Advertisement
Guest User

Untitled

a guest
Feb 26th, 2016
403
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 49.53 KB | None | 0 0
  1. Feb 26 14:00:17 disk_monitor: Got SIGALRM...
  2. Feb 26 14:04:59 dropbear[3028]: Child connection from 108.61.228.16:63519
  3. Feb 26 14:04:59 dropbear[3028]: Password auth succeeded for 'admin' from 108.61.228.16:63519
  4. Feb 26 14:05:26 rc_service: httpd 509:notify_rc reboot
  5. Feb 26 14:05:26 dnsmasq[503]: read /etc/hosts - 5 addresses
  6. Feb 26 14:05:26 dnsmasq[503]: read /etc/hosts.dnsmasq - 19 addresses
  7. Feb 26 14:05:26 dnsmasq-dhcp[503]: read /etc/ethers - 19 addresses
  8. Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.61#53 for domain neo.rr.com
  9. Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.62#53 for domain neo.rr.com
  10. Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.62#53
  11. Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.61#53
  12. Feb 26 14:05:26 kernel: device eth0 left promiscuous mode
  13. Feb 26 14:05:26 kernel: br0: port 1(vlan1) entering forwarding state
  14. Feb 26 14:05:26 kernel: device eth0 entered promiscuous mode
  15. Feb 26 14:05:26 kernel: br0: topology change detected, propagating
  16. Feb 26 14:05:26 kernel: br0: port 1(vlan1) entering forwarding state
  17. Feb 26 14:05:26 kernel: br0: port 1(vlan1) entering forwarding state
  18. Feb 26 14:05:26 miniupnpd[858]: ioctl(s, SIOCGIFADDR, ...): Cannot assign requested address
  19. Feb 26 14:05:26 miniupnpd[858]: Failed to get IP for interface eth0
  20. Feb 26 14:05:26 miniupnpd[858]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping
  21. Feb 26 14:05:26 dnsmasq[503]: read /etc/hosts - 5 addresses
  22. Feb 26 14:05:26 dnsmasq[503]: read /etc/hosts.dnsmasq - 19 addresses
  23. Feb 26 14:05:26 dnsmasq-dhcp[503]: read /etc/ethers - 19 addresses
  24. Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.61#53 for domain neo.rr.com
  25. Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.62#53 for domain neo.rr.com
  26. Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.62#53
  27. Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.61#53
  28. Feb 26 14:05:26 openvpn[1372]: write UDPv4: Network is unreachable (code=101)
  29. Feb 26 14:05:26 openvpn[1372]: event_wait : Interrupted system call (code=4)
  30. Feb 26 14:05:26 openvpn[1372]: vpnrouting.sh tun11 1500 1558 10.100.4.6 10.100.4.5 init
  31. Feb 26 14:05:26 openvpn-routing: Configuring policy rules for client 1
  32. Feb 26 14:05:26 openvpn-routing: Removing rule 1001 from routing policy
  33. Feb 26 14:05:26 openvpn-routing: Removing rule 1002 from routing policy
  34. Feb 26 14:05:26 openvpn-routing: Removing rule 1101 from routing policy
  35. Feb 26 14:05:26 openvpn-routing: Removing rule 1102 from routing policy
  36. Feb 26 14:05:26 openvpn-routing: Removing rule 1103 from routing policy
  37. Feb 26 14:05:26 openvpn-routing: Removing rule 1104 from routing policy
  38. Feb 26 14:05:26 openvpn-routing: Removing rule 1105 from routing policy
  39. Feb 26 14:05:26 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
  40. Feb 26 14:05:26 openvpn-routing: Removing rule 1106 from routing policy
  41. Feb 26 14:05:27 openvpn-routing: Removing rule 1107 from routing policy
  42. Feb 26 14:05:27 openvpn-routing: Removing rule 1108 from routing policy
  43. Feb 26 14:05:27 openvpn-routing: Removing rule 1109 from routing policy
  44. Feb 26 14:05:27 openvpn-routing: Removing rule 1110 from routing policy
  45. Feb 26 14:05:27 openvpn-routing: Removing rule 1111 from routing policy
  46. Feb 26 14:05:27 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
  47. Feb 26 14:05:27 openvpn-routing: Removing rule 1112 from routing policy
  48. Feb 26 14:05:27 openvpn-routing: Removing rule 1113 from routing policy
  49. Feb 26 14:05:27 openvpn-routing: Removing rule 1114 from routing policy
  50. Feb 26 14:05:27 openvpn-routing: Removing rule 1115 from routing policy
  51. Feb 26 14:05:27 openvpn-routing: Removing rule 1116 from routing policy
  52. Feb 26 14:05:27 openvpn-routing: Tunnel down - VPN client access blocked
  53. Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
  54. Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
  55. Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
  56. Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
  57. Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
  58. Feb 26 14:05:27 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
  59. Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
  60. Feb 26 14:05:27 dnsmasq[503]: read /etc/hosts - 5 addresses
  61. Feb 26 14:05:27 dnsmasq[503]: read /etc/hosts.dnsmasq - 19 addresses
  62. Feb 26 14:05:27 dnsmasq-dhcp[503]: read /etc/ethers - 19 addresses
  63. Feb 26 14:05:27 dnsmasq[503]: using nameserver 209.18.47.61#53 for domain neo.rr.com
  64. Feb 26 14:05:27 dnsmasq[503]: using nameserver 209.18.47.62#53 for domain neo.rr.com
  65. Feb 26 14:05:27 dnsmasq[503]: using nameserver 209.18.47.62#53
  66. Feb 26 14:05:27 dnsmasq[503]: using nameserver 209.18.47.61#53
  67. Feb 26 14:05:27 dnsmasq[503]: exiting on receipt of SIGTERM
  68. Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
  69. Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
  70. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
  71. Feb 26 14:05:28 dnsmasq[3382]: started, version 2.76-g41a8d9e cachesize 1500
  72. Feb 26 14:05:28 dnsmasq[3382]: warning: interface ppp1* does not currently exist
  73. Feb 26 14:05:28 dnsmasq[3382]: asynchronous logging enabled, queue limit is 5 messages
  74. Feb 26 14:05:28 dnsmasq-dhcp[3382]: DHCP, IP range 192.168.2.2 -- 192.168.2.254, lease time 1d
  75. Feb 26 14:05:28 dnsmasq[3382]: read /etc/hosts - 5 addresses
  76. Feb 26 14:05:28 dnsmasq[3382]: read /etc/hosts.dnsmasq - 19 addresses
  77. Feb 26 14:05:28 dnsmasq-dhcp[3382]: read /etc/ethers - 19 addresses
  78. Feb 26 14:05:28 dnsmasq[3382]: using nameserver 209.18.47.61#53 for domain neo.rr.com
  79. Feb 26 14:05:28 dnsmasq[3382]: using nameserver 209.18.47.62#53 for domain neo.rr.com
  80. Feb 26 14:05:28 dnsmasq[3382]: using nameserver 209.18.47.62#53
  81. Feb 26 14:05:28 dnsmasq[3382]: using nameserver 209.18.47.61#53
  82. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
  83. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
  84. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
  85. Feb 26 14:05:28 openvpn[1383]: event_wait : Interrupted system call (code=4)
  86. Feb 26 14:05:28 openvpn[1383]: SIGTERM received, sending exit notification to peer
  87. Feb 26 14:05:28 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
  88. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
  89. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
  90. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
  91. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
  92. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
  93. Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
  94. Feb 26 14:05:28 openvpn-routing: Completed routing policy configuration for client 1
  95. Feb 26 14:05:29 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
  96. Feb 26 14:05:29 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
  97. Feb 26 14:05:29 dnsmasq[3382]: exiting on receipt of SIGTERM
  98. Feb 26 14:05:29 dnsmasq[3561]: started, version 2.76-g41a8d9e cachesize 1500
  99. Feb 26 14:05:29 dnsmasq[3561]: warning: interface ppp1* does not currently exist
  100. Feb 26 14:05:29 dnsmasq[3561]: asynchronous logging enabled, queue limit is 5 messages
  101. Feb 26 14:05:29 dnsmasq-dhcp[3561]: DHCP, IP range 192.168.2.2 -- 192.168.2.254, lease time 1d
  102. Feb 26 14:05:29 dnsmasq[3561]: read /etc/hosts - 5 addresses
  103. Feb 26 14:05:29 dnsmasq[3561]: read /etc/hosts.dnsmasq - 19 addresses
  104. Feb 26 14:05:29 dnsmasq-dhcp[3561]: read /etc/ethers - 19 addresses
  105. Feb 26 14:05:29 dnsmasq[3561]: using nameserver 209.18.47.61#53 for domain neo.rr.com
  106. Feb 26 14:05:29 dnsmasq[3561]: using nameserver 209.18.47.62#53 for domain neo.rr.com
  107. Feb 26 14:05:29 dnsmasq[3561]: using nameserver 209.18.47.62#53
  108. Feb 26 14:05:29 dnsmasq[3561]: using nameserver 209.18.47.61#53
  109. Feb 26 14:05:29 iTunes: daemon is stopped
  110. Feb 26 14:05:29 FTP Server: daemon is stopped
  111. Feb 26 14:05:29 Samba Server: smb daemon is stopped
  112. Feb 26 14:05:29 kernel: gro disabled
  113. Feb 26 14:05:30 Timemachine: daemon is stopped
  114. Feb 26 14:05:30 WEBDAV Server: daemon is stopped
  115. Feb 26 14:05:30 kernel: usbcore: deregistering interface driver cdc_mbim
  116. Feb 26 14:05:30 kernel: usbcore: deregistering interface driver cdc_ncm
  117. Feb 26 14:05:30 kernel: usbcore: deregistering interface driver qmi_wwan
  118. Feb 26 14:05:30 kernel: usbcore: deregistering interface driver cdc_wdm
  119. Feb 26 14:05:30 kernel: usbcore: deregistering interface driver rndis_host
  120. Feb 26 14:05:30 kernel: usbcore: deregistering interface driver cdc_ether
  121. Feb 26 14:05:30 kernel: usbcore: deregistering interface driver asix
  122. Feb 26 14:05:30 kernel: cdrom: Uniform CD-ROM driver unloaded
  123. Feb 26 14:05:30 kernel: usbcore: deregistering interface driver usblp
  124. Feb 26 14:07:44 openvpn-routing: Creating VPN routing table
  125. Feb 26 14:07:44 rc_service: ntp 834:notify_rc restart_upnp
  126. Feb 26 14:07:44 miniupnpd[832]: shutting down MiniUPnPd
  127. Feb 26 14:07:44 openvpn-routing: Tunnel down - VPN client access blocked
  128. Feb 26 14:07:44 miniupnpd[867]: HTTP listening on port 54532
  129. Feb 26 14:07:44 miniupnpd[867]: Listening for NAT-PMP/PCP traffic on port 5351
  130. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
  131. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
  132. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
  133. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
  134. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
  135. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
  136. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
  137. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
  138. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
  139. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
  140. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
  141. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
  142. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
  143. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
  144. Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
  145. Feb 26 14:07:45 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
  146. Feb 26 14:07:45 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
  147. Feb 26 14:07:45 rc_service: ntp 834:notify_rc restart_diskmon
  148. Feb 26 14:07:45 disk_monitor: Finish
  149. Feb 26 14:07:45 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
  150. Feb 26 14:07:45 disk monitor: be idle
  151. Feb 26 14:07:45 openvpn-routing: Refreshing policy rules for client 2
  152. Feb 26 14:07:45 openvpn-routing: Creating VPN routing table
  153. Feb 26 14:07:45 openvpn-routing: Tunnel down - VPN client access blocked
  154. Feb 26 14:07:45 openvpn-routing: Adding route for 192.168.2.71 to 0.0.0.0 through VPN client 2
  155. Feb 26 14:07:45 openvpn-routing: Refreshing policy rules for client 3
  156. Feb 26 14:07:45 openvpn-routing: Allow WAN access to all VPN clients
  157. Feb 26 14:07:45 openvpn-routing: Refreshing policy rules for client 4
  158. Feb 26 14:07:45 openvpn-routing: Allow WAN access to all VPN clients
  159. Feb 26 14:07:45 openvpn-routing: Refreshing policy rules for client 5
  160. Feb 26 14:07:45 openvpn-routing: Allow WAN access to all VPN clients
  161. Feb 26 14:07:45 rc_service: udhcpc 581:notify_rc start_vpnclient1
  162. Feb 26 14:07:45 ddns: Completed custom ddns update
  163. Feb 26 14:07:45 rc_service: udhcpc 581:notify_rc start_vpnclient2
  164. Feb 26 14:07:45 rc_service: waitting "start_vpnclient1" via udhcpc ...
  165. Feb 26 14:07:45 kernel: tun: Universal TUN/TAP device driver, 1.6
  166. Feb 26 14:07:45 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
  167. Feb 26 14:07:46 openvpn[1370]: OpenVPN 2.3.10 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Feb 25 2016
  168. Feb 26 14:07:46 openvpn[1370]: library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
  169. Feb 26 14:07:46 openvpn[1371]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  170. Feb 26 14:07:46 openvpn[1371]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  171. Feb 26 14:07:46 openvpn[1371]: UDPv4 link local: [undef]
  172. Feb 26 14:07:46 openvpn[1371]: UDPv4 link remote: [AF_INET]108.61.228.91:1196
  173. Feb 26 14:07:46 openvpn[1371]: TLS: Initial packet from [AF_INET]108.61.228.91:1196, sid=25192013 696ab0c8
  174. Feb 26 14:07:46 openvpn[1371]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  175. Feb 26 14:07:46 openvpn[1371]: CRL CHECK OK: C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
  176. Feb 26 14:07:46 openvpn[1371]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
  177. Feb 26 14:07:46 openvpn[1371]: Validating certificate key usage
  178. Feb 26 14:07:46 openvpn[1371]: ++ Certificate has key usage 00a0, expects 00a0
  179. Feb 26 14:07:46 openvpn[1371]: VERIFY KU OK
  180. Feb 26 14:07:46 openvpn[1371]: Validating certificate extended key usage
  181. Feb 26 14:07:46 openvpn[1371]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  182. Feb 26 14:07:46 openvpn[1371]: VERIFY EKU OK
  183. Feb 26 14:07:46 openvpn[1371]: CRL CHECK OK: C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  184. Feb 26 14:07:46 openvpn[1371]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  185. Feb 26 14:07:46 openvpn[1371]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  186. Feb 26 14:07:46 openvpn[1371]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  187. Feb 26 14:07:46 openvpn[1371]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  188. Feb 26 14:07:46 openvpn[1371]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  189. Feb 26 14:07:46 openvpn[1371]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  190. Feb 26 14:07:46 openvpn[1371]: [Private Internet Access] Peer Connection Initiated with [AF_INET]108.61.228.91:1196
  191. Feb 26 14:07:46 openvpn[1381]: OpenVPN 2.3.10 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Feb 25 2016
  192. Feb 26 14:07:46 openvpn[1381]: library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
  193. Feb 26 14:07:46 openvpn[1382]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  194. Feb 26 14:07:46 openvpn[1382]: Control Channel Authentication: using 'static.key' as a OpenVPN static key file
  195. Feb 26 14:07:46 openvpn[1382]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  196. Feb 26 14:07:46 openvpn[1382]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  197. Feb 26 14:07:46 openvpn[1382]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  198. Feb 26 14:07:47 openvpn[1382]: UDPv4 link local: [undef]
  199. Feb 26 14:07:47 openvpn[1382]: UDPv4 link remote: [AF_INET]199.241.146.178:443
  200. Feb 26 14:07:47 openvpn[1382]: TLS: Initial packet from [AF_INET]199.241.146.178:443, sid=5b318a46 05321f74
  201. Feb 26 14:07:47 openvpn[1382]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  202. Feb 26 14:07:47 openvpn[1382]: Validating certificate key usage
  203. Feb 26 14:07:47 openvpn[1382]: ++ Certificate has key usage 00a0, expects 00a0
  204. Feb 26 14:07:47 openvpn[1382]: VERIFY KU OK
  205. Feb 26 14:07:47 openvpn[1382]: Validating certificate extended key usage
  206. Feb 26 14:07:47 openvpn[1382]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  207. Feb 26 14:07:47 openvpn[1382]: VERIFY EKU OK
  208. Feb 26 14:07:47 openvpn[1382]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  209. Feb 26 14:07:48 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
  210. Feb 26 14:07:48 openvpn[1371]: SENT CONTROL [Private Internet Access]: 'PUSH_REQUEST' (status=1)
  211. Feb 26 14:07:48 openvpn[1371]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.100.4.1,topology net30,ifconfig 10.100.4.6 10.100.4.5'
  212. Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: timers and/or timeouts modified
  213. Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: LZO parms modified
  214. Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: --ifconfig/up options modified
  215. Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: route options modified
  216. Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  217. Feb 26 14:07:48 openvpn[1371]: TUN/TAP device tun11 opened
  218. Feb 26 14:07:48 openvpn[1371]: TUN/TAP TX queue length set to 100
  219. Feb 26 14:07:48 openvpn[1371]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  220. Feb 26 14:07:48 openvpn[1371]: /usr/sbin/ip link set dev tun11 up mtu 1500
  221. Feb 26 14:07:48 openvpn[1371]: /usr/sbin/ip addr add dev tun11 local 10.100.4.6 peer 10.100.4.5
  222. Feb 26 14:07:48 openvpn[1371]: updown.sh tun11 1500 1558 10.100.4.6 10.100.4.5 init
  223. Feb 26 14:07:48 kernel: IDPfw: TrendMicro forward module ver-1.0.31
  224. Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: tun11
  225. Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: 1500
  226. Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: 1558
  227. Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: 10.100.4.6
  228. Feb 26 14:07:48 kernel: IDPfw: Apply module param dev_wan=eth0
  229. Feb 26 14:07:48 kernel: IDPfw: Apply module param sess_num=30000
  230. Feb 26 14:07:48 kernel: IDPfw: Init chrdev /dev/idpfw with major 191
  231. Feb 26 14:07:48 kernel: IDPfw: IDPfw is ready
  232. Feb 26 14:07:48 kernel: sizeof forward param = 160
  233. Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: 10.100.4.5
  234. Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: init
  235. Feb 26 14:07:48 openvpn-updown-codyqx4-main: FileDir: /etc/openvpn/dns
  236. Feb 26 14:07:48 openvpn-updown-codyqx4-main: FileBase: /etc/openvpn/dns/client1
  237. Feb 26 14:07:48 openvpn-updown-codyqx4-main: ConfFile: /etc/openvpn/dns/client1.conf
  238. Feb 26 14:07:48 openvpn-updown-codyqx4-main: ResolvFile: /etc/openvpn/dns/client1.resolv
  239. Feb 26 14:07:48 openvpn-updown-codyqx4-main: DNSScript: /etc/openvpn/fw/client1-dns.sh
  240. Feb 26 14:07:48 openvpn-updown-codyqx4-main: Instance: 1
  241. Feb 26 14:07:48 openvpn-updown-codyqx4-main: Up Script
  242. Feb 26 14:07:48 openvpn-updown-codyqx4-main: Doing IP Tables Echo: Instance=1, DNSScript=/etc/openvpn/fw/client1-dns.sh
  243. Feb 26 14:07:49 openvpn-updown-codyqx4-main: Set DNS: 0
  244. Feb 26 14:07:49 openvpn-updown-codyqx4-main: Option foreign_option_1: 1400optionname
  245. Feb 26 14:07:49 openvpn[1382]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  246. Feb 26 14:07:49 openvpn[1382]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  247. Feb 26 14:07:49 openvpn[1382]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  248. Feb 26 14:07:49 openvpn[1382]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  249. Feb 26 14:07:49 openvpn[1382]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  250. Feb 26 14:07:49 openvpn[1382]: [server] Peer Connection Initiated with [AF_INET]199.241.146.178:443
  251. Feb 26 14:07:49 openvpn-updown-codyqx4-main: Option foreign_option_2: 1400optionname
  252. Feb 26 14:07:50 rc_service: udhcpc 581:notify_rc start_firewall
  253. Feb 26 14:07:50 dhcp client: bound 65.189.193.209 via 65.189.192.1 during 72301 seconds.
  254. Feb 26 14:07:50 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
  255. Feb 26 14:07:51 openvpn[1371]: /usr/sbin/ip route add 108.61.228.91/32 via 65.189.192.1
  256. Feb 26 14:07:51 openvpn[1371]: /usr/sbin/ip route add 0.0.0.0/1 via 10.100.4.5
  257. Feb 26 14:07:51 openvpn[1371]: /usr/sbin/ip route add 128.0.0.0/1 via 10.100.4.5
  258. Feb 26 14:07:51 openvpn[1371]: /usr/sbin/ip route add 10.100.4.1/32 via 10.100.4.5
  259. Feb 26 14:07:51 openvpn-routing: Configuring policy rules for client 1
  260. Feb 26 14:07:51 openvpn-routing: Creating VPN routing table
  261. Feb 26 14:07:51 openvpn-routing: Removing route for 10.100.4.1 to tun11 from main routing table
  262. Feb 26 14:07:51 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  263. Feb 26 14:07:51 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  264. Feb 26 14:07:51 openvpn-routing: Removing rule 1001 from routing policy
  265. Feb 26 14:07:51 openvpn[1382]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  266. Feb 26 14:07:51 openvpn-routing: Removing rule 1002 from routing policy
  267. Feb 26 14:07:51 openvpn-routing: Removing rule 1101 from routing policy
  268. Feb 26 14:07:51 openvpn[1382]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.247 255.255.0.0'
  269. Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: timers and/or timeouts modified
  270. Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: LZO parms modified
  271. Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: --ifconfig/up options modified
  272. Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: route options modified
  273. Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: route-related options modified
  274. Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  275. Feb 26 14:07:51 openvpn[1382]: TUN/TAP device tun12 opened
  276. Feb 26 14:07:51 openvpn[1382]: TUN/TAP TX queue length set to 100
  277. Feb 26 14:07:51 openvpn[1382]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  278. Feb 26 14:07:51 openvpn[1382]: /usr/sbin/ip link set dev tun12 up mtu 1500
  279. Feb 26 14:07:51 openvpn-routing: Removing rule 1102 from routing policy
  280. Feb 26 14:07:51 openvpn[1382]: /usr/sbin/ip addr add dev tun12 10.4.23.247/16 broadcast 10.4.255.255
  281. Feb 26 14:07:51 openvpn[1382]: updown.sh tun12 1500 1558 10.4.23.247 255.255.0.0 init
  282. Feb 26 14:07:51 openvpn-routing: Removing rule 1103 from routing policy
  283. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: tun12
  284. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: 1500
  285. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: 1558
  286. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: 10.4.23.247
  287. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: 255.255.0.0
  288. Feb 26 14:07:51 openvpn-routing: Removing rule 1104 from routing policy
  289. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: init
  290. Feb 26 14:07:51 openvpn-updown-codyqx4-main: FileDir: /etc/openvpn/dns
  291. Feb 26 14:07:51 openvpn-updown-codyqx4-main: FileBase: /etc/openvpn/dns/client2
  292. Feb 26 14:07:51 openvpn-updown-codyqx4-main: ConfFile: /etc/openvpn/dns/client2.conf
  293. Feb 26 14:07:51 openvpn-updown-codyqx4-main: ResolvFile: /etc/openvpn/dns/client2.resolv
  294. Feb 26 14:07:51 openvpn-updown-codyqx4-main: DNSScript: /etc/openvpn/fw/client2-dns.sh
  295. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Instance: 2
  296. Feb 26 14:07:51 openvpn-routing: Removing rule 1105 from routing policy
  297. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Up Script
  298. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Doing IP Tables Echo: Instance=2, DNSScript=/etc/openvpn/fw/client2-dns.sh
  299. Feb 26 14:07:51 openvpn-routing: Removing rule 1106 from routing policy
  300. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Set DNS: 0
  301. Feb 26 14:07:51 openvpn-routing: Removing rule 1107 from routing policy
  302. Feb 26 14:07:51 openvpn-updown-codyqx4-main: Option foreign_option_1: 1618optionname
  303. Feb 26 14:07:51 openvpn-routing: Removing rule 1108 from routing policy
  304. Feb 26 14:07:51 openvpn-routing: Removing rule 1109 from routing policy
  305. Feb 26 14:07:51 openvpn-routing: Removing rule 1110 from routing policy
  306. Feb 26 14:07:51 openvpn-routing: Removing rule 1111 from routing policy
  307. Feb 26 14:07:51 openvpn-routing: Removing rule 1112 from routing policy
  308. Feb 26 14:07:51 openvpn-routing: Removing rule 1113 from routing policy
  309. Feb 26 14:07:51 openvpn-routing: Removing rule 1114 from routing policy
  310. Feb 26 14:07:51 openvpn-routing: Removing rule 1115 from routing policy
  311. Feb 26 14:07:52 openvpn-routing: Removing rule 1116 from routing policy
  312. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
  313. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
  314. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
  315. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
  316. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
  317. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
  318. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
  319. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
  320. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
  321. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
  322. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
  323. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
  324. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
  325. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
  326. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
  327. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
  328. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
  329. Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
  330. Feb 26 14:07:52 openvpn-routing: Tunnel re-established, restoring WAN access to clients
  331. Feb 26 14:07:52 openvpn-routing: Completed routing policy configuration for client 1
  332. Feb 26 14:07:52 openvpn[1371]: Initialization Sequence Completed
  333. Feb 26 14:07:56 openvpn[1382]: /usr/sbin/ip route add 199.241.146.178/32 via 65.189.192.1
  334. Feb 26 14:07:56 openvpn[1382]: /usr/sbin/ip route add 0.0.0.0/1 via 10.4.0.1
  335. Feb 26 14:07:56 openvpn[1382]: /usr/sbin/ip route add 128.0.0.0/1 via 10.4.0.1
  336. Feb 26 14:07:56 openvpn-routing: Configuring policy rules for client 2
  337. Feb 26 14:07:56 openvpn-routing: Creating VPN routing table
  338. Feb 26 14:07:57 openvpn-routing: Removing route for 0.0.0.0/1 to tun12 from main routing table
  339. Feb 26 14:07:57 openvpn-routing: Removing route for 128.0.0.0/1 to tun12 from main routing table
  340. Feb 26 14:07:57 openvpn-routing: Removing rule 1301 from routing policy
  341. Feb 26 14:07:57 openvpn-routing: Adding route for 192.168.2.71 to 0.0.0.0 through VPN client 2
  342. Feb 26 14:07:57 openvpn-routing: Tunnel re-established, restoring WAN access to clients
  343. Feb 26 14:07:57 openvpn-routing: Completed routing policy configuration for client 2
  344. Feb 26 14:07:57 openvpn[1382]: Initialization Sequence Completed
  345. Feb 26 14:08:00 hour monitor: daemon is starting
  346. Feb 26 14:08:09 crond[513]: time disparity of 302107 minutes detected
  347. Feb 26 14:08:50 dropbear[2192]: Child connection from 108.61.228.16:63589
  348. Feb 26 14:08:50 dropbear[2192]: Password auth succeeded for 'admin' from 108.61.228.16:63589
  349.  
  350. # I Restarted VPN Here
  351.  
  352. Feb 26 14:19:42 dropbear[4038]: Child connection from 183.3.202.101:49379
  353. Feb 26 14:19:44 dropbear[4038]: Exit before auth: Disconnect received
  354. Feb 26 14:30:32 rc_service: service 5818:notify_rc restart_vpnclient1
  355. Feb 26 14:30:32 openvpn[1371]: event_wait : Interrupted system call (code=4)
  356. Feb 26 14:30:32 openvpn[1371]: vpnrouting.sh tun11 1500 1558 10.100.4.6 10.100.4.5 init
  357. Feb 26 14:30:32 openvpn-routing: Configuring policy rules for client 1
  358. Feb 26 14:30:32 openvpn-routing: Removing rule 1001 from routing policy
  359. Feb 26 14:30:32 openvpn-routing: Removing rule 1002 from routing policy
  360. Feb 26 14:30:32 openvpn-routing: Removing rule 1101 from routing policy
  361. Feb 26 14:30:32 openvpn-routing: Removing rule 1102 from routing policy
  362. Feb 26 14:30:32 openvpn-routing: Removing rule 1103 from routing policy
  363. Feb 26 14:30:32 openvpn-routing: Removing rule 1104 from routing policy
  364. Feb 26 14:30:33 openvpn-routing: Removing rule 1105 from routing policy
  365. Feb 26 14:30:33 openvpn-routing: Removing rule 1106 from routing policy
  366. Feb 26 14:30:33 openvpn-routing: Removing rule 1107 from routing policy
  367. Feb 26 14:30:33 openvpn-routing: Removing rule 1108 from routing policy
  368. Feb 26 14:30:33 openvpn-routing: Removing rule 1109 from routing policy
  369. Feb 26 14:30:33 openvpn-routing: Removing rule 1110 from routing policy
  370. Feb 26 14:30:33 openvpn-routing: Removing rule 1111 from routing policy
  371. Feb 26 14:30:33 openvpn-routing: Removing rule 1112 from routing policy
  372. Feb 26 14:30:33 openvpn-routing: Removing rule 1113 from routing policy
  373. Feb 26 14:30:33 openvpn-routing: Removing rule 1114 from routing policy
  374. Feb 26 14:30:33 openvpn-routing: Removing rule 1115 from routing policy
  375. Feb 26 14:30:33 openvpn-routing: Removing rule 1116 from routing policy
  376. Feb 26 14:30:33 openvpn-routing: Tunnel down - VPN client access blocked
  377. Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
  378. Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
  379. Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
  380. Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
  381. Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
  382. Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
  383. Feb 26 14:30:33 dnsmasq[505]: read /etc/hosts - 5 addresses
  384. Feb 26 14:30:33 dnsmasq[505]: read /etc/hosts.dnsmasq - 19 addresses
  385. Feb 26 14:30:33 dnsmasq-dhcp[505]: read /etc/ethers - 19 addresses
  386. Feb 26 14:30:33 dnsmasq[505]: using nameserver 209.18.47.61#53 for domain neo.rr.com
  387. Feb 26 14:30:33 dnsmasq[505]: using nameserver 209.18.47.62#53 for domain neo.rr.com
  388. Feb 26 14:30:33 dnsmasq[505]: using nameserver 209.18.47.62#53
  389. Feb 26 14:30:33 dnsmasq[505]: using nameserver 209.18.47.61#53
  390. Feb 26 14:30:33 dnsmasq[505]: exiting on receipt of SIGTERM
  391. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
  392. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
  393. Feb 26 14:30:34 dnsmasq[6071]: started, version 2.76-g41a8d9e cachesize 1500
  394. Feb 26 14:30:34 dnsmasq[6071]: warning: interface ppp1* does not currently exist
  395. Feb 26 14:30:34 dnsmasq[6071]: asynchronous logging enabled, queue limit is 5 messages
  396. Feb 26 14:30:34 dnsmasq-dhcp[6071]: DHCP, IP range 192.168.2.2 -- 192.168.2.254, lease time 1d
  397. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
  398. Feb 26 14:30:34 dnsmasq[6071]: read /etc/hosts - 5 addresses
  399. Feb 26 14:30:34 dnsmasq[6071]: read /etc/hosts.dnsmasq - 19 addresses
  400. Feb 26 14:30:34 dnsmasq-dhcp[6071]: read /etc/ethers - 19 addresses
  401. Feb 26 14:30:34 dnsmasq[6071]: using nameserver 209.18.47.61#53 for domain neo.rr.com
  402. Feb 26 14:30:34 dnsmasq[6071]: using nameserver 209.18.47.62#53 for domain neo.rr.com
  403. Feb 26 14:30:34 dnsmasq[6071]: using nameserver 209.18.47.62#53
  404. Feb 26 14:30:34 dnsmasq[6071]: using nameserver 209.18.47.61#53
  405. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
  406. Feb 26 14:30:34 openvpn[6095]: OpenVPN 2.3.10 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Feb 25 2016
  407. Feb 26 14:30:34 openvpn[6095]: library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
  408. Feb 26 14:30:34 openvpn[6100]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  409. Feb 26 14:30:34 openvpn[6100]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  410. Feb 26 14:30:34 openvpn[6100]: UDPv4 link local: [undef]
  411. Feb 26 14:30:34 openvpn[6100]: UDPv4 link remote: [AF_INET]108.61.228.18:1196
  412. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
  413. Feb 26 14:30:34 openvpn[6100]: TLS: Initial packet from [AF_INET]108.61.228.18:1196, sid=ad334092 be57b6ea
  414. Feb 26 14:30:34 openvpn[6100]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  415. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
  416. Feb 26 14:30:34 openvpn[6100]: CRL CHECK OK: C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
  417. Feb 26 14:30:34 openvpn[6100]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
  418. Feb 26 14:30:34 openvpn[6100]: Validating certificate key usage
  419. Feb 26 14:30:34 openvpn[6100]: ++ Certificate has key usage 00a0, expects 00a0
  420. Feb 26 14:30:34 openvpn[6100]: VERIFY KU OK
  421. Feb 26 14:30:34 openvpn[6100]: Validating certificate extended key usage
  422. Feb 26 14:30:34 openvpn[6100]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  423. Feb 26 14:30:34 openvpn[6100]: VERIFY EKU OK
  424. Feb 26 14:30:34 openvpn[6100]: CRL CHECK OK: C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  425. Feb 26 14:30:34 openvpn[6100]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  426. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
  427. Feb 26 14:30:34 rc_service: service 6149:notify_rc restart_vpnclient2
  428. Feb 26 14:30:34 openvpn[1382]: event_wait : Interrupted system call (code=4)
  429. Feb 26 14:30:34 openvpn[1382]: SIGTERM received, sending exit notification to peer
  430. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
  431. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
  432. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
  433. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
  434. Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
  435. Feb 26 14:30:34 openvpn[6100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  436. Feb 26 14:30:34 openvpn[6100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  437. Feb 26 14:30:34 openvpn[6100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  438. Feb 26 14:30:34 openvpn[6100]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  439. Feb 26 14:30:34 openvpn[6100]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  440. Feb 26 14:30:34 openvpn[6100]: [Private Internet Access] Peer Connection Initiated with [AF_INET]108.61.228.18:1196
  441. Feb 26 14:30:34 openvpn-routing: Completed routing policy configuration for client 1
  442. Feb 26 14:30:35 dnsmasq[6071]: read /etc/hosts - 5 addresses
  443. Feb 26 14:30:35 dnsmasq[6071]: read /etc/hosts.dnsmasq - 19 addresses
  444. Feb 26 14:30:35 dnsmasq-dhcp[6071]: read /etc/ethers - 19 addresses
  445. Feb 26 14:30:35 dnsmasq[6071]: using nameserver 209.18.47.61#53 for domain neo.rr.com
  446. Feb 26 14:30:35 dnsmasq[6071]: using nameserver 209.18.47.62#53 for domain neo.rr.com
  447. Feb 26 14:30:35 dnsmasq[6071]: using nameserver 209.18.47.62#53
  448. Feb 26 14:30:35 dnsmasq[6071]: using nameserver 209.18.47.61#53
  449. Feb 26 14:30:35 dnsmasq[6071]: exiting on receipt of SIGTERM
  450. Feb 26 14:30:35 dnsmasq[6271]: started, version 2.76-g41a8d9e cachesize 1500
  451. Feb 26 14:30:35 dnsmasq[6271]: warning: interface ppp1* does not currently exist
  452. Feb 26 14:30:35 dnsmasq[6271]: asynchronous logging enabled, queue limit is 5 messages
  453. Feb 26 14:30:35 dnsmasq-dhcp[6271]: DHCP, IP range 192.168.2.2 -- 192.168.2.254, lease time 1d
  454. Feb 26 14:30:35 dnsmasq[6271]: read /etc/hosts - 5 addresses
  455. Feb 26 14:30:35 dnsmasq[6271]: read /etc/hosts.dnsmasq - 19 addresses
  456. Feb 26 14:30:35 dnsmasq-dhcp[6271]: read /etc/ethers - 19 addresses
  457. Feb 26 14:30:35 dnsmasq[6271]: using nameserver 209.18.47.61#53 for domain neo.rr.com
  458. Feb 26 14:30:35 dnsmasq[6271]: using nameserver 209.18.47.62#53 for domain neo.rr.com
  459. Feb 26 14:30:35 dnsmasq[6271]: using nameserver 209.18.47.62#53
  460. Feb 26 14:30:35 dnsmasq[6271]: using nameserver 209.18.47.61#53
  461. Feb 26 14:30:35 openvpn[6277]: OpenVPN 2.3.10 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Feb 25 2016
  462. Feb 26 14:30:35 openvpn[6277]: library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
  463. Feb 26 14:30:35 openvpn[6278]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  464. Feb 26 14:30:35 openvpn[6278]: Control Channel Authentication: using 'static.key' as a OpenVPN static key file
  465. Feb 26 14:30:35 openvpn[6278]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  466. Feb 26 14:30:35 openvpn[6278]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  467. Feb 26 14:30:35 openvpn[6278]: Socket Buffers: R=[122880->122880] S=[122880->122880]
  468. Feb 26 14:30:35 openvpn[6278]: UDPv4 link local: [undef]
  469. Feb 26 14:30:35 openvpn[6278]: UDPv4 link remote: [AF_INET]46.21.151.106:443
  470. Feb 26 14:30:35 openvpn[6278]: TLS: Initial packet from [AF_INET]46.21.151.106:443, sid=9ddc51ef 4f7657cc
  471. Feb 26 14:30:36 openvpn[6278]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  472. Feb 26 14:30:36 openvpn[6278]: Validating certificate key usage
  473. Feb 26 14:30:36 openvpn[6278]: ++ Certificate has key usage 00a0, expects 00a0
  474. Feb 26 14:30:36 openvpn[6278]: VERIFY KU OK
  475. Feb 26 14:30:36 openvpn[6278]: Validating certificate extended key usage
  476. Feb 26 14:30:36 openvpn[6278]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  477. Feb 26 14:30:36 openvpn[6278]: VERIFY EKU OK
  478. Feb 26 14:30:36 openvpn[6278]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  479. Feb 26 14:30:36 openvpn[6100]: SENT CONTROL [Private Internet Access]: 'PUSH_REQUEST' (status=1)
  480. Feb 26 14:30:36 openvpn[6100]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.100.4.1,topology net30,ifconfig 10.100.4.10 10.100.4.9'
  481. Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: timers and/or timeouts modified
  482. Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: LZO parms modified
  483. Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: --ifconfig/up options modified
  484. Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: route options modified
  485. Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  486. Feb 26 14:30:36 openvpn[6100]: TUN/TAP device tun11 opened
  487. Feb 26 14:30:36 openvpn[6100]: TUN/TAP TX queue length set to 100
  488. Feb 26 14:30:36 openvpn[6100]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  489. Feb 26 14:30:36 openvpn[6100]: /usr/sbin/ip link set dev tun11 up mtu 1500
  490. Feb 26 14:30:36 openvpn[6100]: /usr/sbin/ip addr add dev tun11 local 10.100.4.10 peer 10.100.4.9
  491. Feb 26 14:30:36 openvpn[6100]: updown.sh tun11 1500 1558 10.100.4.10 10.100.4.9 init
  492. Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: tun11
  493. Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: 1500
  494. Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: 1558
  495. Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: 10.100.4.10
  496. Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: 10.100.4.9
  497. Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: init
  498. Feb 26 14:30:36 openvpn-updown-codyqx4-main: FileDir: /etc/openvpn/dns
  499. Feb 26 14:30:36 openvpn-updown-codyqx4-main: FileBase: /etc/openvpn/dns/client1
  500. Feb 26 14:30:36 openvpn-updown-codyqx4-main: ConfFile: /etc/openvpn/dns/client1.conf
  501. Feb 26 14:30:36 openvpn-updown-codyqx4-main: ResolvFile: /etc/openvpn/dns/client1.resolv
  502. Feb 26 14:30:36 openvpn-updown-codyqx4-main: DNSScript: /etc/openvpn/fw/client1-dns.sh
  503. Feb 26 14:30:36 openvpn-updown-codyqx4-main: Instance: 1
  504. Feb 26 14:30:36 openvpn-updown-codyqx4-main: Up Script
  505. Feb 26 14:30:36 openvpn-updown-codyqx4-main: Doing IP Tables Echo: Instance=1, DNSScript=/etc/openvpn/fw/client1-dns.sh
  506. Feb 26 14:30:37 openvpn-updown-codyqx4-main: Set DNS: 0
  507. Feb 26 14:30:37 openvpn-updown-codyqx4-main: Option foreign_option_1: 6285optionname
  508. Feb 26 14:30:37 openvpn-updown-codyqx4-main: Option foreign_option_2: 6285optionname
  509. Feb 26 14:30:37 openvpn[6278]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  510. Feb 26 14:30:37 openvpn[6278]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  511. Feb 26 14:30:37 openvpn[6278]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  512. Feb 26 14:30:37 openvpn[6278]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  513. Feb 26 14:30:37 openvpn[6278]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  514. Feb 26 14:30:37 openvpn[6278]: [server] Peer Connection Initiated with [AF_INET]46.21.151.106:443
  515. Feb 26 14:30:39 openvpn[6100]: /usr/sbin/ip route add 108.61.228.18/32 via 65.189.192.1
  516. Feb 26 14:30:39 openvpn[6100]: /usr/sbin/ip route add 0.0.0.0/1 via 10.100.4.9
  517. Feb 26 14:30:39 openvpn[6100]: /usr/sbin/ip route add 128.0.0.0/1 via 10.100.4.9
  518. Feb 26 14:30:39 openvpn[6100]: /usr/sbin/ip route add 10.100.4.1/32 via 10.100.4.9
  519. Feb 26 14:30:39 openvpn-routing: Configuring policy rules for client 1
  520. Feb 26 14:30:39 openvpn-routing: Creating VPN routing table
  521. Feb 26 14:30:39 openvpn-routing: Removing route for 10.100.4.1 to tun11 from main routing table
  522. Feb 26 14:30:39 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
  523. Feb 26 14:30:39 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
  524. Feb 26 14:30:39 openvpn-routing: Removing rule 1001 from routing policy
  525. Feb 26 14:30:39 openvpn-routing: Removing rule 1002 from routing policy
  526. Feb 26 14:30:39 openvpn-routing: Removing rule 1101 from routing policy
  527. Feb 26 14:30:39 openvpn-routing: Removing rule 1102 from routing policy
  528. Feb 26 14:30:39 openvpn-routing: Removing rule 1103 from routing policy
  529. Feb 26 14:30:39 openvpn-routing: Removing rule 1104 from routing policy
  530. Feb 26 14:30:39 openvpn-routing: Removing rule 1105 from routing policy
  531. Feb 26 14:30:39 openvpn-routing: Removing rule 1106 from routing policy
  532. Feb 26 14:30:39 openvpn-routing: Removing rule 1107 from routing policy
  533. Feb 26 14:30:39 openvpn-routing: Removing rule 1108 from routing policy
  534. Feb 26 14:30:39 openvpn-routing: Removing rule 1109 from routing policy
  535. Feb 26 14:30:39 openvpn-routing: Removing rule 1110 from routing policy
  536. Feb 26 14:30:39 openvpn-routing: Removing rule 1111 from routing policy
  537. Feb 26 14:30:39 openvpn-routing: Removing rule 1112 from routing policy
  538. Feb 26 14:30:39 openvpn-routing: Removing rule 1113 from routing policy
  539. Feb 26 14:30:39 openvpn-routing: Removing rule 1114 from routing policy
  540. Feb 26 14:30:39 openvpn-routing: Removing rule 1115 from routing policy
  541. Feb 26 14:30:40 openvpn-routing: Removing rule 1116 from routing policy
  542. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
  543. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
  544. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
  545. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
  546. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
  547. Feb 26 14:30:40 openvpn[6278]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  548. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
  549. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
  550. Feb 26 14:30:40 openvpn[6278]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.32 255.255.0.0'
  551. Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: timers and/or timeouts modified
  552. Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: LZO parms modified
  553. Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: --ifconfig/up options modified
  554. Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: route options modified
  555. Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: route-related options modified
  556. Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  557. Feb 26 14:30:40 openvpn[6278]: TUN/TAP device tun12 opened
  558. Feb 26 14:30:40 openvpn[6278]: TUN/TAP TX queue length set to 100
  559. Feb 26 14:30:40 openvpn[6278]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  560. Feb 26 14:30:40 openvpn[6278]: /usr/sbin/ip link set dev tun12 up mtu 1500
  561. Feb 26 14:30:40 openvpn[6278]: /usr/sbin/ip addr add dev tun12 10.4.21.32/16 broadcast 10.4.255.255
  562. Feb 26 14:30:40 openvpn[6278]: updown.sh tun12 1500 1558 10.4.21.32 255.255.0.0 init
  563. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
  564. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: tun12
  565. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: 1500
  566. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: 1558
  567. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: 10.4.21.32
  568. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: 255.255.0.0
  569. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: init
  570. Feb 26 14:30:40 openvpn-updown-codyqx4-main: FileDir: /etc/openvpn/dns
  571. Feb 26 14:30:40 openvpn-updown-codyqx4-main: FileBase: /etc/openvpn/dns/client2
  572. Feb 26 14:30:40 openvpn-updown-codyqx4-main: ConfFile: /etc/openvpn/dns/client2.conf
  573. Feb 26 14:30:40 openvpn-updown-codyqx4-main: ResolvFile: /etc/openvpn/dns/client2.resolv
  574. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
  575. Feb 26 14:30:40 openvpn-updown-codyqx4-main: DNSScript: /etc/openvpn/fw/client2-dns.sh
  576. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Instance: 2
  577. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Up Script
  578. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Doing IP Tables Echo: Instance=2, DNSScript=/etc/openvpn/fw/client2-dns.sh
  579. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
  580. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Set DNS: 0
  581. Feb 26 14:30:40 openvpn-updown-codyqx4-main: Option foreign_option_1: 6573optionname
  582. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
  583. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
  584. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
  585. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
  586. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
  587. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
  588. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
  589. Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
  590. Feb 26 14:30:40 openvpn-routing: Tunnel re-established, restoring WAN access to clients
  591. Feb 26 14:30:40 openvpn-routing: Completed routing policy configuration for client 1
  592. Feb 26 14:30:41 openvpn[6100]: Initialization Sequence Completed
  593. Feb 26 14:30:45 openvpn[6278]: /usr/sbin/ip route add 46.21.151.106/32 via 65.189.192.1
  594. Feb 26 14:30:45 openvpn[6278]: /usr/sbin/ip route add 0.0.0.0/1 via 10.4.0.1
  595. Feb 26 14:30:45 openvpn[6278]: /usr/sbin/ip route add 128.0.0.0/1 via 10.4.0.1
  596. Feb 26 14:30:45 openvpn-routing: Configuring policy rules for client 2
  597. Feb 26 14:30:45 openvpn-routing: Creating VPN routing table
  598. Feb 26 14:30:45 openvpn-routing: Removing route for 0.0.0.0/1 to tun12 from main routing table
  599. Feb 26 14:30:45 openvpn-routing: Removing route for 128.0.0.0/1 to tun12 from main routing table
  600. Feb 26 14:30:46 openvpn-routing: Removing rule 1301 from routing policy
  601. Feb 26 14:30:46 openvpn-routing: Adding route for 192.168.2.71 to 0.0.0.0 through VPN client 2
  602. Feb 26 14:30:46 openvpn-routing: Tunnel re-established, restoring WAN access to clients
  603. Feb 26 14:30:46 openvpn-routing: Completed routing policy configuration for client 2
  604. Feb 26 14:30:46 openvpn[6278]: Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement