Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@OpenWrt:/# logread -l 250 -e openvpn
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:6314 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:6314 peer info: IV_BS64DL=1
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:6314 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:6314 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:6314
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 MULTI_sva: pool returned IPv4=192.168.200.7, IPv6=(Not enabled)
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 MULTI: Learn: 192.168.200.7 -> vpnclient/1.136.108.169:6314
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 MULTI: primary virtual IP for vpnclient/1.136.108.169:6314: 192.168.200.7
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.7 255.255.255.0,peer-id 5,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:44:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 TLS: Initial packet from [AF_INET]1.136.108.169:14005, sid=57d5dc46 6d23b565
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 VERIFY OK: depth=0, CN=vpnclient
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_VER=3.2
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_PLAT=ios
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_NCP=2
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_TCPNL=1
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_PROTO=2
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_LZO_STUB=1
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_COMP_STUB=1
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_COMP_STUBv2=1
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 peer info: IV_BS64DL=1
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:14005 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:14005
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 MULTI_sva: pool returned IPv4=192.168.200.8, IPv6=(Not enabled)
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 MULTI: Learn: 192.168.200.8 -> vpnclient/1.136.108.169:14005
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 MULTI: primary virtual IP for vpnclient/1.136.108.169:14005: 192.168.200.8
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.8 255.255.255.0,peer-id 6,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:44:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:45:20 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:56950 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:45:20 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:56950 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:45:32 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:8463 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:45:32 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:8463 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 TLS: Initial packet from [AF_INET]1.136.108.169:33675, sid=b27af00c 043e6222
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 VERIFY OK: depth=0, CN=vpnclient
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_VER=3.2
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_PLAT=ios
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_NCP=2
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_TCPNL=1
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_PROTO=2
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_LZO_STUB=1
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_COMP_STUB=1
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_COMP_STUBv2=1
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 peer info: IV_BS64DL=1
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:33675 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:33675
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 MULTI_sva: pool returned IPv4=192.168.200.3, IPv6=(Not enabled)
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 MULTI: Learn: 192.168.200.3 -> vpnclient/1.136.108.169:33675
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 MULTI: primary virtual IP for vpnclient/1.136.108.169:33675: 192.168.200.3
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:45:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:45:45 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:11207 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:45:45 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:11207 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:45:52 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 TLS: Initial packet from [AF_INET]1.136.108.169:19485, sid=468977da bfe045d8
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 VERIFY OK: depth=0, CN=vpnclient
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_VER=3.2
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_PLAT=ios
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_NCP=2
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_TCPNL=1
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_PROTO=2
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_LZO_STUB=1
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_COMP_STUB=1
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_COMP_STUBv2=1
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 peer info: IV_BS64DL=1
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:19485 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:19485
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 MULTI_sva: pool returned IPv4=192.168.200.4, IPv6=(Not enabled)
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 MULTI: Learn: 192.168.200.4 -> vpnclient/1.136.108.169:19485
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 MULTI: primary virtual IP for vpnclient/1.136.108.169:19485: 192.168.200.4
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.4 255.255.255.0,peer-id 2,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:45:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:46:18 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6476 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:46:18 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6476 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 TLS: Initial packet from [AF_INET]1.136.108.169:12535, sid=38891dd0 b1a268be
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 VERIFY OK: depth=0, CN=vpnclient
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_VER=3.2
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_PLAT=ios
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_NCP=2
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_TCPNL=1
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_PROTO=2
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_LZO_STUB=1
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_COMP_STUB=1
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_COMP_STUBv2=1
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 peer info: IV_BS64DL=1
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:12535 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:12535
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 MULTI_sva: pool returned IPv4=192.168.200.5, IPv6=(Not enabled)
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 MULTI: Learn: 192.168.200.5 -> vpnclient/1.136.108.169:12535
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 MULTI: primary virtual IP for vpnclient/1.136.108.169:12535: 192.168.200.5
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.5 255.255.255.0,peer-id 3,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:46:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 TLS: Initial packet from [AF_INET]1.136.108.169:46223, sid=92858582 d220a6f8
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 VERIFY OK: depth=0, CN=vpnclient
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_VER=3.2
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_PLAT=ios
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_NCP=2
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_TCPNL=1
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_PROTO=2
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_LZO_STUB=1
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_COMP_STUB=1
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_COMP_STUBv2=1
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 peer info: IV_BS64DL=1
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:46223 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:46223
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 MULTI_sva: pool returned IPv4=192.168.200.6, IPv6=(Not enabled)
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 MULTI: Learn: 192.168.200.6 -> vpnclient/1.136.108.169:46223
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 MULTI: primary virtual IP for vpnclient/1.136.108.169:46223: 192.168.200.6
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.6 255.255.255.0,peer-id 4,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:47:04 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:47:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:49827 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:47:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:49827 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:48:15 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 TLS: Initial packet from [AF_INET]1.136.108.169:35741, sid=840bf18e dfcbea86
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 VERIFY OK: depth=0, CN=vpnclient
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_VER=3.2
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_PLAT=ios
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_NCP=2
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_TCPNL=1
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_PROTO=2
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_LZO_STUB=1
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_COMP_STUB=1
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_COMP_STUBv2=1
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 peer info: IV_BS64DL=1
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:35741 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:35741
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 MULTI_sva: pool returned IPv4=192.168.200.2, IPv6=(Not enabled)
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 MULTI: Learn: 192.168.200.2 -> vpnclient/1.136.108.169:35741
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 MULTI: primary virtual IP for vpnclient/1.136.108.169:35741: 192.168.200.2
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.2 255.255.255.0,peer-id 1,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:48:16 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:35741 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 TLS: Initial packet from [AF_INET]1.136.108.169:16780, sid=f733ca0f c5a51625
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 VERIFY OK: depth=0, CN=vpnclient
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_VER=3.2
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_PLAT=ios
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_NCP=2
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_TCPNL=1
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_PROTO=2
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_LZO_STUB=1
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_COMP_STUB=1
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_COMP_STUBv2=1
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 peer info: IV_BS64DL=1
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:16780 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:16780
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 MULTI_sva: pool returned IPv4=192.168.200.9, IPv6=(Not enabled)
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 MULTI: Learn: 192.168.200.9 -> vpnclient/1.136.108.169:16780
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 MULTI: primary virtual IP for vpnclient/1.136.108.169:16780: 192.168.200.9
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.9 255.255.255.0,peer-id 7,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:48:25 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:16780 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:48:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:48:27 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:6314 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 TLS: Initial packet from [AF_INET]1.136.108.169:23022, sid=f68122d6 a5227558
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 VERIFY OK: depth=0, CN=vpnclient
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_VER=3.2
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_PLAT=ios
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_NCP=2
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_TCPNL=1
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_PROTO=2
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_LZO_STUB=1
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_COMP_STUB=1
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_COMP_STUBv2=1
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:48:36 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 peer info: IV_BS64DL=1
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:23022 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:23022
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 MULTI_sva: pool returned IPv4=192.168.200.7, IPv6=(Not enabled)
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 MULTI: Learn: 192.168.200.7 -> vpnclient/1.136.108.169:23022
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 MULTI: primary virtual IP for vpnclient/1.136.108.169:23022: 192.168.200.7
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.7 255.255.255.0,peer-id 5,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:48:37 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:23022 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:48:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:48:39 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:14005 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:49:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:49:36 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:33675 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:49:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:49:53 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:19485 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:50:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:50:30 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:12535 SIGUSR1[soft,ping-restart] received, client-instance restarting
- Tue Oct 16 20:50:47 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 TLS: Initial packet from [AF_INET]1.136.108.169:13521, sid=fb22aa17 9a2c7534
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 VERIFY OK: depth=1, C=GB, ST=London, O=WWW Ltd.
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 VERIFY OK: depth=0, CN=vpnclient
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.0.2-894
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_VER=3.2
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_PLAT=ios
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_NCP=2
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_TCPNL=1
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_PROTO=2
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_LZO_STUB=1
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_COMP_STUB=1
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_COMP_STUBv2=1
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_AUTO_SESS=1
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 peer info: IV_BS64DL=1
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: 1.136.108.169:13521 [vpnclient] Peer Connection Initiated with [AF_INET]1.136.108.169:13521
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 MULTI_sva: pool returned IPv4=192.168.200.3, IPv6=(Not enabled)
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 MULTI: Learn: 192.168.200.3 -> vpnclient/1.136.108.169:13521
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 MULTI: primary virtual IP for vpnclient/1.136.108.169:13521: 192.168.200.3
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 SENT CONTROL [vpnclient]: 'PUSH_REPLY,redirect-gateway def1,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,compress lzo,persist-tun,persist-key,dhcp-option DOMAIN lan,route-gateway 192.168.200.1,topology subnet,ping 10,ping-restart 120,ifconfig 192.168.200.3 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:50:48 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:13521 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Oct 16 20:51:05 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 [vpnclient] Inactivity timeout (--ping-restart), restarting
- Tue Oct 16 20:51:05 2018 daemon.notice openvpn(vpnserver)[14046]: vpnclient/1.136.108.169:46223 SIGUSR1[soft,ping-restart] received, client-instance restarting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement