Advertisement
Guest User

Untitled

a guest
Jul 27th, 2018
221
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 36.60 KB | None | 0 0
  1. Fri Jul 27 07:46:10 2018 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
  2. Fri Jul 27 07:46:10 2018 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
  3. Fri Jul 27 07:46:10 2018 Diffie-Hellman initialized with 2048 bit key
  4. Fri Jul 27 07:46:10 2018 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
  5. Fri Jul 27 07:46:10 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  6. Fri Jul 27 07:46:10 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  7. Fri Jul 27 07:46:10 2018 Socket Buffers: R=[87380->87380] S=[16384->16384]
  8. Fri Jul 27 07:46:10 2018 ROUTE_GATEWAY 140.59.114.2/255.255.240.0 IFACE=eth0 HWADDR=8e:b8:b9:3e:9e:c6
  9. Fri Jul 27 07:46:10 2018 TUN/TAP device tun0 opened
  10. Fri Jul 27 07:46:10 2018 TUN/TAP TX queue length set to 100
  11. Fri Jul 27 07:46:10 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  12. Fri Jul 27 07:46:10 2018 /sbin/ip link set dev tun0 up mtu 1500
  13. Fri Jul 27 07:46:10 2018 /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2
  14. Fri Jul 27 07:46:10 2018 /sbin/ip route add 10.8.0.0/24 via 10.8.0.2
  15. Fri Jul 27 07:46:10 2018 GID set to nogroup
  16. Fri Jul 27 07:46:10 2018 UID set to nobody
  17. Fri Jul 27 07:46:10 2018 Listening for incoming TCP connection on [undef]
  18. Fri Jul 27 07:46:10 2018 TCPv4_SERVER link local (bound): [undef]
  19. Fri Jul 27 07:46:10 2018 TCPv4_SERVER link remote: [undef]
  20. Fri Jul 27 07:46:10 2018 MULTI: multi_init called, r=256 v=256
  21. Fri Jul 27 07:46:10 2018 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
  22. Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
  23. Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
  24. Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client2,10.8.0.8', TODO: IPv6
  25. Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
  26. Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client3,10.8.0.12', TODO: IPv6
  27. Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
  28. Fri Jul 27 07:46:10 2018 IFCONFIG POOL LIST
  29. Fri Jul 27 07:46:10 2018 client1,10.8.0.4
  30. Fri Jul 27 07:46:10 2018 client2,10.8.0.8
  31. Fri Jul 27 07:46:10 2018 client3,10.8.0.12
  32. Fri Jul 27 07:46:10 2018 MULTI: TCP INIT maxclients=1024 maxevents=1028
  33. Fri Jul 27 07:46:10 2018 Initialization Sequence Completed
  34. Fri Jul 27 07:46:13 2018 TCP connection established with [AF_INET]135.152.43.170:53360
  35. Fri Jul 27 07:46:13 2018 135.152.43.170:53360 TCP connection established with [AF_INET]115.72.249.60:60914
  36. Fri Jul 27 07:46:13 2018 115.72.249.60:60914 WARNING: Bad encapsulated packet length from peer (17231), which must be > 0 and <= 1575 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
  37. Fri Jul 27 07:46:13 2018 115.72.249.60:60914 Connection reset, restarting [0]
  38. Fri Jul 27 07:46:13 2018 115.72.249.60:60914 SIGUSR1[soft,connection-reset] received, client-instance restarting
  39. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 TLS: Initial packet from [AF_INET]135.152.43.170:53360, sid=b1114787 02525525
  40. Fri Jul 27 07:46:14 2018 TCP connection established with [AF_INET]115.72.249.60:60940
  41. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  42. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  43. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  44. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  45. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  46. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  47. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  48. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53360
  49. Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  50. Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53360
  51. Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI: primary virtual IP for client1/135.152.43.170:53360: 10.8.0.6
  52. Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 PUSH: Received control message: 'PUSH_REQUEST'
  53. Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 send_push_reply(): safe_cap=940
  54. Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  55. Fri Jul 27 07:46:19 2018 115.72.249.60:60940 Connection reset, restarting [0]
  56. Fri Jul 27 07:46:19 2018 115.72.249.60:60940 SIGUSR1[soft,connection-reset] received, client-instance restarting
  57. Fri Jul 27 07:46:19 2018 TCP connection established with [AF_INET]115.72.249.60:61166
  58. Fri Jul 27 07:46:24 2018 115.72.249.60:61166 Connection reset, restarting [0]
  59. Fri Jul 27 07:46:24 2018 115.72.249.60:61166 SIGUSR1[soft,connection-reset] received, client-instance restarting
  60. Fri Jul 27 07:46:25 2018 TCP connection established with [AF_INET]115.72.249.60:61403
  61. Fri Jul 27 07:46:25 2018 115.72.249.60:61403 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1575 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
  62. Fri Jul 27 07:46:25 2018 115.72.249.60:61403 Connection reset, restarting [0]
  63. Fri Jul 27 07:46:25 2018 115.72.249.60:61403 SIGUSR1[soft,connection-reset] received, client-instance restarting
  64. root@vpn:/var/log/openvpn# cat openvpn.log
  65. Fri Jul 27 07:46:10 2018 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
  66. Fri Jul 27 07:46:10 2018 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
  67. Fri Jul 27 07:46:10 2018 Diffie-Hellman initialized with 2048 bit key
  68. Fri Jul 27 07:46:10 2018 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
  69. Fri Jul 27 07:46:10 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  70. Fri Jul 27 07:46:10 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  71. Fri Jul 27 07:46:10 2018 Socket Buffers: R=[87380->87380] S=[16384->16384]
  72. Fri Jul 27 07:46:10 2018 ROUTE_GATEWAY 140.59.114.2/255.255.240.0 IFACE=eth0 HWADDR=8e:b8:b9:3e:9e:c6
  73. Fri Jul 27 07:46:10 2018 TUN/TAP device tun0 opened
  74. Fri Jul 27 07:46:10 2018 TUN/TAP TX queue length set to 100
  75. Fri Jul 27 07:46:10 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  76. Fri Jul 27 07:46:10 2018 /sbin/ip link set dev tun0 up mtu 1500
  77. Fri Jul 27 07:46:10 2018 /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2
  78. Fri Jul 27 07:46:10 2018 /sbin/ip route add 10.8.0.0/24 via 10.8.0.2
  79. Fri Jul 27 07:46:10 2018 GID set to nogroup
  80. Fri Jul 27 07:46:10 2018 UID set to nobody
  81. Fri Jul 27 07:46:10 2018 Listening for incoming TCP connection on [undef]
  82. Fri Jul 27 07:46:10 2018 TCPv4_SERVER link local (bound): [undef]
  83. Fri Jul 27 07:46:10 2018 TCPv4_SERVER link remote: [undef]
  84. Fri Jul 27 07:46:10 2018 MULTI: multi_init called, r=256 v=256
  85. Fri Jul 27 07:46:10 2018 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
  86. Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client1,10.8.0.4', TODO: IPv6
  87. Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
  88. Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client2,10.8.0.8', TODO: IPv6
  89. Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
  90. Fri Jul 27 07:46:10 2018 ifconfig_pool_read(), in='client3,10.8.0.12', TODO: IPv6
  91. Fri Jul 27 07:46:10 2018 succeeded -> ifconfig_pool_set()
  92. Fri Jul 27 07:46:10 2018 IFCONFIG POOL LIST
  93. Fri Jul 27 07:46:10 2018 client1,10.8.0.4
  94. Fri Jul 27 07:46:10 2018 client2,10.8.0.8
  95. Fri Jul 27 07:46:10 2018 client3,10.8.0.12
  96. Fri Jul 27 07:46:10 2018 MULTI: TCP INIT maxclients=1024 maxevents=1028
  97. Fri Jul 27 07:46:10 2018 Initialization Sequence Completed
  98. Fri Jul 27 07:46:13 2018 TCP connection established with [AF_INET]135.152.43.170:53360
  99. Fri Jul 27 07:46:13 2018 135.152.43.170:53360 TCP connection established with [AF_INET]115.72.249.60:60914
  100. Fri Jul 27 07:46:13 2018 115.72.249.60:60914 WARNING: Bad encapsulated packet length from peer (17231), which must be > 0 and <= 1575 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
  101. Fri Jul 27 07:46:13 2018 115.72.249.60:60914 Connection reset, restarting [0]
  102. Fri Jul 27 07:46:13 2018 115.72.249.60:60914 SIGUSR1[soft,connection-reset] received, client-instance restarting
  103. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 TLS: Initial packet from [AF_INET]135.152.43.170:53360, sid=b1114787 02525525
  104. Fri Jul 27 07:46:14 2018 TCP connection established with [AF_INET]115.72.249.60:60940
  105. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  106. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  107. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  108. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  109. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  110. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  111. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  112. Fri Jul 27 07:46:14 2018 135.152.43.170:53360 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53360
  113. Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  114. Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53360
  115. Fri Jul 27 07:46:14 2018 client1/135.152.43.170:53360 MULTI: primary virtual IP for client1/135.152.43.170:53360: 10.8.0.6
  116. Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 PUSH: Received control message: 'PUSH_REQUEST'
  117. Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 send_push_reply(): safe_cap=940
  118. Fri Jul 27 07:46:15 2018 client1/135.152.43.170:53360 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  119. Fri Jul 27 07:46:19 2018 115.72.249.60:60940 Connection reset, restarting [0]
  120. Fri Jul 27 07:46:19 2018 115.72.249.60:60940 SIGUSR1[soft,connection-reset] received, client-instance restarting
  121. Fri Jul 27 07:46:19 2018 TCP connection established with [AF_INET]115.72.249.60:61166
  122. Fri Jul 27 07:46:24 2018 115.72.249.60:61166 Connection reset, restarting [0]
  123. Fri Jul 27 07:46:24 2018 115.72.249.60:61166 SIGUSR1[soft,connection-reset] received, client-instance restarting
  124. Fri Jul 27 07:46:25 2018 TCP connection established with [AF_INET]115.72.249.60:61403
  125. Fri Jul 27 07:46:25 2018 115.72.249.60:61403 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1575 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
  126. Fri Jul 27 07:46:25 2018 115.72.249.60:61403 Connection reset, restarting [0]
  127. Fri Jul 27 07:46:25 2018 115.72.249.60:61403 SIGUSR1[soft,connection-reset] received, client-instance restarting
  128. Fri Jul 27 07:47:39 2018 TCP connection established with [AF_INET]135.152.43.170:53406
  129. Fri Jul 27 07:47:40 2018 135.152.43.170:53406 TLS: Initial packet from [AF_INET]135.152.43.170:53406, sid=06b7cbde 513d8542
  130. Fri Jul 27 07:47:40 2018 135.152.43.170:53406 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  131. Fri Jul 27 07:47:40 2018 135.152.43.170:53406 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  132. Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  133. Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  134. Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  135. Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  136. Fri Jul 27 07:47:40 2018 135.152.43.170:53406 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  137. Fri Jul 27 07:47:40 2018 135.152.43.170:53406 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53406
  138. Fri Jul 27 07:47:40 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  139. Fri Jul 27 07:47:40 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  140. Fri Jul 27 07:47:40 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53406
  141. Fri Jul 27 07:47:40 2018 MULTI: primary virtual IP for client1/135.152.43.170:53406: 10.8.0.6
  142. Fri Jul 27 07:47:42 2018 client1/135.152.43.170:53406 PUSH: Received control message: 'PUSH_REQUEST'
  143. Fri Jul 27 07:47:42 2018 client1/135.152.43.170:53406 send_push_reply(): safe_cap=940
  144. Fri Jul 27 07:47:42 2018 client1/135.152.43.170:53406 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  145. Fri Jul 27 07:47:45 2018 TCP connection established with [AF_INET]135.152.43.170:53412
  146. Fri Jul 27 07:47:46 2018 135.152.43.170:53412 TLS: Initial packet from [AF_INET]135.152.43.170:53412, sid=80965abf cf651a3f
  147. Fri Jul 27 07:47:47 2018 135.152.43.170:53412 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  148. Fri Jul 27 07:47:47 2018 135.152.43.170:53412 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  149. Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  150. Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  151. Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  152. Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  153. Fri Jul 27 07:47:47 2018 135.152.43.170:53412 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  154. Fri Jul 27 07:47:47 2018 135.152.43.170:53412 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53412
  155. Fri Jul 27 07:47:47 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  156. Fri Jul 27 07:47:47 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  157. Fri Jul 27 07:47:47 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53412
  158. Fri Jul 27 07:47:47 2018 MULTI: primary virtual IP for client1/135.152.43.170:53412: 10.8.0.6
  159. Fri Jul 27 07:47:48 2018 client1/135.152.43.170:53412 PUSH: Received control message: 'PUSH_REQUEST'
  160. Fri Jul 27 07:47:48 2018 client1/135.152.43.170:53412 send_push_reply(): safe_cap=940
  161. Fri Jul 27 07:47:48 2018 client1/135.152.43.170:53412 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  162. Fri Jul 27 07:47:52 2018 TCP connection established with [AF_INET]135.152.43.170:53416
  163. Fri Jul 27 07:47:53 2018 135.152.43.170:53416 TLS: Initial packet from [AF_INET]135.152.43.170:53416, sid=d85fb9d9 6688b705
  164. Fri Jul 27 07:47:53 2018 135.152.43.170:53416 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  165. Fri Jul 27 07:47:53 2018 135.152.43.170:53416 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  166. Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  167. Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  168. Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  169. Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  170. Fri Jul 27 07:47:53 2018 135.152.43.170:53416 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  171. Fri Jul 27 07:47:53 2018 135.152.43.170:53416 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53416
  172. Fri Jul 27 07:47:53 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  173. Fri Jul 27 07:47:53 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  174. Fri Jul 27 07:47:53 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53416
  175. Fri Jul 27 07:47:53 2018 MULTI: primary virtual IP for client1/135.152.43.170:53416: 10.8.0.6
  176. Fri Jul 27 07:47:54 2018 client1/135.152.43.170:53416 PUSH: Received control message: 'PUSH_REQUEST'
  177. Fri Jul 27 07:47:54 2018 client1/135.152.43.170:53416 send_push_reply(): safe_cap=940
  178. Fri Jul 27 07:47:54 2018 client1/135.152.43.170:53416 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  179. Fri Jul 27 07:47:58 2018 TCP connection established with [AF_INET]135.152.43.170:53418
  180. Fri Jul 27 07:47:59 2018 135.152.43.170:53418 TLS: Initial packet from [AF_INET]135.152.43.170:53418, sid=6478e9b4 91f051c6
  181. Fri Jul 27 07:47:59 2018 135.152.43.170:53418 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  182. Fri Jul 27 07:47:59 2018 135.152.43.170:53418 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  183. Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  184. Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  185. Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  186. Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  187. Fri Jul 27 07:48:00 2018 135.152.43.170:53418 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  188. Fri Jul 27 07:48:00 2018 135.152.43.170:53418 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53418
  189. Fri Jul 27 07:48:00 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  190. Fri Jul 27 07:48:00 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  191. Fri Jul 27 07:48:00 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53418
  192. Fri Jul 27 07:48:00 2018 MULTI: primary virtual IP for client1/135.152.43.170:53418: 10.8.0.6
  193. Fri Jul 27 07:48:01 2018 client1/135.152.43.170:53418 PUSH: Received control message: 'PUSH_REQUEST'
  194. Fri Jul 27 07:48:01 2018 client1/135.152.43.170:53418 send_push_reply(): safe_cap=940
  195. Fri Jul 27 07:48:01 2018 client1/135.152.43.170:53418 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  196. Fri Jul 27 07:48:05 2018 TCP connection established with [AF_INET]135.152.43.170:53428
  197. Fri Jul 27 07:48:06 2018 135.152.43.170:53428 TLS: Initial packet from [AF_INET]135.152.43.170:53428, sid=36a5d84c c0aea5db
  198. Fri Jul 27 07:48:06 2018 135.152.43.170:53428 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  199. Fri Jul 27 07:48:06 2018 135.152.43.170:53428 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  200. Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  201. Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  202. Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  203. Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  204. Fri Jul 27 07:48:06 2018 135.152.43.170:53428 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  205. Fri Jul 27 07:48:06 2018 135.152.43.170:53428 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53428
  206. Fri Jul 27 07:48:06 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  207. Fri Jul 27 07:48:06 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  208. Fri Jul 27 07:48:06 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53428
  209. Fri Jul 27 07:48:06 2018 MULTI: primary virtual IP for client1/135.152.43.170:53428: 10.8.0.6
  210. Fri Jul 27 07:48:07 2018 client1/135.152.43.170:53428 PUSH: Received control message: 'PUSH_REQUEST'
  211. Fri Jul 27 07:48:07 2018 client1/135.152.43.170:53428 send_push_reply(): safe_cap=940
  212. Fri Jul 27 07:48:07 2018 client1/135.152.43.170:53428 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  213. Fri Jul 27 07:48:11 2018 TCP connection established with [AF_INET]135.152.43.170:53430
  214. Fri Jul 27 07:48:11 2018 TCP connection established with [AF_INET]79.134.194.26:7574
  215. Fri Jul 27 07:48:12 2018 135.152.43.170:53430 TLS: Initial packet from [AF_INET]135.152.43.170:53430, sid=8294c9be 7b41480e
  216. Fri Jul 27 07:48:12 2018 79.134.194.26:7574 TLS: Initial packet from [AF_INET]79.134.194.26:7574, sid=e7fed226 e8aa493d
  217. Fri Jul 27 07:48:12 2018 135.152.43.170:53430 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  218. Fri Jul 27 07:48:12 2018 135.152.43.170:53430 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  219. Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  220. Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  221. Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  222. Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  223. Fri Jul 27 07:48:12 2018 79.134.194.26:7574 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  224. Fri Jul 27 07:48:12 2018 79.134.194.26:7574 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client2, name=server, emailAddress=admin@gdr.com
  225. Fri Jul 27 07:48:12 2018 135.152.43.170:53430 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  226. Fri Jul 27 07:48:12 2018 135.152.43.170:53430 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53430
  227. Fri Jul 27 07:48:12 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  228. Fri Jul 27 07:48:12 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  229. Fri Jul 27 07:48:12 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53430
  230. Fri Jul 27 07:48:12 2018 MULTI: primary virtual IP for client1/135.152.43.170:53430: 10.8.0.6
  231. Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  232. Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  233. Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  234. Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  235. Fri Jul 27 07:48:13 2018 79.134.194.26:7574 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  236. Fri Jul 27 07:48:13 2018 79.134.194.26:7574 [client2] Peer Connection Initiated with [AF_INET]79.134.194.26:7574
  237. Fri Jul 27 07:48:13 2018 client2/79.134.194.26:7574 MULTI_sva: pool returned IPv4=10.8.0.10, IPv6=(Not enabled)
  238. Fri Jul 27 07:48:13 2018 client2/79.134.194.26:7574 MULTI: Learn: 10.8.0.10 -> client2/79.134.194.26:7574
  239. Fri Jul 27 07:48:13 2018 client2/79.134.194.26:7574 MULTI: primary virtual IP for client2/79.134.194.26:7574: 10.8.0.10
  240. Fri Jul 27 07:48:13 2018 client1/135.152.43.170:53430 PUSH: Received control message: 'PUSH_REQUEST'
  241. Fri Jul 27 07:48:13 2018 client1/135.152.43.170:53430 send_push_reply(): safe_cap=940
  242. Fri Jul 27 07:48:13 2018 client1/135.152.43.170:53430 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  243. Fri Jul 27 07:48:14 2018 client2/79.134.194.26:7574 PUSH: Received control message: 'PUSH_REQUEST'
  244. Fri Jul 27 07:48:14 2018 client2/79.134.194.26:7574 send_push_reply(): safe_cap=940
  245. Fri Jul 27 07:48:14 2018 client2/79.134.194.26:7574 SENT CONTROL [client2]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.10 10.8.0.9' (status=1)
  246. Fri Jul 27 07:48:16 2018 TCP connection established with [AF_INET]135.152.43.170:53440
  247. Fri Jul 27 07:48:17 2018 135.152.43.170:53440 TLS: Initial packet from [AF_INET]135.152.43.170:53440, sid=6804d8b4 b32b187b
  248. Fri Jul 27 07:48:17 2018 135.152.43.170:53440 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  249. Fri Jul 27 07:48:17 2018 135.152.43.170:53440 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  250. Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  251. Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  252. Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  253. Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  254. Fri Jul 27 07:48:17 2018 135.152.43.170:53440 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  255. Fri Jul 27 07:48:17 2018 135.152.43.170:53440 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53440
  256. Fri Jul 27 07:48:17 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  257. Fri Jul 27 07:48:17 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  258. Fri Jul 27 07:48:17 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53440
  259. Fri Jul 27 07:48:17 2018 MULTI: primary virtual IP for client1/135.152.43.170:53440: 10.8.0.6
  260. Fri Jul 27 07:48:17 2018 TCP connection established with [AF_INET]135.152.43.170:53442
  261. Fri Jul 27 07:48:18 2018 135.152.43.170:53442 TLS: Initial packet from [AF_INET]135.152.43.170:53442, sid=25c237ce 9fa3d8c5
  262. Fri Jul 27 07:48:18 2018 client1/135.152.43.170:53440 PUSH: Received control message: 'PUSH_REQUEST'
  263. Fri Jul 27 07:48:18 2018 client1/135.152.43.170:53440 send_push_reply(): safe_cap=940
  264. Fri Jul 27 07:48:18 2018 client1/135.152.43.170:53440 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  265. Fri Jul 27 07:48:19 2018 135.152.43.170:53442 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  266. Fri Jul 27 07:48:19 2018 135.152.43.170:53442 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  267. Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  268. Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  269. Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  270. Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  271. Fri Jul 27 07:48:19 2018 135.152.43.170:53442 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  272. Fri Jul 27 07:48:19 2018 135.152.43.170:53442 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53442
  273. Fri Jul 27 07:48:19 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  274. Fri Jul 27 07:48:19 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  275. Fri Jul 27 07:48:19 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53442
  276. Fri Jul 27 07:48:19 2018 MULTI: primary virtual IP for client1/135.152.43.170:53442: 10.8.0.6
  277. Fri Jul 27 07:48:20 2018 client1/135.152.43.170:53442 PUSH: Received control message: 'PUSH_REQUEST'
  278. Fri Jul 27 07:48:20 2018 client1/135.152.43.170:53442 send_push_reply(): safe_cap=940
  279. Fri Jul 27 07:48:20 2018 client1/135.152.43.170:53442 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  280. Fri Jul 27 07:48:22 2018 TCP connection established with [AF_INET]135.152.43.170:53446
  281. Fri Jul 27 07:48:23 2018 135.152.43.170:53446 TLS: Initial packet from [AF_INET]135.152.43.170:53446, sid=a9651f38 3484fc9b
  282. Fri Jul 27 07:48:24 2018 135.152.43.170:53446 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  283. Fri Jul 27 07:48:24 2018 135.152.43.170:53446 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  284. Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  285. Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  286. Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  287. Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  288. Fri Jul 27 07:48:24 2018 135.152.43.170:53446 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  289. Fri Jul 27 07:48:24 2018 135.152.43.170:53446 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53446
  290. Fri Jul 27 07:48:24 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  291. Fri Jul 27 07:48:24 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  292. Fri Jul 27 07:48:24 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53446
  293. Fri Jul 27 07:48:24 2018 MULTI: primary virtual IP for client1/135.152.43.170:53446: 10.8.0.6
  294. Fri Jul 27 07:48:24 2018 TCP connection established with [AF_INET]135.152.43.170:53456
  295. Fri Jul 27 07:48:25 2018 client1/135.152.43.170:53446 PUSH: Received control message: 'PUSH_REQUEST'
  296. Fri Jul 27 07:48:25 2018 client1/135.152.43.170:53446 send_push_reply(): safe_cap=940
  297. Fri Jul 27 07:48:25 2018 client1/135.152.43.170:53446 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  298. Fri Jul 27 07:48:25 2018 135.152.43.170:53456 TLS: Initial packet from [AF_INET]135.152.43.170:53456, sid=381b459a 1a36bdcd
  299. Fri Jul 27 07:48:25 2018 135.152.43.170:53456 VERIFY OK: depth=1, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=DO CA, name=server, emailAddress=admin@gdr.com
  300. Fri Jul 27 07:48:25 2018 135.152.43.170:53456 VERIFY OK: depth=0, C=DL, ST=GD, L=Berlin, O=DO, OU=RKN, CN=client1, name=server, emailAddress=admin@gdr.com
  301. Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  302. Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  303. Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  304. Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  305. Fri Jul 27 07:48:25 2018 135.152.43.170:53456 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  306. Fri Jul 27 07:48:25 2018 135.152.43.170:53456 [client1] Peer Connection Initiated with [AF_INET]135.152.43.170:53456
  307. Fri Jul 27 07:48:25 2018 MULTI: new connection by client 'client1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  308. Fri Jul 27 07:48:25 2018 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
  309. Fri Jul 27 07:48:25 2018 MULTI: Learn: 10.8.0.6 -> client1/135.152.43.170:53456
  310. Fri Jul 27 07:48:25 2018 MULTI: primary virtual IP for client1/135.152.43.170:53456: 10.8.0.6
  311. Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 PUSH: Received control message: 'PUSH_REQUEST'
  312. Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 send_push_reply(): safe_cap=940
  313. Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 SENT CONTROL [client1]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  314. Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 Connection reset, restarting [0]
  315. Fri Jul 27 07:48:26 2018 client1/135.152.43.170:53456 SIGUSR1[soft,connection-reset] received, client-instance restarting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement