Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Oct 19 20:37:00 hal ovpn-server[334]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
- Oct 19 20:37:00 hal ovpn-server[334]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
- Oct 19 20:37:00 hal ovpn-server[444]: ECDH curve secp384r1 added
- Oct 19 20:37:00 hal ovpn-server[444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 20:37:00 hal ovpn-server[444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 20:37:00 hal ovpn-server[444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 20:37:00 hal ovpn-server[444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 20:37:00 hal ovpn-server[444]: TUN/TAP device tun0 opened
- Oct 19 20:37:00 hal ovpn-server[444]: TUN/TAP TX queue length set to 100
- Oct 19 20:37:00 hal ovpn-server[444]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Oct 19 20:37:00 hal ovpn-server[444]: /sbin/ip link set dev tun0 up mtu 1500
- Oct 19 20:37:00 hal ovpn-server[444]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
- Oct 19 20:37:00 hal ovpn-server[444]: Could not determine IPv4/IPv6 protocol. Using AF_INET
- Oct 19 20:37:00 hal ovpn-server[444]: Socket Buffers: R=[163840->163840] S=[163840->163840]
- Oct 19 20:37:00 hal ovpn-server[444]: UDPv4 link local (bound): [AF_INET][undef]:443
- Oct 19 20:37:00 hal ovpn-server[444]: UDPv4 link remote: [AF_UNSPEC]
- Oct 19 20:37:00 hal ovpn-server[444]: GID set to nogroup
- Oct 19 20:37:00 hal ovpn-server[444]: UID set to nobody
- Oct 19 20:37:00 hal ovpn-server[444]: MULTI: multi_init called, r=256 v=256
- Oct 19 20:37:00 hal ovpn-server[444]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
- Oct 19 20:37:00 hal ovpn-server[444]: Initialization Sequence Completed
- Oct 19 20:39:27 hal ovpn-server[444]: event_wait : Interrupted system call (code=4)
- Oct 19 20:39:27 hal ovpn-server[444]: Closing TUN/TAP interface
- Oct 19 20:39:27 hal ovpn-server[444]: /sbin/ip addr del dev tun0 10.8.0.1/24
- Oct 19 20:39:27 hal ovpn-server[444]: Linux ip addr del failed: external program exited with error status: 2
- Oct 19 20:39:27 hal ovpn-server[444]: SIGTERM[hard,] received, process exiting
- Oct 19 20:41:33 hal ovpn-server[1832]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
- Oct 19 20:41:33 hal ovpn-server[1832]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
- Oct 19 20:41:33 hal ovpn-server[1835]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
- Oct 19 20:41:33 hal ovpn-server[1835]: ECDH curve secp384r1 added
- Oct 19 20:41:33 hal ovpn-server[1835]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 20:41:33 hal ovpn-server[1835]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 20:41:33 hal ovpn-server[1835]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 20:41:33 hal ovpn-server[1835]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 20:41:33 hal ovpn-server[1835]: TUN/TAP device tun0 opened
- Oct 19 20:41:33 hal ovpn-server[1835]: TUN/TAP TX queue length set to 100
- Oct 19 20:41:33 hal ovpn-server[1835]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Oct 19 20:41:33 hal ovpn-server[1835]: /sbin/ip link set dev tun0 up mtu 1500
- Oct 19 20:41:33 hal ovpn-server[1835]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
- Oct 19 20:41:33 hal ovpn-server[1835]: Could not determine IPv4/IPv6 protocol. Using AF_INET
- Oct 19 20:41:33 hal ovpn-server[1835]: Socket Buffers: R=[163840->163840] S=[163840->163840]
- Oct 19 20:41:33 hal ovpn-server[1835]: UDPv4 link local (bound): [AF_INET][undef]:443
- Oct 19 20:41:33 hal ovpn-server[1835]: UDPv4 link remote: [AF_UNSPEC]
- Oct 19 20:41:33 hal ovpn-server[1835]: GID set to nogroup
- Oct 19 20:41:33 hal ovpn-server[1835]: UID set to nobody
- Oct 19 20:41:33 hal ovpn-server[1835]: MULTI: multi_init called, r=256 v=256
- Oct 19 20:41:33 hal ovpn-server[1835]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
- Oct 19 20:41:33 hal ovpn-server[1835]: Initialization Sequence Completed
- Oct 19 20:41:51 hal ovpn-server[303]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
- Oct 19 20:41:51 hal ovpn-server[303]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
- Oct 19 20:41:51 hal ovpn-server[316]: ECDH curve secp384r1 added
- Oct 19 20:41:51 hal ovpn-server[316]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 20:41:51 hal ovpn-server[316]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 20:41:51 hal ovpn-server[316]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 20:41:51 hal ovpn-server[316]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 20:41:51 hal ovpn-server[316]: TUN/TAP device tun0 opened
- Oct 19 20:41:51 hal ovpn-server[316]: TUN/TAP TX queue length set to 100
- Oct 19 20:41:51 hal ovpn-server[316]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Oct 19 20:41:51 hal ovpn-server[316]: /sbin/ip link set dev tun0 up mtu 1500
- Oct 19 20:41:51 hal ovpn-server[316]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
- Oct 19 20:41:51 hal ovpn-server[316]: Could not determine IPv4/IPv6 protocol. Using AF_INET
- Oct 19 20:41:52 hal ovpn-server[316]: Socket Buffers: R=[163840->163840] S=[163840->163840]
- Oct 19 20:41:52 hal ovpn-server[316]: UDPv4 link local (bound): [AF_INET][undef]:443
- Oct 19 20:41:52 hal ovpn-server[316]: UDPv4 link remote: [AF_UNSPEC]
- Oct 19 20:41:52 hal ovpn-server[316]: GID set to nogroup
- Oct 19 20:41:52 hal ovpn-server[316]: UID set to nobody
- Oct 19 20:41:52 hal ovpn-server[316]: MULTI: multi_init called, r=256 v=256
- Oct 19 20:41:52 hal ovpn-server[316]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
- Oct 19 20:41:52 hal ovpn-server[316]: Initialization Sequence Completed
- Oct 19 20:47:00 hal ovpn-server[316]: event_wait : Interrupted system call (code=4)
- Oct 19 20:47:00 hal ovpn-server[316]: Closing TUN/TAP interface
- Oct 19 20:47:00 hal ovpn-server[316]: /sbin/ip addr del dev tun0 10.8.0.1/24
- Oct 19 20:47:00 hal ovpn-server[316]: Linux ip addr del failed: external program exited with error status: 2
- Oct 19 20:47:00 hal ovpn-server[316]: SIGTERM[hard,] received, process exiting
- Oct 19 20:47:00 hal ovpn-server[847]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
- Oct 19 20:47:00 hal ovpn-server[847]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
- Oct 19 20:47:00 hal ovpn-server[848]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
- Oct 19 20:47:00 hal ovpn-server[848]: ECDH curve secp384r1 added
- Oct 19 20:47:00 hal ovpn-server[848]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 20:47:00 hal ovpn-server[848]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 20:47:00 hal ovpn-server[848]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 20:47:00 hal ovpn-server[848]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 20:47:00 hal ovpn-server[848]: TUN/TAP device tun0 opened
- Oct 19 20:47:00 hal ovpn-server[848]: TUN/TAP TX queue length set to 100
- Oct 19 20:47:00 hal ovpn-server[848]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Oct 19 20:47:00 hal ovpn-server[848]: /sbin/ip link set dev tun0 up mtu 1500
- Oct 19 20:47:00 hal ovpn-server[848]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
- Oct 19 20:47:00 hal ovpn-server[848]: Could not determine IPv4/IPv6 protocol. Using AF_INET
- Oct 19 20:47:00 hal ovpn-server[848]: Socket Buffers: R=[87380->87380] S=[16384->16384]
- Oct 19 20:47:00 hal ovpn-server[848]: Listening for incoming TCP connection on [AF_INET][undef]:443
- Oct 19 20:47:00 hal ovpn-server[848]: TCPv4_SERVER link local (bound): [AF_INET][undef]:443
- Oct 19 20:47:00 hal ovpn-server[848]: TCPv4_SERVER link remote: [AF_UNSPEC]
- Oct 19 20:47:00 hal ovpn-server[848]: GID set to nogroup
- Oct 19 20:47:00 hal ovpn-server[848]: UID set to nobody
- Oct 19 20:47:00 hal ovpn-server[848]: MULTI: multi_init called, r=256 v=256
- Oct 19 20:47:00 hal ovpn-server[848]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
- Oct 19 20:47:00 hal ovpn-server[848]: MULTI: TCP INIT maxclients=1024 maxevents=1028
- Oct 19 20:47:00 hal ovpn-server[848]: Initialization Sequence Completed
- Oct 19 21:09:25 hal ovpn-server[848]: TCP connection established with [AF_INET]puplic.ip:1024
- Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 TLS: Initial packet from [AF_INET]puplic.ip:1024, sid=6076fb00 cb702560
- Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 tls-crypt unwrap error: packet too short
- Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 TLS Error: tls-crypt unwrapping failed from [AF_INET]puplic.ip:1024
- Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 Fatal TLS error (check_tls_errors_co), restarting
- Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 SIGUSR1[soft,tls-error] received, client-instance restarting
- Oct 19 21:12:51 hal ovpn-server[848]: TCP connection established with [AF_INET]puplic.ip:1024
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 TLS: Initial packet from [AF_INET]puplic.ip:1024, sid=46bd7f4a 769ff6f4
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 VERIFY OK: depth=1, CN=ChangeMe
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 Validating certificate key usage
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 ++ Certificate has key usage 0080, expects 0080
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 VERIFY KU OK
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 Validating certificate extended key usage
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 VERIFY EKU OK
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 VERIFY OK: depth=0, CN=charles
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_GUI_VER=OC30Android
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_VER=3.2
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_PLAT=android
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_NCP=2
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_TCPNL=1
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_PROTO=2
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_LZ4=1
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_AUTO_SESS=1
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 [charles] Peer Connection Initiated with [AF_INET]puplic.ip:1024
- Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
- Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 MULTI: Learn: 10.8.0.2 -> charles/puplic.ip:1024
- Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 MULTI: primary virtual IP for charles/puplic.ip:1024: 10.8.0.2
- Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 PUSH: Received control message: 'PUSH_REQUEST'
- Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 SENT CONTROL [charles]: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
- Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Oct 19 21:25:12 hal ovpn-server[309]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
- Oct 19 21:25:12 hal ovpn-server[309]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
- Oct 19 21:25:12 hal ovpn-server[337]: ECDH curve secp384r1 added
- Oct 19 21:25:12 hal ovpn-server[337]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 21:25:12 hal ovpn-server[337]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 21:25:12 hal ovpn-server[337]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Oct 19 21:25:12 hal ovpn-server[337]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Oct 19 21:25:12 hal ovpn-server[337]: TUN/TAP device tun0 opened
- Oct 19 21:25:12 hal ovpn-server[337]: TUN/TAP TX queue length set to 100
- Oct 19 21:25:12 hal ovpn-server[337]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Oct 19 21:25:12 hal ovpn-server[337]: /sbin/ip link set dev tun0 up mtu 1500
- Oct 19 21:25:12 hal ovpn-server[337]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
- Oct 19 21:25:13 hal ovpn-server[337]: Could not determine IPv4/IPv6 protocol. Using AF_INET
- Oct 19 21:25:13 hal ovpn-server[337]: Socket Buffers: R=[87380->87380] S=[16384->16384]
- Oct 19 21:25:13 hal ovpn-server[337]: Listening for incoming TCP connection on [AF_INET][undef]:443
- Oct 19 21:25:13 hal ovpn-server[337]: TCPv4_SERVER link local (bound): [AF_INET][undef]:443
- Oct 19 21:25:13 hal ovpn-server[337]: TCPv4_SERVER link remote: [AF_UNSPEC]
- Oct 19 21:25:13 hal ovpn-server[337]: GID set to nogroup
- Oct 19 21:25:13 hal ovpn-server[337]: UID set to nobody
- Oct 19 21:25:13 hal ovpn-server[337]: MULTI: multi_init called, r=256 v=256
- Oct 19 21:25:13 hal ovpn-server[337]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
- Oct 19 21:25:13 hal ovpn-server[337]: MULTI: TCP INIT maxclients=1024 maxevents=1028
- Oct 19 21:25:13 hal ovpn-server[337]: Initialization Sequence Completed
- Oct 19 21:25:28 hal ovpn-server[337]: TCP connection established with [AF_INET]puplic.ip:1026
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 TLS: Initial packet from [AF_INET]puplic.ip:1026, sid=6834e998 d5def0e9
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 VERIFY OK: depth=1, CN=ChangeMe
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 Validating certificate key usage
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 ++ Certificate has key usage 0080, expects 0080
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 VERIFY KU OK
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 Validating certificate extended key usage
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 VERIFY EKU OK
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 VERIFY OK: depth=0, CN=charles
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_GUI_VER=OC30Android
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_VER=3.2
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_PLAT=android
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_NCP=2
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_TCPNL=1
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_PROTO=2
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_LZ4=1
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_AUTO_SESS=1
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 [charles] Peer Connection Initiated with [AF_INET]puplic.ip:1026
- Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
- Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI: Learn: 10.8.0.2 -> charles/puplic.ip:1026
- Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI: primary virtual IP for charles/puplic.ip:1026: 10.8.0.2
- Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 PUSH: Received control message: 'PUSH_REQUEST'
- Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 SENT CONTROL [charles]: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
- Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Oct 19 21:26:14 hal ovpn-server[337]: charles/puplic.ip:1026 Connection reset, restarting [0]
- Oct 19 21:26:14 hal ovpn-server[337]: charles/puplic.ip:1026 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Oct 19 21:26:15 hal ovpn-server[337]: TCP connection established with [AF_INET]puplic.ip:1026
- Oct 19 21:26:15 hal ovpn-server[337]: puplic.ip:1026 TLS: Initial packet from [AF_INET]puplic.ip:1026, sid=b709f07c fd1f5439
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 VERIFY OK: depth=1, CN=ChangeMe
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 Validating certificate key usage
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 ++ Certificate has key usage 0080, expects 0080
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 VERIFY KU OK
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 Validating certificate extended key usage
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 VERIFY EKU OK
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 VERIFY OK: depth=0, CN=charles
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_GUI_VER=OC30Android
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_VER=3.2
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_PLAT=android
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_NCP=2
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_TCPNL=1
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_PROTO=2
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_LZ4=1
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_AUTO_SESS=1
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 [charles] Peer Connection Initiated with [AF_INET]puplic.ip:1026
- Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
- Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI: Learn: 10.8.0.2 -> charles/puplic.ip:1026
- Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI: primary virtual IP for charles/puplic.ip:1026: 10.8.0.2
- Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 PUSH: Received control message: 'PUSH_REQUEST'
- Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 SENT CONTROL [charles]: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
- Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Oct 19 21:28:19 hal ovpn-server[337]: charles/puplic.ip:1026 Connection reset, restarting [0]
- Oct 19 21:28:19 hal ovpn-server[337]: charles/puplic.ip:1026 SIGUSR1[soft,connection-reset] received, client-instance restarting
Add Comment
Please, Sign In to add comment