Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ocserv[13642]: [MYIP]:56724 accepted connection
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 77
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 77
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 77
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 73[73], frag offset 0, frag length: 73, sequence: 0
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.1
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_db.c:278
- ocserv[13642]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SERVER NAME/0' (14 bytes)
- ocserv[13642]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SERVER NAME/0'
- ocserv[13642]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SERVER NAME/0'
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Received safe renegotiation CS
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Requested cipher suites[size: 14]:
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Selected cipher suite: RSA_ARCFOUR_128_SHA1
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Selected Compression Method: NULL
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: Safe renegotiation succeeded
- ocserv[13642]: TLS[<2>]: ASSERT: status_request.c:197
- ocserv[13642]: TLS[<3>]: EXT[0x87d11c0]: Sending extension SAFE RENEGOTIATION (1 bytes)
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: SessionID: b95664b41543714674ab7614313d70dba23b38bcea3310edc98f8771b1e184b9
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [81 bytes]
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE was queued [904 bytes]
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE REQUEST was queued [50 bytes]
- ocserv[13642]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO DONE was queued [4 bytes]
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 81 and target length: 81
- ocserv[13642]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 904 and target length: 904
- ocserv[13642]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 909
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 50 and target length: 50
- ocserv[13642]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 55
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 4 and target length: 4
- ocserv[13642]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Alert packet received. Epoch 0, length: 2
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Received Packet Alert(21) with length: 2
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Alert(21) with length: 2
- ocserv[13642]: TLS[<4>]: REC[0x87d11c0]: Alert[2|46] - Unknown certificate - was received
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_record.c:744
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_record.c:750
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_record.c:1247
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_buffers.c:1228
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_handshake.c:1357
- ocserv[13642]: TLS[<2>]: ASSERT: gnutls_handshake.c:3060
- ocserv[13642]: GnuTLS error (at worker-vpn.c:572): A TLS fatal alert has been received.: Unknown certificate
- ocserv[13578]: [MYIP]:56724 command socket closed
- ocserv[13643]: [MYIP]:56725 accepted connection
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 77
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 77
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 77
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 73[73], frag offset 0, frag length: 73, sequence: 0
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.1
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_db.c:278
- ocserv[13643]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SERVER NAME/0' (14 bytes)
- ocserv[13643]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SERVER NAME/0'
- ocserv[13643]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SERVER NAME/0'
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Received safe renegotiation CS
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Requested cipher suites[size: 14]:
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Selected cipher suite: RSA_ARCFOUR_128_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Selected Compression Method: NULL
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Safe renegotiation succeeded
- ocserv[13643]: TLS[<2>]: ASSERT: status_request.c:197
- ocserv[13643]: TLS[<3>]: EXT[0x87d11c0]: Sending extension SAFE RENEGOTIATION (1 bytes)
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: SessionID: a37f760d9874a9f8357396b354d628af9cda410fe55cd86cfad22b9559e169bb
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [81 bytes]
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE was queued [904 bytes]
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE REQUEST was queued [50 bytes]
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO DONE was queued [4 bytes]
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 81 and target length: 81
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 904 and target length: 904
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 909
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 50 and target length: 50
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 55
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 4 and target length: 4
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 919
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 919
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Handshake(22) with length: 919
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE (11) was received. Length 915[915], frag offset 0, frag length: 915, sequence: 0
- ocserv[13643]: TLS[<2>]: ASSERT: status_request.c:352
- ocserv[13643]: TLS[<2>]: ASSERT: dn.c:991
- ocserv[13643]: TLS[<2>]: ASSERT: mpi.c:246
- ocserv[13643]: TLS[<2>]: ASSERT: dn.c:991
- ocserv[13643]: [MYIP]:56725 client certificate verification succeeded
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 310
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 310
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[2] Handshake(22) with length: 310
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: CLIENT KEY EXCHANGE (16) was received. Length 306[306], frag offset 0, frag length: 306, sequence: 0
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 310
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 310
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[3] Handshake(22) with length: 310
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE VERIFY (15) was received. Length 306[306], frag offset 0, frag length: 306, sequence: 0
- ocserv[13643]: TLS[<2>]: ASSERT: signature.c:308
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: verify cert vrfy: using (null)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet ChangeCipherSpec(20)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet ChangeCipherSpec(20) with length: 1
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[4] ChangeCipherSpec(20) with length: 1
- ocserv[13643]: TLS[<9>]: INT: PREMASTER SECRET[48]: 030133ec512043e5ec2a6e636836cf21d63a33ba0fc66b05d45f4c2072ee8c3c9c89b75be0cc4e9a5a395da43c0beabd
- ocserv[13643]: TLS[<9>]: INT: CLIENT RANDOM[32]: 52a489519680ba7cda89e928cf50bb9a865124e6dc0b48ae5b3bcb292597f645
- ocserv[13643]: TLS[<9>]: INT: SERVER RANDOM[32]: 52a4894f6c7590f10686e013783af42af231738a2cbe9be47c03ddba3b687a75
- ocserv[13643]: TLS[<9>]: INT: MASTER SECRET: 6d349e1ab574610ae584973602e14536e9c4d305cb2127d6bd95ec06ead03781c2e80e334a6719f62f45830c89c9fb67
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Initializing epoch #1
- ocserv[13643]: TLS[<9>]: INT: KEY BLOCK[72]: 3e417aa9d280f51d29b9df863a7c798a4133c1ca6d14ccbe6296decaf565eb54
- ocserv[13643]: TLS[<9>]: INT: CLIENT WRITE KEY [16]: b28ad9a74a32741872896d474527e56a
- ocserv[13643]: TLS[<9>]: INT: SERVER WRITE KEY [16]: fa8325cda97ecd9a4591636d92f6ae8f
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 ready
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 36
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 36
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 16
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: recording tls-unique CB (recv)
- ocserv[13643]: TLS[<3>]: REC[0x87d11c0]: Sent ChangeCipherSpec
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: Initializing internal [write] cipher sessions
- ocserv[13643]: TLS[<3>]: HSK[0x87d11c0]: FINISHED was queued [16 bytes]
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and target length: 1
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[5] ChangeCipherSpec(20) in epoch 0 and length: 6
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 16 and target length: 16
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 41
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Epoch #0 freed
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13643]: [MYIP]:56725 TLS handshake completed
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Application Data packet received. Epoch 0, length: 893
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet Application Data(23) with length: 893
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Application Data(23) with length: 873
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Application Data(23) with length: 321 and target length: 321
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 346
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Application Data packet received. Epoch 0, length: 571
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet Application Data(23) with length: 571
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[2] Application Data(23) with length: 551
- ocserv[13578]: [MYIP]:56725 auth init for user 'user' from '[MYIP]:56725'
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Application Data(23) with length: 325 and target length: 325
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Application Data(23) in epoch 1 and length: 350
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Application Data packet received. Epoch 0, length: 568
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet Application Data(23) with length: 568
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[3] Application Data(23) with length: 548
- ocserv[13643]: [MYIP]:56725 sending auth request
- ocserv[13578]: [MYIP]:56725 auth req for user 'user'
- ocserv[13578]: [MYIP]:56725 accepting user 'user'
- ocserv[13578]: [MYIP]:56725 auth deinit for user 'user'
- ocserv[13578]: [MYIP]:56725 Selected IP: [10.10.11.192]:0
- ocserv[13578]: [MYIP]:56725 assigning tun device vpns0
- ocserv[13578]: [MYIP]:56725 user 'user' of group '[unknown]' authenticated
- ocserv[13643]: [MYIP]:56725 User 'user' logged in
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Application Data(23) with length: 921 and target length: 921
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Application Data(23) in epoch 1 and length: 946
- ocserv[13646]: [MYIP]:56726 accepted connection
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 133
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 133
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 133
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 129[129], frag offset 0, frag length: 129, sequence: 0
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.1
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_db.c:278
- ocserv[13646]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SERVER NAME/0' (14 bytes)
- ocserv[13646]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SERVER NAME/0'
- ocserv[13646]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SERVER NAME/0'
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Received safe renegotiation CS
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Requested cipher suites[size: 70]:
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Selected cipher suite: RSA_ARCFOUR_128_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Selected Compression Method: NULL
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Safe renegotiation succeeded
- ocserv[13646]: TLS[<2>]: ASSERT: status_request.c:197
- ocserv[13646]: TLS[<3>]: EXT[0x87d11c0]: Sending extension SAFE RENEGOTIATION (1 bytes)
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: SessionID: 9c65be5e235f71926a0dfb4ae89bc5e0cdda33729b0f988514c1dbce845f08cd
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [81 bytes]
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE was queued [904 bytes]
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE REQUEST was queued [50 bytes]
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO DONE was queued [4 bytes]
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 81 and target length: 81
- ocserv[13646]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 904 and target length: 904
- ocserv[13646]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 909
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 50 and target length: 50
- ocserv[13646]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 55
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 4 and target length: 4
- ocserv[13646]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 7
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 7
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Handshake(22) with length: 7
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE (11) was received. Length 3[3], frag offset 0, frag length: 3, sequence: 0
- ocserv[13646]: TLS[<2>]: ASSERT: cert.c:1094
- ocserv[13646]: [MYIP]:56726 error verifying client certificate
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 310
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 310
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[2] Handshake(22) with length: 310
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: CLIENT KEY EXCHANGE (16) was received. Length 306[306], frag offset 0, frag length: 306, sequence: 0
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Expected Packet ChangeCipherSpec(20)
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Received Packet ChangeCipherSpec(20) with length: 1
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[3] ChangeCipherSpec(20) with length: 1
- ocserv[13646]: TLS[<9>]: INT: PREMASTER SECRET[48]: 03018f3c7617fc01dfbddcece8641e238e37aa3390bbb14a8538ab7d9fca3cf8d688ef3f0e58c26afd648c78a9290d1e
- ocserv[13646]: TLS[<9>]: INT: CLIENT RANDOM[32]: 52a4895770f5fd00539bb05f7089fdc35a7d8d659cafcd706ffeb6cb904a5f08
- ocserv[13646]: TLS[<9>]: INT: SERVER RANDOM[32]: 52a48956878ae5c9aaebe0b52988ed30441123373594394a618f2a794975c9eb
- ocserv[13646]: TLS[<9>]: INT: MASTER SECRET: 467513aa78badbcd1885e1fe1b4c9b8f2d6f04b4ea688b6028b05efa3d335e538167f4fc3e36daf3e50e98e06d0b2195
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Initializing epoch #1
- ocserv[13646]: TLS[<9>]: INT: KEY BLOCK[72]: e01b0b00bdb2fc3023ceab9942e4aae9ed844ab51ffb891b88373e58d0bef89c
- ocserv[13646]: TLS[<9>]: INT: CLIENT WRITE KEY [16]: dea5680a69a85c8c22245fd6e66329fd
- ocserv[13646]: TLS[<9>]: INT: SERVER WRITE KEY [16]: f8ad12f7449800e26e6687f36048d7af
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 ready
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 36
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 36
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 16
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: recording tls-unique CB (recv)
- ocserv[13646]: TLS[<3>]: REC[0x87d11c0]: Sent ChangeCipherSpec
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: Initializing internal [write] cipher sessions
- ocserv[13646]: TLS[<3>]: HSK[0x87d11c0]: FINISHED was queued [16 bytes]
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and target length: 1
- ocserv[13646]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[5] ChangeCipherSpec(20) in epoch 0 and length: 6
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 16 and target length: 16
- ocserv[13646]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 41
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Epoch #0 freed
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13646]: [MYIP]:56726 TLS handshake completed
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Application Data packet received. Epoch 0, length: 701
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Received Packet Application Data(23) with length: 701
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Application Data(23) with length: 681
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Application Data(23) with length: 173 and target length: 173
- ocserv[13646]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 198
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Alert packet received. Epoch 0, length: 22
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Received Packet Alert(21) with length: 22
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[2] Alert(21) with length: 2
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Alert[1|0] - Close notify - was received
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_record.c:1247
- ocserv[13646]: TLS[<2>]: ASSERT: gnutls_buffers.c:613
- ocserv[13646]: TLS[<4>]: REC: Sending Alert[1|0] - Close notify
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Alert(21) with length: 2 and target length: 2
- ocserv[13646]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Alert(21) in epoch 1 and length: 27
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13646]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 freed
- ocserv[13578]: [MYIP]:56726 command socket closed
- ocserv[13647]: [MYIP]:56727 accepted connection
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 63
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 63
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 63
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 59[59], frag offset 0, frag length: 59, sequence: 0
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.1
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_db.c:278
- ocserv[13647]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13647]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SESSION TICKET/35' (0 bytes)
- ocserv[13647]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Received safe renegotiation CS
- ocserv[13647]: TLS[<2>]: ASSERT: server_name.c:300
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Requested cipher suites[size: 14]:
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Selected cipher suite: RSA_ARCFOUR_128_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Selected Compression Method: NULL
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Safe renegotiation succeeded
- ocserv[13647]: TLS[<2>]: ASSERT: status_request.c:197
- ocserv[13647]: TLS[<3>]: EXT[0x87d11c0]: Sending extension SAFE RENEGOTIATION (1 bytes)
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: SessionID: cc8e23812a77e45fe9408aeb9c9a61793ae427fc51211f4e9f600ad6590d78c7
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [81 bytes]
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE was queued [904 bytes]
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE REQUEST was queued [50 bytes]
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO DONE was queued [4 bytes]
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 81 and target length: 81
- ocserv[13647]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 904 and target length: 904
- ocserv[13647]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 909
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 50 and target length: 50
- ocserv[13647]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 55
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 4 and target length: 4
- ocserv[13647]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 7
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 7
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Handshake(22) with length: 7
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE (11) was received. Length 3[3], frag offset 0, frag length: 3, sequence: 0
- ocserv[13647]: TLS[<2>]: ASSERT: cert.c:1094
- ocserv[13647]: [MYIP]:56727 error verifying client certificate
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 310
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 310
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[2] Handshake(22) with length: 310
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: CLIENT KEY EXCHANGE (16) was received. Length 306[306], frag offset 0, frag length: 306, sequence: 0
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 ChangeCipherSpec packet received. Epoch 0, length: 1
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Expected Packet ChangeCipherSpec(20)
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Received Packet ChangeCipherSpec(20) with length: 1
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[3] ChangeCipherSpec(20) with length: 1
- ocserv[13647]: TLS[<9>]: INT: PREMASTER SECRET[48]: 03015bf3d2cfc90bed12228987b4d934049fb4302f6f924b5ccda30cc8f6c7ac60ba65019f632db0bb04d70b60adb1ac
- ocserv[13647]: TLS[<9>]: INT: CLIENT RANDOM[32]: 52a48957d715b74548d4edd26ad4de00a9c105d1d873e1b9a27351600ace1609
- ocserv[13647]: TLS[<9>]: INT: SERVER RANDOM[32]: 52a48956b517f9ec64043c41a3a69e8bb95a98de55459683a914761848518d96
- ocserv[13647]: TLS[<9>]: INT: MASTER SECRET: df9426b2e2b252603371cf0f1082899bf841ce30b0614301aec46fd3a34065439cd389f94d96a1d0d50588ab5944faab
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Initializing epoch #1
- ocserv[13647]: TLS[<9>]: INT: KEY BLOCK[72]: 297afffd43a1126e55c439f8f6bfb5f182997ed2a7c35ba2acf3d7ecab2600e4
- ocserv[13647]: TLS[<9>]: INT: CLIENT WRITE KEY [16]: c585a9653a9558eb2963045fa3e49e43
- ocserv[13647]: TLS[<9>]: INT: SERVER WRITE KEY [16]: 09dff9307f9a20bfa1a8d2af8e40b17d
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 ready
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13647]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 36
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 36
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 16
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: recording tls-unique CB (recv)
- ocserv[13647]: TLS[<3>]: REC[0x87d11c0]: Sent ChangeCipherSpec
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: Initializing internal [write] cipher sessions
- ocserv[13647]: TLS[<3>]: HSK[0x87d11c0]: FINISHED was queued [16 bytes]
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and target length: 1
- ocserv[13647]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[5] ChangeCipherSpec(20) in epoch 0 and length: 6
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 16 and target length: 16
- ocserv[13647]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 41
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Epoch #0 freed
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13647]: [MYIP]:56727 TLS handshake completed
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Application Data packet received. Epoch 0, length: 1396
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Received Packet Application Data(23) with length: 1396
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Application Data(23) with length: 1376
- ocserv[13647]: [MYIP]:56727 sending cookie authentication request
- ocserv[13578]: [MYIP]:56727 failed authentication attempt for user 'user'
- ocserv[13647]: [MYIP]:56727 failed cookie authentication attempt
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Application Data(23) with length: 36 and target length: 36
- ocserv[13647]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 61
- ocserv[13647]: TLS[<4>]: REC: Sending Alert[2|49] - Access was denied
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Alert(21) with length: 2 and target length: 2
- ocserv[13647]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Alert(21) in epoch 1 and length: 27
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13647]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 freed
- ocserv[13578]: [MYIP]:56727 command socket closed
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Alert packet received. Epoch 0, length: 22
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Received Packet Alert(21) with length: 22
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[4] Alert(21) with length: 2
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Alert[1|0] - Close notify - was received
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_record.c:1247
- ocserv[13643]: TLS[<2>]: ASSERT: gnutls_buffers.c:613
- ocserv[13643]: TLS[<4>]: REC: Sending Alert[1|0] - Close notify
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Alert(21) with length: 2 and target length: 2
- ocserv[13643]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[5] Alert(21) in epoch 1 and length: 27
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13643]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 freed
- ocserv[13578]: [MYIP]:56725 command socket closed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement