Guest User

Untitled

a guest
Oct 20th, 2018
65
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.66 KB | None | 0 0
  1. Oct 19 20:37:00 hal ovpn-server[334]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
  2. Oct 19 20:37:00 hal ovpn-server[334]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
  3. Oct 19 20:37:00 hal ovpn-server[444]: ECDH curve secp384r1 added
  4. Oct 19 20:37:00 hal ovpn-server[444]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  5. Oct 19 20:37:00 hal ovpn-server[444]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  6. Oct 19 20:37:00 hal ovpn-server[444]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  7. Oct 19 20:37:00 hal ovpn-server[444]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  8. Oct 19 20:37:00 hal ovpn-server[444]: TUN/TAP device tun0 opened
  9. Oct 19 20:37:00 hal ovpn-server[444]: TUN/TAP TX queue length set to 100
  10. Oct 19 20:37:00 hal ovpn-server[444]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  11. Oct 19 20:37:00 hal ovpn-server[444]: /sbin/ip link set dev tun0 up mtu 1500
  12. Oct 19 20:37:00 hal ovpn-server[444]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
  13. Oct 19 20:37:00 hal ovpn-server[444]: Could not determine IPv4/IPv6 protocol. Using AF_INET
  14. Oct 19 20:37:00 hal ovpn-server[444]: Socket Buffers: R=[163840->163840] S=[163840->163840]
  15. Oct 19 20:37:00 hal ovpn-server[444]: UDPv4 link local (bound): [AF_INET][undef]:443
  16. Oct 19 20:37:00 hal ovpn-server[444]: UDPv4 link remote: [AF_UNSPEC]
  17. Oct 19 20:37:00 hal ovpn-server[444]: GID set to nogroup
  18. Oct 19 20:37:00 hal ovpn-server[444]: UID set to nobody
  19. Oct 19 20:37:00 hal ovpn-server[444]: MULTI: multi_init called, r=256 v=256
  20. Oct 19 20:37:00 hal ovpn-server[444]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
  21. Oct 19 20:37:00 hal ovpn-server[444]: Initialization Sequence Completed
  22. Oct 19 20:39:27 hal ovpn-server[444]: event_wait : Interrupted system call (code=4)
  23. Oct 19 20:39:27 hal ovpn-server[444]: Closing TUN/TAP interface
  24. Oct 19 20:39:27 hal ovpn-server[444]: /sbin/ip addr del dev tun0 10.8.0.1/24
  25. Oct 19 20:39:27 hal ovpn-server[444]: Linux ip addr del failed: external program exited with error status: 2
  26. Oct 19 20:39:27 hal ovpn-server[444]: SIGTERM[hard,] received, process exiting
  27. Oct 19 20:41:33 hal ovpn-server[1832]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
  28. Oct 19 20:41:33 hal ovpn-server[1832]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
  29. Oct 19 20:41:33 hal ovpn-server[1835]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
  30. Oct 19 20:41:33 hal ovpn-server[1835]: ECDH curve secp384r1 added
  31. Oct 19 20:41:33 hal ovpn-server[1835]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  32. Oct 19 20:41:33 hal ovpn-server[1835]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  33. Oct 19 20:41:33 hal ovpn-server[1835]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  34. Oct 19 20:41:33 hal ovpn-server[1835]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  35. Oct 19 20:41:33 hal ovpn-server[1835]: TUN/TAP device tun0 opened
  36. Oct 19 20:41:33 hal ovpn-server[1835]: TUN/TAP TX queue length set to 100
  37. Oct 19 20:41:33 hal ovpn-server[1835]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  38. Oct 19 20:41:33 hal ovpn-server[1835]: /sbin/ip link set dev tun0 up mtu 1500
  39. Oct 19 20:41:33 hal ovpn-server[1835]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
  40. Oct 19 20:41:33 hal ovpn-server[1835]: Could not determine IPv4/IPv6 protocol. Using AF_INET
  41. Oct 19 20:41:33 hal ovpn-server[1835]: Socket Buffers: R=[163840->163840] S=[163840->163840]
  42. Oct 19 20:41:33 hal ovpn-server[1835]: UDPv4 link local (bound): [AF_INET][undef]:443
  43. Oct 19 20:41:33 hal ovpn-server[1835]: UDPv4 link remote: [AF_UNSPEC]
  44. Oct 19 20:41:33 hal ovpn-server[1835]: GID set to nogroup
  45. Oct 19 20:41:33 hal ovpn-server[1835]: UID set to nobody
  46. Oct 19 20:41:33 hal ovpn-server[1835]: MULTI: multi_init called, r=256 v=256
  47. Oct 19 20:41:33 hal ovpn-server[1835]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
  48. Oct 19 20:41:33 hal ovpn-server[1835]: Initialization Sequence Completed
  49. Oct 19 20:41:51 hal ovpn-server[303]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
  50. Oct 19 20:41:51 hal ovpn-server[303]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
  51. Oct 19 20:41:51 hal ovpn-server[316]: ECDH curve secp384r1 added
  52. Oct 19 20:41:51 hal ovpn-server[316]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  53. Oct 19 20:41:51 hal ovpn-server[316]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  54. Oct 19 20:41:51 hal ovpn-server[316]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  55. Oct 19 20:41:51 hal ovpn-server[316]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  56. Oct 19 20:41:51 hal ovpn-server[316]: TUN/TAP device tun0 opened
  57. Oct 19 20:41:51 hal ovpn-server[316]: TUN/TAP TX queue length set to 100
  58. Oct 19 20:41:51 hal ovpn-server[316]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  59. Oct 19 20:41:51 hal ovpn-server[316]: /sbin/ip link set dev tun0 up mtu 1500
  60. Oct 19 20:41:51 hal ovpn-server[316]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
  61. Oct 19 20:41:51 hal ovpn-server[316]: Could not determine IPv4/IPv6 protocol. Using AF_INET
  62. Oct 19 20:41:52 hal ovpn-server[316]: Socket Buffers: R=[163840->163840] S=[163840->163840]
  63. Oct 19 20:41:52 hal ovpn-server[316]: UDPv4 link local (bound): [AF_INET][undef]:443
  64. Oct 19 20:41:52 hal ovpn-server[316]: UDPv4 link remote: [AF_UNSPEC]
  65. Oct 19 20:41:52 hal ovpn-server[316]: GID set to nogroup
  66. Oct 19 20:41:52 hal ovpn-server[316]: UID set to nobody
  67. Oct 19 20:41:52 hal ovpn-server[316]: MULTI: multi_init called, r=256 v=256
  68. Oct 19 20:41:52 hal ovpn-server[316]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
  69. Oct 19 20:41:52 hal ovpn-server[316]: Initialization Sequence Completed
  70. Oct 19 20:47:00 hal ovpn-server[316]: event_wait : Interrupted system call (code=4)
  71. Oct 19 20:47:00 hal ovpn-server[316]: Closing TUN/TAP interface
  72. Oct 19 20:47:00 hal ovpn-server[316]: /sbin/ip addr del dev tun0 10.8.0.1/24
  73. Oct 19 20:47:00 hal ovpn-server[316]: Linux ip addr del failed: external program exited with error status: 2
  74. Oct 19 20:47:00 hal ovpn-server[316]: SIGTERM[hard,] received, process exiting
  75. Oct 19 20:47:00 hal ovpn-server[847]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
  76. Oct 19 20:47:00 hal ovpn-server[847]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
  77. Oct 19 20:47:00 hal ovpn-server[848]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
  78. Oct 19 20:47:00 hal ovpn-server[848]: ECDH curve secp384r1 added
  79. Oct 19 20:47:00 hal ovpn-server[848]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  80. Oct 19 20:47:00 hal ovpn-server[848]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  81. Oct 19 20:47:00 hal ovpn-server[848]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  82. Oct 19 20:47:00 hal ovpn-server[848]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  83. Oct 19 20:47:00 hal ovpn-server[848]: TUN/TAP device tun0 opened
  84. Oct 19 20:47:00 hal ovpn-server[848]: TUN/TAP TX queue length set to 100
  85. Oct 19 20:47:00 hal ovpn-server[848]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  86. Oct 19 20:47:00 hal ovpn-server[848]: /sbin/ip link set dev tun0 up mtu 1500
  87. Oct 19 20:47:00 hal ovpn-server[848]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
  88. Oct 19 20:47:00 hal ovpn-server[848]: Could not determine IPv4/IPv6 protocol. Using AF_INET
  89. Oct 19 20:47:00 hal ovpn-server[848]: Socket Buffers: R=[87380->87380] S=[16384->16384]
  90. Oct 19 20:47:00 hal ovpn-server[848]: Listening for incoming TCP connection on [AF_INET][undef]:443
  91. Oct 19 20:47:00 hal ovpn-server[848]: TCPv4_SERVER link local (bound): [AF_INET][undef]:443
  92. Oct 19 20:47:00 hal ovpn-server[848]: TCPv4_SERVER link remote: [AF_UNSPEC]
  93. Oct 19 20:47:00 hal ovpn-server[848]: GID set to nogroup
  94. Oct 19 20:47:00 hal ovpn-server[848]: UID set to nobody
  95. Oct 19 20:47:00 hal ovpn-server[848]: MULTI: multi_init called, r=256 v=256
  96. Oct 19 20:47:00 hal ovpn-server[848]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
  97. Oct 19 20:47:00 hal ovpn-server[848]: MULTI: TCP INIT maxclients=1024 maxevents=1028
  98. Oct 19 20:47:00 hal ovpn-server[848]: Initialization Sequence Completed
  99. Oct 19 21:09:25 hal ovpn-server[848]: TCP connection established with [AF_INET]puplic.ip:1024
  100. Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 TLS: Initial packet from [AF_INET]puplic.ip:1024, sid=6076fb00 cb702560
  101. Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 tls-crypt unwrap error: packet too short
  102. Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 TLS Error: tls-crypt unwrapping failed from [AF_INET]puplic.ip:1024
  103. Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 Fatal TLS error (check_tls_errors_co), restarting
  104. Oct 19 21:09:25 hal ovpn-server[848]: puplic.ip:1024 SIGUSR1[soft,tls-error] received, client-instance restarting
  105. Oct 19 21:12:51 hal ovpn-server[848]: TCP connection established with [AF_INET]puplic.ip:1024
  106. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 TLS: Initial packet from [AF_INET]puplic.ip:1024, sid=46bd7f4a 769ff6f4
  107. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 VERIFY OK: depth=1, CN=ChangeMe
  108. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 Validating certificate key usage
  109. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 ++ Certificate has key usage 0080, expects 0080
  110. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 VERIFY KU OK
  111. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 Validating certificate extended key usage
  112. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
  113. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 VERIFY EKU OK
  114. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 VERIFY OK: depth=0, CN=charles
  115. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_GUI_VER=OC30Android
  116. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_VER=3.2
  117. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_PLAT=android
  118. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_NCP=2
  119. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_TCPNL=1
  120. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_PROTO=2
  121. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_LZ4=1
  122. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 peer info: IV_AUTO_SESS=1
  123. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  124. Oct 19 21:12:51 hal ovpn-server[848]: puplic.ip:1024 [charles] Peer Connection Initiated with [AF_INET]puplic.ip:1024
  125. Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
  126. Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 MULTI: Learn: 10.8.0.2 -> charles/puplic.ip:1024
  127. Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 MULTI: primary virtual IP for charles/puplic.ip:1024: 10.8.0.2
  128. Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 PUSH: Received control message: 'PUSH_REQUEST'
  129. Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 SENT CONTROL [charles]: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
  130. Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  131. Oct 19 21:12:51 hal ovpn-server[848]: charles/puplic.ip:1024 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  132. Oct 19 21:25:12 hal ovpn-server[309]: OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
  133. Oct 19 21:25:12 hal ovpn-server[309]: library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
  134. Oct 19 21:25:12 hal ovpn-server[337]: ECDH curve secp384r1 added
  135. Oct 19 21:25:12 hal ovpn-server[337]: Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  136. Oct 19 21:25:12 hal ovpn-server[337]: Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  137. Oct 19 21:25:12 hal ovpn-server[337]: Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  138. Oct 19 21:25:12 hal ovpn-server[337]: Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  139. Oct 19 21:25:12 hal ovpn-server[337]: TUN/TAP device tun0 opened
  140. Oct 19 21:25:12 hal ovpn-server[337]: TUN/TAP TX queue length set to 100
  141. Oct 19 21:25:12 hal ovpn-server[337]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  142. Oct 19 21:25:12 hal ovpn-server[337]: /sbin/ip link set dev tun0 up mtu 1500
  143. Oct 19 21:25:12 hal ovpn-server[337]: /sbin/ip addr add dev tun0 10.8.0.1/24 broadcast 10.8.0.255
  144. Oct 19 21:25:13 hal ovpn-server[337]: Could not determine IPv4/IPv6 protocol. Using AF_INET
  145. Oct 19 21:25:13 hal ovpn-server[337]: Socket Buffers: R=[87380->87380] S=[16384->16384]
  146. Oct 19 21:25:13 hal ovpn-server[337]: Listening for incoming TCP connection on [AF_INET][undef]:443
  147. Oct 19 21:25:13 hal ovpn-server[337]: TCPv4_SERVER link local (bound): [AF_INET][undef]:443
  148. Oct 19 21:25:13 hal ovpn-server[337]: TCPv4_SERVER link remote: [AF_UNSPEC]
  149. Oct 19 21:25:13 hal ovpn-server[337]: GID set to nogroup
  150. Oct 19 21:25:13 hal ovpn-server[337]: UID set to nobody
  151. Oct 19 21:25:13 hal ovpn-server[337]: MULTI: multi_init called, r=256 v=256
  152. Oct 19 21:25:13 hal ovpn-server[337]: IFCONFIG POOL: base=10.8.0.2 size=252, ipv6=0
  153. Oct 19 21:25:13 hal ovpn-server[337]: MULTI: TCP INIT maxclients=1024 maxevents=1028
  154. Oct 19 21:25:13 hal ovpn-server[337]: Initialization Sequence Completed
  155. Oct 19 21:25:28 hal ovpn-server[337]: TCP connection established with [AF_INET]puplic.ip:1026
  156. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 TLS: Initial packet from [AF_INET]puplic.ip:1026, sid=6834e998 d5def0e9
  157. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 VERIFY OK: depth=1, CN=ChangeMe
  158. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 Validating certificate key usage
  159. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 ++ Certificate has key usage 0080, expects 0080
  160. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 VERIFY KU OK
  161. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 Validating certificate extended key usage
  162. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
  163. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 VERIFY EKU OK
  164. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 VERIFY OK: depth=0, CN=charles
  165. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_GUI_VER=OC30Android
  166. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_VER=3.2
  167. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_PLAT=android
  168. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_NCP=2
  169. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_TCPNL=1
  170. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_PROTO=2
  171. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_LZ4=1
  172. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_AUTO_SESS=1
  173. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  174. Oct 19 21:25:28 hal ovpn-server[337]: puplic.ip:1026 [charles] Peer Connection Initiated with [AF_INET]puplic.ip:1026
  175. Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
  176. Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI: Learn: 10.8.0.2 -> charles/puplic.ip:1026
  177. Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI: primary virtual IP for charles/puplic.ip:1026: 10.8.0.2
  178. Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 PUSH: Received control message: 'PUSH_REQUEST'
  179. Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 SENT CONTROL [charles]: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
  180. Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  181. Oct 19 21:25:28 hal ovpn-server[337]: charles/puplic.ip:1026 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  182. Oct 19 21:26:14 hal ovpn-server[337]: charles/puplic.ip:1026 Connection reset, restarting [0]
  183. Oct 19 21:26:14 hal ovpn-server[337]: charles/puplic.ip:1026 SIGUSR1[soft,connection-reset] received, client-instance restarting
  184. Oct 19 21:26:15 hal ovpn-server[337]: TCP connection established with [AF_INET]puplic.ip:1026
  185. Oct 19 21:26:15 hal ovpn-server[337]: puplic.ip:1026 TLS: Initial packet from [AF_INET]puplic.ip:1026, sid=b709f07c fd1f5439
  186. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 VERIFY OK: depth=1, CN=ChangeMe
  187. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 Validating certificate key usage
  188. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 ++ Certificate has key usage 0080, expects 0080
  189. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 VERIFY KU OK
  190. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 Validating certificate extended key usage
  191. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication
  192. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 VERIFY EKU OK
  193. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 VERIFY OK: depth=0, CN=charles
  194. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_GUI_VER=OC30Android
  195. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_VER=3.2
  196. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_PLAT=android
  197. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_NCP=2
  198. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_TCPNL=1
  199. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_PROTO=2
  200. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_LZ4=1
  201. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 peer info: IV_AUTO_SESS=1
  202. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  203. Oct 19 21:26:16 hal ovpn-server[337]: puplic.ip:1026 [charles] Peer Connection Initiated with [AF_INET]puplic.ip:1026
  204. Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
  205. Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI: Learn: 10.8.0.2 -> charles/puplic.ip:1026
  206. Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 MULTI: primary virtual IP for charles/puplic.ip:1026: 10.8.0.2
  207. Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 PUSH: Received control message: 'PUSH_REQUEST'
  208. Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 SENT CONTROL [charles]: 'PUSH_REPLY,dhcp-option DNS 1.1.1.1,dhcp-option DNS 1.0.0.1,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
  209. Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  210. Oct 19 21:26:16 hal ovpn-server[337]: charles/puplic.ip:1026 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  211. Oct 19 21:28:19 hal ovpn-server[337]: charles/puplic.ip:1026 Connection reset, restarting [0]
  212. Oct 19 21:28:19 hal ovpn-server[337]: charles/puplic.ip:1026 SIGUSR1[soft,connection-reset] received, client-instance restarting
Add Comment
Please, Sign In to add comment