192.131.137 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2160. Tue Jan 31 20:28:13 2017 us=58463 85.192.131.137 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2161. Tue Jan 31 20:28:13 2017 us=58463 85.192.131.137 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.137:59931, sid=d7ef6155 b59177e9
  2162. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_VER=2.4.0
  2163. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_PLAT=win
  2164. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_PROTO=2
  2165. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_NCP=2
  2166. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_LZ4=1
  2167. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_LZ4v2=1
  2168. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_LZO=1
  2169. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_COMP_STUB=1
  2170. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_COMP_STUBv2=1
  2171. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.212 peer info: IV_TCPNL=1
  2172. Tue Jan 31 20:28:13 2017 us=105344 MULTI: multi_create_instance called
  2173. Tue Jan 31 20:28:13 2017 us=105344 83.174.221.250 Re-using SSL/TLS context
  2174. Tue Jan 31 20:28:13 2017 us=105344 83.174.221.250 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2175. Tue Jan 31 20:28:13 2017 us=105344 83.174.221.250 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2176. Tue Jan 31 20:28:13 2017 us=105344 83.174.221.250 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2177. Tue Jan 31 20:28:13 2017 us=105344 83.174.221.250 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2178. Tue Jan 31 20:28:13 2017 us=105344 83.174.221.250 TLS: Initial packet from [AF_INET6]::ffff:83.174.221.250:13281, sid=3a385d92 fc25f75e
  2179. Tue Jan 31 20:28:13 2017 us=105344 ChekmagushES/62.133.169.225 PUSH: Received control message: 'PUSH_REQUEST'
  2180. Tue Jan 31 20:28:13 2017 us=105344 ChekmagushES/62.133.169.225 SENT CONTROL [ChekmagushES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.32 255.255.255.0,peer-id 15' (status=1)
  2181. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_VER=2.4.0
  2182. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_PLAT=win
  2183. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_PROTO=2
  2184. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_NCP=2
  2185. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_LZ4=1
  2186. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_LZ4v2=1
  2187. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_LZO=1
  2188. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_COMP_STUB=1
  2189. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_COMP_STUBv2=1
  2190. Tue Jan 31 20:28:13 2017 us=105344 85.192.128.34 peer info: IV_TCPNL=1
  2191. Tue Jan 31 20:28:13 2017 us=105344 MULTI: multi_create_instance called
  2192. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.220 Re-using SSL/TLS context
  2193. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.220 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2194. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.220 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2195. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.220 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2196. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.220 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2197. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.220 TLS: Initial packet from [AF_INET6]::ffff:85.192.132.220:56551, sid=0bd6f794 0e8190f6
  2198. Tue Jan 31 20:28:13 2017 us=105344 MULTI: multi_create_instance called
  2199. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.1 Re-using SSL/TLS context
  2200. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.1 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2201. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.1 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2202. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.1 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2203. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.1 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2204. Tue Jan 31 20:28:13 2017 us=105344 85.192.132.1 TLS: Initial packet from [AF_INET6]::ffff:85.192.132.1:16974, sid=4f648184 90a078a7
  2205. Tue Jan 31 20:28:13 2017 us=105344 77.94.104.123 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2206. Tue Jan 31 20:28:13 2017 us=105344 77.94.104.123 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=IsyangulovoEs, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2207. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.64 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2208. Tue Jan 31 20:28:13 2017 us=105344 85.192.130.64 [PleshanovoFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.64:27822
  2209. Tue Jan 31 20:28:13 2017 us=105344 PleshanovoFS/85.192.130.64 MULTI_sva: pool returned IPv4=10.5.0.84, IPv6=(Not enabled)
  2210. Tue Jan 31 20:28:13 2017 us=105344 PleshanovoFS/85.192.130.64 MULTI: Learn: 10.5.0.84 -> PleshanovoFS/85.192.130.64
  2211. Tue Jan 31 20:28:13 2017 us=105344 PleshanovoFS/85.192.130.64 MULTI: primary virtual IP for PleshanovoFS/85.192.130.64: 10.5.0.84
  2212. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_VER=2.4.0
  2213. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_PLAT=win
  2214. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_PROTO=2
  2215. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_NCP=2
  2216. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_LZ4=1
  2217. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_LZ4v2=1
  2218. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_LZO=1
  2219. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_COMP_STUB=1
  2220. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_COMP_STUBv2=1
  2221. Tue Jan 31 20:28:13 2017 us=120962 85.192.150.87 peer info: IV_TCPNL=1
  2222. Tue Jan 31 20:28:13 2017 us=120962 85.192.130.75 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2223. Tue Jan 31 20:28:13 2017 us=120962 85.192.130.75 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=OrskEkspressES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2224. Tue Jan 31 20:28:13 2017 us=136611 MULTI: multi_create_instance called
  2225. Tue Jan 31 20:28:13 2017 us=136611 85.192.154.178 Re-using SSL/TLS context
  2226. Tue Jan 31 20:28:13 2017 us=136611 85.192.154.178 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2227. Tue Jan 31 20:28:13 2017 us=136611 85.192.154.178 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2228. Tue Jan 31 20:28:13 2017 us=136611 85.192.154.178 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2229. Tue Jan 31 20:28:13 2017 us=136611 85.192.154.178 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2230. Tue Jan 31 20:28:13 2017 us=136611 85.192.154.178 TLS: Initial packet from [AF_INET6]::ffff:85.192.154.178:54280, sid=b6de302e 7bc8d0bd
  2231. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_VER=2.4.0
  2232. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_PLAT=win
  2233. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_PROTO=2
  2234. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_NCP=2
  2235. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_LZ4=1
  2236. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_LZ4v2=1
  2237. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_LZO=1
  2238. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_COMP_STUB=1
  2239. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_COMP_STUBv2=1
  2240. Tue Jan 31 20:28:13 2017 us=136611 62.133.169.132 peer info: IV_TCPNL=1
  2241. Tue Jan 31 20:28:13 2017 us=136611 MULTI: multi_create_instance called
  2242. Tue Jan 31 20:28:13 2017 us=136611 85.192.131.237 Re-using SSL/TLS context
  2243. Tue Jan 31 20:28:13 2017 us=136611 85.192.131.237 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2244. Tue Jan 31 20:28:13 2017 us=136611 85.192.131.237 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2245. Tue Jan 31 20:28:13 2017 us=136611 85.192.131.237 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2246. Tue Jan 31 20:28:13 2017 us=136611 85.192.131.237 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2247. Tue Jan 31 20:28:13 2017 us=136611 85.192.131.237 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.237:63353, sid=dd821f1c 50734313
  2248. Tue Jan 31 20:28:13 2017 us=152227 85.192.130.212 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2249. Tue Jan 31 20:28:13 2017 us=152227 85.192.130.212 [KuvandikMTS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.212:20569
  2250. Tue Jan 31 20:28:13 2017 us=152227 KuvandikMTS2/85.192.130.212 MULTI_sva: pool returned IPv4=10.5.0.59, IPv6=(Not enabled)
  2251. Tue Jan 31 20:28:13 2017 us=152227 KuvandikMTS2/85.192.130.212 MULTI: Learn: 10.5.0.59 -> KuvandikMTS2/85.192.130.212
  2252. Tue Jan 31 20:28:13 2017 us=152227 KuvandikMTS2/85.192.130.212 MULTI: primary virtual IP for KuvandikMTS2/85.192.130.212: 10.5.0.59
  2253. Tue Jan 31 20:28:13 2017 us=152227 MULTI: multi_create_instance called
  2254. Tue Jan 31 20:28:13 2017 us=152227 83.174.238.201 Re-using SSL/TLS context
  2255. Tue Jan 31 20:28:13 2017 us=152227 83.174.238.201 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2256. Tue Jan 31 20:28:13 2017 us=152227 83.174.238.201 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2257. Tue Jan 31 20:28:13 2017 us=152227 83.174.238.201 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2258. Tue Jan 31 20:28:13 2017 us=152227 83.174.238.201 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2259. Tue Jan 31 20:28:13 2017 us=152227 83.174.238.201 TLS: Initial packet from [AF_INET6]::ffff:83.174.238.201:14874, sid=431538a0 c2e677ce
  2260. Tue Jan 31 20:28:13 2017 us=152227 MatveevkaFS/85.192.131.125 PUSH: Received control message: 'PUSH_REQUEST'
  2261. Tue Jan 31 20:28:13 2017 us=152227 MatveevkaFS/85.192.131.125 SENT CONTROL [MatveevkaFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.136 255.255.255.0,peer-id 32,cipher AES-256-GCM' (status=1)
  2262. Tue Jan 31 20:28:13 2017 us=152227 MatveevkaFS/85.192.131.125 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  2263. Tue Jan 31 20:28:13 2017 us=152227 MatveevkaFS/85.192.131.125 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  2264. Tue Jan 31 20:28:13 2017 us=152227 MatveevkaFS/85.192.131.125 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  2265. Tue Jan 31 20:28:13 2017 us=152227 MULTI: multi_create_instance called
  2266. Tue Jan 31 20:28:13 2017 us=152227 83.174.223.253 Re-using SSL/TLS context
  2267. Tue Jan 31 20:28:13 2017 us=152227 83.174.223.253 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2268. Tue Jan 31 20:28:13 2017 us=152227 83.174.223.253 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2269. Tue Jan 31 20:28:13 2017 us=152227 83.174.223.253 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2270. Tue Jan 31 20:28:13 2017 us=152227 83.174.223.253 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2271. Tue Jan 31 20:28:13 2017 us=152227 83.174.223.253 TLS: Initial packet from [AF_INET6]::ffff:83.174.223.253:63553, sid=042e0696 ef326773
  2272. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_VER=2.4.0
  2273. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_PLAT=win
  2274. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_PROTO=2
  2275. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_NCP=2
  2276. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_LZ4=1
  2277. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_LZ4v2=1
  2278. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_LZO=1
  2279. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_COMP_STUB=1
  2280. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_COMP_STUBv2=1
  2281. Tue Jan 31 20:28:13 2017 us=167859 77.94.104.123 peer info: IV_TCPNL=1
  2282. Tue Jan 31 20:28:13 2017 us=167859 MULTI: multi_create_instance called
  2283. Tue Jan 31 20:28:13 2017 us=167859 85.192.141.228 Re-using SSL/TLS context
  2284. Tue Jan 31 20:28:13 2017 us=167859 85.192.141.228 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2285. Tue Jan 31 20:28:13 2017 us=167859 85.192.141.228 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2286. Tue Jan 31 20:28:13 2017 us=167859 85.192.141.228 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2287. Tue Jan 31 20:28:13 2017 us=167859 85.192.141.228 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2288. Tue Jan 31 20:28:13 2017 us=167859 85.192.141.228 TLS: Initial packet from [AF_INET6]::ffff:85.192.141.228:21064, sid=2c99c961 c3231fc7
  2289. Tue Jan 31 20:28:13 2017 us=183484 85.192.132.220 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2290. Tue Jan 31 20:28:13 2017 us=183484 85.192.132.220 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AbdulinoFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2291. Tue Jan 31 20:28:13 2017 us=183484 MULTI: multi_create_instance called
  2292. Tue Jan 31 20:28:13 2017 us=183484 85.192.131.140 Re-using SSL/TLS context
  2293. Tue Jan 31 20:28:13 2017 us=183484 85.192.131.140 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2294. Tue Jan 31 20:28:13 2017 us=183484 85.192.131.140 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2295. Tue Jan 31 20:28:13 2017 us=183484 85.192.131.140 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2296. Tue Jan 31 20:28:13 2017 us=183484 85.192.131.140 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2297. Tue Jan 31 20:28:13 2017 us=183484 85.192.131.140 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.140:61428, sid=e8a0a107 ca9ae882
  2298. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_VER=2.4.0
  2299. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_PLAT=win
  2300. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_PROTO=2
  2301. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_NCP=2
  2302. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_LZ4=1
  2303. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_LZ4v2=1
  2304. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_LZO=1
  2305. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_COMP_STUB=1
  2306. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_COMP_STUBv2=1
  2307. Tue Jan 31 20:28:13 2017 us=183484 85.192.130.75 peer info: IV_TCPNL=1
  2308. Tue Jan 31 20:28:13 2017 us=199101 85.192.150.87 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2309. Tue Jan 31 20:28:13 2017 us=199101 85.192.150.87 [SolIleckT2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.150.87:10660
  2310. Tue Jan 31 20:28:13 2017 us=199101 SolIleckT2/85.192.150.87 MULTI_sva: pool returned IPv4=10.5.0.103, IPv6=(Not enabled)
  2311. Tue Jan 31 20:28:13 2017 us=199101 SolIleckT2/85.192.150.87 MULTI: Learn: 10.5.0.103 -> SolIleckT2/85.192.150.87
  2312. Tue Jan 31 20:28:13 2017 us=199101 SolIleckT2/85.192.150.87 MULTI: primary virtual IP for SolIleckT2/85.192.150.87: 10.5.0.103
  2313. Tue Jan 31 20:28:13 2017 us=199101 85.192.131.123 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2314. Tue Jan 31 20:28:13 2017 us=199101 85.192.131.123 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=OrskHoz, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2315. Tue Jan 31 20:28:13 2017 us=199101 83.174.222.50 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2316. Tue Jan 31 20:28:13 2017 us=199101 83.174.222.50 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=RaevskiiMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2317. Tue Jan 31 20:28:13 2017 us=199101 85.192.131.237 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2318. Tue Jan 31 20:28:13 2017 us=199101 85.192.131.237 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AlexandrovkaFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2319. Tue Jan 31 20:28:13 2017 us=199101 AsekeevoMTS/85.192.130.22 PUSH: Received control message: 'PUSH_REQUEST'
  2320. Tue Jan 31 20:28:13 2017 us=199101 AsekeevoMTS/85.192.130.22 SENT CONTROL [AsekeevoMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.125 255.255.255.0,peer-id 26' (status=1)
  2321. Tue Jan 31 20:28:13 2017 us=199101 85.192.132.220 peer info: IV_VER=2.4.0
  2322. Tue Jan 31 20:28:13 2017 us=199101 85.192.132.220 peer info: IV_PLAT=win
  2323. Tue Jan 31 20:28:13 2017 us=214718 85.192.132.220 peer info: IV_PROTO=2
  2324. Tue Jan 31 20:28:13 2017 us=214718 85.192.132.220 peer info: IV_NCP=2
  2325. Tue Jan 31 20:28:13 2017 us=214718 85.192.132.220 peer info: IV_LZ4=1
  2326. Tue Jan 31 20:28:13 2017 us=214718 85.192.132.220 peer info: IV_LZ4v2=1
  2327. Tue Jan 31 20:28:13 2017 us=214718 85.192.132.220 peer info: IV_LZO=1
  2328. Tue Jan 31 20:28:13 2017 us=214718 85.192.132.220 peer info: IV_COMP_STUB=1
  2329. Tue Jan 31 20:28:13 2017 us=214718 85.192.132.220 peer info: IV_COMP_STUBv2=1
  2330. Tue Jan 31 20:28:13 2017 us=214718 85.192.132.220 peer info: IV_TCPNL=1
  2331. Tue Jan 31 20:28:13 2017 us=214718 MULTI: multi_create_instance called
  2332. Tue Jan 31 20:28:13 2017 us=214718 85.192.131.80 Re-using SSL/TLS context
  2333. Tue Jan 31 20:28:13 2017 us=214718 85.192.131.80 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2334. Tue Jan 31 20:28:13 2017 us=214718 85.192.131.80 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2335. Tue Jan 31 20:28:13 2017 us=214718 85.192.131.80 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2336. Tue Jan 31 20:28:13 2017 us=214718 85.192.131.80 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2337. Tue Jan 31 20:28:13 2017 us=214718 85.192.131.80 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.80:60088, sid=15d6cf27 c9677995
  2338. Tue Jan 31 20:28:13 2017 us=214718 62.133.169.132 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2339. Tue Jan 31 20:28:13 2017 us=214718 62.133.169.132 [ErmolaevoFS] Peer Connection Initiated with [AF_INET6]::ffff:62.133.169.132:16394
  2340. Tue Jan 31 20:28:13 2017 us=214718 ErmolaevoFS/62.133.169.132 MULTI_sva: pool returned IPv4=10.5.0.10, IPv6=(Not enabled)
  2341. Tue Jan 31 20:28:13 2017 us=214718 ErmolaevoFS/62.133.169.132 MULTI: Learn: 10.5.0.10 -> ErmolaevoFS/62.133.169.132
  2342. Tue Jan 31 20:28:13 2017 us=214718 ErmolaevoFS/62.133.169.132 MULTI: primary virtual IP for ErmolaevoFS/62.133.169.132: 10.5.0.10
  2343. Tue Jan 31 20:28:13 2017 us=230381 MULTI: multi_create_instance called
  2344. Tue Jan 31 20:28:13 2017 us=230381 85.192.146.98 Re-using SSL/TLS context
  2345. Tue Jan 31 20:28:13 2017 us=230381 85.192.146.98 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2346. Tue Jan 31 20:28:13 2017 us=230381 85.192.146.98 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2347. Tue Jan 31 20:28:13 2017 us=230381 85.192.146.98 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2348. Tue Jan 31 20:28:13 2017 us=230381 85.192.146.98 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2349. Tue Jan 31 20:28:13 2017 us=230381 85.192.146.98 TLS: Initial packet from [AF_INET6]::ffff:85.192.146.98:63368, sid=0a4a6f65 15b407ce
  2350. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_VER=2.4.0
  2351. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_PLAT=win
  2352. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_PROTO=2
  2353. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_NCP=2
  2354. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_LZ4=1
  2355. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_LZ4v2=1
  2356. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_LZO=1
  2357. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_COMP_STUB=1
  2358. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_COMP_STUBv2=1
  2359. Tue Jan 31 20:28:13 2017 us=230381 85.192.131.237 peer info: IV_TCPNL=1
  2360. Tue Jan 31 20:28:13 2017 us=245994 85.192.132.220 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2361. Tue Jan 31 20:28:13 2017 us=245994 85.192.132.220 [AbdulinoFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.132.220:56551
  2362. Tue Jan 31 20:28:13 2017 us=245994 AbdulinoFS2/85.192.132.220 MULTI_sva: pool returned IPv4=10.5.0.114, IPv6=(Not enabled)
  2363. Tue Jan 31 20:28:13 2017 us=245994 AbdulinoFS2/85.192.132.220 MULTI: Learn: 10.5.0.114 -> AbdulinoFS2/85.192.132.220
  2364. Tue Jan 31 20:28:13 2017 us=245994 AbdulinoFS2/85.192.132.220 MULTI: primary virtual IP for AbdulinoFS2/85.192.132.220: 10.5.0.114
  2365. Tue Jan 31 20:28:13 2017 us=245994 MULTI: multi_create_instance called
  2366. Tue Jan 31 20:28:13 2017 us=245994 85.192.131.57 Re-using SSL/TLS context
  2367. Tue Jan 31 20:28:13 2017 us=245994 85.192.131.57 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2368. Tue Jan 31 20:28:13 2017 us=245994 85.192.131.57 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2369. Tue Jan 31 20:28:13 2017 us=245994 85.192.131.57 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2370. Tue Jan 31 20:28:13 2017 us=245994 85.192.131.57 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2371. Tue Jan 31 20:28:13 2017 us=245994 85.192.131.57 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.57:59745, sid=c3ebfa98 92318571
  2372. Tue Jan 31 20:28:13 2017 us=245994 MULTI: multi_create_instance called
  2373. Tue Jan 31 20:28:13 2017 us=245994 83.174.226.113 Re-using SSL/TLS context
  2374. Tue Jan 31 20:28:13 2017 us=245994 83.174.226.113 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2375. Tue Jan 31 20:28:13 2017 us=245994 83.174.226.113 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2376. Tue Jan 31 20:28:13 2017 us=245994 83.174.226.113 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2377. Tue Jan 31 20:28:13 2017 us=245994 83.174.226.113 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2378. Tue Jan 31 20:28:13 2017 us=245994 83.174.226.113 TLS: Initial packet from [AF_INET6]::ffff:83.174.226.113:17559, sid=5b1bfee8 bd45a888
  2379. Tue Jan 31 20:28:13 2017 us=245994 85.192.130.75 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2380. Tue Jan 31 20:28:13 2017 us=245994 85.192.130.75 [OrskEkspressES] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.75:19075
  2381. Tue Jan 31 20:28:13 2017 us=245994 OrskEkspressES/85.192.130.75 MULTI_sva: pool returned IPv4=10.5.0.75, IPv6=(Not enabled)
  2382. Tue Jan 31 20:28:13 2017 us=245994 OrskEkspressES/85.192.130.75 MULTI: Learn: 10.5.0.75 -> OrskEkspressES/85.192.130.75
  2383. Tue Jan 31 20:28:13 2017 us=245994 OrskEkspressES/85.192.130.75 MULTI: primary virtual IP for OrskEkspressES/85.192.130.75: 10.5.0.75
  2384. Tue Jan 31 20:28:13 2017 us=245994 77.94.104.123 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2385. Tue Jan 31 20:28:13 2017 us=245994 77.94.104.123 [IsyangulovoEs] Peer Connection Initiated with [AF_INET6]::ffff:77.94.104.123:25260
  2386. Tue Jan 31 20:28:13 2017 us=245994 IsyangulovoEs/77.94.104.123 MULTI_sva: pool returned IPv4=10.5.0.12, IPv6=(Not enabled)
  2387. Tue Jan 31 20:28:13 2017 us=245994 IsyangulovoEs/77.94.104.123 MULTI: Learn: 10.5.0.12 -> IsyangulovoEs/77.94.104.123
  2388. Tue Jan 31 20:28:13 2017 us=245994 IsyangulovoEs/77.94.104.123 MULTI: primary virtual IP for IsyangulovoEs/77.94.104.123: 10.5.0.12
  2389. Tue Jan 31 20:28:13 2017 us=245994 MULTI: multi_create_instance called
  2390. Tue Jan 31 20:28:13 2017 us=245994 83.174.221.126 Re-using SSL/TLS context
  2391. Tue Jan 31 20:28:13 2017 us=245994 83.174.221.126 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2392. Tue Jan 31 20:28:13 2017 us=245994 83.174.221.126 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2393. Tue Jan 31 20:28:13 2017 us=245994 83.174.221.126 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2394. Tue Jan 31 20:28:13 2017 us=245994 83.174.221.126 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2395. Tue Jan 31 20:28:13 2017 us=245994 83.174.221.126 TLS: Initial packet from [AF_INET6]::ffff:83.174.221.126:14805, sid=340e5bae e33b0ad9
  2396. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_VER=2.4.0
  2397. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_PLAT=win
  2398. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_PROTO=2
  2399. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_NCP=2
  2400. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_LZ4=1
  2401. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_LZ4v2=1
  2402. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_LZO=1
  2403. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_COMP_STUB=1
  2404. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_COMP_STUBv2=1
  2405. Tue Jan 31 20:28:13 2017 us=261605 83.174.222.50 peer info: IV_TCPNL=1
  2406. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_VER=2.4.0
  2407. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_PLAT=win
  2408. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_PROTO=2
  2409. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_NCP=2
  2410. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_LZ4=1
  2411. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_LZ4v2=1
  2412. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_LZO=1
  2413. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_COMP_STUB=1
  2414. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_COMP_STUBv2=1
  2415. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.123 peer info: IV_TCPNL=1
  2416. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.237 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2417. Tue Jan 31 20:28:13 2017 us=261605 85.192.131.237 [AlexandrovkaFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.237:63353
  2418. Tue Jan 31 20:28:13 2017 us=261605 AlexandrovkaFS/85.192.131.237 MULTI_sva: pool returned IPv4=10.5.0.131, IPv6=(Not enabled)
  2419. Tue Jan 31 20:28:13 2017 us=261605 AlexandrovkaFS/85.192.131.237 MULTI: Learn: 10.5.0.131 -> AlexandrovkaFS/85.192.131.237
  2420. Tue Jan 31 20:28:13 2017 us=261605 AlexandrovkaFS/85.192.131.237 MULTI: primary virtual IP for AlexandrovkaFS/85.192.131.237: 10.5.0.131
  2421. Tue Jan 31 20:28:13 2017 us=261605 85.192.132.1 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2422. Tue Jan 31 20:28:13 2017 us=261605 85.192.132.1 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=BuzulukFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2423. Tue Jan 31 20:28:13 2017 us=277237 MULTI: multi_create_instance called
  2424. Tue Jan 31 20:28:13 2017 us=277237 85.192.132.1 Re-using SSL/TLS context
  2425. Tue Jan 31 20:28:13 2017 us=277237 85.192.132.1 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2426. Tue Jan 31 20:28:13 2017 us=277237 85.192.132.1 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2427. Tue Jan 31 20:28:13 2017 us=277237 85.192.132.1 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2428. Tue Jan 31 20:28:13 2017 us=277237 85.192.132.1 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2429. Tue Jan 31 20:28:13 2017 us=277237 85.192.132.1 TLS: Initial packet from [AF_INET6]::ffff:85.192.132.1:16975, sid=1bc79138 d87b2349
  2430. Tue Jan 31 20:28:13 2017 us=277237 KvarkenoMTS/85.192.171.215 PUSH: Received control message: 'PUSH_REQUEST'
  2431. Tue Jan 31 20:28:13 2017 us=277237 KvarkenoMTS/85.192.171.215 SENT CONTROL [KvarkenoMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.53 255.255.255.0,peer-id 23' (status=1)
  2432. Tue Jan 31 20:28:13 2017 us=277237 MULTI: multi_create_instance called
  2433. Tue Jan 31 20:28:13 2017 us=277237 83.174.222.80 Re-using SSL/TLS context
  2434. Tue Jan 31 20:28:13 2017 us=277237 83.174.222.80 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2435. Tue Jan 31 20:28:13 2017 us=277237 83.174.222.80 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2436. Tue Jan 31 20:28:13 2017 us=277237 83.174.222.80 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2437. Tue Jan 31 20:28:13 2017 us=277237 83.174.222.80 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2438. Tue Jan 31 20:28:13 2017 us=277237 83.174.222.80 TLS: Initial packet from [AF_INET6]::ffff:83.174.222.80:18999, sid=72d52f51 b5d1b862
  2439. Tue Jan 31 20:28:13 2017 us=277237 85.192.128.34 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2440. Tue Jan 31 20:28:13 2017 us=277237 85.192.128.34 [SaraktashT2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.128.34:16740
  2441. Tue Jan 31 20:28:13 2017 us=277237 SaraktashT2/85.192.128.34 MULTI_sva: pool returned IPv4=10.5.0.72, IPv6=(Not enabled)
  2442. Tue Jan 31 20:28:13 2017 us=277237 SaraktashT2/85.192.128.34 MULTI: Learn: 10.5.0.72 -> SaraktashT2/85.192.128.34
  2443. Tue Jan 31 20:28:13 2017 us=277237 SaraktashT2/85.192.128.34 MULTI: primary virtual IP for SaraktashT2/85.192.128.34: 10.5.0.72
  2444. Tue Jan 31 20:28:13 2017 us=277237 MULTI: multi_create_instance called
  2445. Tue Jan 31 20:28:13 2017 us=277237 85.192.130.178 Re-using SSL/TLS context
  2446. Tue Jan 31 20:28:13 2017 us=277237 85.192.130.178 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2447. Tue Jan 31 20:28:13 2017 us=277237 85.192.130.178 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2448. Tue Jan 31 20:28:13 2017 us=277237 85.192.130.178 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2449. Tue Jan 31 20:28:13 2017 us=277237 85.192.130.178 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2450. Tue Jan 31 20:28:13 2017 us=277237 85.192.130.178 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.178:18545, sid=93d0dcbb 96c92edb
  2451. Tue Jan 31 20:28:13 2017 us=277237 MULTI: multi_create_instance called
  2452. Tue Jan 31 20:28:13 2017 us=277237 85.192.129.228 Re-using SSL/TLS context
  2453. Tue Jan 31 20:28:13 2017 us=277237 85.192.129.228 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2454. Tue Jan 31 20:28:13 2017 us=277237 85.192.129.228 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2455. Tue Jan 31 20:28:13 2017 us=277237 85.192.129.228 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2456. Tue Jan 31 20:28:13 2017 us=277237 85.192.129.228 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2457. Tue Jan 31 20:28:13 2017 us=277237 85.192.129.228 TLS: Initial packet from [AF_INET6]::ffff:85.192.129.228:55384, sid=6b01bdfc 927bb622
  2458. Tue Jan 31 20:28:13 2017 us=292862 MULTI: multi_create_instance called
  2459. Tue Jan 31 20:28:13 2017 us=292862 85.192.182.110 Re-using SSL/TLS context
  2460. Tue Jan 31 20:28:13 2017 us=292862 85.192.182.110 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2461. Tue Jan 31 20:28:13 2017 us=292862 85.192.182.110 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2462. Tue Jan 31 20:28:13 2017 us=292862 85.192.182.110 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2463. Tue Jan 31 20:28:13 2017 us=292862 85.192.182.110 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2464. Tue Jan 31 20:28:13 2017 us=292862 85.192.182.110 TLS: Initial packet from [AF_INET6]::ffff:85.192.182.110:57890, sid=c293576a 06586a4b
  2465. Tue Jan 31 20:28:13 2017 us=292862 MULTI: multi_create_instance called
  2466. Tue Jan 31 20:28:13 2017 us=292862 85.192.171.101 Re-using SSL/TLS context
  2467. Tue Jan 31 20:28:13 2017 us=292862 85.192.171.101 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2468. Tue Jan 31 20:28:13 2017 us=292862 85.192.171.101 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2469. Tue Jan 31 20:28:13 2017 us=292862 85.192.171.101 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2470. Tue Jan 31 20:28:13 2017 us=292862 85.192.171.101 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2471. Tue Jan 31 20:28:13 2017 us=292862 85.192.171.101 TLS: Initial packet from [AF_INET6]::ffff:85.192.171.101:59980, sid=5990992b 997e0447
  2472. Tue Jan 31 20:28:13 2017 us=308479 85.192.146.98 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2473. Tue Jan 31 20:28:13 2017 us=308479 85.192.146.98 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=BuzulukRus, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2474. Tue Jan 31 20:28:13 2017 us=308479 85.192.131.123 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2475. Tue Jan 31 20:28:13 2017 us=308479 85.192.131.123 [OrskHoz] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.123:10111
  2476. Tue Jan 31 20:28:13 2017 us=308479 OrskHoz/85.192.131.123 MULTI_sva: pool returned IPv4=10.5.0.71, IPv6=(Not enabled)
  2477. Tue Jan 31 20:28:13 2017 us=308479 OrskHoz/85.192.131.123 MULTI: Learn: 10.5.0.71 -> OrskHoz/85.192.131.123
  2478. Tue Jan 31 20:28:13 2017 us=308479 OrskHoz/85.192.131.123 MULTI: primary virtual IP for OrskHoz/85.192.131.123: 10.5.0.71
  2479. Tue Jan 31 20:28:13 2017 us=308479 MULTI: multi_create_instance called
  2480. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.217 Re-using SSL/TLS context
  2481. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.217 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2482. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.217 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2483. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.217 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2484. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.217 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2485. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.217 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.217:21942, sid=5ed631ec f6bb89a4
  2486. Tue Jan 31 20:28:13 2017 us=308479 83.174.222.50 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2487. Tue Jan 31 20:28:13 2017 us=308479 83.174.222.50 [RaevskiiMTS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.222.50:17174
  2488. Tue Jan 31 20:28:13 2017 us=308479 RaevskiiMTS/83.174.222.50 MULTI_sva: pool returned IPv4=10.5.0.24, IPv6=(Not enabled)
  2489. Tue Jan 31 20:28:13 2017 us=308479 RaevskiiMTS/83.174.222.50 MULTI: Learn: 10.5.0.24 -> RaevskiiMTS/83.174.222.50
  2490. Tue Jan 31 20:28:13 2017 us=308479 RaevskiiMTS/83.174.222.50 MULTI: primary virtual IP for RaevskiiMTS/83.174.222.50: 10.5.0.24
  2491. Tue Jan 31 20:28:13 2017 us=308479 MULTI: multi_create_instance called
  2492. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.64 Re-using SSL/TLS context
  2493. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.64 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2494. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.64 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2495. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.64 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2496. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.64 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2497. Tue Jan 31 20:28:13 2017 us=308479 85.192.130.64 TLS: Initial packet from [AF_INET6]::ffff:85.192.130.64:27823, sid=55daa713 72083b40
  2498. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_VER=2.4.0
  2499. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_PLAT=win
  2500. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_PROTO=2
  2501. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_NCP=2
  2502. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_LZ4=1
  2503. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_LZ4v2=1
  2504. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_LZO=1
  2505. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_COMP_STUB=1
  2506. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_COMP_STUBv2=1
  2507. Tue Jan 31 20:28:13 2017 us=324110 85.192.132.1 peer info: IV_TCPNL=1
  2508. Tue Jan 31 20:28:13 2017 us=324110 MULTI: multi_create_instance called
  2509. Tue Jan 31 20:28:13 2017 us=324110 62.133.173.160 Re-using SSL/TLS context
  2510. Tue Jan 31 20:28:13 2017 us=324110 62.133.173.160 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2511. Tue Jan 31 20:28:13 2017 us=324110 62.133.173.160 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2512. Tue Jan 31 20:28:13 2017 us=324110 62.133.173.160 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2513. Tue Jan 31 20:28:13 2017 us=324110 62.133.173.160 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2514. Tue Jan 31 20:28:13 2017 us=324110 62.133.173.160 TLS: Initial packet from [AF_INET6]::ffff:62.133.173.160:50407, sid=9542673a a4bef33a
  2515. Tue Jan 31 20:28:13 2017 us=324110 85.192.131.140 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2516. Tue Jan 31 20:28:13 2017 us=324110 85.192.131.140 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SevernoeFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2517. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_VER=2.4.0
  2518. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_PLAT=win
  2519. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_PROTO=2
  2520. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_NCP=2
  2521. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_LZ4=1
  2522. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_LZ4v2=1
  2523. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_LZO=1
  2524. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_COMP_STUB=1
  2525. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_COMP_STUBv2=1
  2526. Tue Jan 31 20:28:13 2017 us=339735 85.192.146.98 peer info: IV_TCPNL=1
  2527. Tue Jan 31 20:28:13 2017 us=339735 MULTI: multi_create_instance called
  2528. Tue Jan 31 20:28:13 2017 us=339735 85.192.131.140 Re-using SSL/TLS context
  2529. Tue Jan 31 20:28:13 2017 us=339735 85.192.131.140 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2530. Tue Jan 31 20:28:13 2017 us=339735 85.192.131.140 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2531. Tue Jan 31 20:28:13 2017 us=339735 85.192.131.140 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2532. Tue Jan 31 20:28:13 2017 us=339735 85.192.131.140 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2533. Tue Jan 31 20:28:13 2017 us=339735 85.192.131.140 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.140:57100, sid=d80a053e 15f9b835
  2534. Tue Jan 31 20:28:13 2017 us=339735 MULTI: multi_create_instance called
  2535. Tue Jan 31 20:28:13 2017 us=339735 145.255.27.168 Re-using SSL/TLS context
  2536. Tue Jan 31 20:28:13 2017 us=339735 145.255.27.168 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2537. Tue Jan 31 20:28:13 2017 us=339735 145.255.27.168 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2538. Tue Jan 31 20:28:13 2017 us=339735 145.255.27.168 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2539. Tue Jan 31 20:28:13 2017 us=339735 145.255.27.168 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2540. Tue Jan 31 20:28:13 2017 us=339735 145.255.27.168 TLS: Initial packet from [AF_INET6]::ffff:145.255.27.168:64733, sid=f99aa97d 5986ee2a
  2541. Tue Jan 31 20:28:13 2017 us=339735 83.174.223.253 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2542. Tue Jan 31 20:28:13 2017 us=339735 83.174.223.253 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KarmaskaliFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2543. Tue Jan 31 20:28:13 2017 us=339735 85.192.131.80 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2544. Tue Jan 31 20:28:13 2017 us=339735 85.192.131.80 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=PonomarevkaFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2545. Tue Jan 31 20:28:13 2017 us=355332 MULTI: multi_create_instance called
  2546. Tue Jan 31 20:28:13 2017 us=355332 85.192.171.101 Re-using SSL/TLS context
  2547. Tue Jan 31 20:28:13 2017 us=355332 85.192.171.101 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2548. Tue Jan 31 20:28:13 2017 us=355332 85.192.171.101 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2549. Tue Jan 31 20:28:13 2017 us=355332 85.192.171.101 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2550. Tue Jan 31 20:28:13 2017 us=355332 85.192.171.101 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2551. Tue Jan 31 20:28:13 2017 us=355332 85.192.171.101 TLS: Initial packet from [AF_INET6]::ffff:85.192.171.101:61987, sid=d36ca85f 0b104415
  2552. Tue Jan 31 20:28:13 2017 us=355332 MULTI: multi_create_instance called
  2553. Tue Jan 31 20:28:13 2017 us=355332 83.174.213.186 Re-using SSL/TLS context
  2554. Tue Jan 31 20:28:13 2017 us=355332 83.174.213.186 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2555. Tue Jan 31 20:28:13 2017 us=355332 83.174.213.186 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2556. Tue Jan 31 20:28:13 2017 us=355332 83.174.213.186 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2557. Tue Jan 31 20:28:13 2017 us=355332 83.174.213.186 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2558. Tue Jan 31 20:28:13 2017 us=355332 83.174.213.186 TLS: Initial packet from [AF_INET6]::ffff:83.174.213.186:53302, sid=83f70990 05bde511
  2559. Tue Jan 31 20:28:13 2017 us=355332 85.192.182.110 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2560. Tue Jan 31 20:28:13 2017 us=355332 85.192.182.110 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=TockoeFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2561. Tue Jan 31 20:28:13 2017 us=355332 85.192.129.228 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2562. Tue Jan 31 20:28:13 2017 us=355332 85.192.129.228 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=NovoorskFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2563. Tue Jan 31 20:28:13 2017 us=355332 85.192.132.1 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2564. Tue Jan 31 20:28:13 2017 us=355332 85.192.132.1 [BuzulukFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.132.1:16974
  2565. Tue Jan 31 20:28:13 2017 us=355332 BuzulukFS2/85.192.132.1 MULTI_sva: pool returned IPv4=10.5.0.78, IPv6=(Not enabled)
  2566. Tue Jan 31 20:28:13 2017 us=355332 BuzulukFS2/85.192.132.1 MULTI: Learn: 10.5.0.78 -> BuzulukFS2/85.192.132.1
  2567. Tue Jan 31 20:28:13 2017 us=355332 BuzulukFS2/85.192.132.1 MULTI: primary virtual IP for BuzulukFS2/85.192.132.1: 10.5.0.78
  2568. Tue Jan 31 20:28:13 2017 us=355332 85.192.146.98 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2569. Tue Jan 31 20:28:13 2017 us=355332 85.192.146.98 [BuzulukRus] Peer Connection Initiated with [AF_INET6]::ffff:85.192.146.98:63368
  2570. Tue Jan 31 20:28:13 2017 us=355332 BuzulukRus/85.192.146.98 MULTI_sva: pool returned IPv4=10.5.0.82, IPv6=(Not enabled)
  2571. Tue Jan 31 20:28:13 2017 us=355332 BuzulukRus/85.192.146.98 MULTI: Learn: 10.5.0.82 -> BuzulukRus/85.192.146.98
  2572. Tue Jan 31 20:28:13 2017 us=355332 BuzulukRus/85.192.146.98 MULTI: primary virtual IP for BuzulukRus/85.192.146.98: 10.5.0.82
  2573. Tue Jan 31 20:28:13 2017 us=370963 MULTI: multi_create_instance called
  2574. Tue Jan 31 20:28:13 2017 us=370963 83.174.219.206 Re-using SSL/TLS context
  2575. Tue Jan 31 20:28:13 2017 us=370963 83.174.219.206 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2576. Tue Jan 31 20:28:13 2017 us=370963 83.174.219.206 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2577. Tue Jan 31 20:28:13 2017 us=370963 83.174.219.206 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2578. Tue Jan 31 20:28:13 2017 us=370963 83.174.219.206 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2579. Tue Jan 31 20:28:13 2017 us=370963 83.174.219.206 TLS: Initial packet from [AF_INET6]::ffff:83.174.219.206:14709, sid=06226799 86bc2b65
  2580. Tue Jan 31 20:28:13 2017 us=370963 145.255.27.168 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2581. Tue Jan 31 20:28:13 2017 us=370963 145.255.27.168 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=UfamvdFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2582. Tue Jan 31 20:28:13 2017 us=370963 83.174.238.201 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2583. Tue Jan 31 20:28:13 2017 us=370963 83.174.238.201 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=FedorovkaES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2584. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_VER=2.4.0
  2585. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_PLAT=win
  2586. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_PROTO=2
  2587. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_NCP=2
  2588. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_LZ4=1
  2589. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_LZ4v2=1
  2590. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_LZO=1
  2591. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_COMP_STUB=1
  2592. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_COMP_STUBv2=1
  2593. Tue Jan 31 20:28:13 2017 us=386582 83.174.223.253 peer info: IV_TCPNL=1
  2594. Tue Jan 31 20:28:13 2017 us=386582 85.192.171.101 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2595. Tue Jan 31 20:28:13 2017 us=386582 85.192.171.101 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=GrachevkaFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2596. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_VER=2.4.0
  2597. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_PLAT=win
  2598. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_PROTO=2
  2599. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_NCP=2
  2600. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_LZ4=1
  2601. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_LZ4v2=1
  2602. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_LZO=1
  2603. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_COMP_STUB=1
  2604. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_COMP_STUBv2=1
  2605. Tue Jan 31 20:28:13 2017 us=386582 85.192.182.110 peer info: IV_TCPNL=1
  2606. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_VER=2.4.0
  2607. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_PLAT=win
  2608. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_PROTO=2
  2609. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_NCP=2
  2610. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_LZ4=1
  2611. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_LZ4v2=1
  2612. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_LZO=1
  2613. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_COMP_STUB=1
  2614. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_COMP_STUBv2=1
  2615. Tue Jan 31 20:28:13 2017 us=386582 85.192.131.140 peer info: IV_TCPNL=1
  2616. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_VER=2.4.0
  2617. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_PLAT=win
  2618. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_PROTO=2
  2619. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_NCP=2
  2620. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_LZ4=1
  2621. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_LZ4v2=1
  2622. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_LZO=1
  2623. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_COMP_STUB=1
  2624. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_COMP_STUBv2=1
  2625. Tue Jan 31 20:28:13 2017 us=386582 145.255.27.168 peer info: IV_TCPNL=1
  2626. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_VER=2.4.0
  2627. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_PLAT=win
  2628. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_PROTO=2
  2629. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_NCP=2
  2630. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_LZ4=1
  2631. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_LZ4v2=1
  2632. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_LZO=1
  2633. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_COMP_STUB=1
  2634. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_COMP_STUBv2=1
  2635. Tue Jan 31 20:28:13 2017 us=386582 85.192.129.228 peer info: IV_TCPNL=1
  2636. Tue Jan 31 20:28:13 2017 us=386582 83.174.218.234 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2637. Tue Jan 31 20:28:13 2017 us=386582 83.174.218.234 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=ErmekeevoFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2638. Tue Jan 31 20:28:13 2017 us=386582 MULTI: multi_create_instance called
  2639. Tue Jan 31 20:28:13 2017 us=386582 83.174.238.107 Re-using SSL/TLS context
  2640. Tue Jan 31 20:28:13 2017 us=386582 83.174.238.107 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2641. Tue Jan 31 20:28:13 2017 us=386582 83.174.238.107 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2642. Tue Jan 31 20:28:13 2017 us=386582 83.174.238.107 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2643. Tue Jan 31 20:28:13 2017 us=386582 83.174.238.107 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2644. Tue Jan 31 20:28:13 2017 us=386582 83.174.238.107 TLS: Initial packet from [AF_INET6]::ffff:83.174.238.107:19170, sid=d4f43093 e8221d91
  2645. Tue Jan 31 20:28:13 2017 us=402214 83.174.221.126 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2646. Tue Jan 31 20:28:13 2017 us=402214 83.174.221.126 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=YazikovoES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2647. Tue Jan 31 20:28:13 2017 us=402214 JuzniiES/79.140.20.2 PUSH: Received control message: 'PUSH_REQUEST'
  2648. Tue Jan 31 20:28:13 2017 us=402214 JuzniiES/79.140.20.2 SENT CONTROL [JuzniiES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.104 255.255.255.0,peer-id 33,cipher AES-256-GCM' (status=1)
  2649. Tue Jan 31 20:28:13 2017 us=402214 JuzniiES/79.140.20.2 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  2650. Tue Jan 31 20:28:13 2017 us=402214 JuzniiES/79.140.20.2 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  2651. Tue Jan 31 20:28:13 2017 us=402214 JuzniiES/79.140.20.2 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  2652. Tue Jan 31 20:28:13 2017 us=402214 145.255.27.168 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2653. Tue Jan 31 20:28:13 2017 us=402214 145.255.27.168 [UfamvdFS] Peer Connection Initiated with [AF_INET6]::ffff:145.255.27.168:64733
  2654. Tue Jan 31 20:28:13 2017 us=402214 UfamvdFS/145.255.27.168 MULTI_sva: pool returned IPv4=10.5.0.29, IPv6=(Not enabled)
  2655. Tue Jan 31 20:28:13 2017 us=402214 UfamvdFS/145.255.27.168 MULTI: Learn: 10.5.0.29 -> UfamvdFS/145.255.27.168
  2656. Tue Jan 31 20:28:13 2017 us=402214 UfamvdFS/145.255.27.168 MULTI: primary virtual IP for UfamvdFS/145.255.27.168: 10.5.0.29
  2657. Tue Jan 31 20:28:13 2017 us=402214 85.192.132.1 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2658. Tue Jan 31 20:28:13 2017 us=402214 85.192.132.1 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=BuzulukFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2659. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_VER=2.4.0
  2660. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_PLAT=win
  2661. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_PROTO=2
  2662. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_NCP=2
  2663. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_LZ4=1
  2664. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_LZ4v2=1
  2665. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_LZO=1
  2666. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_COMP_STUB=1
  2667. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_COMP_STUBv2=1
  2668. Tue Jan 31 20:28:13 2017 us=402214 85.192.131.80 peer info: IV_TCPNL=1
  2669. Tue Jan 31 20:28:13 2017 us=417835 KrasnoholmES2/85.192.131.86 PUSH: Received control message: 'PUSH_REQUEST'
  2670. Tue Jan 31 20:28:13 2017 us=417835 KrasnoholmES2/85.192.131.86 SENT CONTROL [KrasnoholmES2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.86 255.255.255.0,peer-id 30' (status=1)
  2671. Tue Jan 31 20:28:13 2017 us=417835 85.192.156.156 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2672. Tue Jan 31 20:28:13 2017 us=417835 85.192.156.156 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=MednogorskMTS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2673. Tue Jan 31 20:28:13 2017 us=417835 MULTI: multi_create_instance called
  2674. Tue Jan 31 20:28:13 2017 us=417835 85.192.128.241 Re-using SSL/TLS context
  2675. Tue Jan 31 20:28:13 2017 us=417835 85.192.128.241 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2676. Tue Jan 31 20:28:13 2017 us=417835 85.192.128.241 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2677. Tue Jan 31 20:28:13 2017 us=417835 85.192.128.241 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2678. Tue Jan 31 20:28:13 2017 us=417835 85.192.128.241 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2679. Tue Jan 31 20:28:13 2017 us=417835 85.192.128.241 TLS: Initial packet from [AF_INET6]::ffff:85.192.128.241:57586, sid=859ef0c4 57895053
  2680. Tue Jan 31 20:28:13 2017 us=417835 85.192.141.228 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2681. Tue Jan 31 20:28:13 2017 us=417835 85.192.141.228 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=BeliaevkaMTS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2682. Tue Jan 31 20:28:13 2017 us=417835 85.192.131.57 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2683. Tue Jan 31 20:28:13 2017 us=417835 85.192.131.57 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Orsk5MTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2684. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2685. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=GrachevkaMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2686. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_VER=2.4.0
  2687. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_PLAT=win
  2688. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_PROTO=2
  2689. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_NCP=2
  2690. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_LZ4=1
  2691. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_LZ4v2=1
  2692. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_LZO=1
  2693. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_COMP_STUB=1
  2694. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_COMP_STUBv2=1
  2695. Tue Jan 31 20:28:13 2017 us=417835 85.192.171.101 peer info: IV_TCPNL=1
  2696. Tue Jan 31 20:28:13 2017 us=417835 85.192.182.110 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2697. Tue Jan 31 20:28:13 2017 us=417835 85.192.182.110 [TockoeFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.182.110:57890
  2698. Tue Jan 31 20:28:13 2017 us=417835 TockoeFS2/85.192.182.110 MULTI_sva: pool returned IPv4=10.5.0.97, IPv6=(Not enabled)
  2699. Tue Jan 31 20:28:13 2017 us=417835 TockoeFS2/85.192.182.110 MULTI: Learn: 10.5.0.97 -> TockoeFS2/85.192.182.110
  2700. Tue Jan 31 20:28:13 2017 us=417835 TockoeFS2/85.192.182.110 MULTI: primary virtual IP for TockoeFS2/85.192.182.110: 10.5.0.97
  2701. Tue Jan 31 20:28:13 2017 us=417835 85.192.129.228 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2702. Tue Jan 31 20:28:13 2017 us=417835 85.192.129.228 [NovoorskFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.129.228:55384
  2703. Tue Jan 31 20:28:13 2017 us=417835 NovoorskFS/85.192.129.228 MULTI_sva: pool returned IPv4=10.5.0.68, IPv6=(Not enabled)
  2704. Tue Jan 31 20:28:13 2017 us=417835 NovoorskFS/85.192.129.228 MULTI: Learn: 10.5.0.68 -> NovoorskFS/85.192.129.228
  2705. Tue Jan 31 20:28:13 2017 us=417835 NovoorskFS/85.192.129.228 MULTI: primary virtual IP for NovoorskFS/85.192.129.228: 10.5.0.68
  2706. Tue Jan 31 20:28:13 2017 us=417835 83.174.223.253 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2707. Tue Jan 31 20:28:13 2017 us=417835 83.174.223.253 [KarmaskaliFS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.223.253:63553
  2708. Tue Jan 31 20:28:13 2017 us=417835 KarmaskaliFS/83.174.223.253 MULTI_sva: pool returned IPv4=10.5.0.15, IPv6=(Not enabled)
  2709. Tue Jan 31 20:28:13 2017 us=417835 KarmaskaliFS/83.174.223.253 MULTI: Learn: 10.5.0.15 -> KarmaskaliFS/83.174.223.253
  2710. Tue Jan 31 20:28:13 2017 us=417835 KarmaskaliFS/83.174.223.253 MULTI: primary virtual IP for KarmaskaliFS/83.174.223.253: 10.5.0.15
  2711. Tue Jan 31 20:28:13 2017 us=433463 85.192.131.140 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2712. Tue Jan 31 20:28:13 2017 us=433463 85.192.131.140 [SevernoeFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.140:61428
  2713. Tue Jan 31 20:28:13 2017 us=433463 SevernoeFS/85.192.131.140 MULTI_sva: pool returned IPv4=10.5.0.117, IPv6=(Not enabled)
  2714. Tue Jan 31 20:28:13 2017 us=433463 SevernoeFS/85.192.131.140 MULTI: Learn: 10.5.0.117 -> SevernoeFS/85.192.131.140
  2715. Tue Jan 31 20:28:13 2017 us=433463 SevernoeFS/85.192.131.140 MULTI: primary virtual IP for SevernoeFS/85.192.131.140: 10.5.0.117
  2716. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_VER=2.4.0
  2717. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_PLAT=win
  2718. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_PROTO=2
  2719. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_NCP=2
  2720. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_LZ4=1
  2721. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_LZ4v2=1
  2722. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_LZO=1
  2723. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_COMP_STUB=1
  2724. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_COMP_STUBv2=1
  2725. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 peer info: IV_TCPNL=1
  2726. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2727. Tue Jan 31 20:28:13 2017 us=449088 85.192.171.101 [GrachevkaFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.171.101:59980
  2728. Tue Jan 31 20:28:13 2017 us=449088 GrachevkaFS/85.192.171.101 MULTI_sva: pool returned IPv4=10.5.0.81, IPv6=(Not enabled)
  2729. Tue Jan 31 20:28:13 2017 us=449088 GrachevkaFS/85.192.171.101 MULTI: Learn: 10.5.0.81 -> GrachevkaFS/85.192.171.101
  2730. Tue Jan 31 20:28:13 2017 us=449088 GrachevkaFS/85.192.171.101 MULTI: primary virtual IP for GrachevkaFS/85.192.171.101: 10.5.0.81
  2731. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_VER=2.4.0
  2732. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_PLAT=win
  2733. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_PROTO=2
  2734. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_NCP=2
  2735. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_LZ4=1
  2736. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_LZ4v2=1
  2737. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_LZO=1
  2738. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_COMP_STUB=1
  2739. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_COMP_STUBv2=1
  2740. Tue Jan 31 20:28:13 2017 us=449088 83.174.221.126 peer info: IV_TCPNL=1
  2741. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_VER=2.4.0
  2742. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_PLAT=win
  2743. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_PROTO=2
  2744. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_NCP=2
  2745. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_LZ4=1
  2746. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_LZ4v2=1
  2747. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_LZO=1
  2748. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_COMP_STUB=1
  2749. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_COMP_STUBv2=1
  2750. Tue Jan 31 20:28:13 2017 us=449088 85.192.132.1 peer info: IV_TCPNL=1
  2751. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.80 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2752. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.80 [PonomarevkaFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.80:60088
  2753. Tue Jan 31 20:28:13 2017 us=464738 PonomarevkaFS2/85.192.131.80 MULTI_sva: pool returned IPv4=10.5.0.133, IPv6=(Not enabled)
  2754. Tue Jan 31 20:28:13 2017 us=464738 PonomarevkaFS2/85.192.131.80 MULTI: Learn: 10.5.0.133 -> PonomarevkaFS2/85.192.131.80
  2755. Tue Jan 31 20:28:13 2017 us=464738 PonomarevkaFS2/85.192.131.80 MULTI: primary virtual IP for PonomarevkaFS2/85.192.131.80: 10.5.0.133
  2756. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_VER=2.4.0
  2757. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_PLAT=win
  2758. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_PROTO=2
  2759. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_NCP=2
  2760. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_LZ4=1
  2761. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_LZ4v2=1
  2762. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_LZO=1
  2763. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_COMP_STUB=1
  2764. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_COMP_STUBv2=1
  2765. Tue Jan 31 20:28:13 2017 us=464738 85.192.131.57 peer info: IV_TCPNL=1
  2766. Tue Jan 31 20:28:13 2017 us=480353 85.192.171.101 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2767. Tue Jan 31 20:28:13 2017 us=480353 85.192.171.101 [GrachevkaMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.171.101:61987
  2768. Tue Jan 31 20:28:13 2017 us=480353 GrachevkaMTS/85.192.171.101 MULTI_sva: pool returned IPv4=10.5.0.79, IPv6=(Not enabled)
  2769. Tue Jan 31 20:28:13 2017 us=480353 GrachevkaMTS/85.192.171.101 MULTI: Learn: 10.5.0.79 -> GrachevkaMTS/85.192.171.101
  2770. Tue Jan 31 20:28:13 2017 us=480353 GrachevkaMTS/85.192.171.101 MULTI: primary virtual IP for GrachevkaMTS/85.192.171.101: 10.5.0.79
  2771. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_VER=2.4.0
  2772. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_PLAT=win
  2773. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_PROTO=2
  2774. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_NCP=2
  2775. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_LZ4=1
  2776. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_LZ4v2=1
  2777. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_LZO=1
  2778. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_COMP_STUB=1
  2779. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_COMP_STUBv2=1
  2780. Tue Jan 31 20:28:13 2017 us=480353 83.174.238.201 peer info: IV_TCPNL=1
  2781. Tue Jan 31 20:28:13 2017 us=480353 85.192.131.140 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2782. Tue Jan 31 20:28:13 2017 us=480353 85.192.131.140 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SevernoeMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2783. Tue Jan 31 20:28:13 2017 us=495983 MULTI: multi_create_instance called
  2784. Tue Jan 31 20:28:13 2017 us=495983 85.192.171.101 Re-using SSL/TLS context
  2785. Tue Jan 31 20:28:13 2017 us=495983 85.192.171.101 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2786. Tue Jan 31 20:28:13 2017 us=495983 85.192.171.101 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2787. Tue Jan 31 20:28:13 2017 us=495983 85.192.171.101 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2788. Tue Jan 31 20:28:13 2017 us=495983 85.192.171.101 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2789. Tue Jan 31 20:28:13 2017 us=495983 85.192.171.101 TLS: Initial packet from [AF_INET6]::ffff:85.192.171.101:60659, sid=83e13276 5c826813
  2790. Tue Jan 31 20:28:13 2017 us=495983 MULTI: multi_create_instance called
  2791. Tue Jan 31 20:28:13 2017 us=495983 85.192.131.140 Re-using SSL/TLS context
  2792. Tue Jan 31 20:28:13 2017 us=495983 85.192.131.140 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2793. Tue Jan 31 20:28:13 2017 us=495983 85.192.131.140 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2794. Tue Jan 31 20:28:13 2017 us=495983 85.192.131.140 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2795. Tue Jan 31 20:28:13 2017 us=495983 85.192.131.140 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2796. Tue Jan 31 20:28:13 2017 us=495983 85.192.131.140 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.140:57853, sid=222e5f5d 880b3021
  2797. Tue Jan 31 20:28:13 2017 us=495983 85.192.128.241 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2798. Tue Jan 31 20:28:13 2017 us=495983 85.192.128.241 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SorochinskFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2799. Tue Jan 31 20:28:13 2017 us=495983 85.192.130.217 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2800. Tue Jan 31 20:28:13 2017 us=495983 85.192.130.217 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AsekeevoFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2801. Tue Jan 31 20:28:13 2017 us=495983 83.174.213.186 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2802. Tue Jan 31 20:28:13 2017 us=495983 83.174.213.186 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=YazikovoFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2803. Tue Jan 31 20:28:13 2017 us=495983 MULTI: multi_create_instance called
  2804. Tue Jan 31 20:28:13 2017 us=495983 85.192.156.156 Re-using SSL/TLS context
  2805. Tue Jan 31 20:28:13 2017 us=495983 85.192.156.156 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2806. Tue Jan 31 20:28:13 2017 us=495983 85.192.156.156 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2807. Tue Jan 31 20:28:13 2017 us=495983 85.192.156.156 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2808. Tue Jan 31 20:28:13 2017 us=495983 85.192.156.156 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2809. Tue Jan 31 20:28:13 2017 us=495983 85.192.156.156 TLS: Initial packet from [AF_INET6]::ffff:85.192.156.156:11829, sid=e95d4dea 265b8c24
  2810. Tue Jan 31 20:28:13 2017 us=495983 85.192.132.1 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2811. Tue Jan 31 20:28:13 2017 us=495983 85.192.132.1 [BuzulukFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.132.1:16975
  2812. Tue Jan 31 20:28:13 2017 us=495983 BuzulukFS/85.192.132.1 MULTI_sva: pool returned IPv4=10.5.0.77, IPv6=(Not enabled)
  2813. Tue Jan 31 20:28:13 2017 us=495983 BuzulukFS/85.192.132.1 MULTI: Learn: 10.5.0.77 -> BuzulukFS/85.192.132.1
  2814. Tue Jan 31 20:28:13 2017 us=495983 BuzulukFS/85.192.132.1 MULTI: primary virtual IP for BuzulukFS/85.192.132.1: 10.5.0.77
  2815. Tue Jan 31 20:28:13 2017 us=495983 AsekeevoFS/85.192.130.217 PUSH: Received control message: 'PUSH_REQUEST'
  2816. Tue Jan 31 20:28:13 2017 us=495983 AsekeevoFS/85.192.130.217 SENT CONTROL [AsekeevoFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.137 255.255.255.0,peer-id 48,cipher AES-256-GCM' (status=1)
  2817. Tue Jan 31 20:28:13 2017 us=495983 AsekeevoFS/85.192.130.217 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  2818. Tue Jan 31 20:28:13 2017 us=495983 AsekeevoFS/85.192.130.217 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  2819. Tue Jan 31 20:28:13 2017 us=495983 AsekeevoFS/85.192.130.217 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  2820. Tue Jan 31 20:28:13 2017 us=495983 83.174.221.126 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2821. Tue Jan 31 20:28:13 2017 us=495983 83.174.221.126 [YazikovoES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.221.126:14805
  2822. Tue Jan 31 20:28:13 2017 us=495983 YazikovoES/83.174.221.126 MULTI_sva: pool returned IPv4=10.5.0.40, IPv6=(Not enabled)
  2823. Tue Jan 31 20:28:13 2017 us=495983 YazikovoES/83.174.221.126 MULTI: Learn: 10.5.0.40 -> YazikovoES/83.174.221.126
  2824. Tue Jan 31 20:28:13 2017 us=495983 YazikovoES/83.174.221.126 MULTI: primary virtual IP for YazikovoES/83.174.221.126: 10.5.0.40
  2825. Tue Jan 31 20:28:13 2017 us=495983 83.174.226.113 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2826. Tue Jan 31 20:28:13 2017 us=495983 83.174.226.113 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=FedorovkaFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2827. Tue Jan 31 20:28:13 2017 us=511590 85.192.130.178 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2828. Tue Jan 31 20:28:13 2017 us=511590 85.192.130.178 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Tockoe2MTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2829. Tue Jan 31 20:28:13 2017 us=511590 83.174.221.250 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2830. Tue Jan 31 20:28:13 2017 us=511590 83.174.221.250 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=RaevskiiES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2831. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_VER=2.4.0
  2832. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_PLAT=win
  2833. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_PROTO=2
  2834. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_NCP=2
  2835. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_LZ4=1
  2836. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_LZ4v2=1
  2837. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_LZO=1
  2838. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_COMP_STUB=1
  2839. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_COMP_STUBv2=1
  2840. Tue Jan 31 20:28:13 2017 us=511590 85.192.141.228 peer info: IV_TCPNL=1
  2841. Tue Jan 31 20:28:13 2017 us=511590 MULTI: multi_create_instance called
  2842. Tue Jan 31 20:28:13 2017 us=511590 85.192.128.210 Re-using SSL/TLS context
  2843. Tue Jan 31 20:28:13 2017 us=511590 85.192.128.210 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2844. Tue Jan 31 20:28:13 2017 us=511590 85.192.128.210 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2845. Tue Jan 31 20:28:13 2017 us=511590 85.192.128.210 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2846. Tue Jan 31 20:28:13 2017 us=511590 85.192.128.210 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2847. Tue Jan 31 20:28:13 2017 us=511590 85.192.128.210 TLS: Initial packet from [AF_INET6]::ffff:85.192.128.210:13113, sid=9499191d 3999ba72
  2848. Tue Jan 31 20:28:13 2017 us=527236 85.192.131.57 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2849. Tue Jan 31 20:28:13 2017 us=527236 85.192.131.57 [Orsk5MTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.57:59745
  2850. Tue Jan 31 20:28:13 2017 us=527236 Orsk5MTS/85.192.131.57 MULTI_sva: pool returned IPv4=10.5.0.70, IPv6=(Not enabled)
  2851. Tue Jan 31 20:28:13 2017 us=527236 Orsk5MTS/85.192.131.57 MULTI: Learn: 10.5.0.70 -> Orsk5MTS/85.192.131.57
  2852. Tue Jan 31 20:28:13 2017 us=527236 Orsk5MTS/85.192.131.57 MULTI: primary virtual IP for Orsk5MTS/85.192.131.57: 10.5.0.70
  2853. Tue Jan 31 20:28:13 2017 us=527236 83.174.222.80 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2854. Tue Jan 31 20:28:13 2017 us=527236 83.174.222.80 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=DavlekanovoMTS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2855. Tue Jan 31 20:28:13 2017 us=527236 MULTI: multi_create_instance called
  2856. Tue Jan 31 20:28:13 2017 us=527236 85.192.131.129 Re-using SSL/TLS context
  2857. Tue Jan 31 20:28:13 2017 us=527236 85.192.131.129 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2858. Tue Jan 31 20:28:13 2017 us=527236 85.192.131.129 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2859. Tue Jan 31 20:28:13 2017 us=527236 85.192.131.129 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2860. Tue Jan 31 20:28:13 2017 us=527236 85.192.131.129 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2861. Tue Jan 31 20:28:13 2017 us=527236 85.192.131.129 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.129:58002, sid=054b9e0f fe3d3eb9
  2862. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_VER=2.4.0
  2863. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_PLAT=win
  2864. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_PROTO=2
  2865. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_NCP=2
  2866. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_LZ4=1
  2867. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_LZ4v2=1
  2868. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_LZO=1
  2869. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_COMP_STUB=1
  2870. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_COMP_STUBv2=1
  2871. Tue Jan 31 20:28:13 2017 us=527236 85.192.128.241 peer info: IV_TCPNL=1
  2872. Tue Jan 31 20:28:13 2017 us=542861 62.133.173.160 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2873. Tue Jan 31 20:28:13 2017 us=542861 62.133.173.160 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SharanFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2874. Tue Jan 31 20:28:13 2017 us=542861 MULTI: multi_create_instance called
  2875. Tue Jan 31 20:28:13 2017 us=542861 95.105.104.138 Re-using SSL/TLS context
  2876. Tue Jan 31 20:28:13 2017 us=542861 95.105.104.138 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2877. Tue Jan 31 20:28:13 2017 us=542861 95.105.104.138 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2878. Tue Jan 31 20:28:13 2017 us=542861 95.105.104.138 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2879. Tue Jan 31 20:28:13 2017 us=542861 95.105.104.138 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2880. Tue Jan 31 20:28:13 2017 us=542861 95.105.104.138 TLS: Initial packet from [AF_INET6]::ffff:95.105.104.138:62954, sid=a6fa2257 910adfed
  2881. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_VER=2.4.0
  2882. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_PLAT=win
  2883. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_PROTO=2
  2884. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_NCP=2
  2885. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_LZ4=1
  2886. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_LZ4v2=1
  2887. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_LZO=1
  2888. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_COMP_STUB=1
  2889. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_COMP_STUBv2=1
  2890. Tue Jan 31 20:28:13 2017 us=542861 85.192.131.140 peer info: IV_TCPNL=1
  2891. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_VER=2.4.0
  2892. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_PLAT=win
  2893. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_PROTO=2
  2894. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_NCP=2
  2895. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_LZ4=1
  2896. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_LZ4v2=1
  2897. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_LZO=1
  2898. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_COMP_STUB=1
  2899. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_COMP_STUBv2=1
  2900. Tue Jan 31 20:28:13 2017 us=542861 83.174.213.186 peer info: IV_TCPNL=1
  2901. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_VER=2.4.0
  2902. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_PLAT=win
  2903. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_PROTO=2
  2904. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_NCP=2
  2905. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_LZ4=1
  2906. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_LZ4v2=1
  2907. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_LZO=1
  2908. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_COMP_STUB=1
  2909. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_COMP_STUBv2=1
  2910. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.178 peer info: IV_TCPNL=1
  2911. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_VER=2.4.0
  2912. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_PLAT=win
  2913. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_PROTO=2
  2914. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_NCP=2
  2915. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_LZ4=1
  2916. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_LZ4v2=1
  2917. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_LZO=1
  2918. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_COMP_STUB=1
  2919. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_COMP_STUBv2=1
  2920. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.217 peer info: IV_TCPNL=1
  2921. Tue Jan 31 20:28:13 2017 us=558464 85.192.131.137 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2922. Tue Jan 31 20:28:13 2017 us=558464 85.192.131.137 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=BuguruslanFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2923. Tue Jan 31 20:28:13 2017 us=558464 85.192.171.101 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2924. Tue Jan 31 20:28:13 2017 us=558464 85.192.171.101 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=GrachevkaES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2925. Tue Jan 31 20:28:13 2017 us=558464 83.174.238.201 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2926. Tue Jan 31 20:28:13 2017 us=558464 83.174.238.201 [FedorovkaES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.238.201:14874
  2927. Tue Jan 31 20:28:13 2017 us=558464 FedorovkaES/83.174.238.201 MULTI_sva: pool returned IPv4=10.5.0.31, IPv6=(Not enabled)
  2928. Tue Jan 31 20:28:13 2017 us=558464 FedorovkaES/83.174.238.201 MULTI: Learn: 10.5.0.31 -> FedorovkaES/83.174.238.201
  2929. Tue Jan 31 20:28:13 2017 us=558464 FedorovkaES/83.174.238.201 MULTI: primary virtual IP for FedorovkaES/83.174.238.201: 10.5.0.31
  2930. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.64 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2931. Tue Jan 31 20:28:13 2017 us=558464 85.192.130.64 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=PleshanovoFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2932. Tue Jan 31 20:28:13 2017 us=558464 85.192.128.241 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2933. Tue Jan 31 20:28:13 2017 us=558464 85.192.128.241 [SorochinskFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.128.241:57586
  2934. Tue Jan 31 20:28:13 2017 us=558464 SorochinskFS/85.192.128.241 MULTI_sva: pool returned IPv4=10.5.0.91, IPv6=(Not enabled)
  2935. Tue Jan 31 20:28:13 2017 us=558464 SorochinskFS/85.192.128.241 MULTI: Learn: 10.5.0.91 -> SorochinskFS/85.192.128.241
  2936. Tue Jan 31 20:28:13 2017 us=558464 SorochinskFS/85.192.128.241 MULTI: primary virtual IP for SorochinskFS/85.192.128.241: 10.5.0.91
  2937. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2938. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=ArlanFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2939. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_VER=2.4.0
  2940. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_PLAT=win
  2941. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_PROTO=2
  2942. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_NCP=2
  2943. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_LZ4=1
  2944. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_LZ4v2=1
  2945. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_LZO=1
  2946. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_COMP_STUB=1
  2947. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_COMP_STUBv2=1
  2948. Tue Jan 31 20:28:13 2017 us=589708 83.174.222.80 peer info: IV_TCPNL=1
  2949. Tue Jan 31 20:28:13 2017 us=589708 MULTI: multi_create_instance called
  2950. Tue Jan 31 20:28:13 2017 us=589708 85.192.131.80 Re-using SSL/TLS context
  2951. Tue Jan 31 20:28:13 2017 us=589708 85.192.131.80 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  2952. Tue Jan 31 20:28:13 2017 us=589708 85.192.131.80 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  2953. Tue Jan 31 20:28:13 2017 us=589708 85.192.131.80 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  2954. Tue Jan 31 20:28:13 2017 us=589708 85.192.131.80 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  2955. Tue Jan 31 20:28:13 2017 us=589708 85.192.131.80 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.80:58810, sid=567d9cd5 4d36afd6
  2956. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_VER=2.4.0
  2957. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_PLAT=win
  2958. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_PROTO=2
  2959. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_NCP=2
  2960. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_LZ4=1
  2961. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_LZ4v2=1
  2962. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_LZO=1
  2963. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_COMP_STUB=1
  2964. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_COMP_STUBv2=1
  2965. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 peer info: IV_TCPNL=1
  2966. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_VER=2.4.0
  2967. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_PLAT=win
  2968. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_PROTO=2
  2969. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_NCP=2
  2970. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_LZ4=1
  2971. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_LZ4v2=1
  2972. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_LZO=1
  2973. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_COMP_STUB=1
  2974. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_COMP_STUBv2=1
  2975. Tue Jan 31 20:28:13 2017 us=589708 85.192.171.101 peer info: IV_TCPNL=1
  2976. Tue Jan 31 20:28:13 2017 us=589708 85.192.131.140 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2977. Tue Jan 31 20:28:13 2017 us=589708 85.192.131.140 [SevernoeMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.140:57100
  2978. Tue Jan 31 20:28:13 2017 us=589708 SevernoeMTS/85.192.131.140 MULTI_sva: pool returned IPv4=10.5.0.115, IPv6=(Not enabled)
  2979. Tue Jan 31 20:28:13 2017 us=589708 SevernoeMTS/85.192.131.140 MULTI: Learn: 10.5.0.115 -> SevernoeMTS/85.192.131.140
  2980. Tue Jan 31 20:28:13 2017 us=589708 SevernoeMTS/85.192.131.140 MULTI: primary virtual IP for SevernoeMTS/85.192.131.140: 10.5.0.115
  2981. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2982. Tue Jan 31 20:28:13 2017 us=589708 95.105.104.138 [ArlanFS] Peer Connection Initiated with [AF_INET6]::ffff:95.105.104.138:62954
  2983. Tue Jan 31 20:28:13 2017 us=589708 ArlanFS/95.105.104.138 MULTI_sva: pool returned IPv4=10.5.0.98, IPv6=(Not enabled)
  2984. Tue Jan 31 20:28:13 2017 us=589708 ArlanFS/95.105.104.138 MULTI: Learn: 10.5.0.98 -> ArlanFS/95.105.104.138
  2985. Tue Jan 31 20:28:13 2017 us=589708 ArlanFS/95.105.104.138 MULTI: primary virtual IP for ArlanFS/95.105.104.138: 10.5.0.98
  2986. Tue Jan 31 20:28:13 2017 us=589708 83.174.238.107 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2987. Tue Jan 31 20:28:13 2017 us=589708 83.174.238.107 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SharanMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  2988. Tue Jan 31 20:28:13 2017 us=589708 83.174.213.186 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2989. Tue Jan 31 20:28:13 2017 us=589708 83.174.213.186 [YazikovoFS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.213.186:53302
  2990. Tue Jan 31 20:28:13 2017 us=589708 YazikovoFS/83.174.213.186 MULTI_sva: pool returned IPv4=10.5.0.43, IPv6=(Not enabled)
  2991. Tue Jan 31 20:28:13 2017 us=589708 YazikovoFS/83.174.213.186 MULTI: Learn: 10.5.0.43 -> YazikovoFS/83.174.213.186
  2992. Tue Jan 31 20:28:13 2017 us=589708 YazikovoFS/83.174.213.186 MULTI: primary virtual IP for YazikovoFS/83.174.213.186: 10.5.0.43
  2993. Tue Jan 31 20:28:13 2017 us=605371 85.192.130.217 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  2994. Tue Jan 31 20:28:13 2017 us=605371 85.192.130.217 [AsekeevoFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.217:21942
  2995. Tue Jan 31 20:28:13 2017 us=605371 AsekeevoFS2/85.192.130.217 MULTI_sva: pool returned IPv4=10.5.0.130, IPv6=(Not enabled)
  2996. Tue Jan 31 20:28:13 2017 us=605371 AsekeevoFS2/85.192.130.217 MULTI: Learn: 10.5.0.130 -> AsekeevoFS2/85.192.130.217
  2997. Tue Jan 31 20:28:13 2017 us=605371 AsekeevoFS2/85.192.130.217 MULTI: primary virtual IP for AsekeevoFS2/85.192.130.217: 10.5.0.130
  2998. Tue Jan 31 20:28:13 2017 us=605371 TockoeFS/85.192.182.110 PUSH: Received control message: 'PUSH_REQUEST'
  2999. Tue Jan 31 20:28:13 2017 us=605371 TockoeFS/85.192.182.110 SENT CONTROL [TockoeFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.96 255.255.255.0,peer-id 34,cipher AES-256-GCM' (status=1)
  3000. Tue Jan 31 20:28:13 2017 us=605371 TockoeFS/85.192.182.110 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3001. Tue Jan 31 20:28:13 2017 us=605371 TockoeFS/85.192.182.110 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3002. Tue Jan 31 20:28:13 2017 us=605371 TockoeFS/85.192.182.110 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3003. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_VER=2.4.0
  3004. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_PLAT=win
  3005. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_PROTO=2
  3006. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_NCP=2
  3007. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_LZ4=1
  3008. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_LZ4v2=1
  3009. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_LZO=1
  3010. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_COMP_STUB=1
  3011. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_COMP_STUBv2=1
  3012. Tue Jan 31 20:28:13 2017 us=620994 62.133.173.160 peer info: IV_TCPNL=1
  3013. Tue Jan 31 20:28:13 2017 us=620994 85.192.171.101 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3014. Tue Jan 31 20:28:13 2017 us=620994 85.192.171.101 [GrachevkaES] Peer Connection Initiated with [AF_INET6]::ffff:85.192.171.101:60659
  3015. Tue Jan 31 20:28:13 2017 us=620994 GrachevkaES/85.192.171.101 MULTI_sva: pool returned IPv4=10.5.0.80, IPv6=(Not enabled)
  3016. Tue Jan 31 20:28:13 2017 us=620994 GrachevkaES/85.192.171.101 MULTI: Learn: 10.5.0.80 -> GrachevkaES/85.192.171.101
  3017. Tue Jan 31 20:28:13 2017 us=620994 GrachevkaES/85.192.171.101 MULTI: primary virtual IP for GrachevkaES/85.192.171.101: 10.5.0.80
  3018. Tue Jan 31 20:28:13 2017 us=620994 MULTI: multi_create_instance called
  3019. Tue Jan 31 20:28:13 2017 us=620994 85.192.131.101 Re-using SSL/TLS context
  3020. Tue Jan 31 20:28:13 2017 us=620994 85.192.131.101 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3021. Tue Jan 31 20:28:13 2017 us=620994 85.192.131.101 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3022. Tue Jan 31 20:28:13 2017 us=620994 85.192.131.101 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3023. Tue Jan 31 20:28:13 2017 us=620994 85.192.131.101 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3024. Tue Jan 31 20:28:13 2017 us=620994 85.192.131.101 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.101:59920, sid=da838d60 86ffe9a0
  3025. Tue Jan 31 20:28:13 2017 us=620994 MULTI: multi_create_instance called
  3026. Tue Jan 31 20:28:13 2017 us=620994 62.133.168.234 Re-using SSL/TLS context
  3027. Tue Jan 31 20:28:13 2017 us=620994 62.133.168.234 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3028. Tue Jan 31 20:28:13 2017 us=620994 62.133.168.234 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3029. Tue Jan 31 20:28:13 2017 us=620994 62.133.168.234 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3030. Tue Jan 31 20:28:13 2017 us=620994 62.133.168.234 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3031. Tue Jan 31 20:28:13 2017 us=620994 62.133.168.234 TLS: Initial packet from [AF_INET6]::ffff:62.133.168.234:24779, sid=d4f86cfd c418ffa0
  3032. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_VER=2.4.0
  3033. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_PLAT=win
  3034. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_PROTO=2
  3035. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_NCP=2
  3036. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_LZ4=1
  3037. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_LZ4v2=1
  3038. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_LZO=1
  3039. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_COMP_STUB=1
  3040. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_COMP_STUBv2=1
  3041. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.64 peer info: IV_TCPNL=1
  3042. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.178 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3043. Tue Jan 31 20:28:13 2017 us=636594 85.192.130.178 [Tockoe2MTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.178:18545
  3044. Tue Jan 31 20:28:13 2017 us=636594 Tockoe2MTS/85.192.130.178 MULTI_sva: pool returned IPv4=10.5.0.94, IPv6=(Not enabled)
  3045. Tue Jan 31 20:28:13 2017 us=636594 Tockoe2MTS/85.192.130.178 MULTI: Learn: 10.5.0.94 -> Tockoe2MTS/85.192.130.178
  3046. Tue Jan 31 20:28:13 2017 us=636594 Tockoe2MTS/85.192.130.178 MULTI: primary virtual IP for Tockoe2MTS/85.192.130.178: 10.5.0.94
  3047. Tue Jan 31 20:28:13 2017 us=636594 85.192.141.228 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3048. Tue Jan 31 20:28:13 2017 us=636594 85.192.141.228 [BeliaevkaMTS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.141.228:21064
  3049. Tue Jan 31 20:28:13 2017 us=636594 BeliaevkaMTS2/85.192.141.228 MULTI_sva: pool returned IPv4=10.5.0.50, IPv6=(Not enabled)
  3050. Tue Jan 31 20:28:13 2017 us=636594 BeliaevkaMTS2/85.192.141.228 MULTI: Learn: 10.5.0.50 -> BeliaevkaMTS2/85.192.141.228
  3051. Tue Jan 31 20:28:13 2017 us=636594 BeliaevkaMTS2/85.192.141.228 MULTI: primary virtual IP for BeliaevkaMTS2/85.192.141.228: 10.5.0.50
  3052. Tue Jan 31 20:28:13 2017 us=636594 83.174.222.80 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3053. Tue Jan 31 20:28:13 2017 us=636594 83.174.222.80 [DavlekanovoMTS2] Peer Connection Initiated with [AF_INET6]::ffff:83.174.222.80:18999
  3054. Tue Jan 31 20:28:13 2017 us=636594 DavlekanovoMTS2/83.174.222.80 MULTI_sva: pool returned IPv4=10.5.0.4, IPv6=(Not enabled)
  3055. Tue Jan 31 20:28:13 2017 us=636594 DavlekanovoMTS2/83.174.222.80 MULTI: Learn: 10.5.0.4 -> DavlekanovoMTS2/83.174.222.80
  3056. Tue Jan 31 20:28:13 2017 us=636594 DavlekanovoMTS2/83.174.222.80 MULTI: primary virtual IP for DavlekanovoMTS2/83.174.222.80: 10.5.0.4
  3057. Tue Jan 31 20:28:13 2017 us=652255 MULTI: multi_create_instance called
  3058. Tue Jan 31 20:28:13 2017 us=652255 77.94.104.55 Re-using SSL/TLS context
  3059. Tue Jan 31 20:28:13 2017 us=652255 77.94.104.55 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3060. Tue Jan 31 20:28:13 2017 us=652255 77.94.104.55 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3061. Tue Jan 31 20:28:13 2017 us=652255 77.94.104.55 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3062. Tue Jan 31 20:28:13 2017 us=652255 77.94.104.55 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3063. Tue Jan 31 20:28:13 2017 us=652255 77.94.104.55 TLS: Initial packet from [AF_INET6]::ffff:77.94.104.55:14638, sid=db95ea7f 71155843
  3064. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_VER=2.4.0
  3065. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_PLAT=win
  3066. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_PROTO=2
  3067. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_NCP=2
  3068. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_LZ4=1
  3069. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_LZ4v2=1
  3070. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_LZO=1
  3071. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_COMP_STUB=1
  3072. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_COMP_STUBv2=1
  3073. Tue Jan 31 20:28:13 2017 us=652255 85.192.156.156 peer info: IV_TCPNL=1
  3074. Tue Jan 31 20:28:13 2017 us=652255 85.192.131.140 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3075. Tue Jan 31 20:28:13 2017 us=652255 85.192.131.140 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SevernoeFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3076. Tue Jan 31 20:28:13 2017 us=652255 OrskEkspressFS/85.192.179.42 PUSH: Received control message: 'PUSH_REQUEST'
  3077. Tue Jan 31 20:28:13 2017 us=652255 OrskEkspressFS/85.192.179.42 SENT CONTROL [OrskEkspressFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.74 255.255.255.0,peer-id 45,cipher AES-256-GCM' (status=1)
  3078. Tue Jan 31 20:28:13 2017 us=652255 OrskEkspressFS/85.192.179.42 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3079. Tue Jan 31 20:28:13 2017 us=652255 OrskEkspressFS/85.192.179.42 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3080. Tue Jan 31 20:28:13 2017 us=652255 OrskEkspressFS/85.192.179.42 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3081. Tue Jan 31 20:28:13 2017 us=652255 MULTI: multi_create_instance called
  3082. Tue Jan 31 20:28:13 2017 us=652255 85.192.167.58 Re-using SSL/TLS context
  3083. Tue Jan 31 20:28:13 2017 us=667841 85.192.167.58 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3084. Tue Jan 31 20:28:13 2017 us=667841 85.192.167.58 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3085. Tue Jan 31 20:28:13 2017 us=667841 85.192.167.58 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3086. Tue Jan 31 20:28:13 2017 us=667841 85.192.167.58 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3087. Tue Jan 31 20:28:13 2017 us=667841 85.192.167.58 TLS: Initial packet from [AF_INET6]::ffff:85.192.167.58:52350, sid=e3f249f3 c170ca1f
  3088. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_VER=2.4.0
  3089. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_PLAT=win
  3090. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_PROTO=2
  3091. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_NCP=2
  3092. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_LZ4=1
  3093. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_LZ4v2=1
  3094. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_LZO=1
  3095. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_COMP_STUB=1
  3096. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_COMP_STUBv2=1
  3097. Tue Jan 31 20:28:13 2017 us=667841 83.174.226.113 peer info: IV_TCPNL=1
  3098. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_VER=2.4.0
  3099. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_PLAT=win
  3100. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_PROTO=2
  3101. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_NCP=2
  3102. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_LZ4=1
  3103. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_LZ4v2=1
  3104. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_LZO=1
  3105. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_COMP_STUB=1
  3106. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_COMP_STUBv2=1
  3107. Tue Jan 31 20:28:13 2017 us=667841 83.174.218.234 peer info: IV_TCPNL=1
  3108. Tue Jan 31 20:28:13 2017 us=667841 PonomarevkaMTS/85.192.131.83 PUSH: Received control message: 'PUSH_REQUEST'
  3109. Tue Jan 31 20:28:13 2017 us=667841 PonomarevkaMTS/85.192.131.83 SENT CONTROL [PonomarevkaMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.127 255.255.255.0,peer-id 29' (status=1)
  3110. Tue Jan 31 20:28:13 2017 us=683464 MULTI: multi_create_instance called
  3111. Tue Jan 31 20:28:13 2017 us=683464 195.58.16.205 Re-using SSL/TLS context
  3112. Tue Jan 31 20:28:13 2017 us=683464 195.58.16.205 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3113. Tue Jan 31 20:28:13 2017 us=683464 195.58.16.205 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3114. Tue Jan 31 20:28:13 2017 us=683464 195.58.16.205 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3115. Tue Jan 31 20:28:13 2017 us=683464 195.58.16.205 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3116. Tue Jan 31 20:28:13 2017 us=683464 195.58.16.205 TLS: Initial packet from [AF_INET6]::ffff:195.58.16.205:65277, sid=747fc551 a0cf22da
  3117. Tue Jan 31 20:28:13 2017 us=683464 85.192.128.210 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3118. Tue Jan 31 20:28:13 2017 us=683464 85.192.128.210 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=NovosergievkaT2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3119. Tue Jan 31 20:28:13 2017 us=683464 85.192.130.64 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3120. Tue Jan 31 20:28:13 2017 us=683464 85.192.130.64 [PleshanovoFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.130.64:27823
  3121. Tue Jan 31 20:28:13 2017 us=683464 PleshanovoFS2/85.192.130.64 MULTI_sva: pool returned IPv4=10.5.0.85, IPv6=(Not enabled)
  3122. Tue Jan 31 20:28:13 2017 us=683464 PleshanovoFS2/85.192.130.64 MULTI: Learn: 10.5.0.85 -> PleshanovoFS2/85.192.130.64
  3123. Tue Jan 31 20:28:13 2017 us=683464 PleshanovoFS2/85.192.130.64 MULTI: primary virtual IP for PleshanovoFS2/85.192.130.64: 10.5.0.85
  3124. Tue Jan 31 20:28:13 2017 us=699087 85.192.154.178 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3125. Tue Jan 31 20:28:13 2017 us=699087 85.192.154.178 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Orsk5FS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3126. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_VER=2.4.0
  3127. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_PLAT=win
  3128. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_PROTO=2
  3129. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_NCP=2
  3130. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_LZ4=1
  3131. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_LZ4v2=1
  3132. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_LZO=1
  3133. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_COMP_STUB=1
  3134. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_COMP_STUBv2=1
  3135. Tue Jan 31 20:28:13 2017 us=699087 83.174.238.107 peer info: IV_TCPNL=1
  3136. Tue Jan 31 20:28:13 2017 us=699087 85.192.131.101 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3137. Tue Jan 31 20:28:13 2017 us=699087 85.192.131.101 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KvarkenoFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3138. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_VER=2.4.0
  3139. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_PLAT=win
  3140. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_PROTO=2
  3141. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_NCP=2
  3142. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_LZ4=1
  3143. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_LZ4v2=1
  3144. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_LZO=1
  3145. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_COMP_STUB=1
  3146. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_COMP_STUBv2=1
  3147. Tue Jan 31 20:28:13 2017 us=699087 83.174.221.250 peer info: IV_TCPNL=1
  3148. Tue Jan 31 20:28:13 2017 us=699087 KurmanaevkaFS2/85.192.167.58 PUSH: Received control message: 'PUSH_REQUEST'
  3149. Tue Jan 31 20:28:13 2017 us=699087 KurmanaevkaFS2/85.192.167.58 SENT CONTROL [KurmanaevkaFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.122 255.255.255.0,peer-id 35,cipher AES-256-GCM' (status=1)
  3150. Tue Jan 31 20:28:13 2017 us=699087 KurmanaevkaFS2/85.192.167.58 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3151. Tue Jan 31 20:28:13 2017 us=699087 KurmanaevkaFS2/85.192.167.58 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3152. Tue Jan 31 20:28:13 2017 us=699087 KurmanaevkaFS2/85.192.167.58 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3153. Tue Jan 31 20:28:13 2017 us=699087 AlexandrovkaFS2/85.192.131.237 PUSH: Received control message: 'PUSH_REQUEST'
  3154. Tue Jan 31 20:28:13 2017 us=699087 AlexandrovkaFS2/85.192.131.237 SENT CONTROL [AlexandrovkaFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.126 255.255.255.0,peer-id 38,cipher AES-256-GCM' (status=1)
  3155. Tue Jan 31 20:28:13 2017 us=699087 AlexandrovkaFS2/85.192.131.237 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3156. Tue Jan 31 20:28:13 2017 us=699087 AlexandrovkaFS2/85.192.131.237 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3157. Tue Jan 31 20:28:13 2017 us=699087 AlexandrovkaFS2/85.192.131.237 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3158. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_VER=2.4.0
  3159. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_PLAT=win
  3160. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_PROTO=2
  3161. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_NCP=2
  3162. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_LZ4=1
  3163. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_LZ4v2=1
  3164. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_LZO=1
  3165. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_COMP_STUB=1
  3166. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_COMP_STUBv2=1
  3167. Tue Jan 31 20:28:13 2017 us=714708 85.192.131.140 peer info: IV_TCPNL=1
  3168. Tue Jan 31 20:28:13 2017 us=714708 85.192.167.58 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3169. Tue Jan 31 20:28:13 2017 us=714708 85.192.167.58 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KurmanaevkaT2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3170. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.80 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3171. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.80 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=PonomarevkaFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3172. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_VER=2.4.0
  3173. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_PLAT=win
  3174. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_PROTO=2
  3175. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_NCP=2
  3176. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_LZ4=1
  3177. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_LZ4v2=1
  3178. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_LZO=1
  3179. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_COMP_STUB=1
  3180. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_COMP_STUBv2=1
  3181. Tue Jan 31 20:28:13 2017 us=730333 85.192.131.101 peer info: IV_TCPNL=1
  3182. Tue Jan 31 20:28:13 2017 us=730333 AdamovkaMTS2/85.192.132.111 PUSH: Received control message: 'PUSH_REQUEST'
  3183. Tue Jan 31 20:28:13 2017 us=730333 AdamovkaMTS2/85.192.132.111 SENT CONTROL [AdamovkaMTS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.46 255.255.255.0,peer-id 42,cipher AES-256-GCM' (status=1)
  3184. Tue Jan 31 20:28:13 2017 us=730333 AdamovkaMTS2/85.192.132.111 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3185. Tue Jan 31 20:28:13 2017 us=730333 AdamovkaMTS2/85.192.132.111 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3186. Tue Jan 31 20:28:13 2017 us=730333 AdamovkaMTS2/85.192.132.111 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3187. Tue Jan 31 20:28:13 2017 us=745960 195.58.16.205 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3188. Tue Jan 31 20:28:13 2017 us=745960 195.58.16.205 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Passag2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3189. Tue Jan 31 20:28:13 2017 us=745960 62.133.173.160 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3190. Tue Jan 31 20:28:13 2017 us=745960 62.133.173.160 [SharanFS] Peer Connection Initiated with [AF_INET6]::ffff:62.133.173.160:50407
  3191. Tue Jan 31 20:28:13 2017 us=745960 SharanFS/62.133.173.160 MULTI_sva: pool returned IPv4=10.5.0.35, IPv6=(Not enabled)
  3192. Tue Jan 31 20:28:13 2017 us=745960 SharanFS/62.133.173.160 MULTI: Learn: 10.5.0.35 -> SharanFS/62.133.173.160
  3193. Tue Jan 31 20:28:13 2017 us=745960 SharanFS/62.133.173.160 MULTI: primary virtual IP for SharanFS/62.133.173.160: 10.5.0.35
  3194. Tue Jan 31 20:28:13 2017 us=745960 MULTI: multi_create_instance called
  3195. Tue Jan 31 20:28:13 2017 us=745960 83.174.212.34 Re-using SSL/TLS context
  3196. Tue Jan 31 20:28:13 2017 us=745960 83.174.212.34 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3197. Tue Jan 31 20:28:13 2017 us=745960 83.174.212.34 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3198. Tue Jan 31 20:28:13 2017 us=745960 83.174.212.34 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3199. Tue Jan 31 20:28:13 2017 us=745960 83.174.212.34 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3200. Tue Jan 31 20:28:13 2017 us=745960 83.174.212.34 TLS: Initial packet from [AF_INET6]::ffff:83.174.212.34:65167, sid=7af2137a 6ff44aa8
  3201. Tue Jan 31 20:28:13 2017 us=745960 83.174.219.206 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3202. Tue Jan 31 20:28:13 2017 us=745960 83.174.219.206 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=KrasnoholmskiiFS, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3203. Tue Jan 31 20:28:13 2017 us=745960 83.174.221.250 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3204. Tue Jan 31 20:28:13 2017 us=745960 83.174.221.250 [RaevskiiES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.221.250:13281
  3205. Tue Jan 31 20:28:13 2017 us=745960 RaevskiiES/83.174.221.250 MULTI_sva: pool returned IPv4=10.5.0.26, IPv6=(Not enabled)
  3206. Tue Jan 31 20:28:13 2017 us=745960 RaevskiiES/83.174.221.250 MULTI: Learn: 10.5.0.26 -> RaevskiiES/83.174.221.250
  3207. Tue Jan 31 20:28:13 2017 us=745960 RaevskiiES/83.174.221.250 MULTI: primary virtual IP for RaevskiiES/83.174.221.250: 10.5.0.26
  3208. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_VER=2.4.0
  3209. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_PLAT=win
  3210. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_PROTO=2
  3211. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_NCP=2
  3212. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_LZ4=1
  3213. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_LZ4v2=1
  3214. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_LZO=1
  3215. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_COMP_STUB=1
  3216. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_COMP_STUBv2=1
  3217. Tue Jan 31 20:28:13 2017 us=745960 85.192.167.58 peer info: IV_TCPNL=1
  3218. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_VER=2.4.0
  3219. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_PLAT=win
  3220. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_PROTO=2
  3221. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_NCP=2
  3222. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_LZ4=1
  3223. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_LZ4v2=1
  3224. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_LZO=1
  3225. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_COMP_STUB=1
  3226. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_COMP_STUBv2=1
  3227. Tue Jan 31 20:28:13 2017 us=745960 85.192.128.210 peer info: IV_TCPNL=1
  3228. Tue Jan 31 20:28:13 2017 us=761588 85.192.131.101 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3229. Tue Jan 31 20:28:13 2017 us=761588 85.192.131.101 [KvarkenoFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.101:59920
  3230. Tue Jan 31 20:28:13 2017 us=761588 KvarkenoFS2/85.192.131.101 MULTI_sva: pool returned IPv4=10.5.0.56, IPv6=(Not enabled)
  3231. Tue Jan 31 20:28:13 2017 us=761588 KvarkenoFS2/85.192.131.101 MULTI: Learn: 10.5.0.56 -> KvarkenoFS2/85.192.131.101
  3232. Tue Jan 31 20:28:13 2017 us=761588 KvarkenoFS2/85.192.131.101 MULTI: primary virtual IP for KvarkenoFS2/85.192.131.101: 10.5.0.56
  3233. Tue Jan 31 20:28:13 2017 us=761588 85.192.131.140 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3234. Tue Jan 31 20:28:13 2017 us=761588 85.192.131.140 [SevernoeFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.140:57853
  3235. Tue Jan 31 20:28:13 2017 us=761588 SevernoeFS2/85.192.131.140 MULTI_sva: pool returned IPv4=10.5.0.116, IPv6=(Not enabled)
  3236. Tue Jan 31 20:28:13 2017 us=761588 SevernoeFS2/85.192.131.140 MULTI: Learn: 10.5.0.116 -> SevernoeFS2/85.192.131.140
  3237. Tue Jan 31 20:28:13 2017 us=761588 SevernoeFS2/85.192.131.140 MULTI: primary virtual IP for SevernoeFS2/85.192.131.140: 10.5.0.116
  3238. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_VER=2.4.0
  3239. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_PLAT=win
  3240. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_PROTO=2
  3241. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_NCP=2
  3242. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_LZ4=1
  3243. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_LZ4v2=1
  3244. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_LZO=1
  3245. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_COMP_STUB=1
  3246. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_COMP_STUBv2=1
  3247. Tue Jan 31 20:28:13 2017 us=761588 195.58.16.205 peer info: IV_TCPNL=1
  3248. Tue Jan 31 20:28:13 2017 us=761588 83.174.226.113 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3249. Tue Jan 31 20:28:13 2017 us=761588 83.174.226.113 [FedorovkaFS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.226.113:17559
  3250. Tue Jan 31 20:28:13 2017 us=761588 FedorovkaFS/83.174.226.113 MULTI_sva: pool returned IPv4=10.5.0.38, IPv6=(Not enabled)
  3251. Tue Jan 31 20:28:13 2017 us=761588 FedorovkaFS/83.174.226.113 MULTI: Learn: 10.5.0.38 -> FedorovkaFS/83.174.226.113
  3252. Tue Jan 31 20:28:13 2017 us=761588 FedorovkaFS/83.174.226.113 MULTI: primary virtual IP for FedorovkaFS/83.174.226.113: 10.5.0.38
  3253. Tue Jan 31 20:28:13 2017 us=761588 77.94.104.55 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3254. Tue Jan 31 20:28:13 2017 us=761588 77.94.104.55 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=ChishmiES2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3255. Tue Jan 31 20:28:13 2017 us=761588 KuvandikMTS/85.192.130.212 PUSH: Received control message: 'PUSH_REQUEST'
  3256. Tue Jan 31 20:28:13 2017 us=777208 KuvandikMTS/85.192.130.212 SENT CONTROL [KuvandikMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.60 255.255.255.0,peer-id 37,cipher AES-256-GCM' (status=1)
  3257. Tue Jan 31 20:28:13 2017 us=777208 KuvandikMTS/85.192.130.212 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3258. Tue Jan 31 20:28:13 2017 us=777208 KuvandikMTS/85.192.130.212 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3259. Tue Jan 31 20:28:13 2017 us=777208 KuvandikMTS/85.192.130.212 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3260. Tue Jan 31 20:28:13 2017 us=777208 83.174.238.107 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3261. Tue Jan 31 20:28:13 2017 us=777208 83.174.238.107 [SharanMTS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.238.107:19170
  3262. Tue Jan 31 20:28:13 2017 us=777208 SharanMTS/83.174.238.107 MULTI_sva: pool returned IPv4=10.5.0.37, IPv6=(Not enabled)
  3263. Tue Jan 31 20:28:13 2017 us=777208 SharanMTS/83.174.238.107 MULTI: Learn: 10.5.0.37 -> SharanMTS/83.174.238.107
  3264. Tue Jan 31 20:28:13 2017 us=777208 SharanMTS/83.174.238.107 MULTI: primary virtual IP for SharanMTS/83.174.238.107: 10.5.0.37
  3265. Tue Jan 31 20:28:13 2017 us=777208 85.192.156.156 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3266. Tue Jan 31 20:28:13 2017 us=777208 85.192.156.156 [MednogorskMTS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.156.156:11828
  3267. Tue Jan 31 20:28:13 2017 us=777208 MednogorskMTS2/85.192.156.156 MULTI_sva: pool returned IPv4=10.5.0.63, IPv6=(Not enabled)
  3268. Tue Jan 31 20:28:13 2017 us=777208 MednogorskMTS2/85.192.156.156 MULTI: Learn: 10.5.0.63 -> MednogorskMTS2/85.192.156.156
  3269. Tue Jan 31 20:28:13 2017 us=777208 MednogorskMTS2/85.192.156.156 MULTI: primary virtual IP for MednogorskMTS2/85.192.156.156: 10.5.0.63
  3270. Tue Jan 31 20:28:13 2017 us=777208 83.174.218.234 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3271. Tue Jan 31 20:28:13 2017 us=777208 83.174.218.234 [ErmekeevoFS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.218.234:12956
  3272. Tue Jan 31 20:28:13 2017 us=777208 ErmekeevoFS/83.174.218.234 MULTI_sva: pool returned IPv4=10.5.0.11, IPv6=(Not enabled)
  3273. Tue Jan 31 20:28:13 2017 us=777208 ErmekeevoFS/83.174.218.234 MULTI: Learn: 10.5.0.11 -> ErmekeevoFS/83.174.218.234
  3274. Tue Jan 31 20:28:13 2017 us=777208 ErmekeevoFS/83.174.218.234 MULTI: primary virtual IP for ErmekeevoFS/83.174.218.234: 10.5.0.11
  3275. Tue Jan 31 20:28:13 2017 us=792857 195.58.16.205 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3276. Tue Jan 31 20:28:13 2017 us=792857 195.58.16.205 [Passag2] Peer Connection Initiated with [AF_INET6]::ffff:195.58.16.205:65277
  3277. Tue Jan 31 20:28:13 2017 us=792857 Passag2/195.58.16.205 MULTI_sva: pool returned IPv4=10.5.0.6, IPv6=(Not enabled)
  3278. Tue Jan 31 20:28:13 2017 us=792857 Passag2/195.58.16.205 MULTI: Learn: 10.5.0.6 -> Passag2/195.58.16.205
  3279. Tue Jan 31 20:28:13 2017 us=792857 Passag2/195.58.16.205 MULTI: primary virtual IP for Passag2/195.58.16.205: 10.5.0.6
  3280. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_VER=2.4.0
  3281. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_PLAT=win
  3282. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_PROTO=2
  3283. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_NCP=2
  3284. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_LZ4=1
  3285. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_LZ4v2=1
  3286. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_LZO=1
  3287. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_COMP_STUB=1
  3288. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_COMP_STUBv2=1
  3289. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.80 peer info: IV_TCPNL=1
  3290. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.129 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3291. Tue Jan 31 20:28:13 2017 us=792857 85.192.131.129 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=DombarovkaMTS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3292. Tue Jan 31 20:28:13 2017 us=808459 85.192.167.58 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3293. Tue Jan 31 20:28:13 2017 us=808459 85.192.167.58 [KurmanaevkaT2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.167.58:52350
  3294. Tue Jan 31 20:28:13 2017 us=808459 KurmanaevkaT2/85.192.167.58 MULTI_sva: pool returned IPv4=10.5.0.119, IPv6=(Not enabled)
  3295. Tue Jan 31 20:28:13 2017 us=808459 KurmanaevkaT2/85.192.167.58 MULTI: Learn: 10.5.0.119 -> KurmanaevkaT2/85.192.167.58
  3296. Tue Jan 31 20:28:13 2017 us=808459 KurmanaevkaT2/85.192.167.58 MULTI: primary virtual IP for KurmanaevkaT2/85.192.167.58: 10.5.0.119
  3297. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_VER=2.4.0
  3298. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_PLAT=win
  3299. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_PROTO=2
  3300. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_NCP=2
  3301. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_LZ4=1
  3302. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_LZ4v2=1
  3303. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_LZO=1
  3304. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_COMP_STUB=1
  3305. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_COMP_STUBv2=1
  3306. Tue Jan 31 20:28:13 2017 us=808459 85.192.131.137 peer info: IV_TCPNL=1
  3307. Tue Jan 31 20:28:13 2017 us=824109 62.133.168.234 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3308. Tue Jan 31 20:28:13 2017 us=824109 62.133.168.234 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=BuzdakES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3309. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_VER=2.4.0
  3310. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_PLAT=win
  3311. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_PROTO=2
  3312. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_NCP=2
  3313. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_LZ4=1
  3314. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_LZ4v2=1
  3315. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_LZO=1
  3316. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_COMP_STUB=1
  3317. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_COMP_STUBv2=1
  3318. Tue Jan 31 20:28:13 2017 us=824109 77.94.104.55 peer info: IV_TCPNL=1
  3319. Tue Jan 31 20:28:13 2017 us=824109 85.192.128.210 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3320. Tue Jan 31 20:28:13 2017 us=824109 85.192.128.210 [NovosergievkaT2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.128.210:13113
  3321. Tue Jan 31 20:28:13 2017 us=824109 NovosergievkaT2/85.192.128.210 MULTI_sva: pool returned IPv4=10.5.0.45, IPv6=(Not enabled)
  3322. Tue Jan 31 20:28:13 2017 us=824109 NovosergievkaT2/85.192.128.210 MULTI: Learn: 10.5.0.45 -> NovosergievkaT2/85.192.128.210
  3323. Tue Jan 31 20:28:13 2017 us=824109 NovosergievkaT2/85.192.128.210 MULTI: primary virtual IP for NovosergievkaT2/85.192.128.210: 10.5.0.45
  3324. Tue Jan 31 20:28:13 2017 us=839715 85.192.131.80 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3325. Tue Jan 31 20:28:13 2017 us=839715 85.192.131.80 [PonomarevkaFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.80:58810
  3326. Tue Jan 31 20:28:13 2017 us=839715 PonomarevkaFS/85.192.131.80 MULTI_sva: pool returned IPv4=10.5.0.132, IPv6=(Not enabled)
  3327. Tue Jan 31 20:28:13 2017 us=839715 PonomarevkaFS/85.192.131.80 MULTI: Learn: 10.5.0.132 -> PonomarevkaFS/85.192.131.80
  3328. Tue Jan 31 20:28:13 2017 us=839715 PonomarevkaFS/85.192.131.80 MULTI: primary virtual IP for PonomarevkaFS/85.192.131.80: 10.5.0.132
  3329. Tue Jan 31 20:28:13 2017 us=871153 77.94.104.55 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3330. Tue Jan 31 20:28:13 2017 us=871153 77.94.104.55 [ChishmiES2] Peer Connection Initiated with [AF_INET6]::ffff:77.94.104.55:14638
  3331. Tue Jan 31 20:28:13 2017 us=871153 ChishmiES2/77.94.104.55 MULTI_sva: pool returned IPv4=10.5.0.34, IPv6=(Not enabled)
  3332. Tue Jan 31 20:28:13 2017 us=871153 ChishmiES2/77.94.104.55 MULTI: Learn: 10.5.0.34 -> ChishmiES2/77.94.104.55
  3333. Tue Jan 31 20:28:13 2017 us=871153 ChishmiES2/77.94.104.55 MULTI: primary virtual IP for ChishmiES2/77.94.104.55: 10.5.0.34
  3334. Tue Jan 31 20:28:13 2017 us=886628 JuzniiMTS/79.140.20.2 PUSH: Received control message: 'PUSH_REQUEST'
  3335. Tue Jan 31 20:28:13 2017 us=886628 JuzniiMTS/79.140.20.2 SENT CONTROL [JuzniiMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.106 255.255.255.0,peer-id 43,cipher AES-256-GCM' (status=1)
  3336. Tue Jan 31 20:28:13 2017 us=886628 JuzniiMTS/79.140.20.2 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3337. Tue Jan 31 20:28:13 2017 us=886628 JuzniiMTS/79.140.20.2 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3338. Tue Jan 31 20:28:13 2017 us=886628 JuzniiMTS/79.140.20.2 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3339. Tue Jan 31 20:28:13 2017 us=886628 AkbulakFS/85.192.129.248 PUSH: Received control message: 'PUSH_REQUEST'
  3340. Tue Jan 31 20:28:13 2017 us=886628 AkbulakFS/85.192.129.248 SENT CONTROL [AkbulakFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.99 255.255.255.0,peer-id 44,cipher AES-256-GCM' (status=1)
  3341. Tue Jan 31 20:28:13 2017 us=886628 AkbulakFS/85.192.129.248 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3342. Tue Jan 31 20:28:13 2017 us=886628 AkbulakFS/85.192.129.248 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3343. Tue Jan 31 20:28:13 2017 us=886628 AkbulakFS/85.192.129.248 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3344. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_VER=2.4.0
  3345. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_PLAT=win
  3346. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_PROTO=2
  3347. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_NCP=2
  3348. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_LZ4=1
  3349. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_LZ4v2=1
  3350. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_LZO=1
  3351. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_COMP_STUB=1
  3352. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_COMP_STUBv2=1
  3353. Tue Jan 31 20:28:13 2017 us=886628 83.174.219.206 peer info: IV_TCPNL=1
  3354. Tue Jan 31 20:28:13 2017 us=886628 MULTI: multi_create_instance called
  3355. Tue Jan 31 20:28:13 2017 us=886628 83.174.208.78 Re-using SSL/TLS context
  3356. Tue Jan 31 20:28:13 2017 us=886628 83.174.208.78 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3357. Tue Jan 31 20:28:13 2017 us=886628 83.174.208.78 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3358. Tue Jan 31 20:28:13 2017 us=886628 83.174.208.78 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3359. Tue Jan 31 20:28:13 2017 us=886628 83.174.208.78 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3360. Tue Jan 31 20:28:13 2017 us=886628 83.174.208.78 TLS: Initial packet from [AF_INET6]::ffff:83.174.208.78:29949, sid=2baea92c 279fe0a6
  3361. Tue Jan 31 20:28:13 2017 us=902212 MULTI: multi_create_instance called
  3362. Tue Jan 31 20:28:13 2017 us=902212 83.174.230.175 Re-using SSL/TLS context
  3363. Tue Jan 31 20:28:13 2017 us=902212 83.174.230.175 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3364. Tue Jan 31 20:28:13 2017 us=902212 83.174.230.175 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3365. Tue Jan 31 20:28:13 2017 us=902212 83.174.230.175 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3366. Tue Jan 31 20:28:13 2017 us=902212 83.174.230.175 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3367. Tue Jan 31 20:28:13 2017 us=902212 83.174.230.175 TLS: Initial packet from [AF_INET6]::ffff:83.174.230.175:17640, sid=6c8657b8 8de7e56e
  3368. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_VER=2.4.0
  3369. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_PLAT=win
  3370. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_PROTO=2
  3371. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_NCP=2
  3372. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_LZ4=1
  3373. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_LZ4v2=1
  3374. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_LZO=1
  3375. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_COMP_STUB=1
  3376. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_COMP_STUBv2=1
  3377. Tue Jan 31 20:28:13 2017 us=917911 62.133.168.234 peer info: IV_TCPNL=1
  3378. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_VER=2.4.0
  3379. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_PLAT=win
  3380. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_PROTO=2
  3381. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_NCP=2
  3382. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_LZ4=1
  3383. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_LZ4v2=1
  3384. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_LZO=1
  3385. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_COMP_STUB=1
  3386. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_COMP_STUBv2=1
  3387. Tue Jan 31 20:28:13 2017 us=917911 85.192.154.178 peer info: IV_TCPNL=1
  3388. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_VER=2.4.0
  3389. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_PLAT=win
  3390. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_PROTO=2
  3391. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_NCP=2
  3392. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_LZ4=1
  3393. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_LZ4v2=1
  3394. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_LZO=1
  3395. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_COMP_STUB=1
  3396. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_COMP_STUBv2=1
  3397. Tue Jan 31 20:28:13 2017 us=933495 85.192.131.129 peer info: IV_TCPNL=1
  3398. Tue Jan 31 20:28:13 2017 us=933495 BelebeiFS/83.174.224.221 PUSH: Received control message: 'PUSH_REQUEST'
  3399. Tue Jan 31 20:28:13 2017 us=933495 BelebeiFS/83.174.224.221 SENT CONTROL [BelebeiFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.2 255.255.255.0,peer-id 36,cipher AES-256-GCM' (status=1)
  3400. Tue Jan 31 20:28:13 2017 us=933495 BelebeiFS/83.174.224.221 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3401. Tue Jan 31 20:28:13 2017 us=933495 BelebeiFS/83.174.224.221 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3402. Tue Jan 31 20:28:13 2017 us=933495 BelebeiFS/83.174.224.221 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3403. Tue Jan 31 20:28:13 2017 us=933495 PleshanovoMTS/85.192.130.251 PUSH: Received control message: 'PUSH_REQUEST'
  3404. Tue Jan 31 20:28:13 2017 us=933495 PleshanovoMTS/85.192.130.251 SENT CONTROL [PleshanovoMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.88 255.255.255.0,peer-id 40,cipher AES-256-GCM' (status=1)
  3405. Tue Jan 31 20:28:13 2017 us=933495 PleshanovoMTS/85.192.130.251 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3406. Tue Jan 31 20:28:13 2017 us=933495 PleshanovoMTS/85.192.130.251 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3407. Tue Jan 31 20:28:13 2017 us=933495 PleshanovoMTS/85.192.130.251 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3408. Tue Jan 31 20:28:13 2017 us=964724 83.174.212.34 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3409. Tue Jan 31 20:28:13 2017 us=964724 83.174.212.34 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=ArhangelskoyeMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3410. Tue Jan 31 20:28:13 2017 us=964724 MULTI: multi_create_instance called
  3411. Tue Jan 31 20:28:13 2017 us=964724 85.192.131.83 Re-using SSL/TLS context
  3412. Tue Jan 31 20:28:13 2017 us=964724 85.192.131.83 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3413. Tue Jan 31 20:28:13 2017 us=964724 85.192.131.83 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3414. Tue Jan 31 20:28:13 2017 us=964724 85.192.131.83 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3415. Tue Jan 31 20:28:13 2017 us=964724 85.192.131.83 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3416. Tue Jan 31 20:28:13 2017 us=964724 85.192.131.83 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.83:54142, sid=c1c64337 1d5b4898
  3417. Tue Jan 31 20:28:13 2017 us=964724 83.174.219.206 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3418. Tue Jan 31 20:28:13 2017 us=964724 83.174.219.206 [Llocal] Peer Connection Initiated with [AF_INET6]::ffff:83.174.219.206:14709
  3419. Tue Jan 31 20:28:13 2017 us=964724 Llocal/83.174.219.206 MULTI_sva: pool returned IPv4=10.5.0.16, IPv6=(Not enabled)
  3420. Tue Jan 31 20:28:13 2017 us=964724 Llocal/83.174.219.206 MULTI: Learn: 10.5.0.16 -> Llocal/83.174.219.206
  3421. Tue Jan 31 20:28:13 2017 us=964724 Llocal/83.174.219.206 MULTI: primary virtual IP for Llocal/83.174.219.206: 10.5.0.16
  3422. Tue Jan 31 20:28:13 2017 us=980356 62.133.168.234 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3423. Tue Jan 31 20:28:13 2017 us=980356 62.133.168.234 [BuzdakES] Peer Connection Initiated with [AF_INET6]::ffff:62.133.168.234:24779
  3424. Tue Jan 31 20:28:13 2017 us=980356 BuzdakES/62.133.168.234 MULTI_sva: pool returned IPv4=10.5.0.8, IPv6=(Not enabled)
  3425. Tue Jan 31 20:28:13 2017 us=980356 BuzdakES/62.133.168.234 MULTI: Learn: 10.5.0.8 -> BuzdakES/62.133.168.234
  3426. Tue Jan 31 20:28:13 2017 us=980356 BuzdakES/62.133.168.234 MULTI: primary virtual IP for BuzdakES/62.133.168.234: 10.5.0.8
  3427. Tue Jan 31 20:28:13 2017 us=980356 AlexandrovkaMTS/85.192.131.237 PUSH: Received control message: 'PUSH_REQUEST'
  3428. Tue Jan 31 20:28:13 2017 us=980356 AlexandrovkaMTS/85.192.131.237 SENT CONTROL [AlexandrovkaMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.111 255.255.255.0,peer-id 50,cipher AES-256-GCM' (status=1)
  3429. Tue Jan 31 20:28:13 2017 us=980356 AlexandrovkaMTS/85.192.131.237 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3430. Tue Jan 31 20:28:13 2017 us=980356 AlexandrovkaMTS/85.192.131.237 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3431. Tue Jan 31 20:28:13 2017 us=980356 AlexandrovkaMTS/85.192.131.237 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3432. Tue Jan 31 20:28:13 2017 us=995986 KrasnoholmFS/85.192.131.86 PUSH: Received control message: 'PUSH_REQUEST'
  3433. Tue Jan 31 20:28:13 2017 us=995986 KrasnoholmFS/85.192.131.86 SENT CONTROL [KrasnoholmFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.83 255.255.255.0,peer-id 39,cipher AES-256-GCM' (status=1)
  3434. Tue Jan 31 20:28:13 2017 us=995986 KrasnoholmFS/85.192.131.86 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3435. Tue Jan 31 20:28:13 2017 us=995986 KrasnoholmFS/85.192.131.86 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3436. Tue Jan 31 20:28:13 2017 us=995986 KrasnoholmFS/85.192.131.86 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3437. Tue Jan 31 20:28:13 2017 us=995986 TockoeMTS/85.192.182.110 PUSH: Received control message: 'PUSH_REQUEST'
  3438. Tue Jan 31 20:28:13 2017 us=995986 TockoeMTS/85.192.182.110 SENT CONTROL [TockoeMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.93 255.255.255.0,peer-id 51,cipher AES-256-GCM' (status=1)
  3439. Tue Jan 31 20:28:13 2017 us=995986 TockoeMTS/85.192.182.110 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3440. Tue Jan 31 20:28:13 2017 us=995986 TockoeMTS/85.192.182.110 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3441. Tue Jan 31 20:28:13 2017 us=995986 TockoeMTS/85.192.182.110 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3442. Tue Jan 31 20:28:14 2017 us=27208 AbdulinoMTS/85.192.132.220 PUSH: Received control message: 'PUSH_REQUEST'
  3443. Tue Jan 31 20:28:14 2017 us=27208 AbdulinoMTS/85.192.132.220 SENT CONTROL [AbdulinoMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.112 255.255.255.0,peer-id 47,cipher AES-256-GCM' (status=1)
  3444. Tue Jan 31 20:28:14 2017 us=27208 AbdulinoMTS/85.192.132.220 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3445. Tue Jan 31 20:28:14 2017 us=27208 AbdulinoMTS/85.192.132.220 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3446. Tue Jan 31 20:28:14 2017 us=27208 AbdulinoMTS/85.192.132.220 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3447. Tue Jan 31 20:28:14 2017 us=42833 85.192.131.137 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3448. Tue Jan 31 20:28:14 2017 us=42833 85.192.131.137 [BuguruslanFS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.137:59931
  3449. Tue Jan 31 20:28:14 2017 us=42833 BuguruslanFS/85.192.131.137 MULTI_sva: pool returned IPv4=10.5.0.124, IPv6=(Not enabled)
  3450. Tue Jan 31 20:28:14 2017 us=42833 BuguruslanFS/85.192.131.137 MULTI: Learn: 10.5.0.124 -> BuguruslanFS/85.192.131.137
  3451. Tue Jan 31 20:28:14 2017 us=42833 BuguruslanFS/85.192.131.137 MULTI: primary virtual IP for BuguruslanFS/85.192.131.137: 10.5.0.124
  3452. Tue Jan 31 20:28:14 2017 us=42833 MULTI: multi_create_instance called
  3453. Tue Jan 31 20:28:14 2017 us=42833 62.133.170.52 Re-using SSL/TLS context
  3454. Tue Jan 31 20:28:14 2017 us=42833 62.133.170.52 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3455. Tue Jan 31 20:28:14 2017 us=42833 62.133.170.52 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3456. Tue Jan 31 20:28:14 2017 us=42833 62.133.170.52 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3457. Tue Jan 31 20:28:14 2017 us=42833 62.133.170.52 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3458. Tue Jan 31 20:28:14 2017 us=42833 62.133.170.52 TLS: Initial packet from [AF_INET6]::ffff:62.133.170.52:59450, sid=c62baac3 1423c818
  3459. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_VER=2.4.0
  3460. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_PLAT=win
  3461. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_PROTO=2
  3462. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_NCP=2
  3463. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_LZ4=1
  3464. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_LZ4v2=1
  3465. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_LZO=1
  3466. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_COMP_STUB=1
  3467. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_COMP_STUBv2=1
  3468. Tue Jan 31 20:28:14 2017 us=42833 83.174.212.34 peer info: IV_TCPNL=1
  3469. Tue Jan 31 20:28:14 2017 us=42833 AkbulakES/85.192.129.248 PUSH: Received control message: 'PUSH_REQUEST'
  3470. Tue Jan 31 20:28:14 2017 us=58458 AkbulakES/85.192.129.248 SENT CONTROL [AkbulakES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.101 255.255.255.0,peer-id 53,cipher AES-256-GCM' (status=1)
  3471. Tue Jan 31 20:28:14 2017 us=58458 AkbulakES/85.192.129.248 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3472. Tue Jan 31 20:28:14 2017 us=58458 AkbulakES/85.192.129.248 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3473. Tue Jan 31 20:28:14 2017 us=58458 AkbulakES/85.192.129.248 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3474. Tue Jan 31 20:28:14 2017 us=58458 NovoorskT2/85.192.129.228 PUSH: Received control message: 'PUSH_REQUEST'
  3475. Tue Jan 31 20:28:14 2017 us=58458 NovoorskT2/85.192.129.228 SENT CONTROL [NovoorskT2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.64 255.255.255.0,peer-id 55,cipher AES-256-GCM' (status=1)
  3476. Tue Jan 31 20:28:14 2017 us=58458 NovoorskT2/85.192.129.228 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3477. Tue Jan 31 20:28:14 2017 us=58458 NovoorskT2/85.192.129.228 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3478. Tue Jan 31 20:28:14 2017 us=58458 NovoorskT2/85.192.129.228 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3479. Tue Jan 31 20:28:14 2017 us=58458 83.174.208.78 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3480. Tue Jan 31 20:28:14 2017 us=58458 83.174.208.78 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SharanES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3481. Tue Jan 31 20:28:14 2017 us=58458 85.192.131.129 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3482. Tue Jan 31 20:28:14 2017 us=58458 85.192.131.129 [DombarovkaMTS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.129:58002
  3483. Tue Jan 31 20:28:14 2017 us=58458 DombarovkaMTS2/85.192.131.129 MULTI_sva: pool returned IPv4=10.5.0.52, IPv6=(Not enabled)
  3484. Tue Jan 31 20:28:14 2017 us=58458 DombarovkaMTS2/85.192.131.129 MULTI: Learn: 10.5.0.52 -> DombarovkaMTS2/85.192.131.129
  3485. Tue Jan 31 20:28:14 2017 us=58458 DombarovkaMTS2/85.192.131.129 MULTI: primary virtual IP for DombarovkaMTS2/85.192.131.129: 10.5.0.52
  3486. Tue Jan 31 20:28:14 2017 us=58458 MULTI: multi_create_instance called
  3487. Tue Jan 31 20:28:14 2017 us=58458 85.192.131.101 Re-using SSL/TLS context
  3488. Tue Jan 31 20:28:14 2017 us=58458 85.192.131.101 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3489. Tue Jan 31 20:28:14 2017 us=58458 85.192.131.101 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3490. Tue Jan 31 20:28:14 2017 us=58458 85.192.131.101 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3491. Tue Jan 31 20:28:14 2017 us=58458 85.192.131.101 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3492. Tue Jan 31 20:28:14 2017 us=58458 85.192.131.101 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.101:3963, sid=0bc61540 9fc3e1a5
  3493. Tue Jan 31 20:28:14 2017 us=58458 TashlaES2/85.192.133.99 PUSH: Received control message: 'PUSH_REQUEST'
  3494. Tue Jan 31 20:28:14 2017 us=58458 TashlaES2/85.192.133.99 SENT CONTROL [TashlaES2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.92 255.255.255.0,peer-id 49,cipher AES-256-GCM' (status=1)
  3495. Tue Jan 31 20:28:14 2017 us=58458 TashlaES2/85.192.133.99 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3496. Tue Jan 31 20:28:14 2017 us=58458 TashlaES2/85.192.133.99 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3497. Tue Jan 31 20:28:14 2017 us=58458 TashlaES2/85.192.133.99 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3498. Tue Jan 31 20:28:14 2017 us=89714 83.174.212.34 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3499. Tue Jan 31 20:28:14 2017 us=89714 83.174.212.34 [ArhangelskoyeMTS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.212.34:65167
  3500. Tue Jan 31 20:28:14 2017 us=89714 ArhangelskoyeMTS/83.174.212.34 MULTI_sva: pool returned IPv4=10.5.0.5, IPv6=(Not enabled)
  3501. Tue Jan 31 20:28:14 2017 us=89714 ArhangelskoyeMTS/83.174.212.34 MULTI: Learn: 10.5.0.5 -> ArhangelskoyeMTS/83.174.212.34
  3502. Tue Jan 31 20:28:14 2017 us=89714 ArhangelskoyeMTS/83.174.212.34 MULTI: primary virtual IP for ArhangelskoyeMTS/83.174.212.34: 10.5.0.5
  3503. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_VER=2.4.0
  3504. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_PLAT=win
  3505. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_PROTO=2
  3506. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_NCP=2
  3507. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_LZ4=1
  3508. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_LZ4v2=1
  3509. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_LZO=1
  3510. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_COMP_STUB=1
  3511. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_COMP_STUBv2=1
  3512. Tue Jan 31 20:28:14 2017 us=120986 83.174.208.78 peer info: IV_TCPNL=1
  3513. Tue Jan 31 20:28:14 2017 us=136605 AdamovkaFs/85.192.132.111 PUSH: Received control message: 'PUSH_REQUEST'
  3514. Tue Jan 31 20:28:14 2017 us=136605 AdamovkaFs/85.192.132.111 SENT CONTROL [AdamovkaFs]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.48 255.255.255.0,peer-id 41,cipher AES-256-GCM' (status=1)
  3515. Tue Jan 31 20:28:14 2017 us=136605 AdamovkaFs/85.192.132.111 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3516. Tue Jan 31 20:28:14 2017 us=136605 AdamovkaFs/85.192.132.111 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3517. Tue Jan 31 20:28:14 2017 us=136605 AdamovkaFs/85.192.132.111 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3518. Tue Jan 31 20:28:14 2017 us=136605 SakmaraFS/85.192.128.115 PUSH: Received control message: 'PUSH_REQUEST'
  3519. Tue Jan 31 20:28:14 2017 us=136605 SakmaraFS/85.192.128.115 SENT CONTROL [SakmaraFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.108 255.255.255.0,peer-id 57,cipher AES-256-GCM' (status=1)
  3520. Tue Jan 31 20:28:14 2017 us=136605 SakmaraFS/85.192.128.115 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3521. Tue Jan 31 20:28:14 2017 us=136605 SakmaraFS/85.192.128.115 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3522. Tue Jan 31 20:28:14 2017 us=136605 SakmaraFS/85.192.128.115 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3523. Tue Jan 31 20:28:14 2017 us=136605 85.192.131.101 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3524. Tue Jan 31 20:28:14 2017 us=136605 85.192.131.101 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KvarkenoES2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3525. Tue Jan 31 20:28:14 2017 us=136605 83.174.229.219 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3526. Tue Jan 31 20:28:14 2017 us=136605 83.174.229.219 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=BaimakES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3527. Tue Jan 31 20:28:14 2017 us=167856 85.192.131.101 peer info: IV_VER=2.3.14
  3528. Tue Jan 31 20:28:14 2017 us=167856 85.192.131.101 peer info: IV_PLAT=win
  3529. Tue Jan 31 20:28:14 2017 us=167856 85.192.131.101 peer info: IV_PROTO=2
  3530. Tue Jan 31 20:28:14 2017 us=167856 85.192.131.101 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  3531. Tue Jan 31 20:28:14 2017 us=167856 85.192.131.101 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3532. Tue Jan 31 20:28:14 2017 us=167856 85.192.131.101 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  3533. Tue Jan 31 20:28:14 2017 us=167856 85.192.131.101 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3534. Tue Jan 31 20:28:14 2017 us=167856 83.174.208.78 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3535. Tue Jan 31 20:28:14 2017 us=167856 83.174.208.78 [SharanES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.208.78:29949
  3536. Tue Jan 31 20:28:14 2017 us=167856 SharanES/83.174.208.78 MULTI_sva: pool returned IPv4=10.5.0.39, IPv6=(Not enabled)
  3537. Tue Jan 31 20:28:14 2017 us=167856 SharanES/83.174.208.78 MULTI: Learn: 10.5.0.39 -> SharanES/83.174.208.78
  3538. Tue Jan 31 20:28:14 2017 us=167856 SharanES/83.174.208.78 MULTI: primary virtual IP for SharanES/83.174.208.78: 10.5.0.39
  3539. Tue Jan 31 20:28:14 2017 us=183523 85.192.154.178 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3540. Tue Jan 31 20:28:14 2017 us=183523 85.192.154.178 [Orsk5FS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.154.178:54280
  3541. Tue Jan 31 20:28:14 2017 us=183523 Orsk5FS/85.192.154.178 MULTI_sva: pool returned IPv4=10.5.0.73, IPv6=(Not enabled)
  3542. Tue Jan 31 20:28:14 2017 us=183523 Orsk5FS/85.192.154.178 MULTI: Learn: 10.5.0.73 -> Orsk5FS/85.192.154.178
  3543. Tue Jan 31 20:28:14 2017 us=183523 Orsk5FS/85.192.154.178 MULTI: primary virtual IP for Orsk5FS/85.192.154.178: 10.5.0.73
  3544. Tue Jan 31 20:28:14 2017 us=183523 ChishmiES/77.94.104.55 PUSH: Received control message: 'PUSH_REQUEST'
  3545. Tue Jan 31 20:28:14 2017 us=183523 ChishmiES/77.94.104.55 SENT CONTROL [ChishmiES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.33 255.255.255.0,peer-id 31' (status=1)
  3546. Tue Jan 31 20:28:14 2017 us=199109 85.192.131.101 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3547. Tue Jan 31 20:28:14 2017 us=199109 85.192.131.101 [KvarkenoES2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.101:3963
  3548. Tue Jan 31 20:28:14 2017 us=199109 KvarkenoES2/85.192.131.101 MULTI_sva: pool returned IPv4=10.5.0.57, IPv6=(Not enabled)
  3549. Tue Jan 31 20:28:14 2017 us=199109 KvarkenoES2/85.192.131.101 MULTI: Learn: 10.5.0.57 -> KvarkenoES2/85.192.131.101
  3550. Tue Jan 31 20:28:14 2017 us=199109 KvarkenoES2/85.192.131.101 MULTI: primary virtual IP for KvarkenoES2/85.192.131.101: 10.5.0.57
  3551. Tue Jan 31 20:28:14 2017 us=199109 KurmanaevkaFS/85.192.167.58 PUSH: Received control message: 'PUSH_REQUEST'
  3552. Tue Jan 31 20:28:14 2017 us=199109 KurmanaevkaFS/85.192.167.58 SENT CONTROL [KurmanaevkaFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.121 255.255.255.0,peer-id 58,cipher AES-256-GCM' (status=1)
  3553. Tue Jan 31 20:28:14 2017 us=199109 KurmanaevkaFS/85.192.167.58 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3554. Tue Jan 31 20:28:14 2017 us=199109 KurmanaevkaFS/85.192.167.58 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3555. Tue Jan 31 20:28:14 2017 us=199109 KurmanaevkaFS/85.192.167.58 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3556. Tue Jan 31 20:28:14 2017 us=214762 MULTI: multi_create_instance called
  3557. Tue Jan 31 20:28:14 2017 us=214762 85.192.131.86 Re-using SSL/TLS context
  3558. Tue Jan 31 20:28:14 2017 us=214762 85.192.131.86 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3559. Tue Jan 31 20:28:14 2017 us=214762 85.192.131.86 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3560. Tue Jan 31 20:28:14 2017 us=214762 85.192.131.86 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3561. Tue Jan 31 20:28:14 2017 us=214762 85.192.131.86 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3562. Tue Jan 31 20:28:14 2017 us=214762 85.192.131.86 TLS: Initial packet from [AF_INET6]::ffff:85.192.131.86:26812, sid=f1fa4bbf 3c15f98d
  3563. Tue Jan 31 20:28:14 2017 us=230358 ErmolaevoFS/62.133.169.132 PUSH: Received control message: 'PUSH_REQUEST'
  3564. Tue Jan 31 20:28:14 2017 us=230358 ErmolaevoFS/62.133.169.132 SENT CONTROL [ErmolaevoFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.10 255.255.255.0,peer-id 59,cipher AES-256-GCM' (status=1)
  3565. Tue Jan 31 20:28:14 2017 us=230358 ErmolaevoFS/62.133.169.132 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3566. Tue Jan 31 20:28:14 2017 us=230358 ErmolaevoFS/62.133.169.132 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3567. Tue Jan 31 20:28:14 2017 us=230358 ErmolaevoFS/62.133.169.132 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3568. Tue Jan 31 20:28:14 2017 us=261717 62.133.170.52 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3569. Tue Jan 31 20:28:14 2017 us=261717 62.133.170.52 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KMiyakiFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3570. Tue Jan 31 20:28:14 2017 us=277334 83.174.230.175 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3571. Tue Jan 31 20:28:14 2017 us=277334 83.174.230.175 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KandryES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3572. Tue Jan 31 20:28:14 2017 us=277334 OktyabrskoeFS/85.192.141.180 PUSH: Received control message: 'PUSH_REQUEST'
  3573. Tue Jan 31 20:28:14 2017 us=277334 OktyabrskoeFS/85.192.141.180 SENT CONTROL [OktyabrskoeFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.128 255.255.255.0,peer-id 62,cipher AES-256-GCM' (status=1)
  3574. Tue Jan 31 20:28:14 2017 us=277334 OktyabrskoeFS/85.192.141.180 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3575. Tue Jan 31 20:28:14 2017 us=277334 OktyabrskoeFS/85.192.141.180 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3576. Tue Jan 31 20:28:14 2017 us=277334 OktyabrskoeFS/85.192.141.180 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3577. Tue Jan 31 20:28:14 2017 us=277334 SaraktashT2/85.192.128.34 PUSH: Received control message: 'PUSH_REQUEST'
  3578. Tue Jan 31 20:28:14 2017 us=277334 SaraktashT2/85.192.128.34 SENT CONTROL [SaraktashT2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.72 255.255.255.0,peer-id 46,cipher AES-256-GCM' (status=1)
  3579. Tue Jan 31 20:28:14 2017 us=277334 SaraktashT2/85.192.128.34 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3580. Tue Jan 31 20:28:14 2017 us=277334 SaraktashT2/85.192.128.34 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3581. Tue Jan 31 20:28:14 2017 us=277334 SaraktashT2/85.192.128.34 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3582. Tue Jan 31 20:28:14 2017 us=277334 MULTI: multi_create_instance called
  3583. Tue Jan 31 20:28:14 2017 us=277334 62.133.172.40 Re-using SSL/TLS context
  3584. Tue Jan 31 20:28:14 2017 us=277334 62.133.172.40 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3585. Tue Jan 31 20:28:14 2017 us=277334 62.133.172.40 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3586. Tue Jan 31 20:28:14 2017 us=277334 62.133.172.40 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3587. Tue Jan 31 20:28:14 2017 us=277334 62.133.172.40 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  3588. Tue Jan 31 20:28:14 2017 us=277334 62.133.172.40 TLS: Initial packet from [AF_INET6]::ffff:62.133.172.40:56477, sid=a3ba743f e6191b3b
  3589. Tue Jan 31 20:28:14 2017 us=277334 AbdulinoFS/85.192.132.220 PUSH: Received control message: 'PUSH_REQUEST'
  3590. Tue Jan 31 20:28:14 2017 us=277334 AbdulinoFS/85.192.132.220 SENT CONTROL [AbdulinoFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.113 255.255.255.0,peer-id 63,cipher AES-256-GCM' (status=1)
  3591. Tue Jan 31 20:28:14 2017 us=277334 AbdulinoFS/85.192.132.220 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3592. Tue Jan 31 20:28:14 2017 us=277334 AbdulinoFS/85.192.132.220 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3593. Tue Jan 31 20:28:14 2017 us=277334 AbdulinoFS/85.192.132.220 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3594. Tue Jan 31 20:28:14 2017 us=293001 PleshanovoFS/85.192.130.64 PUSH: Received control message: 'PUSH_REQUEST'
  3595. Tue Jan 31 20:28:14 2017 us=293001 PleshanovoFS/85.192.130.64 SENT CONTROL [PleshanovoFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.84 255.255.255.0,peer-id 52,cipher AES-256-GCM' (status=1)
  3596. Tue Jan 31 20:28:14 2017 us=293001 PleshanovoFS/85.192.130.64 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3597. Tue Jan 31 20:28:14 2017 us=293001 PleshanovoFS/85.192.130.64 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3598. Tue Jan 31 20:28:14 2017 us=293001 PleshanovoFS/85.192.130.64 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3599. Tue Jan 31 20:28:14 2017 us=324169 OrskEkspressES/85.192.130.75 PUSH: Received control message: 'PUSH_REQUEST'
  3600. Tue Jan 31 20:28:14 2017 us=324169 OrskEkspressES/85.192.130.75 SENT CONTROL [OrskEkspressES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.75 255.255.255.0,peer-id 65,cipher AES-256-GCM' (status=1)
  3601. Tue Jan 31 20:28:14 2017 us=324169 OrskEkspressES/85.192.130.75 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3602. Tue Jan 31 20:28:14 2017 us=324169 OrskEkspressES/85.192.130.75 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3603. Tue Jan 31 20:28:14 2017 us=324169 OrskEkspressES/85.192.130.75 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3604. Tue Jan 31 20:28:14 2017 us=339874 OrskHoz/85.192.131.123 PUSH: Received control message: 'PUSH_REQUEST'
  3605. Tue Jan 31 20:28:14 2017 us=339874 OrskHoz/85.192.131.123 SENT CONTROL [OrskHoz]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.71 255.255.255.0,peer-id 66,cipher AES-256-GCM' (status=1)
  3606. Tue Jan 31 20:28:14 2017 us=339874 OrskHoz/85.192.131.123 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3607. Tue Jan 31 20:28:14 2017 us=339874 OrskHoz/85.192.131.123 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3608. Tue Jan 31 20:28:14 2017 us=339874 OrskHoz/85.192.131.123 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3609. Tue Jan 31 20:28:14 2017 us=339874 AbdulinoFS2/85.192.132.220 PUSH: Received control message: 'PUSH_REQUEST'
  3610. Tue Jan 31 20:28:14 2017 us=339874 AbdulinoFS2/85.192.132.220 SENT CONTROL [AbdulinoFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.114 255.255.255.0,peer-id 70,cipher AES-256-GCM' (status=1)
  3611. Tue Jan 31 20:28:14 2017 us=339874 AbdulinoFS2/85.192.132.220 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3612. Tue Jan 31 20:28:14 2017 us=339874 AbdulinoFS2/85.192.132.220 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3613. Tue Jan 31 20:28:14 2017 us=339874 AbdulinoFS2/85.192.132.220 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3614. Tue Jan 31 20:28:14 2017 us=339874 KuvandikMTS2/85.192.130.212 PUSH: Received control message: 'PUSH_REQUEST'
  3615. Tue Jan 31 20:28:14 2017 us=339874 KuvandikMTS2/85.192.130.212 SENT CONTROL [KuvandikMTS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.59 255.255.255.0,peer-id 60,cipher AES-256-GCM' (status=1)
  3616. Tue Jan 31 20:28:14 2017 us=339874 KuvandikMTS2/85.192.130.212 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3617. Tue Jan 31 20:28:14 2017 us=339874 KuvandikMTS2/85.192.130.212 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3618. Tue Jan 31 20:28:14 2017 us=339874 KuvandikMTS2/85.192.130.212 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3619. Tue Jan 31 20:28:14 2017 us=355447 SolIleckT2/85.192.150.87 PUSH: Received control message: 'PUSH_REQUEST'
  3620. Tue Jan 31 20:28:14 2017 us=355447 SolIleckT2/85.192.150.87 SENT CONTROL [SolIleckT2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.103 255.255.255.0,peer-id 54,cipher AES-256-GCM' (status=1)
  3621. Tue Jan 31 20:28:14 2017 us=355447 SolIleckT2/85.192.150.87 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3622. Tue Jan 31 20:28:14 2017 us=355447 SolIleckT2/85.192.150.87 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3623. Tue Jan 31 20:28:14 2017 us=355447 SolIleckT2/85.192.150.87 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3624. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_VER=2.4.0
  3625. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_PLAT=win
  3626. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_PROTO=2
  3627. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_NCP=2
  3628. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_LZ4=1
  3629. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_LZ4v2=1
  3630. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_LZO=1
  3631. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_COMP_STUB=1
  3632. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_COMP_STUBv2=1
  3633. Tue Jan 31 20:28:14 2017 us=371123 62.133.170.52 peer info: IV_TCPNL=1
  3634. Tue Jan 31 20:28:14 2017 us=371123 62.133.172.40 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3635. Tue Jan 31 20:28:14 2017 us=371123 62.133.172.40 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=TuimaziFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3636. Tue Jan 31 20:28:14 2017 us=386685 85.192.131.83 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3637. Tue Jan 31 20:28:14 2017 us=386685 85.192.131.83 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=PonomarevkaES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3638. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_VER=2.4.0
  3639. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_PLAT=win
  3640. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_PROTO=2
  3641. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_NCP=2
  3642. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_LZ4=1
  3643. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_LZ4v2=1
  3644. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_LZO=1
  3645. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_COMP_STUB=1
  3646. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_COMP_STUBv2=1
  3647. Tue Jan 31 20:28:14 2017 us=418020 62.133.172.40 peer info: IV_TCPNL=1
  3648. Tue Jan 31 20:28:14 2017 us=418020 AlexandrovkaFS/85.192.131.237 PUSH: Received control message: 'PUSH_REQUEST'
  3649. Tue Jan 31 20:28:14 2017 us=418020 AlexandrovkaFS/85.192.131.237 SENT CONTROL [AlexandrovkaFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.131 255.255.255.0,peer-id 73,cipher AES-256-GCM' (status=1)
  3650. Tue Jan 31 20:28:14 2017 us=418020 AlexandrovkaFS/85.192.131.237 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3651. Tue Jan 31 20:28:14 2017 us=418020 AlexandrovkaFS/85.192.131.237 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3652. Tue Jan 31 20:28:14 2017 us=418020 AlexandrovkaFS/85.192.131.237 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3653. Tue Jan 31 20:28:14 2017 us=433947 TockoeFS2/85.192.182.110 PUSH: Received control message: 'PUSH_REQUEST'
  3654. Tue Jan 31 20:28:14 2017 us=433947 TockoeFS2/85.192.182.110 SENT CONTROL [TockoeFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.97 255.255.255.0,peer-id 87,cipher AES-256-GCM' (status=1)
  3655. Tue Jan 31 20:28:14 2017 us=433947 TockoeFS2/85.192.182.110 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3656. Tue Jan 31 20:28:14 2017 us=433947 TockoeFS2/85.192.182.110 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3657. Tue Jan 31 20:28:14 2017 us=433947 TockoeFS2/85.192.182.110 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3658. Tue Jan 31 20:28:14 2017 us=449094 KarmaskaliFS/83.174.223.253 PUSH: Received control message: 'PUSH_REQUEST'
  3659. Tue Jan 31 20:28:14 2017 us=449094 KarmaskaliFS/83.174.223.253 SENT CONTROL [KarmaskaliFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.15 255.255.255.0,peer-id 75,cipher AES-256-GCM' (status=1)
  3660. Tue Jan 31 20:28:14 2017 us=449094 KarmaskaliFS/83.174.223.253 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3661. Tue Jan 31 20:28:14 2017 us=449094 KarmaskaliFS/83.174.223.253 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3662. Tue Jan 31 20:28:14 2017 us=449094 KarmaskaliFS/83.174.223.253 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3663. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_VER=2.4.0
  3664. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_PLAT=win
  3665. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_PROTO=2
  3666. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_NCP=2
  3667. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_LZ4=1
  3668. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_LZ4v2=1
  3669. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_LZO=1
  3670. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_COMP_STUB=1
  3671. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_COMP_STUBv2=1
  3672. Tue Jan 31 20:28:14 2017 us=449094 83.174.230.175 peer info: IV_TCPNL=1
  3673. Tue Jan 31 20:28:14 2017 us=449094 UfamvdFS/145.255.27.168 PUSH: Received control message: 'PUSH_REQUEST'
  3674. Tue Jan 31 20:28:14 2017 us=449094 UfamvdFS/145.255.27.168 SENT CONTROL [UfamvdFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.29 255.255.255.0,peer-id 93,cipher AES-256-GCM' (status=1)
  3675. Tue Jan 31 20:28:14 2017 us=449094 UfamvdFS/145.255.27.168 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3676. Tue Jan 31 20:28:14 2017 us=449094 UfamvdFS/145.255.27.168 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3677. Tue Jan 31 20:28:14 2017 us=449094 UfamvdFS/145.255.27.168 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3678. Tue Jan 31 20:28:14 2017 us=464711 62.133.172.40 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3679. Tue Jan 31 20:28:14 2017 us=464711 62.133.172.40 [TuimaziFS2] Peer Connection Initiated with [AF_INET6]::ffff:62.133.172.40:56477
  3680. Tue Jan 31 20:28:14 2017 us=464711 TuimaziFS2/62.133.172.40 MULTI_sva: pool returned IPv4=10.5.0.28, IPv6=(Not enabled)
  3681. Tue Jan 31 20:28:14 2017 us=464711 TuimaziFS2/62.133.172.40 MULTI: Learn: 10.5.0.28 -> TuimaziFS2/62.133.172.40
  3682. Tue Jan 31 20:28:14 2017 us=464711 TuimaziFS2/62.133.172.40 MULTI: primary virtual IP for TuimaziFS2/62.133.172.40: 10.5.0.28
  3683. Tue Jan 31 20:28:14 2017 us=480339 62.133.170.52 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3684. Tue Jan 31 20:28:14 2017 us=480339 62.133.170.52 [KMiyakiFS] Peer Connection Initiated with [AF_INET6]::ffff:62.133.170.52:59450
  3685. Tue Jan 31 20:28:14 2017 us=480339 KMiyakiFS/62.133.170.52 MULTI_sva: pool returned IPv4=10.5.0.17, IPv6=(Not enabled)
  3686. Tue Jan 31 20:28:14 2017 us=480339 KMiyakiFS/62.133.170.52 MULTI: Learn: 10.5.0.17 -> KMiyakiFS/62.133.170.52
  3687. Tue Jan 31 20:28:14 2017 us=480339 KMiyakiFS/62.133.170.52 MULTI: primary virtual IP for KMiyakiFS/62.133.170.52: 10.5.0.17
  3688. Tue Jan 31 20:28:14 2017 us=480339 85.192.131.86 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3689. Tue Jan 31 20:28:14 2017 us=480339 85.192.131.86 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=KrasnoholmES, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3690. Tue Jan 31 20:28:14 2017 us=480339 GrachevkaMTS/85.192.171.101 PUSH: Received control message: 'PUSH_REQUEST'
  3691. Tue Jan 31 20:28:14 2017 us=480339 GrachevkaMTS/85.192.171.101 SENT CONTROL [GrachevkaMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.79 255.255.255.0,peer-id 94,cipher AES-256-GCM' (status=1)
  3692. Tue Jan 31 20:28:14 2017 us=480339 GrachevkaMTS/85.192.171.101 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3693. Tue Jan 31 20:28:14 2017 us=480339 GrachevkaMTS/85.192.171.101 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3694. Tue Jan 31 20:28:14 2017 us=480339 GrachevkaMTS/85.192.171.101 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3695. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_VER=2.4.0
  3696. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_PLAT=win
  3697. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_PROTO=2
  3698. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_NCP=2
  3699. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_LZ4=1
  3700. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_LZ4v2=1
  3701. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_LZO=1
  3702. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_COMP_STUB=1
  3703. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_COMP_STUBv2=1
  3704. Tue Jan 31 20:28:14 2017 us=495960 85.192.131.83 peer info: IV_TCPNL=1
  3705. Tue Jan 31 20:28:14 2017 us=511585 IsyangulovoEs/77.94.104.123 PUSH: Received control message: 'PUSH_REQUEST'
  3706. Tue Jan 31 20:28:14 2017 us=511585 IsyangulovoEs/77.94.104.123 SENT CONTROL [IsyangulovoEs]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.12 255.255.255.0,peer-id 64,cipher AES-256-GCM' (status=1)
  3707. Tue Jan 31 20:28:14 2017 us=511585 IsyangulovoEs/77.94.104.123 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3708. Tue Jan 31 20:28:14 2017 us=511585 IsyangulovoEs/77.94.104.123 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3709. Tue Jan 31 20:28:14 2017 us=511585 IsyangulovoEs/77.94.104.123 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3710. Tue Jan 31 20:28:14 2017 us=527214 BuzulukFS2/85.192.132.1 PUSH: Received control message: 'PUSH_REQUEST'
  3711. Tue Jan 31 20:28:14 2017 us=527214 BuzulukFS2/85.192.132.1 SENT CONTROL [BuzulukFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.78 255.255.255.0,peer-id 71,cipher AES-256-GCM' (status=1)
  3712. Tue Jan 31 20:28:14 2017 us=527214 BuzulukFS2/85.192.132.1 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3713. Tue Jan 31 20:28:14 2017 us=527214 BuzulukFS2/85.192.132.1 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3714. Tue Jan 31 20:28:14 2017 us=527214 BuzulukFS2/85.192.132.1 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3715. Tue Jan 31 20:28:14 2017 us=527214 BuzulukRus/85.192.146.98 PUSH: Received control message: 'PUSH_REQUEST'
  3716. Tue Jan 31 20:28:14 2017 us=527214 BuzulukRus/85.192.146.98 SENT CONTROL [BuzulukRus]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.82 255.255.255.0,peer-id 79,cipher AES-256-GCM' (status=1)
  3717. Tue Jan 31 20:28:14 2017 us=527214 BuzulukRus/85.192.146.98 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3718. Tue Jan 31 20:28:14 2017 us=527214 BuzulukRus/85.192.146.98 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3719. Tue Jan 31 20:28:14 2017 us=527214 BuzulukRus/85.192.146.98 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3720. Tue Jan 31 20:28:14 2017 us=542840 RaevskiiMTS/83.174.222.50 PUSH: Received control message: 'PUSH_REQUEST'
  3721. Tue Jan 31 20:28:14 2017 us=542840 RaevskiiMTS/83.174.222.50 SENT CONTROL [RaevskiiMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.24 255.255.255.0,peer-id 67,cipher AES-256-GCM' (status=1)
  3722. Tue Jan 31 20:28:14 2017 us=542840 RaevskiiMTS/83.174.222.50 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3723. Tue Jan 31 20:28:14 2017 us=542840 RaevskiiMTS/83.174.222.50 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3724. Tue Jan 31 20:28:14 2017 us=542840 RaevskiiMTS/83.174.222.50 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3725. Tue Jan 31 20:28:14 2017 us=558491 83.174.230.175 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3726. Tue Jan 31 20:28:14 2017 us=558491 83.174.230.175 [KandryES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.230.175:17640
  3727. Tue Jan 31 20:28:14 2017 us=558491 KandryES/83.174.230.175 MULTI_sva: pool returned IPv4=10.5.0.13, IPv6=(Not enabled)
  3728. Tue Jan 31 20:28:14 2017 us=558491 KandryES/83.174.230.175 MULTI: Learn: 10.5.0.13 -> KandryES/83.174.230.175
  3729. Tue Jan 31 20:28:14 2017 us=558491 KandryES/83.174.230.175 MULTI: primary virtual IP for KandryES/83.174.230.175: 10.5.0.13
  3730. Tue Jan 31 20:28:14 2017 us=574113 PonomarevkaFS2/85.192.131.80 PUSH: Received control message: 'PUSH_REQUEST'
  3731. Tue Jan 31 20:28:14 2017 us=574113 PonomarevkaFS2/85.192.131.80 SENT CONTROL [PonomarevkaFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.133 255.255.255.0,peer-id 78,cipher AES-256-GCM' (status=1)
  3732. Tue Jan 31 20:28:14 2017 us=574113 PonomarevkaFS2/85.192.131.80 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3733. Tue Jan 31 20:28:14 2017 us=574113 PonomarevkaFS2/85.192.131.80 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3734. Tue Jan 31 20:28:14 2017 us=574113 PonomarevkaFS2/85.192.131.80 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3735. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_VER=2.4.0
  3736. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_PLAT=win
  3737. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_PROTO=2
  3738. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_NCP=2
  3739. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_LZ4=1
  3740. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_LZ4v2=1
  3741. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_LZO=1
  3742. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_COMP_STUB=1
  3743. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_COMP_STUBv2=1
  3744. Tue Jan 31 20:28:14 2017 us=589712 85.192.131.86 peer info: IV_TCPNL=1
  3745. Tue Jan 31 20:28:14 2017 us=589712 BeliaevkaMTS2/85.192.141.228 PUSH: Received control message: 'PUSH_REQUEST'
  3746. Tue Jan 31 20:28:14 2017 us=589712 BeliaevkaMTS2/85.192.141.228 SENT CONTROL [BeliaevkaMTS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.50 255.255.255.0,peer-id 76,cipher AES-256-GCM' (status=1)
  3747. Tue Jan 31 20:28:14 2017 us=589712 BeliaevkaMTS2/85.192.141.228 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3748. Tue Jan 31 20:28:14 2017 us=589712 BeliaevkaMTS2/85.192.141.228 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3749. Tue Jan 31 20:28:14 2017 us=589712 BeliaevkaMTS2/85.192.141.228 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3750. Tue Jan 31 20:28:14 2017 us=605342 ArlanFS/95.105.104.138 PUSH: Received control message: 'PUSH_REQUEST'
  3751. Tue Jan 31 20:28:14 2017 us=605342 ArlanFS/95.105.104.138 SENT CONTROL [ArlanFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.98 255.255.255.0,peer-id 104,cipher AES-256-GCM' (status=1)
  3752. Tue Jan 31 20:28:14 2017 us=605342 ArlanFS/95.105.104.138 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3753. Tue Jan 31 20:28:14 2017 us=605342 ArlanFS/95.105.104.138 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3754. Tue Jan 31 20:28:14 2017 us=605342 ArlanFS/95.105.104.138 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3755. Tue Jan 31 20:28:14 2017 us=605342 AsekeevoFS2/85.192.130.217 PUSH: Received control message: 'PUSH_REQUEST'
  3756. Tue Jan 31 20:28:14 2017 us=605342 AsekeevoFS2/85.192.130.217 SENT CONTROL [AsekeevoFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.130 255.255.255.0,peer-id 89,cipher AES-256-GCM' (status=1)
  3757. Tue Jan 31 20:28:14 2017 us=605342 AsekeevoFS2/85.192.130.217 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3758. Tue Jan 31 20:28:14 2017 us=605342 AsekeevoFS2/85.192.130.217 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3759. Tue Jan 31 20:28:14 2017 us=605342 AsekeevoFS2/85.192.130.217 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3760. Tue Jan 31 20:28:14 2017 us=636603 NovoorskFS/85.192.129.228 PUSH: Received control message: 'PUSH_REQUEST'
  3761. Tue Jan 31 20:28:14 2017 us=636603 NovoorskFS/85.192.129.228 SENT CONTROL [NovoorskFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.68 255.255.255.0,peer-id 86,cipher AES-256-GCM' (status=1)
  3762. Tue Jan 31 20:28:14 2017 us=636603 NovoorskFS/85.192.129.228 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3763. Tue Jan 31 20:28:14 2017 us=636603 NovoorskFS/85.192.129.228 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3764. Tue Jan 31 20:28:14 2017 us=636603 NovoorskFS/85.192.129.228 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3765. Tue Jan 31 20:28:14 2017 us=636603 GrachevkaFS/85.192.171.101 PUSH: Received control message: 'PUSH_REQUEST'
  3766. Tue Jan 31 20:28:14 2017 us=636603 GrachevkaFS/85.192.171.101 SENT CONTROL [GrachevkaFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.81 255.255.255.0,peer-id 88,cipher AES-256-GCM' (status=1)
  3767. Tue Jan 31 20:28:14 2017 us=636603 GrachevkaFS/85.192.171.101 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3768. Tue Jan 31 20:28:14 2017 us=636603 GrachevkaFS/85.192.171.101 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3769. Tue Jan 31 20:28:14 2017 us=636603 GrachevkaFS/85.192.171.101 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3770. Tue Jan 31 20:28:14 2017 us=652238 SevernoeFS/85.192.131.140 PUSH: Received control message: 'PUSH_REQUEST'
  3771. Tue Jan 31 20:28:14 2017 us=652238 SevernoeFS/85.192.131.140 SENT CONTROL [SevernoeFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.117 255.255.255.0,peer-id 77,cipher AES-256-GCM' (status=1)
  3772. Tue Jan 31 20:28:14 2017 us=652238 SevernoeFS/85.192.131.140 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3773. Tue Jan 31 20:28:14 2017 us=652238 SevernoeFS/85.192.131.140 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3774. Tue Jan 31 20:28:14 2017 us=652238 SevernoeFS/85.192.131.140 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3775. Tue Jan 31 20:28:14 2017 us=652238 85.192.131.83 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3776. Tue Jan 31 20:28:14 2017 us=652238 85.192.131.83 [PonomarevkaES] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.83:54142
  3777. Tue Jan 31 20:28:14 2017 us=652238 PonomarevkaES/85.192.131.83 MULTI_sva: pool returned IPv4=10.5.0.129, IPv6=(Not enabled)
  3778. Tue Jan 31 20:28:14 2017 us=652238 PonomarevkaES/85.192.131.83 MULTI: Learn: 10.5.0.129 -> PonomarevkaES/85.192.131.83
  3779. Tue Jan 31 20:28:14 2017 us=652238 PonomarevkaES/85.192.131.83 MULTI: primary virtual IP for PonomarevkaES/85.192.131.83: 10.5.0.129
  3780. Tue Jan 31 20:28:14 2017 us=652238 SevernoeMTS/85.192.131.140 PUSH: Received control message: 'PUSH_REQUEST'
  3781. Tue Jan 31 20:28:14 2017 us=652238 SevernoeMTS/85.192.131.140 SENT CONTROL [SevernoeMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.115 255.255.255.0,peer-id 92,cipher AES-256-GCM' (status=1)
  3782. Tue Jan 31 20:28:14 2017 us=652238 SevernoeMTS/85.192.131.140 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3783. Tue Jan 31 20:28:14 2017 us=652238 SevernoeMTS/85.192.131.140 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3784. Tue Jan 31 20:28:14 2017 us=652238 SevernoeMTS/85.192.131.140 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3785. Tue Jan 31 20:28:14 2017 us=714738 85.192.131.86 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3786. Tue Jan 31 20:28:14 2017 us=714738 85.192.131.86 [KrasnoholmES] Peer Connection Initiated with [AF_INET6]::ffff:85.192.131.86:26812
  3787. Tue Jan 31 20:28:14 2017 us=714738 KrasnoholmES/85.192.131.86 MULTI_sva: pool returned IPv4=10.5.0.87, IPv6=(Not enabled)
  3788. Tue Jan 31 20:28:14 2017 us=714738 KrasnoholmES/85.192.131.86 MULTI: Learn: 10.5.0.87 -> KrasnoholmES/85.192.131.86
  3789. Tue Jan 31 20:28:14 2017 us=714738 KrasnoholmES/85.192.131.86 MULTI: primary virtual IP for KrasnoholmES/85.192.131.86: 10.5.0.87
  3790. Tue Jan 31 20:28:14 2017 us=730357 YazikovoES/83.174.221.126 PUSH: Received control message: 'PUSH_REQUEST'
  3791. Tue Jan 31 20:28:14 2017 us=730357 YazikovoES/83.174.221.126 SENT CONTROL [YazikovoES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.40 255.255.255.0,peer-id 82,cipher AES-256-GCM' (status=1)
  3792. Tue Jan 31 20:28:14 2017 us=730357 YazikovoES/83.174.221.126 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3793. Tue Jan 31 20:28:14 2017 us=730357 YazikovoES/83.174.221.126 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3794. Tue Jan 31 20:28:14 2017 us=730357 YazikovoES/83.174.221.126 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3795. Tue Jan 31 20:28:14 2017 us=745990 Orsk5MTS/85.192.131.57 PUSH: Received control message: 'PUSH_REQUEST'
  3796. Tue Jan 31 20:28:14 2017 us=745990 Orsk5MTS/85.192.131.57 SENT CONTROL [Orsk5MTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.70 255.255.255.0,peer-id 80,cipher AES-256-GCM' (status=1)
  3797. Tue Jan 31 20:28:14 2017 us=745990 Orsk5MTS/85.192.131.57 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3798. Tue Jan 31 20:28:14 2017 us=745990 Orsk5MTS/85.192.131.57 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3799. Tue Jan 31 20:28:14 2017 us=745990 Orsk5MTS/85.192.131.57 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3800. Tue Jan 31 20:28:14 2017 us=761607 BuzulukFS/85.192.132.1 PUSH: Received control message: 'PUSH_REQUEST'
  3801. Tue Jan 31 20:28:14 2017 us=761607 BuzulukFS/85.192.132.1 SENT CONTROL [BuzulukFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.77 255.255.255.0,peer-id 83,cipher AES-256-GCM' (status=1)
  3802. Tue Jan 31 20:28:14 2017 us=761607 BuzulukFS/85.192.132.1 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3803. Tue Jan 31 20:28:14 2017 us=761607 BuzulukFS/85.192.132.1 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3804. Tue Jan 31 20:28:14 2017 us=761607 BuzulukFS/85.192.132.1 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3805. Tue Jan 31 20:28:14 2017 us=777211 RaevskiiES/83.174.221.250 PUSH: Received control message: 'PUSH_REQUEST'
  3806. Tue Jan 31 20:28:14 2017 us=777211 RaevskiiES/83.174.221.250 SENT CONTROL [RaevskiiES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.26 255.255.255.0,peer-id 69,cipher AES-256-GCM' (status=1)
  3807. Tue Jan 31 20:28:14 2017 us=777211 RaevskiiES/83.174.221.250 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3808. Tue Jan 31 20:28:14 2017 us=777211 RaevskiiES/83.174.221.250 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3809. Tue Jan 31 20:28:14 2017 us=777211 RaevskiiES/83.174.221.250 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3810. Tue Jan 31 20:28:14 2017 us=792836 FedorovkaFS/83.174.226.113 PUSH: Received control message: 'PUSH_REQUEST'
  3811. Tue Jan 31 20:28:14 2017 us=792836 FedorovkaFS/83.174.226.113 SENT CONTROL [FedorovkaFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.38 255.255.255.0,peer-id 81,cipher AES-256-GCM' (status=1)
  3812. Tue Jan 31 20:28:14 2017 us=792836 FedorovkaFS/83.174.226.113 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3813. Tue Jan 31 20:28:14 2017 us=792836 FedorovkaFS/83.174.226.113 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3814. Tue Jan 31 20:28:14 2017 us=792836 FedorovkaFS/83.174.226.113 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3815. Tue Jan 31 20:28:14 2017 us=792836 YazikovoFS/83.174.213.186 PUSH: Received control message: 'PUSH_REQUEST'
  3816. Tue Jan 31 20:28:14 2017 us=792836 YazikovoFS/83.174.213.186 SENT CONTROL [YazikovoFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.43 255.255.255.0,peer-id 95,cipher AES-256-GCM' (status=1)
  3817. Tue Jan 31 20:28:14 2017 us=792836 YazikovoFS/83.174.213.186 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3818. Tue Jan 31 20:28:14 2017 us=792836 YazikovoFS/83.174.213.186 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3819. Tue Jan 31 20:28:14 2017 us=792836 YazikovoFS/83.174.213.186 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3820. Tue Jan 31 20:28:14 2017 us=792836 PleshanovoFS2/85.192.130.64 PUSH: Received control message: 'PUSH_REQUEST'
  3821. Tue Jan 31 20:28:14 2017 us=792836 PleshanovoFS2/85.192.130.64 SENT CONTROL [PleshanovoFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.85 255.255.255.0,peer-id 90,cipher AES-256-GCM' (status=1)
  3822. Tue Jan 31 20:28:14 2017 us=792836 PleshanovoFS2/85.192.130.64 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3823. Tue Jan 31 20:28:14 2017 us=792836 PleshanovoFS2/85.192.130.64 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3824. Tue Jan 31 20:28:14 2017 us=792836 PleshanovoFS2/85.192.130.64 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3825. Tue Jan 31 20:28:14 2017 us=808465 KurmanaevkaT2/85.192.167.58 PUSH: Received control message: 'PUSH_REQUEST'
  3826. Tue Jan 31 20:28:14 2017 us=808465 KurmanaevkaT2/85.192.167.58 SENT CONTROL [KurmanaevkaT2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.119 255.255.255.0,peer-id 109,cipher AES-256-GCM' (status=1)
  3827. Tue Jan 31 20:28:14 2017 us=808465 KurmanaevkaT2/85.192.167.58 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3828. Tue Jan 31 20:28:14 2017 us=808465 KurmanaevkaT2/85.192.167.58 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3829. Tue Jan 31 20:28:14 2017 us=808465 KurmanaevkaT2/85.192.167.58 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3830. Tue Jan 31 20:28:14 2017 us=808465 GrachevkaES/85.192.171.101 PUSH: Received control message: 'PUSH_REQUEST'
  3831. Tue Jan 31 20:28:14 2017 us=808465 GrachevkaES/85.192.171.101 SENT CONTROL [GrachevkaES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.80 255.255.255.0,peer-id 99,cipher AES-256-GCM' (status=1)
  3832. Tue Jan 31 20:28:14 2017 us=808465 GrachevkaES/85.192.171.101 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3833. Tue Jan 31 20:28:14 2017 us=808465 GrachevkaES/85.192.171.101 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3834. Tue Jan 31 20:28:14 2017 us=808465 GrachevkaES/85.192.171.101 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3835. Tue Jan 31 20:28:14 2017 us=824089 Passag2/195.58.16.205 PUSH: Received control message: 'PUSH_REQUEST'
  3836. Tue Jan 31 20:28:14 2017 us=824089 Passag2/195.58.16.205 SENT CONTROL [Passag2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.6 255.255.255.0,peer-id 110,cipher AES-256-GCM' (status=1)
  3837. Tue Jan 31 20:28:14 2017 us=824089 Passag2/195.58.16.205 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3838. Tue Jan 31 20:28:14 2017 us=824089 Passag2/195.58.16.205 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3839. Tue Jan 31 20:28:14 2017 us=824089 Passag2/195.58.16.205 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3840. Tue Jan 31 20:28:14 2017 us=824089 Tockoe2MTS/85.192.130.178 PUSH: Received control message: 'PUSH_REQUEST'
  3841. Tue Jan 31 20:28:14 2017 us=824089 Tockoe2MTS/85.192.130.178 SENT CONTROL [Tockoe2MTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.94 255.255.255.0,peer-id 85,cipher AES-256-GCM' (status=1)
  3842. Tue Jan 31 20:28:14 2017 us=824089 Tockoe2MTS/85.192.130.178 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3843. Tue Jan 31 20:28:14 2017 us=824089 Tockoe2MTS/85.192.130.178 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3844. Tue Jan 31 20:28:14 2017 us=824089 Tockoe2MTS/85.192.130.178 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3845. Tue Jan 31 20:28:14 2017 us=824089 SorochinskFS/85.192.128.241 PUSH: Received control message: 'PUSH_REQUEST'
  3846. Tue Jan 31 20:28:14 2017 us=824089 SorochinskFS/85.192.128.241 SENT CONTROL [SorochinskFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.91 255.255.255.0,peer-id 98,cipher AES-256-GCM' (status=1)
  3847. Tue Jan 31 20:28:14 2017 us=824089 SorochinskFS/85.192.128.241 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3848. Tue Jan 31 20:28:14 2017 us=824089 SorochinskFS/85.192.128.241 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3849. Tue Jan 31 20:28:14 2017 us=824089 SorochinskFS/85.192.128.241 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3850. Tue Jan 31 20:28:14 2017 us=824089 FedorovkaES/83.174.238.201 PUSH: Received control message: 'PUSH_REQUEST'
  3851. Tue Jan 31 20:28:14 2017 us=824089 FedorovkaES/83.174.238.201 SENT CONTROL [FedorovkaES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.31 255.255.255.0,peer-id 74,cipher AES-256-GCM' (status=1)
  3852. Tue Jan 31 20:28:14 2017 us=824089 FedorovkaES/83.174.238.201 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3853. Tue Jan 31 20:28:14 2017 us=824089 FedorovkaES/83.174.238.201 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3854. Tue Jan 31 20:28:14 2017 us=824089 FedorovkaES/83.174.238.201 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3855. Tue Jan 31 20:28:14 2017 us=839724 SharanMTS/83.174.238.107 PUSH: Received control message: 'PUSH_REQUEST'
  3856. Tue Jan 31 20:28:14 2017 us=839724 SharanMTS/83.174.238.107 SENT CONTROL [SharanMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.37 255.255.255.0,peer-id 97,cipher AES-256-GCM' (status=1)
  3857. Tue Jan 31 20:28:14 2017 us=839724 SharanMTS/83.174.238.107 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3858. Tue Jan 31 20:28:14 2017 us=839724 SharanMTS/83.174.238.107 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3859. Tue Jan 31 20:28:14 2017 us=839724 SharanMTS/83.174.238.107 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3860. Tue Jan 31 20:28:14 2017 us=886617 DavlekanovoMTS2/83.174.222.80 PUSH: Received control message: 'PUSH_REQUEST'
  3861. Tue Jan 31 20:28:14 2017 us=886617 DavlekanovoMTS2/83.174.222.80 SENT CONTROL [DavlekanovoMTS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.4 255.255.255.0,peer-id 84,cipher AES-256-GCM' (status=1)
  3862. Tue Jan 31 20:28:14 2017 us=886617 DavlekanovoMTS2/83.174.222.80 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3863. Tue Jan 31 20:28:14 2017 us=886617 DavlekanovoMTS2/83.174.222.80 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3864. Tue Jan 31 20:28:14 2017 us=886617 DavlekanovoMTS2/83.174.222.80 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3865. Tue Jan 31 20:28:14 2017 us=917842 NovosergievkaT2/85.192.128.210 PUSH: Received control message: 'PUSH_REQUEST'
  3866. Tue Jan 31 20:28:14 2017 us=917842 NovosergievkaT2/85.192.128.210 SENT CONTROL [NovosergievkaT2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.45 255.255.255.0,peer-id 102,cipher AES-256-GCM' (status=1)
  3867. Tue Jan 31 20:28:14 2017 us=917842 NovosergievkaT2/85.192.128.210 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3868. Tue Jan 31 20:28:14 2017 us=917842 NovosergievkaT2/85.192.128.210 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3869. Tue Jan 31 20:28:14 2017 us=917842 NovosergievkaT2/85.192.128.210 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3870. Tue Jan 31 20:28:14 2017 us=933463 SharanFS/62.133.173.160 PUSH: Received control message: 'PUSH_REQUEST'
  3871. Tue Jan 31 20:28:14 2017 us=933463 SharanFS/62.133.173.160 SENT CONTROL [SharanFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.35 255.255.255.0,peer-id 91,cipher AES-256-GCM' (status=1)
  3872. Tue Jan 31 20:28:14 2017 us=933463 SharanFS/62.133.173.160 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3873. Tue Jan 31 20:28:14 2017 us=933463 SharanFS/62.133.173.160 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3874. Tue Jan 31 20:28:14 2017 us=933463 SharanFS/62.133.173.160 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3875. Tue Jan 31 20:28:14 2017 us=933463 KvarkenoFS2/85.192.131.101 PUSH: Received control message: 'PUSH_REQUEST'
  3876. Tue Jan 31 20:28:14 2017 us=933463 KvarkenoFS2/85.192.131.101 SENT CONTROL [KvarkenoFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.56 255.255.255.0,peer-id 106,cipher AES-256-GCM' (status=1)
  3877. Tue Jan 31 20:28:14 2017 us=933463 KvarkenoFS2/85.192.131.101 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3878. Tue Jan 31 20:28:14 2017 us=933463 KvarkenoFS2/85.192.131.101 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3879. Tue Jan 31 20:28:14 2017 us=933463 KvarkenoFS2/85.192.131.101 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3880. Tue Jan 31 20:28:14 2017 us=964711 SevernoeFS2/85.192.131.140 PUSH: Received control message: 'PUSH_REQUEST'
  3881. Tue Jan 31 20:28:14 2017 us=964711 SevernoeFS2/85.192.131.140 SENT CONTROL [SevernoeFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.116 255.255.255.0,peer-id 100,cipher AES-256-GCM' (status=1)
  3882. Tue Jan 31 20:28:14 2017 us=964711 SevernoeFS2/85.192.131.140 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3883. Tue Jan 31 20:28:14 2017 us=964711 SevernoeFS2/85.192.131.140 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3884. Tue Jan 31 20:28:14 2017 us=964711 SevernoeFS2/85.192.131.140 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3885. Tue Jan 31 20:28:15 2017 us=42837 BuguruslanFS/85.192.131.137 PUSH: Received control message: 'PUSH_REQUEST'
  3886. Tue Jan 31 20:28:15 2017 us=42837 BuguruslanFS/85.192.131.137 SENT CONTROL [BuguruslanFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.124 255.255.255.0,peer-id 68,cipher AES-256-GCM' (status=1)
  3887. Tue Jan 31 20:28:15 2017 us=42837 BuguruslanFS/85.192.131.137 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3888. Tue Jan 31 20:28:15 2017 us=42837 BuguruslanFS/85.192.131.137 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3889. Tue Jan 31 20:28:15 2017 us=42837 BuguruslanFS/85.192.131.137 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3890. Tue Jan 31 20:28:15 2017 us=42837 ErmekeevoFS/83.174.218.234 PUSH: Received control message: 'PUSH_REQUEST'
  3891. Tue Jan 31 20:28:15 2017 us=42837 ErmekeevoFS/83.174.218.234 SENT CONTROL [ErmekeevoFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.11 255.255.255.0,peer-id 56,cipher AES-256-GCM' (status=1)
  3892. Tue Jan 31 20:28:15 2017 us=42837 ErmekeevoFS/83.174.218.234 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3893. Tue Jan 31 20:28:15 2017 us=42837 ErmekeevoFS/83.174.218.234 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3894. Tue Jan 31 20:28:15 2017 us=42837 ErmekeevoFS/83.174.218.234 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3895. Tue Jan 31 20:28:15 2017 us=42837 ChishmiES2/77.94.104.55 PUSH: Received control message: 'PUSH_REQUEST'
  3896. Tue Jan 31 20:28:15 2017 us=42837 ChishmiES2/77.94.104.55 SENT CONTROL [ChishmiES2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.34 255.255.255.0,peer-id 108,cipher AES-256-GCM' (status=1)
  3897. Tue Jan 31 20:28:15 2017 us=42837 ChishmiES2/77.94.104.55 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3898. Tue Jan 31 20:28:15 2017 us=42837 ChishmiES2/77.94.104.55 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3899. Tue Jan 31 20:28:15 2017 us=42837 ChishmiES2/77.94.104.55 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3900. Tue Jan 31 20:28:15 2017 us=58462 PonomarevkaFS/85.192.131.80 PUSH: Received control message: 'PUSH_REQUEST'
  3901. Tue Jan 31 20:28:15 2017 us=58462 PonomarevkaFS/85.192.131.80 SENT CONTROL [PonomarevkaFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.132 255.255.255.0,peer-id 105,cipher AES-256-GCM' (status=1)
  3902. Tue Jan 31 20:28:15 2017 us=58462 PonomarevkaFS/85.192.131.80 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3903. Tue Jan 31 20:28:15 2017 us=58462 PonomarevkaFS/85.192.131.80 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3904. Tue Jan 31 20:28:15 2017 us=58462 PonomarevkaFS/85.192.131.80 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3905. Tue Jan 31 20:28:15 2017 us=105337 NovoorskMTS/85.192.129.228 MULTI: bad source address from client [192.168.1.4], packet dropped
  3906. Tue Jan 31 20:28:15 2017 us=105337 MednogorskMTS2/85.192.156.156 PUSH: Received control message: 'PUSH_REQUEST'
  3907. Tue Jan 31 20:28:15 2017 us=105337 MednogorskMTS2/85.192.156.156 SENT CONTROL [MednogorskMTS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.63 255.255.255.0,peer-id 61,cipher AES-256-GCM' (status=1)
  3908. Tue Jan 31 20:28:15 2017 us=105337 MednogorskMTS2/85.192.156.156 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3909. Tue Jan 31 20:28:15 2017 us=105337 MednogorskMTS2/85.192.156.156 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3910. Tue Jan 31 20:28:15 2017 us=105337 MednogorskMTS2/85.192.156.156 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3911. Tue Jan 31 20:28:15 2017 us=183463 BuzdakES/62.133.168.234 PUSH: Received control message: 'PUSH_REQUEST'
  3912. Tue Jan 31 20:28:15 2017 us=183463 BuzdakES/62.133.168.234 SENT CONTROL [BuzdakES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.8 255.255.255.0,peer-id 107,cipher AES-256-GCM' (status=1)
  3913. Tue Jan 31 20:28:15 2017 us=183463 BuzdakES/62.133.168.234 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3914. Tue Jan 31 20:28:15 2017 us=183463 BuzdakES/62.133.168.234 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3915. Tue Jan 31 20:28:15 2017 us=183463 BuzdakES/62.133.168.234 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3916. Tue Jan 31 20:28:15 2017 us=199088 OrskEkspressES2/85.192.130.75 PUSH: Received control message: 'PUSH_REQUEST'
  3917. Tue Jan 31 20:28:15 2017 us=199088 OrskEkspressES2/85.192.130.75 SENT CONTROL [OrskEkspressES2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.76 255.255.255.0,peer-id 20' (status=1)
  3918. Tue Jan 31 20:28:15 2017 us=230338 DombarovkaMTS2/85.192.131.129 PUSH: Received control message: 'PUSH_REQUEST'
  3919. Tue Jan 31 20:28:15 2017 us=230338 DombarovkaMTS2/85.192.131.129 SENT CONTROL [DombarovkaMTS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.52 255.255.255.0,peer-id 103,cipher AES-256-GCM' (status=1)
  3920. Tue Jan 31 20:28:15 2017 us=230338 DombarovkaMTS2/85.192.131.129 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3921. Tue Jan 31 20:28:15 2017 us=230338 DombarovkaMTS2/85.192.131.129 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3922. Tue Jan 31 20:28:15 2017 us=230338 DombarovkaMTS2/85.192.131.129 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3923. Tue Jan 31 20:28:15 2017 us=245967 ArhangelskoyeMTS/83.174.212.34 PUSH: Received control message: 'PUSH_REQUEST'
  3924. Tue Jan 31 20:28:15 2017 us=245967 ArhangelskoyeMTS/83.174.212.34 SENT CONTROL [ArhangelskoyeMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.5 255.255.255.0,peer-id 111,cipher AES-256-GCM' (status=1)
  3925. Tue Jan 31 20:28:15 2017 us=245967 ArhangelskoyeMTS/83.174.212.34 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3926. Tue Jan 31 20:28:15 2017 us=245967 ArhangelskoyeMTS/83.174.212.34 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3927. Tue Jan 31 20:28:15 2017 us=245967 ArhangelskoyeMTS/83.174.212.34 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3928. Tue Jan 31 20:28:15 2017 us=261588 KandryES/83.174.230.175 PUSH: Received control message: 'PUSH_REQUEST'
  3929. Tue Jan 31 20:28:15 2017 us=261588 KandryES/83.174.230.175 SENT CONTROL [KandryES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.13 255.255.255.0,peer-id 113,cipher AES-256-GCM' (status=1)
  3930. Tue Jan 31 20:28:15 2017 us=261588 KandryES/83.174.230.175 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3931. Tue Jan 31 20:28:15 2017 us=261588 KandryES/83.174.230.175 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3932. Tue Jan 31 20:28:15 2017 us=261588 KandryES/83.174.230.175 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3933. Tue Jan 31 20:28:15 2017 us=277212 Orsk5FS/85.192.154.178 PUSH: Received control message: 'PUSH_REQUEST'
  3934. Tue Jan 31 20:28:15 2017 us=277212 Orsk5FS/85.192.154.178 SENT CONTROL [Orsk5FS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.73 255.255.255.0,peer-id 72,cipher AES-256-GCM' (status=1)
  3935. Tue Jan 31 20:28:15 2017 us=277212 Orsk5FS/85.192.154.178 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3936. Tue Jan 31 20:28:15 2017 us=277212 Orsk5FS/85.192.154.178 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3937. Tue Jan 31 20:28:15 2017 us=277212 Orsk5FS/85.192.154.178 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3938. Tue Jan 31 20:28:15 2017 us=292843 SharanES/83.174.208.78 PUSH: Received control message: 'PUSH_REQUEST'
  3939. Tue Jan 31 20:28:15 2017 us=292843 SharanES/83.174.208.78 SENT CONTROL [SharanES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.39 255.255.255.0,peer-id 112,cipher AES-256-GCM' (status=1)
  3940. Tue Jan 31 20:28:15 2017 us=292843 SharanES/83.174.208.78 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3941. Tue Jan 31 20:28:15 2017 us=292843 SharanES/83.174.208.78 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3942. Tue Jan 31 20:28:15 2017 us=292843 SharanES/83.174.208.78 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3943. Tue Jan 31 20:28:15 2017 us=292843 Llocal/83.174.219.206 PUSH: Received control message: 'PUSH_REQUEST'
  3944. Tue Jan 31 20:28:15 2017 us=292843 Llocal/83.174.219.206 SENT CONTROL [Llocal]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.16 255.255.255.0,peer-id 96,cipher AES-256-GCM' (status=1)
  3945. Tue Jan 31 20:28:15 2017 us=292843 Llocal/83.174.219.206 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3946. Tue Jan 31 20:28:15 2017 us=292843 Llocal/83.174.219.206 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3947. Tue Jan 31 20:28:15 2017 us=292843 Llocal/83.174.219.206 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3948. Tue Jan 31 20:28:15 2017 us=495984 KMiyakiFS/62.133.170.52 PUSH: Received control message: 'PUSH_REQUEST'
  3949. Tue Jan 31 20:28:15 2017 us=495984 KMiyakiFS/62.133.170.52 SENT CONTROL [KMiyakiFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.17 255.255.255.0,peer-id 115,cipher AES-256-GCM' (status=1)
  3950. Tue Jan 31 20:28:15 2017 us=495984 KMiyakiFS/62.133.170.52 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3951. Tue Jan 31 20:28:15 2017 us=495984 KMiyakiFS/62.133.170.52 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3952. Tue Jan 31 20:28:15 2017 us=495984 KMiyakiFS/62.133.170.52 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3953. Tue Jan 31 20:28:15 2017 us=527236 TuimaziFS2/62.133.172.40 PUSH: Received control message: 'PUSH_REQUEST'
  3954. Tue Jan 31 20:28:15 2017 us=527236 TuimaziFS2/62.133.172.40 SENT CONTROL [TuimaziFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.28 255.255.255.0,peer-id 118,cipher AES-256-GCM' (status=1)
  3955. Tue Jan 31 20:28:15 2017 us=527236 TuimaziFS2/62.133.172.40 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3956. Tue Jan 31 20:28:15 2017 us=527236 TuimaziFS2/62.133.172.40 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3957. Tue Jan 31 20:28:15 2017 us=527236 TuimaziFS2/62.133.172.40 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3958. Tue Jan 31 20:28:15 2017 us=667866 PonomarevkaES/85.192.131.83 PUSH: Received control message: 'PUSH_REQUEST'
  3959. Tue Jan 31 20:28:15 2017 us=667866 PonomarevkaES/85.192.131.83 SENT CONTROL [PonomarevkaES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.129 255.255.255.0,peer-id 114,cipher AES-256-GCM' (status=1)
  3960. Tue Jan 31 20:28:15 2017 us=667866 PonomarevkaES/85.192.131.83 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3961. Tue Jan 31 20:28:15 2017 us=667866 PonomarevkaES/85.192.131.83 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3962. Tue Jan 31 20:28:15 2017 us=667866 PonomarevkaES/85.192.131.83 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3963. Tue Jan 31 20:28:15 2017 us=855354 KrasnoholmES/85.192.131.86 PUSH: Received control message: 'PUSH_REQUEST'
  3964. Tue Jan 31 20:28:15 2017 us=855354 KrasnoholmES/85.192.131.86 SENT CONTROL [KrasnoholmES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.87 255.255.255.0,peer-id 117,cipher AES-256-GCM' (status=1)
  3965. Tue Jan 31 20:28:15 2017 us=855354 KrasnoholmES/85.192.131.86 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  3966. Tue Jan 31 20:28:15 2017 us=855354 KrasnoholmES/85.192.131.86 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3967. Tue Jan 31 20:28:15 2017 us=855354 KrasnoholmES/85.192.131.86 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  3968. Tue Jan 31 20:28:15 2017 us=855354 83.174.229.219 peer info: IV_VER=2.3.14
  3969. Tue Jan 31 20:28:15 2017 us=855354 83.174.229.219 peer info: IV_PLAT=win
  3970. Tue Jan 31 20:28:15 2017 us=855354 83.174.229.219 peer info: IV_PROTO=2
  3971. Tue Jan 31 20:28:15 2017 us=855354 83.174.229.219 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  3972. Tue Jan 31 20:28:15 2017 us=855354 83.174.229.219 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3973. Tue Jan 31 20:28:15 2017 us=855354 83.174.229.219 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  3974. Tue Jan 31 20:28:15 2017 us=855354 83.174.229.219 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3975. Tue Jan 31 20:28:16 2017 us=42869 85.192.156.156 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3976. Tue Jan 31 20:28:16 2017 us=42869 85.192.156.156 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=MednogorskMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  3977. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_VER=2.4.0
  3978. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_PLAT=win
  3979. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_PROTO=2
  3980. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_NCP=2
  3981. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_LZ4=1
  3982. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_LZ4v2=1
  3983. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_LZO=1
  3984. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_COMP_STUB=1
  3985. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_COMP_STUBv2=1
  3986. Tue Jan 31 20:28:16 2017 us=245973 85.192.156.156 peer info: IV_TCPNL=1
  3987. Tue Jan 31 20:28:16 2017 us=277215 KvarkenoES2/85.192.131.101 PUSH: Received control message: 'PUSH_REQUEST'
  3988. Tue Jan 31 20:28:16 2017 us=277215 KvarkenoES2/85.192.131.101 SENT CONTROL [KvarkenoES2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.57 255.255.255.0,peer-id 116' (status=1)
  3989. Tue Jan 31 20:28:16 2017 us=402233 85.192.156.156 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  3990. Tue Jan 31 20:28:16 2017 us=402233 85.192.156.156 [MednogorskMTS] Peer Connection Initiated with [AF_INET6]::ffff:85.192.156.156:11829
  3991. Tue Jan 31 20:28:16 2017 us=402233 MednogorskMTS/85.192.156.156 MULTI_sva: pool returned IPv4=10.5.0.62, IPv6=(Not enabled)
  3992. Tue Jan 31 20:28:16 2017 us=402233 MednogorskMTS/85.192.156.156 MULTI: Learn: 10.5.0.62 -> MednogorskMTS/85.192.156.156
  3993. Tue Jan 31 20:28:16 2017 us=402233 MednogorskMTS/85.192.156.156 MULTI: primary virtual IP for MednogorskMTS/85.192.156.156: 10.5.0.62
  3994. Tue Jan 31 20:28:17 2017 us=11616 MULTI: multi_create_instance called
  3995. Tue Jan 31 20:28:17 2017 us=11616 83.174.226.113 Re-using SSL/TLS context
  3996. Tue Jan 31 20:28:17 2017 us=11616 83.174.226.113 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  3997. Tue Jan 31 20:28:17 2017 us=11616 83.174.226.113 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  3998. Tue Jan 31 20:28:17 2017 us=11616 83.174.226.113 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  3999. Tue Jan 31 20:28:17 2017 us=11616 83.174.226.113 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  4000. Tue Jan 31 20:28:17 2017 us=11616 83.174.226.113 TLS: Initial packet from [AF_INET6]::ffff:83.174.226.113:17561, sid=cb85fd74 c270ca69
  4001. Tue Jan 31 20:28:17 2017 us=183502 83.174.226.113 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4002. Tue Jan 31 20:28:17 2017 us=183502 83.174.226.113 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=FedorovkaMTS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4003. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_VER=2.4.0
  4004. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_PLAT=win
  4005. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_PROTO=2
  4006. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_NCP=2
  4007. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_LZ4=1
  4008. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_LZ4v2=1
  4009. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_LZO=1
  4010. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_COMP_STUB=1
  4011. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_COMP_STUBv2=1
  4012. Tue Jan 31 20:28:17 2017 us=277248 83.174.226.113 peer info: IV_TCPNL=1
  4013. Tue Jan 31 20:28:17 2017 us=355349 83.174.226.113 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4014. Tue Jan 31 20:28:17 2017 us=355349 83.174.226.113 [FedorovkaMTS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.226.113:17561
  4015. Tue Jan 31 20:28:17 2017 us=355349 FedorovkaMTS/83.174.226.113 MULTI_sva: pool returned IPv4=10.5.0.36, IPv6=(Not enabled)
  4016. Tue Jan 31 20:28:17 2017 us=355349 FedorovkaMTS/83.174.226.113 MULTI: Learn: 10.5.0.36 -> FedorovkaMTS/83.174.226.113
  4017. Tue Jan 31 20:28:17 2017 us=355349 FedorovkaMTS/83.174.226.113 MULTI: primary virtual IP for FedorovkaMTS/83.174.226.113: 10.5.0.36
  4018. Tue Jan 31 20:28:17 2017 us=386589 MULTI: multi_create_instance called
  4019. Tue Jan 31 20:28:17 2017 us=386589 85.192.128.241 Re-using SSL/TLS context
  4020. Tue Jan 31 20:28:17 2017 us=386589 85.192.128.241 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  4021. Tue Jan 31 20:28:17 2017 us=386589 85.192.128.241 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  4022. Tue Jan 31 20:28:17 2017 us=386589 85.192.128.241 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  4023. Tue Jan 31 20:28:17 2017 us=386589 85.192.128.241 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  4024. Tue Jan 31 20:28:17 2017 us=386589 85.192.128.241 TLS: Initial packet from [AF_INET6]::ffff:85.192.128.241:60597, sid=65182243 db328537
  4025. Tue Jan 31 20:28:17 2017 us=480341 85.192.128.241 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4026. Tue Jan 31 20:28:17 2017 us=480341 85.192.128.241 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SorochinskFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4027. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_VER=2.4.0
  4028. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_PLAT=win
  4029. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_PROTO=2
  4030. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_NCP=2
  4031. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_LZ4=1
  4032. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_LZ4v2=1
  4033. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_LZO=1
  4034. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_COMP_STUB=1
  4035. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_COMP_STUBv2=1
  4036. Tue Jan 31 20:28:17 2017 us=511622 85.192.128.241 peer info: IV_TCPNL=1
  4037. Tue Jan 31 20:28:17 2017 us=511622 MULTI: multi_create_instance called
  4038. Tue Jan 31 20:28:17 2017 us=511622 83.174.225.117 Re-using SSL/TLS context
  4039. Tue Jan 31 20:28:17 2017 us=511622 83.174.225.117 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  4040. Tue Jan 31 20:28:17 2017 us=511622 83.174.225.117 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  4041. Tue Jan 31 20:28:17 2017 us=511622 83.174.225.117 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  4042. Tue Jan 31 20:28:17 2017 us=511622 83.174.225.117 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  4043. Tue Jan 31 20:28:17 2017 us=511622 83.174.225.117 TLS: Initial packet from [AF_INET6]::ffff:83.174.225.117:62166, sid=6e64c15c 76c4ecb3
  4044. Tue Jan 31 20:28:17 2017 us=527247 MednogorskMTS/85.192.156.156 PUSH: Received control message: 'PUSH_REQUEST'
  4045. Tue Jan 31 20:28:17 2017 us=527247 MednogorskMTS/85.192.156.156 SENT CONTROL [MednogorskMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.62 255.255.255.0,peer-id 101,cipher AES-256-GCM' (status=1)
  4046. Tue Jan 31 20:28:17 2017 us=527247 MednogorskMTS/85.192.156.156 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  4047. Tue Jan 31 20:28:17 2017 us=527247 MednogorskMTS/85.192.156.156 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4048. Tue Jan 31 20:28:17 2017 us=527247 MednogorskMTS/85.192.156.156 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4049. Tue Jan 31 20:28:17 2017 us=542863 85.192.128.241 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4050. Tue Jan 31 20:28:17 2017 us=542863 85.192.128.241 [SorochinskFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.128.241:60597
  4051. Tue Jan 31 20:28:17 2017 us=542863 SorochinskFS2/85.192.128.241 MULTI_sva: pool returned IPv4=10.5.0.90, IPv6=(Not enabled)
  4052. Tue Jan 31 20:28:17 2017 us=542863 SorochinskFS2/85.192.128.241 MULTI: Learn: 10.5.0.90 -> SorochinskFS2/85.192.128.241
  4053. Tue Jan 31 20:28:17 2017 us=542863 SorochinskFS2/85.192.128.241 MULTI: primary virtual IP for SorochinskFS2/85.192.128.241: 10.5.0.90
  4054. Tue Jan 31 20:28:17 2017 us=620966 83.174.225.117 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4055. Tue Jan 31 20:28:17 2017 us=620966 83.174.225.117 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=SterlibashevoFS, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4056. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_VER=2.4.0
  4057. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_PLAT=win
  4058. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_PROTO=2
  4059. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_NCP=2
  4060. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_LZ4=1
  4061. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_LZ4v2=1
  4062. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_LZO=1
  4063. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_COMP_STUB=1
  4064. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_COMP_STUBv2=1
  4065. Tue Jan 31 20:28:17 2017 us=667864 83.174.225.117 peer info: IV_TCPNL=1
  4066. Tue Jan 31 20:28:17 2017 us=667864 83.174.229.219 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4067. Tue Jan 31 20:28:17 2017 us=667864 83.174.229.219 [BaimakES] Peer Connection Initiated with [AF_INET6]::ffff:83.174.229.219:24057
  4068. Tue Jan 31 20:28:17 2017 us=667864 BaimakES/83.174.229.219 MULTI_sva: pool returned IPv4=10.5.0.3, IPv6=(Not enabled)
  4069. Tue Jan 31 20:28:17 2017 us=667864 BaimakES/83.174.229.219 MULTI: Learn: 10.5.0.3 -> BaimakES/83.174.229.219
  4070. Tue Jan 31 20:28:17 2017 us=667864 BaimakES/83.174.229.219 MULTI: primary virtual IP for BaimakES/83.174.229.219: 10.5.0.3
  4071. Tue Jan 31 20:28:17 2017 us=714716 83.174.225.117 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4072. Tue Jan 31 20:28:17 2017 us=714716 83.174.225.117 [SterlibashevoFS] Peer Connection Initiated with [AF_INET6]::ffff:83.174.225.117:62166
  4073. Tue Jan 31 20:28:17 2017 us=714716 SterlibashevoFS/83.174.225.117 MULTI_sva: pool returned IPv4=10.5.0.25, IPv6=(Not enabled)
  4074. Tue Jan 31 20:28:17 2017 us=714716 SterlibashevoFS/83.174.225.117 MULTI: Learn: 10.5.0.25 -> SterlibashevoFS/83.174.225.117
  4075. Tue Jan 31 20:28:17 2017 us=714716 SterlibashevoFS/83.174.225.117 MULTI: primary virtual IP for SterlibashevoFS/83.174.225.117: 10.5.0.25
  4076. Tue Jan 31 20:28:17 2017 us=964739 NovoorskT2/85.192.129.228 PID_ERR replay-window backtrack occurred [2] [SSL-0] [0__000001] 0:9 0:7 t=1485876497[0] r=[-1,64,15,2,1] sl=[55,9,64,528]
  4077. Tue Jan 31 20:28:18 2017 us=480386 FedorovkaMTS/83.174.226.113 PUSH: Received control message: 'PUSH_REQUEST'
  4078. Tue Jan 31 20:28:18 2017 us=480386 FedorovkaMTS/83.174.226.113 SENT CONTROL [FedorovkaMTS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.36 255.255.255.0,peer-id 119,cipher AES-256-GCM' (status=1)
  4079. Tue Jan 31 20:28:18 2017 us=480386 FedorovkaMTS/83.174.226.113 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  4080. Tue Jan 31 20:28:18 2017 us=480386 FedorovkaMTS/83.174.226.113 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4081. Tue Jan 31 20:28:18 2017 us=480386 FedorovkaMTS/83.174.226.113 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4082. Tue Jan 31 20:28:18 2017 us=792997 SorochinskFS2/85.192.128.241 PUSH: Received control message: 'PUSH_REQUEST'
  4083. Tue Jan 31 20:28:18 2017 us=792997 SorochinskFS2/85.192.128.241 SENT CONTROL [SorochinskFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.90 255.255.255.0,peer-id 120,cipher AES-256-GCM' (status=1)
  4084. Tue Jan 31 20:28:18 2017 us=792997 SorochinskFS2/85.192.128.241 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  4085. Tue Jan 31 20:28:18 2017 us=792997 SorochinskFS2/85.192.128.241 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4086. Tue Jan 31 20:28:18 2017 us=792997 SorochinskFS2/85.192.128.241 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4087. Tue Jan 31 20:28:18 2017 us=965237 SterlibashevoFS/83.174.225.117 PUSH: Received control message: 'PUSH_REQUEST'
  4088. Tue Jan 31 20:28:18 2017 us=965237 SterlibashevoFS/83.174.225.117 SENT CONTROL [SterlibashevoFS]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.25 255.255.255.0,peer-id 121,cipher AES-256-GCM' (status=1)
  4089. Tue Jan 31 20:28:18 2017 us=965237 SterlibashevoFS/83.174.225.117 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  4090. Tue Jan 31 20:28:18 2017 us=965237 SterlibashevoFS/83.174.225.117 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4091. Tue Jan 31 20:28:18 2017 us=965237 SterlibashevoFS/83.174.225.117 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4092. Tue Jan 31 20:28:19 2017 us=995993 BaimakES/83.174.229.219 PUSH: Received control message: 'PUSH_REQUEST'
  4093. Tue Jan 31 20:28:19 2017 us=995993 BaimakES/83.174.229.219 SENT CONTROL [BaimakES]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.3 255.255.255.0,peer-id 28' (status=1)
  4094. Tue Jan 31 20:28:21 2017 us=136596 NovoorskMTS/85.192.129.228 MULTI: bad source address from client [192.168.1.4], packet dropped
  4095. Tue Jan 31 20:28:33 2017 us=886626 Float requested for peer 15 to 62.133.169.225
  4096. Tue Jan 31 20:28:33 2017 us=886626 peer 15 (ChekmagushES) floated from 62.133.169.225 to [AF_INET6]::ffff:62.133.169.225:10133
  4097. Tue Jan 31 20:28:51 2017 us=808539 NovoorskMTS2/85.192.129.228 MULTI: bad source address from client [192.168.1.5], packet dropped
  4098. Tue Jan 31 20:28:54 2017 us=824168 NovoorskMTS2/85.192.129.228 MULTI: bad source address from client [192.168.1.5], packet dropped
  4099. Tue Jan 31 20:28:55 2017 us=261675 Float requested for peer 71 to 85.192.132.1
  4100. Tue Jan 31 20:28:55 2017 us=261675 peer 71 (BuzulukFS2) floated from 85.192.132.1 to [AF_INET6]::ffff:85.192.132.1:16986
  4101. Tue Jan 31 20:28:55 2017 us=433540 Float requested for peer 69 to 83.174.221.250
  4102. Tue Jan 31 20:28:55 2017 us=433540 peer 69 (RaevskiiES) floated from 83.174.221.250 to [AF_INET6]::ffff:83.174.221.250:13283
  4103. Tue Jan 31 20:28:57 2017 us=277295 Float requested for peer 83 to 85.192.132.1
  4104. Tue Jan 31 20:28:57 2017 us=277295 peer 83 (BuzulukFS) floated from 85.192.132.1 to [AF_INET6]::ffff:85.192.132.1:16987
  4105. Tue Jan 31 20:29:00 2017 us=855427 NovoorskMTS2/85.192.129.228 MULTI: bad source address from client [192.168.1.5], packet dropped
  4106. Tue Jan 31 20:29:04 2017 us=605511 Float requested for peer 30 to 85.192.131.86
  4107. Tue Jan 31 20:29:04 2017 us=605511 peer 30 (KrasnoholmES2) floated from 85.192.131.86 to [AF_INET6]::ffff:85.192.131.86:26819
  4108. Tue Jan 31 20:29:07 2017 us=652314 Float requested for peer 69 to 83.174.221.250
  4109. Tue Jan 31 20:29:07 2017 us=652314 peer 69 (RaevskiiES) floated from 83.174.221.250 to [AF_INET6]::ffff:83.174.221.250:13284
  4110. Tue Jan 31 20:29:09 2017 us=308568 MeleuzES/83.174.219.156 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_0000000001111123333_4444455677788888899999>>>>>>>>>>>>>>>>>>EE] 0:71 0:70 t=1485876549[0] r=[-1,64,15,1,1] sl=[57,64,64,528]
  4111. Tue Jan 31 20:29:14 2017 us=167970 MULTI: multi_create_instance called
  4112. Tue Jan 31 20:29:14 2017 us=167970 85.192.132.111 Re-using SSL/TLS context
  4113. Tue Jan 31 20:29:14 2017 us=167970 85.192.132.111 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  4114. Tue Jan 31 20:29:14 2017 us=167970 85.192.132.111 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  4115. Tue Jan 31 20:29:14 2017 us=167970 85.192.132.111 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  4116. Tue Jan 31 20:29:14 2017 us=167970 85.192.132.111 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  4117. Tue Jan 31 20:29:14 2017 us=167970 85.192.132.111 TLS: Initial packet from [AF_INET6]::ffff:85.192.132.111:57159, sid=05510ddb e11b0930
  4118. Tue Jan 31 20:29:15 2017 us=105475 85.192.132.111 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4119. Tue Jan 31 20:29:15 2017 us=105475 85.192.132.111 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AdamovkaFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4120. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_VER=2.4.0
  4121. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_PLAT=win
  4122. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_PROTO=2
  4123. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_NCP=2
  4124. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_LZ4=1
  4125. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_LZ4v2=1
  4126. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_LZO=1
  4127. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_COMP_STUB=1
  4128. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_COMP_STUBv2=1
  4129. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_TCPNL=1
  4130. Tue Jan 31 20:29:15 2017 us=246097 85.192.132.111 peer info: IV_GUI_VER=OpenVPN_GUI_11
  4131. Tue Jan 31 20:29:15 2017 us=292978 85.192.132.111 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4132. Tue Jan 31 20:29:15 2017 us=292978 85.192.132.111 [AdamovkaFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.132.111:57159
  4133. Tue Jan 31 20:29:15 2017 us=292978 AdamovkaFS2/85.192.132.111 MULTI_sva: pool returned IPv4=10.5.0.49, IPv6=(Not enabled)
  4134. Tue Jan 31 20:29:15 2017 us=292978 AdamovkaFS2/85.192.132.111 MULTI: Learn: 10.5.0.49 -> AdamovkaFS2/85.192.132.111
  4135. Tue Jan 31 20:29:15 2017 us=292978 AdamovkaFS2/85.192.132.111 MULTI: primary virtual IP for AdamovkaFS2/85.192.132.111: 10.5.0.49
  4136. Tue Jan 31 20:29:16 2017 us=511712 AdamovkaFS2/85.192.132.111 PUSH: Received control message: 'PUSH_REQUEST'
  4137. Tue Jan 31 20:29:16 2017 us=511712 AdamovkaFS2/85.192.132.111 SENT CONTROL [AdamovkaFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.49 255.255.255.0,peer-id 122,cipher AES-256-GCM' (status=1)
  4138. Tue Jan 31 20:29:16 2017 us=511712 AdamovkaFS2/85.192.132.111 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  4139. Tue Jan 31 20:29:16 2017 us=511712 AdamovkaFS2/85.192.132.111 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4140. Tue Jan 31 20:29:16 2017 us=511712 AdamovkaFS2/85.192.132.111 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4141. Tue Jan 31 20:29:17 2017 us=371083 AdamovkaFS2/85.192.132.111 MULTI: bad source address from client [::], packet dropped
  4142. Tue Jan 31 20:29:34 2017 us=886752 Float requested for peer 23 to 85.192.171.215
  4143. Tue Jan 31 20:29:34 2017 us=886752 peer 23 (KvarkenoMTS) floated from 85.192.171.215 to [AF_INET6]::ffff:85.192.171.215:11240
  4144. Tue Jan 31 20:29:35 2017 us=433623 Float requested for peer 97 to 83.174.238.107
  4145. Tue Jan 31 20:29:35 2017 us=433623 peer 97 (SharanMTS) floated from 83.174.238.107 to [AF_INET6]::ffff:83.174.238.107:19176
  4146. Tue Jan 31 20:29:36 2017 us=293000 Float requested for peer 52 to 85.192.130.64
  4147. Tue Jan 31 20:29:36 2017 us=293000 peer 52 (PleshanovoFS) floated from 85.192.130.64 to [AF_INET6]::ffff:85.192.130.64:27840
  4148. Tue Jan 31 20:29:37 2017 us=793005 BuzulukRus/85.192.146.98 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_0000000000000__0000002>EEEEEEEEEEEEEEEEE] 0:42 0:41 t=1485876577[0] r=[-2,64,15,1,1] sl=[22,42,64,528]
  4149. Tue Jan 31 20:29:39 2017 us=355501 GrachevkaMTS/85.192.171.101 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_0000000000000>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:91 0:90 t=1485876579[0] r=[0,64,15,1,1] sl=[37,64,64,528]
  4150. Tue Jan 31 20:29:49 2017 us=277396 OrskEkspressFS/85.192.179.42 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_0000007EEEEEEEE] 0:17 0:16 t=1485876589[0] r=[0,64,15,1,1] sl=[47,17,64,528]
  4151. Tue Jan 31 20:29:51 2017 us=105526 Float requested for peer 71 to 85.192.132.1
  4152. Tue Jan 31 20:29:51 2017 us=105526 peer 71 (BuzulukFS2) floated from 85.192.132.1 to [AF_INET6]::ffff:85.192.132.1:17008
  4153. Tue Jan 31 20:29:54 2017 us=902408 PonomarevkaFS/85.192.131.80 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_00000033333333333333444444444444444444445555555555555555556666] 0:310 0:309 t=1485876594[0] r=[-3,64,15,1,1] sl=[10,64,64,528]
  4154. Tue Jan 31 20:30:07 2017 us=214931 Float requested for peer 39 to 85.192.131.86
  4155. Tue Jan 31 20:30:07 2017 us=214931 peer 39 (KrasnoholmFS) floated from 85.192.131.86 to [AF_INET6]::ffff:85.192.131.86:26834
  4156. Tue Jan 31 20:30:15 2017 us=824331 Float requested for peer 23 to 85.192.171.215
  4157. Tue Jan 31 20:30:15 2017 us=824331 peer 23 (KvarkenoMTS) floated from 85.192.171.215 to [AF_INET6]::ffff:85.192.171.215:11244
  4158. Tue Jan 31 20:30:31 2017 us=199352 MeleuzES/83.174.219.156 MULTI: bad source address from client [192.168.1.2], packet dropped
  4159. Tue Jan 31 20:30:34 2017 us=214982 MeleuzES/83.174.219.156 MULTI: bad source address from client [192.168.1.2], packet dropped
  4160. Tue Jan 31 20:30:36 2017 us=183738 MULTI: multi_create_instance called
  4161. Tue Jan 31 20:30:36 2017 us=183738 85.192.132.111 Re-using SSL/TLS context
  4162. Tue Jan 31 20:30:36 2017 us=183738 85.192.132.111 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  4163. Tue Jan 31 20:30:36 2017 us=183738 85.192.132.111 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  4164. Tue Jan 31 20:30:36 2017 us=183738 85.192.132.111 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  4165. Tue Jan 31 20:30:36 2017 us=183738 85.192.132.111 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  4166. Tue Jan 31 20:30:36 2017 us=183738 85.192.132.111 TLS: Initial packet from [AF_INET6]::ffff:85.192.132.111:56126, sid=acd0fe6e 63e92e99
  4167. Tue Jan 31 20:30:36 2017 us=449440 85.192.132.111 VERIFY OK: depth=1, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=Llocal, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4168. Tue Jan 31 20:30:36 2017 us=449440 85.192.132.111 VERIFY OK: depth=0, C=RU, ST=ORB, L=Orenbourg, O=Lening, OU=OVPN_KSC, CN=AdamovkaFS2, name=OVPN_Lening, emailAddress=a.lopatin@weteam.ru
  4169. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_VER=2.4.0
  4170. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_PLAT=win
  4171. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_PROTO=2
  4172. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_NCP=2
  4173. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_LZ4=1
  4174. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_LZ4v2=1
  4175. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_LZO=1
  4176. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_COMP_STUB=1
  4177. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_COMP_STUBv2=1
  4178. Tue Jan 31 20:30:36 2017 us=590013 85.192.132.111 peer info: IV_TCPNL=1
  4179. Tue Jan 31 20:30:36 2017 us=824375 85.192.132.111 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  4180. Tue Jan 31 20:30:36 2017 us=824375 85.192.132.111 [AdamovkaFS2] Peer Connection Initiated with [AF_INET6]::ffff:85.192.132.111:56126
  4181. Tue Jan 31 20:30:36 2017 us=824375 MULTI: new connection by client 'AdamovkaFS2' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  4182. Tue Jan 31 20:30:36 2017 us=824375 MULTI_sva: pool returned IPv4=10.5.0.49, IPv6=(Not enabled)
  4183. Tue Jan 31 20:30:36 2017 us=824375 MULTI: Learn: 10.5.0.49 -> AdamovkaFS2/85.192.132.111
  4184. Tue Jan 31 20:30:36 2017 us=824375 MULTI: primary virtual IP for AdamovkaFS2/85.192.132.111: 10.5.0.49
  4185. Tue Jan 31 20:30:38 2017 us=11872 AdamovkaFS2/85.192.132.111 PUSH: Received control message: 'PUSH_REQUEST'
  4186. Tue Jan 31 20:30:38 2017 us=11872 AdamovkaFS2/85.192.132.111 SENT CONTROL [AdamovkaFS2]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.5.0.0 255.255.255.0,dhcp-option DNS 192.168.0.249,dhcp-option DNS 192.168.0.251,dhcp-option DOMAIN Lening.local,dhcp-option SEARCH Lening.local,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.5.0.49 255.255.255.0,peer-id 123,cipher AES-256-GCM' (status=1)
  4187. Tue Jan 31 20:30:38 2017 us=11872 AdamovkaFS2/85.192.132.111 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  4188. Tue Jan 31 20:30:38 2017 us=11872 AdamovkaFS2/85.192.132.111 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4189. Tue Jan 31 20:30:38 2017 us=11872 AdamovkaFS2/85.192.132.111 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  4190. Tue Jan 31 20:30:38 2017 us=730628 AdamovkaFS2/85.192.132.111 MULTI: bad source address from client [::], packet dropped
  4191. Tue Jan 31 20:30:40 2017 us=152497 MeleuzES/83.174.219.156 MULTI: bad source address from client [192.168.1.2], packet dropped
  4192. Tue Jan 31 20:30:45 2017 us=543134 Float requested for peer 15 to 62.133.169.225
  4193. Tue Jan 31 20:30:45 2017 us=543134 peer 15 (ChekmagushES) floated from 62.133.169.225 to [AF_INET6]::ffff:62.133.169.225:10139
  4194. Tue Jan 31 20:30:46 2017 us=433757 ChishmiES/77.94.104.55 MULTI: bad source address from client [192.168.1.3], packet dropped
  4195. Tue Jan 31 20:30:46 2017 us=668134 Float requested for peer 23 to 85.192.171.215
  4196. Tue Jan 31 20:30:46 2017 us=668134 peer 23 (KvarkenoMTS) floated from 85.192.171.215 to [AF_INET6]::ffff:85.192.171.215:11247
  4197. Tue Jan 31 20:30:49 2017 us=433769 ChishmiES/77.94.104.55 MULTI: bad source address from client [192.168.1.3], packet dropped
  4198. Tue Jan 31 20:30:55 2017 us=465023 ChishmiES/77.94.104.55 MULTI: bad source address from client [192.168.1.3], packet dropped
Add Comment
Please, Sign In to add comment