Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Fri Jul 27 07:46:10 2018 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
- Fri Jul 27 07:46:10 2018 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
- Fri Jul 27 07:46:10 2018 Diffie-Hellman initialized with 2048 bit key
- Fri Jul 27 07:46:10 2018 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
- Fri Jul 27 07:46:10 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:46:10 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:46:10 2018 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Fri Jul 27 07:46:10 2018 ROUTE_GATEWAY 140.59.114.2/255.255.240.0 IFACE=eth0 HWADDR=8e:b8:b9:3e:9e:c6
- Fri Jul 27 07:46:10 2018 TUN/TAP device tun0 opened
- Fri Jul 27 07:46:10 2018 TUN/TAP TX queue length set to 100
- Fri Jul 27 07:46:10 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Fri Jul 27 07:46:10 2018 /sbin/ip link set dev tun0 up mtu 1500
- Fri Jul 27 07:46:10 2018 /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2
- Fri Jul 27 07:46:10 2018 /sbin/ip route add 10.8.0.0/24 via 10.8.0.2
- Fri Jul 27 07:46:10 2018 GID set to nogroup
- Fri Jul 27 07:46:10 2018 UID set to nobody
- Fri Jul 27 07:46:10 2018 Listening for incoming TCP connection on [undef]
- Fri Jul 27 07:46:10 2018 TCPv4_SERVER link local (bound): [undef]
- Fri Jul 27 07:46:10 2018 TCPv4_SERVER link remote: [undef]
- Fri Jul 27 07:46:10 2018 MULTI: multi_init called, r=256 v=256
- Fri Jul 27 07:46:10 2018 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
- Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
- Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
- Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client2,10.8.0.8', TODO: IPv6
- Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
- Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client3,10.8.0.12', TODO: IPv6
- Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
- Fri Jul 27 07:46:10 2018 IFCONFIG POOL LIST
- Fri Jul 27 07:46:10 2018 client1,10.8.0.4
- Fri Jul 27 07:46:10 2018 client2,10.8.0.8
- Fri Jul 27 07:46:10 2018 client3,10.8.0.12
- Fri Jul 27 07:46:10 2018 MULTI: TCP INIT maxclients=1024 maxevents=1028
- Fri Jul 27 07:46:10 2018 Initialization Sequence Completed
- Fri Jul 27 07:46:13 2018 TCP connection established with [AF_INET]135.152.43.170:53360
- Fri Jul 27 07:46:13 2018 135.152.43.170:53360 TCP connection established with [AF_INET]115.72.249.60:60914
- Fri Jul 27 07:46:13 2018 115.72.249.60:60914 WARNING: Bad encapsulated packet length from peer (17231), which must be > 0 and <= 1575 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
- Fri Jul 27 07:46:13 2018 115.72.249.60:60914 Connection reset, restarting [0]
- Fri Jul 27 07:46:13 2018 115.72.249.60:60914 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 TLS: Initial packet from [AF_INET]135.152.43.170:53360, sid=b1114787 02525525
- Fri Jul 27 07:46:14 2018 TCP connection established with [AF_INET]115.72.249.60:60940
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53360
- Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53360
- Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI: primary virtual IP for client1/135.152.43.170:53360: 10.8.0.6
- Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 send_push_reply(): safe_cap=940
- Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:46:19 2018 115.72.249.60:60940 Connection reset, restarting [0]
- Fri Jul 27 07:46:19 2018 115.72.249.60:60940 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Fri Jul 27 07:46:19 2018 TCP connection established with [AF_INET]115.72.249.60:61166
- Fri Jul 27 07:46:24 2018 115.72.249.60:61166 Connection reset, restarting [0]
- Fri Jul 27 07:46:24 2018 115.72.249.60:61166 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Fri Jul 27 07:46:25 2018 TCP connection established with [AF_INET]115.72.249.60:61403
- Fri Jul 27 07:46:25 2018 115.72.249.60:61403 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1575 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
- Fri Jul 27 07:46:25 2018 115.72.249.60:61403 Connection reset, restarting [0]
- Fri Jul 27 07:46:25 2018 115.72.249.60:61403 SIGUSR1[soft,connection-reset] received, client-instance restarting
- root@vpn:/var/log/openvpn# cat openvpn.log
- Fri Jul 27 07:46:10 2018 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
- Fri Jul 27 07:46:10 2018 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
- Fri Jul 27 07:46:10 2018 Diffie-Hellman initialized with 2048 bit key
- Fri Jul 27 07:46:10 2018 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
- Fri Jul 27 07:46:10 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:46:10 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:46:10 2018 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Fri Jul 27 07:46:10 2018 ROUTE_GATEWAY 140.59.114.2/255.255.240.0 IFACE=eth0 HWADDR=8e:b8:b9:3e:9e:c6
- Fri Jul 27 07:46:10 2018 TUN/TAP device tun0 opened
- Fri Jul 27 07:46:10 2018 TUN/TAP TX queue length set to 100
- Fri Jul 27 07:46:10 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Fri Jul 27 07:46:10 2018 /sbin/ip link set dev tun0 up mtu 1500
- Fri Jul 27 07:46:10 2018 /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2
- Fri Jul 27 07:46:10 2018 /sbin/ip route add 10.8.0.0/24 via 10.8.0.2
- Fri Jul 27 07:46:10 2018 GID set to nogroup
- Fri Jul 27 07:46:10 2018 UID set to nobody
- Fri Jul 27 07:46:10 2018 Listening for incoming TCP connection on [undef]
- Fri Jul 27 07:46:10 2018 TCPv4_SERVER link local (bound): [undef]
- Fri Jul 27 07:46:10 2018 TCPv4_SERVER link remote: [undef]
- Fri Jul 27 07:46:10 2018 MULTI: multi_init called, r=256 v=256
- Fri Jul 27 07:46:10 2018 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
- Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
- Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
- Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client2,10.8.0.8', TODO: IPv6
- Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
- Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client3,10.8.0.12', TODO: IPv6
- Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
- Fri Jul 27 07:46:10 2018 IFCONFIG POOL LIST
- Fri Jul 27 07:46:10 2018 client1,10.8.0.4
- Fri Jul 27 07:46:10 2018 client2,10.8.0.8
- Fri Jul 27 07:46:10 2018 client3,10.8.0.12
- Fri Jul 27 07:46:10 2018 MULTI: TCP INIT maxclients=1024 maxevents=1028
- Fri Jul 27 07:46:10 2018 Initialization Sequence Completed
- Fri Jul 27 07:46:13 2018 TCP connection established with [AF_INET]135.152.43.170:53360
- Fri Jul 27 07:46:13 2018 135.152.43.170:53360 TCP connection established with [AF_INET]115.72.249.60:60914
- Fri Jul 27 07:46:13 2018 115.72.249.60:60914 WARNING: Bad encapsulated packet length from peer (17231), which must be > 0 and <= 1575 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
- Fri Jul 27 07:46:13 2018 115.72.249.60:60914 Connection reset, restarting [0]
- Fri Jul 27 07:46:13 2018 115.72.249.60:60914 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 TLS: Initial packet from [AF_INET]135.152.43.170:53360, sid=b1114787 02525525
- Fri Jul 27 07:46:14 2018 TCP connection established with [AF_INET]115.72.249.60:60940
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:46:14 2018 135.152.43.170:53360 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53360
- Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53360
- Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI: primary virtual IP for client1/135.152.43.170:53360: 10.8.0.6
- Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 send_push_reply(): safe_cap=940
- Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:46:19 2018 115.72.249.60:60940 Connection reset, restarting [0]
- Fri Jul 27 07:46:19 2018 115.72.249.60:60940 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Fri Jul 27 07:46:19 2018 TCP connection established with [AF_INET]115.72.249.60:61166
- Fri Jul 27 07:46:24 2018 115.72.249.60:61166 Connection reset, restarting [0]
- Fri Jul 27 07:46:24 2018 115.72.249.60:61166 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Fri Jul 27 07:46:25 2018 TCP connection established with [AF_INET]115.72.249.60:61403
- Fri Jul 27 07:46:25 2018 115.72.249.60:61403 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1575 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
- Fri Jul 27 07:46:25 2018 115.72.249.60:61403 Connection reset, restarting [0]
- Fri Jul 27 07:46:25 2018 115.72.249.60:61403 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Fri Jul 27 07:47:39 2018 TCP connection established with [AF_INET]135.152.43.170:53406
- Fri Jul 27 07:47:40 2018 135.152.43.170:53406 TLS: Initial packet from [AF_INET]135.152.43.170:53406, sid=06b7cbde 513d8542
- Fri Jul 27 07:47:40 2018 135.152.43.170:53406 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:47:40 2018 135.152.43.170:53406 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:47:40 2018 135.152.43.170:53406 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53406
- Fri Jul 27 07:47:40 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:47:40 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:47:40 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53406
- Fri Jul 27 07:47:40 2018 MULTI: primary virtual IP for client1/135.152.43.170:53406: 10.8.0.6
- Fri Jul 27 07:47:42 2018 client1/135.152.43.170:53406 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:47:42 2018 client1/135.152.43.170:53406 send_push_reply(): safe_cap=940
- Fri Jul 27 07:47:42 2018 client1/135.152.43.170:53406 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:47:45 2018 TCP connection established with [AF_INET]135.152.43.170:53412
- Fri Jul 27 07:47:46 2018 135.152.43.170:53412 TLS: Initial packet from [AF_INET]135.152.43.170:53412, sid=80965abf cf651a3f
- Fri Jul 27 07:47:47 2018 135.152.43.170:53412 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:47:47 2018 135.152.43.170:53412 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:47:47 2018 135.152.43.170:53412 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53412
- Fri Jul 27 07:47:47 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:47:47 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:47:47 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53412
- Fri Jul 27 07:47:47 2018 MULTI: primary virtual IP for client1/135.152.43.170:53412: 10.8.0.6
- Fri Jul 27 07:47:48 2018 client1/135.152.43.170:53412 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:47:48 2018 client1/135.152.43.170:53412 send_push_reply(): safe_cap=940
- Fri Jul 27 07:47:48 2018 client1/135.152.43.170:53412 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:47:52 2018 TCP connection established with [AF_INET]135.152.43.170:53416
- Fri Jul 27 07:47:53 2018 135.152.43.170:53416 TLS: Initial packet from [AF_INET]135.152.43.170:53416, sid=d85fb9d9 6688b705
- Fri Jul 27 07:47:53 2018 135.152.43.170:53416 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:47:53 2018 135.152.43.170:53416 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:47:53 2018 135.152.43.170:53416 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53416
- Fri Jul 27 07:47:53 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:47:53 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:47:53 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53416
- Fri Jul 27 07:47:53 2018 MULTI: primary virtual IP for client1/135.152.43.170:53416: 10.8.0.6
- Fri Jul 27 07:47:54 2018 client1/135.152.43.170:53416 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:47:54 2018 client1/135.152.43.170:53416 send_push_reply(): safe_cap=940
- Fri Jul 27 07:47:54 2018 client1/135.152.43.170:53416 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:47:58 2018 TCP connection established with [AF_INET]135.152.43.170:53418
- Fri Jul 27 07:47:59 2018 135.152.43.170:53418 TLS: Initial packet from [AF_INET]135.152.43.170:53418, sid=6478e9b4 91f051c6
- Fri Jul 27 07:47:59 2018 135.152.43.170:53418 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:47:59 2018 135.152.43.170:53418 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:48:00 2018 135.152.43.170:53418 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53418
- Fri Jul 27 07:48:00 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:48:00 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:48:00 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53418
- Fri Jul 27 07:48:00 2018 MULTI: primary virtual IP for client1/135.152.43.170:53418: 10.8.0.6
- Fri Jul 27 07:48:01 2018 client1/135.152.43.170:53418 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:48:01 2018 client1/135.152.43.170:53418 send_push_reply(): safe_cap=940
- Fri Jul 27 07:48:01 2018 client1/135.152.43.170:53418 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:48:05 2018 TCP connection established with [AF_INET]135.152.43.170:53428
- Fri Jul 27 07:48:06 2018 135.152.43.170:53428 TLS: Initial packet from [AF_INET]135.152.43.170:53428, sid=36a5d84c c0aea5db
- Fri Jul 27 07:48:06 2018 135.152.43.170:53428 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:06 2018 135.152.43.170:53428 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:48:06 2018 135.152.43.170:53428 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53428
- Fri Jul 27 07:48:06 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:48:06 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:48:06 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53428
- Fri Jul 27 07:48:06 2018 MULTI: primary virtual IP for client1/135.152.43.170:53428: 10.8.0.6
- Fri Jul 27 07:48:07 2018 client1/135.152.43.170:53428 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:48:07 2018 client1/135.152.43.170:53428 send_push_reply(): safe_cap=940
- Fri Jul 27 07:48:07 2018 client1/135.152.43.170:53428 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:48:11 2018 TCP connection established with [AF_INET]135.152.43.170:53430
- Fri Jul 27 07:48:11 2018 TCP connection established with [AF_INET]79.134.194.26:7574
- Fri Jul 27 07:48:12 2018 135.152.43.170:53430 TLS: Initial packet from [AF_INET]135.152.43.170:53430, sid=8294c9be 7b41480e
- Fri Jul 27 07:48:12 2018 79.134.194.26:7574 TLS: Initial packet from [AF_INET]79.134.194.26:7574, sid=e7fed226 e8aa493d
- Fri Jul 27 07:48:12 2018 135.152.43.170:53430 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:12 2018 135.152.43.170:53430 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:12 2018 79.134.194.26:7574 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:12 2018 79.134.194.26:7574 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client2, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:48:12 2018 135.152.43.170:53430 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53430
- Fri Jul 27 07:48:12 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:48:12 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:48:12 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53430
- Fri Jul 27 07:48:12 2018 MULTI: primary virtual IP for client1/135.152.43.170:53430: 10.8.0.6
- Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:48:13 2018 79.134.194.26:7574 [client2] Peer Connection Initiated with [AF_INET]79.134.194.26:7574
- Fri Jul 27 07:48:13 2018 client2/79.134.194.26:7574 MULTI_sva: pool returned IPv4=10.8.0.10, IPv6=(Not enabled)
- Fri Jul 27 07:48:13 2018 client2/79.134.194.26:7574 MULTI: Learn: 10.8.0.10 -> client2/79.134.194.26:7574
- Fri Jul 27 07:48:13 2018 client2/79.134.194.26:7574 MULTI: primary virtual IP for client2/79.134.194.26:7574: 10.8.0.10
- Fri Jul 27 07:48:13 2018 client1/135.152.43.170:53430 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:48:13 2018 client1/135.152.43.170:53430 send_push_reply(): safe_cap=940
- Fri Jul 27 07:48:13 2018 client1/135.152.43.170:53430 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:48:14 2018 client2/79.134.194.26:7574 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:48:14 2018 client2/79.134.194.26:7574 send_push_reply(): safe_cap=940
- Fri Jul 27 07:48:14 2018 client2/79.134.194.26:7574 SENT CONTROL [client2]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9' (status=1)
- Fri Jul 27 07:48:16 2018 TCP connection established with [AF_INET]135.152.43.170:53440
- Fri Jul 27 07:48:17 2018 135.152.43.170:53440 TLS: Initial packet from [AF_INET]135.152.43.170:53440, sid=6804d8b4 b32b187b
- Fri Jul 27 07:48:17 2018 135.152.43.170:53440 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:17 2018 135.152.43.170:53440 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:48:17 2018 135.152.43.170:53440 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53440
- Fri Jul 27 07:48:17 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:48:17 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:48:17 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53440
- Fri Jul 27 07:48:17 2018 MULTI: primary virtual IP for client1/135.152.43.170:53440: 10.8.0.6
- Fri Jul 27 07:48:17 2018 TCP connection established with [AF_INET]135.152.43.170:53442
- Fri Jul 27 07:48:18 2018 135.152.43.170:53442 TLS: Initial packet from [AF_INET]135.152.43.170:53442, sid=25c237ce 9fa3d8c5
- Fri Jul 27 07:48:18 2018 client1/135.152.43.170:53440 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:48:18 2018 client1/135.152.43.170:53440 send_push_reply(): safe_cap=940
- Fri Jul 27 07:48:18 2018 client1/135.152.43.170:53440 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:48:19 2018 135.152.43.170:53442 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:19 2018 135.152.43.170:53442 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:48:19 2018 135.152.43.170:53442 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53442
- Fri Jul 27 07:48:19 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:48:19 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:48:19 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53442
- Fri Jul 27 07:48:19 2018 MULTI: primary virtual IP for client1/135.152.43.170:53442: 10.8.0.6
- Fri Jul 27 07:48:20 2018 client1/135.152.43.170:53442 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:48:20 2018 client1/135.152.43.170:53442 send_push_reply(): safe_cap=940
- Fri Jul 27 07:48:20 2018 client1/135.152.43.170:53442 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:48:22 2018 TCP connection established with [AF_INET]135.152.43.170:53446
- Fri Jul 27 07:48:23 2018 135.152.43.170:53446 TLS: Initial packet from [AF_INET]135.152.43.170:53446, sid=a9651f38 3484fc9b
- Fri Jul 27 07:48:24 2018 135.152.43.170:53446 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:24 2018 135.152.43.170:53446 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:48:24 2018 135.152.43.170:53446 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53446
- Fri Jul 27 07:48:24 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:48:24 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:48:24 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53446
- Fri Jul 27 07:48:24 2018 MULTI: primary virtual IP for client1/135.152.43.170:53446: 10.8.0.6
- Fri Jul 27 07:48:24 2018 TCP connection established with [AF_INET]135.152.43.170:53456
- Fri Jul 27 07:48:25 2018 client1/135.152.43.170:53446 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:48:25 2018 client1/135.152.43.170:53446 send_push_reply(): safe_cap=940
- Fri Jul 27 07:48:25 2018 client1/135.152.43.170:53446 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:48:25 2018 135.152.43.170:53456 TLS: Initial packet from [AF_INET]135.152.43.170:53456, sid=381b459a 1a36bdcd
- Fri Jul 27 07:48:25 2018 135.152.43.170:53456 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:25 2018 135.152.43.170:53456 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
- Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jul 27 07:48:25 2018 135.152.43.170:53456 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53456
- Fri Jul 27 07:48:25 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri Jul 27 07:48:25 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Fri Jul 27 07:48:25 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53456
- Fri Jul 27 07:48:25 2018 MULTI: primary virtual IP for client1/135.152.43.170:53456: 10.8.0.6
- Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 PUSH: Received control message: 'PUSH_REQUEST'
- Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 send_push_reply(): safe_cap=940
- Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 Connection reset, restarting [0]
- Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 SIGUSR1[soft,connection-reset] received, client-instance restarting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement