Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *Tunnelblick: macOS 10.14.1; Tunnelblick 3.7.8 (build 5180)
- 2018-12-05 10:05:24 *Tunnelblick: Attempting connection with ldzrouter01-udp-1195-ldap using shadow copy; Set nameserver = 769; monitoring connection
- 2018-12-05 10:05:24 *Tunnelblick: openvpnstart start ldzrouter01-udp-1195-ldap.tblk 50668 769 0 1 0 1065264 -ptADGNWradsgnw 2.4.6-openssl-1.0.2q
- 2018-12-05 10:05:24 *Tunnelblick: openvpnstart log:
- OpenVPN started successfully. Command used to start OpenVPN (one argument per displayed line):
- /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.4.6-openssl-1.0.2q/openvpn
- --daemon
- --log /Library/Application Support/Tunnelblick/Logs/-SUsers-Spiotrryczek-SLibrary-SApplication Support-STunnelblick-SConfigurations-Sldzrouter01--udp--1195--ldap.tblk-SContents-SResources-Sconfig.ovpn.769_0_1_0_1065264.50668.openvpn.log
- --cd /Library/Application Support/Tunnelblick/Users/piotrryczek/ldzrouter01-udp-1195-ldap.tblk/Contents/Resources
- --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5180 3.7.8 (build 5180)"
- --verb 3
- --config /Library/Application Support/Tunnelblick/Users/piotrryczek/ldzrouter01-udp-1195-ldap.tblk/Contents/Resources/config.ovpn
- --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Users/piotrryczek/ldzrouter01-udp-1195-ldap.tblk/Contents/Resources
- --verb 3
- --cd /Library/Application Support/Tunnelblick/Users/piotrryczek/ldzrouter01-udp-1195-ldap.tblk/Contents/Resources
- --management 127.0.0.1 50668 /Library/Application Support/Tunnelblick/nmaggfcmflpeffkcfhipanekgdheofbbmehelgjo.mip
- --management-query-passwords
- --management-hold
- --script-security 2
- --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
- --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
- 2018-12-05 10:05:24 *Tunnelblick: Established communication with OpenVPN
- 2018-12-05 10:05:24 *Tunnelblick: Obtained VPN username and password from the Keychain
- 2018-12-05 10:05:24 OpenVPN 2.4.6 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 29 2018
- 2018-12-05 10:05:24 library versions: OpenSSL 1.0.2q 20 Nov 2018, LZO 2.10
- 2018-12-05 10:05:24 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:50668
- 2018-12-05 10:05:24 Need hold release from management interface, waiting...
- 2018-12-05 10:05:24 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:50668
- 2018-12-05 10:05:24 MANAGEMENT: CMD 'pid'
- 2018-12-05 10:05:24 MANAGEMENT: CMD 'auth-retry interact'
- 2018-12-05 10:05:24 MANAGEMENT: CMD 'state on'
- 2018-12-05 10:05:24 MANAGEMENT: CMD 'state'
- 2018-12-05 10:05:24 MANAGEMENT: CMD 'bytecount 1'
- 2018-12-05 10:05:24 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:05:24 MANAGEMENT: CMD 'username "Auth" "piotrek.appstract"'
- 2018-12-05 10:05:24 MANAGEMENT: CMD 'password [...]'
- 2018-12-05 10:05:24 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:05:24 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:05:24 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:05:24 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:05:24 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:05:24 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:05:24 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:05:24 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:05:24 MANAGEMENT: >STATE:1544000724,WAIT,,,,,,
- 2018-12-05 10:05:24 MANAGEMENT: >STATE:1544000724,AUTH,,,,,,
- 2018-12-05 10:05:24 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=7d3ba0df f2e2a3d8
- 2018-12-05 10:05:24 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 2018-12-05 10:05:24 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:05:24 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:05:24 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:05:24 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:05:24 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:05:24 *Tunnelblick: openvpnstart starting OpenVPN
- 2018-12-05 10:05:25 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:05:25 MANAGEMENT: >STATE:1544000725,GET_CONFIG,,,,,,
- 2018-12-05 10:05:25 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:05:25 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:05:25 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:05:25 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:05:25 OPTIONS IMPORT: route options modified
- 2018-12-05 10:05:25 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:05:25 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:05:25 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:05:25 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:05:25 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:05:25 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:05:25 Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
- 2018-12-05 10:05:25 Opened utun device utun1
- 2018-12-05 10:05:25 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2018-12-05 10:05:25 MANAGEMENT: >STATE:1544000725,ASSIGN_IP,,192.168.16.2,,,,
- 2018-12-05 10:05:25 /sbin/ifconfig utun1 delete
- ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
- 2018-12-05 10:05:25 NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
- 2018-12-05 10:05:25 /sbin/ifconfig utun1 192.168.16.2 192.168.16.2 netmask 255.255.255.0 mtu 1500 up
- 2018-12-05 10:05:25 /sbin/route add -net 192.168.16.0 192.168.16.2 255.255.255.0
- add net 192.168.16.0: gateway 192.168.16.2
- 2018-12-05 10:05:25 /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw utun1 1500 1557 192.168.16.2 255.255.255.0 init
- **********************************************
- Start of output from client.up.tunnelblick.sh
- Retrieved from OpenVPN: name server(s) [ 172.16.1.1 172.16.21.1 ], domain name [ intranet ], search domain(s) [ ], and SMB server(s) [ ]
- Not aggregating ServerAddresses because running on macOS 10.6 or higher
- Setting search domains to 'intranet' because the search domains were not set manually (or are allowed to be changed) and 'Prepend domain name to search domains' was not selected
- Saved the DNS and SMB configurations so they can be restored
- Changed DNS ServerAddresses setting from '192.168.1.1' to '172.16.1.1 172.16.21.1'
- Changed DNS SearchDomains setting from '' to 'intranet'
- Changed DNS DomainName setting from 'zyxel.com' to 'intranet'
- Did not change SMB NetBIOSName setting of ''
- Did not change SMB Workgroup setting of ''
- Did not change SMB WINSAddresses setting of ''
- DNS servers '172.16.1.1 172.16.21.1' will be used for DNS queries when the VPN is active
- NOTE: The DNS servers do not include any free public DNS servers known to Tunnelblick. This may cause DNS queries to fail or be intercepted or falsified even if they are directed through the VPN. Specify only known public DNS servers or DNS servers located on the VPN network to avoid such problems.
- Flushed the DNS cache via dscacheutil
- /usr/sbin/discoveryutil not present. Not flushing the DNS cache via discoveryutil
- Notified mDNSResponder that the DNS cache was flushed
- Not notifying mDNSResponderHelper that the DNS cache was flushed because it is not running
- Setting up to monitor system configuration with process-network-changes
- End of output from client.up.tunnelblick.sh
- **********************************************
- 2018-12-05 10:05:29 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:05:29 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:05:29 MANAGEMENT: >STATE:1544000729,ADD_ROUTES,,,,,,
- 2018-12-05 10:05:29 /sbin/route add -net 192.168.1.0 192.168.16.1 255.255.255.0
- route: writing to routing socket: File exists
- add net 192.168.1.0: gateway 192.168.16.1: File exists
- 2018-12-05 10:05:29 /sbin/route add -net 192.168.10.0 192.168.16.1 255.255.255.0
- add net 192.168.10.0: gateway 192.168.16.1
- 2018-12-05 10:05:29 /sbin/route add -net 172.16.1.0 192.168.16.1 255.255.255.0
- add net 172.16.1.0: gateway 192.168.16.1
- 2018-12-05 10:05:29 /sbin/route add -net 172.16.20.0 192.168.16.1 255.255.255.0
- add net 172.16.20.0: gateway 192.168.16.1
- 2018-12-05 10:05:29 /sbin/route add -net 172.16.21.0 192.168.16.1 255.255.255.0
- add net 172.16.21.0: gateway 192.168.16.1
- 2018-12-05 10:05:29 /sbin/route add -net 172.16.11.0 192.168.16.1 255.255.255.0
- add net 172.16.11.0: gateway 192.168.16.1
- 2018-12-05 10:05:29 /sbin/route add -net 172.17.0.0 192.168.16.1 255.255.0.0
- add net 172.17.0.0: gateway 192.168.16.1
- 2018-12-05 10:05:29 /sbin/route add -net 172.31.0.0 192.168.16.1 255.255.0.0
- add net 172.31.0.0: gateway 192.168.16.1
- 2018-12-05 10:05:29 /sbin/route add -net 10.128.0.0 192.168.16.1 255.128.0.0
- add net 10.128.0.0: gateway 192.168.16.1
- 2018-12-05 10:05:29 Initialization Sequence Completed
- 2018-12-05 10:05:29 MANAGEMENT: >STATE:1544000729,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:05:34 *Tunnelblick process-network-changes: A system configuration change was ignored
- 2018-12-05 10:05:35 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:05:45 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:05:55 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:06:05 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:06:15 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:06:25 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:06:35 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:06:45 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:06:55 TCP/UDP: Incoming packet rejected from [AF_INET]89.25.253.243:1195[2], expected peer address: [AF_INET]31.182.14.6:1195 (allow this incoming source address/port by removing --remote or adding --float)
- 2018-12-05 10:07:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:07:14 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:07:14 MANAGEMENT: >STATE:1544000834,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:07:14 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:07:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:07:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:07:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:07:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:07:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:07:14 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:07:14 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:07:14 MANAGEMENT: >STATE:1544000834,WAIT,,,,,,
- 2018-12-05 10:07:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:07:14 MANAGEMENT: >STATE:1544000834,AUTH,,,,,,
- 2018-12-05 10:07:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=d51b0c7e 536768d2
- 2018-12-05 10:07:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:07:14 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:07:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:07:14 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:07:14 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:07:16 MANAGEMENT: >STATE:1544000836,GET_CONFIG,,,,,,
- 2018-12-05 10:07:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:07:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:07:16 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:07:16 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:07:16 OPTIONS IMPORT: route options modified
- 2018-12-05 10:07:16 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:07:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:07:16 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:07:16 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:07:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:07:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:07:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:07:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:07:16 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:07:16 Initialization Sequence Completed
- 2018-12-05 10:07:16 MANAGEMENT: >STATE:1544000836,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:09:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:09:14 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:09:14 MANAGEMENT: >STATE:1544000954,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:09:14 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:09:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:09:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:09:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:09:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:09:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:09:14 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:09:14 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:09:14 MANAGEMENT: >STATE:1544000954,WAIT,,,,,,
- 2018-12-05 10:09:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:09:14 MANAGEMENT: >STATE:1544000954,AUTH,,,,,,
- 2018-12-05 10:09:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=e07749ba 26391c45
- 2018-12-05 10:09:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:09:14 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:09:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:09:15 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:09:15 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:09:16 MANAGEMENT: >STATE:1544000956,GET_CONFIG,,,,,,
- 2018-12-05 10:09:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:09:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:09:16 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:09:16 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:09:16 OPTIONS IMPORT: route options modified
- 2018-12-05 10:09:16 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:09:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:09:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:09:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:09:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:09:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:09:16 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:09:16 Initialization Sequence Completed
- 2018-12-05 10:09:16 MANAGEMENT: >STATE:1544000956,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:09:16 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:09:16 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:11:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:11:14 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:11:14 MANAGEMENT: >STATE:1544001074,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:11:14 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:11:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:11:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:11:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:11:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:11:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:11:14 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:11:14 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:11:14 MANAGEMENT: >STATE:1544001074,WAIT,,,,,,
- 2018-12-05 10:11:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:11:14 MANAGEMENT: >STATE:1544001074,AUTH,,,,,,
- 2018-12-05 10:11:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=abdf9436 c44f8a73
- 2018-12-05 10:11:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:11:14 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:11:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:11:14 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:11:14 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:11:15 MANAGEMENT: >STATE:1544001075,GET_CONFIG,,,,,,
- 2018-12-05 10:11:15 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:11:15 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:11:15 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:11:15 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:11:15 OPTIONS IMPORT: route options modified
- 2018-12-05 10:11:15 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:11:15 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:11:15 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:11:15 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:11:15 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:11:15 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:11:15 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:11:15 Initialization Sequence Completed
- 2018-12-05 10:11:15 MANAGEMENT: >STATE:1544001075,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:11:15 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:11:15 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:13:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:13:14 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:13:14 MANAGEMENT: >STATE:1544001194,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:13:15 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:13:15 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:13:15 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:13:15 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:13:15 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:13:15 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:13:15 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:13:15 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:13:15 MANAGEMENT: >STATE:1544001195,WAIT,,,,,,
- 2018-12-05 10:13:15 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:13:15 MANAGEMENT: >STATE:1544001195,AUTH,,,,,,
- 2018-12-05 10:13:15 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=7ccc2618 0629dd07
- 2018-12-05 10:13:15 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:13:15 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:13:15 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:13:15 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:13:15 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:13:16 MANAGEMENT: >STATE:1544001196,GET_CONFIG,,,,,,
- 2018-12-05 10:13:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:13:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:13:16 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:13:16 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:13:16 OPTIONS IMPORT: route options modified
- 2018-12-05 10:13:16 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:13:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:13:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:13:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:13:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:13:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:13:16 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:13:16 Initialization Sequence Completed
- 2018-12-05 10:13:16 MANAGEMENT: >STATE:1544001196,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:13:17 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:13:17 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:15:07 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:15:07 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:15:07 MANAGEMENT: >STATE:1544001307,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:15:08 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:15:08 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:15:08 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:15:08 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:15:08 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:15:08 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:15:08 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:15:08 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:15:08 MANAGEMENT: >STATE:1544001308,WAIT,,,,,,
- 2018-12-05 10:15:08 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:15:08 MANAGEMENT: >STATE:1544001308,AUTH,,,,,,
- 2018-12-05 10:15:08 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=66b04d16 1078bbad
- 2018-12-05 10:15:08 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:15:08 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:15:08 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:15:08 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:15:08 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:15:09 MANAGEMENT: >STATE:1544001309,GET_CONFIG,,,,,,
- 2018-12-05 10:15:09 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:15:09 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:15:09 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:15:09 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:15:09 OPTIONS IMPORT: route options modified
- 2018-12-05 10:15:09 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:15:09 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:15:09 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:15:09 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:15:09 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:15:09 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:15:09 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:15:09 Initialization Sequence Completed
- 2018-12-05 10:15:09 MANAGEMENT: >STATE:1544001309,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:15:09 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:15:09 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:17:06 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:17:06 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:17:06 MANAGEMENT: >STATE:1544001426,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:17:06 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:17:06 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:17:06 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:17:06 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:17:06 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:17:07 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:17:07 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:17:07 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:17:07 MANAGEMENT: >STATE:1544001427,WAIT,,,,,,
- 2018-12-05 10:17:07 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:17:07 MANAGEMENT: >STATE:1544001427,AUTH,,,,,,
- 2018-12-05 10:17:07 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=bf6a17e4 e013a8b8
- 2018-12-05 10:17:07 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:17:07 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:17:07 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:17:07 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:17:07 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:17:08 MANAGEMENT: >STATE:1544001428,GET_CONFIG,,,,,,
- 2018-12-05 10:17:08 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:17:08 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:17:08 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:17:08 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:17:08 OPTIONS IMPORT: route options modified
- 2018-12-05 10:17:08 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:17:08 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:17:08 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:17:08 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:17:08 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:17:08 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:17:08 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:17:08 Initialization Sequence Completed
- 2018-12-05 10:17:08 MANAGEMENT: >STATE:1544001428,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:17:08 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:17:08 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:19:04 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:19:04 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:19:04 MANAGEMENT: >STATE:1544001544,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:19:05 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:19:05 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:19:05 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:19:05 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:19:05 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:19:05 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:19:05 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:19:05 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:19:05 MANAGEMENT: >STATE:1544001545,WAIT,,,,,,
- 2018-12-05 10:19:05 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:19:05 MANAGEMENT: >STATE:1544001545,AUTH,,,,,,
- 2018-12-05 10:19:05 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=37882b0f 1a1660a8
- 2018-12-05 10:19:05 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:19:05 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:19:05 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:19:05 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:19:05 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:19:06 MANAGEMENT: >STATE:1544001546,GET_CONFIG,,,,,,
- 2018-12-05 10:19:06 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:19:06 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:19:06 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:19:06 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:19:06 OPTIONS IMPORT: route options modified
- 2018-12-05 10:19:06 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:19:06 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:19:06 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:19:06 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:19:06 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:19:06 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:19:06 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:19:06 Initialization Sequence Completed
- 2018-12-05 10:19:06 MANAGEMENT: >STATE:1544001546,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:19:06 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:19:06 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:21:05 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:21:05 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:21:05 MANAGEMENT: >STATE:1544001665,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:21:05 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:21:05 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:21:05 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:21:05 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:21:05 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:21:05 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:21:05 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:21:05 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:21:05 MANAGEMENT: >STATE:1544001665,WAIT,,,,,,
- 2018-12-05 10:21:05 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:21:05 MANAGEMENT: >STATE:1544001665,AUTH,,,,,,
- 2018-12-05 10:21:05 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=0962efa6 f8805518
- 2018-12-05 10:21:05 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:21:05 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:21:05 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:21:06 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:21:06 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:21:07 MANAGEMENT: >STATE:1544001667,GET_CONFIG,,,,,,
- 2018-12-05 10:21:07 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:21:07 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:21:07 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:21:07 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:21:07 OPTIONS IMPORT: route options modified
- 2018-12-05 10:21:07 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:21:07 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:21:07 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:21:07 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:21:07 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:21:07 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:21:07 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:21:07 Initialization Sequence Completed
- 2018-12-05 10:21:07 MANAGEMENT: >STATE:1544001667,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:21:08 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:21:08 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:22:59 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:22:59 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:22:59 MANAGEMENT: >STATE:1544001779,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:22:59 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:22:59 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:22:59 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:22:59 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:22:59 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:22:59 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:22:59 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:22:59 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:22:59 MANAGEMENT: >STATE:1544001779,WAIT,,,,,,
- 2018-12-05 10:22:59 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:22:59 MANAGEMENT: >STATE:1544001779,AUTH,,,,,,
- 2018-12-05 10:22:59 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=64b24003 c74aae20
- 2018-12-05 10:22:59 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:22:59 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:22:59 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:22:59 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:22:59 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:23:00 MANAGEMENT: >STATE:1544001780,GET_CONFIG,,,,,,
- 2018-12-05 10:23:00 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:23:00 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:23:00 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:23:00 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:23:00 OPTIONS IMPORT: route options modified
- 2018-12-05 10:23:00 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:23:00 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:23:00 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:23:00 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:23:00 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:23:00 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:23:00 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:23:00 Initialization Sequence Completed
- 2018-12-05 10:23:00 MANAGEMENT: >STATE:1544001780,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:23:01 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:23:01 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:24:10 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:24:10 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:24:10 MANAGEMENT: >STATE:1544001850,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:24:10 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:24:10 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:24:10 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:24:10 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:24:10 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:24:10 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:24:10 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:24:10 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:24:10 MANAGEMENT: >STATE:1544001850,WAIT,,,,,,
- 2018-12-05 10:24:10 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:24:10 MANAGEMENT: >STATE:1544001850,AUTH,,,,,,
- 2018-12-05 10:24:10 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=c91f914d f11024f8
- 2018-12-05 10:24:10 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:24:10 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:24:10 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:24:10 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:24:10 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:24:12 MANAGEMENT: >STATE:1544001852,GET_CONFIG,,,,,,
- 2018-12-05 10:24:12 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:24:12 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:24:12 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:24:12 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:24:12 OPTIONS IMPORT: route options modified
- 2018-12-05 10:24:12 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:24:12 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:24:12 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:24:12 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:24:12 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:24:12 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:24:12 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:24:12 Initialization Sequence Completed
- 2018-12-05 10:24:12 MANAGEMENT: >STATE:1544001852,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:24:12 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:24:12 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:26:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:26:14 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:26:14 MANAGEMENT: >STATE:1544001974,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:26:14 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:26:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:26:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:26:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:26:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:26:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:26:14 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:26:14 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:26:14 MANAGEMENT: >STATE:1544001974,WAIT,,,,,,
- 2018-12-05 10:26:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:26:14 MANAGEMENT: >STATE:1544001974,AUTH,,,,,,
- 2018-12-05 10:26:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=99acf84e 68229a87
- 2018-12-05 10:26:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:26:14 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:26:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:26:14 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:26:14 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:26:16 MANAGEMENT: >STATE:1544001976,GET_CONFIG,,,,,,
- 2018-12-05 10:26:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:26:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:26:16 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:26:16 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:26:16 OPTIONS IMPORT: route options modified
- 2018-12-05 10:26:16 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:26:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:26:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:26:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:26:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:26:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:26:16 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:26:16 Initialization Sequence Completed
- 2018-12-05 10:26:16 MANAGEMENT: >STATE:1544001976,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:26:16 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:26:16 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:28:19 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:28:19 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:28:19 MANAGEMENT: >STATE:1544002099,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:28:19 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:28:19 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:28:19 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:28:19 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:28:19 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:28:19 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:28:19 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:28:19 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:28:19 MANAGEMENT: >STATE:1544002099,WAIT,,,,,,
- 2018-12-05 10:28:19 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:28:19 MANAGEMENT: >STATE:1544002099,AUTH,,,,,,
- 2018-12-05 10:28:19 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=18a6db85 26e9a8be
- 2018-12-05 10:28:19 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:28:19 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:28:19 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:28:20 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:28:20 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:28:21 MANAGEMENT: >STATE:1544002101,GET_CONFIG,,,,,,
- 2018-12-05 10:28:21 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:28:21 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:28:21 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:28:21 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:28:21 OPTIONS IMPORT: route options modified
- 2018-12-05 10:28:21 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:28:21 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:28:21 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:28:21 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:28:21 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:28:21 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:28:21 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:28:21 Initialization Sequence Completed
- 2018-12-05 10:28:21 MANAGEMENT: >STATE:1544002101,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:28:21 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:28:21 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:30:15 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:30:15 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:30:15 MANAGEMENT: >STATE:1544002215,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:30:15 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:30:15 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:30:15 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:30:15 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:30:15 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:30:15 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:30:15 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:30:15 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:30:15 MANAGEMENT: >STATE:1544002215,WAIT,,,,,,
- 2018-12-05 10:30:15 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:30:15 MANAGEMENT: >STATE:1544002215,AUTH,,,,,,
- 2018-12-05 10:30:15 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=c8895579 937d3e81
- 2018-12-05 10:30:15 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:30:15 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:30:15 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:30:15 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:30:15 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:30:16 MANAGEMENT: >STATE:1544002216,GET_CONFIG,,,,,,
- 2018-12-05 10:30:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:30:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:30:16 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:30:16 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:30:16 OPTIONS IMPORT: route options modified
- 2018-12-05 10:30:16 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:30:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:30:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:30:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:30:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:30:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:30:16 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:30:16 Initialization Sequence Completed
- 2018-12-05 10:30:16 MANAGEMENT: >STATE:1544002216,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:30:16 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:30:17 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:32:16 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:32:16 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:32:16 MANAGEMENT: >STATE:1544002336,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:32:17 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:32:17 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:32:17 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:32:17 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:32:17 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:32:17 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:32:17 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:32:17 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:32:17 MANAGEMENT: >STATE:1544002337,WAIT,,,,,,
- 2018-12-05 10:32:17 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:32:17 MANAGEMENT: >STATE:1544002337,AUTH,,,,,,
- 2018-12-05 10:32:17 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=d70786ff 0dbc0774
- 2018-12-05 10:32:17 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:32:17 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:32:17 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:32:18 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:32:18 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:32:19 MANAGEMENT: >STATE:1544002339,GET_CONFIG,,,,,,
- 2018-12-05 10:32:19 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:32:19 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:32:19 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:32:19 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:32:19 OPTIONS IMPORT: route options modified
- 2018-12-05 10:32:19 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:32:19 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:32:19 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:32:19 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:32:19 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:32:19 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:32:19 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:32:19 Initialization Sequence Completed
- 2018-12-05 10:32:19 MANAGEMENT: >STATE:1544002339,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:32:19 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:32:19 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:34:20 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:34:20 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:34:20 MANAGEMENT: >STATE:1544002460,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:34:20 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:34:20 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:34:20 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:34:20 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:34:20 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:34:20 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:34:20 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:34:20 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:34:20 MANAGEMENT: >STATE:1544002460,WAIT,,,,,,
- 2018-12-05 10:34:20 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:34:20 MANAGEMENT: >STATE:1544002460,AUTH,,,,,,
- 2018-12-05 10:34:20 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=61b421c5 bc5320c8
- 2018-12-05 10:34:20 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:34:20 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:34:20 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:34:21 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:34:21 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:34:22 MANAGEMENT: >STATE:1544002462,GET_CONFIG,,,,,,
- 2018-12-05 10:34:22 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:34:22 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:34:22 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:34:22 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:34:22 OPTIONS IMPORT: route options modified
- 2018-12-05 10:34:22 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:34:22 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:34:22 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:34:22 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:34:22 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:34:22 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:34:22 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:34:22 Initialization Sequence Completed
- 2018-12-05 10:34:22 MANAGEMENT: >STATE:1544002462,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:34:22 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:34:22 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:36:23 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:36:23 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:36:23 MANAGEMENT: >STATE:1544002583,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:36:23 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:36:23 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:36:23 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:36:23 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:36:23 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:36:23 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:36:23 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:36:23 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:36:23 MANAGEMENT: >STATE:1544002583,WAIT,,,,,,
- 2018-12-05 10:36:23 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:36:23 MANAGEMENT: >STATE:1544002583,AUTH,,,,,,
- 2018-12-05 10:36:23 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=90272475 bb7684b1
- 2018-12-05 10:36:23 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:36:23 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:36:23 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:36:23 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:36:23 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:36:25 MANAGEMENT: >STATE:1544002585,GET_CONFIG,,,,,,
- 2018-12-05 10:36:25 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:36:25 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:36:25 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:36:25 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:36:25 OPTIONS IMPORT: route options modified
- 2018-12-05 10:36:25 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:36:25 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:36:25 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:36:25 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:36:25 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:36:25 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:36:25 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:36:25 Initialization Sequence Completed
- 2018-12-05 10:36:25 MANAGEMENT: >STATE:1544002585,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:36:25 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:36:25 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:38:15 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:38:15 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:38:15 MANAGEMENT: >STATE:1544002695,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:38:15 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:38:15 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:38:15 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:38:15 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:38:15 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:38:15 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:38:15 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:38:15 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:38:15 MANAGEMENT: >STATE:1544002695,WAIT,,,,,,
- 2018-12-05 10:38:15 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:38:15 MANAGEMENT: >STATE:1544002695,AUTH,,,,,,
- 2018-12-05 10:38:15 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=696d90a7 a9a80990
- 2018-12-05 10:38:15 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:38:15 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:38:15 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:38:16 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:38:16 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:38:17 MANAGEMENT: >STATE:1544002697,GET_CONFIG,,,,,,
- 2018-12-05 10:38:17 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:38:17 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:38:17 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:38:17 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:38:17 OPTIONS IMPORT: route options modified
- 2018-12-05 10:38:17 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:38:17 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:38:17 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:38:17 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:38:17 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:38:17 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:38:17 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:38:17 Initialization Sequence Completed
- 2018-12-05 10:38:17 MANAGEMENT: >STATE:1544002697,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:38:17 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:38:17 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:40:14 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:40:14 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:40:14 MANAGEMENT: >STATE:1544002814,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:40:14 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:40:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:40:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:40:14 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:40:14 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:40:14 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:40:14 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:40:14 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:40:14 MANAGEMENT: >STATE:1544002814,WAIT,,,,,,
- 2018-12-05 10:40:14 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:40:14 MANAGEMENT: >STATE:1544002814,AUTH,,,,,,
- 2018-12-05 10:40:14 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=2825b4d5 812f2e4c
- 2018-12-05 10:40:14 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:40:14 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:40:14 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:40:15 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:40:15 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:40:16 MANAGEMENT: >STATE:1544002816,GET_CONFIG,,,,,,
- 2018-12-05 10:40:16 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:40:16 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:40:16 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:40:16 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:40:16 OPTIONS IMPORT: route options modified
- 2018-12-05 10:40:16 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:40:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:40:16 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:40:16 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:40:16 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:40:16 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:40:16 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:40:16 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:40:16 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:40:16 Initialization Sequence Completed
- 2018-12-05 10:40:16 MANAGEMENT: >STATE:1544002816,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:42:16 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:42:16 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:42:16 MANAGEMENT: >STATE:1544002936,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:42:17 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:42:17 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:42:17 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:42:17 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:42:17 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:42:17 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:42:17 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:42:17 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:42:17 MANAGEMENT: >STATE:1544002937,WAIT,,,,,,
- 2018-12-05 10:42:17 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:42:17 MANAGEMENT: >STATE:1544002937,AUTH,,,,,,
- 2018-12-05 10:42:17 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=9d16f526 cdb5faae
- 2018-12-05 10:42:17 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:42:17 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:42:17 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:42:17 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:42:17 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:42:18 MANAGEMENT: >STATE:1544002938,GET_CONFIG,,,,,,
- 2018-12-05 10:42:18 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:42:18 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:42:18 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:42:18 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:42:18 OPTIONS IMPORT: route options modified
- 2018-12-05 10:42:18 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:42:18 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:42:18 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:42:18 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:42:18 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:42:18 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:42:18 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:42:18 Initialization Sequence Completed
- 2018-12-05 10:42:18 MANAGEMENT: >STATE:1544002938,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:42:19 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:42:19 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:44:18 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:44:18 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:44:18 MANAGEMENT: >STATE:1544003058,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:44:18 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:44:18 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:44:18 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:44:18 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:44:18 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:44:18 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:44:18 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:44:18 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:44:18 MANAGEMENT: >STATE:1544003058,WAIT,,,,,,
- 2018-12-05 10:44:18 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:44:18 MANAGEMENT: >STATE:1544003058,AUTH,,,,,,
- 2018-12-05 10:44:18 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=52a6abc6 3fc07c8e
- 2018-12-05 10:44:18 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:44:18 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:44:18 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:44:18 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:44:18 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:44:19 MANAGEMENT: >STATE:1544003059,GET_CONFIG,,,,,,
- 2018-12-05 10:44:19 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:44:19 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:44:19 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:44:19 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:44:19 OPTIONS IMPORT: route options modified
- 2018-12-05 10:44:19 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:44:19 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:44:19 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:44:19 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:44:19 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:44:19 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:44:19 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:44:19 Initialization Sequence Completed
- 2018-12-05 10:44:19 MANAGEMENT: >STATE:1544003059,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:44:20 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:44:20 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:46:21 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:46:21 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:46:21 MANAGEMENT: >STATE:1544003181,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:46:21 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:46:21 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:46:21 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:46:21 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:46:21 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:46:21 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:46:21 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:46:21 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:46:21 MANAGEMENT: >STATE:1544003181,WAIT,,,,,,
- 2018-12-05 10:46:21 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:46:21 MANAGEMENT: >STATE:1544003181,AUTH,,,,,,
- 2018-12-05 10:46:21 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=d1919e14 36fbcfdb
- 2018-12-05 10:46:21 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:46:21 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:46:21 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:46:21 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:46:21 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:46:22 MANAGEMENT: >STATE:1544003182,GET_CONFIG,,,,,,
- 2018-12-05 10:46:22 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:46:22 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:46:22 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:46:22 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:46:22 OPTIONS IMPORT: route options modified
- 2018-12-05 10:46:22 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:46:22 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:46:22 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:46:22 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:46:22 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:46:22 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:46:22 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:46:22 Initialization Sequence Completed
- 2018-12-05 10:46:22 MANAGEMENT: >STATE:1544003182,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:46:23 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:46:23 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 10:48:19 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 10:48:19 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 10:48:19 MANAGEMENT: >STATE:1544003299,RECONNECTING,ping-restart,,,,,
- 2018-12-05 10:48:19 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 10:48:19 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:48:19 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 10:48:19 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 10:48:19 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:48:19 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 10:48:19 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 10:48:19 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 10:48:19 MANAGEMENT: >STATE:1544003299,WAIT,,,,,,
- 2018-12-05 10:48:19 MANAGEMENT: CMD 'hold release'
- 2018-12-05 10:48:19 MANAGEMENT: >STATE:1544003299,AUTH,,,,,,
- 2018-12-05 10:48:19 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=52be4bd0 3d3dfffa
- 2018-12-05 10:48:19 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 10:48:19 VERIFY OK: nsCertType=SERVER
- 2018-12-05 10:48:19 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 10:48:19 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 10:48:19 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 10:48:20 MANAGEMENT: >STATE:1544003300,GET_CONFIG,,,,,,
- 2018-12-05 10:48:20 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 10:48:20 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 10:48:20 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 10:48:20 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 10:48:20 OPTIONS IMPORT: route options modified
- 2018-12-05 10:48:20 OPTIONS IMPORT: route-related options modified
- 2018-12-05 10:48:20 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 10:48:20 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:48:20 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:48:20 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 10:48:20 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 10:48:20 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 10:48:20 Initialization Sequence Completed
- 2018-12-05 10:48:20 MANAGEMENT: >STATE:1544003300,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 10:48:20 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 10:48:20 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
- 2018-12-05 11:48:19 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 11:48:19 VERIFY OK: nsCertType=SERVER
- 2018-12-05 11:48:19 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 11:48:19 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 11:48:19 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 11:48:19 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 11:48:19 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 11:48:19 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 12:45:07 [ldzrouter01.intranet] Inactivity timeout (--ping-restart), restarting
- 2018-12-05 12:45:07 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-12-05 12:45:07 MANAGEMENT: >STATE:1544010307,RECONNECTING,ping-restart,,,,,
- 2018-12-05 12:45:07 *Tunnelblick: No 'reconnecting.sh' script to execute
- 2018-12-05 12:45:07 MANAGEMENT: CMD 'hold release'
- 2018-12-05 12:45:07 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 2018-12-05 12:45:07 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2018-12-05 12:45:07 TCP/UDP: Preserving recently used remote address: [AF_INET]31.182.14.6:1195
- 2018-12-05 12:45:07 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2018-12-05 12:45:07 UDP link local (bound): [AF_INET][undef]:1194
- 2018-12-05 12:45:07 UDP link remote: [AF_INET]31.182.14.6:1195
- 2018-12-05 12:45:07 MANAGEMENT: >STATE:1544010307,WAIT,,,,,,
- 2018-12-05 12:45:07 MANAGEMENT: CMD 'hold release'
- 2018-12-05 12:45:07 MANAGEMENT: >STATE:1544010307,AUTH,,,,,,
- 2018-12-05 12:45:07 TLS: Initial packet from [AF_INET]31.182.14.6:1195, sid=59537a31 8e71350d
- 2018-12-05 12:45:07 VERIFY OK: depth=1, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=internal-ca
- 2018-12-05 12:45:07 VERIFY OK: nsCertType=SERVER
- 2018-12-05 12:45:07 VERIFY OK: depth=0, C=PL, ST=Lodz, L=Lodz, O=Tellyo , emailAddress=admin@tellyo.com, CN=ldzrouter01.intranet, OU=ldzrouter01 admin panel
- 2018-12-05 12:45:08 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2018-12-05 12:45:08 [ldzrouter01.intranet] Peer Connection Initiated with [AF_INET]31.182.14.6:1195
- 2018-12-05 12:45:09 MANAGEMENT: >STATE:1544010309,GET_CONFIG,,,,,,
- 2018-12-05 12:45:09 SENT CONTROL [ldzrouter01.intranet]: 'PUSH_REQUEST' (status=1)
- 2018-12-05 12:45:09 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,route 192.168.10.0 255.255.255.0,route 172.16.1.0 255.255.255.0,route 172.16.20.0 255.255.255.0,route 172.16.21.0 255.255.255.0,route 172.16.11.0 255.255.255.0,route 172.17.0.0 255.255.0.0,route 172.31.0.0 255.255.0.0,route 10.128.0.0 255.128.0.0,dhcp-option DOMAIN intranet,dhcp-option DNS 172.16.1.1,dhcp-option DNS 172.16.21.1,route-gateway 192.168.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.16.2 255.255.255.0'
- 2018-12-05 12:45:09 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-12-05 12:45:09 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-12-05 12:45:09 OPTIONS IMPORT: route options modified
- 2018-12-05 12:45:09 OPTIONS IMPORT: route-related options modified
- 2018-12-05 12:45:09 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-12-05 12:45:09 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 12:45:09 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 12:45:09 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2018-12-05 12:45:09 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-12-05 12:45:09 Preserving previous TUN/TAP instance: utun1
- 2018-12-05 12:45:09 Initialization Sequence Completed
- 2018-12-05 12:45:09 MANAGEMENT: >STATE:1544010309,CONNECTED,SUCCESS,192.168.16.2,31.182.14.6,1195,,
- 2018-12-05 12:45:09 *Tunnelblick: No 'connected.sh' script to execute
- 2018-12-05 12:45:09 *Tunnelblick: Could not determine this computer's apparent public IP address before the connection was completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement