Advertisement
Guest User

Untitled

a guest
Dec 5th, 2018
126
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 94.25 KB | None | 0 0
  1. *Tunnelblick: macOS 10.14.1; Tunnelblick 3.7.8 (build 5180)
  2. 2018-12-05 10:05:24 *Tunnelblick: Attempting connection with ldzrouter01-udp-1195-ldap using shadow copy; Set nameserver = 769; monitoring connection
  3. 2018-12-05 10:05:24 *Tunnelblick: openvpnstart start ldzrouter01-udp-1195-ldap.tblk 50668 769 0 1 0 1065264 -ptADGNWradsgnw 2.4.6-openssl-1.0.2q
  4. 2018-12-05 10:05:24 *Tunnelblick: openvpnstart log:
  5. OpenVPN started successfully. Command used to start OpenVPN (one argument per displayed line):
  6.  
  7. /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.4.6-openssl-1.0.2q/openvpn
  8. --daemon
  9. --log /Library/Application Support/Tunnelblick/Logs/-SUsers-Spiotrryczek-SLibrary-SApplication Support-STunnelblick-SConfigurations-Sldzrouter01--udp--1195--ldap.tblk-SContents-SResources-Sconfig.ovpn.769_0_1_0_1065264.50668.openvpn.log
  10. --cd /Library/Application Support/Tunnelblick/Users/piotrryczek/ldzrouter01-udp-1195-ldap.tblk/Contents/Resources
  11. --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5180 3.7.8 (build 5180)"
  12. --verb 3
  13. --config /Library/Application Support/Tunnelblick/Users/piotrryczek/ldzrouter01-udp-1195-ldap.tblk/Contents/Resources/config.ovpn
  14. --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Users/piotrryczek/ldzrouter01-udp-1195-ldap.tblk/Contents/Resources
  15. --verb 3
  16. --cd /Library/Application Support/Tunnelblick/Users/piotrryczek/ldzrouter01-udp-1195-ldap.tblk/Contents/Resources
  17. --management 127.0.0.1 50668 /Library/Application Support/Tunnelblick/nmaggfcmflpeffkcfhipanekgdheofbbmehelgjo.mip
  18. --management-query-passwords
  19. --management-hold
  20. --script-security 2
  21. --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
  22. --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
  23.  
  24. 2018-12-05 10:05:24 *Tunnelblick: Established communication with OpenVPN
  25. 2018-12-05 10:05:24 *Tunnelblick: Obtained VPN username and password from the Keychain
  26. 2018-12-05 10:05:24 OpenVPN 2.4.6 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 29 2018
  27. 2018-12-05 10:05:24 library versions: OpenSSL 1.0.2q 20 Nov 2018, LZO 2.10
  28. 2018-12-05 10:05:24 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:50668
  29. 2018-12-05 10:05:24 Need hold release from management interface, waiting...
  30. 2018-12-05 10:05:24 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:50668
  31. 2018-12-05 10:05:24 MANAGEMENT: CMD 'pid'
  32. 2018-12-05 10:05:24 MANAGEMENT: CMD 'auth-retry interact'
  33. 2018-12-05 10:05:24 MANAGEMENT: CMD 'state on'
  34. 2018-12-05 10:05:24 MANAGEMENT: CMD 'state'
  35. 2018-12-05 10:05:24 MANAGEMENT: CMD 'bytecount 1'
  36. 2018-12-05 10:05:24 MANAGEMENT: CMD 'hold release'
  37. 2018-12-05 10:05:24 MANAGEMENT: CMD 'username "Auth" "piotrek.appstract"'
  38. 2018-12-05 10:05:24 MANAGEMENT: CMD 'password [...]'
  39. 2018-12-05 10:05:24 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  40. 2018-12-05 10:05:24 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  41. 2018-12-05 10:05:24 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  42. 2018-12-05 10:05:24 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  43. 2018-12-05 10:05:24 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  44. 2018-12-05 10:05:24 Socket Buffers: R=[786896->786896] S=[9216->9216]
  45. 2018-12-05 10:05:24 UDP link local (bound): [AF_INET][undef]:1194
  46. 2018-12-05 10:05:24 UDP link remote: [AF_INET]31.182.14.6:1195
  47. 2018-12-05 10:05:24 MANAGEMENT: >STATE:1544000724,WAIT,,,,,,
  48. 2018-12-05 10:05:24 MANAGEMENT: >STATE:1544000724,AUTH,,,,,,
  49. 2018-12-05 10:05:24 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=7d3ba0df f2e2a3d8
  50. 2018-12-05 10:05:24 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  51. 2018-12-05 10:05:24 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  52. 2018-12-05 10:05:24 VERIFY OK: nsCertType=SERVER
  53. 2018-12-05 10:05:24 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  54. 2018-12-05 10:05:24 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  55. 2018-12-05 10:05:24 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  56. 2018-12-05 10:05:24 *Tunnelblick: openvpnstart starting OpenVPN
  57. 2018-12-05 10:05:25 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  58. 2018-12-05 10:05:25 MANAGEMENT: >STATE:1544000725,GET_CONFIG,,,,,,
  59. 2018-12-05 10:05:25 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  60. 2018-12-05 10:05:25 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  61. 2018-12-05 10:05:25 OPTIONS IMPORT: timers and/or timeouts modified
  62. 2018-12-05 10:05:25 OPTIONS IMPORT: --ifconfig/up options modified
  63. 2018-12-05 10:05:25 OPTIONS IMPORT: route options modified
  64. 2018-12-05 10:05:25 OPTIONS IMPORT: route-related options modified
  65. 2018-12-05 10:05:25 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  66. 2018-12-05 10:05:25 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  67. 2018-12-05 10:05:25 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  68. 2018-12-05 10:05:25 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  69. 2018-12-05 10:05:25 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  70. 2018-12-05 10:05:25 Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
  71. 2018-12-05 10:05:25 Opened utun device utun1
  72. 2018-12-05 10:05:25 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  73. 2018-12-05 10:05:25 MANAGEMENT: >STATE:1544000725,ASSIGN_IP,,192.168.16.2,,,,
  74. 2018-12-05 10:05:25 /sbin/ifconfig utun1 delete
  75. ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
  76. 2018-12-05 10:05:25 NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
  77. 2018-12-05 10:05:25 /sbin/ifconfig utun1 192.168.16.2 192.168.16.2 netmask 255.255.255.0 mtu 1500 up
  78. 2018-12-05 10:05:25 /sbin/route add -net 192.168.16.0 192.168.16.2 255.255.255.0
  79. add net 192.168.16.0: gateway 192.168.16.2
  80. 2018-12-05 10:05:25 /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw utun1 1500 1557 192.168.16.2 255.255.255.0 init
  81. **********************************************
  82. Start of output from client.up.tunnelblick.sh
  83. Retrieved from OpenVPN: name server(s) [ 172.16.1.1 172.16.21.1 ], domain name [ intranet ], search domain(s) [ ], and SMB server(s) [ ]
  84. Not aggregating ServerAddresses because running on macOS 10.6 or higher
  85. Setting search domains to 'intranet' because the search domains were not set manually (or are allowed to be changed) and 'Prepend domain name to search domains' was not selected
  86. Saved the DNS and SMB configurations so they can be restored
  87. Changed DNS ServerAddresses setting from '192.168.1.1' to '172.16.1.1 172.16.21.1'
  88. Changed DNS SearchDomains setting from '' to 'intranet'
  89. Changed DNS DomainName setting from 'zyxel.com' to 'intranet'
  90. Did not change SMB NetBIOSName setting of ''
  91. Did not change SMB Workgroup setting of ''
  92. Did not change SMB WINSAddresses setting of ''
  93. DNS servers '172.16.1.1 172.16.21.1' will be used for DNS queries when the VPN is active
  94. NOTE: The DNS servers do not include any free public DNS servers known to Tunnelblick. This may cause DNS queries to fail or be intercepted or falsified even if they are directed through the VPN. Specify only known public DNS servers or DNS servers located on the VPN network to avoid such problems.
  95. Flushed the DNS cache via dscacheutil
  96. /usr/sbin/discoveryutil not present. Not flushing the DNS cache via discoveryutil
  97. Notified mDNSResponder that the DNS cache was flushed
  98. Not notifying mDNSResponderHelper that the DNS cache was flushed because it is not running
  99. Setting up to monitor system configuration with process-network-changes
  100. End of output from client.up.tunnelblick.sh
  101. **********************************************
  102. 2018-12-05 10:05:29 *Tunnelblick: No 'connected.sh' script to execute
  103. 2018-12-05 10:05:29 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  104. 2018-12-05 10:05:29 MANAGEMENT: >STATE:1544000729,ADD_ROUTES,,,,,,
  105. 2018-12-05 10:05:29 /sbin/route add -net 192.168.1.0 192.168.16.1 255.255.255.0
  106. route: writing to routing socket: File exists
  107. add net 192.168.1.0: gateway 192.168.16.1: File exists
  108. 2018-12-05 10:05:29 /sbin/route add -net 192.168.10.0 192.168.16.1 255.255.255.0
  109. add net 192.168.10.0: gateway 192.168.16.1
  110. 2018-12-05 10:05:29 /sbin/route add -net 172.16.1.0 192.168.16.1 255.255.255.0
  111. add net 172.16.1.0: gateway 192.168.16.1
  112. 2018-12-05 10:05:29 /sbin/route add -net 172.16.20.0 192.168.16.1 255.255.255.0
  113. add net 172.16.20.0: gateway 192.168.16.1
  114. 2018-12-05 10:05:29 /sbin/route add -net 172.16.21.0 192.168.16.1 255.255.255.0
  115. add net 172.16.21.0: gateway 192.168.16.1
  116. 2018-12-05 10:05:29 /sbin/route add -net 172.16.11.0 192.168.16.1 255.255.255.0
  117. add net 172.16.11.0: gateway 192.168.16.1
  118. 2018-12-05 10:05:29 /sbin/route add -net 172.17.0.0 192.168.16.1 255.255.0.0
  119. add net 172.17.0.0: gateway 192.168.16.1
  120. 2018-12-05 10:05:29 /sbin/route add -net 172.31.0.0 192.168.16.1 255.255.0.0
  121. add net 172.31.0.0: gateway 192.168.16.1
  122. 2018-12-05 10:05:29 /sbin/route add -net 10.128.0.0 192.168.16.1 255.128.0.0
  123. add net 10.128.0.0: gateway 192.168.16.1
  124. 2018-12-05 10:05:29 Initialization Sequence Completed
  125. 2018-12-05 10:05:29 MANAGEMENT: >STATE:1544000729,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  126. 2018-12-05 10:05:34 *Tunnelblick process-network-changes: A system configuration change was ignored
  127. 2018-12-05 10:05:35 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  128. 2018-12-05 10:05:45 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  129. 2018-12-05 10:05:55 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  130. 2018-12-05 10:06:05 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  131. 2018-12-05 10:06:15 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  132. 2018-12-05 10:06:25 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  133. 2018-12-05 10:06:35 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  134. 2018-12-05 10:06:45 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  135. 2018-12-05 10:06:55 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
  136. 2018-12-05 10:07:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  137. 2018-12-05 10:07:14 SIGUSR1[soft,ping-restart] received, process restarting
  138. 2018-12-05 10:07:14 MANAGEMENT: >STATE:1544000834,RECONNECTING,ping-restart,,,,,
  139. 2018-12-05 10:07:14 *Tunnelblick: No 'reconnecting.sh' script to execute
  140. 2018-12-05 10:07:14 MANAGEMENT: CMD 'hold release'
  141. 2018-12-05 10:07:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  142. 2018-12-05 10:07:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  143. 2018-12-05 10:07:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  144. 2018-12-05 10:07:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
  145. 2018-12-05 10:07:14 UDP link local (bound): [AF_INET][undef]:1194
  146. 2018-12-05 10:07:14 UDP link remote: [AF_INET]31.182.14.6:1195
  147. 2018-12-05 10:07:14 MANAGEMENT: >STATE:1544000834,WAIT,,,,,,
  148. 2018-12-05 10:07:14 MANAGEMENT: CMD 'hold release'
  149. 2018-12-05 10:07:14 MANAGEMENT: >STATE:1544000834,AUTH,,,,,,
  150. 2018-12-05 10:07:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=d51b0c7e 536768d2
  151. 2018-12-05 10:07:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  152. 2018-12-05 10:07:14 VERIFY OK: nsCertType=SERVER
  153. 2018-12-05 10:07:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  154. 2018-12-05 10:07:14 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  155. 2018-12-05 10:07:14 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  156. 2018-12-05 10:07:16 MANAGEMENT: >STATE:1544000836,GET_CONFIG,,,,,,
  157. 2018-12-05 10:07:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  158. 2018-12-05 10:07:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  159. 2018-12-05 10:07:16 OPTIONS IMPORT: timers and/or timeouts modified
  160. 2018-12-05 10:07:16 OPTIONS IMPORT: --ifconfig/up options modified
  161. 2018-12-05 10:07:16 OPTIONS IMPORT: route options modified
  162. 2018-12-05 10:07:16 OPTIONS IMPORT: route-related options modified
  163. 2018-12-05 10:07:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  164. 2018-12-05 10:07:16 *Tunnelblick: No 'connected.sh' script to execute
  165. 2018-12-05 10:07:16 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  166. 2018-12-05 10:07:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  167. 2018-12-05 10:07:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  168. 2018-12-05 10:07:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  169. 2018-12-05 10:07:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  170. 2018-12-05 10:07:16 Preserving previous TUN/TAP instance: utun1
  171. 2018-12-05 10:07:16 Initialization Sequence Completed
  172. 2018-12-05 10:07:16 MANAGEMENT: >STATE:1544000836,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  173. 2018-12-05 10:09:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  174. 2018-12-05 10:09:14 SIGUSR1[soft,ping-restart] received, process restarting
  175. 2018-12-05 10:09:14 MANAGEMENT: >STATE:1544000954,RECONNECTING,ping-restart,,,,,
  176. 2018-12-05 10:09:14 *Tunnelblick: No 'reconnecting.sh' script to execute
  177. 2018-12-05 10:09:14 MANAGEMENT: CMD 'hold release'
  178. 2018-12-05 10:09:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  179. 2018-12-05 10:09:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  180. 2018-12-05 10:09:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  181. 2018-12-05 10:09:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
  182. 2018-12-05 10:09:14 UDP link local (bound): [AF_INET][undef]:1194
  183. 2018-12-05 10:09:14 UDP link remote: [AF_INET]31.182.14.6:1195
  184. 2018-12-05 10:09:14 MANAGEMENT: >STATE:1544000954,WAIT,,,,,,
  185. 2018-12-05 10:09:14 MANAGEMENT: CMD 'hold release'
  186. 2018-12-05 10:09:14 MANAGEMENT: >STATE:1544000954,AUTH,,,,,,
  187. 2018-12-05 10:09:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=e07749ba 26391c45
  188. 2018-12-05 10:09:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  189. 2018-12-05 10:09:14 VERIFY OK: nsCertType=SERVER
  190. 2018-12-05 10:09:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  191. 2018-12-05 10:09:15 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  192. 2018-12-05 10:09:15 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  193. 2018-12-05 10:09:16 MANAGEMENT: >STATE:1544000956,GET_CONFIG,,,,,,
  194. 2018-12-05 10:09:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  195. 2018-12-05 10:09:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  196. 2018-12-05 10:09:16 OPTIONS IMPORT: timers and/or timeouts modified
  197. 2018-12-05 10:09:16 OPTIONS IMPORT: --ifconfig/up options modified
  198. 2018-12-05 10:09:16 OPTIONS IMPORT: route options modified
  199. 2018-12-05 10:09:16 OPTIONS IMPORT: route-related options modified
  200. 2018-12-05 10:09:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  201. 2018-12-05 10:09:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  202. 2018-12-05 10:09:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  203. 2018-12-05 10:09:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  204. 2018-12-05 10:09:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  205. 2018-12-05 10:09:16 Preserving previous TUN/TAP instance: utun1
  206. 2018-12-05 10:09:16 Initialization Sequence Completed
  207. 2018-12-05 10:09:16 MANAGEMENT: >STATE:1544000956,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  208. 2018-12-05 10:09:16 *Tunnelblick: No 'connected.sh' script to execute
  209. 2018-12-05 10:09:16 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  210. 2018-12-05 10:11:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  211. 2018-12-05 10:11:14 SIGUSR1[soft,ping-restart] received, process restarting
  212. 2018-12-05 10:11:14 MANAGEMENT: >STATE:1544001074,RECONNECTING,ping-restart,,,,,
  213. 2018-12-05 10:11:14 *Tunnelblick: No 'reconnecting.sh' script to execute
  214. 2018-12-05 10:11:14 MANAGEMENT: CMD 'hold release'
  215. 2018-12-05 10:11:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  216. 2018-12-05 10:11:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  217. 2018-12-05 10:11:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  218. 2018-12-05 10:11:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
  219. 2018-12-05 10:11:14 UDP link local (bound): [AF_INET][undef]:1194
  220. 2018-12-05 10:11:14 UDP link remote: [AF_INET]31.182.14.6:1195
  221. 2018-12-05 10:11:14 MANAGEMENT: >STATE:1544001074,WAIT,,,,,,
  222. 2018-12-05 10:11:14 MANAGEMENT: CMD 'hold release'
  223. 2018-12-05 10:11:14 MANAGEMENT: >STATE:1544001074,AUTH,,,,,,
  224. 2018-12-05 10:11:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=abdf9436 c44f8a73
  225. 2018-12-05 10:11:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  226. 2018-12-05 10:11:14 VERIFY OK: nsCertType=SERVER
  227. 2018-12-05 10:11:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  228. 2018-12-05 10:11:14 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  229. 2018-12-05 10:11:14 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  230. 2018-12-05 10:11:15 MANAGEMENT: >STATE:1544001075,GET_CONFIG,,,,,,
  231. 2018-12-05 10:11:15 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  232. 2018-12-05 10:11:15 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  233. 2018-12-05 10:11:15 OPTIONS IMPORT: timers and/or timeouts modified
  234. 2018-12-05 10:11:15 OPTIONS IMPORT: --ifconfig/up options modified
  235. 2018-12-05 10:11:15 OPTIONS IMPORT: route options modified
  236. 2018-12-05 10:11:15 OPTIONS IMPORT: route-related options modified
  237. 2018-12-05 10:11:15 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  238. 2018-12-05 10:11:15 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  239. 2018-12-05 10:11:15 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  240. 2018-12-05 10:11:15 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  241. 2018-12-05 10:11:15 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  242. 2018-12-05 10:11:15 Preserving previous TUN/TAP instance: utun1
  243. 2018-12-05 10:11:15 Initialization Sequence Completed
  244. 2018-12-05 10:11:15 MANAGEMENT: >STATE:1544001075,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  245. 2018-12-05 10:11:15 *Tunnelblick: No 'connected.sh' script to execute
  246. 2018-12-05 10:11:15 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  247. 2018-12-05 10:13:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  248. 2018-12-05 10:13:14 SIGUSR1[soft,ping-restart] received, process restarting
  249. 2018-12-05 10:13:14 MANAGEMENT: >STATE:1544001194,RECONNECTING,ping-restart,,,,,
  250. 2018-12-05 10:13:15 *Tunnelblick: No 'reconnecting.sh' script to execute
  251. 2018-12-05 10:13:15 MANAGEMENT: CMD 'hold release'
  252. 2018-12-05 10:13:15 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  253. 2018-12-05 10:13:15 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  254. 2018-12-05 10:13:15 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  255. 2018-12-05 10:13:15 Socket Buffers: R=[786896->786896] S=[9216->9216]
  256. 2018-12-05 10:13:15 UDP link local (bound): [AF_INET][undef]:1194
  257. 2018-12-05 10:13:15 UDP link remote: [AF_INET]31.182.14.6:1195
  258. 2018-12-05 10:13:15 MANAGEMENT: >STATE:1544001195,WAIT,,,,,,
  259. 2018-12-05 10:13:15 MANAGEMENT: CMD 'hold release'
  260. 2018-12-05 10:13:15 MANAGEMENT: >STATE:1544001195,AUTH,,,,,,
  261. 2018-12-05 10:13:15 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=7ccc2618 0629dd07
  262. 2018-12-05 10:13:15 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  263. 2018-12-05 10:13:15 VERIFY OK: nsCertType=SERVER
  264. 2018-12-05 10:13:15 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  265. 2018-12-05 10:13:15 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  266. 2018-12-05 10:13:15 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  267. 2018-12-05 10:13:16 MANAGEMENT: >STATE:1544001196,GET_CONFIG,,,,,,
  268. 2018-12-05 10:13:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  269. 2018-12-05 10:13:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  270. 2018-12-05 10:13:16 OPTIONS IMPORT: timers and/or timeouts modified
  271. 2018-12-05 10:13:16 OPTIONS IMPORT: --ifconfig/up options modified
  272. 2018-12-05 10:13:16 OPTIONS IMPORT: route options modified
  273. 2018-12-05 10:13:16 OPTIONS IMPORT: route-related options modified
  274. 2018-12-05 10:13:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  275. 2018-12-05 10:13:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  276. 2018-12-05 10:13:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  277. 2018-12-05 10:13:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  278. 2018-12-05 10:13:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  279. 2018-12-05 10:13:16 Preserving previous TUN/TAP instance: utun1
  280. 2018-12-05 10:13:16 Initialization Sequence Completed
  281. 2018-12-05 10:13:16 MANAGEMENT: >STATE:1544001196,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  282. 2018-12-05 10:13:17 *Tunnelblick: No 'connected.sh' script to execute
  283. 2018-12-05 10:13:17 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  284. 2018-12-05 10:15:07 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  285. 2018-12-05 10:15:07 SIGUSR1[soft,ping-restart] received, process restarting
  286. 2018-12-05 10:15:07 MANAGEMENT: >STATE:1544001307,RECONNECTING,ping-restart,,,,,
  287. 2018-12-05 10:15:08 *Tunnelblick: No 'reconnecting.sh' script to execute
  288. 2018-12-05 10:15:08 MANAGEMENT: CMD 'hold release'
  289. 2018-12-05 10:15:08 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  290. 2018-12-05 10:15:08 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  291. 2018-12-05 10:15:08 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  292. 2018-12-05 10:15:08 Socket Buffers: R=[786896->786896] S=[9216->9216]
  293. 2018-12-05 10:15:08 UDP link local (bound): [AF_INET][undef]:1194
  294. 2018-12-05 10:15:08 UDP link remote: [AF_INET]31.182.14.6:1195
  295. 2018-12-05 10:15:08 MANAGEMENT: >STATE:1544001308,WAIT,,,,,,
  296. 2018-12-05 10:15:08 MANAGEMENT: CMD 'hold release'
  297. 2018-12-05 10:15:08 MANAGEMENT: >STATE:1544001308,AUTH,,,,,,
  298. 2018-12-05 10:15:08 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=66b04d16 1078bbad
  299. 2018-12-05 10:15:08 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  300. 2018-12-05 10:15:08 VERIFY OK: nsCertType=SERVER
  301. 2018-12-05 10:15:08 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  302. 2018-12-05 10:15:08 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  303. 2018-12-05 10:15:08 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  304. 2018-12-05 10:15:09 MANAGEMENT: >STATE:1544001309,GET_CONFIG,,,,,,
  305. 2018-12-05 10:15:09 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  306. 2018-12-05 10:15:09 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  307. 2018-12-05 10:15:09 OPTIONS IMPORT: timers and/or timeouts modified
  308. 2018-12-05 10:15:09 OPTIONS IMPORT: --ifconfig/up options modified
  309. 2018-12-05 10:15:09 OPTIONS IMPORT: route options modified
  310. 2018-12-05 10:15:09 OPTIONS IMPORT: route-related options modified
  311. 2018-12-05 10:15:09 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  312. 2018-12-05 10:15:09 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  313. 2018-12-05 10:15:09 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  314. 2018-12-05 10:15:09 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  315. 2018-12-05 10:15:09 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  316. 2018-12-05 10:15:09 Preserving previous TUN/TAP instance: utun1
  317. 2018-12-05 10:15:09 Initialization Sequence Completed
  318. 2018-12-05 10:15:09 MANAGEMENT: >STATE:1544001309,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  319. 2018-12-05 10:15:09 *Tunnelblick: No 'connected.sh' script to execute
  320. 2018-12-05 10:15:09 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  321. 2018-12-05 10:17:06 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  322. 2018-12-05 10:17:06 SIGUSR1[soft,ping-restart] received, process restarting
  323. 2018-12-05 10:17:06 MANAGEMENT: >STATE:1544001426,RECONNECTING,ping-restart,,,,,
  324. 2018-12-05 10:17:06 *Tunnelblick: No 'reconnecting.sh' script to execute
  325. 2018-12-05 10:17:06 MANAGEMENT: CMD 'hold release'
  326. 2018-12-05 10:17:06 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  327. 2018-12-05 10:17:06 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  328. 2018-12-05 10:17:06 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  329. 2018-12-05 10:17:07 Socket Buffers: R=[786896->786896] S=[9216->9216]
  330. 2018-12-05 10:17:07 UDP link local (bound): [AF_INET][undef]:1194
  331. 2018-12-05 10:17:07 UDP link remote: [AF_INET]31.182.14.6:1195
  332. 2018-12-05 10:17:07 MANAGEMENT: >STATE:1544001427,WAIT,,,,,,
  333. 2018-12-05 10:17:07 MANAGEMENT: CMD 'hold release'
  334. 2018-12-05 10:17:07 MANAGEMENT: >STATE:1544001427,AUTH,,,,,,
  335. 2018-12-05 10:17:07 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=bf6a17e4 e013a8b8
  336. 2018-12-05 10:17:07 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  337. 2018-12-05 10:17:07 VERIFY OK: nsCertType=SERVER
  338. 2018-12-05 10:17:07 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  339. 2018-12-05 10:17:07 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  340. 2018-12-05 10:17:07 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  341. 2018-12-05 10:17:08 MANAGEMENT: >STATE:1544001428,GET_CONFIG,,,,,,
  342. 2018-12-05 10:17:08 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  343. 2018-12-05 10:17:08 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  344. 2018-12-05 10:17:08 OPTIONS IMPORT: timers and/or timeouts modified
  345. 2018-12-05 10:17:08 OPTIONS IMPORT: --ifconfig/up options modified
  346. 2018-12-05 10:17:08 OPTIONS IMPORT: route options modified
  347. 2018-12-05 10:17:08 OPTIONS IMPORT: route-related options modified
  348. 2018-12-05 10:17:08 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  349. 2018-12-05 10:17:08 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  350. 2018-12-05 10:17:08 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  351. 2018-12-05 10:17:08 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  352. 2018-12-05 10:17:08 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  353. 2018-12-05 10:17:08 Preserving previous TUN/TAP instance: utun1
  354. 2018-12-05 10:17:08 Initialization Sequence Completed
  355. 2018-12-05 10:17:08 MANAGEMENT: >STATE:1544001428,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  356. 2018-12-05 10:17:08 *Tunnelblick: No 'connected.sh' script to execute
  357. 2018-12-05 10:17:08 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  358. 2018-12-05 10:19:04 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  359. 2018-12-05 10:19:04 SIGUSR1[soft,ping-restart] received, process restarting
  360. 2018-12-05 10:19:04 MANAGEMENT: >STATE:1544001544,RECONNECTING,ping-restart,,,,,
  361. 2018-12-05 10:19:05 *Tunnelblick: No 'reconnecting.sh' script to execute
  362. 2018-12-05 10:19:05 MANAGEMENT: CMD 'hold release'
  363. 2018-12-05 10:19:05 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  364. 2018-12-05 10:19:05 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  365. 2018-12-05 10:19:05 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  366. 2018-12-05 10:19:05 Socket Buffers: R=[786896->786896] S=[9216->9216]
  367. 2018-12-05 10:19:05 UDP link local (bound): [AF_INET][undef]:1194
  368. 2018-12-05 10:19:05 UDP link remote: [AF_INET]31.182.14.6:1195
  369. 2018-12-05 10:19:05 MANAGEMENT: >STATE:1544001545,WAIT,,,,,,
  370. 2018-12-05 10:19:05 MANAGEMENT: CMD 'hold release'
  371. 2018-12-05 10:19:05 MANAGEMENT: >STATE:1544001545,AUTH,,,,,,
  372. 2018-12-05 10:19:05 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=37882b0f 1a1660a8
  373. 2018-12-05 10:19:05 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  374. 2018-12-05 10:19:05 VERIFY OK: nsCertType=SERVER
  375. 2018-12-05 10:19:05 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  376. 2018-12-05 10:19:05 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  377. 2018-12-05 10:19:05 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  378. 2018-12-05 10:19:06 MANAGEMENT: >STATE:1544001546,GET_CONFIG,,,,,,
  379. 2018-12-05 10:19:06 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  380. 2018-12-05 10:19:06 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  381. 2018-12-05 10:19:06 OPTIONS IMPORT: timers and/or timeouts modified
  382. 2018-12-05 10:19:06 OPTIONS IMPORT: --ifconfig/up options modified
  383. 2018-12-05 10:19:06 OPTIONS IMPORT: route options modified
  384. 2018-12-05 10:19:06 OPTIONS IMPORT: route-related options modified
  385. 2018-12-05 10:19:06 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  386. 2018-12-05 10:19:06 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  387. 2018-12-05 10:19:06 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  388. 2018-12-05 10:19:06 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  389. 2018-12-05 10:19:06 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  390. 2018-12-05 10:19:06 Preserving previous TUN/TAP instance: utun1
  391. 2018-12-05 10:19:06 Initialization Sequence Completed
  392. 2018-12-05 10:19:06 MANAGEMENT: >STATE:1544001546,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  393. 2018-12-05 10:19:06 *Tunnelblick: No 'connected.sh' script to execute
  394. 2018-12-05 10:19:06 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  395. 2018-12-05 10:21:05 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  396. 2018-12-05 10:21:05 SIGUSR1[soft,ping-restart] received, process restarting
  397. 2018-12-05 10:21:05 MANAGEMENT: >STATE:1544001665,RECONNECTING,ping-restart,,,,,
  398. 2018-12-05 10:21:05 *Tunnelblick: No 'reconnecting.sh' script to execute
  399. 2018-12-05 10:21:05 MANAGEMENT: CMD 'hold release'
  400. 2018-12-05 10:21:05 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  401. 2018-12-05 10:21:05 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  402. 2018-12-05 10:21:05 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  403. 2018-12-05 10:21:05 Socket Buffers: R=[786896->786896] S=[9216->9216]
  404. 2018-12-05 10:21:05 UDP link local (bound): [AF_INET][undef]:1194
  405. 2018-12-05 10:21:05 UDP link remote: [AF_INET]31.182.14.6:1195
  406. 2018-12-05 10:21:05 MANAGEMENT: >STATE:1544001665,WAIT,,,,,,
  407. 2018-12-05 10:21:05 MANAGEMENT: CMD 'hold release'
  408. 2018-12-05 10:21:05 MANAGEMENT: >STATE:1544001665,AUTH,,,,,,
  409. 2018-12-05 10:21:05 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=0962efa6 f8805518
  410. 2018-12-05 10:21:05 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  411. 2018-12-05 10:21:05 VERIFY OK: nsCertType=SERVER
  412. 2018-12-05 10:21:05 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  413. 2018-12-05 10:21:06 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  414. 2018-12-05 10:21:06 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  415. 2018-12-05 10:21:07 MANAGEMENT: >STATE:1544001667,GET_CONFIG,,,,,,
  416. 2018-12-05 10:21:07 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  417. 2018-12-05 10:21:07 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  418. 2018-12-05 10:21:07 OPTIONS IMPORT: timers and/or timeouts modified
  419. 2018-12-05 10:21:07 OPTIONS IMPORT: --ifconfig/up options modified
  420. 2018-12-05 10:21:07 OPTIONS IMPORT: route options modified
  421. 2018-12-05 10:21:07 OPTIONS IMPORT: route-related options modified
  422. 2018-12-05 10:21:07 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  423. 2018-12-05 10:21:07 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  424. 2018-12-05 10:21:07 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  425. 2018-12-05 10:21:07 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  426. 2018-12-05 10:21:07 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  427. 2018-12-05 10:21:07 Preserving previous TUN/TAP instance: utun1
  428. 2018-12-05 10:21:07 Initialization Sequence Completed
  429. 2018-12-05 10:21:07 MANAGEMENT: >STATE:1544001667,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  430. 2018-12-05 10:21:08 *Tunnelblick: No 'connected.sh' script to execute
  431. 2018-12-05 10:21:08 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  432. 2018-12-05 10:22:59 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  433. 2018-12-05 10:22:59 SIGUSR1[soft,ping-restart] received, process restarting
  434. 2018-12-05 10:22:59 MANAGEMENT: >STATE:1544001779,RECONNECTING,ping-restart,,,,,
  435. 2018-12-05 10:22:59 *Tunnelblick: No 'reconnecting.sh' script to execute
  436. 2018-12-05 10:22:59 MANAGEMENT: CMD 'hold release'
  437. 2018-12-05 10:22:59 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  438. 2018-12-05 10:22:59 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  439. 2018-12-05 10:22:59 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  440. 2018-12-05 10:22:59 Socket Buffers: R=[786896->786896] S=[9216->9216]
  441. 2018-12-05 10:22:59 UDP link local (bound): [AF_INET][undef]:1194
  442. 2018-12-05 10:22:59 UDP link remote: [AF_INET]31.182.14.6:1195
  443. 2018-12-05 10:22:59 MANAGEMENT: >STATE:1544001779,WAIT,,,,,,
  444. 2018-12-05 10:22:59 MANAGEMENT: CMD 'hold release'
  445. 2018-12-05 10:22:59 MANAGEMENT: >STATE:1544001779,AUTH,,,,,,
  446. 2018-12-05 10:22:59 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=64b24003 c74aae20
  447. 2018-12-05 10:22:59 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  448. 2018-12-05 10:22:59 VERIFY OK: nsCertType=SERVER
  449. 2018-12-05 10:22:59 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  450. 2018-12-05 10:22:59 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  451. 2018-12-05 10:22:59 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  452. 2018-12-05 10:23:00 MANAGEMENT: >STATE:1544001780,GET_CONFIG,,,,,,
  453. 2018-12-05 10:23:00 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  454. 2018-12-05 10:23:00 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  455. 2018-12-05 10:23:00 OPTIONS IMPORT: timers and/or timeouts modified
  456. 2018-12-05 10:23:00 OPTIONS IMPORT: --ifconfig/up options modified
  457. 2018-12-05 10:23:00 OPTIONS IMPORT: route options modified
  458. 2018-12-05 10:23:00 OPTIONS IMPORT: route-related options modified
  459. 2018-12-05 10:23:00 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  460. 2018-12-05 10:23:00 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  461. 2018-12-05 10:23:00 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  462. 2018-12-05 10:23:00 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  463. 2018-12-05 10:23:00 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  464. 2018-12-05 10:23:00 Preserving previous TUN/TAP instance: utun1
  465. 2018-12-05 10:23:00 Initialization Sequence Completed
  466. 2018-12-05 10:23:00 MANAGEMENT: >STATE:1544001780,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  467. 2018-12-05 10:23:01 *Tunnelblick: No 'connected.sh' script to execute
  468. 2018-12-05 10:23:01 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  469. 2018-12-05 10:24:10 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  470. 2018-12-05 10:24:10 SIGUSR1[soft,ping-restart] received, process restarting
  471. 2018-12-05 10:24:10 MANAGEMENT: >STATE:1544001850,RECONNECTING,ping-restart,,,,,
  472. 2018-12-05 10:24:10 *Tunnelblick: No 'reconnecting.sh' script to execute
  473. 2018-12-05 10:24:10 MANAGEMENT: CMD 'hold release'
  474. 2018-12-05 10:24:10 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  475. 2018-12-05 10:24:10 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  476. 2018-12-05 10:24:10 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  477. 2018-12-05 10:24:10 Socket Buffers: R=[786896->786896] S=[9216->9216]
  478. 2018-12-05 10:24:10 UDP link local (bound): [AF_INET][undef]:1194
  479. 2018-12-05 10:24:10 UDP link remote: [AF_INET]31.182.14.6:1195
  480. 2018-12-05 10:24:10 MANAGEMENT: >STATE:1544001850,WAIT,,,,,,
  481. 2018-12-05 10:24:10 MANAGEMENT: CMD 'hold release'
  482. 2018-12-05 10:24:10 MANAGEMENT: >STATE:1544001850,AUTH,,,,,,
  483. 2018-12-05 10:24:10 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=c91f914d f11024f8
  484. 2018-12-05 10:24:10 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  485. 2018-12-05 10:24:10 VERIFY OK: nsCertType=SERVER
  486. 2018-12-05 10:24:10 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  487. 2018-12-05 10:24:10 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  488. 2018-12-05 10:24:10 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  489. 2018-12-05 10:24:12 MANAGEMENT: >STATE:1544001852,GET_CONFIG,,,,,,
  490. 2018-12-05 10:24:12 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  491. 2018-12-05 10:24:12 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  492. 2018-12-05 10:24:12 OPTIONS IMPORT: timers and/or timeouts modified
  493. 2018-12-05 10:24:12 OPTIONS IMPORT: --ifconfig/up options modified
  494. 2018-12-05 10:24:12 OPTIONS IMPORT: route options modified
  495. 2018-12-05 10:24:12 OPTIONS IMPORT: route-related options modified
  496. 2018-12-05 10:24:12 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  497. 2018-12-05 10:24:12 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  498. 2018-12-05 10:24:12 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  499. 2018-12-05 10:24:12 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  500. 2018-12-05 10:24:12 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  501. 2018-12-05 10:24:12 Preserving previous TUN/TAP instance: utun1
  502. 2018-12-05 10:24:12 Initialization Sequence Completed
  503. 2018-12-05 10:24:12 MANAGEMENT: >STATE:1544001852,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  504. 2018-12-05 10:24:12 *Tunnelblick: No 'connected.sh' script to execute
  505. 2018-12-05 10:24:12 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  506. 2018-12-05 10:26:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  507. 2018-12-05 10:26:14 SIGUSR1[soft,ping-restart] received, process restarting
  508. 2018-12-05 10:26:14 MANAGEMENT: >STATE:1544001974,RECONNECTING,ping-restart,,,,,
  509. 2018-12-05 10:26:14 *Tunnelblick: No 'reconnecting.sh' script to execute
  510. 2018-12-05 10:26:14 MANAGEMENT: CMD 'hold release'
  511. 2018-12-05 10:26:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  512. 2018-12-05 10:26:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  513. 2018-12-05 10:26:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  514. 2018-12-05 10:26:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
  515. 2018-12-05 10:26:14 UDP link local (bound): [AF_INET][undef]:1194
  516. 2018-12-05 10:26:14 UDP link remote: [AF_INET]31.182.14.6:1195
  517. 2018-12-05 10:26:14 MANAGEMENT: >STATE:1544001974,WAIT,,,,,,
  518. 2018-12-05 10:26:14 MANAGEMENT: CMD 'hold release'
  519. 2018-12-05 10:26:14 MANAGEMENT: >STATE:1544001974,AUTH,,,,,,
  520. 2018-12-05 10:26:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=99acf84e 68229a87
  521. 2018-12-05 10:26:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  522. 2018-12-05 10:26:14 VERIFY OK: nsCertType=SERVER
  523. 2018-12-05 10:26:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  524. 2018-12-05 10:26:14 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  525. 2018-12-05 10:26:14 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  526. 2018-12-05 10:26:16 MANAGEMENT: >STATE:1544001976,GET_CONFIG,,,,,,
  527. 2018-12-05 10:26:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  528. 2018-12-05 10:26:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  529. 2018-12-05 10:26:16 OPTIONS IMPORT: timers and/or timeouts modified
  530. 2018-12-05 10:26:16 OPTIONS IMPORT: --ifconfig/up options modified
  531. 2018-12-05 10:26:16 OPTIONS IMPORT: route options modified
  532. 2018-12-05 10:26:16 OPTIONS IMPORT: route-related options modified
  533. 2018-12-05 10:26:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  534. 2018-12-05 10:26:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  535. 2018-12-05 10:26:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  536. 2018-12-05 10:26:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  537. 2018-12-05 10:26:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  538. 2018-12-05 10:26:16 Preserving previous TUN/TAP instance: utun1
  539. 2018-12-05 10:26:16 Initialization Sequence Completed
  540. 2018-12-05 10:26:16 MANAGEMENT: >STATE:1544001976,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  541. 2018-12-05 10:26:16 *Tunnelblick: No 'connected.sh' script to execute
  542. 2018-12-05 10:26:16 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  543. 2018-12-05 10:28:19 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  544. 2018-12-05 10:28:19 SIGUSR1[soft,ping-restart] received, process restarting
  545. 2018-12-05 10:28:19 MANAGEMENT: >STATE:1544002099,RECONNECTING,ping-restart,,,,,
  546. 2018-12-05 10:28:19 *Tunnelblick: No 'reconnecting.sh' script to execute
  547. 2018-12-05 10:28:19 MANAGEMENT: CMD 'hold release'
  548. 2018-12-05 10:28:19 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  549. 2018-12-05 10:28:19 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  550. 2018-12-05 10:28:19 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  551. 2018-12-05 10:28:19 Socket Buffers: R=[786896->786896] S=[9216->9216]
  552. 2018-12-05 10:28:19 UDP link local (bound): [AF_INET][undef]:1194
  553. 2018-12-05 10:28:19 UDP link remote: [AF_INET]31.182.14.6:1195
  554. 2018-12-05 10:28:19 MANAGEMENT: >STATE:1544002099,WAIT,,,,,,
  555. 2018-12-05 10:28:19 MANAGEMENT: CMD 'hold release'
  556. 2018-12-05 10:28:19 MANAGEMENT: >STATE:1544002099,AUTH,,,,,,
  557. 2018-12-05 10:28:19 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=18a6db85 26e9a8be
  558. 2018-12-05 10:28:19 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  559. 2018-12-05 10:28:19 VERIFY OK: nsCertType=SERVER
  560. 2018-12-05 10:28:19 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  561. 2018-12-05 10:28:20 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  562. 2018-12-05 10:28:20 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  563. 2018-12-05 10:28:21 MANAGEMENT: >STATE:1544002101,GET_CONFIG,,,,,,
  564. 2018-12-05 10:28:21 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  565. 2018-12-05 10:28:21 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  566. 2018-12-05 10:28:21 OPTIONS IMPORT: timers and/or timeouts modified
  567. 2018-12-05 10:28:21 OPTIONS IMPORT: --ifconfig/up options modified
  568. 2018-12-05 10:28:21 OPTIONS IMPORT: route options modified
  569. 2018-12-05 10:28:21 OPTIONS IMPORT: route-related options modified
  570. 2018-12-05 10:28:21 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  571. 2018-12-05 10:28:21 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  572. 2018-12-05 10:28:21 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  573. 2018-12-05 10:28:21 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  574. 2018-12-05 10:28:21 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  575. 2018-12-05 10:28:21 Preserving previous TUN/TAP instance: utun1
  576. 2018-12-05 10:28:21 Initialization Sequence Completed
  577. 2018-12-05 10:28:21 MANAGEMENT: >STATE:1544002101,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  578. 2018-12-05 10:28:21 *Tunnelblick: No 'connected.sh' script to execute
  579. 2018-12-05 10:28:21 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  580. 2018-12-05 10:30:15 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  581. 2018-12-05 10:30:15 SIGUSR1[soft,ping-restart] received, process restarting
  582. 2018-12-05 10:30:15 MANAGEMENT: >STATE:1544002215,RECONNECTING,ping-restart,,,,,
  583. 2018-12-05 10:30:15 *Tunnelblick: No 'reconnecting.sh' script to execute
  584. 2018-12-05 10:30:15 MANAGEMENT: CMD 'hold release'
  585. 2018-12-05 10:30:15 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  586. 2018-12-05 10:30:15 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  587. 2018-12-05 10:30:15 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  588. 2018-12-05 10:30:15 Socket Buffers: R=[786896->786896] S=[9216->9216]
  589. 2018-12-05 10:30:15 UDP link local (bound): [AF_INET][undef]:1194
  590. 2018-12-05 10:30:15 UDP link remote: [AF_INET]31.182.14.6:1195
  591. 2018-12-05 10:30:15 MANAGEMENT: >STATE:1544002215,WAIT,,,,,,
  592. 2018-12-05 10:30:15 MANAGEMENT: CMD 'hold release'
  593. 2018-12-05 10:30:15 MANAGEMENT: >STATE:1544002215,AUTH,,,,,,
  594. 2018-12-05 10:30:15 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=c8895579 937d3e81
  595. 2018-12-05 10:30:15 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  596. 2018-12-05 10:30:15 VERIFY OK: nsCertType=SERVER
  597. 2018-12-05 10:30:15 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  598. 2018-12-05 10:30:15 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  599. 2018-12-05 10:30:15 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  600. 2018-12-05 10:30:16 MANAGEMENT: >STATE:1544002216,GET_CONFIG,,,,,,
  601. 2018-12-05 10:30:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  602. 2018-12-05 10:30:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  603. 2018-12-05 10:30:16 OPTIONS IMPORT: timers and/or timeouts modified
  604. 2018-12-05 10:30:16 OPTIONS IMPORT: --ifconfig/up options modified
  605. 2018-12-05 10:30:16 OPTIONS IMPORT: route options modified
  606. 2018-12-05 10:30:16 OPTIONS IMPORT: route-related options modified
  607. 2018-12-05 10:30:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  608. 2018-12-05 10:30:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  609. 2018-12-05 10:30:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  610. 2018-12-05 10:30:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  611. 2018-12-05 10:30:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  612. 2018-12-05 10:30:16 Preserving previous TUN/TAP instance: utun1
  613. 2018-12-05 10:30:16 Initialization Sequence Completed
  614. 2018-12-05 10:30:16 MANAGEMENT: >STATE:1544002216,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  615. 2018-12-05 10:30:16 *Tunnelblick: No 'connected.sh' script to execute
  616. 2018-12-05 10:30:17 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  617. 2018-12-05 10:32:16 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  618. 2018-12-05 10:32:16 SIGUSR1[soft,ping-restart] received, process restarting
  619. 2018-12-05 10:32:16 MANAGEMENT: >STATE:1544002336,RECONNECTING,ping-restart,,,,,
  620. 2018-12-05 10:32:17 *Tunnelblick: No 'reconnecting.sh' script to execute
  621. 2018-12-05 10:32:17 MANAGEMENT: CMD 'hold release'
  622. 2018-12-05 10:32:17 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  623. 2018-12-05 10:32:17 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  624. 2018-12-05 10:32:17 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  625. 2018-12-05 10:32:17 Socket Buffers: R=[786896->786896] S=[9216->9216]
  626. 2018-12-05 10:32:17 UDP link local (bound): [AF_INET][undef]:1194
  627. 2018-12-05 10:32:17 UDP link remote: [AF_INET]31.182.14.6:1195
  628. 2018-12-05 10:32:17 MANAGEMENT: >STATE:1544002337,WAIT,,,,,,
  629. 2018-12-05 10:32:17 MANAGEMENT: CMD 'hold release'
  630. 2018-12-05 10:32:17 MANAGEMENT: >STATE:1544002337,AUTH,,,,,,
  631. 2018-12-05 10:32:17 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=d70786ff 0dbc0774
  632. 2018-12-05 10:32:17 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  633. 2018-12-05 10:32:17 VERIFY OK: nsCertType=SERVER
  634. 2018-12-05 10:32:17 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  635. 2018-12-05 10:32:18 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  636. 2018-12-05 10:32:18 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  637. 2018-12-05 10:32:19 MANAGEMENT: >STATE:1544002339,GET_CONFIG,,,,,,
  638. 2018-12-05 10:32:19 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  639. 2018-12-05 10:32:19 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  640. 2018-12-05 10:32:19 OPTIONS IMPORT: timers and/or timeouts modified
  641. 2018-12-05 10:32:19 OPTIONS IMPORT: --ifconfig/up options modified
  642. 2018-12-05 10:32:19 OPTIONS IMPORT: route options modified
  643. 2018-12-05 10:32:19 OPTIONS IMPORT: route-related options modified
  644. 2018-12-05 10:32:19 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  645. 2018-12-05 10:32:19 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  646. 2018-12-05 10:32:19 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  647. 2018-12-05 10:32:19 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  648. 2018-12-05 10:32:19 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  649. 2018-12-05 10:32:19 Preserving previous TUN/TAP instance: utun1
  650. 2018-12-05 10:32:19 Initialization Sequence Completed
  651. 2018-12-05 10:32:19 MANAGEMENT: >STATE:1544002339,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  652. 2018-12-05 10:32:19 *Tunnelblick: No 'connected.sh' script to execute
  653. 2018-12-05 10:32:19 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  654. 2018-12-05 10:34:20 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  655. 2018-12-05 10:34:20 SIGUSR1[soft,ping-restart] received, process restarting
  656. 2018-12-05 10:34:20 MANAGEMENT: >STATE:1544002460,RECONNECTING,ping-restart,,,,,
  657. 2018-12-05 10:34:20 *Tunnelblick: No 'reconnecting.sh' script to execute
  658. 2018-12-05 10:34:20 MANAGEMENT: CMD 'hold release'
  659. 2018-12-05 10:34:20 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  660. 2018-12-05 10:34:20 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  661. 2018-12-05 10:34:20 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  662. 2018-12-05 10:34:20 Socket Buffers: R=[786896->786896] S=[9216->9216]
  663. 2018-12-05 10:34:20 UDP link local (bound): [AF_INET][undef]:1194
  664. 2018-12-05 10:34:20 UDP link remote: [AF_INET]31.182.14.6:1195
  665. 2018-12-05 10:34:20 MANAGEMENT: >STATE:1544002460,WAIT,,,,,,
  666. 2018-12-05 10:34:20 MANAGEMENT: CMD 'hold release'
  667. 2018-12-05 10:34:20 MANAGEMENT: >STATE:1544002460,AUTH,,,,,,
  668. 2018-12-05 10:34:20 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=61b421c5 bc5320c8
  669. 2018-12-05 10:34:20 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  670. 2018-12-05 10:34:20 VERIFY OK: nsCertType=SERVER
  671. 2018-12-05 10:34:20 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  672. 2018-12-05 10:34:21 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  673. 2018-12-05 10:34:21 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  674. 2018-12-05 10:34:22 MANAGEMENT: >STATE:1544002462,GET_CONFIG,,,,,,
  675. 2018-12-05 10:34:22 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  676. 2018-12-05 10:34:22 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  677. 2018-12-05 10:34:22 OPTIONS IMPORT: timers and/or timeouts modified
  678. 2018-12-05 10:34:22 OPTIONS IMPORT: --ifconfig/up options modified
  679. 2018-12-05 10:34:22 OPTIONS IMPORT: route options modified
  680. 2018-12-05 10:34:22 OPTIONS IMPORT: route-related options modified
  681. 2018-12-05 10:34:22 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  682. 2018-12-05 10:34:22 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  683. 2018-12-05 10:34:22 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  684. 2018-12-05 10:34:22 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  685. 2018-12-05 10:34:22 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  686. 2018-12-05 10:34:22 Preserving previous TUN/TAP instance: utun1
  687. 2018-12-05 10:34:22 Initialization Sequence Completed
  688. 2018-12-05 10:34:22 MANAGEMENT: >STATE:1544002462,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  689. 2018-12-05 10:34:22 *Tunnelblick: No 'connected.sh' script to execute
  690. 2018-12-05 10:34:22 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  691. 2018-12-05 10:36:23 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  692. 2018-12-05 10:36:23 SIGUSR1[soft,ping-restart] received, process restarting
  693. 2018-12-05 10:36:23 MANAGEMENT: >STATE:1544002583,RECONNECTING,ping-restart,,,,,
  694. 2018-12-05 10:36:23 *Tunnelblick: No 'reconnecting.sh' script to execute
  695. 2018-12-05 10:36:23 MANAGEMENT: CMD 'hold release'
  696. 2018-12-05 10:36:23 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  697. 2018-12-05 10:36:23 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  698. 2018-12-05 10:36:23 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  699. 2018-12-05 10:36:23 Socket Buffers: R=[786896->786896] S=[9216->9216]
  700. 2018-12-05 10:36:23 UDP link local (bound): [AF_INET][undef]:1194
  701. 2018-12-05 10:36:23 UDP link remote: [AF_INET]31.182.14.6:1195
  702. 2018-12-05 10:36:23 MANAGEMENT: >STATE:1544002583,WAIT,,,,,,
  703. 2018-12-05 10:36:23 MANAGEMENT: CMD 'hold release'
  704. 2018-12-05 10:36:23 MANAGEMENT: >STATE:1544002583,AUTH,,,,,,
  705. 2018-12-05 10:36:23 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=90272475 bb7684b1
  706. 2018-12-05 10:36:23 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  707. 2018-12-05 10:36:23 VERIFY OK: nsCertType=SERVER
  708. 2018-12-05 10:36:23 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  709. 2018-12-05 10:36:23 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  710. 2018-12-05 10:36:23 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  711. 2018-12-05 10:36:25 MANAGEMENT: >STATE:1544002585,GET_CONFIG,,,,,,
  712. 2018-12-05 10:36:25 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  713. 2018-12-05 10:36:25 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  714. 2018-12-05 10:36:25 OPTIONS IMPORT: timers and/or timeouts modified
  715. 2018-12-05 10:36:25 OPTIONS IMPORT: --ifconfig/up options modified
  716. 2018-12-05 10:36:25 OPTIONS IMPORT: route options modified
  717. 2018-12-05 10:36:25 OPTIONS IMPORT: route-related options modified
  718. 2018-12-05 10:36:25 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  719. 2018-12-05 10:36:25 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  720. 2018-12-05 10:36:25 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  721. 2018-12-05 10:36:25 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  722. 2018-12-05 10:36:25 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  723. 2018-12-05 10:36:25 Preserving previous TUN/TAP instance: utun1
  724. 2018-12-05 10:36:25 Initialization Sequence Completed
  725. 2018-12-05 10:36:25 MANAGEMENT: >STATE:1544002585,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  726. 2018-12-05 10:36:25 *Tunnelblick: No 'connected.sh' script to execute
  727. 2018-12-05 10:36:25 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  728. 2018-12-05 10:38:15 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  729. 2018-12-05 10:38:15 SIGUSR1[soft,ping-restart] received, process restarting
  730. 2018-12-05 10:38:15 MANAGEMENT: >STATE:1544002695,RECONNECTING,ping-restart,,,,,
  731. 2018-12-05 10:38:15 *Tunnelblick: No 'reconnecting.sh' script to execute
  732. 2018-12-05 10:38:15 MANAGEMENT: CMD 'hold release'
  733. 2018-12-05 10:38:15 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  734. 2018-12-05 10:38:15 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  735. 2018-12-05 10:38:15 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  736. 2018-12-05 10:38:15 Socket Buffers: R=[786896->786896] S=[9216->9216]
  737. 2018-12-05 10:38:15 UDP link local (bound): [AF_INET][undef]:1194
  738. 2018-12-05 10:38:15 UDP link remote: [AF_INET]31.182.14.6:1195
  739. 2018-12-05 10:38:15 MANAGEMENT: >STATE:1544002695,WAIT,,,,,,
  740. 2018-12-05 10:38:15 MANAGEMENT: CMD 'hold release'
  741. 2018-12-05 10:38:15 MANAGEMENT: >STATE:1544002695,AUTH,,,,,,
  742. 2018-12-05 10:38:15 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=696d90a7 a9a80990
  743. 2018-12-05 10:38:15 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  744. 2018-12-05 10:38:15 VERIFY OK: nsCertType=SERVER
  745. 2018-12-05 10:38:15 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  746. 2018-12-05 10:38:16 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  747. 2018-12-05 10:38:16 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  748. 2018-12-05 10:38:17 MANAGEMENT: >STATE:1544002697,GET_CONFIG,,,,,,
  749. 2018-12-05 10:38:17 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  750. 2018-12-05 10:38:17 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  751. 2018-12-05 10:38:17 OPTIONS IMPORT: timers and/or timeouts modified
  752. 2018-12-05 10:38:17 OPTIONS IMPORT: --ifconfig/up options modified
  753. 2018-12-05 10:38:17 OPTIONS IMPORT: route options modified
  754. 2018-12-05 10:38:17 OPTIONS IMPORT: route-related options modified
  755. 2018-12-05 10:38:17 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  756. 2018-12-05 10:38:17 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  757. 2018-12-05 10:38:17 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  758. 2018-12-05 10:38:17 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  759. 2018-12-05 10:38:17 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  760. 2018-12-05 10:38:17 Preserving previous TUN/TAP instance: utun1
  761. 2018-12-05 10:38:17 Initialization Sequence Completed
  762. 2018-12-05 10:38:17 MANAGEMENT: >STATE:1544002697,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  763. 2018-12-05 10:38:17 *Tunnelblick: No 'connected.sh' script to execute
  764. 2018-12-05 10:38:17 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  765. 2018-12-05 10:40:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  766. 2018-12-05 10:40:14 SIGUSR1[soft,ping-restart] received, process restarting
  767. 2018-12-05 10:40:14 MANAGEMENT: >STATE:1544002814,RECONNECTING,ping-restart,,,,,
  768. 2018-12-05 10:40:14 *Tunnelblick: No 'reconnecting.sh' script to execute
  769. 2018-12-05 10:40:14 MANAGEMENT: CMD 'hold release'
  770. 2018-12-05 10:40:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  771. 2018-12-05 10:40:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  772. 2018-12-05 10:40:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  773. 2018-12-05 10:40:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
  774. 2018-12-05 10:40:14 UDP link local (bound): [AF_INET][undef]:1194
  775. 2018-12-05 10:40:14 UDP link remote: [AF_INET]31.182.14.6:1195
  776. 2018-12-05 10:40:14 MANAGEMENT: >STATE:1544002814,WAIT,,,,,,
  777. 2018-12-05 10:40:14 MANAGEMENT: CMD 'hold release'
  778. 2018-12-05 10:40:14 MANAGEMENT: >STATE:1544002814,AUTH,,,,,,
  779. 2018-12-05 10:40:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=2825b4d5 812f2e4c
  780. 2018-12-05 10:40:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  781. 2018-12-05 10:40:14 VERIFY OK: nsCertType=SERVER
  782. 2018-12-05 10:40:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  783. 2018-12-05 10:40:15 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  784. 2018-12-05 10:40:15 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  785. 2018-12-05 10:40:16 MANAGEMENT: >STATE:1544002816,GET_CONFIG,,,,,,
  786. 2018-12-05 10:40:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  787. 2018-12-05 10:40:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  788. 2018-12-05 10:40:16 OPTIONS IMPORT: timers and/or timeouts modified
  789. 2018-12-05 10:40:16 OPTIONS IMPORT: --ifconfig/up options modified
  790. 2018-12-05 10:40:16 OPTIONS IMPORT: route options modified
  791. 2018-12-05 10:40:16 OPTIONS IMPORT: route-related options modified
  792. 2018-12-05 10:40:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  793. 2018-12-05 10:40:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  794. 2018-12-05 10:40:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  795. 2018-12-05 10:40:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  796. 2018-12-05 10:40:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  797. 2018-12-05 10:40:16 *Tunnelblick: No 'connected.sh' script to execute
  798. 2018-12-05 10:40:16 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  799. 2018-12-05 10:40:16 Preserving previous TUN/TAP instance: utun1
  800. 2018-12-05 10:40:16 Initialization Sequence Completed
  801. 2018-12-05 10:40:16 MANAGEMENT: >STATE:1544002816,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  802. 2018-12-05 10:42:16 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  803. 2018-12-05 10:42:16 SIGUSR1[soft,ping-restart] received, process restarting
  804. 2018-12-05 10:42:16 MANAGEMENT: >STATE:1544002936,RECONNECTING,ping-restart,,,,,
  805. 2018-12-05 10:42:17 *Tunnelblick: No 'reconnecting.sh' script to execute
  806. 2018-12-05 10:42:17 MANAGEMENT: CMD 'hold release'
  807. 2018-12-05 10:42:17 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  808. 2018-12-05 10:42:17 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  809. 2018-12-05 10:42:17 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  810. 2018-12-05 10:42:17 Socket Buffers: R=[786896->786896] S=[9216->9216]
  811. 2018-12-05 10:42:17 UDP link local (bound): [AF_INET][undef]:1194
  812. 2018-12-05 10:42:17 UDP link remote: [AF_INET]31.182.14.6:1195
  813. 2018-12-05 10:42:17 MANAGEMENT: >STATE:1544002937,WAIT,,,,,,
  814. 2018-12-05 10:42:17 MANAGEMENT: CMD 'hold release'
  815. 2018-12-05 10:42:17 MANAGEMENT: >STATE:1544002937,AUTH,,,,,,
  816. 2018-12-05 10:42:17 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=9d16f526 cdb5faae
  817. 2018-12-05 10:42:17 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  818. 2018-12-05 10:42:17 VERIFY OK: nsCertType=SERVER
  819. 2018-12-05 10:42:17 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  820. 2018-12-05 10:42:17 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  821. 2018-12-05 10:42:17 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  822. 2018-12-05 10:42:18 MANAGEMENT: >STATE:1544002938,GET_CONFIG,,,,,,
  823. 2018-12-05 10:42:18 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  824. 2018-12-05 10:42:18 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  825. 2018-12-05 10:42:18 OPTIONS IMPORT: timers and/or timeouts modified
  826. 2018-12-05 10:42:18 OPTIONS IMPORT: --ifconfig/up options modified
  827. 2018-12-05 10:42:18 OPTIONS IMPORT: route options modified
  828. 2018-12-05 10:42:18 OPTIONS IMPORT: route-related options modified
  829. 2018-12-05 10:42:18 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  830. 2018-12-05 10:42:18 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  831. 2018-12-05 10:42:18 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  832. 2018-12-05 10:42:18 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  833. 2018-12-05 10:42:18 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  834. 2018-12-05 10:42:18 Preserving previous TUN/TAP instance: utun1
  835. 2018-12-05 10:42:18 Initialization Sequence Completed
  836. 2018-12-05 10:42:18 MANAGEMENT: >STATE:1544002938,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  837. 2018-12-05 10:42:19 *Tunnelblick: No 'connected.sh' script to execute
  838. 2018-12-05 10:42:19 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  839. 2018-12-05 10:44:18 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  840. 2018-12-05 10:44:18 SIGUSR1[soft,ping-restart] received, process restarting
  841. 2018-12-05 10:44:18 MANAGEMENT: >STATE:1544003058,RECONNECTING,ping-restart,,,,,
  842. 2018-12-05 10:44:18 *Tunnelblick: No 'reconnecting.sh' script to execute
  843. 2018-12-05 10:44:18 MANAGEMENT: CMD 'hold release'
  844. 2018-12-05 10:44:18 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  845. 2018-12-05 10:44:18 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  846. 2018-12-05 10:44:18 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  847. 2018-12-05 10:44:18 Socket Buffers: R=[786896->786896] S=[9216->9216]
  848. 2018-12-05 10:44:18 UDP link local (bound): [AF_INET][undef]:1194
  849. 2018-12-05 10:44:18 UDP link remote: [AF_INET]31.182.14.6:1195
  850. 2018-12-05 10:44:18 MANAGEMENT: >STATE:1544003058,WAIT,,,,,,
  851. 2018-12-05 10:44:18 MANAGEMENT: CMD 'hold release'
  852. 2018-12-05 10:44:18 MANAGEMENT: >STATE:1544003058,AUTH,,,,,,
  853. 2018-12-05 10:44:18 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=52a6abc6 3fc07c8e
  854. 2018-12-05 10:44:18 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  855. 2018-12-05 10:44:18 VERIFY OK: nsCertType=SERVER
  856. 2018-12-05 10:44:18 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  857. 2018-12-05 10:44:18 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  858. 2018-12-05 10:44:18 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  859. 2018-12-05 10:44:19 MANAGEMENT: >STATE:1544003059,GET_CONFIG,,,,,,
  860. 2018-12-05 10:44:19 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  861. 2018-12-05 10:44:19 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  862. 2018-12-05 10:44:19 OPTIONS IMPORT: timers and/or timeouts modified
  863. 2018-12-05 10:44:19 OPTIONS IMPORT: --ifconfig/up options modified
  864. 2018-12-05 10:44:19 OPTIONS IMPORT: route options modified
  865. 2018-12-05 10:44:19 OPTIONS IMPORT: route-related options modified
  866. 2018-12-05 10:44:19 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  867. 2018-12-05 10:44:19 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  868. 2018-12-05 10:44:19 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  869. 2018-12-05 10:44:19 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  870. 2018-12-05 10:44:19 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  871. 2018-12-05 10:44:19 Preserving previous TUN/TAP instance: utun1
  872. 2018-12-05 10:44:19 Initialization Sequence Completed
  873. 2018-12-05 10:44:19 MANAGEMENT: >STATE:1544003059,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  874. 2018-12-05 10:44:20 *Tunnelblick: No 'connected.sh' script to execute
  875. 2018-12-05 10:44:20 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  876. 2018-12-05 10:46:21 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  877. 2018-12-05 10:46:21 SIGUSR1[soft,ping-restart] received, process restarting
  878. 2018-12-05 10:46:21 MANAGEMENT: >STATE:1544003181,RECONNECTING,ping-restart,,,,,
  879. 2018-12-05 10:46:21 *Tunnelblick: No 'reconnecting.sh' script to execute
  880. 2018-12-05 10:46:21 MANAGEMENT: CMD 'hold release'
  881. 2018-12-05 10:46:21 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  882. 2018-12-05 10:46:21 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  883. 2018-12-05 10:46:21 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  884. 2018-12-05 10:46:21 Socket Buffers: R=[786896->786896] S=[9216->9216]
  885. 2018-12-05 10:46:21 UDP link local (bound): [AF_INET][undef]:1194
  886. 2018-12-05 10:46:21 UDP link remote: [AF_INET]31.182.14.6:1195
  887. 2018-12-05 10:46:21 MANAGEMENT: >STATE:1544003181,WAIT,,,,,,
  888. 2018-12-05 10:46:21 MANAGEMENT: CMD 'hold release'
  889. 2018-12-05 10:46:21 MANAGEMENT: >STATE:1544003181,AUTH,,,,,,
  890. 2018-12-05 10:46:21 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=d1919e14 36fbcfdb
  891. 2018-12-05 10:46:21 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  892. 2018-12-05 10:46:21 VERIFY OK: nsCertType=SERVER
  893. 2018-12-05 10:46:21 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  894. 2018-12-05 10:46:21 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  895. 2018-12-05 10:46:21 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  896. 2018-12-05 10:46:22 MANAGEMENT: >STATE:1544003182,GET_CONFIG,,,,,,
  897. 2018-12-05 10:46:22 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  898. 2018-12-05 10:46:22 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  899. 2018-12-05 10:46:22 OPTIONS IMPORT: timers and/or timeouts modified
  900. 2018-12-05 10:46:22 OPTIONS IMPORT: --ifconfig/up options modified
  901. 2018-12-05 10:46:22 OPTIONS IMPORT: route options modified
  902. 2018-12-05 10:46:22 OPTIONS IMPORT: route-related options modified
  903. 2018-12-05 10:46:22 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  904. 2018-12-05 10:46:22 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  905. 2018-12-05 10:46:22 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  906. 2018-12-05 10:46:22 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  907. 2018-12-05 10:46:22 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  908. 2018-12-05 10:46:22 Preserving previous TUN/TAP instance: utun1
  909. 2018-12-05 10:46:22 Initialization Sequence Completed
  910. 2018-12-05 10:46:22 MANAGEMENT: >STATE:1544003182,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  911. 2018-12-05 10:46:23 *Tunnelblick: No 'connected.sh' script to execute
  912. 2018-12-05 10:46:23 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  913. 2018-12-05 10:48:19 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  914. 2018-12-05 10:48:19 SIGUSR1[soft,ping-restart] received, process restarting
  915. 2018-12-05 10:48:19 MANAGEMENT: >STATE:1544003299,RECONNECTING,ping-restart,,,,,
  916. 2018-12-05 10:48:19 *Tunnelblick: No 'reconnecting.sh' script to execute
  917. 2018-12-05 10:48:19 MANAGEMENT: CMD 'hold release'
  918. 2018-12-05 10:48:19 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  919. 2018-12-05 10:48:19 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  920. 2018-12-05 10:48:19 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  921. 2018-12-05 10:48:19 Socket Buffers: R=[786896->786896] S=[9216->9216]
  922. 2018-12-05 10:48:19 UDP link local (bound): [AF_INET][undef]:1194
  923. 2018-12-05 10:48:19 UDP link remote: [AF_INET]31.182.14.6:1195
  924. 2018-12-05 10:48:19 MANAGEMENT: >STATE:1544003299,WAIT,,,,,,
  925. 2018-12-05 10:48:19 MANAGEMENT: CMD 'hold release'
  926. 2018-12-05 10:48:19 MANAGEMENT: >STATE:1544003299,AUTH,,,,,,
  927. 2018-12-05 10:48:19 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=52be4bd0 3d3dfffa
  928. 2018-12-05 10:48:19 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  929. 2018-12-05 10:48:19 VERIFY OK: nsCertType=SERVER
  930. 2018-12-05 10:48:19 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  931. 2018-12-05 10:48:19 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  932. 2018-12-05 10:48:19 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  933. 2018-12-05 10:48:20 MANAGEMENT: >STATE:1544003300,GET_CONFIG,,,,,,
  934. 2018-12-05 10:48:20 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  935. 2018-12-05 10:48:20 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  936. 2018-12-05 10:48:20 OPTIONS IMPORT: timers and/or timeouts modified
  937. 2018-12-05 10:48:20 OPTIONS IMPORT: --ifconfig/up options modified
  938. 2018-12-05 10:48:20 OPTIONS IMPORT: route options modified
  939. 2018-12-05 10:48:20 OPTIONS IMPORT: route-related options modified
  940. 2018-12-05 10:48:20 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  941. 2018-12-05 10:48:20 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  942. 2018-12-05 10:48:20 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  943. 2018-12-05 10:48:20 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  944. 2018-12-05 10:48:20 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  945. 2018-12-05 10:48:20 Preserving previous TUN/TAP instance: utun1
  946. 2018-12-05 10:48:20 Initialization Sequence Completed
  947. 2018-12-05 10:48:20 MANAGEMENT: >STATE:1544003300,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  948. 2018-12-05 10:48:20 *Tunnelblick: No 'connected.sh' script to execute
  949. 2018-12-05 10:48:20 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
  950. 2018-12-05 11:48:19 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  951. 2018-12-05 11:48:19 VERIFY OK: nsCertType=SERVER
  952. 2018-12-05 11:48:19 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  953. 2018-12-05 11:48:19 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  954. 2018-12-05 11:48:19 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  955. 2018-12-05 11:48:19 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  956. 2018-12-05 11:48:19 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  957. 2018-12-05 11:48:19 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  958. 2018-12-05 12:45:07 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
  959. 2018-12-05 12:45:07 SIGUSR1[soft,ping-restart] received, process restarting
  960. 2018-12-05 12:45:07 MANAGEMENT: >STATE:1544010307,RECONNECTING,ping-restart,,,,,
  961. 2018-12-05 12:45:07 *Tunnelblick: No 'reconnecting.sh' script to execute
  962. 2018-12-05 12:45:07 MANAGEMENT: CMD 'hold release'
  963. 2018-12-05 12:45:07 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  964. 2018-12-05 12:45:07 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  965. 2018-12-05 12:45:07 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
  966. 2018-12-05 12:45:07 Socket Buffers: R=[786896->786896] S=[9216->9216]
  967. 2018-12-05 12:45:07 UDP link local (bound): [AF_INET][undef]:1194
  968. 2018-12-05 12:45:07 UDP link remote: [AF_INET]31.182.14.6:1195
  969. 2018-12-05 12:45:07 MANAGEMENT: >STATE:1544010307,WAIT,,,,,,
  970. 2018-12-05 12:45:07 MANAGEMENT: CMD 'hold release'
  971. 2018-12-05 12:45:07 MANAGEMENT: >STATE:1544010307,AUTH,,,,,,
  972. 2018-12-05 12:45:07 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=59537a31 8e71350d
  973. 2018-12-05 12:45:07 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
  974. 2018-12-05 12:45:07 VERIFY OK: nsCertType=SERVER
  975. 2018-12-05 12:45:07 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
  976. 2018-12-05 12:45:08 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  977. 2018-12-05 12:45:08 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
  978. 2018-12-05 12:45:09 MANAGEMENT: >STATE:1544010309,GET_CONFIG,,,,,,
  979. 2018-12-05 12:45:09 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
  980. 2018-12-05 12:45:09 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
  981. 2018-12-05 12:45:09 OPTIONS IMPORT: timers and/or timeouts modified
  982. 2018-12-05 12:45:09 OPTIONS IMPORT: --ifconfig/up options modified
  983. 2018-12-05 12:45:09 OPTIONS IMPORT: route options modified
  984. 2018-12-05 12:45:09 OPTIONS IMPORT: route-related options modified
  985. 2018-12-05 12:45:09 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  986. 2018-12-05 12:45:09 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  987. 2018-12-05 12:45:09 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  988. 2018-12-05 12:45:09 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  989. 2018-12-05 12:45:09 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  990. 2018-12-05 12:45:09 Preserving previous TUN/TAP instance: utun1
  991. 2018-12-05 12:45:09 Initialization Sequence Completed
  992. 2018-12-05 12:45:09 MANAGEMENT: >STATE:1544010309,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
  993. 2018-12-05 12:45:09 *Tunnelblick: No 'connected.sh' script to execute
  994. 2018-12-05 12:45:09 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement