Advertisement
Guest User

Untitled

a guest
Oct 16th, 2018
113
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 36.69 KB | None | 0 0
  1. root@OpenWrt:/# logread -l 250 -e openvpn
  2. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:6314 peer info: IV_AUTO_SESS=1
  3. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:6314 peer info: IV_BS64DL=1
  4. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:6314 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  5. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:6314 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:6314
  6. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 MULTI_sva: pool returned IPv4=192.168.200.7, IPv6=(Not enabled)
  7. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 MULTI: Learn: 192.168.200.7 -> vpnclient/1.136.108.169:6314
  8. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 MULTI: primary virtual IP for vpnclient/1.136.108.169:6314: 192.168.200.7
  9. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 PUSH: Received control message: 'PUSH_REQUEST'
  10. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.7 255.255.255.0,peer-id 5,cipher AES-256-GCM' (status=1)
  11. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 Data Channel: using negotiated cipher 'AES-256-GCM'
  12. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  13. Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  14. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 TLS: Initial packet from [AF_INET]1.136.108.169:14005, sid=57d5dc46 6d23b565
  15. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
  16. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 VERIFY OK: depth=0, CN=vpnclient
  17. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
  18. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_VER=3.2
  19. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_PLAT=ios
  20. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_NCP=2
  21. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_TCPNL=1
  22. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_PROTO=2
  23. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_LZO_STUB=1
  24. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_COMP_STUB=1
  25. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_COMP_STUBv2=1
  26. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_AUTO_SESS=1
  27. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_BS64DL=1
  28. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  29. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:14005
  30. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 MULTI_sva: pool returned IPv4=192.168.200.8, IPv6=(Not enabled)
  31. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 MULTI: Learn: 192.168.200.8 -> vpnclient/1.136.108.169:14005
  32. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 MULTI: primary virtual IP for vpnclient/1.136.108.169:14005: 192.168.200.8
  33. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 PUSH: Received control message: 'PUSH_REQUEST'
  34. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.8 255.255.255.0,peer-id 6,cipher AES-256-GCM' (status=1)
  35. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 Data Channel: using negotiated cipher 'AES-256-GCM'
  36. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  37. Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  38. Tue Oct 16 20:45:20 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:56950 [vpnclient] Inactivity timeout (--ping-restart), restarting
  39. Tue Oct 16 20:45:20 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:56950 SIGUSR1[soft,ping-restart] received, client-instance restarting
  40. Tue Oct 16 20:45:32 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:8463 [vpnclient] Inactivity timeout (--ping-restart), restarting
  41. Tue Oct 16 20:45:32 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:8463 SIGUSR1[soft,ping-restart] received, client-instance restarting
  42. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 TLS: Initial packet from [AF_INET]1.136.108.169:33675, sid=b27af00c 043e6222
  43. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
  44. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 VERIFY OK: depth=0, CN=vpnclient
  45. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
  46. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_VER=3.2
  47. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_PLAT=ios
  48. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_NCP=2
  49. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_TCPNL=1
  50. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_PROTO=2
  51. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_LZO_STUB=1
  52. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_COMP_STUB=1
  53. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_COMP_STUBv2=1
  54. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_AUTO_SESS=1
  55. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_BS64DL=1
  56. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  57. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:33675
  58. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 MULTI_sva: pool returned IPv4=192.168.200.3, IPv6=(Not enabled)
  59. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 MULTI: Learn: 192.168.200.3 -> vpnclient/1.136.108.169:33675
  60. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 MULTI: primary virtual IP for vpnclient/1.136.108.169:33675: 192.168.200.3
  61. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 PUSH: Received control message: 'PUSH_REQUEST'
  62. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
  63. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 Data Channel: using negotiated cipher 'AES-256-GCM'
  64. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  65. Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  66. Tue Oct 16 20:45:45 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:11207 [vpnclient] Inactivity timeout (--ping-restart), restarting
  67. Tue Oct 16 20:45:45 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:11207 SIGUSR1[soft,ping-restart] received, client-instance restarting
  68. Tue Oct 16 20:45:52 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 TLS: Initial packet from [AF_INET]1.136.108.169:19485, sid=468977da bfe045d8
  69. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
  70. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 VERIFY OK: depth=0, CN=vpnclient
  71. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
  72. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_VER=3.2
  73. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_PLAT=ios
  74. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_NCP=2
  75. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_TCPNL=1
  76. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_PROTO=2
  77. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_LZO_STUB=1
  78. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_COMP_STUB=1
  79. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_COMP_STUBv2=1
  80. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_AUTO_SESS=1
  81. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_BS64DL=1
  82. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  83. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:19485
  84. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 MULTI_sva: pool returned IPv4=192.168.200.4, IPv6=(Not enabled)
  85. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 MULTI: Learn: 192.168.200.4 -> vpnclient/1.136.108.169:19485
  86. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 MULTI: primary virtual IP for vpnclient/1.136.108.169:19485: 192.168.200.4
  87. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 PUSH: Received control message: 'PUSH_REQUEST'
  88. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.4 255.255.255.0,peer-id 2,cipher AES-256-GCM' (status=1)
  89. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 Data Channel: using negotiated cipher 'AES-256-GCM'
  90. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  91. Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  92. Tue Oct 16 20:46:18 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6476 [vpnclient] Inactivity timeout (--ping-restart), restarting
  93. Tue Oct 16 20:46:18 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6476 SIGUSR1[soft,ping-restart] received, client-instance restarting
  94. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 TLS: Initial packet from [AF_INET]1.136.108.169:12535, sid=38891dd0 b1a268be
  95. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
  96. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 VERIFY OK: depth=0, CN=vpnclient
  97. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
  98. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_VER=3.2
  99. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_PLAT=ios
  100. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_NCP=2
  101. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_TCPNL=1
  102. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_PROTO=2
  103. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_LZO_STUB=1
  104. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_COMP_STUB=1
  105. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_COMP_STUBv2=1
  106. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_AUTO_SESS=1
  107. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_BS64DL=1
  108. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  109. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:12535
  110. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 MULTI_sva: pool returned IPv4=192.168.200.5, IPv6=(Not enabled)
  111. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 MULTI: Learn: 192.168.200.5 -> vpnclient/1.136.108.169:12535
  112. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 MULTI: primary virtual IP for vpnclient/1.136.108.169:12535: 192.168.200.5
  113. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 PUSH: Received control message: 'PUSH_REQUEST'
  114. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.5 255.255.255.0,peer-id 3,cipher AES-256-GCM' (status=1)
  115. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 Data Channel: using negotiated cipher 'AES-256-GCM'
  116. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  117. Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  118. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 TLS: Initial packet from [AF_INET]1.136.108.169:46223, sid=92858582 d220a6f8
  119. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
  120. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 VERIFY OK: depth=0, CN=vpnclient
  121. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
  122. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_VER=3.2
  123. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_PLAT=ios
  124. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_NCP=2
  125. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_TCPNL=1
  126. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_PROTO=2
  127. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_LZO_STUB=1
  128. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_COMP_STUB=1
  129. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_COMP_STUBv2=1
  130. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_AUTO_SESS=1
  131. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_BS64DL=1
  132. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  133. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:46223
  134. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 MULTI_sva: pool returned IPv4=192.168.200.6, IPv6=(Not enabled)
  135. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 MULTI: Learn: 192.168.200.6 -> vpnclient/1.136.108.169:46223
  136. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 MULTI: primary virtual IP for vpnclient/1.136.108.169:46223: 192.168.200.6
  137. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 PUSH: Received control message: 'PUSH_REQUEST'
  138. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.6 255.255.255.0,peer-id 4,cipher AES-256-GCM' (status=1)
  139. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 Data Channel: using negotiated cipher 'AES-256-GCM'
  140. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  141. Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  142. Tue Oct 16 20:47:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:49827 [vpnclient] Inactivity timeout (--ping-restart), restarting
  143. Tue Oct 16 20:47:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:49827 SIGUSR1[soft,ping-restart] received, client-instance restarting
  144. Tue Oct 16 20:48:15 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 TLS: Initial packet from [AF_INET]1.136.108.169:35741, sid=840bf18e dfcbea86
  145. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
  146. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 VERIFY OK: depth=0, CN=vpnclient
  147. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
  148. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_VER=3.2
  149. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_PLAT=ios
  150. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_NCP=2
  151. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_TCPNL=1
  152. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_PROTO=2
  153. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_LZO_STUB=1
  154. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_COMP_STUB=1
  155. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_COMP_STUBv2=1
  156. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_AUTO_SESS=1
  157. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_BS64DL=1
  158. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  159. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:35741
  160. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 MULTI_sva: pool returned IPv4=192.168.200.2, IPv6=(Not enabled)
  161. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 MULTI: Learn: 192.168.200.2 -> vpnclient/1.136.108.169:35741
  162. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 MULTI: primary virtual IP for vpnclient/1.136.108.169:35741: 192.168.200.2
  163. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 PUSH: Received control message: 'PUSH_REQUEST'
  164. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
  165. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 Data Channel: using negotiated cipher 'AES-256-GCM'
  166. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  167. Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  168. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 TLS: Initial packet from [AF_INET]1.136.108.169:16780, sid=f733ca0f c5a51625
  169. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
  170. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 VERIFY OK: depth=0, CN=vpnclient
  171. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
  172. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_VER=3.2
  173. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_PLAT=ios
  174. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_NCP=2
  175. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_TCPNL=1
  176. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_PROTO=2
  177. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_LZO_STUB=1
  178. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_COMP_STUB=1
  179. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_COMP_STUBv2=1
  180. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_AUTO_SESS=1
  181. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_BS64DL=1
  182. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  183. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:16780
  184. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 MULTI_sva: pool returned IPv4=192.168.200.9, IPv6=(Not enabled)
  185. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 MULTI: Learn: 192.168.200.9 -> vpnclient/1.136.108.169:16780
  186. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 MULTI: primary virtual IP for vpnclient/1.136.108.169:16780: 192.168.200.9
  187. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 PUSH: Received control message: 'PUSH_REQUEST'
  188. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.9 255.255.255.0,peer-id 7,cipher AES-256-GCM' (status=1)
  189. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 Data Channel: using negotiated cipher 'AES-256-GCM'
  190. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  191. Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  192. Tue Oct 16 20:48:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 [vpnclient] Inactivity timeout (--ping-restart), restarting
  193. Tue Oct 16 20:48:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 SIGUSR1[soft,ping-restart] received, client-instance restarting
  194. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 TLS: Initial packet from [AF_INET]1.136.108.169:23022, sid=f68122d6 a5227558
  195. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
  196. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 VERIFY OK: depth=0, CN=vpnclient
  197. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
  198. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_VER=3.2
  199. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_PLAT=ios
  200. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_NCP=2
  201. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_TCPNL=1
  202. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_PROTO=2
  203. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_LZO_STUB=1
  204. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_COMP_STUB=1
  205. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_COMP_STUBv2=1
  206. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_AUTO_SESS=1
  207. Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_BS64DL=1
  208. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  209. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:23022
  210. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 MULTI_sva: pool returned IPv4=192.168.200.7, IPv6=(Not enabled)
  211. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 MULTI: Learn: 192.168.200.7 -> vpnclient/1.136.108.169:23022
  212. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 MULTI: primary virtual IP for vpnclient/1.136.108.169:23022: 192.168.200.7
  213. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 PUSH: Received control message: 'PUSH_REQUEST'
  214. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.7 255.255.255.0,peer-id 5,cipher AES-256-GCM' (status=1)
  215. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 Data Channel: using negotiated cipher 'AES-256-GCM'
  216. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  217. Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  218. Tue Oct 16 20:48:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 [vpnclient] Inactivity timeout (--ping-restart), restarting
  219. Tue Oct 16 20:48:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 SIGUSR1[soft,ping-restart] received, client-instance restarting
  220. Tue Oct 16 20:49:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 [vpnclient] Inactivity timeout (--ping-restart), restarting
  221. Tue Oct 16 20:49:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 SIGUSR1[soft,ping-restart] received, client-instance restarting
  222. Tue Oct 16 20:49:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 [vpnclient] Inactivity timeout (--ping-restart), restarting
  223. Tue Oct 16 20:49:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 SIGUSR1[soft,ping-restart] received, client-instance restarting
  224. Tue Oct 16 20:50:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 [vpnclient] Inactivity timeout (--ping-restart), restarting
  225. Tue Oct 16 20:50:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 SIGUSR1[soft,ping-restart] received, client-instance restarting
  226. Tue Oct 16 20:50:47 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 TLS: Initial packet from [AF_INET]1.136.108.169:13521, sid=fb22aa17 9a2c7534
  227. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
  228. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 VERIFY OK: depth=0, CN=vpnclient
  229. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
  230. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_VER=3.2
  231. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_PLAT=ios
  232. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_NCP=2
  233. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_TCPNL=1
  234. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_PROTO=2
  235. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_LZO_STUB=1
  236. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_COMP_STUB=1
  237. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_COMP_STUBv2=1
  238. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_AUTO_SESS=1
  239. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_BS64DL=1
  240. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  241. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:13521
  242. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 MULTI_sva: pool returned IPv4=192.168.200.3, IPv6=(Not enabled)
  243. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 MULTI: Learn: 192.168.200.3 -> vpnclient/1.136.108.169:13521
  244. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 MULTI: primary virtual IP for vpnclient/1.136.108.169:13521: 192.168.200.3
  245. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 PUSH: Received control message: 'PUSH_REQUEST'
  246. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
  247. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 Data Channel: using negotiated cipher 'AES-256-GCM'
  248. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  249. Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  250. Tue Oct 16 20:51:05 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 [vpnclient] Inactivity timeout (--ping-restart), restarting
  251. Tue Oct 16 20:51:05 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 SIGUSR1[soft,ping-restart] received, client-instance restarting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement