Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Feb 26 14:00:17 disk_monitor: Got SIGALRM...
- Feb 26 14:04:59 dropbear[3028]: Child connection from 108.61.228.16:63519
- Feb 26 14:04:59 dropbear[3028]: Password auth succeeded for 'admin' from 108.61.228.16:63519
- Feb 26 14:05:26 rc_service: httpd 509:notify_rc reboot
- Feb 26 14:05:26 dnsmasq[503]: read /etc/hosts - 5 addresses
- Feb 26 14:05:26 dnsmasq[503]: read /etc/hosts.dnsmasq - 19 addresses
- Feb 26 14:05:26 dnsmasq-dhcp[503]: read /etc/ethers - 19 addresses
- Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.61#53 for domain neo.rr.com
- Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.62#53 for domain neo.rr.com
- Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.62#53
- Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.61#53
- Feb 26 14:05:26 kernel: device eth0 left promiscuous mode
- Feb 26 14:05:26 kernel: br0: port 1(vlan1) entering forwarding state
- Feb 26 14:05:26 kernel: device eth0 entered promiscuous mode
- Feb 26 14:05:26 kernel: br0: topology change detected, propagating
- Feb 26 14:05:26 kernel: br0: port 1(vlan1) entering forwarding state
- Feb 26 14:05:26 kernel: br0: port 1(vlan1) entering forwarding state
- Feb 26 14:05:26 miniupnpd[858]: ioctl(s, SIOCGIFADDR, ...): Cannot assign requested address
- Feb 26 14:05:26 miniupnpd[858]: Failed to get IP for interface eth0
- Feb 26 14:05:26 miniupnpd[858]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping
- Feb 26 14:05:26 dnsmasq[503]: read /etc/hosts - 5 addresses
- Feb 26 14:05:26 dnsmasq[503]: read /etc/hosts.dnsmasq - 19 addresses
- Feb 26 14:05:26 dnsmasq-dhcp[503]: read /etc/ethers - 19 addresses
- Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.61#53 for domain neo.rr.com
- Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.62#53 for domain neo.rr.com
- Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.62#53
- Feb 26 14:05:26 dnsmasq[503]: using nameserver 209.18.47.61#53
- Feb 26 14:05:26 openvpn[1372]: write UDPv4: Network is unreachable (code=101)
- Feb 26 14:05:26 openvpn[1372]: event_wait : Interrupted system call (code=4)
- Feb 26 14:05:26 openvpn[1372]: vpnrouting.sh tun11 1500 1558 10.100.4.6 10.100.4.5 init
- Feb 26 14:05:26 openvpn-routing: Configuring policy rules for client 1
- Feb 26 14:05:26 openvpn-routing: Removing rule 1001 from routing policy
- Feb 26 14:05:26 openvpn-routing: Removing rule 1002 from routing policy
- Feb 26 14:05:26 openvpn-routing: Removing rule 1101 from routing policy
- Feb 26 14:05:26 openvpn-routing: Removing rule 1102 from routing policy
- Feb 26 14:05:26 openvpn-routing: Removing rule 1103 from routing policy
- Feb 26 14:05:26 openvpn-routing: Removing rule 1104 from routing policy
- Feb 26 14:05:26 openvpn-routing: Removing rule 1105 from routing policy
- Feb 26 14:05:26 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
- Feb 26 14:05:26 openvpn-routing: Removing rule 1106 from routing policy
- Feb 26 14:05:27 openvpn-routing: Removing rule 1107 from routing policy
- Feb 26 14:05:27 openvpn-routing: Removing rule 1108 from routing policy
- Feb 26 14:05:27 openvpn-routing: Removing rule 1109 from routing policy
- Feb 26 14:05:27 openvpn-routing: Removing rule 1110 from routing policy
- Feb 26 14:05:27 openvpn-routing: Removing rule 1111 from routing policy
- Feb 26 14:05:27 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
- Feb 26 14:05:27 openvpn-routing: Removing rule 1112 from routing policy
- Feb 26 14:05:27 openvpn-routing: Removing rule 1113 from routing policy
- Feb 26 14:05:27 openvpn-routing: Removing rule 1114 from routing policy
- Feb 26 14:05:27 openvpn-routing: Removing rule 1115 from routing policy
- Feb 26 14:05:27 openvpn-routing: Removing rule 1116 from routing policy
- Feb 26 14:05:27 openvpn-routing: Tunnel down - VPN client access blocked
- Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
- Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
- Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:27 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
- Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:27 dnsmasq[503]: read /etc/hosts - 5 addresses
- Feb 26 14:05:27 dnsmasq[503]: read /etc/hosts.dnsmasq - 19 addresses
- Feb 26 14:05:27 dnsmasq-dhcp[503]: read /etc/ethers - 19 addresses
- Feb 26 14:05:27 dnsmasq[503]: using nameserver 209.18.47.61#53 for domain neo.rr.com
- Feb 26 14:05:27 dnsmasq[503]: using nameserver 209.18.47.62#53 for domain neo.rr.com
- Feb 26 14:05:27 dnsmasq[503]: using nameserver 209.18.47.62#53
- Feb 26 14:05:27 dnsmasq[503]: using nameserver 209.18.47.61#53
- Feb 26 14:05:27 dnsmasq[503]: exiting on receipt of SIGTERM
- Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:27 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 dnsmasq[3382]: started, version 2.76-g41a8d9e cachesize 1500
- Feb 26 14:05:28 dnsmasq[3382]: warning: interface ppp1* does not currently exist
- Feb 26 14:05:28 dnsmasq[3382]: asynchronous logging enabled, queue limit is 5 messages
- Feb 26 14:05:28 dnsmasq-dhcp[3382]: DHCP, IP range 192.168.2.2 -- 192.168.2.254, lease time 1d
- Feb 26 14:05:28 dnsmasq[3382]: read /etc/hosts - 5 addresses
- Feb 26 14:05:28 dnsmasq[3382]: read /etc/hosts.dnsmasq - 19 addresses
- Feb 26 14:05:28 dnsmasq-dhcp[3382]: read /etc/ethers - 19 addresses
- Feb 26 14:05:28 dnsmasq[3382]: using nameserver 209.18.47.61#53 for domain neo.rr.com
- Feb 26 14:05:28 dnsmasq[3382]: using nameserver 209.18.47.62#53 for domain neo.rr.com
- Feb 26 14:05:28 dnsmasq[3382]: using nameserver 209.18.47.62#53
- Feb 26 14:05:28 dnsmasq[3382]: using nameserver 209.18.47.61#53
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn[1383]: event_wait : Interrupted system call (code=4)
- Feb 26 14:05:28 openvpn[1383]: SIGTERM received, sending exit notification to peer
- Feb 26 14:05:28 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
- Feb 26 14:05:28 openvpn-routing: Completed routing policy configuration for client 1
- Feb 26 14:05:29 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
- Feb 26 14:05:29 openvpn[1383]: write UDPv4: Network is unreachable (code=101)
- Feb 26 14:05:29 dnsmasq[3382]: exiting on receipt of SIGTERM
- Feb 26 14:05:29 dnsmasq[3561]: started, version 2.76-g41a8d9e cachesize 1500
- Feb 26 14:05:29 dnsmasq[3561]: warning: interface ppp1* does not currently exist
- Feb 26 14:05:29 dnsmasq[3561]: asynchronous logging enabled, queue limit is 5 messages
- Feb 26 14:05:29 dnsmasq-dhcp[3561]: DHCP, IP range 192.168.2.2 -- 192.168.2.254, lease time 1d
- Feb 26 14:05:29 dnsmasq[3561]: read /etc/hosts - 5 addresses
- Feb 26 14:05:29 dnsmasq[3561]: read /etc/hosts.dnsmasq - 19 addresses
- Feb 26 14:05:29 dnsmasq-dhcp[3561]: read /etc/ethers - 19 addresses
- Feb 26 14:05:29 dnsmasq[3561]: using nameserver 209.18.47.61#53 for domain neo.rr.com
- Feb 26 14:05:29 dnsmasq[3561]: using nameserver 209.18.47.62#53 for domain neo.rr.com
- Feb 26 14:05:29 dnsmasq[3561]: using nameserver 209.18.47.62#53
- Feb 26 14:05:29 dnsmasq[3561]: using nameserver 209.18.47.61#53
- Feb 26 14:05:29 iTunes: daemon is stopped
- Feb 26 14:05:29 FTP Server: daemon is stopped
- Feb 26 14:05:29 Samba Server: smb daemon is stopped
- Feb 26 14:05:29 kernel: gro disabled
- Feb 26 14:05:30 Timemachine: daemon is stopped
- Feb 26 14:05:30 WEBDAV Server: daemon is stopped
- Feb 26 14:05:30 kernel: usbcore: deregistering interface driver cdc_mbim
- Feb 26 14:05:30 kernel: usbcore: deregistering interface driver cdc_ncm
- Feb 26 14:05:30 kernel: usbcore: deregistering interface driver qmi_wwan
- Feb 26 14:05:30 kernel: usbcore: deregistering interface driver cdc_wdm
- Feb 26 14:05:30 kernel: usbcore: deregistering interface driver rndis_host
- Feb 26 14:05:30 kernel: usbcore: deregistering interface driver cdc_ether
- Feb 26 14:05:30 kernel: usbcore: deregistering interface driver asix
- Feb 26 14:05:30 kernel: cdrom: Uniform CD-ROM driver unloaded
- Feb 26 14:05:30 kernel: usbcore: deregistering interface driver usblp
- Feb 26 14:07:44 openvpn-routing: Creating VPN routing table
- Feb 26 14:07:44 rc_service: ntp 834:notify_rc restart_upnp
- Feb 26 14:07:44 miniupnpd[832]: shutting down MiniUPnPd
- Feb 26 14:07:44 openvpn-routing: Tunnel down - VPN client access blocked
- Feb 26 14:07:44 miniupnpd[867]: HTTP listening on port 54532
- Feb 26 14:07:44 miniupnpd[867]: Listening for NAT-PMP/PCP traffic on port 5351
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:44 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:45 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:45 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:45 rc_service: ntp 834:notify_rc restart_diskmon
- Feb 26 14:07:45 disk_monitor: Finish
- Feb 26 14:07:45 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:45 disk monitor: be idle
- Feb 26 14:07:45 openvpn-routing: Refreshing policy rules for client 2
- Feb 26 14:07:45 openvpn-routing: Creating VPN routing table
- Feb 26 14:07:45 openvpn-routing: Tunnel down - VPN client access blocked
- Feb 26 14:07:45 openvpn-routing: Adding route for 192.168.2.71 to 0.0.0.0 through VPN client 2
- Feb 26 14:07:45 openvpn-routing: Refreshing policy rules for client 3
- Feb 26 14:07:45 openvpn-routing: Allow WAN access to all VPN clients
- Feb 26 14:07:45 openvpn-routing: Refreshing policy rules for client 4
- Feb 26 14:07:45 openvpn-routing: Allow WAN access to all VPN clients
- Feb 26 14:07:45 openvpn-routing: Refreshing policy rules for client 5
- Feb 26 14:07:45 openvpn-routing: Allow WAN access to all VPN clients
- Feb 26 14:07:45 rc_service: udhcpc 581:notify_rc start_vpnclient1
- Feb 26 14:07:45 ddns: Completed custom ddns update
- Feb 26 14:07:45 rc_service: udhcpc 581:notify_rc start_vpnclient2
- Feb 26 14:07:45 rc_service: waitting "start_vpnclient1" via udhcpc ...
- Feb 26 14:07:45 kernel: tun: Universal TUN/TAP device driver, 1.6
- Feb 26 14:07:45 kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
- Feb 26 14:07:46 openvpn[1370]: OpenVPN 2.3.10 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Feb 25 2016
- Feb 26 14:07:46 openvpn[1370]: library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
- Feb 26 14:07:46 openvpn[1371]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 26 14:07:46 openvpn[1371]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 26 14:07:46 openvpn[1371]: UDPv4 link local: [undef]
- Feb 26 14:07:46 openvpn[1371]: UDPv4 link remote: [AF_INET]108.61.228.91:1196
- Feb 26 14:07:46 openvpn[1371]: TLS: Initial packet from [AF_INET]108.61.228.91:1196, sid=25192013 696ab0c8
- Feb 26 14:07:46 openvpn[1371]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Feb 26 14:07:46 openvpn[1371]: CRL CHECK OK: C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
- Feb 26 14:07:46 openvpn[1371]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
- Feb 26 14:07:46 openvpn[1371]: Validating certificate key usage
- Feb 26 14:07:46 openvpn[1371]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 26 14:07:46 openvpn[1371]: VERIFY KU OK
- Feb 26 14:07:46 openvpn[1371]: Validating certificate extended key usage
- Feb 26 14:07:46 openvpn[1371]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 26 14:07:46 openvpn[1371]: VERIFY EKU OK
- Feb 26 14:07:46 openvpn[1371]: CRL CHECK OK: C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 26 14:07:46 openvpn[1371]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 26 14:07:46 openvpn[1371]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Feb 26 14:07:46 openvpn[1371]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:07:46 openvpn[1371]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Feb 26 14:07:46 openvpn[1371]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:07:46 openvpn[1371]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 26 14:07:46 openvpn[1371]: [Private Internet Access] Peer Connection Initiated with [AF_INET]108.61.228.91:1196
- Feb 26 14:07:46 openvpn[1381]: OpenVPN 2.3.10 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Feb 25 2016
- Feb 26 14:07:46 openvpn[1381]: library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
- Feb 26 14:07:46 openvpn[1382]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 26 14:07:46 openvpn[1382]: Control Channel Authentication: using 'static.key' as a OpenVPN static key file
- Feb 26 14:07:46 openvpn[1382]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:07:46 openvpn[1382]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:07:46 openvpn[1382]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 26 14:07:47 openvpn[1382]: UDPv4 link local: [undef]
- Feb 26 14:07:47 openvpn[1382]: UDPv4 link remote: [AF_INET]199.241.146.178:443
- Feb 26 14:07:47 openvpn[1382]: TLS: Initial packet from [AF_INET]199.241.146.178:443, sid=5b318a46 05321f74
- Feb 26 14:07:47 openvpn[1382]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Feb 26 14:07:47 openvpn[1382]: Validating certificate key usage
- Feb 26 14:07:47 openvpn[1382]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 26 14:07:47 openvpn[1382]: VERIFY KU OK
- Feb 26 14:07:47 openvpn[1382]: Validating certificate extended key usage
- Feb 26 14:07:47 openvpn[1382]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 26 14:07:47 openvpn[1382]: VERIFY EKU OK
- Feb 26 14:07:47 openvpn[1382]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Feb 26 14:07:48 kernel: * Make sure sizeof(struct sw_struct)=160 is consistent
- Feb 26 14:07:48 openvpn[1371]: SENT CONTROL [Private Internet Access]: 'PUSH_REQUEST' (status=1)
- Feb 26 14:07:48 openvpn[1371]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.100.4.1,topology net30,ifconfig 10.100.4.6 10.100.4.5'
- Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: LZO parms modified
- Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: route options modified
- Feb 26 14:07:48 openvpn[1371]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 26 14:07:48 openvpn[1371]: TUN/TAP device tun11 opened
- Feb 26 14:07:48 openvpn[1371]: TUN/TAP TX queue length set to 100
- Feb 26 14:07:48 openvpn[1371]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 26 14:07:48 openvpn[1371]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 26 14:07:48 openvpn[1371]: /usr/sbin/ip addr add dev tun11 local 10.100.4.6 peer 10.100.4.5
- Feb 26 14:07:48 openvpn[1371]: updown.sh tun11 1500 1558 10.100.4.6 10.100.4.5 init
- Feb 26 14:07:48 kernel: IDPfw: TrendMicro forward module ver-1.0.31
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: tun11
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: 1500
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: 1558
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: 10.100.4.6
- Feb 26 14:07:48 kernel: IDPfw: Apply module param dev_wan=eth0
- Feb 26 14:07:48 kernel: IDPfw: Apply module param sess_num=30000
- Feb 26 14:07:48 kernel: IDPfw: Init chrdev /dev/idpfw with major 191
- Feb 26 14:07:48 kernel: IDPfw: IDPfw is ready
- Feb 26 14:07:48 kernel: sizeof forward param = 160
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: 10.100.4.5
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: Argument Passed: init
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: FileDir: /etc/openvpn/dns
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: FileBase: /etc/openvpn/dns/client1
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: ConfFile: /etc/openvpn/dns/client1.conf
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: ResolvFile: /etc/openvpn/dns/client1.resolv
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: DNSScript: /etc/openvpn/fw/client1-dns.sh
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: Instance: 1
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: Up Script
- Feb 26 14:07:48 openvpn-updown-codyqx4-main: Doing IP Tables Echo: Instance=1, DNSScript=/etc/openvpn/fw/client1-dns.sh
- Feb 26 14:07:49 openvpn-updown-codyqx4-main: Set DNS: 0
- Feb 26 14:07:49 openvpn-updown-codyqx4-main: Option foreign_option_1: 1400optionname
- Feb 26 14:07:49 openvpn[1382]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 26 14:07:49 openvpn[1382]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:07:49 openvpn[1382]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 26 14:07:49 openvpn[1382]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:07:49 openvpn[1382]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 26 14:07:49 openvpn[1382]: [server] Peer Connection Initiated with [AF_INET]199.241.146.178:443
- Feb 26 14:07:49 openvpn-updown-codyqx4-main: Option foreign_option_2: 1400optionname
- Feb 26 14:07:50 rc_service: udhcpc 581:notify_rc start_firewall
- Feb 26 14:07:50 dhcp client: bound 65.189.193.209 via 65.189.192.1 during 72301 seconds.
- Feb 26 14:07:50 start_nat_rules: apply the nat_rules(/tmp/nat_rules_eth0_eth0)!
- Feb 26 14:07:51 openvpn[1371]: /usr/sbin/ip route add 108.61.228.91/32 via 65.189.192.1
- Feb 26 14:07:51 openvpn[1371]: /usr/sbin/ip route add 0.0.0.0/1 via 10.100.4.5
- Feb 26 14:07:51 openvpn[1371]: /usr/sbin/ip route add 128.0.0.0/1 via 10.100.4.5
- Feb 26 14:07:51 openvpn[1371]: /usr/sbin/ip route add 10.100.4.1/32 via 10.100.4.5
- Feb 26 14:07:51 openvpn-routing: Configuring policy rules for client 1
- Feb 26 14:07:51 openvpn-routing: Creating VPN routing table
- Feb 26 14:07:51 openvpn-routing: Removing route for 10.100.4.1 to tun11 from main routing table
- Feb 26 14:07:51 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 26 14:07:51 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 26 14:07:51 openvpn-routing: Removing rule 1001 from routing policy
- Feb 26 14:07:51 openvpn[1382]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Feb 26 14:07:51 openvpn-routing: Removing rule 1002 from routing policy
- Feb 26 14:07:51 openvpn-routing: Removing rule 1101 from routing policy
- Feb 26 14:07:51 openvpn[1382]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.247 255.255.0.0'
- Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: LZO parms modified
- Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: route options modified
- Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: route-related options modified
- Feb 26 14:07:51 openvpn[1382]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 26 14:07:51 openvpn[1382]: TUN/TAP device tun12 opened
- Feb 26 14:07:51 openvpn[1382]: TUN/TAP TX queue length set to 100
- Feb 26 14:07:51 openvpn[1382]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 26 14:07:51 openvpn[1382]: /usr/sbin/ip link set dev tun12 up mtu 1500
- Feb 26 14:07:51 openvpn-routing: Removing rule 1102 from routing policy
- Feb 26 14:07:51 openvpn[1382]: /usr/sbin/ip addr add dev tun12 10.4.23.247/16 broadcast 10.4.255.255
- Feb 26 14:07:51 openvpn[1382]: updown.sh tun12 1500 1558 10.4.23.247 255.255.0.0 init
- Feb 26 14:07:51 openvpn-routing: Removing rule 1103 from routing policy
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: tun12
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: 1500
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: 1558
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: 10.4.23.247
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: 255.255.0.0
- Feb 26 14:07:51 openvpn-routing: Removing rule 1104 from routing policy
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Argument Passed: init
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: FileDir: /etc/openvpn/dns
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: FileBase: /etc/openvpn/dns/client2
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: ConfFile: /etc/openvpn/dns/client2.conf
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: ResolvFile: /etc/openvpn/dns/client2.resolv
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: DNSScript: /etc/openvpn/fw/client2-dns.sh
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Instance: 2
- Feb 26 14:07:51 openvpn-routing: Removing rule 1105 from routing policy
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Up Script
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Doing IP Tables Echo: Instance=2, DNSScript=/etc/openvpn/fw/client2-dns.sh
- Feb 26 14:07:51 openvpn-routing: Removing rule 1106 from routing policy
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Set DNS: 0
- Feb 26 14:07:51 openvpn-routing: Removing rule 1107 from routing policy
- Feb 26 14:07:51 openvpn-updown-codyqx4-main: Option foreign_option_1: 1618optionname
- Feb 26 14:07:51 openvpn-routing: Removing rule 1108 from routing policy
- Feb 26 14:07:51 openvpn-routing: Removing rule 1109 from routing policy
- Feb 26 14:07:51 openvpn-routing: Removing rule 1110 from routing policy
- Feb 26 14:07:51 openvpn-routing: Removing rule 1111 from routing policy
- Feb 26 14:07:51 openvpn-routing: Removing rule 1112 from routing policy
- Feb 26 14:07:51 openvpn-routing: Removing rule 1113 from routing policy
- Feb 26 14:07:51 openvpn-routing: Removing rule 1114 from routing policy
- Feb 26 14:07:51 openvpn-routing: Removing rule 1115 from routing policy
- Feb 26 14:07:52 openvpn-routing: Removing rule 1116 from routing policy
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
- Feb 26 14:07:52 openvpn-routing: Tunnel re-established, restoring WAN access to clients
- Feb 26 14:07:52 openvpn-routing: Completed routing policy configuration for client 1
- Feb 26 14:07:52 openvpn[1371]: Initialization Sequence Completed
- Feb 26 14:07:56 openvpn[1382]: /usr/sbin/ip route add 199.241.146.178/32 via 65.189.192.1
- Feb 26 14:07:56 openvpn[1382]: /usr/sbin/ip route add 0.0.0.0/1 via 10.4.0.1
- Feb 26 14:07:56 openvpn[1382]: /usr/sbin/ip route add 128.0.0.0/1 via 10.4.0.1
- Feb 26 14:07:56 openvpn-routing: Configuring policy rules for client 2
- Feb 26 14:07:56 openvpn-routing: Creating VPN routing table
- Feb 26 14:07:57 openvpn-routing: Removing route for 0.0.0.0/1 to tun12 from main routing table
- Feb 26 14:07:57 openvpn-routing: Removing route for 128.0.0.0/1 to tun12 from main routing table
- Feb 26 14:07:57 openvpn-routing: Removing rule 1301 from routing policy
- Feb 26 14:07:57 openvpn-routing: Adding route for 192.168.2.71 to 0.0.0.0 through VPN client 2
- Feb 26 14:07:57 openvpn-routing: Tunnel re-established, restoring WAN access to clients
- Feb 26 14:07:57 openvpn-routing: Completed routing policy configuration for client 2
- Feb 26 14:07:57 openvpn[1382]: Initialization Sequence Completed
- Feb 26 14:08:00 hour monitor: daemon is starting
- Feb 26 14:08:09 crond[513]: time disparity of 302107 minutes detected
- Feb 26 14:08:50 dropbear[2192]: Child connection from 108.61.228.16:63589
- Feb 26 14:08:50 dropbear[2192]: Password auth succeeded for 'admin' from 108.61.228.16:63589
- # I Restarted VPN Here
- Feb 26 14:19:42 dropbear[4038]: Child connection from 183.3.202.101:49379
- Feb 26 14:19:44 dropbear[4038]: Exit before auth: Disconnect received
- Feb 26 14:30:32 rc_service: service 5818:notify_rc restart_vpnclient1
- Feb 26 14:30:32 openvpn[1371]: event_wait : Interrupted system call (code=4)
- Feb 26 14:30:32 openvpn[1371]: vpnrouting.sh tun11 1500 1558 10.100.4.6 10.100.4.5 init
- Feb 26 14:30:32 openvpn-routing: Configuring policy rules for client 1
- Feb 26 14:30:32 openvpn-routing: Removing rule 1001 from routing policy
- Feb 26 14:30:32 openvpn-routing: Removing rule 1002 from routing policy
- Feb 26 14:30:32 openvpn-routing: Removing rule 1101 from routing policy
- Feb 26 14:30:32 openvpn-routing: Removing rule 1102 from routing policy
- Feb 26 14:30:32 openvpn-routing: Removing rule 1103 from routing policy
- Feb 26 14:30:32 openvpn-routing: Removing rule 1104 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1105 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1106 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1107 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1108 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1109 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1110 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1111 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1112 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1113 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1114 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1115 from routing policy
- Feb 26 14:30:33 openvpn-routing: Removing rule 1116 from routing policy
- Feb 26 14:30:33 openvpn-routing: Tunnel down - VPN client access blocked
- Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
- Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
- Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:33 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:33 dnsmasq[505]: read /etc/hosts - 5 addresses
- Feb 26 14:30:33 dnsmasq[505]: read /etc/hosts.dnsmasq - 19 addresses
- Feb 26 14:30:33 dnsmasq-dhcp[505]: read /etc/ethers - 19 addresses
- Feb 26 14:30:33 dnsmasq[505]: using nameserver 209.18.47.61#53 for domain neo.rr.com
- Feb 26 14:30:33 dnsmasq[505]: using nameserver 209.18.47.62#53 for domain neo.rr.com
- Feb 26 14:30:33 dnsmasq[505]: using nameserver 209.18.47.62#53
- Feb 26 14:30:33 dnsmasq[505]: using nameserver 209.18.47.61#53
- Feb 26 14:30:33 dnsmasq[505]: exiting on receipt of SIGTERM
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 dnsmasq[6071]: started, version 2.76-g41a8d9e cachesize 1500
- Feb 26 14:30:34 dnsmasq[6071]: warning: interface ppp1* does not currently exist
- Feb 26 14:30:34 dnsmasq[6071]: asynchronous logging enabled, queue limit is 5 messages
- Feb 26 14:30:34 dnsmasq-dhcp[6071]: DHCP, IP range 192.168.2.2 -- 192.168.2.254, lease time 1d
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 dnsmasq[6071]: read /etc/hosts - 5 addresses
- Feb 26 14:30:34 dnsmasq[6071]: read /etc/hosts.dnsmasq - 19 addresses
- Feb 26 14:30:34 dnsmasq-dhcp[6071]: read /etc/ethers - 19 addresses
- Feb 26 14:30:34 dnsmasq[6071]: using nameserver 209.18.47.61#53 for domain neo.rr.com
- Feb 26 14:30:34 dnsmasq[6071]: using nameserver 209.18.47.62#53 for domain neo.rr.com
- Feb 26 14:30:34 dnsmasq[6071]: using nameserver 209.18.47.62#53
- Feb 26 14:30:34 dnsmasq[6071]: using nameserver 209.18.47.61#53
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 openvpn[6095]: OpenVPN 2.3.10 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Feb 25 2016
- Feb 26 14:30:34 openvpn[6095]: library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
- Feb 26 14:30:34 openvpn[6100]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 26 14:30:34 openvpn[6100]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 26 14:30:34 openvpn[6100]: UDPv4 link local: [undef]
- Feb 26 14:30:34 openvpn[6100]: UDPv4 link remote: [AF_INET]108.61.228.18:1196
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 openvpn[6100]: TLS: Initial packet from [AF_INET]108.61.228.18:1196, sid=ad334092 be57b6ea
- Feb 26 14:30:34 openvpn[6100]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 openvpn[6100]: CRL CHECK OK: C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
- Feb 26 14:30:34 openvpn[6100]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
- Feb 26 14:30:34 openvpn[6100]: Validating certificate key usage
- Feb 26 14:30:34 openvpn[6100]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 26 14:30:34 openvpn[6100]: VERIFY KU OK
- Feb 26 14:30:34 openvpn[6100]: Validating certificate extended key usage
- Feb 26 14:30:34 openvpn[6100]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 26 14:30:34 openvpn[6100]: VERIFY EKU OK
- Feb 26 14:30:34 openvpn[6100]: CRL CHECK OK: C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 26 14:30:34 openvpn[6100]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 rc_service: service 6149:notify_rc restart_vpnclient2
- Feb 26 14:30:34 openvpn[1382]: event_wait : Interrupted system call (code=4)
- Feb 26 14:30:34 openvpn[1382]: SIGTERM received, sending exit notification to peer
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:34 openvpn[6100]: Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Feb 26 14:30:34 openvpn[6100]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:30:34 openvpn[6100]: Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Feb 26 14:30:34 openvpn[6100]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:30:34 openvpn[6100]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Feb 26 14:30:34 openvpn[6100]: [Private Internet Access] Peer Connection Initiated with [AF_INET]108.61.228.18:1196
- Feb 26 14:30:34 openvpn-routing: Completed routing policy configuration for client 1
- Feb 26 14:30:35 dnsmasq[6071]: read /etc/hosts - 5 addresses
- Feb 26 14:30:35 dnsmasq[6071]: read /etc/hosts.dnsmasq - 19 addresses
- Feb 26 14:30:35 dnsmasq-dhcp[6071]: read /etc/ethers - 19 addresses
- Feb 26 14:30:35 dnsmasq[6071]: using nameserver 209.18.47.61#53 for domain neo.rr.com
- Feb 26 14:30:35 dnsmasq[6071]: using nameserver 209.18.47.62#53 for domain neo.rr.com
- Feb 26 14:30:35 dnsmasq[6071]: using nameserver 209.18.47.62#53
- Feb 26 14:30:35 dnsmasq[6071]: using nameserver 209.18.47.61#53
- Feb 26 14:30:35 dnsmasq[6071]: exiting on receipt of SIGTERM
- Feb 26 14:30:35 dnsmasq[6271]: started, version 2.76-g41a8d9e cachesize 1500
- Feb 26 14:30:35 dnsmasq[6271]: warning: interface ppp1* does not currently exist
- Feb 26 14:30:35 dnsmasq[6271]: asynchronous logging enabled, queue limit is 5 messages
- Feb 26 14:30:35 dnsmasq-dhcp[6271]: DHCP, IP range 192.168.2.2 -- 192.168.2.254, lease time 1d
- Feb 26 14:30:35 dnsmasq[6271]: read /etc/hosts - 5 addresses
- Feb 26 14:30:35 dnsmasq[6271]: read /etc/hosts.dnsmasq - 19 addresses
- Feb 26 14:30:35 dnsmasq-dhcp[6271]: read /etc/ethers - 19 addresses
- Feb 26 14:30:35 dnsmasq[6271]: using nameserver 209.18.47.61#53 for domain neo.rr.com
- Feb 26 14:30:35 dnsmasq[6271]: using nameserver 209.18.47.62#53 for domain neo.rr.com
- Feb 26 14:30:35 dnsmasq[6271]: using nameserver 209.18.47.62#53
- Feb 26 14:30:35 dnsmasq[6271]: using nameserver 209.18.47.61#53
- Feb 26 14:30:35 openvpn[6277]: OpenVPN 2.3.10 arm-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Feb 25 2016
- Feb 26 14:30:35 openvpn[6277]: library versions: OpenSSL 1.0.2f 28 Jan 2016, LZO 2.08
- Feb 26 14:30:35 openvpn[6278]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Feb 26 14:30:35 openvpn[6278]: Control Channel Authentication: using 'static.key' as a OpenVPN static key file
- Feb 26 14:30:35 openvpn[6278]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:30:35 openvpn[6278]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:30:35 openvpn[6278]: Socket Buffers: R=[122880->122880] S=[122880->122880]
- Feb 26 14:30:35 openvpn[6278]: UDPv4 link local: [undef]
- Feb 26 14:30:35 openvpn[6278]: UDPv4 link remote: [AF_INET]46.21.151.106:443
- Feb 26 14:30:35 openvpn[6278]: TLS: Initial packet from [AF_INET]46.21.151.106:443, sid=9ddc51ef 4f7657cc
- Feb 26 14:30:36 openvpn[6278]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- Feb 26 14:30:36 openvpn[6278]: Validating certificate key usage
- Feb 26 14:30:36 openvpn[6278]: ++ Certificate has key usage 00a0, expects 00a0
- Feb 26 14:30:36 openvpn[6278]: VERIFY KU OK
- Feb 26 14:30:36 openvpn[6278]: Validating certificate extended key usage
- Feb 26 14:30:36 openvpn[6278]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Feb 26 14:30:36 openvpn[6278]: VERIFY EKU OK
- Feb 26 14:30:36 openvpn[6278]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- Feb 26 14:30:36 openvpn[6100]: SENT CONTROL [Private Internet Access]: 'PUSH_REQUEST' (status=1)
- Feb 26 14:30:36 openvpn[6100]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.100.4.1,topology net30,ifconfig 10.100.4.10 10.100.4.9'
- Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: LZO parms modified
- Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: route options modified
- Feb 26 14:30:36 openvpn[6100]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 26 14:30:36 openvpn[6100]: TUN/TAP device tun11 opened
- Feb 26 14:30:36 openvpn[6100]: TUN/TAP TX queue length set to 100
- Feb 26 14:30:36 openvpn[6100]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 26 14:30:36 openvpn[6100]: /usr/sbin/ip link set dev tun11 up mtu 1500
- Feb 26 14:30:36 openvpn[6100]: /usr/sbin/ip addr add dev tun11 local 10.100.4.10 peer 10.100.4.9
- Feb 26 14:30:36 openvpn[6100]: updown.sh tun11 1500 1558 10.100.4.10 10.100.4.9 init
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: tun11
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: 1500
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: 1558
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: 10.100.4.10
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: 10.100.4.9
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: Argument Passed: init
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: FileDir: /etc/openvpn/dns
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: FileBase: /etc/openvpn/dns/client1
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: ConfFile: /etc/openvpn/dns/client1.conf
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: ResolvFile: /etc/openvpn/dns/client1.resolv
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: DNSScript: /etc/openvpn/fw/client1-dns.sh
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: Instance: 1
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: Up Script
- Feb 26 14:30:36 openvpn-updown-codyqx4-main: Doing IP Tables Echo: Instance=1, DNSScript=/etc/openvpn/fw/client1-dns.sh
- Feb 26 14:30:37 openvpn-updown-codyqx4-main: Set DNS: 0
- Feb 26 14:30:37 openvpn-updown-codyqx4-main: Option foreign_option_1: 6285optionname
- Feb 26 14:30:37 openvpn-updown-codyqx4-main: Option foreign_option_2: 6285optionname
- Feb 26 14:30:37 openvpn[6278]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 26 14:30:37 openvpn[6278]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:30:37 openvpn[6278]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Feb 26 14:30:37 openvpn[6278]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Feb 26 14:30:37 openvpn[6278]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Feb 26 14:30:37 openvpn[6278]: [server] Peer Connection Initiated with [AF_INET]46.21.151.106:443
- Feb 26 14:30:39 openvpn[6100]: /usr/sbin/ip route add 108.61.228.18/32 via 65.189.192.1
- Feb 26 14:30:39 openvpn[6100]: /usr/sbin/ip route add 0.0.0.0/1 via 10.100.4.9
- Feb 26 14:30:39 openvpn[6100]: /usr/sbin/ip route add 128.0.0.0/1 via 10.100.4.9
- Feb 26 14:30:39 openvpn[6100]: /usr/sbin/ip route add 10.100.4.1/32 via 10.100.4.9
- Feb 26 14:30:39 openvpn-routing: Configuring policy rules for client 1
- Feb 26 14:30:39 openvpn-routing: Creating VPN routing table
- Feb 26 14:30:39 openvpn-routing: Removing route for 10.100.4.1 to tun11 from main routing table
- Feb 26 14:30:39 openvpn-routing: Removing route for 0.0.0.0/1 to tun11 from main routing table
- Feb 26 14:30:39 openvpn-routing: Removing route for 128.0.0.0/1 to tun11 from main routing table
- Feb 26 14:30:39 openvpn-routing: Removing rule 1001 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1002 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1101 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1102 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1103 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1104 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1105 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1106 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1107 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1108 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1109 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1110 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1111 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1112 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1113 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1114 from routing policy
- Feb 26 14:30:39 openvpn-routing: Removing rule 1115 from routing policy
- Feb 26 14:30:40 openvpn-routing: Removing rule 1116 from routing policy
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.2 to 0.0.0.0 through WAN
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.3 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.4 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.5 to 0.0.0.0 through WAN
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.6 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn[6278]: SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.7 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.8 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn[6278]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.32 255.255.0.0'
- Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: timers and/or timeouts modified
- Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: LZO parms modified
- Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: --ifconfig/up options modified
- Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: route options modified
- Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: route-related options modified
- Feb 26 14:30:40 openvpn[6278]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Feb 26 14:30:40 openvpn[6278]: TUN/TAP device tun12 opened
- Feb 26 14:30:40 openvpn[6278]: TUN/TAP TX queue length set to 100
- Feb 26 14:30:40 openvpn[6278]: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Feb 26 14:30:40 openvpn[6278]: /usr/sbin/ip link set dev tun12 up mtu 1500
- Feb 26 14:30:40 openvpn[6278]: /usr/sbin/ip addr add dev tun12 10.4.21.32/16 broadcast 10.4.255.255
- Feb 26 14:30:40 openvpn[6278]: updown.sh tun12 1500 1558 10.4.21.32 255.255.0.0 init
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.9 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: tun12
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: 1500
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: 1558
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: 10.4.21.32
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: 255.255.0.0
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Argument Passed: init
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: FileDir: /etc/openvpn/dns
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: FileBase: /etc/openvpn/dns/client2
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: ConfFile: /etc/openvpn/dns/client2.conf
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: ResolvFile: /etc/openvpn/dns/client2.resolv
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.10 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: DNSScript: /etc/openvpn/fw/client2-dns.sh
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Instance: 2
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Up Script
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Doing IP Tables Echo: Instance=2, DNSScript=/etc/openvpn/fw/client2-dns.sh
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.11 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Set DNS: 0
- Feb 26 14:30:40 openvpn-updown-codyqx4-main: Option foreign_option_1: 6573optionname
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.12 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.32 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.33 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.34 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.35 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.96 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.97 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Adding route for 192.168.2.98 to 0.0.0.0 through VPN client 1
- Feb 26 14:30:40 openvpn-routing: Tunnel re-established, restoring WAN access to clients
- Feb 26 14:30:40 openvpn-routing: Completed routing policy configuration for client 1
- Feb 26 14:30:41 openvpn[6100]: Initialization Sequence Completed
- Feb 26 14:30:45 openvpn[6278]: /usr/sbin/ip route add 46.21.151.106/32 via 65.189.192.1
- Feb 26 14:30:45 openvpn[6278]: /usr/sbin/ip route add 0.0.0.0/1 via 10.4.0.1
- Feb 26 14:30:45 openvpn[6278]: /usr/sbin/ip route add 128.0.0.0/1 via 10.4.0.1
- Feb 26 14:30:45 openvpn-routing: Configuring policy rules for client 2
- Feb 26 14:30:45 openvpn-routing: Creating VPN routing table
- Feb 26 14:30:45 openvpn-routing: Removing route for 0.0.0.0/1 to tun12 from main routing table
- Feb 26 14:30:45 openvpn-routing: Removing route for 128.0.0.0/1 to tun12 from main routing table
- Feb 26 14:30:46 openvpn-routing: Removing rule 1301 from routing policy
- Feb 26 14:30:46 openvpn-routing: Adding route for 192.168.2.71 to 0.0.0.0 through VPN client 2
- Feb 26 14:30:46 openvpn-routing: Tunnel re-established, restoring WAN access to clients
- Feb 26 14:30:46 openvpn-routing: Completed routing policy configuration for client 2
- Feb 26 14:30:46 openvpn[6278]: Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement