Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ocserv[13876]: [MYIP]:55971 accepted connection
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 98
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 98
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 98
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 94[94], frag offset 0, frag length: 94, sequence: 0
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.3
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_db.c:278
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SESSION TICKET/35' (0 bytes)
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SIGNATURE ALGORITHMS/13' (28 bytes)
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (0.0) (null)
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.1) RSA-SHA1
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.1) RSA-SHA224
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.1) RSA-SHA256
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.1) RSA-SHA384
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.1) RSA-SHA512
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (1.1) RSA-MD5
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.2) DSA-SHA1
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.3) ECDSA-SHA1
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.3) ECDSA-SHA224
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.3) ECDSA-SHA256
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.3) ECDSA-SHA384
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.3) ECDSA-SHA512
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'HEARTBEAT/15' (1 bytes)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Received safe renegotiation CS
- ocserv[13876]: TLS[<2>]: ASSERT: server_name.c:300
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Requested cipher suites[size: 12]:
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Selected cipher suite: RSA_ARCFOUR_128_SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Selected Compression Method: NULL
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: Safe renegotiation succeeded
- ocserv[13876]: TLS[<2>]: ASSERT: status_request.c:197
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: Sending extension SAFE RENEGOTIATION (1 bytes)
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: SessionID: 118e3569322c57e670a87f47dda71f0881512e23234a69a8efc564ceefb8ef99
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [81 bytes]
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE was queued [904 bytes]
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.1) RSA-SHA256
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.2) DSA-SHA256
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.3) ECDSA-SHA256
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.1) RSA-SHA384
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.3) ECDSA-SHA384
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.1) RSA-SHA512
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.3) ECDSA-SHA512
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.1) RSA-SHA224
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.2) DSA-SHA224
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.3) ECDSA-SHA224
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.1) RSA-SHA1
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.2) DSA-SHA1
- ocserv[13876]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.3) ECDSA-SHA1
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE REQUEST was queued [78 bytes]
- ocserv[13876]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO DONE was queued [4 bytes]
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 81 and target length: 81
- ocserv[13876]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 904 and target length: 904
- ocserv[13876]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 909
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 78 and target length: 78
- ocserv[13876]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 83
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 4 and target length: 4
- ocserv[13876]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Alert packet received. Epoch 0, length: 2
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Received Packet Alert(21) with length: 2
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Alert(21) with length: 2
- ocserv[13876]: TLS[<4>]: REC[0x87d11c0]: Alert[2|46] - Unknown certificate - was received
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_record.c:744
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_record.c:750
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_record.c:1247
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_buffers.c:1228
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:1357
- ocserv[13876]: TLS[<2>]: ASSERT: gnutls_handshake.c:3060
- ocserv[13876]: GnuTLS error (at worker-vpn.c:572): A TLS fatal alert has been received.: Unknown certificate
- ocserv[13578]: [MYIP]:55971 command socket closed
- ocserv[13877]: [MYIP]:55972 accepted connection
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 98
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 98
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 98
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 94[94], frag offset 0, frag length: 94, sequence: 0
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.3
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_db.c:278
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SESSION TICKET/35' (0 bytes)
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SIGNATURE ALGORITHMS/13' (28 bytes)
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (0.0) (null)
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.1) RSA-SHA1
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.1) RSA-SHA224
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.1) RSA-SHA256
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.1) RSA-SHA384
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.1) RSA-SHA512
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (1.1) RSA-MD5
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.2) DSA-SHA1
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.3) ECDSA-SHA1
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.3) ECDSA-SHA224
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.3) ECDSA-SHA256
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.3) ECDSA-SHA384
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.3) ECDSA-SHA512
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'HEARTBEAT/15' (1 bytes)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Received safe renegotiation CS
- ocserv[13877]: TLS[<2>]: ASSERT: server_name.c:300
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Requested cipher suites[size: 12]:
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Selected cipher suite: RSA_ARCFOUR_128_SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Selected Compression Method: NULL
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: Safe renegotiation succeeded
- ocserv[13877]: TLS[<2>]: ASSERT: status_request.c:197
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: Sending extension SAFE RENEGOTIATION (1 bytes)
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: SessionID: 0d35b4b285e43eab151b592661ae6143fd116e4bb8309c306db2374af581fcb1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [81 bytes]
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE was queued [904 bytes]
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.1) RSA-SHA256
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.2) DSA-SHA256
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.3) ECDSA-SHA256
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.1) RSA-SHA384
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.3) ECDSA-SHA384
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.1) RSA-SHA512
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.3) ECDSA-SHA512
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.1) RSA-SHA224
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.2) DSA-SHA224
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.3) ECDSA-SHA224
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.1) RSA-SHA1
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.2) DSA-SHA1
- ocserv[13877]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.3) ECDSA-SHA1
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE REQUEST was queued [78 bytes]
- ocserv[13877]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO DONE was queued [4 bytes]
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 81 and target length: 81
- ocserv[13877]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 904 and target length: 904
- ocserv[13877]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 909
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 78 and target length: 78
- ocserv[13877]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 83
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 4 and target length: 4
- ocserv[13877]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13877]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_buffers.c:515
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_record.c:1008
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_record.c:1120
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_buffers.c:1228
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:1357
- ocserv[13877]: TLS[<2>]: ASSERT: gnutls_handshake.c:3060
- ocserv[13877]: GnuTLS error (at worker-vpn.c:572): The TLS connection was non-properly terminated.
- ocserv[13578]: [MYIP]:55972 command socket closed
- ocserv[13878]: [MYIP]:55973 accepted connection
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 98
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 98
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 98
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 94[94], frag offset 0, frag length: 94, sequence: 0
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.3
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_db.c:278
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SESSION TICKET/35' (0 bytes)
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SIGNATURE ALGORITHMS/13' (28 bytes)
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (0.0) (null)
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.1) RSA-SHA1
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.1) RSA-SHA224
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.1) RSA-SHA256
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.1) RSA-SHA384
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.1) RSA-SHA512
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (1.1) RSA-MD5
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.2) DSA-SHA1
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.3) ECDSA-SHA1
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.3) ECDSA-SHA224
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.3) ECDSA-SHA256
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.3) ECDSA-SHA384
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.3) ECDSA-SHA512
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'HEARTBEAT/15' (1 bytes)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Received safe renegotiation CS
- ocserv[13878]: TLS[<2>]: ASSERT: server_name.c:300
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Requested cipher suites[size: 12]:
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Selected cipher suite: RSA_ARCFOUR_128_SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Selected Compression Method: NULL
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: Safe renegotiation succeeded
- ocserv[13878]: TLS[<2>]: ASSERT: status_request.c:197
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: Sending extension SAFE RENEGOTIATION (1 bytes)
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: SessionID: 37d100f1268fd082c83cf1ee187fa02c345e7f265452a9c6e37aae3c85acdb4d
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [81 bytes]
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE was queued [904 bytes]
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.1) RSA-SHA256
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.2) DSA-SHA256
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.3) ECDSA-SHA256
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.1) RSA-SHA384
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.3) ECDSA-SHA384
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.1) RSA-SHA512
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.3) ECDSA-SHA512
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.1) RSA-SHA224
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.2) DSA-SHA224
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.3) ECDSA-SHA224
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.1) RSA-SHA1
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.2) DSA-SHA1
- ocserv[13878]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.3) ECDSA-SHA1
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE REQUEST was queued [78 bytes]
- ocserv[13878]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO DONE was queued [4 bytes]
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 81 and target length: 81
- ocserv[13878]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 904 and target length: 904
- ocserv[13878]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 909
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 78 and target length: 78
- ocserv[13878]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 83
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 4 and target length: 4
- ocserv[13878]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13878]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_buffers.c:515
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_record.c:1008
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_record.c:1120
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_buffers.c:1228
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:1357
- ocserv[13878]: TLS[<2>]: ASSERT: gnutls_handshake.c:3060
- ocserv[13878]: GnuTLS error (at worker-vpn.c:572): The TLS connection was non-properly terminated.
- ocserv[13578]: [MYIP]:55973 command socket closed
- ocserv[13879]: [MYIP]:55974 accepted connection
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 98
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 98
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 98
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 94[94], frag offset 0, frag length: 94, sequence: 0
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.3
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_db.c:278
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SESSION TICKET/35' (0 bytes)
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SIGNATURE ALGORITHMS/13' (28 bytes)
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (0.0) (null)
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.1) RSA-SHA1
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.1) RSA-SHA224
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.1) RSA-SHA256
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.1) RSA-SHA384
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.1) RSA-SHA512
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (1.1) RSA-MD5
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.2) DSA-SHA1
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.3) ECDSA-SHA1
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.3) ECDSA-SHA224
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.3) ECDSA-SHA256
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.3) ECDSA-SHA384
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.3) ECDSA-SHA512
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'HEARTBEAT/15' (1 bytes)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Received safe renegotiation CS
- ocserv[13879]: TLS[<2>]: ASSERT: server_name.c:300
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Requested cipher suites[size: 12]:
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Selected cipher suite: RSA_ARCFOUR_128_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Selected Compression Method: NULL
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Safe renegotiation succeeded
- ocserv[13879]: TLS[<2>]: ASSERT: status_request.c:197
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: Sending extension SAFE RENEGOTIATION (1 bytes)
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: SessionID: 39d2c532f97adfc8c73ed921594f8195bb9047957526e9be328a9fe9a19b27ab
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [81 bytes]
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE was queued [904 bytes]
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.1) RSA-SHA256
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.2) DSA-SHA256
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.3) ECDSA-SHA256
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.1) RSA-SHA384
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.3) ECDSA-SHA384
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.1) RSA-SHA512
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.3) ECDSA-SHA512
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.1) RSA-SHA224
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.2) DSA-SHA224
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.3) ECDSA-SHA224
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.1) RSA-SHA1
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.2) DSA-SHA1
- ocserv[13879]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.3) ECDSA-SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE REQUEST was queued [78 bytes]
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO DONE was queued [4 bytes]
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 81 and target length: 81
- ocserv[13879]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 904 and target length: 904
- ocserv[13879]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 909
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 78 and target length: 78
- ocserv[13879]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 83
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 4 and target length: 4
- ocserv[13879]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Handshake packet received. Epoch 0, length: 7
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 7
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Handshake(22) with length: 7
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE (11) was received. Length 3[3], frag offset 0, frag length: 3, sequence: 0
- ocserv[13879]: TLS[<2>]: ASSERT: cert.c:1094
- ocserv[13879]: [MYIP]:55974 error verifying client certificate
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Handshake packet received. Epoch 0, length: 310
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 310
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[2] Handshake(22) with length: 310
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: CLIENT KEY EXCHANGE (16) was received. Length 306[306], frag offset 0, frag length: 306, sequence: 0
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Expected Packet ChangeCipherSpec(20)
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Received Packet ChangeCipherSpec(20) with length: 1
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[3] ChangeCipherSpec(20) with length: 1
- ocserv[13879]: TLS[<9>]: INT: PREMASTER SECRET[48]: 0303c96c8788adb5d9890d74085a8b3463b1b8fa4ac7daf02b6e52426c731a0d874fb273a6990963bd0d558f4ce4475c
- ocserv[13879]: TLS[<9>]: INT: CLIENT RANDOM[32]: 52a4910032a5a8ea4e1b420e880857cf2f01db3c82adcc524f9082e609850adb
- ocserv[13879]: TLS[<9>]: INT: SERVER RANDOM[32]: 52a490ffd6eaaae79b561828d9d3b718ee18eb41cbead81ec591ea0e74503e06
- ocserv[13879]: TLS[<9>]: INT: MASTER SECRET: 3840754cde1a3951f067a5164a1f132128052a95e687f039902ba80bfa9a5c1bfb6c8bb0703f996fec7c1dddd2305409
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Initializing epoch #1
- ocserv[13879]: TLS[<9>]: INT: KEY BLOCK[72]: e0bcc810742161c001c81ec02f1a55c7ad7c66035c96baf334413400adac6a73
- ocserv[13879]: TLS[<9>]: INT: CLIENT WRITE KEY [16]: 11b28be107851c1bce2cc19aad8485d6
- ocserv[13879]: TLS[<9>]: INT: SERVER WRITE KEY [16]: b493bc05c42d4b0d08f71ba1d8663b99
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 ready
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Handshake packet received. Epoch 0, length: 36
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 36
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 16
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: recording tls-unique CB (recv)
- ocserv[13879]: TLS[<3>]: REC[0x87d11c0]: Sent ChangeCipherSpec
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: Initializing internal [write] cipher sessions
- ocserv[13879]: TLS[<3>]: HSK[0x87d11c0]: FINISHED was queued [16 bytes]
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and target length: 1
- ocserv[13879]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[5] ChangeCipherSpec(20) in epoch 0 and length: 6
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 16 and target length: 16
- ocserv[13879]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 41
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Epoch #0 freed
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13879]: [MYIP]:55974 TLS handshake completed
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Application Data packet received. Epoch 0, length: 940
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Received Packet Application Data(23) with length: 940
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Application Data(23) with length: 920
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Application Data(23) with length: 321 and target length: 321
- ocserv[13879]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 346
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Application Data packet received. Epoch 0, length: 590
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Received Packet Application Data(23) with length: 590
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[2] Application Data(23) with length: 570
- ocserv[13879]: [MYIP]:55974 no certificate provided for authentication
- ocserv[13879]: TLS[<2>]: ASSERT: gnutls_buffers.c:613
- ocserv[13879]: TLS[<4>]: REC: Sending Alert[1|0] - Close notify
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Alert(21) with length: 2 and target length: 2
- ocserv[13879]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Alert(21) in epoch 1 and length: 27
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13879]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 freed
- ocserv[13578]: [MYIP]:55974 command socket closed
- ocserv[13880]: [MYIP]:55975 accepted connection
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13880]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13880]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 130
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 130
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 130
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 126[126], frag offset 0, frag length: 126, sequence: 0
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.3
- ocserv[13880]: [MYIP]:55975 sending resumption request (fetch)
- ocserv[13880]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SESSION TICKET/35' (0 bytes)
- ocserv[13880]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13880]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: Allowing unsafe initial negotiation
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: SessionID: 39d2c532f97adfc8c73ed921594f8195bb9047957526e9be328a9fe9a19b27ab
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [74 bytes]
- ocserv[13880]: [MYIP]:55975 error verifying client certificate
- ocserv[13880]: TLS[<3>]: REC[0x87d11c0]: Sent ChangeCipherSpec
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Initializing epoch #1
- ocserv[13880]: TLS[<9>]: INT: KEY BLOCK[72]: 0ff6595c8a4e362da3f7a5bad65bb12b9dcf2b6d736ace300269707e479e204a
- ocserv[13880]: TLS[<9>]: INT: CLIENT WRITE KEY [16]: 5e36958c3ad315a798500bb096c14587
- ocserv[13880]: TLS[<9>]: INT: SERVER WRITE KEY [16]: f3e1bec2ec51c7fae009335a1f675ec1
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 ready
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: Initializing internal [write] cipher sessions
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: recording tls-unique CB (send)
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: FINISHED was queued [16 bytes]
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 74 and target length: 74
- ocserv[13880]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 79
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and target length: 1
- ocserv[13880]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] ChangeCipherSpec(20) in epoch 0 and length: 6
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 16 and target length: 16
- ocserv[13880]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 41
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Expected Packet ChangeCipherSpec(20)
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Received Packet ChangeCipherSpec(20) with length: 1
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] ChangeCipherSpec(20) with length: 1
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13880]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Handshake packet received. Epoch 0, length: 36
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 36
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 16
- ocserv[13880]: TLS[<3>]: HSK[0x87d11c0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Epoch #0 freed
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13880]: [MYIP]:55975 TLS handshake completed
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Application Data packet received. Epoch 0, length: 623
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Received Packet Application Data(23) with length: 623
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Application Data(23) with length: 603
- ocserv[13880]: [MYIP]:55975 no certificate provided for authentication
- ocserv[13880]: TLS[<2>]: ASSERT: gnutls_buffers.c:613
- ocserv[13880]: TLS[<4>]: REC: Sending Alert[1|0] - Close notify
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Alert(21) with length: 2 and target length: 2
- ocserv[13880]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Alert(21) in epoch 1 and length: 27
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13880]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 freed
- ocserv[13578]: [MYIP]:55975 command socket closed
- ocserv[13881]: [MYIP]:55976 accepted connection
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #0
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_constate.c:715
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Allocating epoch #1
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: SSL 3.1 Handshake packet received. Epoch 0, length: 98
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 98
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 98
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: CLIENT HELLO (1) was received. Length 94[94], frag offset 0, frag length: 94, sequence: 0
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Client's version: 3.3
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_db.c:278
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SESSION TICKET/35' (0 bytes)
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SIGNATURE ALGORITHMS/13'
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'HEARTBEAT/15'
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Found extension 'SESSION TICKET/35'
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'SIGNATURE ALGORITHMS/13' (28 bytes)
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (0.0) (null)
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.1) RSA-SHA1
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.1) RSA-SHA224
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.1) RSA-SHA256
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.1) RSA-SHA384
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.1) RSA-SHA512
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (1.1) RSA-MD5
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.2) DSA-SHA1
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (2.3) ECDSA-SHA1
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (3.3) ECDSA-SHA224
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (4.3) ECDSA-SHA256
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (5.3) ECDSA-SHA384
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: rcvd signature algo (6.3) ECDSA-SHA512
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Parsing extension 'HEARTBEAT/15' (1 bytes)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Received safe renegotiation CS
- ocserv[13881]: TLS[<2>]: ASSERT: server_name.c:300
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_handshake.c:3283
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Requested cipher suites[size: 12]:
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Selected cipher suite: RSA_ARCFOUR_128_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Selected Compression Method: NULL
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Safe renegotiation succeeded
- ocserv[13881]: TLS[<2>]: ASSERT: status_request.c:197
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: Sending extension SAFE RENEGOTIATION (1 bytes)
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: SessionID: 80f663ff57db6f4f444924b076b497e7a98bfce0fa27baff36a1aad55d0be600
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO was queued [81 bytes]
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE was queued [904 bytes]
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.1) RSA-SHA256
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.2) DSA-SHA256
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (4.3) ECDSA-SHA256
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.1) RSA-SHA384
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (5.3) ECDSA-SHA384
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.1) RSA-SHA512
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (6.3) ECDSA-SHA512
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.1) RSA-SHA224
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.2) DSA-SHA224
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (3.3) ECDSA-SHA224
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.1) RSA-SHA1
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.2) DSA-SHA1
- ocserv[13881]: TLS[<3>]: EXT[0x87d11c0]: sent signature algo (2.3) ECDSA-SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE REQUEST was queued [78 bytes]
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: SERVER HELLO DONE was queued [4 bytes]
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 81 and target length: 81
- ocserv[13881]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 0 and length: 86
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 904 and target length: 904
- ocserv[13881]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Handshake(22) in epoch 0 and length: 909
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 78 and target length: 78
- ocserv[13881]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[3] Handshake(22) in epoch 0 and length: 83
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 4 and target length: 4
- ocserv[13881]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[4] Handshake(22) in epoch 0 and length: 9
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Handshake packet received. Epoch 0, length: 7
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 7
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Handshake(22) with length: 7
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: CERTIFICATE (11) was received. Length 3[3], frag offset 0, frag length: 3, sequence: 0
- ocserv[13881]: TLS[<2>]: ASSERT: cert.c:1094
- ocserv[13881]: [MYIP]:55976 error verifying client certificate
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Handshake packet received. Epoch 0, length: 310
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 310
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[2] Handshake(22) with length: 310
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: CLIENT KEY EXCHANGE (16) was received. Length 306[306], frag offset 0, frag length: 306, sequence: 0
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Expected Packet ChangeCipherSpec(20)
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Received Packet ChangeCipherSpec(20) with length: 1
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[3] ChangeCipherSpec(20) with length: 1
- ocserv[13881]: TLS[<9>]: INT: PREMASTER SECRET[48]: 03037b567c36eb7086ff3331b8555bc4586238c96eb1b5e15d4634698167c9928e74dfe41ef6d5ef0c1ca9499d96ba6d
- ocserv[13881]: TLS[<9>]: INT: CLIENT RANDOM[32]: 52a49105054e2da3b5515481aabe4360666379e5fc364e03347c14f4126b43ba
- ocserv[13881]: TLS[<9>]: INT: SERVER RANDOM[32]: 52a491048efadef3dbf535e913004bafd717af755eda4f9de5d9f578bfb17488
- ocserv[13881]: TLS[<9>]: INT: MASTER SECRET: b955d72ac7000c080ac7e5888602f6c53ec98375428444bc44253b1aeafe8d514fc7e64922a9b9df2e62da807c1d0a57
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Initializing epoch #1
- ocserv[13881]: TLS[<9>]: INT: KEY BLOCK[72]: e3351bd6763f0e1e21f51108b7530ce81464083701b1f11d0a95e7ae5f903fd7
- ocserv[13881]: TLS[<9>]: INT: CLIENT WRITE KEY [16]: 4636ca95b9acf581dc03735b3e759639
- ocserv[13881]: TLS[<9>]: INT: SERVER WRITE KEY [16]: ec1e36004804a0f53ba86f93cc9057c2
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Epoch #1 ready
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13881]: TLS[<2>]: ASSERT: gnutls_buffers.c:1018
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Handshake packet received. Epoch 0, length: 36
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Handshake(22)
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Received Packet Handshake(22) with length: 36
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[0] Handshake(22) with length: 16
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: recording tls-unique CB (recv)
- ocserv[13881]: TLS[<3>]: REC[0x87d11c0]: Sent ChangeCipherSpec
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Cipher Suite: RSA_ARCFOUR_128_SHA1
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: Initializing internal [write] cipher sessions
- ocserv[13881]: TLS[<3>]: HSK[0x87d11c0]: FINISHED was queued [16 bytes]
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet ChangeCipherSpec(20) with length: 1 and target length: 1
- ocserv[13881]: TLS[<9>]: ENC[0x87d11c0]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[5] ChangeCipherSpec(20) in epoch 0 and length: 6
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Handshake(22) with length: 16 and target length: 16
- ocserv[13881]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[1] Handshake(22) in epoch 1 and length: 41
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Start of epoch cleanup
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Epoch #0 freed
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: End of epoch cleanup
- ocserv[13881]: [MYIP]:55976 TLS handshake completed
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: SSL 3.3 Application Data packet received. Epoch 0, length: 505
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Expected Packet Application Data(23)
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Received Packet Application Data(23) with length: 505
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Decrypted Packet[1] Application Data(23) with length: 485
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Preparing Packet Application Data(23) with length: 321 and target length: 321
- ocserv[13881]: TLS[<9>]: ENC[0x87d11c0]: cipher: ARCFOUR-128, MAC: SHA1, Epoch: 1
- ocserv[13881]: TLS[<4>]: REC[0x87d11c0]: Sent Packet[2] Application Data(23) in epoch 1 and length: 346
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement